Sample records for futuristic improved security

  1. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization

    PubMed Central

    Gladden, Matthew E.

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the “CIA Triad” of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel “posthumanized” human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses. PMID:29163010

  2. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization.

    PubMed

    Gladden, Matthew E

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.

  3. The Futurist Perspective: Implications for Community College Planning.

    ERIC Educational Resources Information Center

    Nicholson, R. Stephen; Keyser, John S.

    Community college managers would probably acknowledge the importance of planning, but might not accept the need to adopt a futuristic perspective on educational planning. One of the characteristics of futurists is a belief that the future is a created reality, not a consequence of random events. Futurists conceive possible paths, examine…

  4. A novel wireless local positioning system for airport (indoor) security

    NASA Astrophysics Data System (ADS)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  5. Strategic Vision: A Selected Bibliography with Emphasis on Future Warfare

    DTIC Science & Technology

    1998-05-01

    PLANNING PERIODICAL ARTICLES Agor , Weston H . "Intuition & Strategic Planning." Futurist 23 (November-December 1989): 20- 23. Galdorisi, George Y...in Organizations. 2ded. San Francisco: Jossey-Bass, 1995. 405pp. (HD57.7 .K68 1995) Pp. 91-148: "Inspiring a Shared Vision." Mackey, Richard H ...Security. Washington: National Defense University Press, 1987. 133pp. (U153 .C74 1987) Snyder, Neil H ., James J. Dowd, Jr., and Dianne Houghton

  6. The Future of Clinical Education: Using Futuristic Scenarios to Explore Allied Health Deans' Perspectives on Clinical Education.

    PubMed

    Romig, Barbara D; Tucker, Ann W; Hewitt, Anne M; O'Sullivan Maillet, Julie

    2017-01-01

    There is limited information and consensus on the future of clinical education. The Delphi technique was selected to identify agreement among Association of Schools of Allied Health Professions' (ASAHP) allied health deans on the future (2018-2023) of allied health (AH) clinical education. Sixty-one AH deans, 54.9% (61 of 111) of the ASAHP membership, expressed opinions about clinical education through a three-round Delphi study. In conjunction with a conceptual model, four futuristic scenarios were used to encourage deans' feedback on the key factors impacting the future of clinical education. The responses to the four scenarios showed ways the external environment influences which activities the deans recommend. The results presented, by individual scenario and in totality, provide relevant and timely information on the importance and transformation of AH clinical education and its future. Futuristic scenarios, in combination with the Delphi technique, generated information where little exists specific to AH deans' perspectives on AH clinical education. The results offer deans opportunities for future strategic improvements. The use of the futuristic scenarios was suitable for guiding deans' responses and reaching agreement on the future of AH clinical education. These contributions reflect the imminent conditions and healthcare environment identified in the various scenarios and provide additional insight on key factors impacting the future for AH clinical education.

  7. The Politics of Scarcity: A Consideration of Futurist Models of Boom and Doom.

    ERIC Educational Resources Information Center

    Johnston, Barry V.

    The works of 20 futurists and their predictions for the year 2000 and beyond are examined according to four perspectives: Malthusianism, Utopianism (based on theories of William Godwin), Marxism, and social structuralism. Futurists may be grouped into one of the categories according to their theories about the interdependent problems of…

  8. Future constraints on angle-dependent non-Gaussianity from large radio surveys

    NASA Astrophysics Data System (ADS)

    Raccanelli, Alvise; Shiraishi, Maresuke; Bartolo, Nicola; Bertacca, Daniele; Liguori, Michele; Matarrese, Sabino; Norris, Ray P.; Parkinson, David

    2017-03-01

    We investigate how well future large-scale radio surveys could measure different shapes of primordial non-Gaussianity; in particular we focus on angle-dependent non-Gaussianity arising from primordial anisotropic sources, whose bispectrum has an angle dependence between the three wavevectors that is characterized by Legendre polynomials PL and expansion coefficients cL. We provide forecasts for measurements of galaxy power spectrum, finding that Large-Scale Structure (LSS) data could allow measurements of primordial non-Gaussianity that would be competitive with, or improve upon, current constraints set by CMB experiments, for all the shapes considered. We argue that the best constraints will come from the possibility to assign redshift information to radio galaxy surveys, and investigate a few possible scenarios for the EMU and SKA surveys. A realistic (futuristic) modeling could provide constraints of fNLloc ≈ 1(0 . 5) for the local shape, fNL of O(10) (O(1)) for the orthogonal, equilateral and folded shapes, and cL=1 ≈ 80(2) , cL=2 ≈ 400(10) for angle-dependent non-Gaussianity showing that only futuristic galaxy surveys will be able to set strong constraints on these models. Nevertheless, the more futuristic forecasts show the potential of LSS analyses to considerably improve current constraints on non-Gaussianity, and so on models of the primordial Universe. Finally, we find the minimum requirements that would be needed to reach σ(cL=1) = 10, which can be considered as a typical (lower) value predicted by some (inflationary) models.

  9. Developing Intuitive Officers to Revolutionize Transformation in the 21st Century Military

    DTIC Science & Technology

    2004-03-19

    Publications, 1974), 59. 59 Ibid, 59. 24 25 BIBLIOGRAPHY Agor , Weston . H ., “Tomorrow’s Intuitive Leaders,” The Futurist, August 1993, 46-53. Agor , Weston ...William H . Agor , “Tomorrow’s Intuitive Leaders,” The Futurist, Nov 1983, 49-55. 20 N. DiMarco and R.M. Tate, “A Cross-cultural Comparison of Superior...success, it may not reinforce the skills necessary for transformation. William Agor described the outcome of this process in 1983 for The Futurist

  10. Some Friendly Criticisms of Futurism.

    ERIC Educational Resources Information Center

    Williams, Lloyd P.

    1981-01-01

    Suggests that many of the allegations made by futurists are too casually affirmed and should be subjected to additional research. Alludes to numerous historical and research studies to reinforce this contention. Focuses particularly on futurists' concern with schools, the economy, society, and capitalism. (DB)

  11. Organized Hypocrisy in EFL Teacher Training Programs

    ERIC Educational Resources Information Center

    Karim, Abdul; Mohamed, Abdul Rashid; Ismail, Shaik Abdul Malik Mohamed; Rahman, Mohammad Mosiur

    2018-01-01

    Embracing the reasons for the failure of donor-sponsored English-teacher training programs is very critical since it precedes the revisions, improvements and quality assurance for the futuristic training programs. Ideating such philosophy, the current study concerns the blatant penetration with regard to the donor-aided training programs in…

  12. The Forces Restructuring Our Future and Outdoor Recreation: Transcription of Keynote Speech.

    ERIC Educational Resources Information Center

    Feather, Frank

    This futurist keynote speech of the National Conference for Outdoor Leaders addresses the social, technological, economic, and political forces that are restructuring the world. The concept of geostrategic thinking has the components of global thinking, futuristic thinking, and seeking opportunities. Important developments include: (1) wealth will…

  13. Ask a Futurist. Peace [and] Robots.

    ERIC Educational Resources Information Center

    Joseph, Earl C.

    A futurist addresses two questions concerning world peace and the implications of using robots. In the section on peace (part 1), recommendations for world peace include: (1) implementing peace education as a mandatory part of education; (2) establishing a Department of Peace in each country to create a societal infrastructure for implementing…

  14. Futuristics in K-12 Classrooms

    ERIC Educational Resources Information Center

    Shostak, Arthur B.

    2008-01-01

    Youngsters nowadays have grown up learning "protect tomorrow!" lessons from "Barney" and "Bill Nye the Science Guy." They have been tutored by unforgettable futuristic movies like "A.I." and "E.T," by science fiction serials and "Star Trek" reruns and by future-oriented series on cable TV (including material on The History Channel). Of course,…

  15. Futurist Art: Motion and Aesthetics As a Function of Title

    PubMed Central

    Mastandrea, Stefano; Umiltà, Maria A.

    2016-01-01

    Very often the titles of Futurist paintings contain words denoting movement in order to satisfy their artistic poetic focused on motion and velocity. The aim of the present study is to investigate the reported dynamism and aesthetic quality of several Futurist artworks as a function of their title. Ten Futurist artworks with a movement-related word in the title were selected for this study. The titles were manipulated, resulting in four conditions for each painting: the “original title” with the movement word; an “increased” title in which an adjective was added in order to intensify the sense of dynamism; a “decreased” title, in which the movement word was eliminated; no title. Participants evaluated the movement suggested by each painting in the four different title conditions, rated their beauty and reported how much they liked the work. Results showed that the manipulation of the title had an effect on the reported movement: compared to the others, paintings presented with the “original” and with the “increased” title received significant higher movement scores. Of interest, beauty did not differ across conditions, but liking was higher for the conditions with more movement. Lastly, positive correlations between the quantity of perceived movement and aesthetic evaluation were found. From the present results it can be concluded that Futurists attributed much relevance to the titles of their artworks in order to effectively increase the expression of the movement represented. PMID:27242471

  16. Optimistic Outlooks: Latest Views on the Global Future by a Galaxy of International Experts.

    ERIC Educational Resources Information Center

    Feather, Frank, Ed.; Mayur, Rashmi, Ed.

    Eighteen international futurists present their views concerning separate major world issues. The book includes a prologue which discusses the optimistic nature of most futurists; an introduction which describes the book's contents; 14 chapters arranged into 3 major parts; an epilogue; and conclusion. In part I, which examines the basic necessities…

  17. Worlds without War: Reflections on Elise Boulding's Life, Work and Legacy as a Peace Educator, Feminist and Futurist

    ERIC Educational Resources Information Center

    Hutchinson, Francis P.; Milojevic, Ivana

    2012-01-01

    Our joint article focuses on Elise Boulding's creative work and legacy as a feminist peace theorist, peace educator and futures educator. Boulding throughout her life was deeply concerned not only with critiquing the institution of war but of working for better, more peaceable worlds. She was very much a "practical futurist". Various important…

  18. Forest futures in the Anthropocene: Can trees and humans survive together?

    Treesearch

    David Bengston; Michael J. Dockry

    2014-01-01

    Foresters and futurists share a long-range perspective. The lengthy growing cycle of trees has compelled foresters to plan decades and even hundreds of years ahead, in contrast to the short-term view of most fields. The interconnected nature of forest ecosystems has also given foresters—like futurists—a systems perspective. As the American naturalist...

  19. A Review of the Literature of the Process of Giving Warning with Discussion of Implications for Futurists.

    ERIC Educational Resources Information Center

    Koster, Francis

    The paper presents a review of literature on warnings of social crises and applies the literature to selected crises predicted in America's future. It is intended for use by futurists and policy makers as they devise ways to help society cope with crises. Warnings are interpreted as combining statement of a problem with proposal of a course of…

  20. Secure Intra-Body Wireless Communications (SIWiC) System Project

    NASA Technical Reports Server (NTRS)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  1. "The Communication Needs and Rights of Mankind", Group 1 Report of the Futuristic Priorities Division of the Speech Communication Association. "Future Communication Technologies; Hardware and Software"; Group 2 Report.

    ERIC Educational Resources Information Center

    Dance, Frank E. X.; And Others

    This paper reports on the Futuristic Priorities Division members' recommendations and priorities concerning the impact of the future on communication and on the speech communication discipline. The recommendations and priorities are listed for two subgroups: The Communication Needs and Rights of Mankind; and Future Communication Technologies:…

  2. The Impact of Teacher Training on Creative Writing and Problem-Solving Using Futuristic Scenarios for Creative Problem Solving and Creative Problem Solving Programs

    ERIC Educational Resources Information Center

    Hayel Al-Srour, Nadia; Al-Ali, Safa M.; Al-Oweidi, Alia

    2016-01-01

    The present study aims to detect the impact of teacher training on creative writing and problem-solving using both Futuristic scenarios program to solve problems creatively, and creative problem solving. To achieve the objectives of the study, the sample was divided into two groups, the first consist of 20 teachers, and 23 teachers to second…

  3. Nanopore Technology: A Simple, Inexpensive, Futuristic Technology for DNA Sequencing.

    PubMed

    Gupta, P D

    2016-10-01

    In health care, importance of DNA sequencing has been fully established. Sanger's Capillary Electrophoresis DNA sequencing methodology is time consuming, cumbersome, hence become more expensive. Lately, because of its versatility DNA sequencing became house hold name, and therefore, there is an urgent need of simple, fast, inexpensive, DNA sequencing technology. In the beginning of this century efforts were made, and Nanopore DNA sequencing technology was developed; still it is infancy, nevertheless, it is the futuristic technology.

  4. The Validity of Uniform Chart of Accounts as a Measure of Resource Consumption at the Patient Level.

    DTIC Science & Technology

    1984-05-20

    required to meet the projected rates of demand based on the DIE case-mix concept . However, this is futuristic and the concern of today’s military...on the DRG case-mix concept . However, ihis is futuristic and the concern of today’s military health care manager is with the Uniform Chart of Accounts...product of a healthcare institution. This concept is vastly different from the one which considers the proxy measure of the number of institutional

  5. Advancing the frontiers of silk fibroin protein-based materials for futuristic electronics and clinical wound-healing (Invited review).

    PubMed

    Koh, Leng-Duei; Yeo, Jingjie; Lee, Yeong Yuh; Ong, Qunya; Han, Mingyong; Tee, Benjamin C-K

    2018-05-01

    The present review will introduce the basic concepts of silk-based electronics/optoelectronics including the latest technological advances on the use of silk fibroin in combination with other functional components, with an emphasis on improving the performance of next-generation silk-based materials. It also highlights the patterning of silk fibroin to produce micro/nano-scale features, as well as the functionalization of silk fibroin to impart antimicrobial (i.e. antibacterial) properties. Silk-based bioelectronics have great potential for advanced or futuristic bio-applications including e-skins, e-bandages, biosensors, wearable displays, implantable devices, artificial muscles, etc. Notably, silk-based organic field-effect transistors have highly promising applications in e-skins and biosensors; silk-based electrodes/antennas are used for in vivo bioanalysis or sensing purpose (e.g., measurement of neurotransmitter such as dopamine) in addition to their use as food sensors; silk-based diodes can be applied as light sources for wound healing or tissue engineering, e.g., in cutaneous wound closure or induction of photothrombosis of corneal neovascularization; silk-based actuators have promising applications as artificial muscles; whereas silk-based memristors have exciting applications as logic or synaptic network for realizing e-skins or bionic brains. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. Emergence of a utopian vision of modernist and futuristic houses and cities in early 20th century

    NASA Astrophysics Data System (ADS)

    Ma, Nan

    2017-04-01

    Throughout the development of literature on urban design theories, utopian thinking has played a crucial role as utopians were among the first designers. Many unrealized utopian projects such as The Radiant City, have presented a research laboratory and positive attempts for all architects, urban designers and theorists. In this essay, a utopian vision following under More’s and Jameson’s definitions is discussed, examining how the utopian vision of modernist and futuristic houses and cities emerged in the early twentieth century in response to several factors, what urban utopia aimed to represent, and how such version was represented in the built form and the urban landscapes.

  7. Aerodynamic Design of Integrated Propulsion-Airframe Configuration of the Hybrid Wing-Body Aircraft

    NASA Technical Reports Server (NTRS)

    Liou, May-Fun; Kim, Hyoungjin; Lee, B. J.; Liou, Meng-Sing

    2017-01-01

    Hybrid Wing Body (HWB) aircraft is characterized by a flattened and airfoil-shaped body, which produces a substantial portion of the total lift. The body form is composed of distinct and separate wing structures, though the wings are smoothly blended into the body. This concept has been studied widely and results suggest remarkable performance improvements over the conventional tube and wing transport1,2. HWB incorporates design features from both a futuristic fuselage and flying wing design, which houses most of the crew, payload and equipment inside the main centerbody structure.

  8. Cities of the future-bionic systems of new urban environment.

    PubMed

    Krzemińska, Alicja Edyta; Zaręba, Anna Danuta; Dzikowska, Anna; Jarosz, Katarzyna Rozalia

    2017-12-07

    The concepts of the cities we know nowadays, and which we are accustomed to, change at a very rapid pace. The philosophy of their design is also changing. It will base on new standards, entering a completely different, futuristic dimension. This stage is related to changes in the perception of space, location and lack of belonging to definite, national or cultural structures. Cities of the future are cities primarily intelligent, zero-energetic, zero-waste, environmentally sustainable, self-sufficient in terms of both organic food production and symbiosis between the environment and industry. New cities will be able to have new organisational structures-either city states, or, apolitical, jigsaw-like structures that can change their position-like in the case of the city of Artisanopolis, designed as a floating city, close to the land, reminiscent of the legendary Atlantis. This paper is focused on the main issues connected with problems of the contemporary city planning. The purpose of the research was to identify existing technological solutions, whose aim is to use solar energy and urban greenery. The studies were based on literature related to future city development issues and futuristic projects of the architects and city planners. In the paper, the following issues have been verified: futuristic cities and districts, and original bionic buildings, both residential and industrial. The results of the analysis have been presented in a tabular form.

  9. It's All in the Eyes: The eyes as a window to the body and brain may not be a brand-new idea - but it is a newly revitalized one, thanks to improved technologies.

    PubMed

    Fischer, Shannon

    2015-01-01

    In a blog post in January 2014, Google unveiled one of its latest forays into the health market?a smart contact lens for diabetics. It was sleek and appealingly futuristic, with a minute microchip equipped with tiny glucose sensors, embedded in a soft, biocompatible lens material. Already, the company said, the prototype could measure tear glucose as often as once per second, and it may someday include tiny LED lights to signal warnings to the wearers when their blood sugar rises or falls to dangerous levels.

  10. Intelligent robot trends and predictions for the new millennium

    NASA Astrophysics Data System (ADS)

    Hall, Ernest L.; Mundhenk, Terrell N.

    1999-08-01

    An intelligent robot is a remarkably useful combination of a manipulator, sensors and controls. The current use of these machines in outer space, medicine, hazardous materials, defense applications and industry is being pursued with vigor but little funding. In factory automation such robotics machines can improve productivity, increase product quality and improve competitiveness. The computer and the robot have both been developed during recent times. The intelligent robot combines both technologies and requires a thorough understanding and knowledge of mechatronics. In honor of the new millennium, this paper will present a discussion of futuristic trends and predictions. However, in keeping with technical tradition, a new technique for 'Follow the Leader' will also be presented in the hope of it becoming a new, useful and non-obvious technique.

  11. Electric cadavers, 'metiphor,' and other medical software marvels.

    PubMed

    Weiss, M

    1991-04-01

    "Grateful Med," "Fluids," "Metiphor," virtual reality, and electric cadavers are just some of the programs and buzzwords in the futuristic world of medical software affecting many areas of health care.

  12. A Futuristic Alternative: Campus Fitness Programming.

    ERIC Educational Resources Information Center

    Mueller, C. E.; Oatey, Jennifer Sue

    1980-01-01

    The components of a prescription physical fitness program include a physical examination, fitness and dietary assessment, consultations to determine the fitness and diet prescriptions, instructional sessions, and periodic reviews of the individual's prescription. (CJ)

  13. Computers and the landscape

    Treesearch

    Gary H. Elsner

    1979-01-01

    Computers can analyze and help to plan the visual aspects of large wildland landscapes. This paper categorizes and explains current computer methods available. It also contains a futuristic dialogue between a landscape architect and a computer.

  14. Science Fiction across the Curriculum.

    ERIC Educational Resources Information Center

    Kay, Andrew L.; Golden, Michael

    1991-01-01

    Presents ideas on integrating science fiction into language arts, science, social studies, and math. Suggestions include an interstellar journey, imaginative language lessons, futuristic social studies, extraterrestrial life studies, intergalactic math, and science fiction story writing. (SM)

  15. What Futurists Believe: Implications for Home Economists.

    ERIC Educational Resources Information Center

    Berenbaum, Shawna

    1992-01-01

    The challenges that the future will present to the home economist will be many. Technological, scientific, economic, environmental, climatic, social, political, institutional, and personal pressures will cause changes that will be favorable and unfavorable. (JOW)

  16. Polygamy: A Futuristic Family Arrangement among African Americans

    ERIC Educational Resources Information Center

    Scott, Joseph W.

    1976-01-01

    Using the case study approach which permits indepth analysis of the emergence, the maintenance and change of family relationships, it is found that one adaptation associated with one parent families is polygamy. (Author/AM)

  17. Help Create the Future by Becoming a Part-Time Futurist.

    ERIC Educational Resources Information Center

    Cufaude, Jeffrey; Richard, Ron, Illus.

    2002-01-01

    Describes core practices of planning for the future that can be employed by college union staffs: assessing one's outlook, environmental scanning, scenarios planning, broadening perspectives, searching for opportunities, and continuously innovating. (EV)

  18. Activism in Concrete: Student Union, San Francisco State University

    ERIC Educational Resources Information Center

    Progressive Architecture, 1978

    1978-01-01

    The San Francisco State University Student Union is a futurist design of two steel space-frame pyramids. Each contains a stairway leading to four partial floors that diminish in size as the pyramid tapers. (Author/MLF)

  19. Tether Impact Rate Simulation and Prediction with Orbiting Satellites

    NASA Technical Reports Server (NTRS)

    Harrison, Jim

    2002-01-01

    Space elevators and other large space structures have been studied and proposed as worthwhile by futuristic space planners for at least a couple of decades. In June 1999 the Marshall Space Flight Center sponsored a Space Elevator workshop in Huntsville, Alabama, to bring together technical experts and advanced planners to discuss the current status and to define the magnitude of the technical and programmatic problems connected with the development of these massive space systems. One obvious problem that was identified, although not for the first time, were the collision probabilities between space elevators and orbital debris. Debate and uncertainty presently exist about the extent of the threat to these large structures, one in this study as large in size as a space elevator. We have tentatively concluded that orbital debris although a major concern not sufficient justification to curtail the study and development of futuristic new millennium concepts like the space elevators.

  20. Futuristic isotope hydrology in the Gulf region

    NASA Astrophysics Data System (ADS)

    Saravana Kumar, U.; Hadi, Khaled

    2018-03-01

    The Gulf region is one of the most water-stressed parts in the world. Water in the region is very scarce, shortage of supply and lacking of renewable water resources, while the demand for water is growing day by day. It is thus essential to implement modern approaches and technologies in addressing water-related issues. In this context, isotope hydrology will provide invaluable aid. Some of the most important areas of futuristic applications of isotope hydrology include evaluation of aquifer recharge, storage and their recovery system, understanding of dynamic changes due to long-term exploitation of the groundwater, development and management of shared groundwater aquifers, fresh groundwater discharge along the Arabian Gulf, identification and quantification of hydrocarbon contamination in groundwater; soil moisture and solute movement in unsaturated zone, paleoclimate reconstruction, etc. Literature survey suggests, in general, not many isotope studies on the above have been reported.

  1. Global Public Leadership in a Technological Era

    ERIC Educational Resources Information Center

    Masciulli, Joseph

    2011-01-01

    Good (ethical and effective) global public leadership--by national politicians, intergovernmental and nongovernmental international organizational leaders, multinational corporate leaders, and technoscientists--will make a significant positive difference in our global system's capacity to solve contemporary and futuristic global problems. High…

  2. Agronomic improvements can make future cereal systems in South Asia far more productive and result in a lower environmental footprint.

    PubMed

    Ladha, Jagdish Kumar; Rao, Adusumilli Narayana; Raman, Anitha K; Padre, Agnes Tirol; Dobermann, Achim; Gathala, Mahesh; Kumar, Virender; Saharawat, Yashpal; Sharma, Sheetal; Piepho, Hans Peter; Alam, Md Mursedul; Liak, Ranjan; Rajendran, Ramasamy; Reddy, Chinnagangannagari Kesava; Parsad, Rajender; Sharma, Parbodh C; Singh, Sati Shankar; Saha, Abhijit; Noor, Shamsoon

    2016-03-01

    South Asian countries will have to double their food production by 2050 while using resources more efficiently and minimizing environmental problems. Transformative management approaches and technology solutions will be required in the major grain-producing areas that provide the basis for future food and nutrition security. This study was conducted in four locations representing major food production systems of densely populated regions of South Asia. Novel production-scale research platforms were established to assess and optimize three futuristic cropping systems and management scenarios (S2, S3, S4) in comparison with current management (S1). With best agronomic management practices (BMPs), including conservation agriculture (CA) and cropping system diversification, the productivity of rice- and wheat-based cropping systems of South Asia increased substantially, whereas the global warming potential intensity (GWPi) decreased. Positive economic returns and less use of water, labor, nitrogen, and fossil fuel energy per unit food produced were achieved. In comparison with S1, S4, in which BMPs, CA and crop diversification were implemented in the most integrated manner, achieved 54% higher grain energy yield with a 104% increase in economic returns, 35% lower total water input, and a 43% lower GWPi. Conservation agriculture practices were most suitable for intensifying as well as diversifying wheat-rice rotations, but less so for rice-rice systems. This finding also highlights the need for characterizing areas suitable for CA and subsequent technology targeting. A comprehensive baseline dataset generated in this study will allow the prediction of extending benefits to a larger scale. © 2015 John Wiley & Sons Ltd.

  3. Artful Biology Projects

    ERIC Educational Resources Information Center

    Hall, Megan

    2005-01-01

    While teaching science in an alternative arts high school, the author continuously addresses the challenge of welcoming creative, right-brained students into the world of systematic inquiry. Busily mixing paint colors, choreographing futuristic dances, performing comedic theater, and practicing the banjo, the students rarely initiate authentic…

  4. Electronic Toll And Traffic Management Systems, National Cooperative Highway Research Program Synthesis

    DOT National Transportation Integrated Search

    1993-01-01

    ELECTRONIC TOLL COLLECTION OR ETC AND TRAFFIC MANAGEMENT OR ETTM, AUTOMATIC VEHICLE IDENTIFICATION OR AVI : ELECTRONIC TOLL COLLECTION AND TRAFFIC MANAGEMENT (ETTM) SYSTEMS ARE NOT A FUTURISTIC DREAM, THEY ARE OPERATING OR ARE BEING TESTED TODAY I...

  5. Environment in the 1990s.

    ERIC Educational Resources Information Center

    Goudie, Andrew

    1990-01-01

    Traces the history of futuristic predictions of environmental changes. Focuses on particular documents published on environmental change predictions. Identifies particular instances of environmental change, such as the rate of species loss and the greenhouse effect. Maintains that predictions of future environmental changes are fraught with…

  6. Sugarcane Diseases: Futuristic Management Strategies

    USDA-ARS?s Scientific Manuscript database

    Sugarcane pathology and disease control practices are changing due to social, economic and technological events. Sugarcane is becoming more important economically because of the increasing price and demand for sugar and its use for bio-energy. These pressures make the control of diseases more import...

  7. The role of pharmacogenetics and advances in gene therapy in the treatment of diabetic retinopathy.

    PubMed

    Agarwal, Aniruddha; Ingham, Sally A; Harkins, Keegan A; Do, Diana V; Nguyen, Quan Dong

    2016-02-01

    Diabetic retinopathy (DR) and its complications such as diabetic macular edema continue to remain a major cause for legal blindness in the developed world. While the introduction of anti-tVEGF agents has significantly improved visual outcomes of patients with DR, unpredictable response, largely due to genetic polymorphisms, appears to be a challenge with this therapy. With advances in identification of various genetic biomarkers, novel therapeutic strategies consisting of gene transfer are being developed and tested for patients with DR. Application of pharmacogenetic principles appears to be a promising futuristic strategy to attenuate diabetes-mediated retinal vasculopathy. In this comprehensive review, data from recent studies in the field of pharmacogenomics for the treatment of DR have been provided.

  8. Robotics in Colorectal Surgery

    PubMed Central

    Weaver, Allison; Steele, Scott

    2016-01-01

    Over the past few decades, robotic surgery has developed from a futuristic dream to a real, widely used technology. Today, robotic platforms are used for a range of procedures and have added a new facet to the development and implementation of minimally invasive surgeries. The potential advantages are enormous, but the current progress is impeded by high costs and limited technology. However, recent advances in haptic feedback systems and single-port surgical techniques demonstrate a clear role for robotics and are likely to improve surgical outcomes. Although robotic surgeries have become the gold standard for a number of procedures, the research in colorectal surgery is not definitive and more work needs to be done to prove its safety and efficacy to both surgeons and patients. PMID:27746895

  9. When Prophecy Fails

    ERIC Educational Resources Information Center

    Baggaley, Jon

    2013-01-01

    Inaccurate predictions about educational technology are discussed, and the tendency for them to go unchallenged. Their global generalizability is questionable when the expertise underlying them is restricted to local contexts or is unknown. The limitations of futuristic studies need to be stressed to prevent their conclusions from being applied…

  10. Helping DE Keep Pace with Changes in Marketing

    ERIC Educational Resources Information Center

    Patchen, Frank M.

    1974-01-01

    A futuristic outlook on changes in retail business and marketing is given. Distributive educational needs in developing a person in the fields of marketing, retailing and economics will increase along with the use of computers for research in the next ten or fifteen years. (DS)

  11. Site-specific management and delineating management zones

    USDA-ARS?s Scientific Manuscript database

    Precision agriculture has been envisioned by futurists for decades. The first Landsat satellite in 1972 caught the public’s eye because it was sold as a technological tool for monitoring and managing natural resources, which was viewed as a potential stepping stone for precision agriculture. Whethe...

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fornasiero, Francesco

    Aiming to protect soldiers from biological and chemical threats, a team of Lawrence Livermore National Laboratory scientists have created a material that is highly breathable yet protective from biological agents. This material is the first key component of futuristic smart uniforms that also will respond to and protect from environmental chemical hazards.

  13. Painting, Poetry, and Science.

    ERIC Educational Resources Information Center

    Seaman, David W.

    The first half of this document examines the relationships between painting, poetry, and science, describing in particular their increasing focus on letters and typography. The poets and painters of mid-nineteenth century France, the Futurist school, and the Lettrist movement are discussed. Their common assumption, fundamental to modern…

  14. The Second Century: Our Vision for the Future.

    ERIC Educational Resources Information Center

    Dickman, Donna M.; Levinson, Ken

    1990-01-01

    This paper speculates on the coming century's opportunities and challenges for the Alexander Graham Bell Association. Medical advancements prolonging life and the subsequent increase in the elderly population are discussed, as are computer and telecommunications advances. Futurists' predictions of increasing disposable income and social conscience…

  15. On Technology and Schools: A Conversation with Chris Dede.

    ERIC Educational Resources Information Center

    O'Neil, John

    1995-01-01

    According to futurist/educational technology expert Chris Dede, new technologies will revolutionize education only when used to support new models of teaching and learning. Grafting technological solutions onto antiquated structures and learning approaches is misguided. Sidebars explain schools' technology access problems and review Clifford…

  16. Blended Design Approach of Long Span Structure and Malay Traditional Architecture

    NASA Astrophysics Data System (ADS)

    Sundari, Titin

    2017-12-01

    The growing population in the world is so fast, which is followed by the increasing need of some new and large activities. Architects face the problem on how to facilitate buildings with various activities such as for large meeting, conference, indoors gymnasium and sports, and many others. The long span structure of building is one of the solutions to solve that problem. Generally, large buildings which implemented this structure will look as a technological, modern and futuristic ones or even neo futuristic performance. But on the other hand, many people still want to enjoy the specific and unique senses of local traditional architecture. So is the Malay people who want an easy pleasant large facilities which can be fulfilled by implementing modern long span building structure technology. In the same time, their unique sense of Malay traditional architecture can still be maintained. To overcome this double problems of design, it needs a blended design approach of long span structure and Malay Traditional Architecture.

  17. Local Area Networks and the Learning Lab of the Future.

    ERIC Educational Resources Information Center

    Ebersole, Dennis C.

    1987-01-01

    Considers educational applications of local area computer networks and discusses industry standards for design established by the International Standards Organization (ISO) and Institute of Electrical and Electronic Engineers (IEEE). A futuristic view of a learning laboratory using a local area network is presented. (Author/LRW)

  18. Future Horizons in Anthropology and Education: The View from 1976

    ERIC Educational Resources Information Center

    Textor, Robert B.

    1977-01-01

    The outgoing president of the Council on Anthropology and Education discusses "areas of substantive concern that our organization and field might wisely attempt to grow into." He focuses on cultural futuristics, global emphasis, macro approaches, quantitative methodology, political economy, dependency, exploitation, life-long and nonformal…

  19. The Second and Perhaps the First High School Science Course.

    ERIC Educational Resources Information Center

    Andersen, Hans O.

    1984-01-01

    Discusses reasons for the failure of the post-Sputnik science curricula and offers criteria for selecting relevant curriculum content, suggesting that these curricula focus on problem-solving. Lists seven problem areas (technological, environmental, empirical, historical, aesthetic, philosophical, and futuristic) with recommended topics for each…

  20. Charting Relationships in American Popular Film. Part II.

    ERIC Educational Resources Information Center

    Burke, Ken

    1998-01-01

    Explores the concept of genre evolution through the experimental, classic, refinement, and deconstructivist phases of American films. A series of detailed diagrams present a synthesis of influences and developments in the western, supercop, detective, gangster, futuristic science fiction, fantasy, outer space science fiction, horror, musical, and…

  1. Global Unemployment: Challenge to Futurists.

    ERIC Educational Resources Information Center

    Gross, Bertram; Singh, Kusum

    Creative actions toward preventing global unemployment seek to (1) uncover the painful realities of joblessness, (2) design better models for fruitful discourse and action, (3) climb the "commanding policy heights" of moral vision, (4) move from autocratic to democratic corporatism, (5) uncover the kind of information that may hold power…

  2. Communication in Globalized Markets: An Interdisciplinary Teaching Approach.

    ERIC Educational Resources Information Center

    Badaracco, Claire M.

    Futurists have predicted that in a globalized information economy, America's principal products will be education, publishing, the media, communications, management and administration, research and development, finance and insurance, and much of the work of the government. If this is so, academe will need to incorporate the realities of this…

  3. Alcohol Impaired University Professors: A Perspective.

    ERIC Educational Resources Information Center

    Caliguri, Joseph P.

    Drinking problems among college faculty are discussed, and selective information is presented about alcohol abuse, employee assistance programs, adulthood stages, and futuristic changes in U.S. society. The idea that work obsession and alcoholism can be linked for university professors who have a high need for achievement is discussed. Enabling…

  4. Educational Leadership: What Next?

    ERIC Educational Resources Information Center

    Cunningham, Luvern L.

    An examination of futurist literature showed that, in addition to traditional leadership skills, there are eight emerging skills vital to future leaders. Leaders of the future will have to focus on both future and present issues simultaneously by planning for various time frames, sensing the rates of change and communicating goals to followers,…

  5. Futuring for Future Ready Librarians

    ERIC Educational Resources Information Center

    Figueroa, Miguel A.

    2018-01-01

    Futurists and foresight professionals offer several guiding principles for thinking about the future. These principles can help people to think about the future and become more powerful players in shaping the preferred futures they want for themselves and their communities. The principles also fit in well as strategies to support the Future Ready…

  6. Presidents and Technology

    ERIC Educational Resources Information Center

    Ekman, Richard

    2005-01-01

    Almost everyone on campus today grasps the benefits of easy availability of information technology, but for college presidents, the expectations for information technology have been high from the early days. The grail in futurist dreams has been a machine that "thinks," using a very big base of information to sift evidence, make judgments, and…

  7. Futuristics for Today's Student: A Course Description.

    ERIC Educational Resources Information Center

    Aanestad, Naedine

    The humanities course described in this paper encourages high school students to examine alternatives for the future and to make decisions on the basis of the most desirable outcomes. Classroom instructional materials include films, sound and slide sets, film strips, tape recorders, a record player, and a television. Students participate in…

  8. US Army Executive Development

    DTIC Science & Technology

    1984-05-01

    Executive Education," Business Week, 8 March 1976, p. 79. 18. RETO, p. 111-5. 19. Agor , Weston H ., "Tomorrow’s Intuitive Leader," The Futurist, August...complex situations in which tomorrow’s leaders will need to make deci- sions, Weston Agor believes intuitive abilities will be increasingly important

  9. An Introduction to Tissue Engineering Using Hydrogels

    ERIC Educational Resources Information Center

    Ballyns, Jeffrey J.; Doran, Robert F.; Archer, Shivaun D.; Bonassar, Lawrence J.

    2011-01-01

    Biotechnology has often been a favorite topic in popular culture. While this has provided students with some introduction to the futuristic potential of biotechnology and biomedical sciences, it does not often translate to activities that will excite and stimulate them academically. In this article, the authors present a three-part classroom…

  10. BRICS and Clicks

    ERIC Educational Resources Information Center

    Bold, Mary; Chenoweth, Lillian; Garimella, Nirisha K.

    2008-01-01

    Projections for the global economy frequently center on the BRIC countries: Brazil, Russia, India, and China. As futurists and economists alike define and re-define both formal and informal coalitions (for example, by broadening the R in BRIC to include all Eastern European economies or instead re-directing the discussion to G-8 countries or to…

  11. Living and Learning in the Global Village.

    ERIC Educational Resources Information Center

    Burdenuk, Gene

    This paper discusses some of the promises and pitfalls confronting education in the Information Age. It explores the business motivation that drives the education agenda, examines what some futurists call "the end of the job," and identifies four themes that could help transform education as the millennium approaches. Critical literacy,…

  12. Teacher's Guide to the Future.

    ERIC Educational Resources Information Center

    Murphy, Elaine M.; Cancellier, Patricia

    1982-01-01

    A brief introduction to futures education, an annotated listing of resources, and three ready-to-use student activities are provided. The introduction discusses the benefits of futures education; for example, it encourages students to make responsible decisions about the future. Next, it lists a variety of techniques developed by futurists to…

  13. Co-Creating Nano-Imaginaries: Report of a Delphi-Exercise

    ERIC Educational Resources Information Center

    Deblonde, Marian; Van Oudheusden, Michiel; Evers, Johan; Goorden, Lieve

    2008-01-01

    In the first phase of the research project Nanotechnologies for Tomorrow's Society (www.nanosoc.be), the research consortium explored a variety of futuristic visions or technoscientific imaginaries. This exploration took the form of a Policy Delphi, adapted to the particular objective of jointly constructing nano-imaginaries, taking participants'…

  14. The Teaching Revolution: RTI, Technology, and Differentiation Transform Teaching for the 21st Century

    ERIC Educational Resources Information Center

    Bender, William N.; Waller, Laura

    2011-01-01

    "The Teaching Revolution" challenges educators to imagine schools the way they should be, with a "big picture" vision that includes student-driven curricula, interconnectivity, and targeted responsiveness to students' individual needs. The authors provide a futuristic and provocative discussion on combining three major instructional…

  15. Counseling Women for Their Complex Life Role

    ERIC Educational Resources Information Center

    Loeffler, Marcia

    1975-01-01

    Household Labor-saving devices and contraception innovations have given women new freedom to choose to have a career, marriage, children or a combination of these. Counseling personnel must assume a futuristic orientation in their therapeutic strategies, for women will continue to seek fulfillment from an increasing variety of individual…

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Illman, D.L.

    Green chemistry is an effort to change the very concept of efficiency as it is applied to industrial chemical processes, shifting the balance from an exclusive focus on yield to one that places economic value on minimizing or eliminating wasteful by-products. Judging from a week-long symposium on Design for the Environment: A New Paradigm for the 21st Century co-sponsored by the Division of Environmental Chemistry and the Committee on Environmental Improvement of the Chemical Society of Washington, the green movement is one that is gaining momentum and acceptance. Presentations ranged from futuristic visions of nanotechnology-based chemical manufacturing to prescriptions formore » reducing waste in today's chemical processes. Some schemes are still the stuff of dreams, while others have already been implemented. This paper summarizes the contents of this symposium.« less

  17. Designing a Futuristic Business Studies Curriculum

    ERIC Educational Resources Information Center

    Mei, Chiew Wye; Siraj, Saedah

    2013-01-01

    This paper is a discourse on the theoretical aspects underpinning the design of the Business Studies curriculum domain. It draws on recent shifts in the business and educational environment of Malaysia, and maps out the methodology and method for expanding and revamping the core ground of the discipline. Using the pragmatic worldview stance, this…

  18. Librarian as Futurist: Changing the Way Libraries Think about the Future

    ERIC Educational Resources Information Center

    Mathews, Brian

    2014-01-01

    Are librarians preoccupied with the future? There are countless books, articles, blog posts, webinars, and conference presentations filled with speculation about what libraries will become. This is understandable with the emergence of new roles for libraries and librarians as we determine our identity across the digital landscape. This essay…

  19. Futurism and Education: Some Perspectives for Global Educators. Occasional Papers Series, No. 3.

    ERIC Educational Resources Information Center

    Norris, Neal; Salomon, Manjula

    A working knowledge of futurist perspective is becoming essential to educators. While global education acquaints students with their responsibilities as members of a group extending beyond their personal and local boundaries, futurism awakens students to the interconnectedness of past, present, and future. Although debate exists over whether it is…

  20. A Crisis in Space--A Futuristic Simulation Using Creative Problem Solving.

    ERIC Educational Resources Information Center

    Clode, Linda

    1992-01-01

    An enrichment program developed for sixth-grade gifted students combined creative problem solving with future studies in a way that would simulate real life crisis problem solving. The program involved forecasting problems of the future requiring evacuation of Earth, assuming roles on a spaceship, and simulating crises as the spaceship traveled to…

  1. Managerial Effectiveness for a New Millennium in the Global Higher Education Sector.

    ERIC Educational Resources Information Center

    Drew, Glenys; Bensley, Leanne

    2001-01-01

    Discusses some of the new realities facing higher education organizations, particularly the realization that knowledge capital is the lifeline of an organization, and that therefore effective management of an organization's people is crucial. Draws on management and futurist theory to suggest some of the flexible arrangements needed to manage the…

  2. Student Discipline: Legal, Empirical, and Educational Perspectives.

    ERIC Educational Resources Information Center

    Harris, J. John, III, Ed.; Bennett, Christine, Ed.

    This book presents four perspectives on student discipline: legal and historical, empirical, educational, and futuristic. Part I examines the legal history of student discipline in papers by J. John Harris III, Richard E. Fields, and A. Reynaldo Contreras (Chapter 1); Richard E. Fields (Chapter 2); and David G. Carter, Sr. and Cynthia L. Jackson…

  3. Connections, the Newsletter of the Foothill-De Anza Community College District, 1997-1998.

    ERIC Educational Resources Information Center

    Connections, the Newsletter of the Foothill-De Anza Community College District, 1998

    1998-01-01

    This document presents a set of ten newsletters, entitled "Connections," published by the Foothill-De Anza Community College District from September 1997 through December 1998. The following articles appear in the newsletters: "Futurist Wolfe,""Local Success Fong," and "Fourth Annual Day at the 'Stick Is a Big…

  4. A Review on Making Things See: Augmented Reality for Futuristic Virtual Educator

    ERIC Educational Resources Information Center

    Iqbal, Javid; Sidhu, Manjit Singh

    2017-01-01

    In the past few years many choreographers have focused upon implementation of computer technology to enhance their artistic skills. Computer vision technology presents new methods for learning, instructing, developing, and assessing physical movements as well as provides scope to expand dance resources and rediscover the learning process. This…

  5. Toward a World Set Free: The Vision of H. G. Wells.

    ERIC Educational Resources Information Center

    Wagar, W. Warren

    1983-01-01

    H. G. Wells is not quite the household name that he deserves to be, even in the households of futurists. Visions of the future in his writing and his attempts to translate these visions into reality through his work for socialism and the League of Nations are discussed. (SR)

  6. Futures Unlimited: Teaching About Worlds to Come. Bulletin 59.

    ERIC Educational Resources Information Center

    Fitch, Robert M.; Svengalis, Cordell, M.

    A theoretical framework and suggestions for teaching about the future at the secondary level are presented. Seven chapters comprise the document. Chapter I examines the nature of and approach to futurism and explores ideas of European and American futurists. Chapter II presents a rationale, characteristics of futures education, outlines of courses…

  7. Ecofutures in Africa: Jenny Robson's "Savannah 2116 AD"

    ERIC Educational Resources Information Center

    Cloete, Elsie

    2009-01-01

    Jenny Robson's "Savannah 2216 AD", a dark, futuristic novel for young adults, provides a strong critique on much of the world's predilection for saving Africa's animals at the expense of those human communities who are perceived to be in the way of the preservation of the continent's remaining wild spaces. Using Robson's novel as…

  8. Sherlock Holmes Meets the 21st Century.

    ERIC Educational Resources Information Center

    Flack, Jerry

    1991-01-01

    Mystery literature is proposed as a component of futures studies curriculum for gifted students. The article describes similarities between the behaviors of a detective and a critical thinker, the tools of futurists such as the futures wheel, and the use of such topics as computer crime and extraterrestrial life to challenge students' thinking…

  9. Campus Technology Innovators Awards 2011: Technology All-Stars

    ERIC Educational Resources Information Center

    Lloyd, Meg; Raths, David

    2011-01-01

    Out of a total of 393 entries for the 2011 Campus Technology Innovators award, 10 winners rose to the top in six categories: (1) Leadership, Governance, and Policy; (2) Teaching and Learning; (3) Student Systems and Services; (4) Administrative Systems; (5) IT Infrastructure and Systems; and (6) Education Futurists. These innovative IT leaders…

  10. Sixteen Trends...Their Profound Impact on Our Future

    ERIC Educational Resources Information Center

    Marx, Gary

    2011-01-01

    Seismic Shifts. Future Forces. Call them whatever you'd like. The Sixteen Trends revealed in this benchmark book will have a profound impact on our future. Noted futurist, educator, communicator, executive and leadership counsel, author, and international speaker Gary Marx makes the case for those trends and speculates on their implications for…

  11. Proceedings ERIC/CAPS at WACES: A Futuristic Look at Guidance and Counselor Education.

    ERIC Educational Resources Information Center

    ERIC Clearinghouse on Counseling and Personnel Services, Ann Arbor, MI.

    Conclusions reached in the WACES study on the adoption of innovations are presented. In general for counselor educators there was a negative correlation between being an innovative adopter and having many administrative responsibilities. The relationship between adoption of innovations and department size and climate is also examined. Twenty-five…

  12. Speak Out and Touch Someone. The OMLTA Yearbook, 1983.

    ERIC Educational Resources Information Center

    Snyder, Barbara, Ed.

    A number of topics of interest to secondary school foreign language teachers are discussed in this issue. The following articles are included: (1) "Teaching and Learning a Foreign Language via Tele(Video)phone: A Futuristic Mini-Computer Design," by G. Harewood; (2) "Meeting Students' Communication Needs," by B. Marckel and "Functional/Notional…

  13. Here Comes the Future.

    ERIC Educational Resources Information Center

    Reeder, Robert; And Others

    This teacher's guide introduces students to problems and potentials of the future in an effort to prepare them for life in the 21st century. Based on an interdisciplinary approach, the lesson plans within four major units represent five futuristic trends and assumptions: (1) the shift of emphasis from subject matter to conceptual frameworks; (2)…

  14. Improved Throughput with Cooperating Futuristic Airspace Management Components

    NASA Technical Reports Server (NTRS)

    Glaab, Patricia C.

    2013-01-01

    An experiment was conducted to integrate airspace management tools that would typically be confined to either the en route or the terminal airspace to explore the potential benefits of their communication to improve arrival capacity. A NAS-wide simulation was configured with a new concept component that used the information to reconfigure the terminal airspace to the capacity benefit of the airport. Reconfiguration included a dynamically expanding and contracting TRACON area and a varying number of active arrival runways, both automatically selected to accommodate predicted volume of traffic. ATL and DFW were selected for the study. Results showed significant throughput increase for scenarios that are considered to be over-capacity for current day airport configurations. During periods of sustained demand for ATL 2018, throughput increased by 26 operations per hour (30%) and average delay was reduced from 18 minutes to 8 minutes per flight when using the dynamic TRACON. Similar results were obtained for DFW with 2018 traffic levels and for ATL with 2006 traffic levels, but with lower benefits due to lower demand.

  15. A Futuristic View of the REI: A Response to Jenkins, Pious, and Jewell.

    ERIC Educational Resources Information Center

    Thousand, Jacqueline S.; Villa, Richard A.

    1991-01-01

    This commentary on an earlier paper (EC 230 267) notes that the debate on the regular education initiative (REI) should focus on the future, teachers should become personalizers of curriculum and instruction, classroom teachers are one member of an interdependent teaching team, and an adhocracy should be developed among educators of all…

  16. Teaching Societal and Ethical Implications of Nanotechnology to Engineering Students through Science Fiction

    ERIC Educational Resources Information Center

    Berne, Rosalyn W.; Schummer, Joachim

    2005-01-01

    Societal and ethical implications of nanotechnology have become a hot topic of public debates in many countries because both revolutionary changes and strong public concerns are expected from its development. Because nanotechnology is, at this point, mostly articulated in visionary and futuristic terms, it is difficult to apply standard methods of…

  17. A framework for developing foresight in natural resource management

    Treesearch

    Kay E. Strong

    2012-01-01

    This paper describes a fundamental framework for anticipating and influencing the future that has been used to prepare professional futurists at the University of Houston for more than 35 years. The overview of the framework addresses how futures researchers organize information about changes in the world (e.g., by defining the domain, or scope, of the forecasting...

  18. Futures Information Interchange Newsletter; Volume 3, Number 2 and 3, December 1974 and April 1975.

    ERIC Educational Resources Information Center

    Massachusetts Univ., Amherst. School of Education.

    The Futures Information Interchange Newsletters (No. 2 and 3) include a collection of practical teaching methods and learning activities for introducing future studies in the elementary and secondary classroom. Two lead articles offer new insights into future studies. In "Dilemmas of a Futurist" Fran Koster discusses some of the stresses unique to…

  19. Futuristics and Education: An ASCD Task Force Report. Professional Paper, 1979-1.

    ERIC Educational Resources Information Center

    Van Avery, Dennis; And Others

    Educational needs for the future are discussed, particularly in light of how members of the Association for Supervision and Curriculum Development (ASCD) can help students prepare for the future. The document is presented in six chapters. Chapter I presents an overview of ASCD's long range school and educational plans. Chapter II defines key…

  20. Air Force Research Laboratory Technology Milestones 2008

    DTIC Science & Technology

    2008-01-01

    futuristic ‘bots will possess self - healing properties as well, enhancing their resiliency to damage sustained during such missions. Leading the SuperBot...Matrix Composites Pollution Prevention Materials Polymeric Materials Power and Chemical Processes Quantitative Defect Characterization Robotics ...advanced self -sealing CMC manufactured by French company Snecma Propulsion Solide (SPS). Thus far, the seals have performed extremely well, and a

  1. Fuel Cell Technology and Its Importance to Society

    ERIC Educational Resources Information Center

    Hudak, Glenn A.

    2005-01-01

    Fuel cells may seem like a science fiction fantasy to many people, since they are an efficient and nonpolluting power source producing little noise and having no moving parts. But this futuristic energy source not only exists, it has played a key role in providing electricity on spacecraft since the 1960s. Currently, technologists are developing…

  2. Technology and Society: A Futuristic Perspective. [Student's Guide.] Preparing for Tomorrow's World.

    ERIC Educational Resources Information Center

    Iozzi, Louis A.; And Others

    This module is designed to provide students (grades 10-11) with experiences in examining how technology has changed our lives and in anticipating future changes. The module is divided into three sections. Role-playing simulations and readings are used in section 1 to examine the dynamic relationship between science/technology/society. Five…

  3. Why People Don't Listen to Warnings: With Discussion of Implications for Futurists.

    ERIC Educational Resources Information Center

    Koster, Fran

    The document reviews recent literature on warning processes, evaluates the effectiveness of warnings in changing public policy and personal behavior, and applies warning literature to specific problem areas. Warning is interpreted to include a statement of the problem and a proposed course of action. The document is presented in six parts. Part…

  4. Realizing the Promise of 21st-Century Education: An Owner's Manual

    ERIC Educational Resources Information Center

    Joyce, Bruce; Calhoun, Emily

    2012-01-01

    While many futurists tout the value of teaching students 21st-century skills, bridging the concept with the practice is best accomplished by professional educators. Authors Bruce Joyce and Emily Calhoun know how to actualize the critical reforms that enable schools to prepare students for today's workforce. They outline a clear vision for…

  5. Breathable ‘Second Skin’ for Smart Uniforms

    ScienceCinema

    Fornasiero, Francesco

    2018-01-16

    Aiming to protect soldiers from biological and chemical threats, a team of Lawrence Livermore National Laboratory scientists have created a material that is highly breathable yet protective from biological agents. This material is the first key component of futuristic smart uniforms that also will respond to and protect from environmental chemical hazards.

  6. Safe and Autonomous Drones for Urban Flight

    NASA Technical Reports Server (NTRS)

    Krishnakumar, Kalmanje

    2016-01-01

    Autonomous vehicles are no longer futuristic technology; in fact, there are already cars with self-driving features on the road. Over the next five years, the connected vehicles will disrupt the entire automotive and UAS ecosystems. The industry will undergo fundamental change as semi-autonomous driving and flying emerges, followed by an eventual shift to full autonomy.

  7. "No Child Left Untested [sic]" Battle or Battle Cry Guiding Research and Practice? Making Research User-Friendly.

    ERIC Educational Resources Information Center

    Hough, David L.

    2003-01-01

    Critiques five articles from an online research journal in middle-level education on mathematical problem solving, social inclusion of students with disabilities in physical education, school and dispositional aggression among middle school boys, problem-based learning, and students' views of futuristics. Asserts that embracing the view that all…

  8. Faces of the Future: School Counselors as Cultural Mediators

    ERIC Educational Resources Information Center

    Portman, Tarrell Awe Agahe

    2009-01-01

    Twenty years ago, futurists examined the changing role of the school counselor and forecasted what the 21st-century school counselor would need to know. This article forecasts the future of school counseling in the next 20 years by focusing on expected diversity of K-12 students. Speculation on student enrollment based on projected trends and…

  9. Educating for the Future in Family Life. Information Series No. 228.

    ERIC Educational Resources Information Center

    Simpson, Elizabeth J.

    This paper utilizes knowledge gained from work on future issues related to families, the work of futurists on social trends and technological development, and recent studies in home economics to draw conclusions regarding what people will need to know in the 1980s and beyond to be intelligent consumers and effective homemakers. The first of six…

  10. Consuming in the 80's and Beyond.

    ERIC Educational Resources Information Center

    Texas Tech Univ., Lubbock. Home Economics Curriculum Center.

    This guide is designed to give advanced or upper-level consumer and homemaking education students a chance to take a futuristic look at the roles they will have as consumers in the next years. Divided into 12 units, the first three cover the consumer, the family, and consumer responsibilities. The next eight units are on the goods and services…

  11. The Future of Education: Not All We Hoped, or Had Hyped

    ERIC Educational Resources Information Center

    Hardy, Lawrence

    2005-01-01

    Thirty years ago, at the close of the tumultuous 1960s, futurist Alvin Toffler wrote a bestseller, "Future Shock," which warned of the effects of accelerating change, or what Toffler described as "the dizzying disorientation brought on by the premature arrival of the future." In the section of the book which was on education,…

  12. Waste derived bioeconomy in India: A perspective.

    PubMed

    S, Venkata Mohan; P, Chiranjeevi; Dahiya, Shikha; A, Naresh Kumar

    2018-01-25

    Environmental and climatic change issues, population explosion, rapid urbanisation, depletion of fossil reserves, need for energy security, huge waste generation, etc. are some of the inherent issues associated with the fossil based linear economy which need greater attention. In this context, the world is gradually transforming from fossil-based economy to a sustainable circular bio-economy. The biogenic waste which is generated in enormous quanties in India can be considered as potential feedstock for structuring the bio-based economy. This communication depicts the need for developing waste derived bioeconomy in the Indian perspective. Waste is now being perceived as a resource with value and believed to supplement petroleum feedstock to a great extent if properly utilized. The necessity to introduce waste as the core element for the future economic models which also allows sustainable development is discussed. The review also establishes drivers for the bioeconomy and structures the waste derived bioeconomy in a sustainable format to address the futuristic needs, scope and opportunities envisaged in the business and economic realm. The enabling technologies/processes that can be applied for biogenic wastes valorisation are elaborated. Circularizing the economy in a waste biorefinery model for the production of biobased products including bioenergy is discussed. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Strategic planning futurists need to be capitation-specific and epidemiological.

    PubMed

    Kurtenbach, J; Warmoth, T

    1995-09-01

    Strategic planning has always been a proposition of envisioning an organization's future state, then working backward, quarter by quarter, year by year, to plot a course of action. The surer the vision, the surer the course. In our burgeoning capitated environment, the successful provider will clarify a singular vision: to manage health care for a defined population. The key will be to understand the changing needs of covered lives and to prepare the organization to serve those needs. Gone are the days when mere responsiveness to market needs and preferences could secure a hospital's competitive advantage. Nimble, surefooted, practically clairvoyant--the emerging health care leader will listen to reliable epidemiologic information and custom-design its future. Timing is everything. Depending only your market's readiness for capitation, epidemiologic research and planning techniques may not prove critical to your organization for five to seven years. Good thing, too, because a few years may be just the head start many hospitals and health care systems need. Now is the time to lay the groundwork, to cultivate new planning techniques that will work under capitation, and to jettison any outdated modes of strategic thinking. Assemble all the talent and knowledge you need, then give your best minds ample room to do their work.

  14. From Digital Natives to Digital Wisdom: Hopeful Essays for 21st Century Learning

    ERIC Educational Resources Information Center

    Prensky, Marc

    2012-01-01

    What can you learn on a cell phone? Almost anything! How does that concept fit with our traditional system of education? It doesn't. Best-selling author and futurist Marc Prensky's book of essays challenges educators to "reboot" and make the changes necessary to prepare students for 21st century careers. His "bottom-up" vision is based on…

  15. Program Formats, Vehicles, and Characters for Junior High School Audiences. Satellite Technology Demonstration, Technical Report No. 0509.

    ERIC Educational Resources Information Center

    Connolly, A. J.; Lonsdale, Helen C.

    The "Time Out" series designed by the Satellite Technology Demonstration (STD) used a variety of formats, vehicles, and characters to explain career concepts to junior high school students. A science fiction set with a futuristic approach, called the Time Control Center (TCC) used vehicles to move forward and backward in time to access a…

  16. Futuristic Exercises. A Workbook on Emerging Lifestyles and Careers in the 21st Century and Beyond.

    ERIC Educational Resources Information Center

    Feingold, S. Norman

    This workbook, which is intended to be used in conjunction with the handbook entitled "New Emerging Careers: Today, Tomorrow, and in the 21st Century," contains exercises designed to help individuals or groups of people envision future careers, life-styles, and jobs and their significance to workers and society. Chapter 1 introduces the workbook.…

  17. Projecting Agricultural Education Programs for the 21st Century Using a Modified Delphi Technique.

    ERIC Educational Resources Information Center

    Iverson, Maynard J.

    A modified three-step Delphi procedure was used to conduct a series of national studies of futurists regarded by their peers as top experts in agricultural education. The primary objective was to project enrollments in agricultural education programs for the 21st century. Other study objectives were to ascertain whether the Delphi technique could…

  18. Technology assessment of space stations

    NASA Technical Reports Server (NTRS)

    Coates, V. T.

    1971-01-01

    The social impacts, both beneficial and detrimental, which can be expected from a system of space stations operating over relatively long periods of time in Earth orbit, are examined. The survey is an exercise in technology assessment. It is futuristic in nature. It anticipates technological applications which are still in the planning stage, and many of the conclusions are highly speculative and for this reason controversial.

  19. Rights and Responsibilities--A Look Ahead. Proceedings of the Annual Meeting of the Western Gerontological Society (23rd Denver, Colorado).

    ERIC Educational Resources Information Center

    Peck, Julie L., Ed.

    In major presentations in these proceedings, national leaders discuss futuristic ideas about aging. An awareness of the present and future rights and responsibilities of older persons and the personnel working with them is developed in the variety of topics presented. Topics include: current practices, education, housing, law, creative life…

  20. Post-War Regional Planning - The French Silicon Valley

    DTIC Science & Technology

    1989-01-01

    communications network. In fact, it could be said that L’Is!e d’Abeau is the pilot town of a new futuristic urbanisation . Secondly, L’Isle d’Abeau acts as a...inhabitants, with an annual growth rate of 0.13%5. Even taking into account the transfer of urbanisation to beyond the agglomeration, this growth is still

  1. Designing Futuristic Nursing Programs. Highlights of the Workshop, Chiefs, Nursing Service (Bethesda, Maryland, November 10-14, 1975).

    ERIC Educational Resources Information Center

    Veterans Administration, Washington, DC. Dept. of Medicine and Surgery.

    Major contents of this report are the four major presentations made at a workshop designed to give 200 nursing service chiefs a uniform approach for upgrading and expanding skills and knowledge relevant to achieving the mission of the Veterans Administration (VA) Nursing Service. "Facing the Future" focuses on the VA Nursing Service as…

  2. Spatio-Temporal Variation and Futuristic Emission Scenario of Ambient Nitrogen Dioxide over an Urban Area of Eastern India Using GIS and Coupled AERMOD-WRF Model.

    PubMed

    Dey, Sharadia; Gupta, Srimanta; Sibanda, Precious; Chakraborty, Arun

    2017-01-01

    The present study focuses on the spatio-temporal variation of nitrogen dioxide (NO2) during June 2013 to May 2015 and its futuristic emission scenario over an urban area (Durgapur) of eastern India. The concentration of ambient NO2 shows seasonal as well as site specific characteristics. The site with high vehicular density (Muchipara) shows highest NO2 concentration followed by industrial site (DVC- DTPS Colony) and the residential site (B Zone), respectively. The seasonal variation of ambient NO2 over the study area is portrayed by means of Geographical Information System based Digital Elevation Model. Out of the total urban area under consideration (114.982 km2), the concentration of NO2 exceeded the National Ambient Air Quality Standard (NAAQS) permissible limit over an area of 5.000 km2, 0.786 km2 and 0.653 km2 in post monsoon, winter and pre monsoon, respectively. Wind rose diagrams, correlation and regression analyses show that meteorology plays a crucial role in dilution and dispersion of NO2 near the earth's surface. Principal component analysis identifies vehicular source as the major source of NO2 in all the seasons over the urban region. Coupled AMS/EPA Regulatory Model (AERMOD)-Weather Research and Forecasting (WRF) model is used for predicting the concentration of NO2. Comparison of the observed and simulated data shows that the model overestimates the concentration of NO2 in all the seasons (except winter). The results show that coupled AERMOD-WRF model can overcome the unavailability of hourly surface as well as upper air meteorological data required for predicting the pollutant concentration, but improvement of emission inventory along with better understanding of the sinks and sources of ambient NO2 is essential for capturing the more realistic scenario.

  3. Spatio-Temporal Variation and Futuristic Emission Scenario of Ambient Nitrogen Dioxide over an Urban Area of Eastern India Using GIS and Coupled AERMOD–WRF Model

    PubMed Central

    Dey, Sharadia; Gupta, Srimanta; Sibanda, Precious; Chakraborty, Arun

    2017-01-01

    The present study focuses on the spatio-temporal variation of nitrogen dioxide (NO2) during June 2013 to May 2015 and its futuristic emission scenario over an urban area (Durgapur) of eastern India. The concentration of ambient NO2 shows seasonal as well as site specific characteristics. The site with high vehicular density (Muchipara) shows highest NO2 concentration followed by industrial site (DVC- DTPS Colony) and the residential site (B Zone), respectively. The seasonal variation of ambient NO2 over the study area is portrayed by means of Geographical Information System based Digital Elevation Model. Out of the total urban area under consideration (114.982 km2), the concentration of NO2 exceeded the National Ambient Air Quality Standard (NAAQS) permissible limit over an area of 5.000 km2, 0.786 km2 and 0.653 km2 in post monsoon, winter and pre monsoon, respectively. Wind rose diagrams, correlation and regression analyses show that meteorology plays a crucial role in dilution and dispersion of NO2 near the earth’s surface. Principal component analysis identifies vehicular source as the major source of NO2 in all the seasons over the urban region. Coupled AMS/EPA Regulatory Model (AERMOD)–Weather Research and Forecasting (WRF) model is used for predicting the concentration of NO2. Comparison of the observed and simulated data shows that the model overestimates the concentration of NO2 in all the seasons (except winter). The results show that coupled AERMOD–WRF model can overcome the unavailability of hourly surface as well as upper air meteorological data required for predicting the pollutant concentration, but improvement of emission inventory along with better understanding of the sinks and sources of ambient NO2 is essential for capturing the more realistic scenario. PMID:28141866

  4. The evolution of recombinant thrombolytics: Current status and future directions

    PubMed Central

    Adivitiya; Khasa, Yogender Pal

    2017-01-01

    ABSTRACT Cardiovascular disorders are on the rise worldwide due to alcohol abuse, obesity, hypertension, raised blood lipids, diabetes and age-related risks. The use of classical antiplatelet and anticoagulant therapies combined with surgical intervention helped to clear blood clots during the inceptive years. However, the discovery of streptokinase and urokinase ushered the way of using these enzymes as thrombolytic agents to degrade the fibrin network with an issue of systemic hemorrhage. The development of second generation plasminogen activators like anistreplase and tissue plasminogen activator partially controlled this problem. The third generation molecules, majorly t-PA variants, showed desirable properties of improved stability, safety and efficacy with enhanced fibrin specificity. Plasmin variants are produced as direct fibrinolytic agents as a futuristic approach with targeted delivery of these drugs using liposome technlogy. The novel molecules from microbial, plant and animal origin present the future of direct thrombolytics due to their safety and ease of administration. PMID:27696935

  5. Future Evolution of Virtual Worlds as Communication Environments

    NASA Astrophysics Data System (ADS)

    Prisco, Giulio

    Extensive experience creating locations and activities inside virtual worlds provides the basis for contemplating their future. Users of virtual worlds are diverse in their goals for these online environments; for example, immersionists want them to be alternative realities disconnected from real life, whereas augmentationists want them to be communication media supporting real-life activities. As the technology improves, the diversity of virtual worlds will increase along with their significance. Many will incorporate more advanced virtual reality, or serve as major media for long-distance collaboration, or become the venues for futurist social movements. Key issues are how people can create their own virtual worlds, travel across worlds, and experience a variety of multimedia immersive environments. This chapter concludes by noting the view among some computer scientists that future technologies will permit uploading human personalities to artificial intelligence avatars, thereby enhancing human beings and rendering the virtual worlds entirely real.

  6. Public Policy and the Next Generation of Farmers, Ranchers, Producers, and Agribusiness Leaders.

    PubMed

    Gasperini, Frank A

    2017-01-01

    The emerging, next generation of people engaged as managers in agriculture differs from the "baby boomer" farm generation that relishes certain traditions and an agrarian lifestyle. These futuristic producers and managers have been raised in a society that promulgates safety environment rules. They have witnessed lives saved by automobile seatbelts and lives improved from clean air and water. They know the basic cost of effective safety compliance is relatively fixed, regardless of the number of employees, and they are willing to invest resources that ensure a culture of safety, because it is economically beneficial, socially responsible, and probably required by the companies to whom they need to market their products. These same millennials understand that society and their customers will not continue to tolerate the high rate of agricultural injuries and deaths indefinitely. Public policy as a means to improve agricultural workers' safety and health is likely to be less resisted by the next generation of farmers, ranchers, producers, and agribusiness leaders who, regardless of legal or regulatory pressure, will implement internal business policies emphasizing safety, health, sustainability, and social justness as they understand it.

  7. Emerging electro-optical technologies for defense applications

    NASA Astrophysics Data System (ADS)

    Venkateswarlu, Ronda; Ser, W.; Er, Meng H.; Chan, Philip

    1999-11-01

    Technological breakthroughs in the field of imaging and non- imaging sensor sand the related signal processors helped the military users to achieve 'force multiplication'. Present day 'smart-weapon systems' are being converted to 'brilliant-weapon systems' to bridge the gap until the most potent new 'fourth generation systems' come on line based on nanotechnology. The recent military tactics have evolved to take advantage of ever improving technologies to improve the quality and performance over time. The drive behind these technologies is to get a first-pass-mission-success against the target with negligible collateral damage, protecting property and the lives of non-combatants. These technologies revolve around getting target information, detection, designation, guidance, aim-point selection, and mission accomplishment. The effectiveness of these technologies is amply demonstrated during recent wars. This paper brings out the emerging trends in visible/IR/radar smart-sensors and the related signal processing technologies that lead to brilliant guided weapon systems. The purpose of this paper is to give an overview to the readers about futuristic systems. This paper also addresses various system configurations including sensor-fusion.

  8. Information and Decision Superiority: Right Concept, Right Tools, Right Training

    DTIC Science & Technology

    2007-01-01

    individual services, and numerous defense contractors have spoken of " information dominance " and "information superiority." Both, particularly the former...technologies will offer an unimaginable level of information to decision makers and operators. Ideas of information dominance , however, are fundamentally...other futuristic sensors will offer an unimaginable level of information to decision makers and operators. Ideas of information dominance , however

  9. A New Way of Thinking about Technology: An Interview with Futurists Joel Barker and Scott Erickson

    ERIC Educational Resources Information Center

    Morrison, James L.; Barker, Joel; Erickson, Scott

    2006-01-01

    Editor-in-chief James Morrison interviews Joel Barker and Scott Erickson, co-authors of the book "Five Regions of the Future: A New Way to Think about Technology". In their book, the authors propose an ecological model that classifies technology according to different clusters or regions, each of which entails its own perspective of technology and…

  10. Kidwatching: A Vygotskyan Approach to Children's Language In the "Star Wars" Age.

    ERIC Educational Resources Information Center

    Monroe, Suzanne S.

    A Vygotskyan review of children's language examines language samples of a 7-year-old boy at home, at a birthday party, and at play in a sandbox. The language samples indicate common patterns, including his use of tools and symbol together in play. A common thread in the samples is his involvement with high tech tools of futuristic toys. Vygotsky…

  11. Recruitment and Retention of Minority Students in Teacher Education. Proceedings of the National Invitational Conference (Lexington, Kentucky, March 29-April 1, 1987).

    ERIC Educational Resources Information Center

    Middleton, Ernest J., Ed.; Mason, Emanuel J., Ed.

    Presentations at this conference focused on the following topics: (1) the recruitment and retention of minorities in teacher education; (2) history and social psychology of the issue; (3) futuristic views and minority participation in the 1990s; (4) comparison of teacher education programs in traditionally black and white institutions; (5)…

  12. Educating the Army of 2010: A Strategic Plan

    DTIC Science & Technology

    1992-02-20

    States have been identified by futurist John Naisbitt, in his books Megatrends : Ten New Directions Transforming Our Lives and Megatrends 2000. Several...information and equipment. - The proliferation of weapons will continue, including chemical, biological , and nuclear weapons. Despite the reduction of...conventional systems as well as biological and chemical weapons of mass destruction. Nuclear technology will be more common, both as a source of

  13. Futuristics and the Role of the Responsible Leader in Providing Better Schools for Less Money: A Look into the Future.

    ERIC Educational Resources Information Center

    Alvir, Howard P.

    Forecast of a 1986 program of educational innovation involving education stamps and student bank accounts is presented. The objectives of the program are to provide more efficient, less expensive, and more equal education. The author maintains that these objectives will be met by allowing average citizens to spend money on an individual basis in…

  14. Educators as Optimistic Futurists: A Critical Case Study Investigation into the Takeover of One Middle School in the Southwest United States

    ERIC Educational Resources Information Center

    Smith, Matthew David

    2012-01-01

    Advocates of the No Child Left Behind Act of 2001 (NCLB) often champion a neoliberal agenda of privatization, deregulation, the mass firings of teachers and administrators, and takeovers of schools deemed to be "failing." School takeovers are sanctioned under the No Child Left Behind Act's Corrective Action measures, in which schools…

  15. Adjustments Needed in Vocational Agriculture Programs To Meet the Employment Needs of the Food and Fiber System in the Next Decade. A Position Paper.

    ERIC Educational Resources Information Center

    National Association of Supervisors of Agricultural Education.

    The image of the instructional program in vocational agriculture must be changed to reflect a scientific and futuristic nature. The future of vocational agriculture depends upon a willingness of the agricultural education profession to analyze current programs and adjust them to meet the changes of today's rapidly advancing biotechnology and…

  16. Reconfigurable Integrated Optoelectronics

    DTIC Science & Technology

    2011-01-01

    state -changing could be done also using thermo-optical, mechano-optical, magneto-optical or opto-optical inputs. The speed of reconfiguration can be fast... quantum computers, is a futuristic activity; however, Jeremy O’Brien believes that the time horizon for OQC suc- cess can be brought closer in by using ...2011 Richard Soref. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use

  17. Passengers in containers

    NASA Technical Reports Server (NTRS)

    Tarkhanovskiy, V.

    1977-01-01

    A futuristic vision of future passenger and cargo transport is presented. To speed up lengthy transit operations, passengers would be accomodated in comfortable, compartment-like containers. Several diagrams show how such containers can be accomodated aboard an aircraft or a helicopter, on a truck, or in a railroad car. A system would result in great economy in both cost and time. Of particular importance is such a system for cargo traffic.

  18. The next medical frontier: computer and robotic-enhanced health care.

    PubMed

    Kaiser, L R

    1986-01-01

    Anesthesia, antiseptics, vaccines, sulfa drugs and other technological marvels of their day forever changed the practice of medicine. Technology was the motor of change for medicine in times past and will be for medicine in the future. A look at the health-care delivery system of the next 50 years, by one of America's foremost health-care futurists, shows that these medical changes are only limited by our imagination.

  19. Heuristics, Anecdote and Applying Art: Why War Theorists are Kidding Themselves

    DTIC Science & Technology

    2009-03-17

    century author and futurist Isaac Asimov . Pareto was able to demonstrate the non-random (or non-Gaussian) distribution of wealth in various European...societies, and conclude that this represented a general feature of human populations.19 Asimov suggested that human behavior might be modeled in the...population as well. 20 Isaac Asimov , Foundation (New York: Gnome Press, 1951). Asimov described (in admittedly vague terms) a theory of psychohistory, which

  20. Mathematical Modeling and Optimization Studies on Development of Fuel Cells for Multifarious Applications

    DTIC Science & Technology

    2010-05-12

    multicomponent steady-state model for liquid -feed solid polymer electrolyte DBFCs. These fuel cells use sodium borohydride (NaBH4) in alkaline media...layers, diffusion layers and the polymer electrolyte membrane for a liquid feed DBFC. Diffusion of reactants within and between the pores is accounted...projected for futuristic portable applications. In this project we developed a three- dimensional, multicomponent steady-state model for liquid -feed solid

  1. Traumaculture and Telepathetic Cyber Fiction

    NASA Astrophysics Data System (ADS)

    Drinkall, Jacquelene

    This paper explores the interactive CD-ROM No Other Symptoms: Time Travelling with Rosalind Brodsky, usingtelepathetic socio-psychological, psychoanalytic and narrative theories. The CD-ROMexists as a contemporary artwork and published interactive hardcover book authored by painter and new-media visual artist Suzanne Treister. The artwork incorporates Treister's paintings, writing, photoshop, animation, video and audio work with narrative structures taken from world history, the history of psychoanalysis, futurist science and science fiction, family history and biography.

  2. Studying Policy Changes in Disaster Management in India: A Tale of Two Cyclones.

    PubMed

    Jha, Ayan; Basu, Rivu; Basu, Atreyee

    2016-02-01

    The mainstay of India's disaster management policy until the early 2000s had been relief and rescue operations. The Odisha Super Cyclone (1999) with 10,000 deaths and US $3 billion economic damage provided a rude awakening. Recognizing the importance of preemptive preparedness, the government initiated systematic steps to implement a national framework interlinking economic, environmental, and overall developmental issues for efficient response to and mitigation of disasters. We attempted a critical analysis of this paradigm shift in India's disaster management policy through the prism of 2 cyclones, 14 years apart in time. With improved preparedness and response measures, the death toll in 2013 Cyclone Phailin was 0.5% and the economic loss was about one-third of that during 1999. Concomitant improvements in the technological expertise of the early warning system, an integrated approach at all levels of administration including joint planning with major nongovernmental organizations, and improved community participation were identified as game-changers. An unbelievable 1 million people were evacuated to safety. Our essay aims to highlight key steps in this success and calls for futuristic approaches like insurance programs and gender-sensitive recovery plans. With thorough scrutiny, India's model may well stand to be replicated in resource-restricted settings.

  3. Crystal that remembers: several ways to utilize nanocrystals in resistive switching memory

    NASA Astrophysics Data System (ADS)

    Banerjee, Writam; Liu, Qi; Long, Shibing; Lv, Hangbing; Liu, Ming

    2017-08-01

    The attractive usability of quantum phenomena in futuristic devices is possible by using zero-dimensional systems like nanocrystals (NCs). The performance of nonvolatile flash memory devices has greatly benefited from the use of NCs over recent decades. The quantum abilities of NCs have been used to improve the reliability of flash devices. Its appeal is extended to the design of emerging devices such as resistive random-access memory (RRAM), a technology where the use of silicon is optional. Here, we are going to review the recent progress in the design, characterization, and utilization of NCs in RRAM devices. We will first introduce the physical design of the RRAM devices using NCs and the improvement of electrical performance in NC-RRAM over conventional ones. In particular, special care has been taken to review the ways of development provided by the NCs in the RRAM devices. In a broad sense, the NCs can play a charge trapping role in the NC-RRAM structure or it can be responsible for the localization and improvement of the stability of the conductive filament or it can play a part in the formation of the conductive filament chain by the NC migration under applied bias. Finally, the scope of NCs in the RRAM devices has also been discussed.

  4. Predictive, preventive, personalised and participatory periodontology: 'the 5Ps age' has already started.

    PubMed

    Cafiero, Carlo; Matarasso, Sergio

    2013-06-14

    An impressive progress in dentistry has been recorded in the last decades. In order to reconsider guidelines in dentistry, it is required to introduce new concepts of personalised patient treatments: the wave of predictive, preventive and personalised medicine is rapidly incoming in dentistry. Worldwide dentists have to make a big cultural effort in changing the actual 'reactive' therapeutic point of view, belonging to the last century, into a futuristic 'predictive' one. The first cause of tooth loss in industrialised world is periodontitis, a Gram-negative anaerobic infection whose pathogenesis is genetically determined and characterised by complex immune reactions. Chairside diagnostic tests based on saliva, gingival crevicular fluid and cell sampling are going to be routinely used by periodontists for a new approach to the diagnosis, monitoring, prognosis and management of periodontal patients. The futuristic '5Ps' (predictive, preventive, personalised and participatory periodontology) focuses on early integrated diagnosis (genetic, microbiology, host-derived biomarker detection) and on the active role of the patient in which networked patients will shift from being mere passengers to responsible drivers of their health. In this paper, we intend to propose five diagnostic levels (high-tech diagnostic tools, genetic susceptibility, bacterial infection, host response factors and tissue breakdown-derived products) to be evaluated with the intention to obtain a clear picture of the vulnerability of a single individual to periodontitis in order to organise patient stratification in different categories of risk. Lab-on-a-chip (LOC) technology may soon become an important part of efforts to improve worldwide periodontal health in developed nations as well as in the underserved communities, resource-poor areas and poor countries. The use of LOC devices for periodontal inspection will allow patients to be screened for periodontal diseases in settings other than the periodontist practice, such as at general practitioners, general dentists or dental hygienists. Personalised therapy tailored with respect to the particular medical reality of the specific stratified patient will be the ultimate target to be realised by the 5Ps approach. A long distance has to be covered to reach the above targets, but the pathway has already been clearly outlined.

  5. Predictive, preventive, personalised and participatory periodontology: ‘the 5Ps age’ has already started

    PubMed Central

    2013-01-01

    An impressive progress in dentistry has been recorded in the last decades. In order to reconsider guidelines in dentistry, it is required to introduce new concepts of personalised patient treatments: the wave of predictive, preventive and personalised medicine is rapidly incoming in dentistry. Worldwide dentists have to make a big cultural effort in changing the actual ‘reactive’ therapeutic point of view, belonging to the last century, into a futuristic ‘predictive’ one. The first cause of tooth loss in industrialised world is periodontitis, a Gram-negative anaerobic infection whose pathogenesis is genetically determined and characterised by complex immune reactions. Chairside diagnostic tests based on saliva, gingival crevicular fluid and cell sampling are going to be routinely used by periodontists for a new approach to the diagnosis, monitoring, prognosis and management of periodontal patients. The futuristic ‘5Ps’ (predictive, preventive, personalised and participatory periodontology) focuses on early integrated diagnosis (genetic, microbiology, host-derived biomarker detection) and on the active role of the patient in which networked patients will shift from being mere passengers to responsible drivers of their health. In this paper, we intend to propose five diagnostic levels (high-tech diagnostic tools, genetic susceptibility, bacterial infection, host response factors and tissue breakdown-derived products) to be evaluated with the intention to obtain a clear picture of the vulnerability of a single individual to periodontitis in order to organise patient stratification in different categories of risk. Lab-on-a-chip (LOC) technology may soon become an important part of efforts to improve worldwide periodontal health in developed nations as well as in the underserved communities, resource-poor areas and poor countries. The use of LOC devices for periodontal inspection will allow patients to be screened for periodontal diseases in settings other than the periodontist practice, such as at general practitioners, general dentists or dental hygienists. Personalised therapy tailored with respect to the particular medical reality of the specific stratified patient will be the ultimate target to be realised by the 5Ps approach. A long distance has to be covered to reach the above targets, but the pathway has already been clearly outlined. PMID:23763842

  6. A Delphi forecast of technology in education

    NASA Technical Reports Server (NTRS)

    Robinson, B. E.

    1973-01-01

    The results are reported of a Delphi forecast of the utilization and social impacts of large-scale educational telecommunications technology. The focus is on both forecasting methodology and educational technology. The various methods of forecasting used by futurists are analyzed from the perspective of the most appropriate method for a prognosticator of educational technology, and review and critical analysis are presented of previous forecasts and studies. Graphic responses, summarized comments, and a scenario of education in 1990 are presented.

  7. Wavelength dispersion characteristics of integrated silicon avalanche LEDs: potential applications in futuristic on-chip micro- and nano-biosensors

    NASA Astrophysics Data System (ADS)

    Okhai, Timothy A.; Snyman, Lukas W.; Polleux, Jean-Luc

    2016-02-01

    Si Av LEDs are easily integrated in on-chip integrated circuitry. They have high modulation frequencies into the GHz range and can be fabricated to sub-micron dimensions. Due to subsurface light generation in the silicon device itself, and the high refractive index differences between silicon and the device environment, the exiting light radiation has interesting dispersion characteristics. Three junction micro p+-np+ Silicon Avalanche based Light Emitting Devices (Si Av LEDs) have been analyzed in terms of dispersion characteristics, generally resulting in different wavelengths of light (colors) being emitted at different angles and solid angles from the surfaces of these devices. The emission wavelength is in the 450 - 850 nm range. The devices are of micron dimension and operate at 8 - 10V, 1μA - 2mA. The emission spot sizes are about 1 micron square. Emission intensities are up to 500 nW.μm-2. The observed dispersion characteristics range from 0.05 degrees per nm per degree at emission angle of 5 degrees, to 0.15 degrees per nm at emission angles of 30 degrees. It is believed that the dispersion characteristics can find interesting and futuristic on-chip electro-optic applications involving particularly a ranging from on chip micro optical wavelength dispersers, communication de-multiplexers, and novel bio-sensor applications. All of these could penetrate into the nanoscale dimensions.

  8. The role of human-automation consensus in multiple unmanned vehicle scheduling.

    PubMed

    Cummings, M L; Clare, Andrew; Hart, Christin

    2010-02-01

    This study examined the impact of increasing automation replanning rates on operator performance and workload when supervising a decentralized network of heterogeneous unmanned vehicles. Futuristic unmanned vehicles systems will invert the operator-to-vehicle ratio so that one operator can control multiple dissimilar vehicles connected through a decentralized network. Significant human-automation collaboration will be needed because of automation brittleness, but such collaboration could cause high workload. Three increasing levels of replanning were tested on an existing multiple unmanned vehicle simulation environment that leverages decentralized algorithms for vehicle routing and task allocation in conjunction with human supervision. Rapid replanning can cause high operator workload, ultimately resulting in poorer overall system performance. Poor performance was associated with a lack of operator consensus for when to accept the automation's suggested prompts for new plan consideration as well as negative attitudes toward unmanned aerial vehicles in general. Participants with video game experience tended to collaborate more with the automation, which resulted in better performance. In decentralized unmanned vehicle networks, operators who ignore the automation's requests for new plan consideration and impose rapid replans both increase their own workload and reduce the ability of the vehicle network to operate at its maximum capacity. These findings have implications for personnel selection and training for futuristic systems involving human collaboration with decentralized algorithms embedded in networks of autonomous systems.

  9. Nation Before Service: The Evolution of Joint Operations to a Capabilities-Based Mindset

    DTIC Science & Technology

    2013-06-01

    Identified as one of America’s acupuncture points, cyberspace represents the soft underbelly that facilitates a majority of the world and US economy.90...Corpus, “America’s Acupuncture Points,” Asia Times Online (20 October 2006), http://www.atimes.com/atimes/China/HJ19Ad01.html (accessed 28 December...2012). See also, Zimet and Barry, “Military Service,” 287. 91 Corpus, “America’s Acupuncture Points,” 1. 62 and futurist Ray Kurzweil postulated

  10. Yeast 2.0-connecting the dots in the construction of the world's first functional synthetic eukaryotic genome.

    PubMed

    Pretorius, I S; Boeke, J D

    2018-06-01

    Historians of the future may well describe 2018 as the year that the world's first functional synthetic eukaryotic genome became a reality. Without the benefit of hindsight, it might be hard to completely grasp the long-term significance of a breakthrough moment in the history of science like this. The role of synthetic biology in the imminent birth of a budding Saccharomyces cerevisiae yeast cell carrying 16 man-made chromosomes causes the world of science to teeter on the threshold of a future-defining scientific frontier. The genome-engineering tools and technologies currently being developed to produce the ultimate yeast genome will irreversibly connect the dots between our improved understanding of the fundamentals of a complex cell containing its DNA in a specialised nucleus and the application of bioengineered eukaryotes designed for advanced biomanufacturing of beneficial products. By joining up the dots between the findings and learnings from the international Synthetic Yeast Genome project (known as the Yeast 2.0 or Sc2.0 project) and concurrent advancements in biodesign tools and smart data-intensive technologies, a future world powered by a thriving bioeconomy seems realistic. This global project demonstrates how a collaborative network of dot connectors-driven by a tinkerer's indomitable curiosity to understand how things work inside a eukaryotic cell-are using cutting-edge biodesign concepts and synthetic biology tools to advance science and to positively frame human futures (i.e. improved quality of life) in a planetary context (i.e. a sustainable environment). Explorations such as this have a rich history of resulting in unexpected discoveries and unanticipated applications for the benefit of people and planet. However, we must learn from past explorations into controversial futuristic sciences and ensure that researchers at the forefront of an emerging science such as synthetic biology remain connected to all stakeholders' concerns about the biosafety, bioethics and regulatory aspects of their pioneering work. This article presents a shared vision of constructing a synthetic eukaryotic genome in a safe model organism by using novel concepts and advanced technologies. This multidisciplinary and collaborative project is conducted under a sound governance structure that does not only respect the scientific achievements and lessons from the past, but that is also focussed on leading the present and helping to secure a brighter future for all.

  11. Yeast 2.0—connecting the dots in the construction of the world's first functional synthetic eukaryotic genome

    PubMed Central

    Boeke, J D

    2018-01-01

    Abstract Historians of the future may well describe 2018 as the year that the world's first functional synthetic eukaryotic genome became a reality. Without the benefit of hindsight, it might be hard to completely grasp the long-term significance of a breakthrough moment in the history of science like this. The role of synthetic biology in the imminent birth of a budding Saccharomyces cerevisiae yeast cell carrying 16 man-made chromosomes causes the world of science to teeter on the threshold of a future-defining scientific frontier. The genome-engineering tools and technologies currently being developed to produce the ultimate yeast genome will irreversibly connect the dots between our improved understanding of the fundamentals of a complex cell containing its DNA in a specialised nucleus and the application of bioengineered eukaryotes designed for advanced biomanufacturing of beneficial products. By joining up the dots between the findings and learnings from the international Synthetic Yeast Genome project (known as the Yeast 2.0 or Sc2.0 project) and concurrent advancements in biodesign tools and smart data-intensive technologies, a future world powered by a thriving bioeconomy seems realistic. This global project demonstrates how a collaborative network of dot connectors—driven by a tinkerer's indomitable curiosity to understand how things work inside a eukaryotic cell—are using cutting-edge biodesign concepts and synthetic biology tools to advance science and to positively frame human futures (i.e. improved quality of life) in a planetary context (i.e. a sustainable environment). Explorations such as this have a rich history of resulting in unexpected discoveries and unanticipated applications for the benefit of people and planet. However, we must learn from past explorations into controversial futuristic sciences and ensure that researchers at the forefront of an emerging science such as synthetic biology remain connected to all stakeholders’ concerns about the biosafety, bioethics and regulatory aspects of their pioneering work. This article presents a shared vision of constructing a synthetic eukaryotic genome in a safe model organism by using novel concepts and advanced technologies. This multidisciplinary and collaborative project is conducted under a sound governance structure that does not only respect the scientific achievements and lessons from the past, but that is also focussed on leading the present and helping to secure a brighter future for all. PMID:29648592

  12. Process Security in Chemical Engineering Education

    ERIC Educational Resources Information Center

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  13. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    DTIC Science & Technology

    2017-06-01

    Improving Mental Health Reporting Practices in Between Personnel Security Investigations Stephanie L. Jaros Donna L. Tadle David Ciani Keith B...2017 Improving Mental Health Reporting Practices in Between Personnel Security Investigations Stephanie L. Jaros, Donna L. Tadle, David Ciani, Keith...COVERED: 4. Improving Mental Health Reporting Practices in Between Personnel Security Investigations 5a. CONTRACT NUMBER: 5b. GRANT NUMBER: 5c

  14. An order of magnitude improvement in optical fiber bandwidth using spatial domain multiplexing/space division multiplexing (SDM) in conjunction with orbital angular momentum (OAM)

    NASA Astrophysics Data System (ADS)

    Murshid, Syed; Alanzi, Saud; Hridoy, Arnob; Lovell, Greg; Parhar, Gurinder; Chakravarty, Abhijit; Chowdhury, Bilas

    2014-09-01

    Spatial Domain Multiplexing/Space Division Multiplexing (SDM) can increase the bandwidth of existing and futuristic optical fibers by an order of magnitude or more. In the SDM technique, we launch multiple single mode pigtail laser sources of same wavelength into a carrier fiber at different angles. The launching angles decide the output of the carrier fiber by allocating separate spatial locations for each channel. Each channel follows a helical trajectory while traversing the length of the carrier fiber, thereby allowing spatial reuse of optical frequencies. In this endeavor we launch light from five different single mode pigtail laser sources at different angles (with respect to the axis of the carrier fiber) into the carrier fiber. Owing to helical propagation we get five distinct concentric donut shaped rings with negligible crosstalk at the output end of the fiber. These SDM channels also exhibit Orbital Angular Momentum (OAM), thereby adding an extra degree of photon freedom. We present the experimental data of five spatially multiplexed channels and compare them with simulated results to show that this technique can potentially improve the data capacity of optical fibers by an order of magnitude: A factor of five using SDM and another factor of two using OAM.

  15. 3 CFR 13587 - Executive Order 13587 of October 7, 2011. Structural Reforms To Improve the Security of...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Reforms To Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of... October 7, 2011 EO 13587 Structural Reforms To Improve the Security of Classified Networks and the... networks, it is hereby ordered as follows: Section 1. Policy. Our Nation's security requires classified...

  16. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  17. 24 CFR 201.51 - Proceeding against the loan security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....51 Proceeding against the loan security. (a) Property improvement loans. (1) After acceleration of maturity on a secured property improvement loan, the lender may either proceed against the loan security... proceeds against the loan security, it may submit an insurance claim only if it complies with the...

  18. On the improvement for charging large-scale flexible electrostatic actuators

    NASA Astrophysics Data System (ADS)

    Liao, Hsu-Ching; Chen, Han-Long; Su, Yu-Hao; Chen, Yu-Chi; Ko, Wen-Ching; Liou, Chang-Ho; Wu, Wen-Jong; Lee, Chih-Kung

    2011-04-01

    Recently, the development of flexible electret based electrostatic actuator has been widely discussed. The devices was shown to have high sound quality, energy saving, flexible structure and can be cut to any shape. However, achieving uniform charge on the electret diaphragm is one of the most critical processes needed to have the speaker ready for large-scale production. In this paper, corona discharge equipment contains multi-corona probes and grid bias was set up to inject spatial charges within the electret diaphragm. The optimal multi-corona probes system was adjusted to achieve uniform charge distribution of electret diaphragm. The processing conditions include the distance between the corona probes, the voltages of corona probe and grid bias, etc. We assembled the flexible electret loudspeakers first and then measured their sound pressure and beam pattern. The uniform charge distribution within the electret diaphragm based flexible electret loudspeaker provided us with the opportunity to shape the loudspeaker arbitrarily and to tailor the sound distribution per specifications request. Some of the potential futuristic applications for this device such as sound poster, smart clothes, and sound wallpaper, etc. were discussed as well.

  19. Microalgal bioengineering for sustainable energy development: Recent transgenesis and metabolic engineering strategies.

    PubMed

    Banerjee, Chiranjib; Singh, Puneet Kumar; Shukla, Pratyoosh

    2016-03-01

    Exploring the efficiency of algae to produce remarkable products can be directly benefitted by studying its mechanism at systems level. Recent advents in biotechnology like flux balance analysis (FBA), genomics and in silico proteomics minimize the wet lab exertion. It is understood that FBA predicts the metabolic products, metabolic pathways and alternative pathway to maximize the desired product, and these are key components for microalgae bio-engineering. This review encompasses recent transgenesis techniques and metabolic engineering strategies applied to different microalgae for improving different traits. Further it also throws light on RNAi and riboswitch engineering based methods which may be advantageous for high throughput microalgal research. A valid and optimally designed microalga can be developed where every engineering strategies meet each other successfully and will definitely fulfill the market needs. It is also to be noted that Omics (viz. genetic and metabolic manipulation with bioinformatics) should be integrated to develop a strain which could prove to be a futuristic solution for sustainable development for energy. Copyright © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Future Weather Forecasting in the Year 2020-Investing in Technology Today: Improving Weather and Environmental Predictions

    NASA Technical Reports Server (NTRS)

    Anthes, Richard; Schoeberl, Mark

    2000-01-01

    Fast-forward twenty years to the nightly simultaneous TV/webcast. Accurate 8-14 day regional forecasts will be available as will be a whole host of linked products including economic impact, travel, energy usage, etc. On-demand, personalized street-level forecasts will be downloaded into your PDA. Your home system will automatically update the products of interest to you (e.g. severe storm forecasts, hurricane predictions, etc). Short and long range climate forecasts will be used by your "Quicken 2020" to make suggest changes in your "futures" investment portfolio. Through a lively and informative multi-media presentation, leading Space-Earth Science Researchers and Technologists will share their vision for the year 2020, offering a possible futuristic forecast enabled through the application of new technologies under development today. Copies of the 'broadcast' will be available on Beta Tape for your own future use. If sufficient interest exists, the program may also be made available for broadcasters wishing to do stand-ups with roll-ins from the San Francisco meeting for their viewers back home.

  1. Stem cell therapy: A novel & futuristic treatment modality for disaster injuries

    PubMed Central

    Gurudutta, G.U.; Satija, Neeraj Kumar; Singh, Vimal Kishor; Verma, Yogesh Kumar; Gupta, Pallavi; Tripathi, R.P.

    2012-01-01

    Stem cell therapy hold the potential to meet the demand for transplant cells/tissues needed for treating damages resulting from both natural and man-made disasters. Pluripotency makes embryonic stem cells and induced pluripotent stem cells ideal for use, but their teratogenic character is a major hindrance. Therapeutic benefits of bone marrow transplantation are well known but characterizing the potentialities of haematopoietic and mesenchymal cells is essential. Haematopoietic stem cells (HSCs) have been used for treating both haematopoietic and non-haematopoietic disorders. Ease of isolation, in vitro expansion, and hypoimmunogenecity have brought mesenchymal stem cells (MSCs) into limelight. Though differentiation of MSCs into tissue-specific cells has been reported, differentiation-independent mechanisms seem to play a more significant role in tissue repair which need to be addressed further. The safety and feasibility of MSCs have been demonstrated in clinical trials, and their use in combination with HSC for radiation injury treatment seems to have extended benefit. Therefore, using stem cells for treatment of disaster injuries along with the conventional medical practice would likely accelerate the repair process and improve the quality of life of the victim. PMID:22382178

  2. Two-Dimensional Atomic-Layered Alloy Junctions for High-Performance Wearable Chemical Sensor.

    PubMed

    Cho, Byungjin; Kim, Ah Ra; Kim, Dong Jae; Chung, Hee-Suk; Choi, Sun Young; Kwon, Jung-Dae; Park, Sang Won; Kim, Yonghun; Lee, Byoung Hun; Lee, Kyu Hwan; Kim, Dong-Ho; Nam, Jaewook; Hahm, Myung Gwan

    2016-08-03

    We first report that two-dimensional (2D) metal (NbSe2)-semiconductor (WSe2)-based flexible, wearable, and launderable gas sensors can be prepared through simple one-step chemical vapor deposition of prepatterned WO3 and Nb2O5. Compared to a control device with a Au/WSe2 junction, gas-sensing performance of the 2D NbSe2/WSe2 device was significantly enhanced, which might have resulted from the formation of a NbxW1-xSe2 transition alloy junction lowering the Schottky barrier height. This would make it easier to collect charges of channels induced by molecule adsorption, improving gas response characteristics toward chemical species including NO2 and NH3. 2D NbSe2/WSe2 devices on a flexible substrate provide gas-sensing properties with excellent durability under harsh bending. Furthermore, the device stitched on a T-shirt still performed well even after conventional cleaning with a laundry machine, enabling wearable and launderable chemical sensors. These results could pave a road toward futuristic gas-sensing platforms based on only 2D materials.

  3. Testing gravity with EG: mapping theory onto observations

    NASA Astrophysics Data System (ADS)

    Leonard, C. Danielle; Ferreira, Pedro G.; Heymans, Catherine

    2015-12-01

    We present a complete derivation of the observationally motivated definition of the modified gravity statistic EG. Using this expression, we investigate how variations to theory and survey parameters may introduce uncertainty in the general relativistic prediction of EG. We forecast errors on EG for measurements using two combinations of upcoming surveys, and find that theoretical uncertainties may dominate for a futuristic measurement. Finally, we compute predictions of EG under modifications to general relativity in the quasistatic regime, and comment on the pros and cons of using EG to test gravity with future surveys.

  4. Lignocellulosic Biomass to Ethanol Process Design and Economics Utilizing Co-Current Dilute Acid Prehydrolysis and Enzymatic Hydrolysis Current and Futuristic Scenarios

    DTIC Science & Technology

    1999-07-01

    handled as a dry solid. This approach was recommended by vendors and is typical of dewatering equipment used in the utility flue gas desulfurization ...in a large continuous stirred- tank reactor (CSTR). 21 H. Majdeski, personal experience in the flue gas desulfurization industry, 1998. 22 Letter to B...defined as the percentage of the feed heat that is converted to steam heat, is 62% (see Figure 15). Flue gas from the dryer cyclone enters a baghouse to

  5. Neuroscience nursing practice in a new millennium.

    PubMed

    Hickey, J V; Minton, M S

    1999-09-01

    Neuroscience nursing practice in the 21st century is considered from two perspectives: 1) scope of care and roles within a collaborative interdisciplinary model of care; and 2) patient-focused care within the challenging health care system. The implications of illness trends for neuroscience nursing practice are discussed, as are the developing changes in the health care delivery system driven by economics. The article focuses on the futuristic role of disease management in shaping practice and the models for practice which will prevail in this new health care environment.

  6. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    DTIC Science & Technology

    2003-04-01

    usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M

  7. 24 CFR 201.24 - Security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Security requirements. 201.24....24 Security requirements. (a) Property improvement loans—(1) Property improvement loans in excess of... evidenced by a properly recorded financing statement, a properly recorded security instrument executed by...

  8. 24 CFR 201.24 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Security requirements. 201.24....24 Security requirements. (a) Property improvement loans—(1) Property improvement loans in excess of... evidenced by a properly recorded financing statement, a properly recorded security instrument executed by...

  9. System and method for key generation in security tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  10. 78 FR 69433 - Executive Order 13650 Improving Chemical Facility Safety and Security Listening Sessions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Chemical Facility Safety and Security Listening Sessions AGENCY: National Protection and Programs... from stakeholders on issues pertaining to Improving Chemical Facility Safety and Security (Executive... regulations, guidance, and policies; and identifying best practices in chemical facility safety and security...

  11. Review on design and control aspects of ankle rehabilitation robots.

    PubMed

    Jamwal, Prashant K; Hussain, Shahid; Xie, Sheng Q

    2015-03-01

    Ankle rehabilitation robots can play an important role in improving outcomes of the rehabilitation treatment by assisting therapists and patients in number of ways. Consequently, few robot designs have been proposed by researchers which fall under either of the two categories, namely, wearable robots or platform-based robots. This paper presents a review of both kinds of ankle robots along with a brief analysis of their design, actuation and control approaches. While reviewing these designs it was observed that most of them are undesirably inspired by industrial robot designs. Taking note of the design concerns of current ankle robots, few improvements in the ankle robot designs have also been suggested. Conventional position control or force control approaches, being used in the existing ankle robots, have been reviewed. Apparently, opportunities of improvement also exist in the actuation as well as control of ankle robots. Subsequently, a discussion on most recent research in the development of novel actuators and advanced controllers based on appropriate physical and cognitive human-robot interaction has also been included in this review. Implications for Rehabilitation Ankle joint functions are restricted/impaired as a consequence of stroke or injury during sports or otherwise. Robots can help in reinstating functions faster and can also work as tool for recording rehabilitation data useful for further analysis. Evolution of ankle robots with respect to their design and control aspects has been discussed in the present paper and a novel design with futuristic control approach has been proposed.

  12. Surfing through Hyperspace - Understanding Higher Universes in Six Easy Lessons

    NASA Astrophysics Data System (ADS)

    Pickover, Clifford A.

    1999-09-01

    Do a little armchair time-travel, rub elbows with a four-dimensional intelligent life form, or stretch your mind to the furthest corner of an uncharted universe. With this astonishing guidebook, Surfing Through Hyperspace , you need not be a mathematician or an astrophysicist to explore the all-but-unfathomable concepts of hyperspace and higher-dimensional geometry.No subject in mathematics has intrigued both children and adults as much as the idea of a fourth dimension. Philosophers and parapsychologists have meditated on this mysterious space that no one can point to but may be all around us. Yet this extra dimension has a very real, practical value to mathematicians and physicists who use it every day in their calculations. In the tradtion of Flatland , and with an infectious enthusiasm, Clifford Pickover tackles the problems inherent in our 3-D brains trying to visualize a 4-D world, muses on the religious implications of the existence of higher-dimensional consciousness, and urges all curious readers to venture into "the unexplored territory lying beyond the prison of the obvious." Pickover alternates sections that explain the science of hyperspace with sections that dramatize mind-expanding concepts through a fictional dialogue between two futuristic FBI agents who dabble in the fourth dimension as a matter of national security. This highly accessible and entertaining approach turns an intimidating subject into a scientific game open to all dreamers.Surfing Through Hyperspace concludes with a number of puzzles, computer experiments and formulas for further exploration, inviting readers to extend their minds across this inexhaustibly intriguing scientific terrain.

  13. Surfing through Hyperspace - Understanding Higher Universes in Six Easy Lessons

    NASA Astrophysics Data System (ADS)

    Pickover, Clifford A.

    2001-05-01

    Do a little armchair time-travel, rub elbows with a four-dimensional intelligent life form, or stretch your mind to the furthest corner of an uncharted universe. With this astonishing guidebook, Surfing Through Hyperspace , you need not be a mathematician or an astrophysicist to explore the all-but-unfathomable concepts of hyperspace and higher-dimensional geometry.No subject in mathematics has intrigued both children and adults as much as the idea of a fourth dimension. Philosophers and parapsychologists have meditated on this mysterious space that no one can point to but may be all around us. Yet this extra dimension has a very real, practical value to mathematicians and physicists who use it every day in their calculations. In the tradition of Flatland , and with an infectious enthusiasm, Clifford Pickover tackles the problems inherent in our 3-D brains trying to visualize a 4-D world, muses on the religious implications of the existence of higher-dimensional consciousness, and urges all curious readers to venture into "the unexplored territory lying beyond the prison of the obvious." Pickover alternates sections that explain the science of hyperspace with sections that dramatize mind-expanding concepts through a fictional dialogue between two futuristic FBI agents who dabble in the fourth dimension as a matter of national security. This highly accessible and entertaining approach turns an intimidating subject into a scientific game open to all dreamers.Surfing Through Hyperspace concludes with a number of puzzles, computer experiments and formulas for further exploration, inviting readers to extend their minds across this inexhaustibly intriguing scientific terrain.

  14. Investigation of crystalline structure of plasticized poly (lactic acid)/Banana nanofibers composites

    NASA Astrophysics Data System (ADS)

    Farid, T.; Herrera, V. N.; Kristiina, O.

    2018-05-01

    Polylactic acid (PLA) is a promising biodegradable candidate to replace synthetic commodity plastics in many applications. However, this polymer shows high brittleness, slow rate and lower degree of crystallization. The addition of plasticizing agents can enhance the toughness, but its effects on the crystallization behavior remain inconclusive. Therefore, this research is aiming to cast light on this area. Using differential scanning calorimetry (DSC) at a 2°C/min cooling rate, extruded neat PLA samples showed lower degree of crystallinity and thermal stability. This material shows cold crystallization upon heating and does recrystallize prior melting. These results indicate a clear instability in the crystalline state are confirmed by the crystallographic results by the X-ray diffractions (XRD) pattern and atomic force microscopic imagery. The addition of around 20 wt% of glycerol triacetate (GTA) with 1wt% of banana nanofibers (BNF) almost doubled the crystallinity. This modification is believed to occur through a dilution mechanism in order to increase crystallization rate yielding a more stable crystalline structure as shown by the XRD. However, the dynamic mechanical thermal analysis (DMTA) showed a 30 to 50% reduction in the room temperature storage modulus (stiffness) is in plasticized samples when compared to neat 100% PLA. Although these results shows the possibility to enhance the crystallization through a combination of plasticizing and nanoreinforcing effects, further studies is still needed to optimize the material formulation in order to find the best ratios to secure both a good crystallization and mechanical properties. This will definitively result in a new material that can be used for current and futuristic applications.

  15. Job Satisfaction, Disgruntlement and Insider Risk

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eisele, Gerhard R; Coates, Cameron W

    2010-01-01

    The prediction of future events and trends was the purview of fortune tellers and science writers; however futuristic studies are now an acceptable form of sociological research including workplace dynamics. The nuclear industry is also affected by workplace trends which currently indicate that there will be fewer jobs and individuals who are employed will be required to have greater technical skills. This reshaping of the workforce is partially due to an aging workforce and diversity within the work environment. The reshaping brings with it the need for greater productivity and employee expectations for increased pay and/or benefits. If employee satisfactionmore » is not realized there is a real possibility of disgruntled employees who then become a potential insider risk to the organization. Typically this is an individual who has been employed for several years, becomes dissatisfied with the job, or some other aspect of their life. If the dissatisfaction is directly related to work the individual may retaliate in a destructive manner. Perceived inequities are a major factor and directly related to situational pressures, opportunity, and personal integrity. It is known that the greatest losses within an organization are attributed to employees working alone or in a conspiracy with fellow employees who engage in theft and other fraudulent activities. In the nuclear industry this threat is intensified by the nature of the work, the materials employees come in contact with and the potential of an occurrence that could adversely affect a large geographic region and/or the security of a country. The paper will address motivating factors, recommendations, and include a profile discussion of a possible disgruntled employee.« less

  16. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-13

    ... Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and... classified national security information (classified information) on computer networks, it is hereby ordered as follows: Section 1. Policy. Our Nation's security requires classified information to be shared...

  17. Process Improvement Should Link to Security: SEPG 2007 Security Track Recap

    DTIC Science & Technology

    2007-09-01

    the Systems Security Engineering Capability Maturity Model (SSE- CMM / ISO 21827) and its use in system software developments ...software development life cycle ( SDLC )? 6. In what ways should process improvement support security in the SDLC ? 1.2 10BPANEL RESOURCES For each... project management, and support practices through the use of the capability maturity models including the CMMI and the Systems Security

  18. Improving the Quality of Service and Security of Military Networks with a Network Tasking Order Process

    DTIC Science & Technology

    2010-09-01

    IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER...United States. AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER PROCESS...USAF September 2010 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND

  19. Styx tours Marshall Space Flight Center

    NASA Image and Video Library

    2017-04-27

    Keith Parrish, left, of the Space Systems Department at NASA’s Marshall Space Flight Center, discusses the process of the Environmental Control and Life Support System with Marshall Center Director Todd May, second from left, and members of the legendary rock band Styx during a tour of Marshall April 27. Inspired by NASA’s goal of sending humans to Mars in the 2030s, the band’s upcoming album, "The Mission," musically chronicles a futuristic, crewed mission to Mars. While Styx’s mission may be only realized through their iconic sound, NASA’s mission is well underway with the new Space Launch System

  20. New and Innovative Library Services: Moving with Web 2.0 / Library 2.0 Technology, a Case Study

    NASA Astrophysics Data System (ADS)

    Sahu, H. K.; Pathak, S. K.; Singh, S. N.

    2010-10-01

    We give an overview and definition of Web 2.0 and Library 2.0 technology, especially addressing how it changes access to collections for users. We also describe its unlimited possibilities. The various components of Library 2.0 viz blogs, wikis, RSS, instant messaging, social networking, podcasting, and tagging are briefly summarized. Initiatives at three special information centers and libraries (IUCAA — Astronomy and Astrophysics; IIT — Science and Technology; and NIV — Viral Diseases) are described. We conclude with a futuristic view of Library 2.0.

  1. Laser-Ablated Ba(0.50)Sr(0.50)TiO3/LaAlO3 Films Analyzed Statistically for Microwave Applications

    NASA Technical Reports Server (NTRS)

    Romanofsky, Robert R.

    2003-01-01

    Scanning phased-array antennas represent a highly desirable solution for futuristic near-Earth and deep space communication scenarios requiring vibration-free, rapid beam steering and enhanced reliability. The current state-of-practice in scanning phased arrays is represented by gallium arsenide (GaAs) monolithic microwave integrated circuit (MMIC) technology or ferrite phase shifters. Cost and weight are significant impediments to space applications. Moreover, conventional manifold-fed arrays suffer from beam-forming loss that places considerable burden on MMIC amplifiers. The inefficiency can result in severe thermal management problems.

  2. The human genome and sport, including epigenetics, gene doping, and athleticogenomics.

    PubMed

    Sharp, N C Craig

    2010-03-01

    Hugh Montgomery's discovery of the first of more than 239 fitness genes together with rapid advances in human gene therapy have created a prospect of using genes, genetic elements, and cells that have the capacity to enhance athletic performance (to paraphrase the World Anti-Doping Agency's definition of gene doping). This brief overview covers the main areas of interface between genetics and sport, attempts to provide a context against which gene doping may be viewed, and predicts a futuristic legitimate use of genomic (and possibly epigenetic) information in sport. Copyright 2010 Elsevier Inc. All rights reserved.

  3. AVIATION SECURITY: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation’s Airports

    DTIC Science & Technology

    2001-09-20

    what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.

  4. Security improvement by using a modified coherent state for quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-03-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible.

  5. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach-A Case Study for the City of Wuhan in China.

    PubMed

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-06-15

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.

  6. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CURRENCY, DEPARTMENT OF THE TREASURY INVESTMENT SECURITIES Interpretations § 1.130 Type II securities... financing the construction or improvement of facilities at or used by a university or a degree-granting... construction or improvement of facilities used by a hospital may be eligible as a Type II security, if the...

  7. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    PubMed

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  8. The Grand Challenge of Scale in Scientific Hydrology: Some Personal Reflections

    NASA Astrophysics Data System (ADS)

    Gupta, V. K.

    2009-12-01

    Scale issues in hydrology have shaped my entire scientific career. I first recognized the challenge of scale during the 1970s in linking multi-scale hydrologic processes through collaborative work on solute transport in saturated porous media. Linking geometry, dynamics and statistics, and the role of diagnostics in testing theoretical predictions against experimental observations, played a foundational role. This foundation has guided the rest of my multi-scale research on larger space-time scales of river basins, regional, and global. After the blue book was published in 1991, NSF needed a futuristic implementation plan for the blue book, but did not communicate it to Pete. I came to know of it in 1998 after six years of pursuing an ‘open-ended agenda’ in which Doug played a key role. The upper management of the Geosciences Directorate first mentioned to me in 1998 that the blue book needed a broad and futuristic implementation plan. It led to the Water, Earth, and Biota (WEB) report in 2000 following an NSF-funded workshop in 1999. The multi-scale nature of hydrology served as the central organizing theme for the WEB report. The history from 1984 to 2001 is summarized on the CUAHSI web page under “history”, so I will only share a few personal reflections from this period. Where do we go from here? My perspective is that an urgent need exists to modernize hydrology curriculum that should include the progress that has been made in addressing multi-scale challenges. I will share some personal reflections, both intellectual and administrative, from my experiences in implementing a graduate hydrology science program at the University of Colorado after joining it in 1989.

  9. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach—A Case Study for the City of Wuhan in China

    PubMed Central

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-01-01

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348

  10. Genetic enhancement--a threat to human rights?

    PubMed

    Fenton, Elizabeth

    2008-01-01

    Genetic enhancement is the modification of the human genome for the purpose of improving capacities or 'adding in' desired characteristics. Although this technology is still largely futuristic, debate over the moral issues it raises has been significant. George Annas has recently leveled a new attack against genetic enhancement, drawing on human rights as his primary weapon. I argue that Annas' appeal to human rights ultimately falls flat, and so provides no good reason to object to genetic technology. Moreover, this argument is an example of the broader problem of appealing to human rights as a panacea for ethical problems. Human rights, it is often claimed, are 'trumps': if it can be shown that a proposed technology violates human rights, then it must be cast aside. But human rights are neither a panacea for ethical problems nor a trump card. If they are drafted into the service of an argument, it must be shown that an actual human rights violation will occur. Annas' argument against genetic technology fails to do just this. I shall conclude that his appeal to human rights adds little to the debate over the ethical questions raised by genetic technology.

  11. Shared Information Framework and Technology (SHIFT) Handbook

    DTIC Science & Technology

    2009-02-01

    field. Such a patchwork of separate systems neither improves information sharing nor guarantees the safety and security of communities and personnel in...analysis. In many organizations, security may not necessarily be the expertise of people working in the field, or security and safety issues may be...the safety and security of all crisis management personnel in crisis areas. Functioning information sharing between organisations improves situational

  12. Combating Terrorism: A Compendium of Recent Counterterrorism Recommendations From Authoritative Commissions and Subject Matter Experts

    DTIC Science & Technology

    2001-09-16

    technologies to improve airport security - e.g. biometrics systems and explosive detections systems (Page 5) 4. Allocate additional resources to airport and...been debated are the policy of allowing knives on aircraft, weak cockpit security, and the possibility of federalizing airport security staff.6 A...Improve staff selection and training Airport security staff, and particularly screeners, who are responsible for identifying weapons and explosive

  13. Testing gravity with E{sub G}: mapping theory onto observations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leonard, C. Danielle; Ferreira, Pedro G.; Heymans, Catherine, E-mail: danielle.leonard@physics.ox.ac.uk, E-mail: p.ferreira1@physics.ox.ac.uk, E-mail: heymans@roe.ac.uk

    We present a complete derivation of the observationally motivated definition of the modified gravity statistic E{sub G}. Using this expression, we investigate how variations to theory and survey parameters may introduce uncertainty in the general relativistic prediction of E{sub G}. We forecast errors on E{sub G} for measurements using two combinations of upcoming surveys, and find that theoretical uncertainties may dominate for a futuristic measurement. Finally, we compute predictions of E{sub G} under modifications to general relativity in the quasistatic regime, and comment on the pros and cons of using E{sub G} to test gravity with future surveys.

  14. Preliminary performance analysis of an interplanetary navigation system using asteroid based beacons

    NASA Technical Reports Server (NTRS)

    Jee, J. Rodney; Khatib, Ahmad R.; Muellerschoen, Ronald J.; Williams, Bobby G.; Vincent, Mark A.

    1988-01-01

    A futuristic interplanetary navigation system using transmitters placed on selected asteroids is introduced. This network of space beacons is seen as a needed alternative to the overly burdened Deep Space Network. Covariance analyses on the potential performance of these space beacons located on a candidate constellation of eight real asteroids are initiated. Simplified analytic calculations are performed to determine limiting accuracies attainable with the network for geometric positioning. More sophisticated computer simulations are also performed to determine potential accuracies using long arcs of range and Doppler data from the beacons. The results from these computations show promise for this navigation system.

  15. The human genome and sport, including epigenetics and athleticogenomics: a brief look at a rapidly changing field.

    PubMed

    Sharp, N C Craig

    2008-09-01

    Since Hugh Montgomery discovered the first of what are now nearly 200 "fitness genes", together with rapid advances in human gene therapy, there is now a real prospect of the use of genes, genetic elements, and/or cells that have the capacity to enhance athletic performance (to paraphrase the World Anti-Doping Agency's definition of gene doping). This overview covers the main areas of interface between genetics and sport, attempts to provide a context against which gene doping may be viewed, and suggests a futuristic legitimate use of genomic (and possibly epigenetic) information in sport.

  16. Space ventures and society long-term perspectives

    NASA Technical Reports Server (NTRS)

    Brown, W. M.

    1985-01-01

    A futuristic evaluation of mankind's potential long term future in space is presented. Progress in space will not be inhibited by shortages of the Earth's physical resources, since long term economic growth will be focused on ways to constrain industrial productivity by changing social values, management styles, or government competence. Future technological progress is likely to accelerate with an emphasis on international cooperation, making possible such large joint projects as lunar colonies or space stations on Mars. The long term future in space looks exceedingly bright even in relatively pessimistic scenarios. The principal driving forces will be technological progress, commercial and public-oriented satellites, space industrialization, space travel, and eventually space colonization.

  17. Should psychoanalysis become a science?

    PubMed

    Appelbaum, Jerome

    2011-03-01

    I wish to formulate in broad outline an approach to the conceptualization of psychoanalysis that is divested from theory. This view sees the core of psychoanalysis as a humanistic practice, first and foremost guided by the individuality of the dyadic encounter, rather than as a science. I will not argue for any particular view of psychoanalysis. Instead I marshal a series of considerations from the humanities, to frame a conceptualization of psychoanalysis as a clinically based interpretive discipline having a unique mission. Finally, I will present a futuristic hypothetical scenario whose aim is to show why psychoanalysis will remain a viable enterprise basically as conceived by Freud.

  18. Office of Command Security Total Quality Management Plan

    DTIC Science & Technology

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM (Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  19. A security scheme of SMS system

    NASA Astrophysics Data System (ADS)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  20. Security clustering algorithm based on reputation in hierarchical peer-to-peer network

    NASA Astrophysics Data System (ADS)

    Chen, Mei; Luo, Xin; Wu, Guowen; Tan, Yang; Kita, Kenji

    2013-03-01

    For the security problems of the hierarchical P2P network (HPN), the paper presents a security clustering algorithm based on reputation (CABR). In the algorithm, we take the reputation mechanism for ensuring the security of transaction and use cluster for managing the reputation mechanism. In order to improve security, reduce cost of network brought by management of reputation and enhance stability of cluster, we select reputation, the historical average online time, and the network bandwidth as the basic factors of the comprehensive performance of node. Simulation results showed that the proposed algorithm improved the security, reduced the network overhead, and enhanced stability of cluster.

  1. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

    PubMed

    Khan, Muhammad Khurram; Alghathbar, Khaled

    2010-01-01

    User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  2. Homeland Defense: Continued Actions Needed to Improve Management of Air Sovereignty Alert Operations

    DTIC Science & Technology

    2012-01-01

    Better Outcomes, GAO-10-374T (Washington, D.C.: May 20, 2009); Aviation Security : DHS and TSA Have Researched, Developed and Begun Deploying Passenger... Security : TSA Has Made Progress, but Additional Efforts Are Needed to Improve Security. GAO-11-938T. Washington, D.C.: September 16, 2011. Aviation ...Washington, D.C.: October 23, 2009. Related GAO Products Homeland Defense DOD Tactical Aircraft Aviation Security Risk Management Related GAO

  3. Competitive Cyber-Insurance and Internet Security

    NASA Astrophysics Data System (ADS)

    Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean

    This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.

  4. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  5. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  6. The impact of secure messaging on workflow in primary care: Results of a multiple-case, multiple-method study.

    PubMed

    Hoonakker, Peter L T; Carayon, Pascale; Cartmill, Randi S

    2017-04-01

    Secure messaging is a relatively new addition to health information technology (IT). Several studies have examined the impact of secure messaging on (clinical) outcomes but very few studies have examined the impact on workflow in primary care clinics. In this study we examined the impact of secure messaging on workflow of clinicians, staff and patients. We used a multiple case study design with multiple data collections methods (observation, interviews and survey). Results show that secure messaging has the potential to improve communication and information flow and the organization of work in primary care clinics, partly due to the possibility of asynchronous communication. However, secure messaging can also have a negative effect on communication and increase workload, especially if patients send messages that are not appropriate for the secure messaging medium (for example, messages that are too long, complex, ambiguous, or inappropriate). Results show that clinicians are ambivalent about secure messaging. Secure messaging can add to their workload, especially if there is high message volume, and currently they are not compensated for these activities. Staff is -especially compared to clinicians- relatively positive about secure messaging and patients are overall very satisfied with secure messaging. Finally, clinicians, staff and patients think that secure messaging can have a positive effect on quality of care and patient safety. Secure messaging is a tool that has the potential to improve communication and information flow. However, the potential of secure messaging to improve workflow is dependent on the way it is implemented and used. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    EPA Pesticide Factsheets

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  8. Proactive Security Testing and Fuzzing

    NASA Astrophysics Data System (ADS)

    Takanen, Ari

    Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.

  9. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    DOT National Transportation Integrated Search

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  10. Infant nutrition in Saskatoon: barriers to infant food security.

    PubMed

    Partyka, Brendine; Whiting, Susan; Grunerud, Deanna; Archibald, Karen; Quennell, Kara

    2010-01-01

    We explored infant nutrition in Saskatoon by assessing current accessibility to all forms of infant nourishment, investigating challenges in terms of access to infant nutrition, and determining the use and effectiveness of infant nutrition programs and services. We also examined recommendations to improve infant food security in Saskatoon. Semi-structured community focus groups and stakeholder interviews were conducted between June 2006 and August 2006. Thematic analysis was used to identify themes related to infant feeding practices and barriers, as well as recommendations to improve infant food security in Saskatoon. Our study showed that infant food security is a concern among lower-income families in Saskatoon. Barriers that limited breastfeeding sustainability or nourishing infants through other means included knowledge of feeding practices, lack of breastfeeding support, access and affordability of infant formula, transportation, and poverty. Infant nutrition and food security should be improved by expanding education and programming opportunities, increasing breastfeeding support, and identifying acceptable ways to provide emergency formula. If infant food security is to be addressed successfully, discussion and change must occur in social policy and family food security contexts.

  11. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  12. Eavesdropping on the improved three-party quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    2011-02-01

    Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed.

  13. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-17

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00... (HEART Act) AGENCY: Social Security Administration. ACTION: Final Rule; correcting amendment. SUMMARY: In... of Regulations, Social Security Administration, 6401 Security Boulevard, Baltimore, MD 21235-6401...

  14. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 12 2014-01-01 2013-01-01 true Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  15. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 12 2013-01-01 2013-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  16. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 12 2011-01-01 2011-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  17. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  18. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 12 2012-01-01 2012-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  19. Retail E-Commerce Security Status among Fortune 500 Corporations

    ERIC Educational Resources Information Center

    Zhao, Jensen J.; Zhao, Sherry Y.

    2012-01-01

    The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…

  20. Strategic effects of future environmental policy commitments: climate change, solar radiation management and correlated air pollutants.

    PubMed

    Qu, Jingwen; Silva, Emilson Caputo Delfino

    2015-03-15

    We study the effects of environmental policy commitments in a futuristic world in which solar radiation management (SRM) can be utilized to reduce climate change damages. Carbon and sulfur dioxide emissions (correlated pollutants) can be reduced through tradable permits. We show that if nations simultaneously commit to carbon permit policies, national SRM levels rise with carbon quotas. Alternatively, if they simultaneously commit to SRM policies, the global temperature falls with each unit increase in the global SRM level. A nation always wishes to be a leader in policymaking, but prefers carbon to SRM policymaking. The globe prefers SRM policy commitments. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Sonophotocatalysis in advanced oxidation process: a short review.

    PubMed

    Joseph, Collin G; Li Puma, Gianluca; Bono, Awang; Krishnaiah, Duduku

    2009-06-01

    Sonophotocatalysis involves the use of a combination of ultrasonic sound waves, ultraviolet radiation and a semiconductor photocatalyst to enhance a chemical reaction by the formation of free radicals in aqueous systems. Researchers have used sonophotocatalysis in a variety of investigations i.e. from water decontamination to direct pollutant degradation. This degradation process provides an excellent opportunity to reduce reaction time and the amount of reagents used without the need for extreme physical conditions. Given its advantages, the sonophotocatalysis process has a futuristic application from an engineering and fundamental aspect in commercial applications. A detailed search of published reports was done and analyzed in this paper with respect to sonication, photocatalysis and advanced oxidation processes.

  2. [The Cinematographic Narration of the Posthumanism].

    PubMed

    Talavera, Pedro

    2015-01-01

    The cinema constitutes today the aesthetic forefront of the posthumanism and a powerful instance of reflection on the posthuman future. In its more futurist dimension, the films present an evolutionary irreversible process linked to the technological development, which will determine the end of the human kind and its birth to a new posthuman reality. But it turns out paradoxical that the process of dehumanization of the human beings appears like inevitable and, nevertheless, appears as ideally Utopian the desire of humanization of the androids (to support the human values beyond the human kind). In consequence, the cinematographic reflection on posthumanism seems to be headed not towards the appearance of a new nature but towards the recovery of the genuine human values.

  3. Evolution of a Simulation Testbed into an Operational Tool

    NASA Technical Reports Server (NTRS)

    Sheth, Kapil; Bilimoria, Karl D.; Sridhar, Banavar; Sterenchuk, Mike; Niznik, Tim; O'Neill, Tom; Clymer, Alexis; Gutierrez Nolasco, Sebastian; Edholm, Kaj; Shih, Fu-Tai

    2017-01-01

    This paper describes the evolution over a 20-year period of the Future ATM (Air Traffic Management) Concepts Evaluation Tool (FACET) from a National Airspace System (NAS) based simulation testbed into an operational tool. FACET was developed as a testbed for assessing futuristic ATM concepts, e.g., automated conflict detection and resolution. NAS Constraint Evaluation and Notification Tool (NASCENT) is an application, within FACET, for alerting airspace users of inefficiencies in flight operations and advising time- and fuel-saving reroutes.It is currently in use at American Airlines Integrated Operations Center in Fort Worth, TX. The concepts assessed,research conducted, and the operational capability developed, along with the NASA support and achievements are presented in this paper.

  4. Insider Threat Security Reference Architecture

    DTIC Science & Technology

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  5. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2008-06-01

    1 1.1. Political Stability .....................................................................................................1...Section 1—Stability and Security 1.1 Political Stability With recent improvements in security, the current political environment in Iraq is

  6. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    DTIC Science & Technology

    2010-12-01

    Methodology RMAT Risk Management Assessment Tool SIDA Security Identification Display Area SIGINT Signals Intelligence SO18 Aviation Security...aircraft operate (§ 1542.203); • Provide detection and physical security measures for the “Security Identification Display Area” ( SIDA ), i.e., the area

  7. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  8. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  9. Securing, Stabilizing, and Rebuilding Iraq: Key Issues for Congressional Oversight

    DTIC Science & Technology

    2007-01-01

    Been Constrained by Security, Management , and Funding Challenges 72 U.S. Military Readiness 79 Enclosure XII: Extended Operations Have Had...Forces Have Resulted in Shortages of Critical Items 92 Improving Acquisition Outcomes 97 Enclosure XV: DOD Needs to Improve Its Capacity to Manage ...International Monetary Fund IRMO Iraq Reconstruction Management Office IRRF Iraqi Relief and Reconstruction Fund ISF Iraqi security forces ISFF

  10. JPRS Report, Soviet Union: Political Affairs

    DTIC Science & Technology

    1988-03-22

    or to secure high profits. The decisions that are made frequently differ from one another, heated debates ensue, and, as we know, the truth emerges... securely attached to production. An analysis conducted among workers in Frunze who were discharged showed that they were usually young people between...no improvement in contract discipline, the necessary growth rates of labor productivity and improvement in product quality are not secured , the

  11. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  12. Combining spatial domain multiplexing and orbital angular momentum of photon-based multiplexing to increase the bandwidth of optical fiber communication systems

    NASA Astrophysics Data System (ADS)

    Murshid, Syed; Alanzi, Saud; Hridoy, Arnob; Lovell, Gregory L.; Parhar, Gurinder; Chakravarty, Abhijit; Chowdhury, Bilas

    2016-06-01

    Spatial domain multiplexing/space division multiplexing (SDM) can increase the bandwidth of existing and futuristic optical fibers by an order of magnitude or more. In the SDM technique, we launch multiple single-mode pigtail laser sources of the same wavelength into a carrier multimode fiber at different angles. The launching angles decide the output of the carrier fiber by allocating separate spatial locations for each channel. Each channel follows a helical trajectory while traversing the length of the carrier fiber, thereby allowing spatial reuse of optical frequencies. We launch light from five different single-mode pigtail laser sources (of same wavelength) at different angles (with respect to the axis of the carrier fiber) into the carrier fiber. Owing to helical propagation, five distinct concentric donut-shaped rings with negligible crosstalk at the output end of the fiber were obtained. These SDM channels also exhibit orbital angular momentum (OAM), thereby adding an extradegree of photon freedom. We present the experimental data of five spatially multiplexed channels and compare them with simulated results to show that this technique can potentially improve the data capacity of optical fibers by an order of magnitude: A factor of five using SDM and another factor of two using OAM.

  13. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2008-03-01

    1 1.1. Political Stability .....................................................................................................1...March 7, 2008 Section 1—Stability and Security 1.1 Political Stability During this reporting period, improvements in security led to more favorable

  14. An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment

    PubMed Central

    Muthurajan, Vinothkumar; Narayanasamy, Balaji

    2016-01-01

    Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level compared to asymmetric key (RSA, AES, and ECC) schemes. The presence of expired content and the irrelevant resources cause unauthorized data access adversely. This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. The HCSA-based auditing improves the malicious activity prediction during the data transfer. The duplication in the cloud server degrades the performance of EC-Schnorr based encryption schemes. This paper utilizes the blooming filter concept to avoid the cloud server duplication. The combination of EC-Schnorr and blooming filter efficiently improves the security performance. The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation. PMID:26981584

  15. An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment.

    PubMed

    Muthurajan, Vinothkumar; Narayanasamy, Balaji

    2016-01-01

    Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level compared to asymmetric key (RSA, AES, and ECC) schemes. The presence of expired content and the irrelevant resources cause unauthorized data access adversely. This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. The HCSA-based auditing improves the malicious activity prediction during the data transfer. The duplication in the cloud server degrades the performance of EC-Schnorr based encryption schemes. This paper utilizes the blooming filter concept to avoid the cloud server duplication. The combination of EC-Schnorr and blooming filter efficiently improves the security performance. The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation.

  16. Social security and mortality: the role of income support policies and population health in the United States.

    PubMed

    Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde

    2011-05-01

    Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.

  17. Energy Structure and Energy Security under Climate Mitigation Scenarios in China

    PubMed Central

    Matsumoto, Ken’ichi

    2015-01-01

    This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094

  18. Maritime security report. May 2000 [Organization of American States Tactical Advisory Group on Port Security

    DOT National Transportation Integrated Search

    2000-05-01

    The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...

  19. Aviation security : terrorist acts demonstrate urgent need to improve security at the nation's airports

    DOT National Transportation Integrated Search

    2001-09-20

    A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...

  20. Energy Independence and Security Act of 2007

    EPA Pesticide Factsheets

    This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.

  1. Transit Security Procedures Guide

    DOT National Transportation Integrated Search

    1994-12-01

    To protect passenger, employees, revenue, and property, transit systems are encouraged to take a proactive, prevention-oriented systems approach to transit security. This guide is a compilation of materials for planning and improving transit security...

  2. Towards improving software security by using simulation to inform requirements and conceptual design

    DOE PAGES

    Nutaro, James J.; Allgood, Glenn O.; Kuruganti, Teja

    2015-06-17

    We illustrate the use of modeling and simulation early in the system life-cycle to improve security and reduce costs. The models that we develop for this illustration are inspired by problems in reliability analysis and supervisory control, for which similar models are used to quantify failure probabilities and rates. In the context of security, we propose that models of this general type can be used to understand trades between risk and cost while writing system requirements and during conceptual design, and thereby significantly reduce the need for expensive security corrections after a system enters operation

  3. Exploring the impact of the 2008 global food crisis on food security among vulnerable households in rural South Africa

    PubMed Central

    Nawrotzki, Raphael J.; Robson, Kristin; Gutilla, Margaret J.; Hunter, Lori M.; Twine, Wayne; Norlund, Petra

    2015-01-01

    Recurring food crises endanger the livelihoods of millions of households in developing countries around the globe. Owing to the importance of this issue, we explore recent changes in food security between the years 2004 and 2010 in a rural district in Northeastern South Africa. Our study window spans the time of the 2008 global food crises and allows the investigation of its impacts on rural South African populations. Grounded in the sustainable livelihood framework, we examine differences in food security trajectories among vulnerable sub populations. A unique panel data set of 8,147 households, provided by the Agincourt Health and Demographic Surveillance System (Agincourt HDSS), allows us to employ a longitudinal multilevel modeling approach to estimate adjusted growth curves for the differential change in food security across time. We observe an overall improvement in food security that leveled off after 2008, most likely resulting from the global food crisis. In addition, we discover significant differences in food security trajectories for various sub populations. For example, female-headed households and those living in areas with better access to natural resources differentially improved their food security situation, compared to male-headed households and those households with lower levels of natural resource access. However, former Mozambican refugees witnessed a decline in food security. Therefore, poverty alleviation programs for the Agincourt region should work to improve the food security of vulnerable households, such as former Mozambican refugees. PMID:26594259

  4. Redefining Security. A Report by the Joint Security Commission

    DTIC Science & Technology

    1994-02-28

    security policies. This report offers recommendations on developing new strategies for achieving security within our infor-mation systems, including...better, and we outline methods of improving government and industry personnel security poli- cies. We offer recommendations on developing new strategies ... strategies , sufficient funding, and management attention if our comput- ers and networks are to protect the confidentiality, integrity, and availability of

  5. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  6. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  7. 76 FR 62420 - Statement of Organization, Functions and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... leadership, consultation, training, and management services for HRSA's enterprise computing environment; (2... responsibility with improved security management capabilities and improved alignment of current security... responsible for the organization, management, and administrative functions necessary to carry out the...

  8. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  9. Combating Terrorism in the Philippines to Improve U.S. Homeland Security

    DTIC Science & Technology

    2010-12-01

    IMPROVE U.S. HOMELAND SECURITY William E. Lowery Major, United States Air Force B.A., University of Missouri at Kansas City, 1996 M.S., Troy...departing from Manila.1 They also planned to crash an airliner into CIA headquarters. These acts directly threatened U.S. homeland security. The...in Southeast Asia, known as Jemaah Islamiyah (JI), have also been discovered since 9/11. In 2002, Philippine military forces repeatedly uncovered

  10. An Improved Quantum Proxy Blind Signature Scheme Based on Genuine Seven-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Yang, Yuan-Yuan; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-07-01

    An improved quantum proxy blind signature scheme based on controlled teleportation is proposed in this paper. Genuine seven-qubit entangled state functions as quantum channel. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is unforgeability, undeniability, blind and unconditionally secure. Meanwhile, we propose a trust party to provide higher security, the trust party is costless.

  11. Privacy vs usability: a qualitative exploration of patients' experiences with secure Internet communication with their general practitioner.

    PubMed

    Tjora, Aksel; Tran, Trung; Faxvaag, Arild

    2005-05-31

    Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces.

  12. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces. PMID:15998606

  13. [The psychological security in the framework of the system of factors responsible for the effectiveness of spa and health resort-based rehabilitation].

    PubMed

    Krasnyanskaya, T M; Tylets, V G

    The present work was designed to address the problem of ensuring the psychological security in the framework of organization of the rehabilitative treatment based at the spa and health resort facilities. We undertook the questionnaire study for which 650 subjects were recruited among those attending spa and health resort facilities of the cities of Essentuki and Kislovodsk. The participants were asked to estimate the level of their personal security and the quality of the provided means for the rehabilitative treatment and general health improvement. It was found that as many as 43% of the respondents reported the moderate level of psychological security whereas about 30% of them estimated the level of their psychological security as low. Overall, the attitude toward the available means for health improvement and rehabilitation proved extremely variable. The factorial analysis has demonstrated the highly subjective opinions of the responders as regards the provided services categorized in terms of therapeutic (mineral water, preformed physical factors, peloid and dietary therapy), health improvement (herbal medicine, therapeutic physical training, therapy, bioclimatic therapy), and recreational (animation, excursion and touristic activities) factors. The value of these factors was perceived differently by the vacationers with different feelings of psychological security. Those reporting the high level of psychological security demonstrated the positive attitude toward all factors and circumstances available for the general improvement of the health status whereas the holidaymakers reporting the moderate level of personal psychological security exhibited the non-equivalent attitude toward the provided services; namely, they highly estimated the available therapeutic factors but either underestimated the value of the constituent components of the health improving and recreational factors or demonstrated the very selective attitude toward their assessment. Generally speaking, the feeling of personal psychological security in the participants of the study reflected their subjective approach to structuralization and differentiation of the factors underlying the effectiveness, final outcome, and psychological security of the spa and health resort-based rehabilitative treatment. The results of the present study give evidence of the paramount importance of personal psychological security as a most important factor contributing to the solution of problems facing the practice of the rehabilitation treatment based at the spa and health resort facilities. This work should be organized taking into consideration the necessity to ensure the feeling of personal security and psychological comfort in the holidaymakers as an indispensable prerequisite for the successful rehabilitative treatment of the vacationers and meeting the requirements of the holidaymakers.

  14. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  15. Aviation Security: Vulnerabilities in, and Alternatives for, Preboard Screening Security Operations

    DTIC Science & Technology

    2001-09-25

    establishing the certification program. This regulation is particularly significant because it is to include requirements mandated by the Airport Security Improvement...Assessment of Airport Security Screener Performance and Retention, Sept. 15, 2000. Page 8 GAO-01-1171T Criteria for Assessing Shifting responsibility for...airline and airport security officials to assess each option for reassigning screening responsibility against the key criteria- Specifically, we asked

  16. Introducing the CERT (Trademark) Resiliency Engineering Framework: Improving the Security and Sustainability Processes

    DTIC Science & Technology

    2007-05-01

    business processes and services. 4. Security operations management addresses the day-to-day activities that the organization performs to protect the...Management TM – Technology Management Security Operations Management SOM – Security Operations Management 5.7.2 Important Operations Competency...deals with the provision of access rights to informa- tion and technical assets SOM – Security Operations Management , which addresses the fundamental

  17. Analyzing Cases of Resilience Success and Failure - A Research Study

    DTIC Science & Technology

    2012-12-01

    controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring

  18. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.

  19. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less

  20. Interaction of inorganic nanoparticles with graphene.

    PubMed

    Das, Barun; Choudhury, Biswajit; Gomathi, A; Manna, Arun K; Pati, S K; Rao, C N R

    2011-04-04

    The changes in the electronic and magnetic properties of graphene induced by interaction with semiconducting oxide nanoparticles such as ZnO and TiO(2) and with magnetic nanoparticles such as Fe(3)O(4), CoFe(2)O(4), and Ni are investigated by using Raman spectroscopy, magnetic measurements, and first-principles calculations. Significant electronic and magnetic interactions between the nanoparticles and graphene are found. The findings suggest that changes in magnetization as well as the Raman shifts are directly linked to charge transfer between the deposited nanoparticles and graphene. The study thus demonstrates significant effects in tailoring the electronic structure of graphene for applications in futuristic electronic devices. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Bioartificial organ support for hepatic, renal, and hematologic failure.

    PubMed

    Maguire, P J; Stevens, C; Humes, H D; Shander, A; Halpern, N A; Pastores, S M

    2000-10-01

    The current strategy to the treatment of SIRS and MODS uses a multidisciplinary approach that emphasizes supportive therapy. Herein, we have presented a futuristic approach that focuses on replacing the function of failed organs using bioartificial technology (Table 1). Bioartificial organ technology may allow the intensivist to provide physiologic organ replacement either as a bridge to transplantation or as a "time-buying" element until native organs that have become acutely dysfunctional or nonfunctional in a variety of clinical settings, can recover their function or regenerate their mass. As bioartificial organ technology matures, it is conceivable as an ultimate goal that non-immunogenic bioartificial organs would be miniaturized or redesigned and acutely placed within the intracorporeal space as replacement organs.

  2. Robotics in invasive cardiac electrophysiology.

    PubMed

    Shurrab, Mohammed; Schilling, Richard; Gang, Eli; Khan, Ejaz M; Crystal, Eugene

    2014-07-01

    Robotic systems allow for mapping and ablation of different arrhythmia substrates replacing hand maneuvering of intracardiac catheters with machine steering. Currently there are four commercially available robotic systems. Niobe magnetic navigation system (Stereotaxis Inc., St Louis, MO) and Sensei robotic navigation system (Hansen Medical Inc., Mountain View, CA) have an established platform with at least 10 years of clinical studies looking at their efficacy and safety. AMIGO Remote Catheter System (Catheter Robotics, Inc., Mount Olive, NJ) and Catheter Guidance Control and Imaging (Magnetecs, Inglewood, CA) are in the earlier phases of implementations with ongoing feasibility and some limited clinical studies. This review discusses the advantages and limitations related to each existing system and highlights the ideal futuristic robotic system that may include the most promising features of the current ones.

  3. Social security and mortality: The role of income support policies and population health in the United States

    PubMed Central

    Arno, Peter S.; House, James S.; Viola, Deborah; Schechter, Clyde

    2011-01-01

    Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health. PMID:21326333

  4. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  5. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    ERIC Educational Resources Information Center

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  6. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  7. Bio-Security Proficiencies Project for Beginning Producers in 4-H

    ERIC Educational Resources Information Center

    Smith, Martin H.; Meehan, Cheryl L.; Borba, John A.

    2014-01-01

    Improving bio-security practices among 4-H members who raise and show project animals is important. Bio-security measures can reduce the risk of disease spread and mitigate potential health and economic risks of disease outbreaks involving animal and zoonotic pathogens. Survey data provided statistical evidence that the Bio-Security Proficiencies…

  8. Near-Term Options for Improving Security at Los Angeles International Airport

    DTIC Science & Technology

    2004-09-26

    the Transportation Security Administration (TSA), the Los Angeles Police Department ( LAPD ), and LAX to make sure the list was reasonable...World Airports; the Transportation Security Agency; the Los Angeles International Airport Police Department ; the Los Angeles Police Department ; the Los ...Airports. iii PREFACE This document assesses near-term security

  9. Aviation security : vulnerabilities still exist in the aviation security system

    DOT National Transportation Integrated Search

    2000-04-06

    The testimony today discusses the Federal Aviation Administration's (FAA) efforts to implement and improve security in two key areas: air traffic control computer systems and airport passenger screening checkpoints. Computer systems-and the informati...

  10. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    PubMed

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit

    2017-01-01

    Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated into general hospitals/healthcare facilities. The findings of this study highlight topics that could be used for improving management and operation of information system and revising guidelines and regulations on protection measures/strategies for data security and confidentiality of HIV/AIDS patients by Vietnam health authorities or other countries facing similar situations. Secure infrastructure and secure measures for data access and use are very important, worthwhile investments. The provision of continuous training and active enforcement and monitoring of the practices of healthcare personnel might lead to an improved understanding and acknowledegement of the importance of national policies/guidelines regarding HIV-related patient information.

  11. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    NASA Astrophysics Data System (ADS)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  12. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    NASA Astrophysics Data System (ADS)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  13. 78 FR 27966 - Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-13

    ... Working Group on Improving Cybersecurity and Resilience Through Acquisition AGENCY: Office of Emergency... the Department of Homeland Security and the Federal Acquisition Regulation Council, are required to... security standards into acquisition planning and contract administration and address what steps [[Page...

  14. Maritime Security. Coast Guard Inspections Identify and Correct Facility Deficiencies, but More Analysis Needed of Program’s Staffing, Practices, and Data

    DTIC Science & Technology

    2008-02-01

    to the process to increase security may have economic consequences.7 Actions to improve security are undertaken with the knowledge that total ...inspections, and improve its facility compliance data. The Department of Homeland Security agreed with GAO’s recommendations. W r f e i o c r U p d w...A c U i s a c c g c r T p u w o a d c i T S To view the full product , including the scope and methodology, click on GAO-08-12. For more

  15. Socio-economic determinants of household food security and women's dietary diversity in rural Bangladesh: a cross-sectional study.

    PubMed

    Harris-Fry, Helen; Azad, Kishwar; Kuddus, Abdul; Shaha, Sanjit; Nahar, Badrun; Hossen, Munir; Younes, Leila; Costello, Anthony; Fottrell, Edward

    2015-07-10

    There has been limited decline in undernutrition rates in South Asia compared with the rest of Asia and one reason for this may be low levels of household food security. However, the evidence base on the determinants of household food security is limited. To develop policies intended to improve household food security, improved knowledge of the determinants of household food security is required. Household data were collected in 2011 from a randomly selected sample of 2,809 women of reproductive age. The sample was drawn from nine unions in three districts of rural Bangladesh. Multinomial logistic regression was conducted to measure the relationship between selected determinants of household food security and months of adequate household food provisioning, and a linear regression to measure the association between the same determinants and women's dietary diversity score. The analyses found that land ownership, adjusted relative risk ratio (RRR) 0.28 (CI 0.18, 0.42); relative wealth (middle tertile 0.49 (0.29, 0.84) and top tertile 0.18 (0.10, 0.33)); women's literacy 0.64 (0.46, 0.90); access to media 0.49 (0.33, 0.72); and women's freedom to access the market 0.56 (0.36, 0.85) all significantly reduced the risk of food insecurity. Larger households increased the risk of food insecurity, adjusted RRR 1.46 (CI 1.02, 2.09). Households with vegetable gardens 0.20 (0.11, 0.31), rich households 0.46 (0.24, 0.68) and literate women 0.37 (0.20, 0.54) were significantly more likely to have better dietary diversity scores. Household food insecurity remains a key public health problem in Bangladesh, with households suffering food shortages for an average of one quarter of the year. Simple survey and analytical methods are able to identify numerous interlinked factors associated with household food security, but wealth and literacy were the only two determinants associated with both improved food security and dietary diversity. We cannot conclude whether improvements in all determinants are necessarily needed to improve household food security, but new and existing policies that relate to these determinants should be designed and monitored with the knowledge that they could substantially influence the food security and nutritional status of the population.

  16. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  17. GPs' role security and therapeutic commitment in managing alcohol problems: a randomised controlled trial of a tailored improvement programme.

    PubMed

    Keurhorst, Myrna; van Beurden, Ivonne; Anderson, Peter; Heinen, Maud; Akkermans, Reinier; Wensing, Michel; Laurant, Miranda

    2014-04-17

    General practitioners with more positive role security and therapeutic commitment towards patients with hazardous or harmful alcohol consumption are more involved and manage more alcohol-related problems than others. In this study we evaluated the effects of our tailored multi-faceted improvement implementation programme on GPs' role security and therapeutic commitment and, in addition, which professional related factors influenced the impact of the implementation programme. In a cluster randomised controlled trial, 124 GPs from 82 Dutch general practices were randomised to either the intervention or control group. The tailored, multi-faceted programme included combined physician, organisation, and patient directed alcohol-specific implementation strategies to increase role security and therapeutic commitment in GPs. The control group was mailed the national guideline and patients received feedback letters. Questionnaires were completed before and 12 months after start of the programme. We performed linear multilevel regression analysis to evaluate effects of the implementation programme. Participating GPs were predominantly male (63%) and had received very low levels of alcohol related education before start of the study (0.4 h). The programme increased therapeutic commitment (p = 0.005; 95%-CI 0.13 - 0.73) but not role security (p = 0.58; 95%-CI -0.31 - 0.54). How important GPs thought it was to improve their care for problematic alcohol consumption, and the GPs' reported proportion of patients asked about alcohol consumption at baseline, contributed to the effect of the programme on therapeutic commitment. A tailored, multi-faceted programme aimed at improving GP management of patients with hazardous and harmful alcohol consumption improved GPs' therapeutic commitment towards patients with alcohol-related problems, but failed to improve GPs' role security. How important GPs thought it was to improve their care for problematic alcohol consumption, and the GPs' reported proportion of patients asked about alcohol consumption at baseline, both increased the impact of the programme on therapeutic commitment. It might be worthwhile to monitor proceeding of role security and therapeutic commitment throughout the year after the implementation programme, to see whether the programme is effective on short term but faded out on the longer term. ClinicalTrials.gov Identifier: NCT00298220.

  18. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  19. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  20. Information Security: Serious Weakness Put State Department and FAA Operations at Risk

    DOT National Transportation Integrated Search

    1998-05-19

    Testimony focuses on the results of recent reviews of computer security at the Department of State and the Federal Aviation Administration (FAA). Makes specific recommendations for improving State and FAA's information security posture. Highlights be...

  1. Simple bridge security inspection : final report, September 2006.

    DOT National Transportation Integrated Search

    2006-09-01

    Bridges are among the most visible targets for terrorists since their destruction will have an : immediate as well as long-term economical and psychological impact on the nation. : Enhancing bridge security is key to improving homeland security and i...

  2. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  3. Re-designing the PhEDEx Security Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, C.-H.; Wildish, T.; Zhang, X.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less

  4. Re-designing the PhEDEx Security Model

    NASA Astrophysics Data System (ADS)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  5. U.S. Pacific Command Theater Security Cooperation: A Building Block to Cooperative Security in the Asia Pacific Region

    DTIC Science & Technology

    2010-03-17

    the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed

  6. Investigation on Covert Channel Attacks and Countermeasures in the Cloud

    DTIC Science & Technology

    2017-03-29

    ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to shaping the...step to stay ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to

  7. Water security evaluation in Yellow River basin

    NASA Astrophysics Data System (ADS)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  8. Policy Framework for Addressing Personal Security Issues Concerning Women and Girls. National Strategy on Community Safety and Crime Prevention.

    ERIC Educational Resources Information Center

    National Crime Prevention Centre, Ottawa (Ontario).

    This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…

  9. How Attitude toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention

    ERIC Educational Resources Information Center

    Johnson, David P.

    2017-01-01

    The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…

  10. Ways to Improve DoD 8570 IY Security Certification

    ERIC Educational Resources Information Center

    Bates, Justin D.

    2017-01-01

    The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…

  11. Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets

    DTIC Science & Technology

    2001-11-09

    COMPUTER SECURITY Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Statement of Robert F. Dacey Director, Information...Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Contract Number Grant Number Program Element Number Author(s...The benefits have been enormous. Vast amounts of information are now literally at our fingertips, facilitating research on virtually every topic

  12. Programs That Support Safety and Security for the Transit Industry

    DOT National Transportation Integrated Search

    2001-03-01

    FTA's Office of Safety and Security (Office) directly supports the U.S. Department of Transportation's safety goals through a series of programs designed to maintain continuous improvement in the safety and security of our nation's transit systems. T...

  13. Improving computer security by health smart card.

    PubMed

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual national implementation of the CPS project and the introduction of new functions using electronic signatures and encryption.

  14. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009-2014.

    PubMed

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G

    2016-05-01

    The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.

  15. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009–2014

    PubMed Central

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.

    2016-01-01

    Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842

  16. Report: EPA Needs to Improve Physical Security at Its Offices in Las Vegas, Nevada

    EPA Pesticide Factsheets

    Report #10-P-0059, February 3, 2010. EPA needs to improve physical security at its Las Vegas facilities. The Las Vegas Finance Center’s (LVFC’s) server room and other key areas are susceptible to unauthorized access by personnel not a part of LVFC.

  17. Asian Educational Discourse: Construction of Ontological Security

    ERIC Educational Resources Information Center

    Khalina, Natalya V.; Kovaleva, Alla V.; Voronin, Maksim S.; Anikin, Denis V.; Valyulina, Ekaterina V.

    2018-01-01

    This article considers the problem of ontology security through Asian educational discourse, which is structurally determined by the process of moral self-improvement. Considered are trends in improving the management of educational system by developing the culture of quality, which is considered as the next stage of the Asian education systems…

  18. Library Operations Policies and Procedures, Volume 2. Central Archive for Reusable Defense Software (CARDS)

    DTIC Science & Technology

    1994-02-28

    improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are...and Franchisees . A Potential User is an individual who requests a Library Account. A User Recruit has been sent a CARDS Library Account Registration

  19. An authentication infrastructure for today and tomorrow

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Engert, D.E.

    1996-06-01

    The Open Software Foundation`s Distributed Computing Environment (OSF/DCE) was originally designed to provide a secure environment for distributed applications. By combining it with Kerberos Version 5 from MIT, it can be extended to provide network security as well. This combination can be used to build both an inter and intra organizational infrastructure while providing single sign-on for the user with overall improved security. The ESnet community of the Department of Energy is building just such an infrastructure. ESnet has modified these systems to improve their interoperability, while encouraging the developers to incorporate these changes and work more closely together tomore » continue to improve the interoperability. The success of this infrastructure depends on its flexibility to meet the needs of many applications and network security requirements. The open nature of Kerberos, combined with the vendor support of OSF/DCE, provides the infrastructure for today and tomorrow.« less

  20. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  1. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  2. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    EPA Pesticide Factsheets

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  3. 78 FR 20705 - Fixed Income Roundtable

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... of fixed income markets. The roundtable will focus on the municipal securities, corporate bonds, and... corporate bonds and asset-backed securities. The participants in the third panel will discuss potential... discuss potential improvements to the market structure for corporate bonds and asset-backed securities...

  4. 77 FR 5734 - New Medical Criteria for Evaluating Language and Speech Disorders

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ... Medical Criteria for Evaluating Language and Speech Disorders AGENCY: Social Security Administration... Security numbers or medical information. 1. Internet: We strongly recommend that you submit your comments... INFORMATION CONTACT: Cheryl A. Williams, Office of Medical Listings Improvement, Social Security...

  5. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    PubMed

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  6. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali.

    PubMed

    Borresen, Erica C; Stone, Cordelia; Boré, Abdoulaye; Cissoko, Alima; Maiga, Ababacar; Koita, Ousmane A; Ryan, Elizabeth P

    2016-06-08

    Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community's needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM) for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage). The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage). The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  7. A Framework for Policies and Practices to Improve Test Security Programs: Prevention, Detection, Investigation, and Resolution (PDIR)

    ERIC Educational Resources Information Center

    Ferrara, Steve

    2017-01-01

    Test security is not an end in itself; it is important because we want to be able to make valid interpretations from test scores. In this article, I propose a framework for comprehensive test security systems: prevention, detection, investigation, and resolution. The article discusses threats to test security, roles and responsibilities, rigorous…

  8. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  9. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    PubMed

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  10. Facial emotion recognition and sleep in mentally disordered patients: A natural experiment in a high security hospital.

    PubMed

    Chu, Simon; McNeill, Kimberley; Ireland, Jane L; Qurashi, Inti

    2015-12-15

    We investigated the relationship between a change in sleep quality and facial emotion recognition accuracy in a group of mentally-disordered inpatients at a secure forensic psychiatric unit. Patients whose sleep improved over time also showed improved facial emotion recognition while patients who showed no sleep improvement showed no change in emotion recognition. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  11. Cryptanalysis of "an improvement over an image encryption method based on total shuffling"

    NASA Astrophysics Data System (ADS)

    Akhavan, A.; Samsudin, A.; Akhshani, A.

    2015-09-01

    In the past two decades, several image encryption algorithms based on chaotic systems had been proposed. Many of the proposed algorithms are meant to improve other chaos based and conventional cryptographic algorithms. Whereas, many of the proposed improvement methods suffer from serious security problems. In this paper, the security of the recently proposed improvement method for a chaos-based image encryption algorithm is analyzed. The results indicate the weakness of the analyzed algorithm against chosen plain-text.

  12. Practices in security and confidentiality of HIV/AIDS patients’ information: A national survey among staff at HIV outpatient clinics in Vietnam

    PubMed Central

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan

    2017-01-01

    Introduction Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. Methods A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. Results In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44–9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39–11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36–11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93–10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29–3.65). Conclusions Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated into general hospitals/healthcare facilities. The findings of this study highlight topics that could be used for improving management and operation of information system and revising guidelines and regulations on protection measures/strategies for data security and confidentiality of HIV/AIDS patients by Vietnam health authorities or other countries facing similar situations. Secure infrastructure and secure measures for data access and use are very important, worthwhile investments. The provision of continuous training and active enforcement and monitoring of the practices of healthcare personnel might lead to an improved understanding and acknowledegement of the importance of national policies/guidelines regarding HIV-related patient information. PMID:29136017

  13. Secure Messaging in Electronic Health Records and Its Impact on Diabetes Clinical Outcomes: A Systematic Review.

    PubMed

    Kuo, Alyce; Dang, Stuti

    2016-09-01

    In 2009, President Barack Obama signed into law the Health Information Technology for Economic and Clinical Health (HITECH) Act, which aims for the universal adoption of electronic health records (EHRs) in primary care settings and "meaningful use" of this technology. The objectives of "meaningful use" are well defined and executed in stages; one of the objectives of stage 2, beginning in 2014, was implementation of a secure messaging system between patients and providers. Secure messaging has been shown to positively affect patients who struggle with managing chronic diseases on a day to day basis. This review aims to assess the clinical evidence supporting the use of secure messaging in EHRs in self-management of diabetes. A systematic search of PubMed was conducted, and 320 results were returned. Of these, 11 were selected based on outlined criteria. Evidence from 7 of the 11 included studies suggests significant improvement in patients' hemoglobin A1c (HbA1c) with the use of secure messaging. However, improvements in patients' secondary outcomes, such as blood pressure and cholesterol, were inconsistent. Further work must be done to determine how to best maximize the potential of available tools such as secure messaging and EHRs to improve patient outcomes.

  14. Can experience-based household food security scales help improve food security governance?

    PubMed

    Pérez-Escamilla, Rafael

    2012-12-01

    Experience-based food security scales (EBFSSs) have been shown to be valid across world regions. EBFSSs are increasingly been included in national food and nutrition assessments and food hardship items have been added to regional and global public opinion polls. EBFSSs meet the SMART criteria for identifying useful indicators. And have the potential to help improve accountability, transparency, intersectoral coordination and a more effective and equitable distribution of resources. EBFSSs have increased awareness about food and nutrition insecurity in the court of public opinion. Thus, it's important to understand the potential that EBFSSs have for improving food and nutrition security governance within and across countries. The case of Brazil illustrates the strong likelihood that EBFSSs do have a strong potential to influence food and governance from the national to the municipal level. A recent Gallup World Poll data analysis on the influence of the '2008 food crisis' on food hardship illustrates how even a single item from EBFSSs can help examine if food security governance in different world regions modifies the impact of crises on household food insecurity. Systematic research that bridges across economics, political science, ethics, public health and program evaluation is needed to better understand if and how measurement in general and EBFSSs in particular affect food security governance.

  15. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  16. Securities law: the spreading fire of investor claims

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mouer, R.

    All states now have a Blue Skylaw, a statute regulating the sale of securities to persons within that state. These laws define oil and gas interests to be securities and improve regulations upon their sale. The securities laws require that whenever oil and gas interests are sold, the person selling must register the interests and must himself be registered as a securities dealer. There are exemptions from registration under the federal and state laws. These exemptions were discussed. (DP)

  17. 78 FR 48029 - Improving Chemical Facility Safety and Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... responding to risks in chemical facilities (including during pre-inspection, inspection execution, post.... Sec. 2. Establishment of the Chemical Facility Safety and Security Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary...

  18. Report: EPA’s Office of Environmental Information Should Improve Ariel Rios and Potomac Yard Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.

  19. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  20. Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks

    NASA Astrophysics Data System (ADS)

    Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie

    2018-01-01

    The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.

  1. Supplemental nutrition assistance program participation and child food security.

    PubMed

    Mabli, James; Worthington, Julie

    2014-04-01

    This article investigates the association between Supplemental Nutrition Assistance Program (SNAP) participation and child food security by using data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 3000 households with children and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 months. Next, by using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 months later. Multivariate logistic regression analysis was used to estimate associations between SNAP and child food security. SNAP participation was associated with an approximately one-third decrease in the odds of children being food insecure in both samples. In the cross-sectional analysis only, SNAP was also associated with a decrease in the odds of children experiencing severe food insecurity (designated very low food security). Findings were qualitatively robust to different empirical specifications. After controlling for other possible confounders, we found children in households that had participated in SNAP for 6 months experienced improvements in food security. On the basis of these findings, we conclude SNAP serves a vital role in improving the health and well-being of low-income children by increasing food security. Future research is needed to determine whether specific groups of children experience differential improvements in food security.

  2. Scientific developments of liquid crystal-based optical memory: a review

    NASA Astrophysics Data System (ADS)

    Prakash, Jai; Chandran, Achu; Biradar, Ashok M.

    2017-01-01

    The memory behavior in liquid crystals (LCs), although rarely observed, has made very significant headway over the past three decades since their discovery in nematic type LCs. It has gone from a mere scientific curiosity to application in variety of commodities. The memory element formed by numerous LCs have been protected by patents, and some commercialized, and used as compensation to non-volatile memory devices, and as memory in personal computers and digital cameras. They also have the low cost, large area, high speed, and high density memory needed for advanced computers and digital electronics. Short and long duration memory behavior for industrial applications have been obtained from several LC materials, and an LC memory with interesting features and applications has been demonstrated using numerous LCs. However, considerable challenges still exist in searching for highly efficient, stable, and long-lifespan materials and methods so that the development of useful memory devices is possible. This review focuses on the scientific and technological approach of fascinating applications of LC-based memory. We address the introduction, development status, novel design and engineering principles, and parameters of LC memory. We also address how the amalgamation of LCs could bring significant change/improvement in memory effects in the emerging field of nanotechnology, and the application of LC memory as the active component for futuristic and interesting memory devices.

  3. Scientific developments of liquid crystal-based optical memory: a review.

    PubMed

    Prakash, Jai; Chandran, Achu; Biradar, Ashok M

    2017-01-01

    The memory behavior in liquid crystals (LCs), although rarely observed, has made very significant headway over the past three decades since their discovery in nematic type LCs. It has gone from a mere scientific curiosity to application in variety of commodities. The memory element formed by numerous LCs have been protected by patents, and some commercialized, and used as compensation to non-volatile memory devices, and as memory in personal computers and digital cameras. They also have the low cost, large area, high speed, and high density memory needed for advanced computers and digital electronics. Short and long duration memory behavior for industrial applications have been obtained from several LC materials, and an LC memory with interesting features and applications has been demonstrated using numerous LCs. However, considerable challenges still exist in searching for highly efficient, stable, and long-lifespan materials and methods so that the development of useful memory devices is possible. This review focuses on the scientific and technological approach of fascinating applications of LC-based memory. We address the introduction, development status, novel design and engineering principles, and parameters of LC memory. We also address how the amalgamation of LCs could bring significant change/improvement in memory effects in the emerging field of nanotechnology, and the application of LC memory as the active component for futuristic and interesting memory devices.

  4. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    DTIC Science & Technology

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  5. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    NASA Astrophysics Data System (ADS)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  6. Improved child behavioural and emotional functioning after Circle of Security 20-week intervention.

    PubMed

    Huber, Anna; McMahon, Catherine; Sweller, Naomi

    2015-01-01

    This study examined the efficacy of the attachment-based Circle of Security 20-week intervention in improving child behavioural and emotional functioning. Participants were 83 parents of children (1-7 years) referred to a clinical service with concerns about their young children's behaviour. Parents (and teachers, when available) completed questionnaires assessing child protective factors, behavioural concerns, internalizing and externalizing problems, prior to and immediately after the intervention. The following were considered as potential moderators: child gender and age, parent representations, reflective functioning, child attachment indices and severity of presenting problems, prior to treatment. Results showed significant improvement for parent ratings of child protective factors, behavioural concerns, internalizing and externalizing symptoms, all ps < .05, and children with more severe problems showed most improvement. Teachers also reported improvements, but change was significant only for externalizing problems (p = .030). Findings suggest Circle of Security is effective in improving child behavioural and emotional functioning in clinically referred children aged 1-7 years.

  7. Report: EPA’s Radiation and Indoor Environments National Laboratory Should Improve Its Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.

  8. Developing a Security Profile.

    ERIC Educational Resources Information Center

    Woodcock, Chris

    1999-01-01

    Examines the questions schools should address when re-evaluating how to protect people, property, and assets. Questions addressed include where and how to begin to improve security in a school, getting the most protection economically, establishing where electronic security should be used, using surveillance cameras and systems, and what the role…

  9. Integrating Programming Language and Operating System Information Security Mechanisms

    DTIC Science & Technology

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  10. Cyber Hygiene for Control System Security

    DOE PAGES

    Oliver, David

    2015-10-08

    There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.

  11. Correlation Research of Medical Security Management System Network Platform in Medical Practice

    NASA Astrophysics Data System (ADS)

    Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang

    Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.

  12. A review on detection methods used for foodborne pathogens

    PubMed Central

    Priyanka, B.; Patil, Rajashekhar K.; Dwarakanath, Sulatha

    2016-01-01

    Foodborne pathogens have been a cause of a large number of diseases worldwide and more so in developing countries. This has a major economic impact. It is important to contain them, and to do so, early detection is very crucial. Detection and diagnostics relied on culture-based methods to begin with and have developed in the recent past parallel to the developments towards immunological methods such as enzyme-linked immunosorbent assays (ELISA) and molecular biology-based methods such as polymerase chain reaction (PCR). The aim has always been to find a rapid, sensitive, specific and cost-effective method. Ranging from culturing of microbes to the futuristic biosensor technology, the methods have had this common goal. This review summarizes the recent trends and brings together methods that have been developed over the years. PMID:28139531

  13. Let's Get Small: An Introduction to Transitional Issues in Nanotech and Intellectual Property.

    PubMed

    Koepsell, David

    2009-08-01

    Much of the discussion regarding nanotechnology centers around perceived and prosphesied harms and risks. While there are real risks that could emerge from futuristic nanotechnology, there are other current risks involved with its development, not involving physical harms, that could prevent its full promise from being realized. Transitional forms of the technology, involving "microfab," or localized, sometimes desk-top, manufacture, pose a good opportunity for case study. How can we develop legal and regulatory institutions, specifically centered around the problems of intellectual property, that both stimulate innovation, and make the best possible use of what will eventually be a market in "types" rather than "tokens"? This paper argues that this is the most critical, current issues facing nanotechnology, and suggests a manner to approach it.

  14. Study of BSA protein adsorption/release on hydroxyapatite nanoparticles

    NASA Astrophysics Data System (ADS)

    Swain, Sanjaya Kumar; Sarkar, Debasish

    2013-12-01

    Three different spherical, rod and fibrous morphologies of hydroxyapatite (HA) nanoparticles have been prepared through control over the processing parameters like temperature, pH and Ca:P ratio. Protein adsorption/release with respect to HA nanoparticle morphologies are investigated using model protein bovine serum albumin (BSA). BSA adsorption on HA nanoparticles follows Langmuir adsorption isotherm. Thermal analysis and FT-IR spectrum confirms the BSA adhesion and retention of their secondary structure. High surface area with high Ca:P ratio nanorod adsorbs relatively more amount (28 mg BSA/gm of nanorod HA) of BSA within 48 h in comparison with counterpart fibroid and spherical morphologies. Slow and steady BSA release (75 wt% of adsorbed BSA in 96 h) from nanorod HA is found as futuristic drug delivery media.

  15. From vision to reality: strategic agility in complex times.

    PubMed

    Soule, Barbara M

    2002-04-01

    Health care is experiencing turbulent times. Change has become the constant. Complexity and sometimes chaos are common characteristics. Within this context, infection control professionals strive to maintain their practices, achieve excellence, and plan for the future. As demands shift and expectations increase, professionals in infection surveillance, prevention, and control (ISPC) programs must develop strategic agility. This article describes the rationale for strategic thinking and action set within a framework of 6 thought-provoking questions. It also describes a number of techniques to use for thinking strategically, such as designing visions, becoming entrepreneurial, and engaging in creative and futuristic exercises to evaluate possibilities for program direction. These techniques can guide individual professionals or ISPC programs in strategic decision-making that will increase the ability to survive and succeed in the future.

  16. Galaxy Gadgeteers: Architects in Space

    NASA Astrophysics Data System (ADS)

    Morris, M. S.

    This essay explores interdisciplinary themes finding links between architecture, science and science fiction. A character from Douglas Adams' Hitchhiker's Guide series is presented as an archetypical architect charged with designing planets. The author offers diverse examples of other architectural projects dealing with vast planetary and interplanetary scales. The design of space colonies within Dyson Spheres and Torus Rings is examined with an eye to precedents from architectural history. Speculative space colony designs pursued by NASA are critiqued as awkward assemblages of futuristic fantasy and nostalgia. Contemporary architectural projects are presented, revealing the scalar adaptability or looseness of certain architects with strong stylistic tendencies. The paper concludes by examining partly unrealized designs for an Enlightenment utopian town and how themes inspired by the image of the solar system move from spatial and formal arrangements to pictorial and metaphorical depictions.

  17. Putting Fuel Cells to the Test

    NASA Technical Reports Server (NTRS)

    2003-01-01

    If research has its way, an electrochemical device capable of converting energy into electricity and heat will become the impetus behind the next generation of automobiles, superseding the internal combustible engine found under the hoods of vehicles that rule the road today. The thought of fuel cell technology being able to accomplish such a feat may be dismissed as too futuristic by some, but the truth is that fuel cells have been in play as a source of propulsion since the 1960s, when NASA first used them to generate power onboard the Gemini and Apollo spacecraft for extended space missions. Even more unknown is the fact that fuel cells were and continue to be a source of drinking water for astronauts in orbit, since they produce pure water as a by-product.

  18. Elevated Temperature Crack Growth Behavior in HSCT Structural Materials

    NASA Technical Reports Server (NTRS)

    Saxena, Ashok

    1998-01-01

    Structures in super-sonic aircraft are subjected to conditions of high temperature and cyclic and sustained loading for extended periods of time. The durability of structures fabricated from aluminum and certain titanium alloys in such demanding conditions is of primary concern to the designers and manufacturers of futuristic transport aircraft. Accordingly, the major goal of this project was to evaluate the performance and durability of high temperature aluminum and titanium alloys for use in high speed civil transport (HSCT) structures. Additional goals were to develop time-dependent fracture mechanics methodology and test methods for characterizing and predicting elevated temperature crack growth behavior in creep-brittle materials such as ones being considered for use in HSCT structures and to explore accelerated methods of simulating microstructural degradation during service and measuring degraded properties in these materials.

  19. Innovative dressing and securement of tunneled central venous access devices in pediatrics: a pilot randomized controlled trial.

    PubMed

    Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2017-08-30

    Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.

  20. Educating the security forces, a high risk group in malaria elimination efforts: an example from Sri Lanka.

    PubMed

    Fernando, Sumadhya Deepika; Rodrigo, Chaturaka; de Silva, Nipun; Semege, Saveen; Rajapakse, Senaka; Samaranayake, Nilakashi; Senenayake, Sanath; Premaratne, Risintha Gayan

    2014-09-01

    The security forces are a high risk group for malaria transmission in Sri Lanka. Interrupting transmission and maintaining surveillance in this group is an important component of elimination efforts. The objective of the study was to develop a prototype educational programme on malaria for security forces serving in endemic areas. An interactive seminar was designed to deliver the required knowledge. The content was on current status, transmission, signs and symptoms and the role of security personnel in identification and prevention of malaria. Each seminar was preceded by a pre-test and followed by a post test to assess the improvement of knowledge. Fifty seminars were held in eight districts over 2 months with 2301 security forces personnel participating. Pre seminar knowledge on malaria was significantly better in the medical corps, those who had completed secondary education and in the Army compared to other security forces (p<0.001). Participation in the seminar resulted in an improvement in all domains tested as shown by test scores in post seminar assessment (p<0.001). Conducting a formal educational programme is an effective strategy to improve awareness on malaria amongst security forces personnel who are a high risk group for re-introduction of malaria into the country. © The Author 2014. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. Sustainability impact assessment to improve food security of smallholders in Tanzania

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schindler, Jana, E-mail: jana.schindler@zalf.de; Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin; Graef, Frieder, E-mail: graef@zalf.de

    The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agriculturalmore » production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.« less

  2. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  3. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  4. On securing wireless sensor network--novel authentication scheme against DOS attacks.

    PubMed

    Raja, K Nirmal; Beno, M Marsaline

    2014-10-01

    Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

  5. Safe Schools Survey: Post-Secondary Survey Results.

    ERIC Educational Resources Information Center

    Mowery, Andrea

    This report provides the results of a survey of safety and security at colleges and universities in Minnesota, along with policy recommendations to improve safety and security at Minnesota post-secondary institutions. It is based on campus security reports voluntarily submitted by 60 of the 110 Minnesota post-secondary institutions, personal…

  6. Sustainability analysis of bioenergy based land use change under climate change and variability

    NASA Astrophysics Data System (ADS)

    Raj, C.; Chaubey, I.; Brouder, S. M.; Bowling, L. C.; Cherkauer, K. A.; Frankenberger, J.; Goforth, R. R.; Gramig, B. M.; Volenec, J. J.

    2014-12-01

    Sustainability analyses of futuristic plausible land use and climate change scenarios are critical in making watershed-scale decisions for simultaneous improvement of food, energy and water management. Bioenergy production targets for the US are anticipated to impact farming practices through the introduction of fast growing and high yielding perennial grasses/trees, and use of crop residues as bioenergy feedstocks. These land use/land management changes raise concern over potential environmental impacts of bioenergy crop production scenarios, both in terms of water availability and water quality; impacts that may be exacerbated by climate variability and change. The objective of the study was to assess environmental, economic and biodiversity sustainability of plausible bioenergy scenarios for two watersheds in Midwest US under changing climate scenarios. The study considers fourteen sustainability indicators under nine climate change scenarios from World Climate Research Programme's (WCRP's) Coupled Model Intercomparison Project phase 3 (CMIP3). The distributed hydrological model SWAT (Soil and Water Assessment Tool) was used to simulate perennial bioenergy crops such as Miscanthus and switchgrass, and corn stover removal at various removal rates and their impacts on hydrology and water quality. Species Distribution Models (SDMs) developed to evaluate stream fish response to hydrology and water quality changes associated with land use change were used to quantify biodiversity sustainability of various bioenergy scenarios. The watershed-scale sustainability analysis was done in the St. Joseph River watershed located in Indiana, Michigan, and Ohio; and the Wildcat Creek watershed, located in Indiana. The results indicate streamflow reduction at watershed outlet with increased evapotranspiration demands for high-yielding perennial grasses. Bioenergy crops in general improved in-stream water quality compared to conventional cropping systems (maize-soybean). Water quality benefits due to land use change were generally greater than the effects of climate change variability.

  7. Performance of a system of reservoirs on futuristic front

    NASA Astrophysics Data System (ADS)

    Saha, Satabdi; Roy, Debasri; Mazumdar, Asis

    2017-10-01

    Application of simulation model HEC-5 to analyze the performance of the DVC Reservoir System (a multipurpose system with a network of five reservoirs and one barrage) on the river Damodar in Eastern India in meeting projected future demand as well as controlling flood for synthetically generated future scenario is addressed here with a view to develop an appropriate strategy for its operation. Thomas-Fiering model (based on Markov autoregressive model) has been adopted for generation of synthetic scenario (monthly streamflow series) and subsequently downscaling of modeled monthly streamflow to daily values was carried out. The performance of the system (analysed on seasonal basis) in terms of `Performance Indices' (viz., both quantity based reliability and time based reliability, mean daily deficit, average failure period, resilience and maximum vulnerability indices) for the projected scenario with enhanced demand turned out to be poor compared to that for historical scenario. However, judicious adoption of resource enhancement (marginal reallocation of reservoir storage capacity) and demand management strategy (curtailment of projected high water requirements and trading off between demands) was found to be a viable option for improvement of the performance of the reservoir system appreciably [improvement being (1-51 %), (2-35 %), (16-96 %), (25-50 %), (8-36 %) and (12-30 %) for the indices viz., quantity based reliability, time based reliability, mean daily deficit, average failure period, resilience and maximum vulnerability, respectively] compared to that with normal storage and projected demand. Again, 100 % reliability for flood control for current as well as future synthetically generated scenarios was noted. The results from the study would assist concerned authority in successful operation of reservoirs in the context of growing demand and dwindling resource.

  8. 77 FR 67057 - Notice of Availability of a Finding of No Significant Impact for the Port of Guam Modernization...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-08

    ... east of the proposed new break-bulk terminal to improve efficiency and security. New entrance and exit... storm water outfalls into the harbor. New safety and security improvements would be constructed. FOR...) 366-0714; or email: [email protected] . Persons who use a telecommunications device for the deaf...

  9. Counterfeit Compliance with the HIPAA Security Rule: A Study of Information System Success

    ERIC Educational Resources Information Center

    Johnson, James R.

    2013-01-01

    The intent of the security standards adopted by the Department of Health and Human Services (DHS) implementing some of the requirements of the Administrative Simplification (AS) subtitle of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was to improve Federal and private health care programs and to improve the…

  10. 77 FR 9717 - Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Notice of Filing of a Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-17

    ... opportunities for price improvement. B. Self-Regulatory Organization's Statement on Burden on Competition C2... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66384; File No. SR-C2-2012-006] Self-Regulatory... Automated Improvement Mechanism February 13, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange...

  11. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  12. [The Explore of the Security Strategy Model in Hospital Mobile Clinic New Mode].

    PubMed

    Li, Ke; Xia, Yong; Wang, Wei

    2016-03-01

    The paper elaborates and analyzes the current status of mobile hospital information security, then puts forward a security new model of the mobile treatment, then its architecture and solutions is elaborated. The use of this model makes the overall security level of hospital information to be further improved and enhanced, it has a positive signifi cance to promote the overal hospital management level.

  13. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    DTIC Science & Technology

    2017-03-28

    connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in

  14. Aircraft Survivability: Reclaiming the Low Altitude Battlespace. Fall 2003

    DTIC Science & Technology

    2003-01-01

    tt p: //j as .jc s. m il n by Charles Pedriani to Improve Commercial Aviation Security JASPO/NASA Cooperate The National Aeronautics and Space...Administration (NASA) Aviation Safety and Security Program Office announced its Aviation Security Project at a rollout work- shop in March 2003. The...and development efforts involving technology of interest. Overview of the NASA Aviation Security Initiative A systems approach will be used as

  15. Airport security inspection process model and optimization based on GSPN

    NASA Astrophysics Data System (ADS)

    Mao, Shuainan

    2018-04-01

    Aiming at the efficiency of airport security inspection process, Generalized Stochastic Petri Net is used to establish the security inspection process model. The model is used to analyze the bottleneck problem of airport security inspection process. The solution to the bottleneck is given, which can significantly improve the efficiency and reduce the waiting time by adding the place for people to remove their clothes and the X-ray detector.

  16. Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

    PubMed Central

    Doroodgar, Farzan; Razzaque, Mohammad Abdur; Isnin, Ismail Fauzi

    2014-01-01

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge. PMID:24618781

  17. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    PubMed

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  18. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.

    PubMed

    Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi

    2014-03-11

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  19. A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks

    PubMed Central

    Zhang, Lin; Yin, Na; Fu, Xiong; Lin, Qiaomin; Wang, Ruchuan

    2017-01-01

    With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR). This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service. PMID:28282894

  20. Australia’s Efforts to Improve Food Security for Aboriginal and Torres Strait Islander Peoples

    PubMed Central

    2016-01-01

    Abstract Australia is a wealthy country; however, available evidence suggests that food security among Aboriginal and Torres Strait Islander peoples has not yet been achieved. Aboriginal and Torres Strait Islander peoples living in remote, regional, and urban parts of Australia experience food insecurity for a number of reasons that usually include low income and a lack of access to affordable and healthy food. The much higher rate of illness and disease that this population experiences compared to non-indigenous Australians is directly related to food insecurity. This paper examines the food insecurity among Aboriginal and Torres Strait Islander peoples and recent Australian government efforts to combat this problem. The paper first considers what constitutes a human rights-based approach to achieving food security. Second, it describes the food insecurity that currently exists among Aboriginal and Torres Strait Islander peoples across the three pillars of food access, food availability, and food use. Third, the paper critically examines recent and current Australian government policy aimed at improving food security. The paper concludes with some reflections regarding how the Australian government can improve its efforts to achieve food security for Aboriginal and Torres Strait Islander peoples. PMID:28559687

  1. Computer Security: The Human Element.

    ERIC Educational Resources Information Center

    Guynes, Carl S.; Vanacek, Michael T.

    1981-01-01

    The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)

  2. FlySec: a risk-based airport security management system based on security as a service concept

    NASA Astrophysics Data System (ADS)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  3. Secure chaotic map based block cryptosystem with application to camera sensor networks.

    PubMed

    Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled

    2011-01-01

    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.

  4. Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

    PubMed Central

    Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled

    2011-01-01

    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network. PMID:22319371

  5. Reputation-Based Secure Sensor Localization in Wireless Sensor Networks

    PubMed Central

    He, Jingsha; Xu, Jing; Zhu, Xingye; Zhang, Yuqiang; Zhang, Ting; Fu, Wanqing

    2014-01-01

    Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments. PMID:24982940

  6. Introducing the CERT (Trademark) Resiliency Engineering Framework: Improving the Security and Sustainability Processes

    DTIC Science & Technology

    2007-05-01

    Organizational Structure 40 6.1.3 Funding Model 40 6.1.4 Role of Information Technology 40 6.2 Considering Process Improvement 41 6.2.1 Dimensions of...to the process definition for resiliency engineering. 6.1.3 Funding Model Just as organizational structures tend to align across security and...responsibility. Adopting an enter- prise view of operational resiliency and a process improvement approach requires that the funding model evolve to one

  7. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  8. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    NASA Astrophysics Data System (ADS)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  9. Improving security of the ping-pong protocol

    NASA Astrophysics Data System (ADS)

    Zawadzki, Piotr

    2013-01-01

    A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper. The operation of the improvement exploits inevitable errors introduced by the eavesdropping in the control and message modes. Its role is similar to the privacy amplification algorithms known from the quantum key distribution schemes. Messages are processed in blocks which guarantees that an eavesdropper is faced with a computationally infeasible problem as long as the system parameters are within reasonable limits. The introduced additional information preprocessing does not require quantum memory registers and confidential communication is possible without prior key agreement or some shared secret.

  10. SMART Security Cooperation Objectives: Improving DoD Planning and Guidance

    DTIC Science & Technology

    2016-01-01

    integrate them into a system for assessing, monitoring, and evaluating security cooperation programs and activities. This report evaluates DoD’s...effectiveness in developing SMART security coopera- tion objectives that facilitate assessment, monitoring, and evaluation . It also proposes a systematic...Cooperation Ends, Ways, and Means . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 RAND Evaluation and Revision of Selected

  11. Teaching Information Security with Workflow Technology--A Case Study Approach

    ERIC Educational Resources Information Center

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  12. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  13. Cryptonite: A Secure and Performant Data Repository on Public Clouds

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2012-06-29

    Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using amore » StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.« less

  14. Microcomputer Polling Improvements for AFSATCOM.

    DTIC Science & Technology

    1981-06-01

    AGENCY NAME A AODRESS(il differ~,.ru C~ntrolling Office) IS. SECURITY CLASS. (of this report) 2/’ .iUNCLASSI FIED 1/ 5a. DECLASSIFICATION DOWNGRADING...enhance (over) DD I1JAN 73 1473, UNCLASSIFIED - ~~~ SECURITY CLASSIFICATION OF THIS PAGE (When Dots Enterd’I.. SECURITY CLASSIaICATION OF THIS PAGE(ahnm...Data Entered) 20. ABSTRACT (Continued) /7 hetting capabilities for the satellite-user community /V 4. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE

  15. Biosecurity and Yield Improvement Technologies Are Strategic Complements in the Fight against Food Insecurity

    PubMed Central

    Cook, David C.; Fraser, Rob W.; Paini, Dean R.; Warden, Andrew C.; Lonsdale, W. Mark; De Barro, Paul J.

    2011-01-01

    The delivery of food security via continued crop yield improvement alone is not an effective food security strategy, and must be supported by pre- and post-border biosecurity policies to guard against perverse outcomes. In the wake of the green revolution, yield gains have been in steady decline, while post-harvest crop losses have increased as a result of insufficiently resourced and uncoordinated efforts to control spoilage throughout global transport and storage networks. This paper focuses on the role that biosecurity is set to play in future food security by preventing both pre- and post-harvest losses, thereby protecting crop yield. We model biosecurity as a food security technology that may complement conventional yield improvement policies if the gains in global farm profits are sufficient to offset the costs of implementation and maintenance. Using phytosanitary measures that slow global spread of the Ug99 strain of wheat stem rust as an example of pre-border biosecurity risk mitigation and combining it with post-border surveillance and invasive alien species control efforts, we estimate global farm profitability may be improved by over US$4.5 billion per annum. PMID:22022517

  16. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  17. NARRATIVE AND META-ANALYTIC REVIEW OF INTERVENTIONS AIMING TO IMPROVE MATERNAL-CHILD ATTACHMENT SECURITY.

    PubMed

    Letourneau, Nicole; Tryphonopoulos, Panagiota; Giesbrecht, Gerald; Dennis, Cindy-Lee; Bhogal, Sanjit; Watson, Barry

    2015-01-01

    Early secure maternal-child attachment relationships lay the foundation for children's healthy social and mental development. Interventions targeting maternal sensitivity and maternal reflective function during the first year of infant life may be the key to promoting secure attachment. We conducted a narrative systematic review and meta-analysis to examine the effectiveness of interventions aimed at promoting maternal sensitivity and reflective function on maternal-child attachment security, as measured by the gold standard Strange Situation (M. Ainsworth, M. Blehar, B. Waters, & S. Wall, 1978) and Q-set (E. Waters & K. Deane, 1985). Studies were identified from electronic database searches and included randomized or quasi-randomized controlled parallel-group designs. Participants were mothers and their infants who were followed up to 36 months' postpartum. Ten trials, involving 1,628 mother-infant pairs, were included. Examination of the trials that provided sufficient data for combination in meta-analysis revealed that interventions of both types increased the odds of secure maternal-child attachment, as compared with no intervention or standard intervention (n = 7 trials; odds ratio: 2.77; 95% confidence interval: 1.69, 4.53, n = 965). Of the three trials not included in the meta-analyses, two improved the likelihood of secure attachment. We conclude that interventions aimed at improving maternal sensitivity alone or in combination with maternal reflection, implemented in the first year of infants' lives, are effective in promoting secure maternal-child attachments. Intervention aimed at the highest risk families produced the most beneficial effects. © 2015 Michigan Association for Infant Mental Health.

  18. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    PubMed

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  19. A novel income security intervention to address poverty in a primary care setting: a retrospective chart review.

    PubMed

    Jones, Marcella K; Bloch, Gary; Pinto, Andrew D

    2017-08-17

    To examine the development and implementation of a novel income security intervention in primary care. A retrospective, descriptive chart review of all patients referred to the Income Security Heath Promotion service during the first year of the service (December 2013-December 2014). A multisite interdisciplinary primary care organisation in inner city Toronto, Canada, serving over 40 000 patients. The study population included 181 patients (53% female, mean age 48 years) who were referred to the Income Security Health Promotion service and engaged in care. The Income Security Health Promotion service consists of a trained health promoter who provides a mixture of expert advice and case management to patients to improve income security. An advisory group, made up of physicians, social workers, a community engagement specialist and a clinical manager, supports the service. Sociodemographic information, health status, referral information and encounter details were collected from patient charts. Encounters focused on helping patients with increasing their income (77.4%), reducing their expenses (58.6%) and improving their financial literacy (26.5%). The health promoter provided an array of services to patients, including assistance with taxes, connecting to community services, budgeting and accessing free services. The service could be improved with more specific goal setting, better links to other members of the healthcare team and implementing routine follow-up with each patient after discharge. Income Security Health Promotion is a novel service within primary care to assist vulnerable patients with a key social determinant of health. This study is a preliminary look at understanding the functioning of the service. Future research will examine the impact of the Income Security Health Promotion service on income security, financial literacy, engagement with health services and health outcomes. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. Advanced Micro Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and Power Quality at DoD Installations

    DTIC Science & Technology

    2016-10-28

    assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy

  1. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    PubMed

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  2. Secure E-mailing Between Physicians and Patients

    PubMed Central

    Garrido, Terhilda; Meng, Di; Wang, Jian J.; Palen, Ted E.; Kanter, Michael H.

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization. PMID:24887522

  3. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less

  4. Chemical Facility Security Improvement Act of 2009

    THOMAS, 111th Congress

    Rep. Jackson-Lee, Sheila [D-TX-18

    2009-01-07

    House - 02/05/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    PubMed Central

    Lee, Tian-Fu; Wang, Zeng-Bo

    2017-01-01

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509

  6. Adequacy of US Hospital Security Preparedness for Mass Casualty Incidents: Critical Lessons From the Israeli Experience.

    PubMed

    Golabek-Goldman, Michele

    2016-01-01

    Due to Israel's threat environment, Israeli hospitals have developed effective and innovative security preparations for responding to all-hazards incidents. Although Israeli hospital preparedness has been the subject of international praise and attention, there has been a dearth of research focused specifically on applying Israeli hospital security measures to the US hospital setting to augment emergency planning. This study examined practical and cost-effective lessons from the Israeli experience for improving US hospital security preparedness for a wide range of mass casualty incidents, both natural and man-made. Sixty semi-structured interviews were conducted with officials throughout Israel's and America's health, defense, and emergency response communities. Hospital preparedness was examined and disaster drills were evaluated in both countries, with San Francisco hospitals analyzed as a case study. Qualitative analysis was conducted and recommendations were made on the basis of an all-hazards approach to emergency preparedness. US hospitals examined in this study had not undertaken crucial preparations for managing the security consequences of a large-scale disaster. Recommendations from Israel included installing permanent emergency signage, improving security perimeter protocols and training, increasing defense against primary and secondary attacks, enhancing coordination with law enforcement, the National Guard, and other outside security agencies, and conducting more frequent and realistic lockdown exercises. A number of US hospitals have overlooked the important role of security in emergency preparedness. This study analyzed practical and cost-effective security recommendations from Israel to remedy this dangerous deficiency in some US hospitals' disaster planning.

  7. Developing the security culture at the SEISMED Reference Centres.

    PubMed

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  8. An IPSO-SVM algorithm for security state prediction of mine production logistics system

    NASA Astrophysics Data System (ADS)

    Zhang, Yanliang; Lei, Junhui; Ma, Qiuli; Chen, Xin; Bi, Runfang

    2017-06-01

    A theoretical basis for the regulation of corporate security warning and resources was provided in order to reveal the laws behind the security state in mine production logistics. Considering complex mine production logistics system and the variable is difficult to acquire, a superior security status predicting model of mine production logistics system based on the improved particle swarm optimization and support vector machine (IPSO-SVM) is proposed in this paper. Firstly, through the linear adjustments of inertia weight and learning weights, the convergence speed and search accuracy are enhanced with the aim to deal with situations associated with the changeable complexity and the data acquisition difficulty. The improved particle swarm optimization (IPSO) is then introduced to resolve the problem of parameter settings in traditional support vector machines (SVM). At the same time, security status index system is built to determine the classification standards of safety status. The feasibility and effectiveness of this method is finally verified using the experimental results.

  9. Metaphors for cyber security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less

  10. State Education Department: Security over Pupil Evaluation Program and Program Evaluation Test Materials Needs Improvement. Report 91-S-2.

    ERIC Educational Resources Information Center

    New York State Office of the Comptroller, Albany.

    Findings of an audit of the New York State Education Department's procedures to maintain security over Pupil Evaluation Program (PEP) and Program Evaluation Test (PET) examination materials are presented in this report. The audit sought to determine whether the department's security procedures adequately prevented unauthorized access to exam…

  11. 3 CFR 13650 - Executive Order 13650 of August 1, 2013. Improving Chemical Facility Safety and Security

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...

  12. Automated Information Security Will Not Improve until Effectively Supported by IRM.

    ERIC Educational Resources Information Center

    Chick, Morey J.

    1989-01-01

    The first of two articles on the nature of the growing problem of automated information systems security, especially in the federal government, this article presents a brief history of the problem and describes the need for integrating security activities into overall policies and programs to help reduce system vulnerabilities and risks. (23…

  13. Administering a healthy dose of security.

    PubMed

    Berry, D; Mullen, M; Murray, T

    The article describes how a hospital located in a poor, crime-ridden section of a large city has made the most of in-house resources and public-private liaisons to improve security at its 113-acre campus. Details on the facility's double-pronged approach--tight internal security and strong external liaisons with businesses, law enforcement, and community groups--are provided.

  14. Aligning the Effective Use of Student Data with Student Privacy and Security Laws

    ERIC Educational Resources Information Center

    Winnick, Steve; Coleman, Art; Palmer, Scott; Lipper, Kate; Neiditz, Jon

    2011-01-01

    This legal and policy guidance provides a summary framework for state policymakers as they work to use longitudinal data to improve student achievement while also protecting the privacy and security of individual student records. Summarizing relevant federal privacy and security laws, with a focus on the Family Educational Records and Privacy Act…

  15. Persian Gulf: U.S. Agencies Need to Improve Licensing Data and to Document Reviews of Arms Transfers for U.S. Foreign Policy and National Security Goals

    DTIC Science & Technology

    2010-09-01

    of Defense DTSA Defense Technology Security Administration FMS Foreign Military Sales GSD Gulf Security Dialogue LOA Letter of Offer and...may refer license applications to the Defense Technology Security Administration ( DTSA ) to determine if the United States should release the...requested technology to the requesting foreign government. Specifically, DTSA assesses the sale’s impact on preserving critical U.S. military technological

  16. Assessment of ecological security based on soil and water conservation: a case study from Gansu Province, China

    NASA Astrophysics Data System (ADS)

    Li, Z. J.; Tian, Q.; Song, L. L.

    2016-08-01

    In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.

  17. ASIS healthcare security benchmarking study.

    PubMed

    2001-01-01

    Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.

  18. Chemical Facility Security Improvement Act of 2013

    THOMAS, 113th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2013-01-03

    House - 02/12/2013 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Reducing security risk using data loss prevention technology.

    PubMed

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  20. Student Visa Security Improvement Act

    THOMAS, 111th Congress

    Rep. Bilirakis, Gus M. [R-FL-9

    2010-05-05

    House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Research on information security system of waste terminal disposal process

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  2. Iontronics

    NASA Astrophysics Data System (ADS)

    Chun, Honggu; Chung, Taek Dong

    2015-07-01

    Iontronics is an emerging technology based on sophisticated control of ions as signal carriers that bridges solid-state electronics and biological system. It is found in nature, e.g., information transduction and processing of brain in which neurons are dynamically polarized or depolarized by ion transport across cell membranes. It suggests the operating principle of aqueous circuits made of predesigned structures and functional materials that characteristically interact with ions of various charge, mobility, and affinity. Working in aqueous environments, iontronic devices offer profound implications for biocompatible or biodegradable logic circuits for sensing, ecofriendly monitoring, and brain-machine interfacing. Furthermore, iontronics based on multi-ionic carriers sheds light on futuristic biomimic information processing. In this review, we overview the historical achievements and the current state of iontronics with regard to theory, fabrication, integration, and applications, concluding with comments on where the technology may advance.

  3. Brackets, epitopes and flash memory cards: a futuristic view of clinical orthodontics.

    PubMed

    Sims, Milton R

    2017-02-01

    Orthodontics continues to be a profession anchored in traditional technology using appliances that cause inflammatory periodontal ligament (PDL) responses. Existing concepts of biological tooth movement based largely on histological tissue observations and the application of physical principles require major reassessment. In the next millennium, the genome revolution and knowledge of protein production and control could lead to the genetic correction of dentofacial anomalies and pain-free, biomolecular methods of malocclusion correction and long-term stability. A fundamental change is likely to be the abolition of bracket systems and their replacement with preprogrammed microchips driven by computers, and the control of PD[ blood vessels and cells by pharmacological targeting. Future survival of the profession will depend on a radically different specialist who will be educated with a postgraduate curriculum based on molecular biology and computer engineering.

  4. Using complex networks towards information retrieval and diagnostics in multidimensional imaging

    NASA Astrophysics Data System (ADS)

    Banerjee, Soumya Jyoti; Azharuddin, Mohammad; Sen, Debanjan; Savale, Smruti; Datta, Himadri; Dasgupta, Anjan Kr; Roy, Soumen

    2015-12-01

    We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkably, network analyses of thermal imaging time series of contact lens users and patients upon whom Laser-Assisted in situ Keratomileusis (Lasik) surgery has been conducted, exhibit pronounced similarity with results obtained from ADDE patients. We also propose a general framework for the transformation of multidimensional images to networks for futuristic biometry. Our approach is general and scalable to other fluctuation-based devices where network parameters derived from fluctuations, act as effective discriminators and diagnostic markers.

  5. Flexible and Stretchable Optoelectronic Devices using Silver Nanowires and Graphene.

    PubMed

    Lee, Hanleem; Kim, Meeree; Kim, Ikjoon; Lee, Hyoyoung

    2016-06-01

    Many studies have accompanied the emergence of a great interest in flexible or/and stretchable devices for new applications in wearable and futuristic technology, including human-interface devices, robotic skin, and biometric devices, and in optoelectronic devices. Especially, new nanodimensional materials enable flexibility or stretchability to be brought based on their dimensionality. Here, the emerging field of flexible devices is briefly introduced using silver nanowires and graphene, which are famous nanomaterials for the use of transparent conductive electrodes, as examples, and their unique functions originating from the intrinsic property of these nanomaterials are highlighted. It is thought that this work will evoke more interest and idea exchanges in this emerging field and hopefully can trigger a breakthrough on a new type of optoelectronics and optogenetic devices in the near future. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. Using complex networks towards information retrieval and diagnostics in multidimensional imaging.

    PubMed

    Banerjee, Soumya Jyoti; Azharuddin, Mohammad; Sen, Debanjan; Savale, Smruti; Datta, Himadri; Dasgupta, Anjan Kr; Roy, Soumen

    2015-12-02

    We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkably, network analyses of thermal imaging time series of contact lens users and patients upon whom Laser-Assisted in situ Keratomileusis (Lasik) surgery has been conducted, exhibit pronounced similarity with results obtained from ADDE patients. We also propose a general framework for the transformation of multidimensional images to networks for futuristic biometry. Our approach is general and scalable to other fluctuation-based devices where network parameters derived from fluctuations, act as effective discriminators and diagnostic markers.

  7. Using complex networks towards information retrieval and diagnostics in multidimensional imaging

    PubMed Central

    Banerjee, Soumya Jyoti; Azharuddin, Mohammad; Sen, Debanjan; Savale, Smruti; Datta, Himadri; Dasgupta, Anjan Kr; Roy, Soumen

    2015-01-01

    We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkably, network analyses of thermal imaging time series of contact lens users and patients upon whom Laser-Assisted in situ Keratomileusis (Lasik) surgery has been conducted, exhibit pronounced similarity with results obtained from ADDE patients. We also propose a general framework for the transformation of multidimensional images to networks for futuristic biometry. Our approach is general and scalable to other fluctuation-based devices where network parameters derived from fluctuations, act as effective discriminators and diagnostic markers. PMID:26626047

  8. Automation: is it really different this time?

    PubMed

    Wajcman, Judy

    2017-03-01

    This review examines several recent books that deal with the impact of automation and robotics on the future of jobs. Most books in this genre predict that the current phase of digital technology will create massive job loss in an unprecedented way, that is, that this wave of automation is different from previous waves. Uniquely digital technology is said to automate professional occupations for the first time. This review critically examines these claims, puncturing some of the hyperbole about automation, robotics and Artificial Intelligence. The review argues for a more nuanced analysis of the politics of technology and provides some critical distance on Silicon Valley's futurist discourse. Only by insisting that futures are always social can public bodies, rather than autonomous markets and endogenous technologies, become central to disentangling, debating and delivering those futures. © London School of Economics and Political Science 2017.

  9. Mapping the Nearest Stars for Exotic Habitable Worlds

    NASA Astrophysics Data System (ADS)

    Seager, Sara

    2014-06-01

    Exoplanets are planets orbiting stars other than the sun. Thousands of exoplanets are known and thousands of more planet candidates have been found. Until now, the dominant focus on habitable worlds has been on Earth-like planets, because Earth is the only known planet with life. Yet exoplanets are astonishingly diverse—in terms of their masses, densities, orbits, and host star types—and this diversity motivates a radical extension of what conventionally constitutes a habitable planet. The race to find habitable exoplanets has accelerated with the realization that “big Earths” transiting small stars can be both discovered and characterized with current technology. Moreover, technology for space-based direct imaging of Earth analogs has been rapidly maturing. The ambitious goal of inferring signs of life via biosignature gases in an exoplanet atmosphere, once only a futuristic thought, is now within reach.

  10. Advances in arsenic biosensor development--a comprehensive review.

    PubMed

    Kaur, Hardeep; Kumar, Rabindra; Babu, J Nagendra; Mittal, Sunil

    2015-01-15

    Biosensors are analytical devices having high sensitivity, portability, small sample requirement and ease of use for qualitative and quantitative monitoring of various analytes of human importance. Arsenic (As), owing to its widespread presence in nature and high toxicity to living creatures, requires frequent determination in water, soil, agricultural and food samples. The present review is an effort to highlight the various advancements made so far in the development of arsenic biosensors based either on recombinant whole cells or on certain arsenic-binding oligonucleotides or proteins. The role of futuristic approaches like surface plasmon resonance (SPR) and aptamer technology has also been discussed. The biomethods employed and their general mechanisms, advantages and limitations in relevance to arsenic biosensors developed so far are intended to be discussed in this review. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Defense Depot Tracy Total Quality Management Plan

    DTIC Science & Technology

    1989-07-01

    PAGES TQM (Total Quality Management ), Depot Operations, Continuous Process Improvement 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY...make up our pcrceptions of Total Quality Management . Our goal is to improve those proven management processes that have brought us success while being...MANIAGEMENT F. QUALITY AUDITS OF PRODUCTS AND OPERATIONS ASSETS MANAGEMENT 00 i .......... / ~899 29 03 1 EFENSE DEPOT TACY TOTAL QUALITY MANAGEMENT PLAN

  12. 75 FR 50021 - Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by NASDAQ OMX PHLX, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62678; File No. SR-Phlx-2010-108] Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by NASDAQ OMX PHLX, Inc. Relating to a Proposed Price Improvement System, Price Improvement XL (PIXL\\SM\\) August 10, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934...

  13. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  14. Surveillance systems for intermodal transportation

    NASA Astrophysics Data System (ADS)

    Jakovlev, Sergej; Voznak, Miroslav; Andziulis, Arunas

    2015-05-01

    Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.

  15. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  16. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  17. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  18. Strategies for online test security.

    PubMed

    Hart, Leigh; Morgan, Lesley

    2009-01-01

    As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.

  19. Cybersecurity and Resilience | Energy Systems Integration Facility | NREL

    Science.gov Websites

    , and offer prioritized action items to improve organizational protocols. The team is also helping and provide a prioritized list of action items for gaps in security controls. Security architectures

  20. Common Criteria related security design patterns--validation on the intelligent sensor example designed for mine environment.

    PubMed

    Bialas, Andrzej

    2010-01-01

    The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method.

  1. Evaluation of Ecological Environment Security in Contiguous Poverty Alleviation Area of Sichuan Province

    NASA Astrophysics Data System (ADS)

    Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.

    2018-04-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  2. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    PubMed Central

    Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272

  3. An improved biometrics-based remote user authentication scheme with user anonymity.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  4. Leveraging Safety Programs to Improve and Support Security Programs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leach, Janice; Snell, Mark K.; Pratt, R.

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  5. Supplemental Nutrition Assistance Program participation is associated with an increase in household food security in a national evaluation.

    PubMed

    Mabli, James; Ohls, Jim

    2015-02-01

    The Supplemental Nutrition Assistance Program (SNAP) provides nutrition assistance benefits to low-income families in an effort to reduce hunger and improve health and well-being. Because 1 in 7 Americans participate in the program each month, policymakers need to know whether the program is meeting these objectives effectively. The objective of this study was to estimate the association between SNAP participation and household food security using recent data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 6500 households and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 mo. Next, using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 mo later. Multivariate logistic regression analysis was used to estimate associations between SNAP and household food security. SNAP participation decreased the percentage of SNAP households that were food insecure in both samples by 6-17%. SNAP participation also decreased the percentage of households experiencing severe food insecurity--designated very low food security--by 12-19%. Findings were qualitatively robust to different empirical specifications. SNAP serves a vital role in improving the health and well-being of households by increasing food security. Given recent legislation to reduce program size and limit program eligibility, this study underscores SNAP's continued importance in affecting households' well-being. Future research is needed to determine whether specific groups of households experience differential improvements in food security. © 2015 American Society for Nutrition.

  6. Intelligent cloud computing security using genetic algorithm as a computational tools

    NASA Astrophysics Data System (ADS)

    Razuky AL-Shaikhly, Mazin H.

    2018-05-01

    An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.

  7. Secure e-mailing between physicians and patients: transformational change in ambulatory care.

    PubMed

    Garrido, Terhilda; Meng, Di; Wang, Jian J; Palen, Ted E; Kanter, Michael H

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization.

  8. Improving organisational resilience through enterprise security risk management.

    PubMed

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  9. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    ERIC Educational Resources Information Center

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  10. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    DTIC Science & Technology

    2014-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited SPORTS VENUE...Thesis 4. TITLE AND SUBTITLE SPORTS VENUE SECURITY: PUBLIC POLICY OPTIONS FOR SEAR 4–5 EVENTS 5. FUNDING NUMBERS 6. AUTHOR(S) James M. Gehring...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Although the United States made considerable advances in improving sport venue security

  11. Naval War College Review. Volume 64, Number 2, Spring 2011

    DTIC Science & Technology

    2011-01-01

    to revolutionize the African maritime sector holistically, across its entire spectrum—improving safety and security, gover - nance, and industrial...strategy for a maritime economy that includes the enabling elements of gover - nance, infrastructure, trade, safety, and security and plainly tells global...transport in its core function); tourism ; energy; infrastructure (ports); cooperation on safety, security, and environmental protection; tariff harmonization

  12. Improved security monitoring method for network bordary

    NASA Astrophysics Data System (ADS)

    Gao, Liting; Wang, Lixia; Wang, Zhenyan; Qi, Aihua

    2013-03-01

    This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false alarm or missing alarm of the security incident effectively.

  13. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  14. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  15. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  16. Health Information Security in Hospitals: the Application of Security Safeguards.

    PubMed

    Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam

    2016-02-01

    A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.

  17. Aviation Security: Immediate Action Needed to Improve Security

    DOT National Transportation Integrated Search

    1996-08-01

    This is the statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, General Accounting Office (GAO), before the Committee on Commerce, Science, and Transportation, U.S. Senate, on the threa...

  18. Report: Improvements Needed in Key EPA Information System Security Practices

    EPA Pesticide Factsheets

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  19. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

    PubMed Central

    Hu, Hequn; Liao, Xuewen

    2017-01-01

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540

  20. Improvement of a Chemical Storage Room Ventilation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yousif, Emad; Al-Dahhan, Wedad; Abed, Rashed Nema

    Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. This manuscript is the third in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. We summarize an improvement to the chemical storage room ventilation system at Al-Nahrain University to create and maintain a safe working atmosphere in an area where chemicals are stored and handled, using US andmore » European design practices, standards, and regulations.« less

  1. Proceedings of the Seminar on the DoD Computer Security Initiative Program (3rd), National Bureau of Standards, Gaithersburg, Maryland, November 18-20, 1980.

    DTIC Science & Technology

    1980-01-01

    TECHNIQUES IMPROVING RAPIDLY C-7 INDUSTRY THRUSTS IN 70s DRIVING FORCE : IMPROVE PRODUCT QUALITY * EASE MAINTENANCE, MODIFICATION IMPROVE PERFORMANCE...together a task force to make recommendations on what we should be doing about computer secur- ity. Other members of the task force came from both our...of the marketing task force mostly echoed and endorsed the user’s report. Both reports were issued in March of 1973. Notice that DoD 5200.28 had just

  2. Improving U.S. Competitiveness with K-12 STEM Education and Training. Heritage Special Report. SR-57. A Report on the STEM Education and National Security Conference, October 21-23, 2008

    ERIC Educational Resources Information Center

    Machi, Ethel

    2009-01-01

    From October 21 to 23, 2008, The Heritage Foundation, supported by the McCormick Tribune Foundation, convened leading education and national security experts as well as private-sector representatives to discuss methods for strengthening America's competitiveness by improving its performance in science, technology, engineering, and mathematics…

  3. Teaching Laboratory Renovation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Zuhairi, Ali Jassim; Al-Dahhan, Wedad; Hussein, Falah

    Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. The improvement of students’ understanding of concepts in science and its applications, practical scientific skills and understanding of how science and scientists work in laboratory experiences have been considered key aspects of education in science for over 100 years. Facility requirements for the necessary level of safety and security combined with specific requirementsmore » relevant to the course to be conducted dictate the structural design of a particular laboratory, and the design process must address both. This manuscript is the second in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. We summarize the process used to guide a major renovation of the chemistry instructional laboratory facilities at Al-Nahrain University and discuss lessons learned from the project.« less

  4. Improving ward environments and developing skills for discharge with the implementation of self-catering on a low secure forensic unit.

    PubMed Central

    O'Reilly, Alison

    2016-01-01

    The opportunities for service users to develop skills for more independent living and take control of their environments are limited in secure mental health units. This paper will outline a quality improvement project that changed how the catering services were delivered in a low secure unit in East London NHS Foundation Trust (ELFT). A Quality Improvement methodology was adopted incorporating the Plan, Do, Study, Act (PDSA) cycle which included the trial of service users preparing their own meals on a daily basis. The participation rates were measured and functional daily living skills were recorded. Following success of the trial, long-term implementation of self-catering was agreed, with service users being supported to prepare a shared evening meal every day on the ward with an average of 60% participation. Functional living skills indicated an improvement in the area of process skills. The project aligned with ELFT's aims of service users working in collaboration with staff to implement changes in service delivery. PMID:28090324

  5. Improving ward environments and developing skills for discharge with the implementation of self-catering on a low secure forensic unit.

    PubMed

    O'Reilly, Alison

    2016-01-01

    The opportunities for service users to develop skills for more independent living and take control of their environments are limited in secure mental health units. This paper will outline a quality improvement project that changed how the catering services were delivered in a low secure unit in East London NHS Foundation Trust (ELFT). A Quality Improvement methodology was adopted incorporating the Plan, Do, Study, Act (PDSA) cycle which included the trial of service users preparing their own meals on a daily basis. The participation rates were measured and functional daily living skills were recorded. Following success of the trial, long-term implementation of self-catering was agreed, with service users being supported to prepare a shared evening meal every day on the ward with an average of 60% participation. Functional living skills indicated an improvement in the area of process skills. The project aligned with ELFT's aims of service users working in collaboration with staff to implement changes in service delivery.

  6. Preventing infant abductions: an infant security program transitioned into an interdisciplinary model.

    PubMed

    Hiner, Jacqueline; Pyka, Jeanine; Burks, Colleen; Pisegna, Lily; Gador, Rachel Ann

    2012-01-01

    Ensuring the safety of infants born in a hospital is a top priority and, therefore, requires a solid infant security plan. Using an interdisciplinary approach and a systematic change process, nursing leadership in collaboration with clinical nurses and security personnel analyzed the infant security program at this community hospital to identify vulnerabilities. By establishing an interdisciplinary approach to infant security, participants were able to unravel a complicated concept, systematically analyze the gaps, and agree to a plan of action. This resulted in improved communication and clarification of roles between the nursing and security divisions. Supply costs decreased by 17.4% after the first year of implementation. Most importantly, this project enhanced and strengthened the existing infant abduction prevention measures, hard wired the importance of infant security, and minimized vulnerabilities.

  7. Influencing Trust for Human-Automation Collaborative Scheduling of Multiple Unmanned Vehicles.

    PubMed

    Clare, Andrew S; Cummings, Mary L; Repenning, Nelson P

    2015-11-01

    We examined the impact of priming on operator trust and system performance when supervising a decentralized network of heterogeneous unmanned vehicles (UVs). Advances in autonomy have enabled a future vision of single-operator control of multiple heterogeneous UVs. Real-time scheduling for multiple UVs in uncertain environments requires the computational ability of optimization algorithms combined with the judgment and adaptability of human supervisors. Because of system and environmental uncertainty, appropriate operator trust will be instrumental to maintain high system performance and prevent cognitive overload. Three groups of operators experienced different levels of trust priming prior to conducting simulated missions in an existing, multiple-UV simulation environment. Participants who play computer and video games frequently were found to have a higher propensity to overtrust automation. By priming gamers to lower their initial trust to a more appropriate level, system performance was improved by 10% as compared to gamers who were primed to have higher trust in the automation. Priming was successful at adjusting the operator's initial and dynamic trust in the automated scheduling algorithm, which had a substantial impact on system performance. These results have important implications for personnel selection and training for futuristic multi-UV systems under human supervision. Although gamers may bring valuable skills, they may also be potentially prone to automation bias. Priming during training and regular priming throughout missions may be one potential method for overcoming this propensity to overtrust automation. © 2015, Human Factors and Ergonomics Society.

  8. NASA Materials Related Lessons Learned

    NASA Technical Reports Server (NTRS)

    Garcia, Danny; Gill, Paul S.; Vaughan, William W.

    2003-01-01

    Lessons Learned have been the basis for our accomplishments throughout the ages. They have been passed down from father to son, mother to daughter, teacher to pupil, and older to younger worker. Lessons Learned have also been the basis for the nation s accomplishments for more than 200 years. Both government and industry have long recognized the need to systematically document and utilize the knowledge gained from past experiences in order to avoid the repetition of failures and mishaps. Through the knowledge captured and recorded in Lessons Learned from more than 80 years of flight in the Earth s atmosphere, NASA s materials researchers are constantly working to develop stronger, lighter, and more durable materials that can withstand the challenges of space. The Agency s talented materials engineers and scientists continue to build on that rich tradition by using the knowledge and wisdom gained from past experiences to create futuristic materials and technologies that will be used in the next generation of advanced spacecraft and satellites that may one day enable mankind to land men on another planet or explore our nearest star. These same materials may also have application here on Earth to make commercial aircraft more economical to build and fly. With the explosion in technical accomplishments over the last decade, the ability to capture knowledge and have the capability to rapidly communicate this knowledge at lightning speed throughout an organization like NASA has become critical. Use of Lessons Learned is a principal component of an organizational culture committed to continuous improvement.

  9. NASA Materials Related Lessons Learned

    NASA Technical Reports Server (NTRS)

    Garcia, Danny; Gill, Paul S.; Vaughan, William W.; Parker, Nelson C. (Technical Monitor)

    2002-01-01

    Lessons Learned have been the basis for our accomplishments throughout the ages. They have been passed down from father to son, mother to daughter, teacher to pupil, and older to younger worker. Lessons Learned have also been the basis for the nation's accomplishments for more than 200 years. Both government and industry have long recognized the need to systematically document and utilize the knowledge gained from past experiences in order to avoid the repetition of failures and mishaps. Through the knowledge captured and recorded in Lessons Learned from more than 80 years of flight in the Earth's atmosphere, NASA's materials researchers are constantly working to develop stronger, lighter, and more durable materials that can withstand the challenges of space. The Agency's talented materials engineers and scientists continue to build on that rich tradition by using the knowledge and wisdom gained from past experiences to create futurist materials and technologies that will be used in the next generation of advanced spacecraft and satellites that may one day enable mankind to land men on another planet or explore our nearest star. These same materials may also have application here on Earth to make commercial aircraft more economical to build and fly. With the explosion in technical accomplishments over the last decade, the ability to capture knowledge and have the capability to rapidly communicate this knowledge at lightning speed throughout an organization like NASA has become critical. Use of Lessons Learned is a principal component of an organizational culture committed to continuous improvement.

  10. Innovation for integrated command environments

    NASA Astrophysics Data System (ADS)

    Perry, Amie A.; McKneely, Jennifer A.

    2000-11-01

    Command environments have rarely been able to easily accommodate rapid changes in technology and mission. Yet, command personnel, by their selection criteria, experience, and very nature, tend to be extremely adaptive and flexible, and able to learn new missions and address new challenges fairly easily. Instead, the hardware and software components of the systems do no provide the needed flexibility and scalability for command personnel. How do we solve this problem? In order to even dream of keeping pace with a rapidly changing world, we must begin to think differently about the command environment and its systems. What is the correct definition of the integrated command environment system? What types of tasks must be performed in this environment, and how might they change in the next five to twenty-five years? How should the command environment be developed, maintained, and evolved to provide needed flexibility and scalability? The issues and concepts to be considered as new Integrated Command/Control Environments (ICEs) are designed following a human-centered process. A futuristic model, the Dream Integrated Command Environment (DICE) will be described which demonstrates specific ICE innovations. The major paradigm shift required to be able to think differently about this problem is to center the DICE around the command personnel from its inception. Conference participants may not agree with every concept or idea presented, but will hopefully come away with a clear understanding that to radically improve future systems, designers must focus on the end users.

  11. Report: EPA’s National Security Information Program Could Be Improved

    EPA Pesticide Factsheets

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  12. Privacy and Security in Mobile Health: A Research Agenda

    PubMed Central

    Kotz, David; Gunter, Carl A.; Kumar, Santosh; Weiner, Jonathan P.

    2017-01-01

    Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges. PMID:28344359

  13. Common Criteria Related Security Design Patterns—Validation on the Intelligent Sensor Example Designed for Mine Environment

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method. PMID:22399888

  14. Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding

    NASA Astrophysics Data System (ADS)

    Chen, Jun-Xin; Zhu, Zhi-Liang; Fu, Chong; Zhang, Li-Bo; Zhang, Yushu

    2014-12-01

    In this paper, we evaluate the security of an enhanced double random phase encoding (DRPE) image encryption scheme (2013 J. Lightwave Technol. 31 2533). The original system employs a chaotic Baker map prior to DRPE to provide more protection to the plain image and hence promote the security level of DRPE, as claimed. However, cryptanalysis shows that this scheme is vulnerable to a chosen-plaintext attack, and the ciphertext can be precisely recovered. The corresponding improvement is subsequently reported upon the basic premise that no extra equipment or computational complexity is required. The simulation results and security analyses prove its effectiveness and security. The proposed achievements are suitable for all cryptosystems under permutation and, following that, the DRPE architecture, and we hope that our work can motivate the further research on optical image encryption.

  15. Understanding food security issues in remote Western Australian Indigenous communities.

    PubMed

    Pollard, Christina M; Nyaradi, Anett; Lester, Matthew; Sauer, Kay

    2014-08-01

    Food insecurity in remote Western Australian (WA) Indigenous communities. This study explored remote community store managers' views on issues related to improving food security in order to inform health policy. A census of all remote WA Indigenous community store managers was conducted in 2010. Telephone interviews sought managers' perceptions of community food insecurity, problems with their store, and potential policy options for improving the supply, accessibility, affordability and consumption of nutritious foods. Descriptive analyses were conducted using SPSS for Windows version 17.0. Managers stated that freight costs and irregular deliveries contributed to high prices and a limited range of foods. Poor store infrastructure, compromised cold chain logistics, and commonly occurring power outages affected food quality. Half of the managers said there was hunger in their community because people did not have enough money to buy food. The role of nutritionists beyond a clinical and educational role was not understood. Food security interventions in remote communities need to take into consideration issues such as freight costs, transport and low demand for nutritious foods. Store managers provide important local knowledge regarding the development and implementation of food security interventions. SO WHAT? Agencies acting to address the issue of food insecurity in remote WA Indigenous communities should heed the advice of community store managers that high food prices, poor quality and limited availability are mainly due to transport inefficiencies and freight costs. Improving healthy food affordability in communities where high unemployment and low household income abound is fundamental to improving food security, yet presents a significant challenge.

  16. 26 CFR 301.6323(b)-1 - Protection for certain interests even though notice filed.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... Because G became the holder of a security interest in a security interest after notice of lien was filed... attorney's widow, sells a set of law books for $200 to B, for B's own use. Prior to the sale a notice of... which under local law secures the reasonable price of the repair or improvement of the property if the...

  17. 26 CFR 301.6323(b)-1 - Protection for certain interests even though notice filed.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... Because G became the holder of a security interest in a security interest after notice of lien was filed... attorney's widow, sells a set of law books for $200 to B, for B's own use. Prior to the sale a notice of... which under local law secures the reasonable price of the repair or improvement of the property if the...

  18. To Legalize or not to Legalize? That is the Question

    DTIC Science & Technology

    2009-04-01

    and international community to improve security and promote development in Afghanistan. The negative effect on the nations overall security, the...the problem/solution methodology. The research explores the current illicit opium cultivation in Afghanistan and its effect on the current...negative effect on the current development efforts. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF

  19. Airline Security and a Strategy for Change

    DTIC Science & Technology

    2006-01-15

    21 KEY TERMS: Biometrics, Federal Flight Deck Officer, Positive Passenger Bag Match , Airline Security CLASSIFICATION: Unclassified On September 11...subsequent to 9/11, then offers a recommended strategy which could provide both an improved security posture and the peace of mind demanded by travelers...expanding the Positive Passenger Bag Match criteria, and gathering information on passengers about special capabilities they might have for use by Captains

  20. Design and implementation of a secure workflow system based on PKI/PMI

    NASA Astrophysics Data System (ADS)

    Yan, Kai; Jiang, Chao-hui

    2013-03-01

    As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.

  1. Proof of cipher text ownership based on convergence encryption

    NASA Astrophysics Data System (ADS)

    Zhong, Weiwei; Liu, Zhusong

    2017-08-01

    Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.

  2. Reconciling food security and bioenergy: priorities for action

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.

    Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less

  3. Reconciling food security and bioenergy: priorities for action

    DOE PAGES

    Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.; ...

    2016-06-14

    Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less

  4. Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication.

    PubMed

    Juang, Kevin; Greenstein, Joel

    2018-04-01

    We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.

  5. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  6. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  7. Alignment and bit extraction for secure fingerprint biometrics

    NASA Astrophysics Data System (ADS)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  8. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    PubMed

    Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  9. Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’

    PubMed Central

    Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401

  10. Special report. New products that improve officer performance, safety.

    PubMed

    1991-12-01

    The need for products that improve performance of security officers is counterbalanced these days by budgetary constraints. While this may limit major investments in security systems and personnel, less costly improvements or innovations might be worth considering. In this report, we will discuss four advances that may be valuable not only in hospital security, but in other industries as well. One of them, a smoke filter, was originally developed for the hotel industry. Another, a drug detection device, may replace the use of undercover agents or drug-sniffing' dogs in certain circumstances. The third new product is an economical patrol vehicle for parking facilities which might replace more costly vehicles such as golf carts or cars. The fourth product, a roving CCTV camera, is actually being tested at a Midwest medical center and may allow you to monitor areas of parking garages with cameras instead of officers on patrol.

  11. Public Perspectives of Mobile Phones’ Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey

    PubMed Central

    Richardson, Joshua E.; Ancker, Jessica S.

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246

  12. Public Perspectives of Mobile Phones' Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey.

    PubMed

    Richardson, Joshua E; Ancker, Jessica S

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.

  13. Quality improvement and emerging global health priorities

    PubMed Central

    Mensah Abrampah, Nana; Syed, Shamsuzzoha Babar; Hirschhorn, Lisa R; Nambiar, Bejoy; Iqbal, Usman; Garcia-Elorrio, Ezequiel; Chattu, Vijay Kumar; Devnani, Mahesh; Kelley, Edward

    2018-01-01

    Abstract Quality improvement approaches can strengthen action on a range of global health priorities. Quality improvement efforts are uniquely placed to reorient care delivery systems towards integrated people-centred health services and strengthen health systems to achieve Universal Health Coverage (UHC). This article makes the case for addressing shortfalls of previous agendas by articulating the critical role of quality improvement in the Sustainable Development Goal era. Quality improvement can stimulate convergence between health security and health systems; address global health security priorities through participatory quality improvement approaches; and improve health outcomes at all levels of the health system. Entry points for action include the linkage with antimicrobial resistance and the contentious issue of the health of migrants. The work required includes focussed attention on the continuum of national quality policy formulation, implementation and learning; alongside strengthening the measurement-improvement linkage. Quality improvement plays a key role in strengthening health systems to achieve UHC. PMID:29873793

  14. Notification: Follow-up Review of EPA’s Classification of National Security Information

    EPA Pesticide Factsheets

    Project #OPE-FY15-0057, July 20, 2015. The EPA OIG plans to begin preliminary research on the OARM actions taken to improve policies and procedures related to the classification of national security information.

  15. Homeland Security Strategic Research Action Plan 2012 - 2016

    EPA Pesticide Factsheets

    EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.

  16. Transportation security research : coordination needed in selecting and implementing infrastructure vulnerability assessments

    DOT National Transportation Integrated Search

    2003-05-01

    The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...

  17. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    NASA Astrophysics Data System (ADS)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially among the high-income LAC countries. We conclude that despite the large contribution of LAC's agriculture to global water and food security, this goal is at present intensively tapping into LAC's natural capital. Also, regional improvements in water security have improved, but important goals remain and new challenges are emerging. Water governance in LAC is evolving to address the challenges posed by rapid socio-economic changes, however, as is often the case, the implementation of reforms lags behind.

  18. Secure Multiparty AES

    NASA Astrophysics Data System (ADS)

    Damgård, Ivan; Keller, Marcel

    We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + {{400}over{255}} expected elementary operations in expected 70 + {{20}over{255}} rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive security against at most one corrupted player) in a local network showed that one block can be encrypted in 2 seconds. We also argue that this result could be improved by an optimized implementation.

  19. Exploratory study assessing efficacy and complications of TVT-O, TVT-Secur, and Mini-Arc: results at 12-month follow-up.

    PubMed

    Oliveira, Rui; Botelho, Francisco; Silva, Pedro; Resende, Alexandre; Silva, Carlos; Dinis, Paulo; Cruz, Francisco

    2011-06-01

    Contemporary surgical treatment of female stress urinary incontinence (SUI) includes retropubic and transobturator (TO) midurethral slings (MUS). Case series of single-incision slings (SIS) have shown similar outcomes with lower morbidity. Our aim was to assess the cure rates, complications, and quality-of-life impact of one standard TO MUS and two SIS. Ninety consecutive patients with clinically and urodynamically proven SUI were enrolled in an exploratory randomised phase 2 trial. Patients with previous SUI surgery, major pelvic organ prolapse, mixed incontinence, or detrusor overactivity were excluded. Patients were treated randomly with TVT-O, TVT-Secur, or Mini-Arc. Postoperative visits were scheduled at 6 and 12 mo. The King's Health Questionnaire (KHQ) was repeated at 6 mo. Cure was defined as the absence of urine leakage, no pad use, and a negative cough test at 12 mo. Pain and other complications were also investigated. Cure rate was 83% after TVT-O, 67% after TVT-Secur, and 87% after Mini-Arc. Improvement was found in 10%, 13%, and 7% of the patients, respectively. Failures were 7% after TVT-O and Mini-Arc and 20% after TVT-Secur. TVT-O and Mini-Arc improved at least 15 points in >80% of the patients in six KHQ domains, whereas TVT-Secur could only achieve improvement in three of the nine domains. The pain score was lower in the Mini-Arc group. Complications were more numerous after TVT-O. This study has the limitations inherent in a phase 2 trial with a follow-up limited to 12 mo. Mini-Arc offers cure and improvement rates similar to TVT-O, whereas TVT-Secur may yield an inferior outcome. These findings recommend the urgent launch of large randomised phase 3 studies comparing conventional MUS with SIS, with Mini-Arc the advised option. Copyright © 2011 European Association of Urology. Published by Elsevier B.V. All rights reserved.

  20. Characterizing the biocompatibility and tumor-imaging capability of Cu2S nanocrystals in vivo

    NASA Astrophysics Data System (ADS)

    Poulose, Aby Cheruvathoor; Veeranarayanan, Srivani; Mohamed, M. Sheikh; Sakamoto, Yasushi; Hirosawa, Narumi; Suzuki, Yuko; Zhang, Minfang; Yudasaka, Masako; Radhakrishnan, Neelima; Maekawa, Toru; Mohanan, P. V.; Sakthi Kumar, D.

    2015-07-01

    Multifunctional nanomaterial-based probes have had key impacts on high-resolution and high-sensitivity bioimaging and therapeutics. Typically, NIR-absorbing metal sulfide-based nanocrystals (NCs) are highly assuring due to their unique optical properties. Yet, their in vivo behavior remains undetermined, which in turn undermines their potential bioapplications. Herein, we have examined the application of PEGylated Cu2S NCs as tumor contrast optical nanoprobes as well as investigated the short- and long-term in vivo compatibility focusing on anti-oxidant defense mechanism, genetic material, immune system, and vital organs. The studies revealed an overall safe profile of the NCs with no apparent toxicity even at longer exposure periods. The acquired observations culminate into a set of primary safety data of this nanomaterial and the use of PEGylated Cu2S NCs as promising optical nanoprobes with immense futuristic bioapplications.

  1. Personal mobility and manipulation using robotics, artificial intelligence and advanced control.

    PubMed

    Cooper, Rory A; Ding, Dan; Grindle, Garrett G; Wang, Hongwu

    2007-01-01

    Recent advancements of technologies, including computation, robotics, machine learning, communication, and miniaturization technologies, bring us closer to futuristic visions of compassionate intelligent devices. The missing element is a basic understanding of how to relate human functions (physiological, physical, and cognitive) to the design of intelligent devices and systems that aid and interact with people. Our stakeholder and clinician consultants identified a number of mobility barriers that have been intransigent to traditional approaches. The most important physical obstacles are stairs, steps, curbs, doorways (doors), rough/uneven surfaces, weather hazards (snow, ice), crowded/cluttered spaces, and confined spaces. Focus group participants suggested a number of ways to make interaction simpler, including natural language interfaces such as the ability to say "I want a drink", a library of high level commands (open a door, park the wheelchair, ...), and a touchscreen interface with images so the user could point and use other gestures.

  2. Advanced beamed-energy and field propulsion concepts

    NASA Technical Reports Server (NTRS)

    Myrabo, L. N.

    1983-01-01

    Specific phenomena which might lead to major advances in payload, range and terminal velocity of very advanced vehicle propulsion are studied. The effort focuses heavily on advanced propulsion spinoffs enabled by current government-funded investigations in directed-energy technology: i.e., laser, microwave, and relativistic charged particle beams. Futuristic (post-year 2000) beamed-energy propulsion concepts which indicate exceptional promise are identified and analytically investigated. The concepts must be sufficiently developed to permit technical understanding of the physical processes involved, assessment of the enabling technologies, and evaluation of their merits over conventional systems. Propulsion concepts that can be used for manned and/or unmanned missions for purposes of solar system exploration, planetary landing, suborbital flight, transport to orbit, and escape are presented. Speculations are made on the chronology of milestones in beamed-energy propulsion development, such as in systems applications of defense, satellite orbit-raising, global aerospace transportation, and manned interplanetary carriers.

  3. Overview of the NASA Environmentally Responsible Aviation Project's Propulsion Technology Portfolio

    NASA Technical Reports Server (NTRS)

    Suder, Kenneth L.

    2012-01-01

    The NASA Environmentally Responsible Aviation (ERA) Project is focused on developing and demonstrating integrated systems technologies to TRL 4-6 by 2020 that enable reduced fuel burn, emissions, and noise for futuristic air vehicles. The specific goals aim to simultaneously reduce fuel burn by 50%, reduce Landing and Take-off Nitrous Oxides emissions by 75% relative to the CAEP 6 guidelines, and reduce cumulative noise by 42 Decibels relative to the Stage 4 guidelines. These goals apply to the integrated vehicle and propulsion system and are based on a reference mission of 3000nm flight of a Boeing 777-200 with GE90 engines. This paper will focus primarily on the ERA propulsion technology portfolio, which consists of advanced combustion, propulsor, and core technologies to enable these integrated air vehicle systems goals. An overview of the ERA propulsion technologies will be described and the status and results to date will be presented.

  4. Artificial intelligence costs, benefits, risks for selected spacecraft ground system automation scenarios

    NASA Technical Reports Server (NTRS)

    Truszkowski, Walter F.; Silverman, Barry G.; Kahn, Martha; Hexmoor, Henry

    1988-01-01

    In response to a number of high-level strategy studies in the early 1980s, expert systems and artificial intelligence (AI/ES) efforts for spacecraft ground systems have proliferated in the past several years primarily as individual small to medium scale applications. It is useful to stop and assess the impact of this technology in view of lessons learned to date, and hopefully, to determine if the overall strategies of some of the earlier studies both are being followed and still seem relevant. To achieve that end four idealized ground system automation scenarios and their attendant AI architecture are postulated and benefits, risks, and lessons learned are examined and compared. These architectures encompass: (1) no AI (baseline), (2) standalone expert systems, (3) standardized, reusable knowledge base management systems (KBMS), and (4) a futuristic unattended automation scenario. The resulting artificial intelligence lessons learned, benefits, and risks for spacecraft ground system automation scenarios are described.

  5. Artificial intelligence costs, benefits, and risks for selected spacecraft ground system automation scenarios

    NASA Technical Reports Server (NTRS)

    Truszkowski, Walter F.; Silverman, Barry G.; Kahn, Martha; Hexmoor, Henry

    1988-01-01

    In response to a number of high-level strategy studies in the early 1980s, expert systems and artificial intelligence (AI/ES) efforts for spacecraft ground systems have proliferated in the past several years primarily as individual small to medium scale applications. It is useful to stop and assess the impact of this technology in view of lessons learned to date, and hopefully, to determine if the overall strategies of some of the earlier studies both are being followed and still seem relevant. To achieve that end four idealized ground system automation scenarios and their attendant AI architecture are postulated and benefits, risks, and lessons learned are examined and compared. These architectures encompass: (1) no AI (baseline); (2) standalone expert systems; (3) standardized, reusable knowledge base management systems (KBMS); and (4) a futuristic unattended automation scenario. The resulting artificial intelligence lessons learned, benefits, and risks for spacecraft ground system automation scenarios are described.

  6. Normal mode and experimental analysis of TNT Raman spectrum

    NASA Astrophysics Data System (ADS)

    Liu, Yuemin; Perkins, Richard; Liu, Yucheng; Tzeng, Nianfeng

    2017-04-01

    In this study, a Raman spectrum of TNT was characterized through experiments and simulated using 22 hybrid density functional theory (DFT) methods. Among the different hybrid DFT methods, it was found that the most accurate simulation results of the Raman shift frequency were calculated by the O3LYP method. However, the deviations of the calculated Raman frequencies from the experimental value showed no dependency on the abilities of the DFT methods in recovering the correlation energy. The accuracies of the DFT methods in predicting the Raman bands are probably determined by the numerical grid and convergence criteria for optimizations of each DFT method. It was also decided that the prominent Raman shift 1362 cm-1 is mainly caused by symmetric stretching of the 4-nitro groups. Findings of this study can facilitate futuristic development of more effective surface enhanced Raman spectroscopy/scattering (SERS) substrates for explosive characterization and detection.

  7. [Nanotechnology: a big revolution from the small world].

    PubMed

    Bassi, Matteo; Santinello, Irene; Bevilacqua, Andrea; Bassi, Pierfrancesco

    2013-01-01

    Nanotechnology is a multidisciplinary field originating from the interaction of several different disciplines, such as engineering, physics, biology and chemistry. New materials and devices effectively interact with the body at molecular level, yielding a brand new range of highly selective and targeted applications designed to maximize the therapeutic efficiency while reducing the side effects. Liposomes, quantum dots, carbon nanotubes and superparamagnetic nanoparticles are among the most assessed nanotechnologies. Meanwhile, other futuristic platforms are paving the way toward a new scientific paradigm, able to deeply change the research path in the medical science. The growth of nanotechnology, driven by the dramatic advances in science and technology, clearly creates new opportunities for the development of the medical science and disease treatment in human health care. Despite the concerns and the on-going studies about their safety, nanotechnology clearly emerges as holding the promise of delivering one of the greatest breakthroughs in the history of medical science.

  8. RF Behavior of Cylindrical Cavity Based 240 GHz, 1 MW Gyrotron for Future Tokamak System

    NASA Astrophysics Data System (ADS)

    Kumar, Nitin; Singh, Udaybir; Bera, Anirban; Sinha, A. K.

    2017-11-01

    In this paper, we present the RF behavior of conventional cylindrical interaction cavity for 240 GHz, 1 MW gyrotron for futuristic plasma fusion reactors. Very high-order TE mode is searched for this gyrotron to minimize the Ohmic wall loading at the interaction cavity. The mode selection process is carried out rigorously to analyze the mode competition and design feasibility. The cold cavity analysis and beam-wave interaction computation are carried out to finalize the cavity design. The detail parametric analyses for interaction cavity are performed in terms of mode stability, interaction efficiency and frequency. In addition, the design of triode type magnetron injection gun is also discussed. The electron beam parameters such as velocity ratio and velocity spread are optimized as per the requirement at interaction cavity. The design studies presented here confirm the realization of CW, 1 MW power at 240 GHz frequency at TE46,17 mode.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peglow, S.G.

    We feel that the concept of intercepting a fractionated threat from a tactical ballistic missile is potentially feasible and would have very high payoff for the defense. Many other concepts have been suggested to solve this problem, although they have mostly been more futuristic approaches, e.g. aircrafty based lasers. We also believe that current technologies are not likely to be adequate for the expected types of very small submunition payloads, especially in the presence of relatively simple countermeasures. The MEDUSA concept, or its clones, may very well provide a vehicle for the study of less stressing threats, e.g. separating warheadsmore » and provide a lethality enhancement for non-deployed payloads. An opportunity also exists to investigate alternative technologies, such as the explosively-formed ``disk`` idea. The use of high-precision, limited field-of-view sensor-fuzed munitions is a subject of interest in other Defense Department programs and may have application to the important area of theater missile defense.« less

  10. Low Cost Inkjet Printed Smart Bandage for Wireless Monitoring of Chronic Wounds

    PubMed Central

    Farooqui, Muhammad Fahad; Shamim, Atif

    2016-01-01

    Chronic wounds affect millions of patients around the world and their treatment is challenging as the early signs indicating their development are subtle. In addition, a type of chronic wound, known as pressure ulcer, develops in patients with limited mobility. Infection and frequent bleeding are indicators of chronic wound development. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage, which can send early warnings for the parameters like irregular bleeding, variations in pH levels and external pressure at wound site. In addition to the early warnings, this smart bandage concept can provide long term wound progression data to the health care providers. The smart bandage comprises a disposable part which has the inkjet printed sensors and a reusable part constituting the wireless electronics. This work is an important step towards futuristic wearable sensors for remote health care applications. PMID:27353200

  11. Level conceptual change pre-service elementary teachers on electric current conceptions through visual multimedia supported conceptual change

    NASA Astrophysics Data System (ADS)

    Hermita, N.; Suhandi, A.; Syaodih, E.; Samsudin, A.; Marhadi, H.; Sapriadil, S.; Zaenudin, Z.; Rochman, C.; Mansur, M.; Wibowo, F. C.

    2018-05-01

    Now a day, conceptual change is the most valuable issues in the science education perspective, especially in the elementary education. Researchers have already dialed with the aim of the research to increase level conceptual change process on the electric conceptions through Visual Multimedia Supported Conceptual Change Text (VMMSCCText). We have ever utilized research and development method namely 3D-1I stands for Define, Design, Development, and Implementation. The 27 pre-service elementary teachers were involved in the research. The battery function in circuit electric conception is the futuristic concept which should have been learned by the students. Moreover, the data which was collected reports that static about 0%, disorientation about 0%, reconstruction about 55.6%, and construction about 25.9%. It can be concluded that the implementation of VMMSCCText to pre-service elementary teachers are increased to level conceptual change categories.

  12. Research Technology

    NASA Image and Video Library

    1998-01-01

    Engineers at Marshall Space Flight Center (MSFC) in Huntsville, Alabama, are working with industry partners to develop a new generation of more cost-efficient space vehicles. Lightweight fuel tanks and components under development will be the critical elements in tomorrow's reusable launch vehicles and will tremendously curb the costs of getting to space. In this photo, Tom DeLay, a materials processes engineer for MSFC, uses a new graphite epoxy technology to create lightweight cryogenic fuel lines for futuristic reusable launch vehicles. He is wrapping a water-soluble mandrel, or mold, with a graphite fabric coated with an epoxy resin. Once wrapped, the pipe will be vacuum-bagged and autoclave-cured. The disposable mold will be removed to reveal a thin-walled fuel line. In addition to being much lighter and stronger than metal, this material won't expand or contract as much in the extreme temperatures encountered by launch vehicles.

  13. Metabolic pathways for lipid synthesis under nitrogen stress in Chlamydomonas and Nannochloropsis.

    PubMed

    Banerjee, Avik; Maiti, Subodh K; Guria, Chandan; Banerjee, Chiranjib

    2017-01-01

    Microalgae are currently being considered as a clean, sustainable and renewable energy source. Enzymes that catalyse the metabolic pathways for biofuel production are specific and require strict regulation and co-ordination. Thorough knowledge of these key enzymes along with their regulatory molecules is essential to enable rational metabolic engineering, to drive the metabolic flux towards the desired metabolites of importance. This paper reviews two key enzymes that play their role in production of bio-oil: DGAT (acyl-CoA:diacylglycerol acyltransferase) and PDAT (phospholipid:diacylglycerol acyltransferase). It also deals with the transcription factors that control the enzymes while cell undergoes a metabolic shift under stress. The paper also discusses the association of other enzymes and pathways that provide substrates and precursors for oil accumulation. Finally a futuristic solution has been proposed about a synthetic algal cell platform that would be committed towards biofuel synthesis.

  14. Low Cost Inkjet Printed Smart Bandage for Wireless Monitoring of Chronic Wounds

    NASA Astrophysics Data System (ADS)

    Farooqui, Muhammad Fahad; Shamim, Atif

    2016-06-01

    Chronic wounds affect millions of patients around the world and their treatment is challenging as the early signs indicating their development are subtle. In addition, a type of chronic wound, known as pressure ulcer, develops in patients with limited mobility. Infection and frequent bleeding are indicators of chronic wound development. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage, which can send early warnings for the parameters like irregular bleeding, variations in pH levels and external pressure at wound site. In addition to the early warnings, this smart bandage concept can provide long term wound progression data to the health care providers. The smart bandage comprises a disposable part which has the inkjet printed sensors and a reusable part constituting the wireless electronics. This work is an important step towards futuristic wearable sensors for remote health care applications.

  15. Low Cost Inkjet Printed Smart Bandage for Wireless Monitoring of Chronic Wounds.

    PubMed

    Farooqui, Muhammad Fahad; Shamim, Atif

    2016-06-29

    Chronic wounds affect millions of patients around the world and their treatment is challenging as the early signs indicating their development are subtle. In addition, a type of chronic wound, known as pressure ulcer, develops in patients with limited mobility. Infection and frequent bleeding are indicators of chronic wound development. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage, which can send early warnings for the parameters like irregular bleeding, variations in pH levels and external pressure at wound site. In addition to the early warnings, this smart bandage concept can provide long term wound progression data to the health care providers. The smart bandage comprises a disposable part which has the inkjet printed sensors and a reusable part constituting the wireless electronics. This work is an important step towards futuristic wearable sensors for remote health care applications.

  16. Who can resist Foucault?

    PubMed

    Bleakley, Alan; Bligh, John

    2009-08-01

    Michel Foucault's analysis of "the birth of the clinic" describes the genesis of a unified discourse that, in retrospect, has shaped western medicine for two centuries. However, in looking prospectively toward a 21st century medicine, Foucault's analysis is necessary but not sufficient. To better critically address medicine and medical education in the era of simulation, we could draw on frameworks developed by futurists such as Jean Baudrillard. Foucault's analysis does not account for contemporary, complex developments of the clinical gaze as the gaze is distributed across practitioners in increasing use of sophisticated, representational diagnostic imaging. Further, Foucault's antihumanist rhetoric sometimes strays into the antihumane, and this is disturbing for those who support the development of patient-centered medicine. Yet we are increasingly teaching aspects of medicine, such as communication, in simulated learning environments in which complex reality is absent, perhaps inadvertently creating an "inhumanity" in medical education.

  17. Using the MCPLXS Generator for Technology Transfer

    NASA Technical Reports Server (NTRS)

    Moore, Arlene A.; Dean, Edwin B.

    1987-01-01

    The objective of this paper is to acquaint you with some of the approaches we are taking at Langley to incorporate escalations (or de-escalations) of technology when modeling futuristic systems. Since we have a short turnaround between the time we receive enough descriptive information to start estimating the project and when the estimate is needed (the "we-want-it-yesterday syndrome"), creativity is often necessary. There is not much time available for tool development. It is expedient to use existing tools in an adaptive manner to model the situation at hand. Specifically, this paper describes the use of the RCA PRICE MCPLXS Generator to incorporate technology transfer and technology escalation in estimates for advanced space systems such as Shuttle II and NASA advanced technology vehicles. It is assumed that the reader is familiar with the RCA PRICE family of models as well as the RCA PRICE utility programs such as SCPLX, PARAM, PARASYN, and the MCPLXS Generator.

  18. Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs

    NASA Astrophysics Data System (ADS)

    Wang, Cong; Xu, Gang; Yang, Yi-Xian

    2013-07-01

    In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.

  19. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  20. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

Top