Sample records for key application areas

  1. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  2. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  3. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  4. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  5. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  6. Key areas for wintering North American herons

    USGS Publications Warehouse

    Mikuska, T.; Kushlan, J.A.; Hartley, S.

    1998-01-01

    Nearly all North American heron populations are migratory, but details of where they winter are little known. Locations where North American herons winter were identified using banding recovery data. North American herons winter from Canada through northern South America but especially in eastern North America south of New York, Florida, California, Louisiana, Texas, Mexico and Cuba, these areas accounting for 63% of winter recoveries. We identified regions where recoveries for various species clustered as 'key areas.' These forty-three areas constitute a network of areas that hold sites that likely are important to wintering herons. The relative importance of each area and site within the network must be evaluated by further on the ground inventory. Because of biases inherent in the available data, these hypothesized key areas are indicative rather than exhaustive. As a first cut, this network of areas can serve to inform further inventory activities and can provide an initial basis to begin planning for the year-round conservation of North American heron populations.

  7. Key areas for wintering North American herons

    USGS Publications Warehouse

    Mikuska, T.; Kushlan, J.A.; Hartley, S.

    1998-01-01

    Nearly all North American heron populations are migratory, but details of where they winter are little known. Locations where North American herons winter were identified using banding recovery data. North American herons winter from Canada through northern South America but especially in eastern North America south of New York, Florida, California, Louisiana, Texas, Mexico and Cuba, these areas accounting for 63% of winter recoveries. We identified regions where recoveries for various species clustered as "key areas." These forty-three areas constitute a network of areas that hold sites that likely are important to wintering North American herons. Within each area, we identify specific sites that are potentially important to wintering herons. The relative importance of each area and site within the network must be evaluated by further on the ground inventory. Because of biases inherent in the available data, these hypothesized key areas are indicative rather than exhaustive. As a first cut, this network of areas can serve to inform further inventory activities and can provide an initial basis to begin planning for the year-round conservation of North American heron populations.

  8. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  9. Leaf-IT: An Android application for measuring leaf area.

    PubMed

    Schrader, Julian; Pillar, Giso; Kreft, Holger

    2017-11-01

    The use of plant functional traits has become increasingly popular in ecological studies because plant functional traits help to understand key ecological processes in plant species and communities. This also includes changes in diversity, inter- and intraspecific interactions, and relationships of species at different spatiotemporal scales. Leaf traits are among the most important traits as they describe key dimensions of a plant's life history strategy. Further, leaf area is a key parameter with relevance for other traits such as specific leaf area, which in turn correlates with leaf chemical composition, photosynthetic rate, leaf longevity, and carbon investment. Measuring leaf area usually involves the use of scanners and commercial software and can be difficult under field conditions. We present Leaf-IT, a new smartphone application for measuring leaf area and other trait-related areas. Leaf-IT is free, designed for scientific purposes, and runs on Android 4 or higher. We tested the precision and accuracy using objects with standardized area and compared the area measurements of real leaves with the well-established, commercial software WinFOLIA using the Altman-Bland method. Area measurements of standardized objects show that Leaf-IT measures area with high accuracy and precision. Area measurements with Leaf-IT of real leaves are comparable to those of WinFOLIA. Leaf-IT is an easy-to-use application running on a wide range of smartphones. That increases the portability and use of Leaf-IT and makes it possible to measure leaf area under field conditions typical for remote locations. Its high accuracy and precision are similar to WinFOLIA. Currently, its main limitation is margin detection of damaged leaves or complex leaf morphologies.

  10. 13. VIEW INTO BLOCK AREA SHOWING KEY MECHANISM, NOTE FLOOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. VIEW INTO BLOCK AREA SHOWING KEY MECHANISM, NOTE FLOOR SEPARATION AT THRESHOLD AND KEY-WINDING MECHANISM - Montgomery County Jail, Washington & Spring Streets, Crawfordsville, Montgomery County, IN

  11. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 3 2014-07-01 2014-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  12. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  13. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  14. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  15. Large-area fabrication of superhydrophobic surfaces for practical applications: an overview

    PubMed Central

    Xue, Chao-Hua; Jia, Shun-Tian; Zhang, Jing; Ma, Jian-Zhong

    2010-01-01

    This review summarizes the key topics in the field of large-area fabrication of superhydrophobic surfaces, concentrating on substrates that have been used in commercial applications. Practical approaches to superhydrophobic surface construction and hydrophobization are discussed. Applications of superhydrophobic surfaces are described and future trends in superhydrophobic surfaces are predicted. PMID:27877336

  16. An informatics research agenda to support precision medicine: seven key areas

    PubMed Central

    Avillach, Paul; Benham-Hutchins, Marge; Breitenstein, Matthew K; Crowgey, Erin L; Hoffman, Mark A; Jiang, Xia; Madhavan, Subha; Mattison, John E; Nagarajan, Radhakrishnan; Ray, Bisakha; Shin, Dmitriy; Visweswaran, Shyam; Zhao, Zhongming; Freimuth, Robert R

    2016-01-01

    The recent announcement of the Precision Medicine Initiative by President Obama has brought precision medicine (PM) to the forefront for healthcare providers, researchers, regulators, innovators, and funders alike. As technologies continue to evolve and datasets grow in magnitude, a strong computational infrastructure will be essential to realize PM’s vision of improved healthcare derived from personal data. In addition, informatics research and innovation affords a tremendous opportunity to drive the science underlying PM. The informatics community must lead the development of technologies and methodologies that will increase the discovery and application of biomedical knowledge through close collaboration between researchers, clinicians, and patients. This perspective highlights seven key areas that are in need of further informatics research and innovation to support the realization of PM. PMID:27107452

  17. Sustainable health systems: addressing three key areas.

    PubMed

    Chhanabhai, Prajesh N; Holt, Alec; Benwell, George

    2007-01-01

    In the modern context sustainable health systems are being developed using the newest technological and communication technologies. This is proving to be a great success for the growth of Health Informatics and healthcare improvement. However this revolution is not being reached by a lot of the world population. This paper will address the importance of closing the Digital Divide, Empowerment of health consumers and the importance of converging communications. Key areas in the development of a truly sustainable health system.

  18. An informatics research agenda to support precision medicine: seven key areas.

    PubMed

    Tenenbaum, Jessica D; Avillach, Paul; Benham-Hutchins, Marge; Breitenstein, Matthew K; Crowgey, Erin L; Hoffman, Mark A; Jiang, Xia; Madhavan, Subha; Mattison, John E; Nagarajan, Radhakrishnan; Ray, Bisakha; Shin, Dmitriy; Visweswaran, Shyam; Zhao, Zhongming; Freimuth, Robert R

    2016-07-01

    The recent announcement of the Precision Medicine Initiative by President Obama has brought precision medicine (PM) to the forefront for healthcare providers, researchers, regulators, innovators, and funders alike. As technologies continue to evolve and datasets grow in magnitude, a strong computational infrastructure will be essential to realize PM's vision of improved healthcare derived from personal data. In addition, informatics research and innovation affords a tremendous opportunity to drive the science underlying PM. The informatics community must lead the development of technologies and methodologies that will increase the discovery and application of biomedical knowledge through close collaboration between researchers, clinicians, and patients. This perspective highlights seven key areas that are in need of further informatics research and innovation to support the realization of PM. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  19. Body Area Network BAN--a key infrastructure element for patient-centered medical applications.

    PubMed

    Schmidt, Robert; Norgall, Thomas; Mörsdorf, Joachim; Bernhard, Josef; von der Grün, Thomas

    2002-01-01

    The Body Area Network (BAN) concept enables wireless communication between several miniaturized, intelligent Body Sensor (or actor) Units (BSU) and a single Body Central Unit (BCU) worn at the human body. A separate wireless transmission link from the BCU to a network access point--using different technology--provides for online access to BAN data via usual network infrastructure. BAN is expected to become a basic infrastructure element for service-based electronic health assistance: By integrating patient-attached sensors and control of mobile dedicated actor units, the range of medical workflow can be extended by wireless patient monitoring and therapy support. Beyond clinical use, professional disease management environments, and private personal health assistance scenarios (without financial reimbursement by health agencies/insurance companies), BAN enables a wide range of health care applications and related services.

  20. Space-based observatories providing key data for climate change applications

    NASA Astrophysics Data System (ADS)

    Lecomte, J.; Juillet, J. J.

    2016-12-01

    The Sentinel-1 & 3 mission are part of the Copernicus program, previously known as GMES (Global Monitoring for Environment and Security), whose overall objective is to support Europe's goals regarding sustainable development and global governance of the environment by providing timely and quality data, information, services and knowledge. This European Earth Observation program is led by the European Commission and the space infrastructure is developed under the European Space Agency leadership. Many services will be developed through the Copernicus program among different thematic areas. The climate change is one of this thematic area and the Sentinel-1 & 3 satellites will provide key space-based observations in this area. The Sentinel-1 mission is based on a constellation of 2 identical satellites each one embarking C-SAR Instrument and provides capability for continuous radar mapping of the Earth with enhanced revisit frequency, coverage, timeliness and reliability for operational services and applications requiring long time series. In particular, Sentinel 1 provides all-weather, day-and-night estimates of soil moisture, wind speed and direction, sea ice, continental ice sheets and glaciers. The Sentinel-3 mission will mainly be devoted to the provision of Ocean observation data in routine, long term (20 years of operations) and continuous fashion with a consistent quality and a very high level of availability. Among these data, very accurate surface temperatures and topography measurements will be provided and will constitute key indicators, once ingested in climate change models, for identifying climate drivers and expected climate impacts. The paper will briefly recall the satellite architectures, their main characteristics and performance. The inflight performance and key features of their images or data of the 3 satellites namely Sentinel 1A, 1B and 3A will be reviewed to demonstrate the quality and high scientific potential of the data as well as their

  1. BARI+: a biometric based distributed key management approach for wireless body area networks.

    PubMed

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  2. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    PubMed Central

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain. PMID:22319333

  3. The NASA Applied Science Program Disasters Area: Disaster Applications Research and Response

    NASA Astrophysics Data System (ADS)

    Murray, J. J.; Lindsay, F. E.; Stough, T.; Jones, C. E.

    2014-12-01

    The goal of the Natural Disaster Application Area is to use NASA's capabilities in spaceborne, airborne, surface observations, higher-level derived data products, and modeling and data analysis to improve natural disaster forecasting, mitigation, and response. The Natural Disaster Application Area applies its remote sensing observations, modeling and analysis capabilities to provide hazard and disaster information where and when it is needed. Our application research activities specifically contribute to 1) Understanding the natural processes that produce hazards, 2)Developing hazard mitigation technologies, and 3)Recognizing vulnerability of interdependent critical infrastructure. The Natural Disasters Application area selects research projects through a rigorous, impartial peer-review process that address a broad spectrum of disasters which afflict populations within the United States, regionally and globally. Currently there are 19 active projects in the research portfolio which address the detection, characterization, forecasting and response to a broad range of natural disasters including earthquakes, tsunamis, volcanic eruptions and ash dispersion, wildfires, hurricanes, floods, tornado damage assessment, oil spills and disaster data mining. The Disasters team works with federal agencies to aid the government in meeting the challenges associated with natural disaster response and to transfer technologies to agencies as they become operational. Internationally, the Disasters Area also supports the Committee on Earth Observations Working Group on Disasters, and the International Charter on Space and Disasters to increase, strengthen, and coordinate contributions of NASA Earth-observing satellites and applications products to disaster risk management. The CEOS group will lead pilot efforts focused on identifying key systems to support flooding, earthquake, and volcanic events.

  4. Why and how might genetic and phylogenetic diversity be reflected in the identification of key biodiversity areas?

    PubMed

    Brooks, T M; Cuttelod, A; Faith, D P; Garcia-Moreno, J; Langhammer, P; Pérez-Espona, S

    2015-02-19

    'Key biodiversity areas' are defined as sites contributing significantly to the global persistence of biodiversity. The identification of these sites builds from existing approaches based on measures of species and ecosystem diversity and process. Here, we therefore build from the work of Sgró et al. (2011 Evol. Appl. 4, 326-337. (doi:10.1111/j.1752-4571.2010.00157.x)) to extend a framework for how components of genetic diversity might be considered in the identification of key biodiversity areas. We make three recommendations to inform the ongoing process of consolidating a key biodiversity areas standard: (i) thresholds for the threatened species criterion currently consider a site's share of a threatened species' population; expand these to include the proportion of the species' genetic diversity unique to a site; (ii) expand criterion for 'threatened species' to consider 'threatened taxa' and (iii) expand the centre of endemism criterion to identify as key biodiversity areas those sites holding a threshold proportion of the compositional or phylogenetic diversity of species (within a taxonomic group) whose restricted ranges collectively define a centre of endemism. We also recommend consideration of occurrence of EDGE species (i.e. threatened phylogenetic diversity) in key biodiversity areas to prioritize species-specific conservation actions among sites.

  5. Why and how might genetic and phylogenetic diversity be reflected in the identification of key biodiversity areas?

    PubMed Central

    Brooks, T. M.; Cuttelod, A.; Faith, D. P.; Garcia-Moreno, J.; Langhammer, P.; Pérez-Espona, S.

    2015-01-01

    Key biodiversity areas' are defined as sites contributing significantly to the global persistence of biodiversity. The identification of these sites builds from existing approaches based on measures of species and ecosystem diversity and process. Here, we therefore build from the work of Sgró et al. (2011 Evol. Appl. 4, 326–337. (doi:10.1111/j.1752-4571.2010.00157.x)) to extend a framework for how components of genetic diversity might be considered in the identification of key biodiversity areas. We make three recommendations to inform the ongoing process of consolidating a key biodiversity areas standard: (i) thresholds for the threatened species criterion currently consider a site's share of a threatened species' population; expand these to include the proportion of the species' genetic diversity unique to a site; (ii) expand criterion for ‘threatened species' to consider ‘threatened taxa’ and (iii) expand the centre of endemism criterion to identify as key biodiversity areas those sites holding a threshold proportion of the compositional or phylogenetic diversity of species (within a taxonomic group) whose restricted ranges collectively define a centre of endemism. We also recommend consideration of occurrence of EDGE species (i.e. threatened phylogenetic diversity) in key biodiversity areas to prioritize species-specific conservation actions among sites. PMID:25561678

  6. Assessing the role of mini-applications in predicting key performance characteristics of scientific and engineering applications

    DOE PAGES

    Barrett, R. F.; Crozier, P. S.; Doerfler, D. W.; ...

    2014-09-28

    Computational science and engineering application programs are typically large, complex, and dynamic, and are often constrained by distribution limitations. As a means of making tractable rapid explorations of scientific and engineering application programs in the context of new, emerging, and future computing architectures, a suite of miniapps has been created to serve as proxies for full scale applications. Each miniapp is designed to represent a key performance characteristic that does or is expected to significantly impact the runtime performance of an application program. In this paper we introduce a methodology for assessing the ability of these miniapps to effectively representmore » these performance issues. We applied this methodology to four miniapps, examining the linkage between them and an application they are intended to represent. Herein we evaluate the fidelity of that linkage. This work represents the initial steps required to begin to answer the question, ''Under what conditions does a miniapp represent a key performance characteristic in a full app?''« less

  7. Global conservation outcomes depend on marine protected areas with five key features.

    PubMed

    Edgar, Graham J; Stuart-Smith, Rick D; Willis, Trevor J; Kininmonth, Stuart; Baker, Susan C; Banks, Stuart; Barrett, Neville S; Becerro, Mikel A; Bernard, Anthony T F; Berkhout, Just; Buxton, Colin D; Campbell, Stuart J; Cooper, Antonia T; Davey, Marlene; Edgar, Sophie C; Försterra, Günter; Galván, David E; Irigoyen, Alejo J; Kushner, David J; Moura, Rodrigo; Parnell, P Ed; Shears, Nick T; Soler, German; Strain, Elisabeth M A; Thomson, Russell J

    2014-02-13

    In line with global targets agreed under the Convention on Biological Diversity, the number of marine protected areas (MPAs) is increasing rapidly, yet socio-economic benefits generated by MPAs remain difficult to predict and under debate. MPAs often fail to reach their full potential as a consequence of factors such as illegal harvesting, regulations that legally allow detrimental harvesting, or emigration of animals outside boundaries because of continuous habitat or inadequate size of reserve. Here we show that the conservation benefits of 87 MPAs investigated worldwide increase exponentially with the accumulation of five key features: no take, well enforced, old (>10 years), large (>100 km(2)), and isolated by deep water or sand. Using effective MPAs with four or five key features as an unfished standard, comparisons of underwater survey data from effective MPAs with predictions based on survey data from fished coasts indicate that total fish biomass has declined about two-thirds from historical baselines as a result of fishing. Effective MPAs also had twice as many large (>250 mm total length) fish species per transect, five times more large fish biomass, and fourteen times more shark biomass than fished areas. Most (59%) of the MPAs studied had only one or two key features and were not ecologically distinguishable from fished sites. Our results show that global conservation targets based on area alone will not optimize protection of marine biodiversity. More emphasis is needed on better MPA design, durable management and compliance to ensure that MPAs achieve their desired conservation value.

  8. Global conservation outcomes depend on marine protected areas with five key features

    NASA Astrophysics Data System (ADS)

    Edgar, Graham J.; Stuart-Smith, Rick D.; Willis, Trevor J.; Kininmonth, Stuart; Baker, Susan C.; Banks, Stuart; Barrett, Neville S.; Becerro, Mikel A.; Bernard, Anthony T. F.; Berkhout, Just; Buxton, Colin D.; Campbell, Stuart J.; Cooper, Antonia T.; Davey, Marlene; Edgar, Sophie C.; Försterra, Günter; Galván, David E.; Irigoyen, Alejo J.; Kushner, David J.; Moura, Rodrigo; Parnell, P. Ed; Shears, Nick T.; Soler, German; Strain, Elisabeth M. A.; Thomson, Russell J.

    2014-02-01

    In line with global targets agreed under the Convention on Biological Diversity, the number of marine protected areas (MPAs) is increasing rapidly, yet socio-economic benefits generated by MPAs remain difficult to predict and under debate. MPAs often fail to reach their full potential as a consequence of factors such as illegal harvesting, regulations that legally allow detrimental harvesting, or emigration of animals outside boundaries because of continuous habitat or inadequate size of reserve. Here we show that the conservation benefits of 87 MPAs investigated worldwide increase exponentially with the accumulation of five key features: no take, well enforced, old (>10 years), large (>100km2), and isolated by deep water or sand. Using effective MPAs with four or five key features as an unfished standard, comparisons of underwater survey data from effective MPAs with predictions based on survey data from fished coasts indicate that total fish biomass has declined about two-thirds from historical baselines as a result of fishing. Effective MPAs also had twice as many large (>250mm total length) fish species per transect, five times more large fish biomass, and fourteen times more shark biomass than fished areas. Most (59%) of the MPAs studied had only one or two key features and were not ecologically distinguishable from fished sites. Our results show that global conservation targets based on area alone will not optimize protection of marine biodiversity. More emphasis is needed on better MPA design, durable management and compliance to ensure that MPAs achieve their desired conservation value.

  9. Key Performance Indicators for Primary Schools.

    ERIC Educational Resources Information Center

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  10. An Improved EKG-Based Key Agreement Scheme for Body Area Networks

    NASA Astrophysics Data System (ADS)

    Ali, Aftab; Khan, Farrukh Aslam

    Body area networks (BANs) play an important role in mobile health monitoring such as, monitoring the health of patients in a hospital or physical status of soldiers in a battlefield. By securing the BAN, we actually secure the lives of soldiers or patients. This work presents an electrocardiogram (EKG) based key agreement scheme using discrete wavelet transform (DWT) for the sake of generating a common key in a body area network. The use of EKG brings plug-and-play capability in BANs; i.e., the sensors are just placed on the human body and a secure communication is started among these sensors. The process is made secure by using the iris or fingerprints to lock and then unlock the blocks during exchange between the communicating sensors. The locking and unlocking is done through watermarking. When a watermark is added at the sender side, the block is locked and when it is removed at the receiver side, the block is unlocked. By using iris or fingerprints, the security of the technique improves and its plug-and-play capability is not affected. The analysis is done by using real 2-lead EKG data sampled at a rate of 125 Hz taken from MIT PhysioBank database.

  11. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    PubMed

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  12. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  13. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  14. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  15. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  16. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  17. Non-resonant electromagnetic energy harvester for car-key applications

    NASA Astrophysics Data System (ADS)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  18. Designing application software in wide area network settings

    NASA Technical Reports Server (NTRS)

    Makpangou, Mesaac; Birman, Ken

    1990-01-01

    Progress in methodologies for developing robust local area network software has not been matched by similar results for wide area settings. The design of application software spanning multiple local area environments is examined. For important classes of applications, simple design techniques are presented that yield fault tolerant wide area programs. An implementation of these techniques as a set of tools for use within the ISIS system is described.

  19. Field and long-term demonstration of a wide area quantum key distribution network.

    PubMed

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-09-08

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.

  20. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  1. Using a Mobile Dichotomous Key iPad Application as a Scaffolding Tool in a Museum Setting

    ERIC Educational Resources Information Center

    Knight, Kathryn; Davies, Randall S.

    2016-01-01

    This study tested an iPad application using a dichotomous key as a scaffolding tool to help students make more detailed observations as they identified various species of birds on display in a museum of natural science. The Mobile Dichotomous Key (MDK) iPad application was used by groups of fifth- and seventh-grade students. Analysis of the…

  2. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    PubMed

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  3. Quantum key distribution over an installed multimode optical fiber local area network.

    PubMed

    Namekata, Naoto; Mori, Shigehiko; Inoue, Shuichiro

    2005-12-12

    We have investigated the possibility of a multimode fiber link for a quantum channel. Transmission of light in an extremely underfilled mode distribution promises a single-mode-like behavior in the multimode fiber. To demonstrate the performance of the fiber link we performed quantum key distribution, on the basis of the BB84 four-state protocol, over 550 m of an installed multimode optical fiber local area network, and the quantum-bit-error rate of 1.09 percent was achieved.

  4. Transition in Education: Policy Making and the Key Educational Policy Areas in the Central-European and Baltic Countries.

    ERIC Educational Resources Information Center

    Rado, Peter

    This report examines transition in educational systems and identifies key policy areas in Central-Eastern European countries. It summarizes policy implications of the transition process within the educational context of these countries. Chapter 1, "Transition and Education," outlines key characteristics of the transition process and…

  5. Research on Key Technology and Applications for Internet of Things

    NASA Astrophysics Data System (ADS)

    Chen, Xian-Yi; Jin, Zhi-Gang

    The Internet of Things (IOT) has been paid more and more attention by the academe, industry, and government all over the world. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology, and ZigBee technology are analyzed. The framework of digital agriculture application based on IOT is proposed.

  6. Evaluating U.S. National Heritage Areas: theory, methods, and application.

    PubMed

    Laven, Daniel; Ventriss, Curtis; Manning, Robert; Mitchell, Nora

    2010-08-01

    Like many governmental actors in recent decades, the U.S. National Park Service (NPS) has operated increasingly through partnerships with other state and federal agencies, non-governmental organizations (NGOs), community groups, and private sector corporations. Perhaps the most salient example of this trend toward partnerships is the rapid growth and development of national heritage areas (NHAs). Since the first NHA received congressional designation in 1984, NHAs have become an increasingly popular strategy for protecting and managing landscapes. To date, congressional designation has been granted to 49 NHAs, making them one of the fastest growing initiatives involving the NPS. Despite this growth, no prior research has examined the efficacy or effectiveness of the NHA model. This article introduces the NHA concept, while reviewing the literature on evaluation research and its application to protected area management. We then offer an NHA program theory model for evaluating NHAs. The model was developed using a theory-based, process evaluation approach, along with 90 qualitative interviews conducted at three study sites: Blackstone River Valley National Heritage Corridor, MA-RI (BLAC); Delaware and Lehigh National Heritage Corridor, PA (DELE); and Cane River National Heritage Area, LA (CANE). We conclude by discussing the key challenges and implications associated with developing a long-term research agenda for evaluating NHAs.

  7. Evaluating U.S. National Heritage Areas: Theory, Methods, and Application

    NASA Astrophysics Data System (ADS)

    Laven, Daniel; Ventriss, Curtis; Manning, Robert; Mitchell, Nora

    2010-08-01

    Like many governmental actors in recent decades, the U.S. National Park Service (NPS) has operated increasingly through partnerships with other state and federal agencies, non-governmental organizations (NGOs), community groups, and private sector corporations. Perhaps the most salient example of this trend toward partnerships is the rapid growth and development of national heritage areas (NHAs). Since the first NHA received congressional designation in 1984, NHAs have become an increasingly popular strategy for protecting and managing landscapes. To date, congressional designation has been granted to 49 NHAs, making them one of the fastest growing initiatives involving the NPS. Despite this growth, no prior research has examined the efficacy or effectiveness of the NHA model. This article introduces the NHA concept, while reviewing the literature on evaluation research and its application to protected area management. We then offer an NHA program theory model for evaluating NHAs. The model was developed using a theory-based, process evaluation approach, along with 90 qualitative interviews conducted at three study sites: Blackstone River Valley National Heritage Corridor, MA-RI (BLAC); Delaware and Lehigh National Heritage Corridor, PA (DELE); and Cane River National Heritage Area, LA (CANE). We conclude by discussing the key challenges and implications associated with developing a long-term research agenda for evaluating NHAs.

  8. WaterWorld, a spatial hydrological model applied at scales from local to global: key challenges to local application

    NASA Astrophysics Data System (ADS)

    Burke, Sophia; Mulligan, Mark

    2017-04-01

    WaterWorld is a widely used spatial hydrological policy support system. The last user census indicates regular use by 1029 institutions across 141 countries. A key feature of WaterWorld since 2001 is that it comes pre-loaded with all of the required data for simulation anywhere in the world at a 1km or 1 ha resolution. This means that it can be easily used, without specialist technical ability, to examine baseline hydrology and the impacts of scenarios for change or management interventions to support policy formulation, hence its labelling as a policy support system. WaterWorld is parameterised by an extensive global gridded database of more than 600 variables, developed from many sources, since 1998, the so-called simTerra database. All of these data are available globally at 1km resolution and some variables (terrain, land cover, urban areas, water bodies) are available globally at 1ha resolution. If users have access to better data than is pre-loaded, they can upload their own data. WaterWorld is generally applied at the national or basin scale at 1km resolution, or locally (for areas of <10,000km2) at 1ha resolution, though continental (1km resolution) and global (10km resolution) applications are possible so it is a model with local to global applications. WaterWorld requires some 140 maps to run including monthly climate data, land cover and use, terrain, population, water bodies and more. Whilst publically-available terrain and land cover data are now well developed for local scale application, climate and land use data remain a challenge, with most global products being available at 1km or 10km resolution or worse, which is rather coarse for local application. As part of the EartH2Observe project we have used WFDEI (WATCH Forcing Data methodology applied to ERA-Interim data) at 1km resolution to provide an alternative input to WaterWorld's preloaded climate data. Here we examine the impacts of that on key hydrological outputs: water balance, water quality

  9. 77 FR 45715 - Application of Key Lime Air Corporation for Commuter Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-01

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary [Docket DOT-OST-2009-0116] Application of Key Lime Air Corporation for Commuter Authority AGENCY: Department of Transportation. ACTION: Notice of... Lime Air Corporation fit, willing, and able, and awarding it a Commuter Air Carrier Authorization...

  10. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  11. [Strategy of comprehensive control for schistosomiasis and its effect in key areas of Jiangsu Province].

    PubMed

    Sun, Le-Ping; Tian, Zeng-Xi; Yang, Kun; Hong, Qing-Biao; Gao, Yang; Gao, Yuan; Zhang, Lian-Heng; Yang, Guo-Jing; Min, Jie; Ge, Jun; Wu, Hong-Hui; Huang, Yi-Xin; Liang, You-Sheng

    2011-12-01

    To evaluate the effect of comprehensive control for schistosomiasis in key areas of Jiangsu Province. The basic data and the data of implementation of comprehensive control measures were collected from the key areas of Jiangsu Province, including 30 townships, 87 marshlands and 78 anchor points. A field survey was carried out to investigate the Oncomelania snail status by using the systematic sampling method and schistosomiasis morbidity in humans and animals in the 12 key counties (districts). The changes of snail status and morbidity of humans and animals were statistically analyzed in key counties (districts) where comprehensive control measures was implemented, and the effects of schistosomiasis control before and after the implementation of the comprehensive control were compared. From 2008 to 2010, a total of 84 100 harmless latrines were constructed, 339 600 persons were examined, 2.6938 million people received health education, 112 000 protective creams and 798 000 publicity materials were allocated, 9 085 domestic animals were reared in pens, 11 800 domestic animals were examined, 130 high-risk cattle were eliminated in 30 key townships of 12 countries (districts), Jiangsu Province. A total of 19 640.78 hm2 were controlled with molluscicides, 798 warning tablets were placed, 116.07 hm2 of farmlands were ploughed up and planted, 306.80 hm2 were dug for fish culture, and 506.74 hm2 were planted with trees for snail control in 87 high-risk marshlands. A total of 118.83 million Yuan were invested into the water resources development projects, 39.82 km-long rivers were dredged, 70.04 km-long bank were concreted, 30 culvert gates were re-constructed, and 22 snail sedimentation tanks were built. In the 78 anchor points, 95 harmless public toilets were built, 3 192 stool container were allocated, 28 700 boatmen were examined, 71 600 protective creams and 53 200 publicity materials were allocated, and 46 600 persons received health education. Following the

  12. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    NASA Astrophysics Data System (ADS)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  13. Surface-area-controlled synthesis of porous TiO2 thin films for gas-sensing applications

    NASA Astrophysics Data System (ADS)

    Park, Jae Young; Kim, Ho-hyoung; Rana, Dolly; Jamwal, Deepika; Katoch, Akash

    2017-03-01

    Surface-area-controlled porous TiO2 thin films were prepared via a simple sol-gel chemical route, and their gas-sensing properties were thoroughly investigated in the presence of typical oxidizing NO2 gas. The surface area of TiO2 thin films was controlled by developing porous TiO2 networked by means of controlling the TiO2-to-TTIP (titanium isopropoxide, C12H28O4Ti) molar ratio, where TiO2 nanoparticles of size ˜20 nm were used. The sensor’s response was found to depend on the surface area of the TiO2 thin films. The porous TiO2 thin-film sensor with greater surface area was more sensitive than those of TiO2 thin films with lesser surface area. The improved sensing ability was ascribed to the porous network formed within the thin films by TiO2 sol. Our results show that surface area is a key parameter for obtaining superior gas-sensing performance; this provides important guidelines for preparing and using porous thin films for gas-sensing applications.

  14. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    PubMed

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  15. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  16. Remote sensing for mined area reclamation: Application inventory

    NASA Technical Reports Server (NTRS)

    1971-01-01

    Applications of aerial remote sensing to coal mined area reclamation are documented, and information concerning available data banks for coal producing areas in the east and midwest is given. A summary of mined area information requirements to which remote sensing methods might contribute is included.

  17. Application areas of 3D bioprinting.

    PubMed

    Ozbolat, Ibrahim T; Peng, Weijie; Ozbolat, Veli

    2016-08-01

    Three dimensional (3D) bioprinting has been a powerful tool in patterning and precisely placing biologics, including living cells, nucleic acids, drug particles, proteins and growth factors, to recapitulate tissue anatomy, biology and physiology. Since the first time of cytoscribing cells demonstrated in 1986, bioprinting has made a substantial leap forward, particularly in the past 10 years, and it has been widely used in fabrication of living tissues for various application areas. The technology has been recently commercialized by several emerging businesses, and bioprinters and bioprinted tissues have gained significant interest in medicine and pharmaceutics. This Keynote review presents the bioprinting technology and covers a first-time comprehensive overview of its application areas from tissue engineering and regenerative medicine to pharmaceutics and cancer research. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Exploration maturity key to ranking search areas

    USGS Publications Warehouse

    Attanasi, E.D.; Freeman, P.A.

    2008-01-01

    The study area of US Geological Survey Circular 1288, the world outside the US and Canada, was partitioned into 44 countries and country groups. Map figures such as Fig. 2 and graphs similar to Figs. 3 and 4 provide a visual summary of maturity of oil and gas exploration. From 1992 through 2001, exploration data show that in the study area the delineated prospective area expanded at a rate of about 50,000 sq miles/year, while the explored area grew at a rate of 11,000 sq miles/year. The delineated prospective area established by 1970 accounts for less than 40% of total delineated prospective area but contains 75% of the oil discovered to date in the study area. From 1991 through 2000, offshore discoveries accounted for 59% of the oil and 77% of the gas discovered in the study area.

  19. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  20. Application and the key technology on high power fiber-optic laser in laser weapon

    NASA Astrophysics Data System (ADS)

    Qu, Zhou; Li, Qiushi; Meng, Haihong; Sui, Xin; Zhang, Hongtao; Zhai, Xuhua

    2014-12-01

    The soft-killing laser weapon plays an important role in photoelectric defense technology. It can be used for photoelectric detection, search, blinding of photoelectric sensor and other devices on fire control and guidance devices, therefore it draws more and more attentions by many scholars. High power fiber-optic laser has many virtues such as small volume, simple structure, nimble handling, high efficiency, qualified light beam, easy thermal management, leading to blinding. Consequently, it may be used as the key device of soft-killing laser weapon. The present study introduced the development of high power fiber-optic laser and its main features. Meanwhile the key technology of large mode area (LMA) optical fiber design, the beam combination technology, double-clad fiber technology and pumping optical coupling technology was stated. The present study is aimed to design high doping LMA fiber, ensure single mode output by increasing core diameter and decrease NA. By means of reducing the spontaneous emission particle absorbed by fiber core and Increasing the power density in the optical fiber, the threshold power of nonlinear effect can increase, and the power of single fiber will be improved. Meantime, high power will be obtained by the beam combination technology. Application prospect of high power fiber laser in photoelectric defense technology was also set forth. Lastly, the present study explored the advantages of high power fiber laser in photoelectric defense technology.

  1. Sustainability Assessment of Future Scenarios: Methodology and Application to Mountain Areas of Europe

    NASA Astrophysics Data System (ADS)

    Sheate, William R.; Partidário, Maria Rosário Do; Byron, Helen; Bina, Olivia; Dagg, Suzan

    2008-02-01

    BioScene (scenarios for reconciling biodiversity conservation with declining agriculture use in mountain areas in Europe) was a three-year project (2002 2005) funded by the European Union’s Fifth Framework Programme, and aimed to investigate the implications of agricultural restructuring and decline for biodiversity conservation in the mountain areas of Europe. The research took a case study approach to the analysis of the biodiversity processes and outcomes of different scenarios of agri-environmental change in six countries (France, Greece, Norway, Slovakia, Switzerland, and the United Kingdom) covering the major biogeographical regions of Europe. The project was coordinated by Imperial College London, and each study area had a multidisciplinary team including ecologists and social and economic experts, which sought a comprehensive understanding of the drivers for change and their implications for sustainability. A key component was the sustainability assessment (SA) of the alternative scenarios. This article discusses the development and application of the SA methodology developed for BioScene. While the methodology was objectives-led, it was also strongly grounded in baseline ecological and socio-economic data. This article also describes the engagement of stakeholder panels in each study area and the use of causal chain analysis for understanding the likely implications for land use and biodiversity of strategic drivers of change under alternative scenarios for agriculture and rural policy and for biodiversity management. Finally, this article draws conclusions for the application of SA more widely, its use with scenarios, and the benefits of stakeholder engagement in the SA process.

  2. 25 CFR 558.3 - Procedures for forwarding applications and reports for key employees and primary management...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... INDIAN GAMING COMMISSION, DEPARTMENT OF THE INTERIOR GAMING LICENSES AND BACKGROUND INVESTIGATIONS FOR KEY EMPLOYEES AND PRIMARY MANAGEMENT OFFICIALS GAMING LICENSES FOR KEY EMPLOYEES AND PRIMARY... at a gaming operation, a tribe shall: (1) Forward to the Commission a completed application for...

  3. First direct landscape-scale measurement of tropical rain forest Leaf Area Index, a key driver of global primary productivity

    Treesearch

    David B. Clark; Paulo C. Olivas; Steven F. Oberbauer; Deborah A. Clark; Michael G. Ryan

    2008-01-01

    Leaf Area Index (leaf area per unit ground area, LAI) is a key driver of forest productivity but has never previously been measured directly at the landscape scale in tropical rain forest (TRF). We used a modular tower and stratified random sampling to harvest all foliage from forest floor to canopy top in 55 vertical transects (4.6 m2) across 500 ha of old growth in...

  4. Roadmap for High School Feedback Reports: Key Focus Areas to Ensure Quality Implementation. Data for Action

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2014

    2014-01-01

    High school feedback reports let school and district leaders know where their students go after graduation and how well they are prepared for college and beyond. This roadmap discusses the seven key focus areas the Data Quality Campaign (DQC) recommends states work on to ensure quality implementation of high school feedback reports.

  5. Body area network--a key infrastructure element for patient-centered telemedicine.

    PubMed

    Norgall, Thomas; Schmidt, Robert; von der Grün, Thomas

    2004-01-01

    The Body Area Network (BAN) extends the range of existing wireless network technologies by an ultra-low range, ultra-low power network solution optimised for long-term or continuous healthcare applications. It enables wireless radio communication between several miniaturised, intelligent Body Sensor (or actor) Units (BSU) and a single Body Central Unit (BCU) worn at the human body. A separate wireless transmission link from the BCU to a network access point--using different technology--provides for online access to BAN components via usual network infrastructure. The BAN network protocol maintains dynamic ad-hoc network configuration scenarios and co-existence of multiple networks.BAN is expected to become a basic infrastructure element for electronic health services: By integrating patient-attached sensors and mobile actor units, distributed information and data processing systems, the range of medical workflow can be extended to include applications like wireless multi-parameter patient monitoring and therapy support. Beyond clinical use and professional disease management environments, private personal health assistance scenarios (without financial reimbursement by health agencies / insurance companies) enable a wide range of applications and services in future pervasive computing and networking environments.

  6. Research and application of key technology of electric submersible plunger pump

    NASA Astrophysics Data System (ADS)

    Qian, K.; Sun, Y. N.; Zheng, S.; Du, W. S.; Li, J. N.; Pei, G. Z.; Gao, Y.; Wu, N.

    2018-06-01

    Electric submersible plunger pump is a new generation of rodless oil production equipment, whose improvements and upgrades of key technologies are conducive to its large-scale application and reduce the cost and improve the efficiency. In this paper, the operating mechanism of the unit in-depth study, aimed at the problems existing in oilfield production, to propose an optimization method creatively, including the optimal design of a linear motor for submersible oil, development of new double-acting load-relief pump, embedded flexible closed-loop control technology, research and development of low-cost power cables. 90 oil wells were used on field application, the average pump inspection cycle is 608 days, the longest pump check cycle has exceeded 1037 days, the average power saving rate is 45.6%. Application results show that the new technology of optimization and upgrading can further improve the reliability and adaptability of electric submersible plunger pump, reduce the cost of investment.

  7. Large-area graphene for sensor applications

    NASA Astrophysics Data System (ADS)

    Snow, Eric S.

    2010-04-01

    Graphene represents an important new material with potential Department of Defense sensor applications. At the Naval Research Laboratory we have developed three techniques to produce large-area graphene films. We have used this material to construct chemical and radio-frequency electromagnetic sensors. Here we report the initial results of this effort.

  8. Geology is the Key to Explain Igneous Activity in the Mediterranean Area

    NASA Astrophysics Data System (ADS)

    Lustrino, M.

    2014-12-01

    Igneous activity in tectonically complex areas can be interpreted in many different ways, producing completely different petrogenetic models. Processes such as oceanic and continental subduction, lithospheric delamination, changes in subduction polarity, slab break-off and mantle plumes have all been advocated as causes for changes in plate boundaries and magma production, including rate and temporal distribution, in the circum-Mediterranean area. This region thus provides a natural laboratory to investigate a range of geodynamic and magmatic processes. Although many petrologic and tectonic models have been proposed, a number of highly controversial questions still remain. No consensus has yet been reached about the capacity of plate-tectonic processes to explain the origin and style of the magmatism. Similarly, there is still not consensus on the ability of geochemical and petrological arguments to reveal the geodynamic evolution of the area. The wide range of chemical and mineralogical magma compositions produced within and around the Mediterranean, from carbonatites to strongly silica-undersaturated silico-carbonatites and melilitites to strongly silica-oversaturated rhyolites, complicate models and usually require a large number of unconstrained assumptions. Can the calcalkaline-sodic alkaline transition be related to any common petrogenetic point? Is igneous activity plate-tectonic- (top-down) or deep-mantle-controlled (bottom-up)? Do the rare carbonatites and carbonate-rich igneous rocks derive from the deep mantle or a normal, CO2-bearing upper mantle? Do ultrapotassic compositions require continental subduction? Understanding chemically complex magmas emplaced in tectonically complex areas require open minds, and avoiding dogma and assumptions. Studying the geology and shallow dynamics, not speculating about the deep lower mantle, is the key to understanding the igneous activity.

  9. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  10. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  11. Field demonstration of a continuous-variable quantum key distribution network.

    PubMed

    Huang, Duan; Huang, Peng; Li, Huasheng; Wang, Tao; Zhou, Yingming; Zeng, Guihua

    2016-08-01

    We report on what we believe is the first field implementation of a continuous-variable quantum key distribution (CV-QKD) network with point-to-point configuration. Four QKD nodes are deployed on standard communication infrastructures connected with commercial telecom optical fiber. Reliable key exchange is achieved in the wavelength-division-multiplexing CV-QKD network. The impact of a complex and volatile field environment on the excess noise is investigated, since excess noise controlling and reduction is arguably the major issue pertaining to distance and the secure key rate. We confirm the applicability and verify the maturity of the CV-QKD network in a metropolitan area, thus paving the way for a next-generation global secure communication network.

  12. Compact FPGA hardware architecture for public key encryption in embedded devices.

    PubMed

    Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).

  13. The Key Technologies. Some Implications for Education and Training. An Occasional Paper.

    ERIC Educational Resources Information Center

    Mansell, Jack; And Others

    National competitiveness depends in large part on the practical application of technologies. Educational planners must, therefore, identify key (newly emerging) topics in science and engineering that are likely to have a major evolutionary effect on industry and incorporate these areas into existing vocational and technical curricula. Because…

  14. Field test of quantum key distribution in the Tokyo QKD Network.

    PubMed

    Sasaki, M; Fujiwara, M; Ishizuka, H; Klaus, W; Wakui, K; Takeoka, M; Miki, S; Yamashita, T; Wang, Z; Tanaka, A; Yoshino, K; Nambu, Y; Takahashi, S; Tajima, A; Tomita, A; Domeki, T; Hasegawa, T; Sakai, Y; Kobayashi, H; Asai, T; Shimizu, K; Tokura, T; Tsurumaru, T; Matsui, M; Honjo, T; Tamaki, K; Takesue, H; Tokura, Y; Dynes, J F; Dixon, A R; Sharpe, A W; Yuan, Z L; Shields, A J; Uchikoga, S; Legré, M; Robyr, S; Trinkler, P; Monat, L; Page, J-B; Ribordy, G; Poppe, A; Allacher, A; Maurhart, O; Länger, T; Peev, M; Zeilinger, A

    2011-05-23

    A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to demonstrate the world-first secure TV conferencing over a distance of 45km. The network includes a commercial QKD product for long-term stable operation, and application interface to secure mobile phones. Detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.

  15. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  16. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  17. 25 CFR 273.23 - Submitting application to Area Office.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Submitting application to Area Office. 273.23 Section 273.23 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR INDIAN SELF-DETERMINATION AND EDUCATION ASSISTANCE ACT PROGRAM EDUCATION CONTRACTS UNDER JOHNSON-O'MALLEY ACT Application Process § 273.23...

  18. 25 CFR 273.23 - Submitting application to Area Office.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Submitting application to Area Office. 273.23 Section 273.23 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR INDIAN SELF-DETERMINATION AND EDUCATION ASSISTANCE ACT PROGRAM EDUCATION CONTRACTS UNDER JOHNSON-O'MALLEY ACT Application Process § 273.23...

  19. 25 CFR 273.23 - Submitting application to Area Office.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Submitting application to Area Office. 273.23 Section 273.23 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR INDIAN SELF-DETERMINATION AND EDUCATION ASSISTANCE ACT PROGRAM EDUCATION CONTRACTS UNDER JOHNSON-O'MALLEY ACT Application Process § 273.23...

  20. 25 CFR 273.23 - Submitting application to Area Office.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Submitting application to Area Office. 273.23 Section 273.23 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR INDIAN SELF-DETERMINATION AND EDUCATION ASSISTANCE ACT PROGRAM EDUCATION CONTRACTS UNDER JOHNSON-O'MALLEY ACT Application Process § 273.23...

  1. 25 CFR 273.23 - Submitting application to Area Office.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Submitting application to Area Office. 273.23 Section 273.23 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR INDIAN SELF-DETERMINATION AND EDUCATION ASSISTANCE ACT PROGRAM EDUCATION CONTRACTS UNDER JOHNSON-O'MALLEY ACT Application Process § 273.23...

  2. Improving Societal Benefit Areas from Applications Enhanced by the Joint Polar Satellite System

    NASA Astrophysics Data System (ADS)

    Goldberg, M.

    2016-12-01

    Applications of satellite data are paramount to transform science and technology to product and services which are used in critical decision making for societal benefits. For the satellite community, good representations of technology are the satellite sensors, while science provides the instrument calibration and derived geophysical parameters. Weather forecasting is an application of the science and technology provided by remote sensing satellites. The Joint Polar Satellite System, which includes the Suomi National Polar-orbiting Partnership (S-NPP) provides formidable science and technology to support many applications and includes support to 1) weather forecasting - data from the JPSS Cross-track Infrared Sounder (CrIS) and the Advanced Technology Microwave Sounder (ATMS) are used to forecast weather events out to 7 days - nearly 85% of all data used in weather forecasting are from polar orbiting satellites; 2) environmental monitoring -data from the JPSS Visible Infrared Imager Radiometer Suite (VIIRS) are used to monitor the environment including the health of coastal ecosystems, drought conditions, fire, smoke, dust, snow and ice, and the state of oceans, including sea surface temperature and ocean color; and 3) climate monitoring - data from JPSS instruments, including OMPS and CERES will provide continuity to climate data records established using NOAA POES and NASA Earth Observing System (EOS) satellite observations. To bridge the gap between products and applications, the JPSS Program has established a proving ground program to optimize the use of JPSS data with other data sources to improve key products and services. A number of operational and research applications will be presented along with how the data and applications support a large number of societal benefit areas of the Global Earth Observation Systems of Systems (GEOSS).

  3. mHealth Application Areas and Technology Combinations.

    PubMed

    Abaza, Haitham; Marschollek, Michael

    2017-01-01

    With the continuous and enormous spread of mobile technologies, mHealth has evolved as a new subfield of eHealth. While eHealth is broadly focused on information and communication technologies, mHealth seeks to explore more into mobile devices and wireless communication. Since mobile phone penetration has exceeded other infrastructure in low and middle-income countries (LMICs), mHealth is seen as a promising component to provide pervasive and patient-centered care. The aim of our research work for this paper is to examine the mHealth literature to identify application areas, target diseases, and mHealth service and technology types that are most appropriate for LMICs. Based on the 2011 WHO mHealth report, a combination of search terms, all including the word "mHealth", was identified. A literature review was conducted by searching the PubMed and IEEE Xplore databases. Articles were included if they were published in English, covered an mHealth solution/intervention, involved the use of a mobile communication device, and included a pilot evaluation study. Articles were excluded if they did not provide sufficient detail on the solution covered or did not focus on clinical efficacy/effectiveness. Cross-referencing was also performed on included articles. 842 articles were retrieved and analyzed, 255 of which met the inclusion criteria. North America had the highest number of applications (n=74) followed by Europe (n=50), Asia (n=44), Africa (n=25), and Australia (n=9). The Middle East (n=5) and South America (n=3) had the least number of studies. The majority of solutions addressed diabetes (n=51), obesity (n=25), CVDs (n=24), HIV (n=18), mental health (n=16), health behaviors (n=16), and maternal and child's health (MCH) (n=11). Fewer solutions addressed asthma (n=7), cancer (n=5), family health planning (n=5), TB (n=3), malaria (n=2), chronic obtrusive pulmonary disease (COPD) (n=2), vision care (n=2), and dermatology (n=2). Other solutions targeted stroke, dental

  4. Algorithms for Lightweight Key Exchange †

    PubMed Central

    Santonja, Juan; Zamora, Antonio

    2017-01-01

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks. PMID:28654006

  5. Compact FPGA hardware architecture for public key encryption in embedded devices

    PubMed Central

    Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in GF(p), commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x). PMID:29360824

  6. 7 CFR 1.413 - Submission of a sourcing area application.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... sourced is located. Where the sourcing area application will cover purchases from more than one agency, application is to be made to the agency from which the applicant expects to purchase the preponderance of its... agency concerned. The lead agency shall make the decision in consultation with, and upon co-signature of...

  7. High-capacity quantum key distribution via hyperentangled degrees of freedom

    NASA Astrophysics Data System (ADS)

    Simon, David S.; Sergienko, Alexander V.

    2014-06-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical.

  8. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  9. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  10. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    PubMed

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  11. Key Technologies and Applications of Gas Drainage in Underground Coal Mine

    NASA Astrophysics Data System (ADS)

    Zhou, Bo; Xue, Sheng; Cheng, Jiansheng; Li, Wenquan; Xiao, Jiaping

    2018-02-01

    It is the basis for the long-drilling directional drilling, precise control of the drilling trajectory and ensuring the effective extension of the drilling trajectory in the target layer. The technology can be used to complete the multi-branch hole construction and increase the effective extraction distance of the coal seam. The gas drainage and the bottom grouting reinforcement in the advanced area are realized, and the geological structure of the coal seam can be proved accurately. It is the main technical scheme for the efficient drainage of gas at home and abroad, and it is applied to the field of geological structure exploration and water exploration and other areas. At present, the data transmission method is relatively mature in the technology and application, including the mud pulse and the electromagnetic wave. Compared with the mud pulse transmission mode, the electromagnetic wave transmission mode has obvious potential in the data transmission rate and drilling fluid, and it is suitable for the coal mine. In this paper, the key technologies of the electromagnetic wave transmission mode are analyzed, including the attenuation characteristics of the electromagnetic transmission channel, the digital modulation scheme, the channel coding method and the weak signal processing technology. A coal mine under the electromagnetic wave drilling prototype is developed, and the ground transmission experiments and down hole transmission test are carried out. The main work includes the following aspects. First, the equivalent transmission line method is used to establish the electromagnetic transmission channel model of coal mine drilling while drilling, and the attenuation of the electromagnetic signal is measured when the electromagnetic channel measured. Second, the coal mine EM-MWD digital modulation method is developed. Third, the optimal linear block code which suitable for EM-MWD communication channel in coal mine is proposed. Fourth, the noise characteristics

  12. Key technologies and applications of laser cooling and trapping {sup 87}Rb atomic system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ru, Ning, E-mail: runing@buaa.edu.cn; Zhang, Li, E-mail: mewan@buaa.edu.cn; Key Laboratory for Metrology, Changcheng Institute of Metrology and Measurement

    2016-06-28

    Atom Interferometry is proved to be a potential method for measuring the acceleration of atoms due to Gravity, we are now building a feasible system of cold atom gravimeter. In this paper development and the important applications of laser cooling and trapping atoms are introduced, some key techniques which are used to obtain {sup 87}Rb cold atoms in our experiments are also discussed.

  13. 25 CFR 23.34 - Review and decision on off-reservation applications by Area Director.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... competitive review and subsequent approval or disapproval of the applications. (b) Area office competitive... required in paragraph (a) of this section. (3) Review the application in accordance with the competitive... area competitive review and scoring process unless a review of the application determines that it: (i...

  14. The Geology of the Florida Keys.

    ERIC Educational Resources Information Center

    Shinn, Eugene A.

    1988-01-01

    Describes some of the ancient geologic history of the Florida Keys from Key Largo to Key West including the effects of glaciers, sea level rise, reef distribution, spurs and grooves, backstepping and ecological zonation, growth rates and erosion. Predicts future changes in this area. (CW)

  15. Nanomedicine: application areas and development prospects.

    PubMed

    Boulaiz, Houria; Alvarez, Pablo J; Ramirez, Alberto; Marchal, Juan A; Prados, Jose; Rodríguez-Serrano, Fernando; Perán, Macarena; Melguizo, Consolación; Aranega, Antonia

    2011-01-01

    Nanotechnology, along with related concepts such as nanomaterials, nanostructures and nanoparticles, has become a priority area for scientific research and technological development. Nanotechnology, i.e., the creation and utilization of materials and devices at nanometer scale, already has multiple applications in electronics and other fields. However, the greatest expectations are for its application in biotechnology and health, with the direct impact these could have on the quality of health in future societies. The emerging discipline of nanomedicine brings nanotechnology and medicine together in order to develop novel therapies and improve existing treatments. In nanomedicine, atoms and molecules are manipulated to produce nanostructures of the same size as biomolecules for interaction with human cells. This procedure offers a range of new solutions for diagnoses and "smart" treatments by stimulating the body's own repair mechanisms. It will enhance the early diagnosis and treatment of diseases such as cancer, diabetes, Alzheimer's, Parkinson's and cardiovascular diseases. Preventive medicine may then become a reality.

  16. Key Terrain: Application to the Layers of Cyberspace

    DTIC Science & Technology

    2017-03-01

    in the early stages and exploration into better integrating military strategies could prove beneficial to those working to develop relevant and...200 words) The concept of key terrain is a common fixture in military strategy and tactics. The emergence of cyberspace, with characteristics unseen...concept of key terrain is a common fixture in military strategy and tactics. The emergence of cyberspace, with characteristics unseen in any

  17. RFID: A key technology for Humanity

    NASA Astrophysics Data System (ADS)

    Duroc, Yvan; Tedjini, Smail

    2018-01-01

    The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"

  18. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  19. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  20. 78 FR 5115 - General Schedule Locality Pay Areas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-24

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... appropriate factors, which may include local labor market patterns, commuting patterns, and the practices of... any changes. Impact The rule has no effect on existing locality pay area definitions but prevents any...

  1. Quality Assurance Project Plan for Closure of the Central Facilities Area Sewage Treatment Plant Lagoon 3 and Land Application Area

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lewis, Michael G.

    This quality assurance project plan describes the technical requirements and quality assurance activities of the environmental data collection/analyses operations to close Central Facilities Area Sewage treatment Plant Lagoon 3 and the land application area. It describes the organization and persons involved, the data quality objectives, the analytical procedures, and the specific quality control measures to be employed. All quality assurance project plan activities are implemented to determine whether the results of the sampling and monitoring performed are of the right type, quantity, and quality to satisfy the requirements for closing Lagoon 3 and the land application area.

  2. MSAT wide-area fleet management: End-user requirements and applications

    NASA Technical Reports Server (NTRS)

    Pedersen, Allister

    1995-01-01

    MSAT (Mobile SATellite) Services will become a reality in North America in 1995. MSAT will provide wide-area voice, data and fax services to land, marine and aeronautical mobile users anywhere in North America including 200 nautical miles off the coasts and into the Arctic waters. MSAT will also convey GPS position information from mobiles to dispatch centers. One broad application of MSAT is Wide Area Fleet Management (WAFM). This paper defines WAFM, outlines end-user requirements and identifies potential applications of MSAT WAFM. The paper draws from information obtained in several preMSAT WAFM field trials in land, marine and aeronautical mobile environments. The paper concludes with an outline of the potential benefits of MSAT WAFM.

  3. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-01-01

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624

  4. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  5. Area Array Technology Evaluations for Space and Military Applications

    NASA Technical Reports Server (NTRS)

    Ghaffarian, Reza

    1996-01-01

    The Jet Propulsion Laboratory (JPL) is currently assessing the use of Area Array Packaging (AAP) for National Aeronautics and Space Administration (NASA) spaceflight applications. this work is being funded through NASA Headquarters, Code Q. The paper discusses background of AAP, objectives, and uses of AAP.

  6. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    PubMed Central

    Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.

    2018-01-01

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921

  7. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    PubMed

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  8. Practical challenges in quantum key distribution

    DOE PAGES

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...

    2016-11-08

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  9. Practical challenges in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  10. Identifying key areas of ecosystem services potential to improve ecological management in Chongqing City, southwest China.

    PubMed

    Xiao, Yang; Xiao, Qiang

    2018-03-29

    Because natural ecosystems and ecosystem services (ES) are both critical to the well-being of humankind, it is important to understand their relationships and congruence for conservation planning. Spatial conservation planning is required to set focused preservation priorities and to assess future ecological implications. This study uses the combined measures of ES models and ES potential to estimate and analyze all four groups of ecosystem services to generate opportunities to maximize ecosystem services. Subsequently, we identify the key areas of conservation priorities as future forestation and conservation hotspot zones to improve the ecological management in Chongqing City, located in the upper reaches of the Three Gorges Reservoir Area, China. Results show that ecosystem services potential is extremely obvious. Compared to ecosystem services from 2000, we determined that soil conservation could be increased by 59.11%, carbon sequestration by 129.51%, water flow regulation by 83.42%, and water purification by 84.42%. According to our prioritization results, approximately 48% of area converted to forests exhibited high improvements in all ecosystem services (categorized as hotspot-1, hotspot-2, and hotspot-3). The hotspots identified in this study can be used as an excellent surrogate for evaluation ecological engineering benefits and can be effectively applied in improving ecological management planning.

  11. Notice to Workers About Pesticide Applications and Pesticide-Treated Areas

    EPA Pesticide Factsheets

    Learn about requirements for employers must notify workers about areas where pesticide applications are taking place or where restricted-entry intervals (REIs) are in effect. Notifications include oral and written information. Exceptions exist.

  12. Human action recognition based on spatial-temporal descriptors using key poses

    NASA Astrophysics Data System (ADS)

    Hu, Shuo; Chen, Yuxin; Wang, Huaibao; Zuo, Yaqing

    2014-11-01

    Human action recognition is an important area of pattern recognition today due to its direct application and need in various occasions like surveillance and virtual reality. In this paper, a simple and effective human action recognition method is presented based on the key poses of human silhouette and the spatio-temporal feature. Firstly, the contour points of human silhouette have been gotten, and the key poses are learned by means of K-means clustering based on the Euclidean distance between each contour point and the centre point of the human silhouette, and then the type of each action is labeled for further match. Secondly, we obtain the trajectories of centre point of each frame, and create a spatio-temporal feature value represented by W to describe the motion direction and speed of each action. The value W contains the information of location and temporal order of each point on the trajectories. Finally, the matching stage is performed by comparing the key poses and W between training sequences and test sequences, the nearest neighbor sequences is found and its label supplied the final result. Experiments on the public available Weizmann datasets show the proposed method can improve accuracy by distinguishing amphibious poses and increase suitability for real-time applications by reducing the computational cost.

  13. Key Factors Controlling the Applicability and Efficiency of Bioremediation of Chlorinated Ethenes In Situ

    NASA Astrophysics Data System (ADS)

    Zhang, M.; Yoshikawa, M.; Takeuchi, M.; Komai, T.

    2012-12-01

    Bioremediation has been considered as one of environmentally friendly and cost effective approaches for cleaning up the sites polluted by organic contaminants, such as chlorinated ethenes. Although bioremediation, in its widest sense, is not new, and many researches have been performed on bioremediation of different kinds of pollutants, an effective design and implication of in situ bioremediation still remains a challenging problem because of the complexity. Many factors may affect the applicability and efficiency of bioremediation of chlorinated ethenes in situ, which include the type and concentration of contaminants, biological, geological and hydro-geological conditions of the site, physical and chemical characteristics of groundwater and soils to be treated, as well as the constraints in engineering. In this presentation, an overview together with a detailed discussion on each factor will be provided. The influences of individual factors are discussed using the data obtained or cited from different sites and experiments, and thus under different environmental conditions. The results of this study illustrated that 1) the establishment of microbial consortium is of crucial importance for a complete degradation of chlorinated ethenes, 2) in situ control of favorable conditions for increasing microbial activities for bio-degradation through a designed pathway is the key to success, 3) the focus of a successful remediation system is to design an effective delivery process that is capable of producing adequate amendment mixing of contaminant-degrading bacteria, appropriate concentrations of electron acceptors, electron donors, and microbial nutrients in the subsurface treatment area.

  14. Practical issues in quantum-key-distribution postprocessing

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.

    2010-01-01

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  15. Secret Key Crypto Implementations

    NASA Astrophysics Data System (ADS)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  16. 13 CFR 120.835 - Application to expand an Area of Operations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.835 Application to expand an Area of Operations. (a) General. A CDC that has been certified to participate in the 504... Program (ALP) CDC, as set forth in § 120.840(c), and demonstrates that it can competently fulfill its 504...

  17. 13 CFR 120.835 - Application to expand an Area of Operations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.835 Application to expand an Area of Operations. (a) General. A CDC that has been certified to participate in the 504... Program (ALP) CDC, as set forth in § 120.840(c), and demonstrates that it can competently fulfill its 504...

  18. 13 CFR 120.835 - Application to expand an Area of Operations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.835 Application to expand an Area of Operations. (a) General. A CDC that has been certified to participate in the 504... Program (ALP) CDC, as set forth in § 120.840(c), and demonstrates that it can competently fulfill its 504...

  19. 13 CFR 120.835 - Application to expand an Area of Operations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.835 Application to expand an Area of Operations. (a) General. A CDC that has been certified to participate in the 504... Program (ALP) CDC, as set forth in § 120.840(c), and demonstrates that it can competently fulfill its 504...

  20. 13 CFR 120.835 - Application to expand an Area of Operations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.835 Application to expand an Area of Operations. (a) General. A CDC that has been certified to participate in the 504... Program (ALP) CDC, as set forth in § 120.840(c), and demonstrates that it can competently fulfill its 504...

  1. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  2. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  3. KeyWare: an open wireless distributed computing environment

    NASA Astrophysics Data System (ADS)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  4. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  5. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE PAGES

    Farmer, M. T.; Gerardi, C.; Bremer, N.; ...

    2016-10-31

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  6. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farmer, M. T.; Gerardi, C.; Bremer, N.

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  7. Water quality at a biosolids-application area near Deer Trail, Colorado, 1993-1999

    USGS Publications Warehouse

    Yager, Tracy J.B.

    2014-01-01

    The Metro Wastewater Reclamation District (Metro District) in Denver, Colo., applied biosolids resulting from municipal sewage treatment to farmland in eastern Colorado beginning in December 1993. In mid-1993, the U.S. Geological Survey in cooperation with the Metro District began monitoring water quality at the biosolids-application area about 10 miles east of Deer Trail, Colo., to evaluate baseline water quality and the combined effects of natural processes, land uses, and biosolids applications on water quality of the biosolids application area. Water quality was characterized by baseline and post-biosolids-application sampling for selected inorganic and bacteriological constituents during 1993 through 1998, with some additional specialized sampling in 1999. The study included limited sampling of surface water and the unsaturated zone, but primarily focused on groundwater. See report for complete abstract.

  8. [Investigation of human brucellosis diagnosis and report quality in medical institutions in key areas of Shanxi province].

    PubMed

    Zeng, L J; Yang, W W; Tie, P; Liu, X R; Gao, X R; Li, Z Y; Hou, P; Zhi, Y; Bai, Y F; Geng, M J; Chen, Q L; Cui, B Y; Li, Z J; Wang, L P

    2017-11-10

    Objective: To evaluate the accuracy of human brucellosis diagnosis and reporting in medical institutions in Shanxi province, and understand the performance of clinical doctors to diagnose human brucellosis according to diagnostic criteria. Methods: Field investigation was conducted in 6 medical institutions in the key areas of human brucellosis in Shanxi province. The diagnosis data of the reported brucellosis cases in 2015 were collected and reviewed retrospectively for the evaluation of the diagnosis accuracy with systematic sampling method. The database was established with Excel 2010 and the descriptive analysis and statistical test were conducted with software R 3.3.2. Results: The diagnosis consistent rate of the 377 brucellosis cases reviewed was 70.8% (267/377), the diagnosis consistent rates in medical institutions at city-level and country-level were 77.0% (127/165) and 66.0% (140/212) respectively, the differences had significance ( χ (2)=5.4, P =0.02). Among the reviewed cases, the diagnosis consistent rate of laboratory diagnosis and clinical diagnosis were 87.1% (256/294) and 13.3% (11/83) respectively, and the differences had significance ( χ (2)=170.7, P <0.001). Among the 21 investigated clinical doctors, the numbers of the doctors who correctly diagnosed the suspected cases, probable cases and lab-confirmed cases were only 3, 0 and 8 respectively. All of the clinical doctors knew that it is necessary to report the brucellosis cases within 24 hours after diagnosis. Conclusion: The accuracy of human brucellosis diagnosis in key areas of human brucellosis in Shanxi was low, and the performance of the clinical doctors to diagnose human brucellosis according to diagnostic and case classification criteria was unsatisfied.

  9. Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.; Cai, Qing-Yu

    2012-03-01

    Privacy amplification (PA) is an essential postprocessing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.

  10. UV imaging reveals facial areas that are prone to skin cancer are disproportionately missed during sunscreen application.

    PubMed

    Pratt, Harry; Hassanin, Kareem; Troughton, Lee D; Czanner, Gabriela; Zheng, Yalin; McCormick, Austin G; Hamill, Kevin J

    2017-01-01

    Application of sunscreen is a widely used mechanism for protecting skin from the harmful effects of UV light. However, protection can only be achieved through effective application, and areas that are routinely missed are likely at increased risk of UV damage. Here we sought to determine if specific areas of the face are missed during routine sunscreen application, and whether provision of public health information is sufficient to improve coverage. To investigate this, 57 participants were imaged with a UV sensitive camera before and after sunscreen application: first visit; minimal pre-instruction, second visit; provided with a public health information statement. Images were scored using a custom automated image analysis process designed to identify areas of high UV reflectance, i.e. missed during sunscreen application, and analysed for 5% significance. Analyses revealed eyelid and periorbital regions to be disproportionately missed during routine sunscreen application (median 14% missed in eyelid region vs 7% in rest of face, p<0.01). Provision of health information caused a significant improvement in coverage to eyelid areas in general however, the medial canthal area was still frequently missed. These data reveal that a public health announcement-type intervention could be effective at improving coverage of high risk areas of the face, however high risk areas are likely to remain unprotected therefore other mechanisms of sun protection should be widely promoted such as UV blocking sunglasses.

  11. Operational Details of the Five Domains Model and Its Key Applications to the Assessment and Management of Animal Welfare

    PubMed Central

    Mellor, David J.

    2017-01-01

    Simple Summary The Five Domains Model is a focusing device to facilitate systematic, structured, comprehensive and coherent assessment of animal welfare; it is not a definition of animal welfare, nor is it intended to be an accurate representation of body structure and function. The purpose of each of the five domains is to draw attention to areas that are relevant to both animal welfare assessment and management. This paper begins by briefly describing the major features of the Model and the operational interactions between the five domains, and then it details seven interacting applications of the Model. These underlie its utility and increasing application to welfare assessment and management in diverse animal use sectors. Abstract In accord with contemporary animal welfare science understanding, the Five Domains Model has a significant focus on subjective experiences, known as affects, which collectively contribute to an animal’s overall welfare state. Operationally, the focus of the Model is on the presence or absence of various internal physical/functional states and external circumstances that give rise to welfare-relevant negative and/or positive mental experiences, i.e., affects. The internal states and external circumstances of animals are evaluated systematically by referring to each of the first four domains of the Model, designated “Nutrition”, “Environment”, “Health” and “Behaviour”. Then affects, considered carefully and cautiously to be generated by factors in these domains, are accumulated into the fifth domain, designated “Mental State”. The scientific foundations of this operational procedure, published in detail elsewhere, are described briefly here, and then seven key ways the Model may be applied to the assessment and management of animal welfare are considered. These applications have the following beneficial objectives—they (1) specify key general foci for animal welfare management; (2) highlight the foundations of

  12. 77 FR 65253 - Amendment of Area Navigation Route T-240; AK

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... the legal description of area navigation (RNAV) route T-240 in Alaska by removing one waypoint that is no longer required and has been deleted from the National Airspace System Resources (NASR) database...

  13. Synthesis, functionalization, and applications of metal-organic frameworks in biomedicine.

    PubMed

    Chen, Wei; Wu, Chunsheng

    2018-02-13

    Metal-organic frameworks (MOFs), also known as coordination polymers, have attracted extensive research interest in the past few decades due to their unique physical structures and potentially vast applications. In this review, we outline the recent progress in the synthesis, functionalization and applications of MOFs in biomedicine, mainly focusing on two promising, yet challenging areas, i.e., drug delivery and biosensing applications. A major challenge is the proper functionalization of MOFs with demanding properties suitable for biomedical applications. Extensive studies on MOFs in biomedicine have led to substantial progress in the control of key properties of MOFs such as toxicity, size and shape, and biological stability. Due to their flexible composition, pore size and easy functionalization properties, MOFs can be utilized as key components for the development of various functional systems, and their applications in drug delivery and biosensing are reviewed. Future trends and perspectives in these research areas are also outlined.

  14. Rain Volume Estimation over Areas Using Satellite and Radar Data

    NASA Technical Reports Server (NTRS)

    Doneaud, A. A.; Miller, J. R., Jr.; Johnson, L. R.; Vonderhaar, T. H.; Laybe, P.

    1984-01-01

    The application of satellite data to a recently developed radar technique used to estimate convective rain volumes over areas on a dry environment (the northern Great Plains) is discussed. The area time integral technique (ATI) provides a means of estimating total rain volumes over fixed and floating target areas of the order of 1,000 to 100,000 km(2) for clusters lasting 40 min. The basis of the method is the existence of a strong correlation between the area coverage integrated over the lifetime of the storm (ATI) and the rain volume. One key element in this technique is that it does not require the consideration of the structure of the radar intensities inside the area coverage to generate rain volumes, but only considers the rain event per se. This fact might reduce or eliminate some sources of error in applying the technique to satellite data. The second key element is that the ATI once determined can be converted to total rain volume by using a constant factor (average rain rate) for a given locale.

  15. Integrating quantum key distribution with classical communications in backbone fiber network.

    PubMed

    Mao, Yingqiu; Wang, Bi-Xiao; Zhao, Chunxu; Wang, Guangquan; Wang, Ruichun; Wang, Honghai; Zhou, Fei; Nie, Jimin; Chen, Qing; Zhao, Yong; Zhang, Qiang; Zhang, Jun; Chen, Teng-Yun; Pan, Jian-Wei

    2018-03-05

    Quantum key distribution (QKD) provides information-theoretic security based on the laws of quantum mechanics. The desire to reduce costs and increase robustness in real-world applications has motivated the study of coexistence between QKD and intense classical data traffic in a single fiber. Previous works on coexistence in metropolitan areas have used wavelength-division multiplexing, however, coexistence in backbone fiber networks remains a great experimental challenge, as Tbps data of up to 20 dBm optical power is transferred, and much more noise is generated for QKD. Here we present for the first time, to the best of our knowledge, the integration of QKD with a commercial backbone network of 3.6 Tbps classical data at 21 dBm launch power over 66 km fiber. With 20 GHz pass-band filtering and large effective core area fibers, real-time secure key rates can reach 4.5 kbps and 5.1 kbps for co-propagation and counter-propagation at the maximum launch power, respectively. This demonstrates feasibility and represents an important step towards building a quantum network that coexists with the current backbone fiber infrastructure of classical communications.

  16. Perspectives of self-direction: a systematic review of key areas contributing to service users' engagement and choice-making in self-directed disability services and supports.

    PubMed

    Lakhani, Ali; McDonald, Donna; Zeeman, Heidi

    2018-05-01

    Self-directed disability support policies aim to encourage greater choice and control for service users in terms of the health and social care they receive. The proliferation of self-directed disability support policies throughout the developed world has resulted in a growing amount of research exploring the outcomes for service users, and their families and carers. Our understanding of the issues faced by people with disabilities, particularly how they make health and social care decisions and the key areas that determine their engagement with service providers within a self-directed environment is limited. A synthesis of research is timely and can provide knowledge for service users and health and social care support providers to ensure their successful participation. A systematic review guided by the PRISMA approach explored (i) the key areas determining service users' engagement with self-directed disability services and supports, and (ii) how service users make informed decisions about providers. In October 2014 and April 2016, three databases - MEDLINE, CINAHL and Web of Science - were searched for research and review articles. Eighteen sources met the search criteria. Findings were mapped into either: key areas determining service user engagement, or service users' informed decision-making. Findings concerning key areas determining engagement fell into three themes - personal responsibility for budgeting, personalised approaches, and a cultural shift in practice and delivery among service providers. Findings about decision-making yielded two themes - supporting informed decision-making and inhibiting informed decision-making. Literature suggests that self-directed models of care may provide service users with increased control over the services that they receive. Increased control for some service users and their families requires independent external decision-making support, particularly around the domains of budgeting, planning and hiring. Future research

  17. 43 CFR 15.14 - Applicability of laws.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 1 2013-10-01 2013-10-01 false Applicability of laws. 15.14 Section 15.14 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.14 Applicability of laws. In areas to which this part pertains all Federal Acts shall be enforced insofar as they...

  18. 43 CFR 15.14 - Applicability of laws.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Applicability of laws. 15.14 Section 15.14 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.14 Applicability of laws. In areas to which this part pertains all Federal Acts shall be enforced insofar as they...

  19. 43 CFR 15.14 - Applicability of laws.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 1 2012-10-01 2011-10-01 true Applicability of laws. 15.14 Section 15.14 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.14 Applicability of laws. In areas to which this part pertains all Federal Acts shall be enforced insofar as they...

  20. 43 CFR 15.14 - Applicability of laws.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Applicability of laws. 15.14 Section 15.14 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.14 Applicability of laws. In areas to which this part pertains all Federal Acts shall be enforced insofar as they...

  1. 43 CFR 15.14 - Applicability of laws.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Applicability of laws. 15.14 Section 15.14 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.14 Applicability of laws. In areas to which this part pertains all Federal Acts shall be enforced insofar as they...

  2. UV imaging reveals facial areas that are prone to skin cancer are disproportionately missed during sunscreen application

    PubMed Central

    Troughton, Lee D.; Czanner, Gabriela; Zheng, Yalin; McCormick, Austin G.

    2017-01-01

    Application of sunscreen is a widely used mechanism for protecting skin from the harmful effects of UV light. However, protection can only be achieved through effective application, and areas that are routinely missed are likely at increased risk of UV damage. Here we sought to determine if specific areas of the face are missed during routine sunscreen application, and whether provision of public health information is sufficient to improve coverage. To investigate this, 57 participants were imaged with a UV sensitive camera before and after sunscreen application: first visit; minimal pre-instruction, second visit; provided with a public health information statement. Images were scored using a custom automated image analysis process designed to identify areas of high UV reflectance, i.e. missed during sunscreen application, and analysed for 5% significance. Analyses revealed eyelid and periorbital regions to be disproportionately missed during routine sunscreen application (median 14% missed in eyelid region vs 7% in rest of face, p<0.01). Provision of health information caused a significant improvement in coverage to eyelid areas in general however, the medial canthal area was still frequently missed. These data reveal that a public health announcement-type intervention could be effective at improving coverage of high risk areas of the face, however high risk areas are likely to remain unprotected therefore other mechanisms of sun protection should be widely promoted such as UV blocking sunglasses. PMID:28968413

  3. Social capital as a key determinant of perceived benefits of community-based marine protected areas.

    PubMed

    Diedrich, Amy; Stoeckl, Natalie; Gurney, Georgina G; Esparon, Michelle; Pollnac, Richard

    2017-04-01

    Globally, marine protected areas (MPAs) have been relatively unsuccessful in meeting biodiversity objectives. To be effective, they require some alteration of people's use and access to marine resources, which they will resist if they do not perceive associated benefits. Stakeholders' support is crucial to ecological success of MPAs, and their support is likely to depend on their capacity to adapt to and benefit from MPAs. We examined the influence of social adaptive capacity (SAC) on perceived benefits of MPAs in Siquijor, Philippines, in the Coral Triangle. This region has substantial biodiversity and a population of over 120 million people, many of them dependent on marine resources for food and income. The region has many MPAs, most of which are managed under decentralized governance systems. We collected survey data from 540 households in 19 villages with associated MPAs. We evaluated the influence of multiple SAC variables (e.g., occupational multiplicity and social capital) on perceived benefits with decision trees (CHAID) and qualitatively analyzed this relationship with respect to types and recipients of benefits. Our models revealed the key role of social capital, particularly trust in leadership, in influencing perceptions of benefits (χ 2 = 14.762, p = 0.000). A path analysis revealed that perceptions of distributional equity were a key mechanism through which social capital affected perceived MPA benefits (root mean-square error of approximation = 0.050). Building social capital and equity within communities could lead to more effective management of MPAs and thus to expenditure of fewer resources relative to, for example, regulation enforcement. © 2016 Society for Conservation Biology.

  4. Field Sampling Plan for Closure of the Central Facilities Area Sewage Treatment Plant Lagoon 3 and Land Application Area

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lewis, Michael George

    This field sampling plan describes sampling of the soil/liner of Lagoon 3 at the Central Facilities Area Sewage Treatment Plant. The lagoon is to be closed, and samples obtained from the soil/liner will provide information to determine if Lagoon 3 and the land application area can be closed in a manner that renders it safe to human health and the environment. Samples collected under this field sampling plan will be compared to Idaho National Laboratory background soil concentrations. If the concentrations of constituents of concern exceed the background level, they will be compared to Comprehensive Environmental Response, Compensation, and Liabilitymore » Act preliminary remediation goals and Resource Conservation and Recovery Act levels. If the concentrations of constituents of concern are lower than the background levels, Resource Conservation and Recovery Act levels, or the preliminary remediation goals, then Lagoon 3 and the land application area will be closed. If the Resource Conservation and Recovery Act levels and/or the Comprehensive Environmental Response, Compensation, and Liability Act preliminary remediation goals are exceeded, additional sampling and action may be required.« less

  5. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  6. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  7. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  8. Elaboration of a complex GIS application in a catchment area.

    PubMed

    Németh, T; Szabó, J; Pásztor, L; Bakacsi, Zs

    2002-01-01

    Rearrangement of land resources after political changes has not yet been finished in Hungary. It is almost impossible to collect information necessary for planning activities on outer areas of settlements. The data are distributed among various organizations and can be found in diverse forms or there are no available data at all. However water quality protection has become legally ordered concerning municipal activities around Lake Balaton which is considered as the most important recreation area and tourist target in Hungary and is also affected by a number of factors providing sources of environmental conflicts. Settlements in a catchment area (Tetves Creek) on the southern shoreline of Lake Balaton in Central Hungary tendered a complex project for collecting sources of authentic data of the Hungarian rural areas along with systematizing and saving these data in a uniform GIS. An application using Autodesk MapGuide Program for Internet realization was developed. The implemented web-based system can be used in Internet and Intranet environments.

  9. LACIE analyst interpretation keys

    NASA Technical Reports Server (NTRS)

    Baron, J. G.; Payne, R. W.; Palmer, W. F. (Principal Investigator)

    1979-01-01

    Two interpretation aids, 'The Image Analysis Guide for Wheat/Small Grains Inventories' and 'The United States and Canadian Great Plains Regional Keys', were developed during LACIE phase 2 and implemented during phase 3 in order to provide analysts with a better understanding of the expected ranges in color variation of signatures for individual biostages and of the temporal sequences of LANDSAT signatures. The keys were tested using operational LACIE data, and the results demonstrate that their use provides improved labeling accuracy in all analyst experience groupings, in all geographic areas within the U.S. Great Plains, and during all periods of crop development.

  10. Effects of a paraspinal-lumbar tape application during 7 days on the perceived area of tape contact.

    PubMed

    Funk, Stefan; Finke, Roy; Zeh, Stefan; Siebert, Tobias; Puta, Christian

    2017-05-01

    The study aimed to investigate the changes of the perceived area of tape contact during a lumbar tape application that lasted 7 days. Single group, repeated measures study. University research laboratory. Twenty-three healthy collegiate students in sports science. Perceived area of tape contact was collected by preparing a drawing of their individual perceived tape outline into a printed body image. Measurements were obtained immediately after fixation of the tape (day 0), at day 3 and day 7 during application and 5 min after the release of the application (day 7). There was no significant change of the perceived area of tape contact after 3 days of tape application. A significant decrease in the perceived area of tape contact was detected 7 days after application (p < 0.05) and after detaching the tape (p < 0.01) compared to the first measurement. Our results indicate that the perception of the area of tape contact of healthy sport students is decreased at 7 days. This effect could not be observed at 3 days. These results provide relevant information for the use of elastic tapes concerning the duration of application in medical therapy. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Land use changing and land use optimization of Lake Baikal basin on the example of two key areas

    NASA Astrophysics Data System (ADS)

    Solodyankina, S.

    2012-04-01

    Lake Baikal contains roughly 20% of the world's unfrozen surface fresh water. It was declared a UNESCO World Heritage Site in 1996. Today levels of urbanization and economic stress on environmental resources is increasing on the shorts of the lake Baikal. The potential of economic development (industry, local tourism, and mining) of the Severobaykalsky and Sludyansky districts is rather high although they are characterized not only by beneficial features for local economy but also by considerable disadvantages for nature of this world valuable territory. This investigation show human-caused landscape changes during economic development of the two key areas in Baikal water catchment basin during 10 years (point of reference is 2000 year). Key areas are 1) the Baikalo-Patomskoe highland in the north of the Baikal catchment basin (Severobaykalsky district, Republic of Buryatia); 2) Khamar-Daban mountain system in the south of the Baikal catchment basin (Sludyansky districy, Irkutsk region). Since 2000 year land use of the territory has changed. Areas of agriculture were reduced but recreation activity on the bank of the lake was increased. Methods of GIS analysis and local statistic analysis of landscape characteristic were used. Nature, rural and urban areas ratio are estimated. Vegetation and soil condition assessment were made. The essence of this research is in helping to make decisions linked to upcoming problems: situation identification, evaluation and forecasting of the potential landscape condition, optimization of land use, mitigation of impact and mapping of territories and nature resources which have a high ecological value or endangered by industrial impact. For this purpose landscape maps of the territories on the base of the remote sensing information and field investigations were created. They used to calculate potential landscape functions of the territory without taking into account present impact of anthropogenic actions. Land use maps for years

  12. On Robust Key Agreement Based on Public Key Authentication

    NASA Astrophysics Data System (ADS)

    Hao, Feng

    We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.

  13. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  14. Model-Driven Approach for Body Area Network Application Development.

    PubMed

    Venčkauskas, Algimantas; Štuikys, Vytautas; Jusas, Nerijus; Burbaitė, Renata

    2016-05-12

    This paper introduces the sensor-networked IoT model as a prototype to support the design of Body Area Network (BAN) applications for healthcare. Using the model, we analyze the synergistic effect of the functional requirements (data collection from the human body and transferring it to the top level) and non-functional requirements (trade-offs between energy-security-environmental factors, treated as Quality-of-Service (QoS)). We use feature models to represent the requirements at the earliest stage for the analysis and describe a model-driven methodology to design the possible BAN applications. Firstly, we specify the requirements as the problem domain (PD) variability model for the BAN applications. Next, we introduce the generative technology (meta-programming as the solution domain (SD)) and the mapping procedure to map the PD feature-based variability model onto the SD feature model. Finally, we create an executable meta-specification that represents the BAN functionality to describe the variability of the problem domain though transformations. The meta-specification (along with the meta-language processor) is a software generator for multiple BAN-oriented applications. We validate the methodology with experiments and a case study to generate a family of programs for the BAN sensor controllers. This enables to obtain the adequate measure of QoS efficiently through the interactive adjustment of the meta-parameter values and re-generation process for the concrete BAN application.

  15. Patient Views on Three Key Service Areas within Hospital COPD Care

    ERIC Educational Resources Information Center

    Roberts, C. Michael; Seiger, Anil; Ingham, Jane

    2009-01-01

    Objective: The views of patients with Chronic Obstructive Pulmonary Disease (COPD) about three key services (non-invasive ventilation [NIV], early discharge schemes and rehabilitation) were sought in order to inform recommendations for the delivery of optimum care within a national programme of hospital COPD service development. Design: Four focus…

  16. Recycled Water Reuse Permit Renewal Application for the Central Facilities Area Sewage Treatment Plant

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lewis, Mike

    This renewal application for a Recycled Water Reuse Permit is being submitted in accordance with the Idaho Administrative Procedures Act 58.01.17 “Recycled Water Rules” and the Municipal Wastewater Reuse Permit LA-000141-03 for continuing the operation of the Central Facilities Area Sewage Treatment Plant located at the Idaho National Laboratory. The permit expires March 16, 2015. The permit requires a renewal application to be submitted six months prior to the expiration date of the existing permit. For the Central Facilities Area Sewage Treatment Plant, the renewal application must be submitted by September 16, 2014. The information in this application is consistentmore » with the Idaho Department of Environmental Quality’s Guidance for Reclamation and Reuse of Municipal and Industrial Wastewater and discussions with Idaho Department of Environmental Quality personnel.« less

  17. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  18. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    PubMed Central

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  19. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption.

    PubMed

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-29

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  20. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  1. Group Key Agreement Efficient in Communication

    DTIC Science & Technology

    2003-10-14

    Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent

  2. A review on the key issues for lithium-ion battery management in electric vehicles

    NASA Astrophysics Data System (ADS)

    Lu, Languang; Han, Xuebing; Li, Jianqiu; Hua, Jianfeng; Ouyang, Minggao

    2013-03-01

    Compared with other commonly used batteries, lithium-ion batteries are featured by high energy density, high power density, long service life and environmental friendliness and thus have found wide application in the area of consumer electronics. However, lithium-ion batteries for vehicles have high capacity and large serial-parallel numbers, which, coupled with such problems as safety, durability, uniformity and cost, imposes limitations on the wide application of lithium-ion batteries in the vehicle. The narrow area in which lithium-ion batteries operate with safety and reliability necessitates the effective control and management of battery management system. This present paper, through the analysis of literature and in combination with our practical experience, gives a brief introduction to the composition of the battery management system (BMS) and its key issues such as battery cell voltage measurement, battery states estimation, battery uniformity and equalization, battery fault diagnosis and so on, in the hope of providing some inspirations to the design and research of the battery management system.

  3. Modeling, Simulation and Analysis of Public Key Infrastructure

    NASA Technical Reports Server (NTRS)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  4. Model-Driven Approach for Body Area Network Application Development

    PubMed Central

    Venčkauskas, Algimantas; Štuikys, Vytautas; Jusas, Nerijus; Burbaitė, Renata

    2016-01-01

    This paper introduces the sensor-networked IoT model as a prototype to support the design of Body Area Network (BAN) applications for healthcare. Using the model, we analyze the synergistic effect of the functional requirements (data collection from the human body and transferring it to the top level) and non-functional requirements (trade-offs between energy-security-environmental factors, treated as Quality-of-Service (QoS)). We use feature models to represent the requirements at the earliest stage for the analysis and describe a model-driven methodology to design the possible BAN applications. Firstly, we specify the requirements as the problem domain (PD) variability model for the BAN applications. Next, we introduce the generative technology (meta-programming as the solution domain (SD)) and the mapping procedure to map the PD feature-based variability model onto the SD feature model. Finally, we create an executable meta-specification that represents the BAN functionality to describe the variability of the problem domain though transformations. The meta-specification (along with the meta-language processor) is a software generator for multiple BAN-oriented applications. We validate the methodology with experiments and a case study to generate a family of programs for the BAN sensor controllers. This enables to obtain the adequate measure of QoS efficiently through the interactive adjustment of the meta-parameter values and re-generation process for the concrete BAN application. PMID:27187394

  5. Sexual Health Services for Young People in a Rural Area of Northern Ireland: A Study of the Key Issues for Those Who Provide Them

    ERIC Educational Resources Information Center

    McCann, Lyndsey; Donnelly, Lyn; Quinn, Phelim; McAnerney, Rosemary

    2008-01-01

    Objective: To identify the key issues for service providers in delivering high quality sexual health services, responsive to the needs of young people, in a rural area of Northern Ireland. Design: A triangulation survey approach using questionnaires, in-depth interviews and focus groups was undertaken with a range of organizations and…

  6. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  7. Key techniques and risk management for the application of the Pile-Beam-Arch (PBA) excavation method: a case study of the Zhongjie subway station.

    PubMed

    Guan, Yong-ping; Zhao, Wen; Li, Shen-gang; Zhang, Guo-bin

    2014-01-01

    The design and construction of shallow-buried tunnels in densely populated urban areas involve many challenges. The ground movements induced by tunneling effects pose potential risks to infrastructure such as surface buildings, pipelines, and roads. In this paper, a case study of the Zhongjie subway station located in Shenyang, China, is examined to investigate the key construction techniques and the influence of the Pile-Beam-Arch (PBA) excavation method on the surrounding environment. This case study discusses the primary risk factors affecting the environmental safety and summarizes the corresponding risk mitigation measures and key techniques for subway station construction using the PBA excavation method in a densely populated urban area.

  8. Internet Issues and Applications, 1997-1998.

    ERIC Educational Resources Information Center

    Dempsey, Bert J., Ed.; Jones, Paul, Ed.

    This book gives an overview of the leading-edge Internet application areas (streaming multimedia, collaborative tools, Web databases) and key information policy issues (privacy, censorship, information quality, and more). The text serves as a primer on understanding the forces--economic, legal, social, as well as technological--that are shaping…

  9. [Analysis of the model OPM3® application and results for health area].

    PubMed

    Augusto Dos Santos, Luis; de Fátima Marin, Heimar

    2011-01-01

    This research sought to analyze if a questionnaire model created by an international community of project management is applicable to health organizations. The model OPM3 ® (Organizational Project Management Maturity Model) was created in order that organizations of any area or size can identify the presence or absence of good management practices. The aim of applying this model is to always evaluate the organization and not the interviewee. In this paper, one presents the results of employing this model in an organization that has information technology products and services applied to health area. This study verified that the model is rapidly applicable and that the analyzed organization has an expressive number of good practices.

  10. Key Principles of Superfund Remedy Selection

    EPA Pesticide Factsheets

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  11. Selective-area nanoheteroepitaxy for light emitting diode (LED) applications

    NASA Astrophysics Data System (ADS)

    Wildeson, Isaac H.

    generate built-in electric fields with magnitudes that are one-tenth those on the polar c-plane with the same (In,Ga)N composition. The lateral strain relaxation innate in the nanoheterostructures allows greater coherent InN incorporation in the nanopyramids as compared to thin-film heterostructures, as confirmed by electroluminescence and transmission electron microscopy. In addition to applications for light emitting diodes, selective area growth of GaN nanostructures is also important for biological and sensing applications. A process for fabricating porous GaN nanorods is presented that also relies on selective-area organometallic vapor phase epitaxy. The nanopore walls are primarily outlined by nonpolar planes, and the diameter of the nanopore can be controlled by the diameter of the opening in the dielectric template and the growth time. The lining of the nanopore walls is comprised of crystalline GaN, which makes these structures interesting for sensing, electrical and optical applications.

  12. Functionalization of nanomaterials by non-thermal large area atmospheric pressure plasmas: application to flexible dye-sensitized solar cells.

    PubMed

    Jung, Heesoo; Park, Jaeyoung; Yoo, Eun Sang; Han, Gill-Sang; Jung, Hyun Suk; Ko, Min Jae; Park, Sanghoo; Choe, Wonho

    2013-09-07

    A key challenge to the industrial application of nanotechnology is the development of fabrication processes for functional devices based on nanomaterials which can be scaled up for mass production. In this report, we disclose the results of non-thermal radio-frequency (rf) atmospheric pressure plasma (APP) based deposition of TiO2 nanoparticles on a flexible substrate for the fabrication of dye-sensitized solar cells (DSSCs). Operating at 190 °C without a vacuum enclosure, the APP method can avoid thermal damage and vacuum compatibility restrictions and utilize roll-to-roll processing over a large area. The various analyses of the TiO2 films demonstrate that superior film properties can be obtained by the non-thermal APP method when compared with the thermal sintering process operating at 450 °C. The crystallinity of the anatase TiO2 nanoparticles is significantly improved without thermal agglomeration, while the surface defects such as Ti(3+) ions are eliminated, thus providing efficient charge collecting properties for solar cells. Finally, we successfully fabricated a flexible DSSC with an energy conversion efficiency of 4.2% using a transparent plastic substrate. This work demonstrates the potential of non-thermal APP technology in the area of device-level, nano-enabled material manufacturing.

  13. The Development of Wireless Body Area Network for Motion Sensing Application

    NASA Astrophysics Data System (ADS)

    Puspitaningayu, P.; Widodo, A.; Yundra, E.; Ramadhany, F.; Arianto, L.; Habibie, D.

    2018-04-01

    The information era has driven the society into the digitally-controlled lifestyle. Wireless body area networks (WBAN) as the specific scope of wireless sensor networks (WSN) is consistently growing into bigger applications. Currently, people are able to monitor their medical parameters by simply using small electronics devices attached to their body and connected to the authorities. On top of that, this time, smart phones are typically equipped with sensors such as accelerometer, gyroscope, barometric pressure, heart rate monitor, etc. It means that the sensing yet the signal processing can be performed by a single device. Moreover, Android opens lot wider opportunities for new applications as the most popular open-sourced smart phone platform. This paper is intended to show the development of motion sensing application which focused on analysing data from accelerometer and gyroscope. Beside reads the sensors, this application also has the ability to convert the sensors’ numerical value into graphs.

  14. Principles of visual key construction-with a visual identification key to the Fagaceae of the southeastern United States.

    PubMed

    Kirchoff, Bruce K; Leggett, Roxanne; Her, Va; Moua, Chue; Morrison, Jessica; Poole, Chamika

    2011-01-01

    Advances in digital imaging have made possible the creation of completely visual keys. By a visual key we mean a key based primarily on images, and that contains a minimal amount of text. Characters in visual keys are visually, not verbally defined. In this paper we create the first primarily visual key to a group of taxa, in this case the Fagaceae of the southeastern USA. We also modify our recently published set of best practices for image use in illustrated keys to make them applicable to visual keys. Photographs of the Fagaceae were obtained from internet and herbarium databases or were taken specifically for this project. The images were printed and then sorted into hierarchical groups. These hierarchical groups of images were used to create the 'couplets' in the key. A reciprocal process of key creation and testing was used to produce the final keys. Four keys were created, one for each of the parts-leaves, buds, fruits and bark. Species description pages consisting of multiple images were also created for each of the species in the key. Creation and testing of the key resulted in a modified list of best practices for image use visual keys. The inclusion of images into paper and electronic keys has greatly increased their ease of use. However, virtually all of these keys are still based upon verbally defined, atomistic characters. The creation of primarily visual keys allows us to overcome the well-known limitations of linguistic-based characters and create keys that are much easier to use, especially for botanical novices.

  15. Key Techniques and Risk Management for the Application of the Pile-Beam-Arch (PBA) Excavation Method: A Case Study of the Zhongjie Subway Station

    PubMed Central

    Guan, Yong-ping; Zhao, Wen; Li, Shen-gang; Zhang, Guo-bin

    2014-01-01

    The design and construction of shallow-buried tunnels in densely populated urban areas involve many challenges. The ground movements induced by tunneling effects pose potential risks to infrastructure such as surface buildings, pipelines, and roads. In this paper, a case study of the Zhongjie subway station located in Shenyang, China, is examined to investigate the key construction techniques and the influence of the Pile-Beam-Arch (PBA) excavation method on the surrounding environment. This case study discusses the primary risk factors affecting the environmental safety and summarizes the corresponding risk mitigation measures and key techniques for subway station construction using the PBA excavation method in a densely populated urban area. PMID:25221783

  16. Statistical Learning Theory for High Dimensional Prediction: Application to Criterion-Keyed Scale Development

    PubMed Central

    Chapman, Benjamin P.; Weiss, Alexander; Duberstein, Paul

    2016-01-01

    Statistical learning theory (SLT) is the statistical formulation of machine learning theory, a body of analytic methods common in “big data” problems. Regression-based SLT algorithms seek to maximize predictive accuracy for some outcome, given a large pool of potential predictors, without overfitting the sample. Research goals in psychology may sometimes call for high dimensional regression. One example is criterion-keyed scale construction, where a scale with maximal predictive validity must be built from a large item pool. Using this as a working example, we first introduce a core principle of SLT methods: minimization of expected prediction error (EPE). Minimizing EPE is fundamentally different than maximizing the within-sample likelihood, and hinges on building a predictive model of sufficient complexity to predict the outcome well, without undue complexity leading to overfitting. We describe how such models are built and refined via cross-validation. We then illustrate how three common SLT algorithms–Supervised Principal Components, Regularization, and Boosting—can be used to construct a criterion-keyed scale predicting all-cause mortality, using a large personality item pool within a population cohort. Each algorithm illustrates a different approach to minimizing EPE. Finally, we consider broader applications of SLT predictive algorithms, both as supportive analytic tools for conventional methods, and as primary analytic tools in discovery phase research. We conclude that despite their differences from the classic null-hypothesis testing approach—or perhaps because of them–SLT methods may hold value as a statistically rigorous approach to exploratory regression. PMID:27454257

  17. Statistical learning theory for high dimensional prediction: Application to criterion-keyed scale development.

    PubMed

    Chapman, Benjamin P; Weiss, Alexander; Duberstein, Paul R

    2016-12-01

    Statistical learning theory (SLT) is the statistical formulation of machine learning theory, a body of analytic methods common in "big data" problems. Regression-based SLT algorithms seek to maximize predictive accuracy for some outcome, given a large pool of potential predictors, without overfitting the sample. Research goals in psychology may sometimes call for high dimensional regression. One example is criterion-keyed scale construction, where a scale with maximal predictive validity must be built from a large item pool. Using this as a working example, we first introduce a core principle of SLT methods: minimization of expected prediction error (EPE). Minimizing EPE is fundamentally different than maximizing the within-sample likelihood, and hinges on building a predictive model of sufficient complexity to predict the outcome well, without undue complexity leading to overfitting. We describe how such models are built and refined via cross-validation. We then illustrate how 3 common SLT algorithms-supervised principal components, regularization, and boosting-can be used to construct a criterion-keyed scale predicting all-cause mortality, using a large personality item pool within a population cohort. Each algorithm illustrates a different approach to minimizing EPE. Finally, we consider broader applications of SLT predictive algorithms, both as supportive analytic tools for conventional methods, and as primary analytic tools in discovery phase research. We conclude that despite their differences from the classic null-hypothesis testing approach-or perhaps because of them-SLT methods may hold value as a statistically rigorous approach to exploratory regression. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. ROV's: The key is cost effectiveness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saunders, E.

    1986-10-01

    Although diver-support activities will continue to be required in terms of monitoring and assistance, low-cost, remotely operated vehicles (ROV's) will have an increasing presence in the oil industry and other fields provided there is ongoing improvement in management, preparation, and execution of work. Beyond the safety aspect, the key is cost effectiveness. It is the company's intention wherever possible, and within realistic constraints, to take the man out of the water either by direct ROV replacement of the diver or by assisting him. Shell's exploration and production operations are based in three main areas: the southern, central, and northern Northmore » Sea. These developed fields, which consist of 26 various structures (interconnected), are connected to the mainland by over 1,100 km of submarine pipeline. Maintenance and underwater engineering costs in northern operations alone exceed pounds40 million/year (about $60 million/year) where typical support is an estimated 700 ROV days/year. The utilization analysis indicates a major use in ''eyeball'' vehicles for diver monitoring, and a large percentage for pipeline survey with only a limited amount on structural work and other special applications. The ''Bondi initiative'' in the late 1970s was intended to remove the diver from the water by ROV replacement, but due to lack of development, the capability in many areas has not evolved.« less

  19. Sensors Applications, Volume 4, Sensors for Automotive Applications

    NASA Astrophysics Data System (ADS)

    Marek, Jiri; Trah, Hans-Peter; Suzuki, Yasutoshi; Yokomori, Iwao

    2003-07-01

    An international team of experts from the leading companies in this field gives a detailed picture of existing as well as future applications. They discuss in detail current technologies, design and construction concepts, market considerations and commercial developments. Topics covered include vehicle safety, fuel consumption, air conditioning, emergency control, traffic control systems, and electronic guidance using radar and video. Meeting the growing need for comprehensive information on the capabilities, potentials and limitations of modern sensor systems, Sensors Applications is a book series covering the use of sophisticated technologies and materials for the creation of advanced sensors and their implementation in the key areas process monitoring, building control, health care, automobiles, aerospace, environmental technology and household appliances.

  20. Back-illuminated large area frame transfer CCDs for space-based hyper-spectral imaging applications

    NASA Astrophysics Data System (ADS)

    Philbrick, Robert H.; Gilmore, Angelo S.; Schrein, Ronald J.

    2016-07-01

    Standard offerings of large area, back-illuminated full frame CCD sensors are available from multiple suppliers and they continue to be commonly deployed in ground- and space-based applications. By comparison the availability of large area frame transfers CCDs is sparse, with the accompanying 2x increase in die area no doubt being a contributing factor. Modern back-illuminated CCDs yield very high quantum efficiency in the 290 to 400 nm band, a wavelength region of great interest in space-based instruments studying atmospheric phenomenon. In fast framing (e.g. 10 - 20 Hz), space-based applications such as hyper-spectral imaging, the use of a mechanical shutter to block incident photons during readout can prove costly and lower instrument reliability. The emergence of large area, all-digital visible CMOS sensors, with integrate while read functionality, are an alternative solution to CCDs; but, even after factoring in reduced complexity and cost of support electronics, the present cost to implement such novel sensors is prohibitive to cost constrained missions. Hence, there continues to be a niche set of applications where large area, back-illuminated frame transfer CCDs with high UV quantum efficiency, high frame rate, high full well, and low noise provide an advantageous solution. To address this need a family of large area frame transfer CCDs has been developed that includes 2048 (columns) x 256 (rows) (FT4), 2048 x 512 (FT5), and 2048 x 1024 (FT6) full frame transfer CCDs; and a 2048 x 1024 (FT7) split-frame transfer CCD. Each wafer contains 4 FT4, 2 FT5, 2 FT6, and 2 FT7 die. The designs have undergone radiation and accelerated life qualification and the electro-optical performance of these CCDs over the wavelength range of 290 to 900 nm is discussed.

  1. Real-time analysis application for identifying bursty local areas related to emergency topics.

    PubMed

    Sakai, Tatsuhiro; Tamura, Keiichi

    2015-01-01

    Since social media started getting more attention from users on the Internet, social media has been one of the most important information source in the world. Especially, with the increasing popularity of social media, data posted on social media sites are rapidly becoming collective intelligence, which is a term used to refer to new media that is displacing traditional media. In this paper, we focus on geotagged tweets on the Twitter site. These geotagged tweets are referred to as georeferenced documents because they include not only a short text message, but also the documents' posting time and location. Many researchers have been tackling the development of new data mining techniques for georeferenced documents to identify and analyze emergency topics, such as natural disasters, weather, diseases, and other incidents. In particular, the utilization of geotagged tweets to identify and analyze natural disasters has received much attention from administrative agencies recently because some case studies have achieved compelling results. In this paper, we propose a novel real-time analysis application for identifying bursty local areas related to emergency topics. The aim of our new application is to provide new platforms that can identify and analyze the localities of emergency topics. The proposed application is composed of three core computational intelligence techniques: the Naive Bayes classifier technique, the spatiotemporal clustering technique, and the burst detection technique. Moreover, we have implemented two types of application interface: a Web application interface and an android application interface. To evaluate the proposed application, we have implemented a real-time weather observation system embedded the proposed application. we used actual crawling geotagged tweets posted on the Twitter site. The weather observation system successfully detected bursty local areas related to observed emergency weather topics.

  2. Why advanced computing? The key to space-based operations

    NASA Astrophysics Data System (ADS)

    Phister, Paul W., Jr.; Plonisch, Igor; Mineo, Jack

    2000-11-01

    The 'what is the requirement?' aspect of advanced computing and how it relates to and supports Air Force space-based operations is a key issue. In support of the Air Force Space Command's five major mission areas (space control, force enhancement, force applications, space support and mission support), two-fifths of the requirements have associated stringent computing/size implications. The Air Force Research Laboratory's 'migration to space' concept will eventually shift Science and Technology (S&T) dollars from predominantly airborne systems to airborne-and-space related S&T areas. One challenging 'space' area is in the development of sophisticated on-board computing processes for the next generation smaller, cheaper satellite systems. These new space systems (called microsats or nanosats) could be as small as a softball, yet perform functions that are currently being done by large, vulnerable ground-based assets. The Joint Battlespace Infosphere (JBI) concept will be used to manage the overall process of space applications coupled with advancements in computing. The JBI can be defined as a globally interoperable information 'space' which aggregates, integrates, fuses, and intelligently disseminates all relevant battlespace knowledge to support effective decision-making at all echelons of a Joint Task Force (JTF). This paper explores a single theme -- on-board processing is the best avenue to take advantage of advancements in high-performance computing, high-density memories, communications, and re-programmable architecture technologies. The goal is to break away from 'no changes after launch' design to a more flexible design environment that can take advantage of changing space requirements and needs while the space vehicle is 'on orbit.'

  3. Application of synthetic aperture radars for the ground displacement monitoring in mineral mining areas

    NASA Astrophysics Data System (ADS)

    Dobrynchenko, VV; Kokorinand, IS; Shebalkova, LV

    2018-03-01

    The authors discuss applicability of synthesized aperture radars to monitorthe ground surface displacement in mineral mining areas in terms of a synthesized-aperture interferometric radar. The operation principle of the interferometric method is demonstrated on studies of the ground surface displacements in areas of oil and gas reservoirs. The advantages of the synthetic aperture radar are substantiated.

  4. Hanford Facility dangerous waste permit application, liquid effluent retention facility and 200 area effluent treatment facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coenenberg, J.G.

    1997-08-15

    The Hanford Facility Dangerous Waste Permit Application is considered to 10 be a single application organized into a General Information Portion (document 11 number DOE/RL-91-28) and a Unit-Specific Portion. The scope of the 12 Unit-Specific Portion is limited to Part B permit application documentation 13 submitted for individual, `operating` treatment, storage, and/or disposal 14 units, such as the Liquid Effluent Retention Facility and 200 Area Effluent 15 Treatment Facility (this document, DOE/RL-97-03). 16 17 Both the General Information and Unit-Specific portions of the Hanford 18 Facility Dangerous Waste Permit Application address the content of the Part B 19 permit applicationmore » guidance prepared by the Washington State Department of 20 Ecology (Ecology 1987 and 1996) and the U.S. Environmental Protection Agency 21 (40 Code of Federal Regulations 270), with additional information needs 22 defined by the Hazardous and Solid Waste Amendments and revisions of 23 Washington Administrative Code 173-303. For ease of reference, the Washington 24 State Department of Ecology alpha-numeric section identifiers from the permit 25 application guidance documentation (Ecology 1996) follow, in brackets, the 26 chapter headings and subheadings. A checklist indicating where information is 27 contained in the Liquid Effluent Retention Facility and 200 Area Effluent 28 Treatment Facility permit application documentation, in relation to the 29 Washington State Department of Ecology guidance, is located in the Contents 30 Section. 31 32 Documentation contained in the General Information Portion is broader in 33 nature and could be used by multiple treatment, storage, and/or disposal units 34 (e.g., the glossary provided in the General Information Portion). Wherever 35 appropriate, the Liquid Effluent Retention Facility and 200 Area Effluent 36 Treatment Facility permit application documentation makes cross-reference to 37 the General Information Portion, rather than

  5. Increasing the medical school applicant pool: a key to training more rural physicians.

    PubMed

    Anderson, Danielle M; Whitler, Elmer T; Johnson, Andrew O; Elam, Carol L; Wilson, Emery A; Asher, Linda M

    2009-09-01

    Workforce studies show shortages of physicians in many areas of the United States. These shortages are especially severe in states such as Kentucky with many rural counties and are predicted to worsen in the future unless there are changes throughout our educational system to build aspirations and prepare students for medical school education. To examine rural-urban differences and community characteristics of applicants and matriculants to Kentucky's two allopathic medical schools and influences on the educational aspirations of young students who wish to become physicians. The number of Kentucky applicants and matriculants to allopathic medical schools was obtained from the Association of American Medical College's data warehouse for the period from 2002-2006. A continuous, multidimensional measure was used to classify counties by degree of rurality. Socio-demographic variables were selected for the counties of residence for applicants and matriculants. Model variables were tested in a least squares multiple regression model for their ability to explain patterns among Kentucky's 120 counties in the number of both resident applicants and matriculants to medical school. Data from a survey of middle school participants in summer health camps were analyzed to help identify important influences on young students aspiring to a career as a health professional, especially becoming a physician, and how these might be supported to increase the supply of rural medical school applicants. The low number of rural applicants to medical school was highly correlated with the relative rurality of their county of residence, a low physician-to-population ratio and a low number of total primary care physicians. The percentage of county residents having a bachelor's degree level of education or higher had a positive impact on the application rate. Respondents became interested in health careers at age 15 or younger, and parents and grandparents, teachers, and close associates

  6. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis), a key seed disperser for Patagonian forest regeneration

    PubMed Central

    Bravo, Susana Patricia; Cueto, Victor Rodolfo; Gorosito, Cristian Andrés

    2017-01-01

    Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a result, our understanding about how these birds provide links between South American biomes is almost non-existent. White-crested Elaenia (Elaenia albiceps chilensis) is a long-distance austral migrant that breeds in the Patagonian Forest biome and overwinters in tropical South America. Because this small flycatcher plays a key role in the regeneration of this ecosystem, our objective was to describe the annual cycle of White-crested elaenias to evaluate the degree of migratory connectivity between breeding and wintering areas and therefore to determine if there are specific biomes of northern South America linked by elaenias to Patagonian forests. Fifteen individuals were successfully tracked throughout a complete migration cycle using miniature light-level geolocators. All individuals resided and moved through the same general regions. During fall (March-April-May), elaenias were located in the Caatinga and the Atlantic Forest biomes, from Rio de Janeiro to the region near Salvador da Bahia, Brazil. During winter (June-July-Aug.), birds were located further inland, within the Cerrado biome. Birds used three different routes during fall migration. Our results indicate that some individuals use a direct route, flying between 500–600 km/day, crossing desert and grasslands, while others took a detour, flying 100–200 km/day through forested areas with refueling opportunities. All birds used the Yunga forest during spring migration, with ten out of 15 individuals showing a clear

  7. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    PubMed

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  8. Nanoporous Ni with High Surface Area for Potential Hydrogen Storage Application.

    PubMed

    Zhou, Xiaocao; Zhao, Haibo; Fu, Zhibing; Qu, Jing; Zhong, Minglong; Yang, Xi; Yi, Yong; Wang, Chaoyang

    2018-06-01

    Nanoporous metals with considerable specific surface areas and hierarchical pore structures exhibit promising applications in the field of hydrogen storage, electrocatalysis, and fuel cells. In this manuscript, a facile method is demonstrated for fabricating nanoporous Ni with a high surface area by using SiO₂ aerogel as a template, i.e., electroless plating of Ni into an SiO₂ aerogel template followed by removal of the template at moderate conditions. The effects of the prepared conditions, including the electroless plating time, temperature of the structure, and the magnetism of nanoporous Ni are investigated in detail. The resultant optimum nanoporous Ni with a special 3D flower-like structure exhibited a high specific surface area of about 120.5 m²/g. The special nanoporous Ni exhibited a promising prospect in the field of hydrogen storage, with a hydrogen capacity of 0.45 wt % on 4.5 MPa at room temperature.

  9. Future scientific drilling in the Arctic Ocean: Key objectives, areas, and strategies

    NASA Astrophysics Data System (ADS)

    Stein, R.; Coakley, B.; Mikkelsen, N.; O'Regan, M.; Ruppel, C.

    2012-04-01

    Past, Present and Future Changes in Arctic Terrestrial and Marine Systems" (Kananaskis, Alberta/Canada, February 2012). During these workshops, key areas and key scientific themes as well as drilling and site-survey strategies were discussed. Major scientific themes for future Arctic drilling will include: - The Arctic Ocean during the transition from greenhouse to icehouse conditions and millennial scale climate changes; - Physical and chemical changes of the evolving Polar Ocean and Arctic gateways; - Impact of Pleistocene/Holocene warming and sea-level rise on upper continental slope and shelf gas hydrates and on shelf permafrost; - Land-ocean interactions; - Tectonic evolution and birth of the Arctic Ocean basin: Arctic ridges, sea floor spreading and global lithosphere processes. When thinking about future Arctic drilling, it should be clearly emphasized that for the precise planning of future Arctic Ocean drilling campaigns, including site selection, evaluation of proposed drill sites for safety and environmental protection, etc., comprehensive site survey data are needed first. This means that the development of a detailed site survey strategy is a major challenge for the coming years. Here, an overview of perspectives and plans for future Arctic Ocean drilling will be presented.

  10. Application of the Intervention Mapping protocol to develop Keys, a family child care home intervention to prevent early childhood obesity.

    PubMed

    Mann, Courtney M; Ward, Dianne S; Vaughn, Amber; Benjamin Neelon, Sara E; Long Vidal, Lenita J; Omar, Sakinah; Namenek Brouwer, Rebecca J; Østbye, Truls

    2015-12-10

    Many families rely on child care outside the home, making these settings important influences on child development. Nearly 1.5 million children in the U.S. spend time in family child care homes (FCCHs), where providers care for children in their own residences. There is some evidence that children in FCCHs are heavier than those cared for in centers. However, few interventions have targeted FCCHs for obesity prevention. This paper will describe the application of the Intervention Mapping (IM) framework to the development of a childhood obesity prevention intervention for FCCHs Following the IM protocol, six steps were completed in the planning and development of an intervention targeting FCCHs: needs assessment, formulation of change objectives matrices, selection of theory-based methods and strategies, creation of intervention components and materials, adoption and implementation planning, and evaluation planning Application of the IM process resulted in the creation of the Keys to Healthy Family Child Care Homes program (Keys), which includes three modules: Healthy You, Healthy Home, and Healthy Business. Delivery of each module includes a workshop, educational binder and tool-kit resources, and four coaching contacts. Social Cognitive Theory and Self-Determination Theory helped guide development of change objective matrices, selection of behavior change strategies, and identification of outcome measures. The Keys program is currently being evaluated through a cluster-randomized controlled trial The IM process, while time-consuming, enabled rigorous and systematic development of intervention components that are directly tied to behavior change theory and may increase the potential for behavior change within the FCCHs.

  11. Systems Operation Studies for Automated Guideway Transit Systems : Representative Application Areas for AGT

    DOT National Transportation Integrated Search

    1980-11-01

    The purpose of the Application Area Definition task is to define the travel demands and guideway networks for a set of representative AGT system deployments. These demands and networks, when combined with detailed descriptions of the systems and thei...

  12. Sewage in ground water in the Florida Keys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shinn, E.A.

    1995-12-31

    More than 24,000 septic tanks, 5,000 cesspools, and greater than 600 shallow disposal wells introduce sewage effluents into porous and permeable limestone underlying the Florida Keys. To porous and permeable limestone underlying the Florida Keys. To assess the fate of sewage nutrients, 21 2- to 20-m-deep wells were core drilled and completed as water-monitoring wells. The wells were sampled quarterly and analyzed for 17 parameters. including nutrients and bacteria. Nutrients (mainly NH4, - which is 30 to 40 times higher than in surface sea water) were detected in ground water beneath the Keys and offshore coral reefs. Highest levels weremore » beneath reefs 5 to 8 km offshore. Ground waters were generally hypersaline and fecal bacteria (fecal coliform and streptococci) were detected in ground water beneath living coral reefs. Higher sea level on the Florida Bay side of the Keys is proposed as the mechanism for forcing ground water toward offshore coral reefs. Tidal pumping, which is more pronounced near the Keys, causes leakage of ground water where the sediment is thin. Areas lacking sediment cover consist of bare limestone bedrock or permeable coral reefs. These are the areas where coral diseases and algal growth have increased in recent years. Pollutants entering the ground water beneath the Florida Keys are likely to be transported seaward beneath impermeable Holocene sediments and may be upwelling through coral reefs and other hardbottom communities.« less

  13. Multiple Pathways to College: A Secondary Analysis of the 2004 College Applicant Survey. ACAATO Document

    ERIC Educational Resources Information Center

    Colleges Ontario, 2005

    2005-01-01

    The 2004 College Applicant Survey (CAS) describes the college-bound applicant pool by covering a broad range of areas including key demographics, factors influencing college selection, academic background and financial preparedness. It is the most comprehensive and the richest source of survey data to date on applicants to the Ontario Colleges of…

  14. CO{sub 2} Laser Ablation Propulsion Area Scaling With Polyoxymethylene Propellant

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sinko, John E.; Ichihashi, Katsuhiro; Ogita, Naoya

    The topic of area scaling is of great importance in the laser propulsion field, including applications to removal of space debris and to selection of size ranges for laser propulsion craft in air or vacuum conditions. To address this issue experimentally, a CO{sub 2} laser operating at up to 10 J was used to irradiate targets. Experiments were conducted in air and vacuum conditions over a range of areas from about 0.05-5 cm{sup 2} to ablate flat polyoxymethylene targets at several fluences. Theoretical effects affecting area scaling, such as rarefaction waves, thermal diffusion, and diffraction, are discussed in terms ofmore » the experimental results. Surface profilometry was used to characterize the ablation samples. A CFD model is used to facilitate analysis, and key results are compared between experimental and model considerations. The dependence of key laser propulsion parameters, including the momentum coupling coefficient and specific impulse, are calculated based on experimental data, and results are compared to existing literature data.« less

  15. Analysis of Benefits and Pitfalls of Satellite SAR for Coastal Area Monitoring

    NASA Astrophysics Data System (ADS)

    Nunziata, F.; Buono, A.; Mgliaccio, M.; Li, X.; Wei, Y.

    2016-08-01

    This study aims at describing the outcomes of the Dragon-3 project no. 10689. The undertaken activities deal with coastal area monitoring and they include sea pollution and coastline extraction. The key remote sensing tool is the Synthetic Aperture Radar (SAR) that provides fine resolution images of the microwave reflectivity of the observed scene. However, the interpretation of SAR images is not at all straightforward and all the above-mentioned coastal area applications cannot be easily addressed using single-polarization SAR. Hence, the main outcome of this project is investigating the capability of multi-polarization SAR measurements to generate added-vale product in the frame of coastal area management.

  16. Multicomponent reactions provide key molecules for secret communication.

    PubMed

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  17. Key Largo Limestone revisited: Pleistocene shelf-edge facies, Florida Keys, USA

    USGS Publications Warehouse

    Gray, Multer H.; Gischler, E.; Lundberg, J.; Simmons, K.R.; Shinn, E.A.

    2002-01-01

    New dates and analysis of 12 deep and 57 shallow cores allow a more detailed interpretation of the Pleistocene shelf edge of the Florida Platform as found in various facies of the Key Largo Limestone beneath the Florida Keys. In this study a three-phase evolution of the Quaternary units (Q1-Q5) of the Key Largo is presented with new subdivision of the Q5. (1) In the first phase, the Q1 and Q2 (perhaps deposited during oxygen-isotope stage 11) deep-water quartz-rich environment evolved into a shallow carbonate phase. (2) Subsequently, a Q3 (presumably corresponding to oxygen-isotope stage 9) flourishing reef and productive high-platform sediment phase developed. (3) Finally, a Q4 and Q5 (corresponding to oxygen-isotope stages 7 and 5) stabilization phase occured with reefs and leeward productive lagoons, followed by lower sea levels presenting a sequence of younger (isotope substages 5c, 5a) shelf-margin wedges, sediment veneers and outlier reefs. The Key Largo Limestone provides an accessible model of a carbonate shelf edge with fluctuating water depth, bordering a deep seaward basin for a period of at least 300 ka. During this time, at least four onlaps/offlaps, often separated by periods of karst development with associated diagenetic alterations, took place. The story presented by this limestone not only allows a better understanding of the history of south Florida but also aids in the interpretation of similar persistent shelf-edge sites bordering deep basins in other areas.

  18. A Global Capacity Building Vision for Societal Applications of Earth Observing Systems and Data: Key Questions and Recommendations

    NASA Technical Reports Server (NTRS)

    Hossain, Faisal; Serrat-Capdevila, Aleix; Granger, Stephanie; Thomas, Amy; Saah, David; Ganz, David; Mugo, Robinson; Murthy, M. S. R.; Ramos, Victor Hugo; Kirschbaum, Dalia; hide

    2016-01-01

    Capacity building using Earth observing (EO) systems and data (i.e., from orbital and nonorbital platforms) to enable societal applications includes the network of human, nonhuman, technical, nontechnical, hardware, and software dimensions that are necessary to successfully cross the valley [of death; see NRC (2001)] between science and research (port of departure) and societal application (port of arrival). In many parts of the world (especially where ground-based measurements are scarce or insufficient), applications of EO data still struggle for longevity or continuity for a variety of reasons, foremost among them being the lack of resilient capacity. An organization is said to have resilient capacity when it can retain and continue to build capacity in the face of unexpected shocks or stresses. Stresses can include intermittent power and limited Internet bandwidth, constant need for education on ever-increasing complexity of EO systems and data, communication challenges between the ports of departure and arrival (especially across time zones), and financial limitations and instability. Shocks may also include extreme events such as disasters and losing key staff with technical and institutional knowledge.

  19. The effect of nitrogen loading on on-site system design: a model for determining land application area size.

    PubMed

    McCardell, A; Davison, L; Edwards, A

    2005-01-01

    Designers of on-site wastewater management systems have six opportunities to remove pollutants of concern from the aqueous waste stream before it reaches ground or surface waters. These opportunities occur at source, at point of collection (primary treatment), secondary treatment, tertiary treatment, land application and buffers. This paper presents a computer based model for the sizing of on-site system land application areas applicable to the Lismore area in Northern New South Wales, a region of high rainfall. Inputs to the model include daily climatic data, soil type, number of people loading the system and size of housing allotment. Constraints include allowable phosphorus export, nitrogen export and hydraulic percolation. In the Lismore area nitrogen is the nutrient of most concern. In areas close to environmentally sensitive waterways, and in dense developments, the allowable annual nitrogen export becomes the main factor determining the land application area size. The model offers system designers the opportunity to test various combinations of nitrogen attenuation strategies (source control, secondary treatment) in order to create a solution which offers an acceptable nitrogen export rate while meeting the client's household and financial needs. The model runs on an Excel spreadsheet and has been developed by Lismore City Council.

  20. The segmentation of bones in pelvic CT images based on extraction of key frames.

    PubMed

    Yu, Hui; Wang, Haijun; Shi, Yao; Xu, Ke; Yu, Xuyao; Cao, Yuzhen

    2018-05-22

    Bone segmentation is important in computed tomography (CT) imaging of the pelvis, which assists physicians in the early diagnosis of pelvic injury, in planning operations, and in evaluating the effects of surgical treatment. This study developed a new algorithm for the accurate, fast, and efficient segmentation of the pelvis. The proposed method consists of two main parts: the extraction of key frames and the segmentation of pelvic CT images. Key frames were extracted based on pixel difference, mutual information and normalized correlation coefficient. In the pelvis segmentation phase, skeleton extraction from CT images and a marker-based watershed algorithm were combined to segment the pelvis. To meet the requirements of clinical application, physician's judgment is needed. Therefore the proposed methodology is semi-automated. In this paper, 5 sets of CT data were used to test the overlapping area, and 15 CT images were used to determine the average deviation distance. The average overlapping area of the 5 sets was greater than 94%, and the minimum average deviation distance was approximately 0.58 pixels. In addition, the key frame extraction efficiency and the running time of the proposed method were evaluated on 20 sets of CT data. For each set, approximately 13% of the images were selected as key frames, and the average processing time was approximately 2 min (the time for manual marking was not included). The proposed method is able to achieve accurate, fast, and efficient segmentation of pelvic CT image sequences. Segmentation results not only provide an important reference for early diagnosis and decisions regarding surgical procedures, they also offer more accurate data for medical image registration, recognition and 3D reconstruction.

  1. Research of the application of the Low Power Wide Area Network in power grid

    NASA Astrophysics Data System (ADS)

    Wang, Hao; Sui, Hong; Li, Jia; Yao, Jian

    2018-03-01

    Low Power Wide Area Network (LPWAN) technologies developed rapidly in recent years, but these technologies have not make large-scale applications in different application scenarios of power grid. LoRa is a mainstream LPWAN technology. This paper makes a comparison test of the signal coverage of LoRa and other traditional wireless communication technologies in typical signal environment of power grid. Based on the test results, this paper gives an application suggestion of LoRa in power grid services, which can guide the planning and construction of the LPWAN in power grid.

  2. Application-driven ground motion prediction equation for seismic hazard assessments in non-cratonic moderate-seismicity areas

    NASA Astrophysics Data System (ADS)

    Bindi, D.; Cotton, F.; Kotha, S. R.; Bosse, C.; Stromeyer, D.; Grünthal, G.

    2017-09-01

    We present a ground motion prediction equation (GMPE) for probabilistic seismic hazard assessments (PSHA) in low-to-moderate seismicity areas, such as Germany. Starting from the NGA-West2 flat-file (Ancheta et al. in Earthquake Spectra 30:989-1005, 2014), we develop a model tailored to the hazard application in terms of data selection and implemented functional form. In light of such hazard application, the GMPE is derived for hypocentral distance (along with the Joyner-Boore one), selecting recordings at sites with vs30 ≥ 360 m/s, distances within 300 km, and magnitudes in the range 3 to 8 (being 7.4 the maximum magnitude for the PSHA in the target area). Moreover, the complexity of the considered functional form is reflecting the availability of information in the target area. The median predictions are compared with those from the NGA-West2 models and with one recent European model, using the Sammon's map constructed for different scenarios. Despite the simplification in the functional form, the assessed epistemic uncertainty in the GMPE median is of the order of those affecting the NGA-West2 models for the magnitude range of interest of the hazard application. On the other hand, the simplification of the functional form led to an increment of the apparent aleatory variability. In conclusion, the GMPE developed in this study is tailored to the needs for applications in low-to-moderate seismic areas and for short return periods (e.g., 475 years); its application in studies where the hazard is involving magnitudes above 7.4 and for long return periods is not advised.

  3. Modeling grain-size dependent bias in estimating forest area: a regional application

    Treesearch

    Daolan Zheng; Linda S. Heath; Mark J. Ducey

    2008-01-01

    A better understanding of scaling-up effects on estimating important landscape characteristics (e.g. forest percentage) is critical for improving ecological applications over large areas. This study illustrated effects of changing grain sizes on regional forest estimates in Minnesota, Wisconsin, and Michigan of the USA using 30-m land-cover maps (1992 and 2001)...

  4. Revision of the genera Microplitis and Snellenius (Hymenoptera, Braconidae, Microgastrinae) from Area de Conservacion Guanacaste, Costa Rica, with a key to all species previously described from Mesoamerica

    USDA-ARS?s Scientific Manuscript database

    The genera Microplitis and Snellenius (Hymenoptera: Braconidae, Microgastrinae) from Area de Conservacion Guanacaste (ACG), Costa Rica, are revised. A total of 28 new species are described: 23 of Snellenius (the first record for Mesoamerica) and five of Microplitis. A key is provided to all new spec...

  5. Geology and hydrogeology of the Florida Keys

    USGS Publications Warehouse

    Halley, Robert B.; Vacher, H. L.; Shinn,

    1997-01-01

    This chapter discusses the geology and hydrogeology of the Florida Keys, and focuses on the islands formed of Pleistocene limestone. These islands, which are crossed when driving from Miami to Key West, are typically regarded as "the Florida Keys." The outstanding and fragile character of ecosystems on and around the Florida Keys has prompted State and Federal efforts to protect and preserve the remaining public portions of the region. The Florida Keys were largely ignored during the sixteenth, seventeenth, and eighteenth centuries, although the waters just offshore provided a major shipping thoroughfare to and from the New World. The Florida Keys are now recognized as one of the great recreational and environmental resources of the United States. The islands are outposts of a laid-back, tropical resort culture that has as its foundation warmth and clear water. A significant part of the attraction is fishing, diving, and boating around the area's coral reefs, which the islands protect. But the reefs were not always so highly valued. The Florida Keys that have protected the reefs for millennia, may now be the source of the agents that may accomplish what Agassiz thought was beyond man's power a century ago.

  6. Quantum key distribution with prepare-and-measure Bell test

    PubMed Central

    Tan, Yong-gang

    2016-01-01

    The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the communication without being detected. A prepare-and-measure Bell test protocol will be proposed. By randomly carrying out Bell test at the side of the information receiver, Bob, Eve’s illegal information gain within the detector side channel attack can be well bounded. This protocol does not require any improvement on the detectors used in available prepare-and-measure QKD. Though we only illustrate its application in the BB84 protocol, it is applicable for any prepare-and-measure QKD. PMID:27733771

  7. Designing area optimized application-specific network-on-chip architectures while providing hard QoS guarantees.

    PubMed

    Khawaja, Sajid Gul; Mushtaq, Mian Hamza; Khan, Shoab A; Akram, M Usman; Jamal, Habib Ullah

    2015-01-01

    With the increase of transistors' density, popularity of System on Chip (SoC) has increased exponentially. As a communication module for SoC, Network on Chip (NoC) framework has been adapted as its backbone. In this paper, we propose a methodology for designing area-optimized application specific NoC while providing hard Quality of Service (QoS) guarantees for real time flows. The novelty of the proposed system lies in derivation of a Mixed Integer Linear Programming model which is then used to generate a resource optimal Network on Chip (NoC) topology and architecture while considering traffic and QoS requirements. We also present the micro-architectural design features used for enabling traffic and latency guarantees and discuss how the solution adapts for dynamic variations in the application traffic. The paper highlights the effectiveness of proposed method by generating resource efficient NoC solutions for both industrial and benchmark applications. The area-optimized results are generated in few seconds by proposed technique, without resorting to heuristics, even for an application with 48 traffic flows.

  8. Designing Area Optimized Application-Specific Network-On-Chip Architectures while Providing Hard QoS Guarantees

    PubMed Central

    Khawaja, Sajid Gul; Mushtaq, Mian Hamza; Khan, Shoab A.; Akram, M. Usman; Jamal, Habib ullah

    2015-01-01

    With the increase of transistors' density, popularity of System on Chip (SoC) has increased exponentially. As a communication module for SoC, Network on Chip (NoC) framework has been adapted as its backbone. In this paper, we propose a methodology for designing area-optimized application specific NoC while providing hard Quality of Service (QoS) guarantees for real time flows. The novelty of the proposed system lies in derivation of a Mixed Integer Linear Programming model which is then used to generate a resource optimal Network on Chip (NoC) topology and architecture while considering traffic and QoS requirements. We also present the micro-architectural design features used for enabling traffic and latency guarantees and discuss how the solution adapts for dynamic variations in the application traffic. The paper highlights the effectiveness of proposed method by generating resource efficient NoC solutions for both industrial and benchmark applications. The area-optimized results are generated in few seconds by proposed technique, without resorting to heuristics, even for an application with 48 traffic flows. PMID:25898016

  9. High key rate continuous-variable quantum key distribution with a real local oscillator.

    PubMed

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Ma, Hongxin; Wang, Shiyu; Zeng, Guihua

    2018-02-05

    Continuous-variable quantum key distribution (CVQKD) with a real local oscillator (LO) has been extensively studied recently due to its security and simplicity. In this paper, we propose a novel implementation of a high-key-rate CVQKD with a real LO. Particularly, with the help of the simultaneously generated reference pulse, the phase drift of the signal is tracked in real time and then compensated. By utilizing the time and polarization multiplexing techniques to isolate the reference pulse and controlling the intensity of it, not only the contamination from it is suppressed, but also a high accuracy of the phase compensation can be guaranteed. Besides, we employ homodyne detection on the signal to ensure the high quantum efficiency and heterodyne detection on the reference pulse to acquire the complete phase information of it. In order to suppress the excess noise, a theoretical noise model for our scheme is established. According to this model, the impact of the modulation variance and the intensity of the reference pulse are both analysed theoretically and then optimized according to the experimental data. By measuring the excess noise in the 25km optical fiber transmission system, a 3.14Mbps key rate in the asymptotic regime proves to be achievable. This work verifies the feasibility of the high-key-rate CVQKD with a real LO within the metropolitan area.

  10. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Seventh Coast Guard District § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area...

  11. Polarization Remote Sensing Physical Mechanism, Key Methods and Application

    NASA Astrophysics Data System (ADS)

    Yang, B.; Wu, T.; Chen, W.; Li, Y.; Knjazihhin, J.; Asundi, A.; Yan, L.

    2017-09-01

    China's long-term planning major projects "high-resolution earth observation system" has been invested nearly 100 billion and the satellites will reach 100 to 2020. As to 2/3 of China's area covered by mountains it has a higher demand for remote sensing. In addition to light intensity, frequency, phase, polarization is also the main physical characteristics of remote sensing electromagnetic waves. Polarization is an important component of the reflected information from the surface and the atmospheric information, and the polarization effect of the ground object reflection is the basis of the observation of polarization remote sensing. Therefore, the effect of eliminating the polarization effect is very important for remote sensing applications. The main innovations of this paper is as follows: (1) Remote sensing observation method. It is theoretically deduced and verified that the polarization can weaken the light in the strong light region, and then provide the polarization effective information. In turn, the polarization in the low light region can strengthen the weak light, the same can be obtained polarization effective information. (2) Polarization effect of vegetation. By analyzing the structure characteristics of vegetation, polarization information is obtained, then the vegetation structure information directly affects the absorption of biochemical components of leaves. (3) Atmospheric polarization neutral point observation method. It is proved to be effective to achieve the ground-gas separation, which can achieve the effect of eliminating the atmospheric polarization effect and enhancing the polarization effect of the object.

  12. Variable steroid receptor responses: Intrinsically disordered AF1 is the key

    PubMed Central

    Simons, S. Stoney; Kumar, Raj

    2013-01-01

    Steroid hormones, acting through their cognate receptor proteins, see widespread clinical applications due to their ability to alter the induction or repression of numerous genes. However, steroid usage is limited by the current inability to control off-target, or non-specific, side-effects. Recent results from three separate areas of research with glucocorticoid and other steroid receptors (cofactor-induced changes in receptor structure, the ability of ligands to alter remote regions of receptor structure, and how cofactor concentration affects both ligand potency and efficacy) indicate that a key element of receptor activity is the intrinsically disordered amino-terminal domain. These results are combined to construct a novel framework within which to logically pursue various approaches that could afford increased selectivity in steroid-based therapies. PMID:23792173

  13. Potential and challenges of body area networks for personal health.

    PubMed

    Penders, Julien; van de Molengraft, Jef; Brown, Lindsay; Grundlehner, Bernard; Gyselinckx, Bert; Van Hoof, Chris

    2009-01-01

    This paper illustrates how body area network technology may enable new personal health concepts. A BAN technology platform is presented, which integrates technology building blocks from the Human++ research program on autonomous wireless sensors. Technology evaluation for the case of wireless sleep staging and real-time arousal monitoring is reported. Key technology challenges are discussed. The ultimate target is the development of miniaturized body sensor nodes powered by body-energy, anticipating the needs of emerging personal health applications.

  14. Research on key technologies for data-interoperability-based metadata, data compression and encryption, and their application

    NASA Astrophysics Data System (ADS)

    Yu, Xu; Shao, Quanqin; Zhu, Yunhai; Deng, Yuejin; Yang, Haijun

    2006-10-01

    With the development of informationization and the separation between data management departments and application departments, spatial data sharing becomes one of the most important objectives for the spatial information infrastructure construction, and spatial metadata management system, data transmission security and data compression are the key technologies to realize spatial data sharing. This paper discusses the key technologies for metadata based on data interoperability, deeply researches the data compression algorithms such as adaptive Huffman algorithm, LZ77 and LZ78 algorithm, studies to apply digital signature technique to encrypt spatial data, which can not only identify the transmitter of spatial data, but also find timely whether the spatial data are sophisticated during the course of network transmission, and based on the analysis of symmetric encryption algorithms including 3DES,AES and asymmetric encryption algorithm - RAS, combining with HASH algorithm, presents a improved mix encryption method for spatial data. Digital signature technology and digital watermarking technology are also discussed. Then, a new solution of spatial data network distribution is put forward, which adopts three-layer architecture. Based on the framework, we give a spatial data network distribution system, which is efficient and safe, and also prove the feasibility and validity of the proposed solution.

  15. Applicability of land use models for the Houston area test site

    NASA Technical Reports Server (NTRS)

    Petersburg, R. K.; Bradford, L. H.

    1973-01-01

    Descriptions of land use models are presented which were considered for their applicability to the Houston Area Test Site. These models are representative both of the prevailing theories of land use dynamics and of basic approaches to simulation. The models considered are: a model of metropolis, land use simulation model, emperic land use forecasting model, a probabilistic model for residential growth, and the regional environmental management allocation process. Sources of environmental/resource information are listed.

  16. 77 FR 43806 - Foreign-Trade Zone 26-Atlanta, GA; Application for Reorganization (Expansion of Service Area...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-26

    ... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-52-2012] Foreign-Trade Zone 26--Atlanta, GA; Application for Reorganization (Expansion of Service Area) Under the Alternative Site Framework An application has been submitted to the Foreign-Trade Zones (FTZ) Board (the Board) by the Georgia Foreign-Trade...

  17. Partitioned key-value store with atomic memory operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from themore » local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.« less

  18. 77 FR 52310 - Foreign-Trade Zone 26-Atlanta, GA, Application for Reorganization (Expansion of Service Area...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-29

    ... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-52-2012] Foreign-Trade Zone 26--Atlanta, GA, Application for Reorganization (Expansion of Service Area), Under the Alternative Site Framework, Amendment of Application A request has been submitted to the Foreign-Trade Zones Board (the Board) by the Georgia Foreign...

  19. Surface Plasmon Resonance or Biocompatibility—Key Properties for Determining the Applicability of Noble Metal Nanoparticles

    PubMed Central

    Craciun, Ana Maria; Focsan, Monica; Vulpoi, Adriana

    2017-01-01

    Metal and in particular noble metal nanoparticles represent a very special class of materials which can be applied as prepared or as composite materials. In most of the cases, two main properties are exploited in a vast number of publications: biocompatibility and surface plasmon resonance (SPR). For instance, these two important properties are exploitable in plasmonic diagnostics, bioactive glasses/glass ceramics and catalysis. The most frequently applied noble metal nanoparticle that is universally applicable in all the previously mentioned research areas is gold, although in the case of bioactive glasses/glass ceramics, silver and copper nanoparticles are more frequently applied. The composite partners/supports/matrix/scaffolds for these nanoparticles can vary depending on the chosen application (biopolymers, semiconductor-based composites: TiO2, WO3, Bi2WO6, biomaterials: SiO2 or P2O5-based glasses and glass ceramics, polymers: polyvinyl alcohol (PVA), Gelatin, polyethylene glycol (PEG), polylactic acid (PLA), etc.). The scientific works on these materials’ applicability and the development of new approaches will be targeted in the present review, focusing in several cases on the functioning mechanism and on the role of the noble metal. PMID:28773196

  20. Deterministic composite nanophotonic lattices in large area for broadband applications

    NASA Astrophysics Data System (ADS)

    Xavier, Jolly; Probst, Jürgen; Becker, Christiane

    2016-12-01

    Exotic manipulation of the flow of photons in nanoengineered materials with an aperiodic distribution of nanostructures plays a key role in efficiency-enhanced broadband photonic and plasmonic technologies for spectrally tailorable integrated biosensing, nanostructured thin film solarcells, white light emitting diodes, novel plasmonic ensembles etc. Through a generic deterministic nanotechnological route here we show subwavelength-scale silicon (Si) nanostructures on nanoimprinted glass substrate in large area (4 cm2) with advanced functional features of aperiodic composite nanophotonic lattices. These nanophotonic aperiodic lattices have easily tailorable supercell tiles with well-defined and discrete lattice basis elements and they show rich Fourier spectra. The presented nanophotonic lattices are designed functionally akin to two-dimensional aperiodic composite lattices with unconventional flexibility- comprising periodic photonic crystals and/or in-plane photonic quasicrystals as pattern design subsystems. The fabricated composite lattice-structured Si nanostructures are comparatively analyzed with a range of nanophotonic structures with conventional lattice geometries of periodic, disordered random as well as in-plane quasicrystalline photonic lattices with comparable lattice parameters. As a proof of concept of compatibility with advanced bottom-up liquid phase crystallized (LPC) Si thin film fabrication, the experimental structural analysis is further extended to double-side-textured deterministic aperiodic lattice-structured 10 μm thick large area LPC Si film on nanoimprinted substrates.

  1. Deterministic composite nanophotonic lattices in large area for broadband applications

    PubMed Central

    Xavier, Jolly; Probst, Jürgen; Becker, Christiane

    2016-01-01

    Exotic manipulation of the flow of photons in nanoengineered materials with an aperiodic distribution of nanostructures plays a key role in efficiency-enhanced broadband photonic and plasmonic technologies for spectrally tailorable integrated biosensing, nanostructured thin film solarcells, white light emitting diodes, novel plasmonic ensembles etc. Through a generic deterministic nanotechnological route here we show subwavelength-scale silicon (Si) nanostructures on nanoimprinted glass substrate in large area (4 cm2) with advanced functional features of aperiodic composite nanophotonic lattices. These nanophotonic aperiodic lattices have easily tailorable supercell tiles with well-defined and discrete lattice basis elements and they show rich Fourier spectra. The presented nanophotonic lattices are designed functionally akin to two-dimensional aperiodic composite lattices with unconventional flexibility- comprising periodic photonic crystals and/or in-plane photonic quasicrystals as pattern design subsystems. The fabricated composite lattice-structured Si nanostructures are comparatively analyzed with a range of nanophotonic structures with conventional lattice geometries of periodic, disordered random as well as in-plane quasicrystalline photonic lattices with comparable lattice parameters. As a proof of concept of compatibility with advanced bottom-up liquid phase crystallized (LPC) Si thin film fabrication, the experimental structural analysis is further extended to double-side-textured deterministic aperiodic lattice-structured 10 μm thick large area LPC Si film on nanoimprinted substrates. PMID:27941869

  2. Qualified nurses' rate new nursing graduates as lacking skills in key clinical areas.

    PubMed

    Missen, Karen; McKenna, Lisa; Beauchamp, Alison; Larkins, Jo-Ann

    2016-08-01

    The aim of this study was to explore perceptions of qualified nurses on the abilities of newly registered nursing graduates to perform a variety of clinical skills. Evidence from the literature suggests that undergraduate nursing programmes do not adequately prepare nursing students to be practice-ready on completion of their nursing courses. A descriptive quantitative design was used. Participants were recruited through the Australian Nursing and Midwifery Federation, Victorian branch. A brief explanation of the study and a link to the survey were promoted in their monthly e-newsletter. A total of 245 qualified nurses in the state of Victoria, Australia participated in this study. A survey tool of 51 clinical skills and open-ended questions was used, whereby participants were asked to rate new nursing graduates' abilities using a 5-point Likert scale. Overall participants rated new nursing graduates' abilities for undertaking clinical skills as good or very good in 35·3% of skills, 33·3% were rated as adequate and 31·4% rated as being performed poorly or very poorly. Of concern, essential clinical skills, such as critical thinking and problem solving, working independently and assessment procedures, were found to be poorly executed and affecting new registered nurses graduates' competence. The findings from this study can further serve as a reference for nursing education providers to enhance nursing curricula and work collaboratively with healthcare settings in preparing nurses to be competent, safe practitioners on completion of their studies. Identifying key areas in which new nursing graduates are not yet competent means that educational providers and educators from healthcare settings can focus on these skills in better preparing our nurses to be work ready. © 2016 John Wiley & Sons Ltd.

  3. Synthesis and Applications of Large Area Graphene-Based Electrode Systems

    NASA Astrophysics Data System (ADS)

    Paul, Rajat Kanti

    Graphene is a single sheet of carbon atoms with outstanding electrical and physical properties and being exploited for applications in electronics, sensors, fuel cells, photovoltaics and energy storage. However, practical designs of graphene-based electrode systems and related experimental implementations are required to realize their widespread applications in nano- to bioelectronics. In this dissertation, different graphene-based electrode systems having metallic and semiconducting properties are synthesized optimizing process conditions. Also realized is the potential of the fabricated electrode systems by applying them in practical applications such as sensor devices and fuel cells. The zero bandgap of semimetal graphene still limits its application as an effective field-effect transistor device or a chemiresistor sensor operating at room temperature. It has been shown theoretically and experimentally that graphene nanoribbons (GNRs) or nanomeshes (GNMs) can attain a bandgap that is large enough for a transistor device, and hence would show high sensitivity to various gaseous species or biomolecules. Large-area mono- and bilayer graphene films are synthesized by a simple chemical vapor deposition (CVD) technique depending on the carbon precursors such as methane, acetylene and ethanol, and the results are compared using optical microscopy (OM), Raman spectroscopy, high-resolution transmission electron microscopy (HRTEM) and x-ray photoelectron spectroscopy (XPS). A simple reactive ion etching (RIE) combined with well-established nanosphere lithography is performed on the synthesized CVD-grown monolayer graphene platform to fabricate large area GNMs with specific dimension and periodicity. The fabricated GNMs chemiresistor sensor devices show excellent sensitivity towards NO2 and NH 3, significantly higher than their film counterparts. The GNM sensor devices exhibit sensitivities of about 4.32%/ppm (parts-per-million) in NO 2 and 0.71%/ppm in NH3 with estimated

  4. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  5. Air cushion landing gear applications study

    NASA Technical Reports Server (NTRS)

    Earl, T. D.

    1979-01-01

    A series of air cushion landing gear (ACLG) applications was studied and potential benefits analyzed in order to identify the most attractive of these. The selected applications are new integrated designs (not retrofits) and employ a modified design approach with improved characteristics and performance. To aid the study, a survey of potential users was made. Applications were evaluated in the light of comments received. A technology scenario is developed, with discussion of problem areas, current technology level and future needs. Feasible development timetables are suggested. It is concluded that near-term development of small-size ACLG trunks, exploration of flight effects and braking are key items. The most attractive applications are amphibious with very large cargo aircraft and small general aviation having the greatest potential.

  6. Wide area coverage radar imaging satellite for earth applications. [surveillance and mapping of ice on Great Lakes

    NASA Technical Reports Server (NTRS)

    Stevens, G. H.; Ramler, J. R.

    1974-01-01

    A preliminary study was made of a radar imaging satellite for earth applications. A side-looking synthetic-aperture radar was considered and the feasibility of obtaining a wide area coverage to reduce the time required to image a given area was investigated. Two basic approaches were examined; low altitude sun-synchronous orbits using a multibeam/multifrequency radar system and equatorial orbits up to near-synchronous altitude using a single beam system. Surveillance and mapping of ice on the Great Lakes was used as a typical application to focus the study effort.

  7. Vital area identification for U.S. Nuclear Regulatory Commission nuclear power reactor licensees and new reactor applicants.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitehead, Donnie Wayne; Varnado, G. Bruce

    2008-09-01

    U.S. Nuclear Regulatory Commission nuclear power plant licensees and new reactor applicants are required to provide protection of their plants against radiological sabotage, including the placement of vital equipment in vital areas. This document describes a systematic process for the identification of the minimum set of areas that must be designated as vital areas in order to ensure that all radiological sabotage scenarios are prevented. Vital area identification involves the use of logic models to systematically identify all of the malicious acts or combinations of malicious acts that could lead to radiological sabotage. The models available in the plant probabilisticmore » risk assessment and other safety analyses provide a great deal of the information and basic model structure needed for the sabotage logic model. Once the sabotage logic model is developed, the events (or malicious acts) in the model are replaced with the areas in which the events can be accomplished. This sabotage area logic model is then analyzed to identify the target sets (combinations of areas the adversary must visit to cause radiological sabotage) and the candidate vital area sets (combinations of areas that must be protected against adversary access to prevent radiological sabotage). Any one of the candidate vital area sets can be selected for protection. Appropriate selection criteria will allow the licensee or new reactor applicant to minimize the impacts of vital area protection measures on plant safety, cost, operations, or other factors of concern.« less

  8. Preliminary assessment of sources of nitrogen in groundwater at a biosolids-application area near Deer Trail

    USGS Publications Warehouse

    Yager, Tracy J.B.; McMahon, Peter B.

    2012-01-01

    Concentrations of dissolved nitrite plus nitrate increased fairly steadily in samples from four shallow groundwater monitoring wells after biosolids applications to nonirrigated farmland began in 1993. The U.S. Geological Survey began a preliminary assessment of sources of nitrogen in shallow groundwater at part of the biosolids-application area near Deer Trail, Colorado, in 2005 in cooperation with the Metro Wastewater Reclamation District. Possible nitrogen sources in the area include biosolids, animal manure, inorganic fertilizer, atmospheric deposition, and geologic materials (bedrock and soil). Biosolids from the Metro Wastewater Reclamation District plant in Denver and biosolids, cow manure, geologic materials (bedrock and soil), and groundwater from the study area were sampled to measure nitrogen content and nitrogen isotopic compositions of nitrate or total nitrogen. Biosolids also were leached, and the leachates were analyzed for nitrogen content and other concentrations. Geologic materials from the study area also were sampled to determine mineralogy. Estimates of nitrogen contributed from inorganic fertilizer and atmospheric deposition were calculated from other published reports. The nitrogen information from the study indicates that each of the sources contain sufficient nitrogen to potentially affect groundwater nitrate concentrations. Natural processes can transform the nitrogen in any of the sources to nitrate in the groundwater. Load calculations indicate that animal manure, inorganic fertilizer, or atmospheric deposition could have contributed the largest nitrogen load to the study area in the 13 years before biosolids applications began, but biosolids likely contributed the largest nitrogen load to the study area in the 13 years after biosolids applications began. Various approaches provided insights into sources of nitrate in the groundwater samples from 2005. The isotopic data indicate that, of the source materials considered, biosolids and (or

  9. The comparison and analysis of extracting video key frame

    NASA Astrophysics Data System (ADS)

    Ouyang, S. Z.; Zhong, L.; Luo, R. Q.

    2018-05-01

    Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.

  10. Supercritical processing as a route to high internal surface areas and permanent microporosity in metal-organic framework materials.

    PubMed

    Nelson, Andrew P; Farha, Omar K; Mulfort, Karen L; Hupp, Joseph T

    2009-01-21

    Careful processing of four representative metal-organic framework (MOF) materials with liquid and supercritical carbon dioxide (ScD) leads to substantial, or in some cases spectacular (up to 1200%), increases in gas-accessible surface area. Maximization of surface area is key to the optimization of MOFs for many potential applications. Preliminary evidence points to inhibition of mesopore collapse, and therefore micropore accessibility, as the basis for the extraordinarily efficacious outcome of ScD-based activation.

  11. Prospects and applications near ferroelectric quantum phase transitions: a key issues review.

    PubMed

    Chandra, P; Lonzarich, G G; Rowley, S E; Scott, J F

    2017-11-01

    The emergence of complex and fascinating states of quantum matter in the neighborhood of zero temperature phase transitions suggests that such quantum phenomena should be studied in a variety of settings. Advanced technologies of the future may be fabricated from materials where the cooperative behavior of charge, spin and current can be manipulated at cryogenic temperatures. The progagating lattice dynamics of displacive ferroelectrics make them appealing for the study of quantum critical phenomena that is characterized by both space- and time-dependent quantities. In this key issues article we aim to provide a self-contained overview of ferroelectrics near quantum phase transitions. Unlike most magnetic cases, the ferroelectric quantum critical point can be tuned experimentally to reside at, above or below its upper critical dimension; this feature allows for detailed interplay between experiment and theory using both scaling and self-consistent field models. Empirically the sensitivity of the ferroelectric T c 's to external and to chemical pressure gives practical access to a broad range of temperature behavior over several hundreds of Kelvin. Additional degrees of freedom like charge and spin can be added and characterized systematically. Satellite memories, electrocaloric cooling and low-loss phased-array radar are among possible applications of low-temperature ferroelectrics. We end with open questions for future research that include textured polarization states and unusual forms of superconductivity that remain to be understood theoretically.

  12. Prospects and applications near ferroelectric quantum phase transitions: a key issues review

    NASA Astrophysics Data System (ADS)

    Chandra, P.; Lonzarich, G. G.; Rowley, S. E.; Scott, J. F.

    2017-11-01

    The emergence of complex and fascinating states of quantum matter in the neighborhood of zero temperature phase transitions suggests that such quantum phenomena should be studied in a variety of settings. Advanced technologies of the future may be fabricated from materials where the cooperative behavior of charge, spin and current can be manipulated at cryogenic temperatures. The progagating lattice dynamics of displacive ferroelectrics make them appealing for the study of quantum critical phenomena that is characterized by both space- and time-dependent quantities. In this key issues article we aim to provide a self-contained overview of ferroelectrics near quantum phase transitions. Unlike most magnetic cases, the ferroelectric quantum critical point can be tuned experimentally to reside at, above or below its upper critical dimension; this feature allows for detailed interplay between experiment and theory using both scaling and self-consistent field models. Empirically the sensitivity of the ferroelectric T c’s to external and to chemical pressure gives practical access to a broad range of temperature behavior over several hundreds of Kelvin. Additional degrees of freedom like charge and spin can be added and characterized systematically. Satellite memories, electrocaloric cooling and low-loss phased-array radar are among possible applications of low-temperature ferroelectrics. We end with open questions for future research that include textured polarization states and unusual forms of superconductivity that remain to be understood theoretically.

  13. A review on several key problems of standoff trace explosives detection by optical-related technology

    NASA Astrophysics Data System (ADS)

    Chen, Zhibin; Xiao, Cheng; Xiao, Wenjian; Qin, Mengze; Liu, Xianhong

    2016-01-01

    To prevent tragic disasters caused by terror acts and warfare threats, security check personnel must be capable of discovering, distinguishing and eliminating the explosives at multiple circumstances. Standoff technology for the remote detection of explosives and their traces on contaminated surfaces is a research field that has become a heightened priority in recent years for homeland security and counter-terrorism applications. There has been a huge increase in research within this area, the improvement of standoff trace explosives detection by optical-related technology. This paper provides a consolidation of information relating to recent advances in several key problems of, without being limited to one specific research area or explosive type. Working laser wavelength of detection system is discussed. Generation and collection of explosives spectra signal are summarized. Techniques for analysing explosives spectra signal are summed up.

  14. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  15. Exploring diversity in ensemble classification: Applications in large area land cover mapping

    NASA Astrophysics Data System (ADS)

    Mellor, Andrew; Boukir, Samia

    2017-07-01

    Ensemble classifiers, such as random forests, are now commonly applied in the field of remote sensing, and have been shown to perform better than single classifier systems, resulting in reduced generalisation error. Diversity across the members of ensemble classifiers is known to have a strong influence on classification performance - whereby classifier errors are uncorrelated and more uniformly distributed across ensemble members. The relationship between ensemble diversity and classification performance has not yet been fully explored in the fields of information science and machine learning and has never been examined in the field of remote sensing. This study is a novel exploration of ensemble diversity and its link to classification performance, applied to a multi-class canopy cover classification problem using random forests and multisource remote sensing and ancillary GIS data, across seven million hectares of diverse dry-sclerophyll dominated public forests in Victoria Australia. A particular emphasis is placed on analysing the relationship between ensemble diversity and ensemble margin - two key concepts in ensemble learning. The main novelty of our work is on boosting diversity by emphasizing the contribution of lower margin instances used in the learning process. Exploring the influence of tree pruning on diversity is also a new empirical analysis that contributes to a better understanding of ensemble performance. Results reveal insights into the trade-off between ensemble classification accuracy and diversity, and through the ensemble margin, demonstrate how inducing diversity by targeting lower margin training samples is a means of achieving better classifier performance for more difficult or rarer classes and reducing information redundancy in classification problems. Our findings inform strategies for collecting training data and designing and parameterising ensemble classifiers, such as random forests. This is particularly important in large area

  16. Ion channels in key marine invertebrates; their diversity and potential for applications in biotechnology.

    PubMed

    Brown, Euan R; Piscopo, Stefania

    2011-01-01

    Of the intra-membrane proteins, the class that comprises voltage and ligand-gated ion channels represents the major substrate whereby signals pass between and within cells in all organisms. It has been presumed that vertebrate and particularly mammalian ion channels represent the apex of evolutionary complexity and diversity and much effort has been focused on understanding their function. However, the recent availability of cheap high throughput genome sequencing has massively broadened and deepened the quality of information across phylogeny and is radically changing this view. Here we review current knowledge on such channels in key marine invertebrates where physiological evidence is backed up by molecular sequences and expression/functional studies. As marine invertebrates represent a much greater range of phyla than terrestrial vertebrates and invertebrates together, we argue that these animals represent a highly divergent, though relatively underused source of channel novelty. As ion channels are exquisitely selective sensors for voltage and ligands, their potential and actual applications in biotechnology are manifold. Copyright © 2011 Elsevier Inc. All rights reserved.

  17. Method for evaluating the reliability of compressor impeller of turbocharger for vehicle application in plateau area

    NASA Astrophysics Data System (ADS)

    Wang, Zheng; Wang, Zengquan; Wang, A.-na; Zhuang, Li; Wang, Jinwei

    2016-10-01

    As turbocharging diesel engines for vehicle application are applied in plateau area, the environmental adaptability of engines has drawn more attention. For the environmental adaptability problem of turbocharging diesel engines for vehicle application, the present studies almost focus on the optimization of performance match between turbocharger and engine, and the reliability problem of turbocharger is almost ignored. The reliability problem of compressor impeller of turbocharger for vehicle application when diesel engines operate in plateau area is studied. Firstly, the rule that the rotational speed of turbocharger changes with the altitude height is presented, and the potential failure modes of compressor impeller are analyzed. Then, the failure behavior models of compressor impeller are built, and the reliability models of compressor impeller operating in plateau area are developed. Finally, the rule that the reliability of compressor impeller changes with the altitude height is studied, the measurements for improving the reliability of the compressor impellers of turbocharger operating in plateau area are given. The results indicate that when the operating speed of diesel engine is certain, the rotational speed of turbocharger increases with the increase of altitude height, and the failure risk of compressor impeller with the failure modes of hub fatigue and blade resonance increases. The reliability of compressor impeller decreases with the increase of altitude height, and it also decreases as the increase of number of the mission profile cycle of engine. The method proposed can not only be used to evaluating the reliability of compressor impeller when diesel engines operate in plateau area but also be applied to direct the structural optimization of compressor impeller.

  18. Be-safe travel, a web-based geographic application to explore safe-route in an area

    NASA Astrophysics Data System (ADS)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  19. Expert perspectives on hereditary angioedema: Key areas for advancements in care across the patient journey

    PubMed Central

    Baş, Murat; Bernstein, Jonathan A.; Boccon-Gibod, Isabelle; Bova, Maria; Dempster, John; Grumach, Anete Sevciovic; Magerl, Markus; Poarch, Kimberly; Ferreira, Manuel Branco

    2016-01-01

    Background: Published literature documents the substantial burden of hereditary angioedema (HAE) with C1 inhibitor deficiency on the quality of life and work productivity of patients. However, despite advances in the field and the availability of guidelines to advise health care providers (HCP) on the diagnosis and management of HAE, there are still many challenges to overcome. For example, delayed diagnosis and misdiagnosis are common, and treatment practices vary worldwide. Objective: An international expert panel was convened to consider opportunities for improvements that would benefit patients with HAE. Methods: Based on professional and personal experiences, the experts developed schematics to describe the journey of patients through the following stages: (1) onset of symptoms and initial evaluation; (2) referral/diagnosis; and (3) management of HAE. More importantly, the panel identified key areas in which it was possible to optimize the support provided to patients and HCPs along this journey. Results: Overall, this approach highlighted the need for wider dissemination of algorithms and scientific data to more effectively educate HCPs from multiple disciplines and the need for more research to inform appropriate treatment decisions. Furthermore, HAE awareness campaigns, accurate online information, and referral to patient advocacy groups were all considered helpful approaches to support patients. Conclusion: More detailed and widespread information on the diagnosis and management of HAE is needed and may lead to advancements in care throughout the journey of the patient with HAE. PMID:27661998

  20. Chemical approaches toward graphene-based nanomaterials and their applications in energy-related areas.

    PubMed

    Luo, Bin; Liu, Shaomin; Zhi, Linjie

    2012-03-12

    A 'gold rush' has been triggered all over the world for exploiting the possible applications of graphene-based nanomaterials. For this purpose, two important problems have to be solved; one is the preparation of graphene-based nanomaterials with well-defined structures, and the other is the controllable fabrication of these materials into functional devices. This review gives a brief overview of the recent research concerning chemical and thermal approaches toward the production of well-defined graphene-based nanomaterials and their applications in energy-related areas, including solar cells, lithium ion secondary batteries, supercapacitors, and catalysis. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Applications of TIMS data in agricultural areas and related atmospheric considerations

    NASA Technical Reports Server (NTRS)

    Pelletier, R. E.; Ochoa, M. C.

    1986-01-01

    While much of traditional remote sensing in agricultural research was limited to the visible and reflective infrared, advances in thermal infrared remote sensing technology are adding a dimension to digital image analysis of agricultural areas. The Thermal Infrared Multispectral Scanner (TIMS) an airborne sensor having six bands over the nominal 8.2 to 12.2 m range, offers the ability to calculate land surface emissivities unlike most previous singular broadband sensors. Preliminary findings on the utility of the TIMS for several agricultural applications and related atmospheric considerations are discussed.

  2. 76 FR 4868 - Availability of Seats for the Florida Keys National Marine Sanctuary Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... CONTACT: Lilli Ferguson, Florida Keys National Marine Sanctuary, 33 East Quay Rd., Key West, FL 33040... the Florida Keys National Marine Sanctuary Advisory Council AGENCY: Office of National Marine... applications for the following vacant positions on the Florida Keys National Marine Sanctuary Advisory Council...

  3. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  4. Chemical thermodynamic data. 1. The concept of links to the chemical elements and the historical development of key thermodynamic data

    NASA Astrophysics Data System (ADS)

    Wolery, Thomas J.; Jové Colón, Carlos F.

    2017-09-01

    Chemical thermodynamic data remain a keystone for geochemical modeling and reactive transport simulation as applied to an increasing number of applications in the earth sciences, as well as applications in other areas including metallurgy, material science, and industrial process design. The last century has seen the development of a large body of thermodynamic data and a number of major compilations. The past several decades have seen the development of thermodynamic databases in digital form designed to support computer calculations. However, problems with thermodynamic data appear to be persistent. One problem pertains to the use of inconsistent primary key reference data. Such data pertain to elemental reference forms and key, stoichiometrically simple chemical species including metal oxides, CO2, water, and aqueous species such as Na+ and Cl-. A consistent set of primary key data (standard Gibbs energies, standard enthalpies, and standard entropies for key chemical species) for 298.15 K and 1 bar pressure is essential. Thermochemical convention is to define the standard Gibbs energy and the standard enthalpy of an individual chemical species in terms of formation from reference forms of the constituent chemical elements. We propose a formal concept of "links" to the elemental reference forms. This concept involves a documented understanding of all reactions and calculations leading to values for a formation property (standard Gibbs energy or enthalpy). A valid link consists of two parts: (a) the path of reactions and corrections and (b) the associated data, which are key data. Such a link differs from a bare "key" or "reference" datum in that it requires additional information. Some or all of its associated data may also be key data. In evaluating a reported thermodynamic datum, one should identify the links to the chemical elements, a process which can be time-consuming and which may lead to a dead end (an incomplete link). The use of two or more inconsistent

  5. Directionally Solidified Eutectic Ceramics for Multifunctional Aerospace Applications

    DTIC Science & Technology

    2009-06-01

    Solidified Alumina - Titania Composites", Key Engineering Materials, 290 (2005) pp 199 - 202. PEER REVIEWED CONFERENCE PROCEEDINGS 22. A. Sayir, S...RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 1 Progress Report for 2006 For the Grant Directionally Solidified Eutectic Ceramics ...incorporating structural ceramics in future aerospace applications: (1) the challenges associated with ceramics are improving strength, toughness and

  6. 40 CFR Table 1 to Subpart Gggggg... - Applicability of General Provisions to Primary Zinc Production Area Sources

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Primary Zinc Production Area Sources 1 Table 1 to Subpart GGGGGG of Part 63 Protection of Environment... Pollutants for Primary Nonferrous Metals Area Sources-Zinc, Cadmium, and Beryllium Pt. 63, Subpt. GGGGGG, Table 1 Table 1 to Subpart GGGGGG of Part 63—Applicability of General Provisions to Primary Zinc...

  7. 40 CFR Table 1 to Subpart Gggggg... - Applicability of General Provisions to Primary Zinc Production Area Sources

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Primary Zinc Production Area Sources 1 Table 1 to Subpart GGGGGG of Part 63 Protection of Environment... Pollutants for Primary Nonferrous Metals Area Sources-Zinc, Cadmium, and Beryllium Pt. 63, Subpt. GGGGGG, Table 1 Table 1 to Subpart GGGGGG of Part 63—Applicability of General Provisions to Primary Zinc...

  8. Phylogenetic diversity meets conservation policy: small areas are key to preserving eucalypt lineages.

    PubMed

    Pollock, Laura J; Rosauer, Dan F; Thornhill, Andrew H; Kujala, Heini; Crisp, Michael D; Miller, Joseph T; McCarthy, Michael A

    2015-02-19

    Evolutionary and genetic knowledge is increasingly being valued in conservation theory, but is rarely considered in conservation planning and policy. Here, we integrate phylogenetic diversity (PD) with spatial reserve prioritization to evaluate how well the existing reserve system in Victoria, Australia captures the evolutionary lineages of eucalypts, which dominate forest canopies across the state. Forty-three per cent of remaining native woody vegetation in Victoria is located in protected areas (mostly national parks) representing 48% of the extant PD found in the state. A modest expansion in protected areas of 5% (less than 1% of the state area) would increase protected PD by 33% over current levels. In a recent policy change, portions of the national parks were opened for development. These tourism development zones hold over half the PD found in national parks with some species and clades falling entirely outside of protected zones within the national parks. This approach of using PD in spatial prioritization could be extended to any clade or area that has spatial and phylogenetic data. Our results demonstrate the relevance of PD to regional conservation policy by highlighting that small but strategically located areas disproportionally impact the preservation of evolutionary lineages.

  9. Time to refine key climate policy models

    NASA Astrophysics Data System (ADS)

    Barron, Alexander R.

    2018-05-01

    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  10. Comparison of gimbal approaches to decrease drag force and radar cross sectional area in missile application

    NASA Astrophysics Data System (ADS)

    Sakarya, Doǧan Uǧur

    2017-05-01

    Drag force effect is an important aspect of range performance in missile applications especially for long flight time. However, old fashioned gimbal approaches force to increase missile diameter. This increase has negative aspect of rising in both drag force and radar cross sectional area. A new gimbal approach was proposed recently. It uses a beam steering optical arrangement. Therefore, it needs less volume envelope for same field of regard and same optomechanical assembly than the old fashioned gimbal approaches. In addition to longer range performance achieved with same fuel in the new gimbal approach, this method provides smaller cross sectional area which can be more invisible in enemies' radar. In this paper, the two gimbal approaches - the old fashioned one and the new one- are compared in order to decrease drag force and radar cross sectional area in missile application. In this study; missile parameters are assumed to generate gimbal and optical design parameters. Optical design is performed according to these missile criteria. Two gimbal configurations are designed with respect to modeled missile parameters. Also analyzes are performed to show decreased drag force and radar cross sectional area in the new approach for comparison.

  11. 78 FR 5779 - Availability of Seats for the Florida Keys National Marine Sanctuary Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-28

    ... Keys National Marine Sanctuary, 33 East Quay Rd., Key West, FL 33040. Completed applications should be... Sanctuary, 33 East Quay Rd., Key West, FL 33040; (305) 809-4700 x228; [email protected] . SUPPLEMENTARY... the Florida Keys National Marine Sanctuary Advisory Council AGENCY: Office of National Marine...

  12. PEM public key certificate cache server

    NASA Astrophysics Data System (ADS)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  13. Estimating population prevalence of psychiatric conditions by small area with applications to analysing outcome and referral variations.

    PubMed

    Congdon, Peter

    2006-12-01

    This paper considers the development of estimates of mental illness prevalence for small areas and applications in explaining psychiatric outcomes and in assessing service provision. Estimates of prevalence are based on a logistic regression analysis of two national studies that provides model based estimates of relative morbidity risk by demographic, socio-economic and ethnic group for major psychiatric conditions; household/marital and area status also figure in the regression. Relative risk estimates are used, along with suitably disaggregated census populations, to make prevalence estimates for 354 English local authorities (LAs). Two applications are considered: the first involves analysis of variations in schizophrenia referrals and suicide mortality over English LAs that takes account of prevalence differences, and the second involves assessing hospital referral and bed use in relation to prevalence (for ages 16-74) for a case study area, Waltham Forest in NE London.

  14. DEVELOPMENT OF CFD SIMULATION APPLICATIONS FOR LOCAL-SCALE AREAS AND POTENTIAL INTERFACE WITH MESOSCALE MODELS

    EPA Science Inventory

    The presentation summarizes developments of ongoing applications of fine-scale (geometry specific) CFD simulations to urban areas within atmospheric boundary layers. Enabling technology today and challenges for the future are discussed. There is a challenging need to develop a ...

  15. Membrane-mirror-based autostereoscopic display for tele-operation and teleprescence applications

    NASA Astrophysics Data System (ADS)

    McKay, Stuart; Mair, Gordon M.; Mason, Steven; Revie, Kenneth

    2000-05-01

    An autostereoscopic display for telepresence and tele- operation applications has been developed at the University of Strathclyde in Glasgow, Scotland. The research is a collaborative effort between the Imaging Group and the Transparent Telepresence Research Group, both based at Strathclyde. A key component of the display is the directional screen; a 1.2-m diameter Stretchable Membrane Mirror is currently used. This patented technology enables large diameter, small f No., mirrors to be produced at a fraction of the cost of conventional optics. Another key element of the present system is an anthropomorphic and anthropometric stereo camera sensor platform. Thus, in addition to mirror development, research areas include sensor platform design focused on sight, hearing, research areas include sensor platform design focused on sight, hearing, and smell, telecommunications, display systems for all visual, aural and other senses, tele-operation, and augmented reality. The sensor platform is located at the remote site and transmits live video to the home location. Applications for this technology are as diverse as they are numerous, ranging from bomb disposal and other hazardous environment applications to tele-conferencing, sales, education and entertainment.

  16. Comparative analysis of the application of different Low Power Wide Area Network technologies in power grid

    NASA Astrophysics Data System (ADS)

    Wang, Hao; Sui, Hong; Liao, Xing; Li, Junhao

    2018-03-01

    Low Power Wide Area Network (LPWAN) technologies developed rapidly in recent years, but the application principle of different LPWAN technologies in power grid is still not clear. This paper gives a comparative analysis of two mainstream LPWAN technologies including NB-IoT and LoRa, and gives an application suggestion of these two LPWAN technologies, which can guide the planning and construction of LPWAN in power grid.

  17. The market value of cultural heritage in urban areas: an application of spatial hedonic pricing

    NASA Astrophysics Data System (ADS)

    Lazrak, Faroek; Nijkamp, Peter; Rietveld, Piet; Rouwendal, Jan

    2014-01-01

    The current literature often values intangible goods like cultural heritage by applying stated preference methods. In recent years, however, the increasing availability of large databases on real estate transactions and listed prices has opened up new research possibilities and has reduced various existing barriers to applications of conventional (spatial) hedonic analysis to the real estate market. The present paper provides one of the first applications using a spatial autoregressive model to investigate the impact of cultural heritage—in particular, listed buildings and historic-cultural sites (or historic landmarks)—on the value of real estate in cities. In addition, this paper suggests a novel way of specifying the spatial weight matrix—only prices of sold houses influence current price—in identifying the spatial dependency effects between sold properties. The empirical application in the present study concerns the Dutch urban area of Zaanstad, a historic area for which over a long period of more than 20 years detailed information on individual dwellings, and their market prices are available in a GIS context. In this paper, the effect of cultural heritage is analysed in three complementary ways. First, we measure the effect of a listed building on its market price in the relevant area concerned. Secondly, we investigate the value that listed heritage has on nearby property. And finally, we estimate the effect of historic-cultural sites on real estate prices. We find that, to purchase a listed building, buyers are willing to pay an additional 26.9 %, while surrounding houses are worth an extra 0.28 % for each additional listed building within a 50-m radius. Houses sold within a conservation area appear to gain a premium of 26.4 % which confirms the existence of a `historic ensemble' effect.

  18. Internet-based wide area measurement applications in deregulated power systems

    NASA Astrophysics Data System (ADS)

    Khatib, Abdel-Rahman Amin

    Since the deregulation of power systems was started in 1989 in the UK, many countries have been motivated to undergo deregulation. The United State started deregulation in the energy sector in California back in 1996. Since that time many other states have also started the deregulation procedures in different utilities. Most of the deregulation market in the United States now is in the wholesale market area, however, the retail market is still undergoing changes. Deregulation has many impacts on power system network operation and control. The number of power transactions among the utilities has increased and many Independent Power Producers (IPPs) now have a rich market for competition especially in the green power market. The Federal Energy Regulatory Commission (FERC) called upon utilities to develop the Regional Transmission Organization (RTO). The RTO is a step toward the national transmission grid. RTO is an independent entity that will operate the transmission system in a large region. The main goal of forming RTOs is to increase the operation efficiency of the power network under the impact of the deregulated market. The objective of this work is to study Internet based Wide Area Information Sharing (WAIS) applications in the deregulated power system. The study is the first step toward building a national transmission grid picture using information sharing among utilities. Two main topics are covered as applications for the WAIS in the deregulated power system, state estimation and Total Transfer Capability (TTC) calculations. As a first step for building this national transmission grid picture, WAIS and the level of information sharing of the state estimation calculations have been discussed. WAIS impacts to the TTC calculations are also covered. A new technique to update the TTC using on line measurements based on WAIS created by sharing state estimation is presented.

  19. High-efficiency reconciliation for continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, Zengliang; Yang, Shenshen; Li, Yongmin

    2017-04-01

    Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.

  20. Phylogenetic patterns and correlation of key structures for jumping: bone crests and cross-sectional areas of muscles in Leptodactylus (Anura, Leptodactylidae).

    PubMed

    Ponssa, María Laura; Fratani, Jéssica; Abdala, Virginia

    2018-05-01

    Anurans are characterized by their saltatory mode of locomotion, which is associated with a specific morphology. The coordinated action of the muscles and bones of the pelvic girdle is key to the transmission of the force of the hindlimbs to the axial skeleton during jumping. Two features are critical for optimal locomotory performance: the cross-sectional area of muscle and the bone crest attachment sites. The first character is a proxy of the force exerted by the muscle, whereas the crests are muscle attachments sites related to muscle force. The provisory relationship between these features has previously been identified and bone crest size can be used to infer the magnitude and, therefore, muscle force in fossils records. In this work, we explore the correlation between the cross-sectional area of essential muscles to the jumping mechanism (longissimus dorsi, extensor iliotibialis B, tenuissimus, puboischiofemoralis internus B, coccygeo-sacralis and coccygeo-iliacus) and the bone crests where these muscles are inserted (dorsal tubercle, dorsal crest and urostylar crest) in species of the genus Leptodactylus. This genus, along with other leptodactylids, exhibits a diversity of locomotor modes, including jumping, hopping, swimming and burrowing. We therefore analyzed the morphometric variation in the two features, cross-sectional area and bone crest area, expecting a correlation with different locomotor types. Our results showed: (i) a correlation between the urostylar crest and the cross-sectional area of the related muscles; (ii) that the bone crest surface area of urostyle and ilium and the cross-sectional area of the corresponding muscles can be utilized to infer locomotor faculties in leptodactylid frogs; and (iii) that the evolution of both characters demonstrates a general tendency from lower values in leptodactylid ancestors to higher values in the Leptodactylus genus. The results attest to the importance of the comparison of current ecological and

  1. Evaluation of Data Applicability for D-Insar in Areas Covered by Abundant Vegetation

    NASA Astrophysics Data System (ADS)

    Zhang, P.; Zhao, Z.

    2018-04-01

    In the past few years, the frequent geological disasters have caused enormous casualties and economic losses. Therefore, D-InSAR (differential interferometry synthetic aperture radar) has been widely used in early-warning and post disaster assessment. However, large area of decorrelation often occurs in the areas covered with abundant vegetation, which seriously affects the accuracy of surface deformation monitoring. In this paper, we analysed the effect of sensor parameters and external environment parameters on special decorrelation. Then Synthetic Aperture Radar (SAR) datasets acquired by X-band TerraSAR-X, Phased Array type L-band Synthetic Aperture Satellite-2 (ALOS-2), and C-band Sentinel-1 in Guizhou province were collected and analysed to generate the maps of coherence, which were used to evaluating the applicability of datasets of different wavelengths for D-InSAR in forest area. Finally, we found that datasets acquired by ALOS-2 had the best monitoring effect.

  2. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  3. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  4. On Using a Mobile Application to Support Teledermatology: A Case Study in an Underprivileged Area in Colombia

    PubMed Central

    Novoa, Mónica Paola; Eapen, Bell Raj

    2018-01-01

    Background The use of mobile applications in dermatology to support remote diagnosis is gaining acceptance, particularly in rural areas, where dermatology services are commonly managed by healthcare personnel with no specialty training. Moreover, ontologies—sets of concepts that represent knowledge in a given domain—are increasingly being used to support medical diagnosis. A specific case is ONTODerm: an ontology to aid dermatological diagnosis. However, there is little information on the combined use of mobile applications and ontologies as support solutions in dermatology. Objective Assessing the reliability of ONTODerm as a tool to support remote dermatological diagnosis when used together with a mobile dermatological application in underprivileged areas. Methods A mobile application that allows characterization of skin lesions was developed, and the information about the lesions was sent to ONTODerm. An exploratory study was conducted in a remote area without access to a dermatologist. A total of 64 dermatological queries were recorded in the application and consulted with ONTODerm. Later, an experienced dermatologist evaluated the characterization and diagnosis of each query to determine the accuracy of the system. Results The results showed that the probability of obtaining a correct diagnosis was between 64.4% and 85.6% with a confidence interval of 95%. A higher accuracy rate was obtained when the skin lesion occurred on the face or when its border was categorized as poorly demarcated. Conclusions This study demonstrates the implementation of a teledermatology strategy based on mobile applications and domain ontology-driven knowledge base to provide timely assistance to healthcare professionals. This approach was found to be pertinent in the Colombian rural context, particularly in forest regions, where dermatology specialists are not available. The results of this article do not represent a final validation of the proposed approach; they suggest how

  5. On Using a Mobile Application to Support Teledermatology: A Case Study in an Underprivileged Area in Colombia.

    PubMed

    Sáenz, Juan Pablo; Novoa, Mónica Paola; Correal, Darío; Eapen, Bell Raj

    2018-01-01

    The use of mobile applications in dermatology to support remote diagnosis is gaining acceptance, particularly in rural areas, where dermatology services are commonly managed by healthcare personnel with no specialty training. Moreover, ontologies-sets of concepts that represent knowledge in a given domain-are increasingly being used to support medical diagnosis. A specific case is ONTODerm: an ontology to aid dermatological diagnosis. However, there is little information on the combined use of mobile applications and ontologies as support solutions in dermatology. Assessing the reliability of ONTODerm as a tool to support remote dermatological diagnosis when used together with a mobile dermatological application in underprivileged areas. A mobile application that allows characterization of skin lesions was developed, and the information about the lesions was sent to ONTODerm. An exploratory study was conducted in a remote area without access to a dermatologist. A total of 64 dermatological queries were recorded in the application and consulted with ONTODerm. Later, an experienced dermatologist evaluated the characterization and diagnosis of each query to determine the accuracy of the system. The results showed that the probability of obtaining a correct diagnosis was between 64.4% and 85.6% with a confidence interval of 95%. A higher accuracy rate was obtained when the skin lesion occurred on the face or when its border was categorized as poorly demarcated. This study demonstrates the implementation of a teledermatology strategy based on mobile applications and domain ontology-driven knowledge base to provide timely assistance to healthcare professionals. This approach was found to be pertinent in the Colombian rural context, particularly in forest regions, where dermatology specialists are not available. The results of this article do not represent a final validation of the proposed approach; they suggest how the ontology can be improved to effectively support

  6. Space Station: Key to the Future.

    ERIC Educational Resources Information Center

    National Aeronautics and Space Administration, Washington, DC.

    The possible applications, advantages and features of an advanced space station to be developed are considered in a non-technical manner in this booklet. Some of the areas of application considered include the following: the detection of large scale dynamic earth processes such as changes in snow pack, crops, and air pollution levels; the…

  7. Area-Wide Ground Applications of Bacillus thuringiensis var. israelensis for the Control of Aedes albopictus in Residential Neighborhoods: From Optimization to Operation

    PubMed Central

    Williams, Gregory M.; Faraji, Ary; Unlu, Isik; Healy, Sean P.; Farooq, Muhammad; Gaugler, Randy; Hamilton, George; Fonseca, Dina M.

    2014-01-01

    The increasing range of Aedes albopictus, the Asian tiger mosquito, in the USA and the threat of chikungunya and dengue outbreaks vectored by this species have necessitated novel approaches to control this peridomestic mosquito. Conventional methods such as adulticiding provide temporary relief, but fail to manage this pest on a sustained basis. We explored the use of cold aerosol foggers and misting machines for area-wide applications of Bacillus thuringiensis var. israelensis (VectoBac WDG) as a larvicide targeting Aedes albopictus. During 2010–2013 we performed initially open field trials and then 19 operational area-wide applications in urban and suburban residential areas in northeastern USA to test three truck-mounted sprayers at two application rates. Area-wide applications of WDG in open field conditions at 400 and 800 g/ha killed on average 87% of tested larvae. Once techniques were optimized in residential areas, applications with a Buffalo Turbine Mist Sprayer at a rate of 800 g/ha, the best combination, consistently provided over 90% mortality. Importantly, there was no significant decrease in efficacy with distance from the spray line even in blocks of row homes with trees and bushes in the backyards. Under laboratory conditions Bti deposition in bioassay cups during the operational trials resulted in over 6 weeks of residual control. Our results demonstrate that area-wide truck mounted applications of WDG can effectively suppress Ae. albopictus larvae and should be used in integrated mosquito management approaches to control this nuisance pest and disease vector. PMID:25329314

  8. Area-wide ground applications of Bacillus thuringiensis var. israelensis for the control of Aedes albopictus in residential neighborhoods: from optimization to operation.

    PubMed

    Williams, Gregory M; Faraji, Ary; Unlu, Isik; Healy, Sean P; Farooq, Muhammad; Gaugler, Randy; Hamilton, George; Fonseca, Dina M

    2014-01-01

    The increasing range of Aedes albopictus, the Asian tiger mosquito, in the USA and the threat of chikungunya and dengue outbreaks vectored by this species have necessitated novel approaches to control this peridomestic mosquito. Conventional methods such as adulticiding provide temporary relief, but fail to manage this pest on a sustained basis. We explored the use of cold aerosol foggers and misting machines for area-wide applications of Bacillus thuringiensis var. israelensis (VectoBac WDG) as a larvicide targeting Aedes albopictus. During 2010-2013 we performed initially open field trials and then 19 operational area-wide applications in urban and suburban residential areas in northeastern USA to test three truck-mounted sprayers at two application rates. Area-wide applications of WDG in open field conditions at 400 and 800 g/ha killed on average 87% of tested larvae. Once techniques were optimized in residential areas, applications with a Buffalo Turbine Mist Sprayer at a rate of 800 g/ha, the best combination, consistently provided over 90% mortality. Importantly, there was no significant decrease in efficacy with distance from the spray line even in blocks of row homes with trees and bushes in the backyards. Under laboratory conditions Bti deposition in bioassay cups during the operational trials resulted in over 6 weeks of residual control. Our results demonstrate that area-wide truck mounted applications of WDG can effectively suppress Ae. albopictus larvae and should be used in integrated mosquito management approaches to control this nuisance pest and disease vector.

  9. A spatially explicit metapopulation model and cattle trade analysis suggests key determinants for the recurrent circulation of rift valley Fever virus in a pilot area of madagascar highlands.

    PubMed

    Nicolas, Gaëlle; Chevalier, Véronique; Tantely, Luciano Michaël; Fontenille, Didier; Durand, Benoît

    2014-12-01

    Rift Valley fever (RVF) is a vector-borne zoonotic disease that causes high morbidity and mortality in ruminants. In 2008-2009, a RVF outbreak affected the whole Madagascar island, including the Anjozorobe district located in Madagascar highlands. An entomological survey showed the absence of Aedes among the potential RVF virus (RVFV) vector species identified in this area, and an overall low abundance of mosquitoes due to unfavorable climatic conditions during winter. No serological nor virological sign of infection was observed in wild terrestrial mammals of the area, suggesting an absence of wild RVF virus (RVFV) reservoir. However, a three years serological and virological follow-up in cattle showed a recurrent RVFV circulation. The objective of this study was to understand the key determinants of this unexpected recurrent transmission. To achieve this goal, a spatial deterministic discrete-time metapopulation model combined with cattle trade network was designed and parameterized to reproduce the local conditions using observational data collected in the area. Three scenarios that could explain the RVFV recurrent circulation in the area were analyzed: (i) RVFV overwintering thanks to a direct transmission between cattle when viraemic cows calve, vectors being absent during the winter, (ii) a low level vector-based circulation during winter thanks to a residual vector population, without direct transmission between cattle, (iii) combination of both above mentioned mechanisms. Multi-model inference methods resulted in a model incorporating both a low level RVFV winter vector-borne transmission and a direct transmission between animals when viraemic cows calve. Predictions satisfactorily reproduced field observations, 84% of cattle infections being attributed to vector-borne transmission, and 16% to direct transmission. These results appeared robust according to the sensitivity analysis. Interweaving between agricultural works in rice fields, seasonality of

  10. Low-energy transmission electron diffraction and imaging of large-area graphene

    PubMed Central

    Zhao, Wei; Xia, Bingyu; Lin, Li; Xiao, Xiaoyang; Liu, Peng; Lin, Xiaoyang; Peng, Hailin; Zhu, Yuanmin; Yu, Rong; Lei, Peng; Wang, Jiangtao; Zhang, Lina; Xu, Yong; Zhao, Mingwen; Peng, Lianmao; Li, Qunqing; Duan, Wenhui; Liu, Zhongfan; Fan, Shoushan; Jiang, Kaili

    2017-01-01

    Two-dimensional (2D) materials have attracted interest because of their excellent properties and potential applications. A key step in realizing industrial applications is to synthesize wafer-scale single-crystal samples. Until now, single-crystal samples, such as graphene domains up to the centimeter scale, have been synthesized. However, a new challenge is to efficiently characterize large-area samples. Currently, the crystalline characterization of these samples still relies on selected-area electron diffraction (SAED) or low-energy electron diffraction (LEED), which is more suitable for characterizing very small local regions. This paper presents a highly efficient characterization technique that adopts a low-energy electrostatically focused electron gun and a super-aligned carbon nanotube (SACNT) film sample support. It allows rapid crystalline characterization of large-area graphene through a single photograph of a transmission-diffracted image at a large beam size. Additionally, the low-energy electron beam enables the observation of a unique diffraction pattern of adsorbates on the suspended graphene at room temperature. This work presents a simple and convenient method for characterizing the macroscopic structures of 2D materials, and the instrument we constructed allows the study of the weak interaction with 2D materials. PMID:28879233

  11. Low-energy transmission electron diffraction and imaging of large-area graphene.

    PubMed

    Zhao, Wei; Xia, Bingyu; Lin, Li; Xiao, Xiaoyang; Liu, Peng; Lin, Xiaoyang; Peng, Hailin; Zhu, Yuanmin; Yu, Rong; Lei, Peng; Wang, Jiangtao; Zhang, Lina; Xu, Yong; Zhao, Mingwen; Peng, Lianmao; Li, Qunqing; Duan, Wenhui; Liu, Zhongfan; Fan, Shoushan; Jiang, Kaili

    2017-09-01

    Two-dimensional (2D) materials have attracted interest because of their excellent properties and potential applications. A key step in realizing industrial applications is to synthesize wafer-scale single-crystal samples. Until now, single-crystal samples, such as graphene domains up to the centimeter scale, have been synthesized. However, a new challenge is to efficiently characterize large-area samples. Currently, the crystalline characterization of these samples still relies on selected-area electron diffraction (SAED) or low-energy electron diffraction (LEED), which is more suitable for characterizing very small local regions. This paper presents a highly efficient characterization technique that adopts a low-energy electrostatically focused electron gun and a super-aligned carbon nanotube (SACNT) film sample support. It allows rapid crystalline characterization of large-area graphene through a single photograph of a transmission-diffracted image at a large beam size. Additionally, the low-energy electron beam enables the observation of a unique diffraction pattern of adsorbates on the suspended graphene at room temperature. This work presents a simple and convenient method for characterizing the macroscopic structures of 2D materials, and the instrument we constructed allows the study of the weak interaction with 2D materials.

  12. The High/Scope Preschool Key Experiences: Essential Elements of Young Children's Learning.

    ERIC Educational Resources Information Center

    Hohmann, Mary

    2002-01-01

    Discusses High/Scope's preschool key experiences (a set of 58 statements that describe young children's social, cognitive, and physical development). The key experiences are grouped into 10 major developmental areas (creative representation, language and literacy, social relations, movement, music, classification, seriation, number, space, and…

  13. Application of Remote Sensors in Mapping Rice Area and Forecasting Its Production: A Review

    PubMed Central

    Mosleh, Mostafa K.; Hassan, Quazi K.; Chowdhury, Ehsan H.

    2015-01-01

    Rice is one of the staple foods for more than three billion people worldwide. Rice paddies accounted for approximately 11.5% of the World's arable land area during 2012. Rice provided ∼19% of the global dietary energy in recent times and its annual average consumption per capita was ∼65 kg during 2010–2011. Therefore, rice area mapping and forecasting its production is important for food security, where demands often exceed production due to an ever increasing population. Timely and accurate estimation of rice areas and forecasting its production can provide invaluable information for governments, planners, and decision makers in formulating policies in regard to import/export in the event of shortfall and/or surplus. The aim of this paper was to review the applicability of the remote sensing-based imagery for rice area mapping and forecasting its production. Recent advances on the resolutions (i.e., spectral, spatial, radiometric, and temporal) and availability of remote sensing imagery have allowed us timely collection of information on the growth and development stages of the rice crop. For elaborative understanding of the application of remote sensing sensors, following issues were described: the rice area mapping and forecasting its production using optical and microwave imagery, synergy between remote sensing-based methods and other developments, and their implications as an operational one. The overview of the studies to date indicated that remote sensing-based methods using optical and microwave imagery found to be encouraging. However, there were having some limitations, such as: (i) optical remote sensing imagery had relatively low spatial resolution led to inaccurate estimation of rice areas; and (ii) radar imagery would suffer from speckles, which potentially would degrade the quality of the images; and also the brightness of the backscatters were sensitive to the interacting surface. In addition, most of the methods used in forecasting rice yield

  14. Application of remote sensors in mapping rice area and forecasting its production: a review.

    PubMed

    Mosleh, Mostafa K; Hassan, Quazi K; Chowdhury, Ehsan H

    2015-01-05

    Rice is one of the staple foods for more than three billion people worldwide. Rice paddies accounted for approximately 11.5% of the World's arable land area during 2012. Rice provided ~19% of the global dietary energy in recent times and its annual average consumption per capita was ~65 kg during 2010-2011. Therefore, rice area mapping and forecasting its production is important for food security, where demands often exceed production due to an ever increasing population. Timely and accurate estimation of rice areas and forecasting its production can provide invaluable information for governments, planners, and decision makers in formulating policies in regard to import/export in the event of shortfall and/or surplus. The aim of this paper was to review the applicability of the remote sensing-based imagery for rice area mapping and forecasting its production. Recent advances on the resolutions (i.e., spectral, spatial, radiometric, and temporal) and availability of remote sensing imagery have allowed us timely collection of information on the growth and development stages of the rice crop. For elaborative understanding of the application of remote sensing sensors, following issues were described: the rice area mapping and forecasting its production using optical and microwave imagery, synergy between remote sensing-based methods and other developments, and their implications as an operational one. The overview of the studies to date indicated that remote sensing-based methods using optical and microwave imagery found to be encouraging. However, there were having some limitations, such as: (i) optical remote sensing imagery had relatively low spatial resolution led to inaccurate estimation of rice areas; and (ii) radar imagery would suffer from speckles, which potentially would degrade the quality of the images; and also the brightness of the backscatters were sensitive to the interacting surface. In addition, most of the methods used in forecasting rice yield were

  15. [Effects of biochar application on the abundance and structure of ammonia-oxidizer communities in coal-mining area.

    PubMed

    Liu, Yuan; Zhu, Ji Rong; Wu, Yu Chen; Shu, Liang Zuo

    2017-10-01

    As a new type of soil amendment, biochar can effectively improve soil fertility, structure and soil nitrogen transformation. We studied the effects of biochar application on soil properties, abundance and community structure of ammonia oxidizer in coal-mining area. The results showed that the biochar application significantly increased contents of soil NH4+-N, total nitrogen, available phosphorus and potassium. Compared with the control, no change in the abundance of ammonia-oxidizing archaea (AOA) was found under biochar treatment, but there was a significant increase in the abundance of ammonia-oxidizing bacteria (AOB). The analysis of T-RFLP profiles showed that biochar significantly increased the diversity indexes of AOA and AOB, and altered the community structure of both AOA and AOB. Improved soil nutrients as well as increased abundance and diversity of ammonia-oxidizing community to some extent indicated the potential of biochar application in reclamation of coal-mining area soil.

  16. NAVIS-An UGV Indoor Positioning System Using Laser Scan Matching for Large-Area Real-Time Applications

    PubMed Central

    Tang, Jian.; Chen, Yuwei.; Jaakkola, Anttoni.; Liu, Jinbing.; Hyyppä, Juha.; Hyyppä, Hannu.

    2014-01-01

    Laser scan matching with grid-based maps is a promising tool for real-time indoor positioning of mobile Unmanned Ground Vehicles (UGVs). While there are critical implementation problems, such as the ability to estimate the position by sensing the unknown indoor environment with sufficient accuracy and low enough latency for stable vehicle control, further development work is necessary. Unfortunately, most of the existing methods employ heuristics for quick positioning in which numerous accumulated errors easily lead to loss of positioning accuracy. This severely restricts its applications in large areas and over lengthy periods of time. This paper introduces an efficient real-time mobile UGV indoor positioning system for large-area applications using laser scan matching with an improved probabilistically-motivated Maximum Likelihood Estimation (IMLE) algorithm, which is based on a multi-resolution patch-divided grid likelihood map. Compared with traditional methods, the improvements embodied in IMLE include: (a) Iterative Closed Point (ICP) preprocessing, which adaptively decreases the search scope; (b) a totally brute search matching method on multi-resolution map layers, based on the likelihood value between current laser scan and the grid map within refined search scope, adopted to obtain the global optimum position at each scan matching; and (c) a patch-divided likelihood map supporting a large indoor area. A UGV platform called NAVIS was designed, manufactured, and tested based on a low-cost robot integrating a LiDAR and an odometer sensor to verify the IMLE algorithm. A series of experiments based on simulated data and field tests with NAVIS proved that the proposed IMEL algorithm is a better way to perform local scan matching that can offer a quick and stable positioning solution with high accuracy so it can be part of a large area localization/mapping, application. The NAVIS platform can reach an updating rate of 12 Hz in a feature-rich environment and 2 Hz

  17. NAVIS-An UGV indoor positioning system using laser scan matching for large-area real-time applications.

    PubMed

    Tang, Jian; Chen, Yuwei; Jaakkola, Anttoni; Liu, Jinbing; Hyyppä, Juha; Hyyppä, Hannu

    2014-07-04

    Laser scan matching with grid-based maps is a promising tool for real-time indoor positioning of mobile Unmanned Ground Vehicles (UGVs). While there are critical implementation problems, such as the ability to estimate the position by sensing the unknown indoor environment with sufficient accuracy and low enough latency for stable vehicle control, further development work is necessary. Unfortunately, most of the existing methods employ heuristics for quick positioning in which numerous accumulated errors easily lead to loss of positioning accuracy. This severely restricts its applications in large areas and over lengthy periods of time. This paper introduces an efficient real-time mobile UGV indoor positioning system for large-area applications using laser scan matching with an improved probabilistically-motivated Maximum Likelihood Estimation (IMLE) algorithm, which is based on a multi-resolution patch-divided grid likelihood map. Compared with traditional methods, the improvements embodied in IMLE include: (a) Iterative Closed Point (ICP) preprocessing, which adaptively decreases the search scope; (b) a totally brute search matching method on multi-resolution map layers, based on the likelihood value between current laser scan and the grid map within refined search scope, adopted to obtain the global optimum position at each scan matching; and (c) a patch-divided likelihood map supporting a large indoor area. A UGV platform called NAVIS was designed, manufactured, and tested based on a low-cost robot integrating a LiDAR and an odometer sensor to verify the IMLE algorithm. A series of experiments based on simulated data and field tests with NAVIS proved that the proposed IMEL algorithm is a better way to perform local scan matching that can offer a quick and stable positioning solution with high accuracy so it can be part of a large area localization/mapping, application. The NAVIS platform can reach an updating rate of 12 Hz in a feature-rich environment and 2 Hz

  18. Ecological thresholds: The key to successful enviromental management or an important concept with no practical application?

    USGS Publications Warehouse

    Groffman, P.M.; Baron, Jill S.; Blett, T.; Gold, A.J.; Goodman, I.; Gunderson, L.H.; Levinson, B.M.; Palmer, Margaret A.; Paerl, H.W.; Peterson, G.D.; Poff, N.L.; Rejeski, D.W.; Reynolds, J.F.; Turner, M.G.; Weathers, K.C.; Wiens, J.

    2006-01-01

    An ecological threshold is the point at which there is an abrupt change in an ecosystem quality, property or phenomenon, or where small changes in an environmental driver produce large responses in the ecosystem. Analysis of thresholds is complicated by nonlinear dynamics and by multiple factor controls that operate at diverse spatial and temporal scales. These complexities have challenged the use and utility of threshold concepts in environmental management despite great concern about preventing dramatic state changes in valued ecosystems, the need for determining critical pollutant loads and the ubiquity of other threshold-based environmental problems. In this paper we define the scope of the thresholds concept in ecological science and discuss methods for identifying and investigating thresholds using a variety of examples from terrestrial and aquatic environments, at ecosystem, landscape and regional scales. We end with a discussion of key research needs in this area.

  19. Prediction of bead area contact load at the tire-wheel interface using NASTRAN

    NASA Technical Reports Server (NTRS)

    Chen, C. H. S.

    1982-01-01

    The theoretical prediction of the bead area contact load at the tire wheel interface using NASTRAN is reported. The application of the linear code to a basically nonlinear problem results in excessive deformation of the structure and the tire-wheel contact conditions become impossible to achieve. A psuedo-nonlinear approach was adopted in which the moduli of the cord reinforced composite are increased so that the computed key deformations matched that of the experiment. Numerical results presented are discussed.

  20. Key drivers of airline loyalty.

    PubMed

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  1. Key drivers of airline loyalty

    PubMed Central

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  2. Reconfigurable antenna options for 2.45/5 GHz wireless body area networks in healthcare applications.

    PubMed

    Abbas, Syed Muzahir; Ranga, Yogesh; Esselle, Karu P

    2015-01-01

    This paper presents electronically reconfigurable antenna options in healthcare applications. They are suitable for wireless body area network devices operating in the industrial, scientific, and medical (ISM) band at 2.45 GHz and IEEE 802.11 Wireless Local Area Network (WLAN) band at 5 GHz (5.15-5.35 GHz, 5.25-5.35 GHz). Two types of antennas are investigated: Antenna-I has a full ground plane and Antenna-II has a partial ground plane. The proposed antennas provide ISM operation in one mode while in another mode they support 5 GHz WLAN band. Their performance is assessed for body centric wireless communication using a simplified human body model. Antenna sensitivity to the gap between the antenna and the human body is investigated for both modes of each antenna. The proposed antennas exhibit a wide radiation pattern along the body surface to provide wide coverage and their small width (14 mm) makes them suitable for on-body communication in healthcare applications.

  3. 18. Interior view, 'Inside Key Route Inspection Bldg.', view to ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. Interior view, 'Inside Key Route Inspection Bldg.', view to east, August 16, 1939. Note inspection pits and work areas beneath tracks. The Key Route and Interurban Electric Railway Bridge Yard Shop buildings were identical, and this view provides an in-service look at the well-lit interior. While Key Route articulated cars were quite different in design from the Interurban Electric Railway cars, the maintenance requirements were quite similar. The Key Route Bridge Yard Shop building was demolished in the 1970s. Its last use was storage of much of the historic railway equipment now on display at the California State Railroad Museum in Sacramento. - Interurban Electric Railway Bridge Yard Shop, Interstate 80 at Alameda County Postmile 2.0, Oakland, Alameda County, CA

  4. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  5. Key Questions for Reviewing Virtual Charter School Proposals

    ERIC Educational Resources Information Center

    National Association of Charter School Authorizers (NJ1), 2011

    2011-01-01

    This document contains key questions to consider when evaluating virtual charter school proposals.The insert is designed to help authorizers evaluate school quality and capacity in light of the distinctive attributes of virtual schooling. These questions address major functional areas as well essential questions that authorizers should ask of…

  6. Key Problems in Science and Technology in Thailand.

    ERIC Educational Resources Information Center

    Yuthavong, Yongyuth; And Others

    1985-01-01

    Cites the need for promoting science/technology management and policy formation in Thailand, viewing contributions of science/technology to the socioeconomic development of the country as high priorities. Criteria for selecting priority areas and key problems are noted; they include relevance to development, availability of human resources, and…

  7. Catchment Area Treatment (CAT) Plan and Crop Area Optimization for Integrated Management in a Water Resource Project

    NASA Astrophysics Data System (ADS)

    Jaiswal, R. K.; Thomas, T.; Galkate, R. V.; Ghosh, N. C.; Singh, S.

    2013-09-01

    A scientifically developed catchment area treatment (CAT) plan and optimized pattern of crop areas may be the key for sustainable development of water resource, profitability in agriculture and improvement of overall economy in drought affected Bundelkhand region of Madhya Pradesh (India). In this study, an attempt has been made to develop a CAT plan using spatial variation of geology, geomorphology, soil, drainage, land use in geographical information system for selection of soil and water conservation measures and crop area optimization using linear programming for maximization of return considering water availability, area affinity, fertilizers, social and market constraints in Benisagar reservoir project of Chhatarpur district (M.P.). The scientifically developed CAT plan based on overlaying of spatial information consists of 58 mechanical measure (49 boulder bunds, 1 check dam, 7 cully plug and 1 percolation tank), 2.60 km2 land for agro forestry, 2.08 km2 land for afforestation in Benisagar dam and 67 mechanical measures (45 boulder bunds and 22 gully plugs), 7.79 km2 land for agro forestry, 5.24 km2 land for afforestation in Beniganj weir catchment with various agronomic measures for agriculture areas. The linear programming has been used for optimization of crop areas in Benisagar command for sustainable development considering various scenarios of water availability, efficiencies, affinity and fertilizers availability in the command. Considering present supply condition of water, fertilizers, area affinity and making command self sufficient in most of crops, the net benefit can be increase to Rs. 1.93 crores from 41.70 km2 irrigable area in Benisagar command by optimizing cropping pattern and reducing losses during conveyance and application of water.

  8. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  9. An overview of artificial intelligence and robotics. Volume 1: Artificial intelligence. Part B: Applications

    NASA Technical Reports Server (NTRS)

    Gevarter, W. B.

    1983-01-01

    Artificial Intelligence (AI) is an emerging technology that has recently attracted considerable attention. Many applications are now under development. This report, Part B of a three part report on AI, presents overviews of the key application areas: Expert Systems, Computer Vision, Natural Language Processing, Speech Interfaces, and Problem Solving and Planning. The basic approaches to such systems, the state-of-the-art, existing systems and future trends and expectations are covered.

  10. Non-Logical Discourse: Key to the Composing Process?

    ERIC Educational Resources Information Center

    Poulsen, Richard C.

    One niche in which scholars have not looked for keys to the composing process is the sometimes illusory but vital area of nonlogical discourse, which includes fantasy, hallucination, dream, reverie, vision, trance, and meditation. Abundant evidence exists about the genesis, importance, and use of nonlogical discourse, but this evidence comes…

  11. The design and application of large area intensive lens array focal spots measurement system

    NASA Astrophysics Data System (ADS)

    Chen, Bingzhen; Yao, Shun; Yang, Guanghui; Dai, Mingchong; Wang, Zhiyong

    2014-12-01

    Concentrating Photovoltaic (CPV) modules are getting thinner and using smaller cells now days. Correspondingly, large area intensive lens arrays with smaller unit dimension and shorter focal length are wanted. However, the size and power center of lens array focal spots usually differ from the design value and are hard to measure, especially under large area situation. It is because the machining error and deformation of material of the lens array are hard to simulate in the optical design process. Thus the alignment error between solar cells and focal spots in the module assembly process will be hard to control. Under this kind of situation, the efficiency of CPV module with thinner body and smaller cells is much lower than expected. In this paper, a design of large area lens array focal spots automatic measurement system is presented, as well as its prototype application results. In this system, a four-channel parallel light path and its corresponding image capture and process modules are designed. These modules can simulate focal spots under sunlight and have the spots image captured and processed using charge coupled devices and certain gray level algorithm. Thus the important information of focal spots such as spot size and location will be exported. Motion control module based on grating scale signal and interval measurement method are also employed in this system in order to get test results with high speed and high precision on large area lens array no less than 1m×0.8m. The repeatability of the system prototype measurement is +/-10μm with a velocity of 90 spot/min. Compared to the original module assembled using coordinates from optical design, modules assembled using data exported from the prototype is 18% higher in output power, reaching a conversion efficiency of over 31%. This system and its design can be used in the focal spot measurement of planoconvex lens array and Fresnel lens array, as well as other kinds of large area lens array application

  12. 13 CFR 120.839 - Case-by-case application to make a 504 loan outside of a CDC's Area of Operations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 504 loan outside of a CDC's Area of Operations. 120.839 Section 120.839 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.839 Case-by-case application to make a 504 loan outside of a CDC's Area of...

  13. 13 CFR 120.839 - Case-by-case application to make a 504 loan outside of a CDC's Area of Operations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 504 loan outside of a CDC's Area of Operations. 120.839 Section 120.839 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.839 Case-by-case application to make a 504 loan outside of a CDC's Area of...

  14. 13 CFR 120.839 - Case-by-case application to make a 504 loan outside of a CDC's Area of Operations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 504 loan outside of a CDC's Area of Operations. 120.839 Section 120.839 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.839 Case-by-case application to make a 504 loan outside of a CDC's Area of...

  15. 13 CFR 120.839 - Case-by-case application to make a 504 loan outside of a CDC's Area of Operations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 504 loan outside of a CDC's Area of Operations. 120.839 Section 120.839 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.839 Case-by-case application to make a 504 loan outside of a CDC's Area of...

  16. 13 CFR 120.839 - Case-by-case application to make a 504 loan outside of a CDC's Area of Operations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 504 loan outside of a CDC's Area of Operations. 120.839 Section 120.839 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Development Company Loan Program (504) Extending A Cdc's Area of Operations § 120.839 Case-by-case application to make a 504 loan outside of a CDC's Area of...

  17. Recurrent seascape units identify key ecological processes along the western Antarctic Peninsula.

    PubMed

    Bowman, Jeff S; Kavanaugh, Maria T; Doney, Scott C; Ducklow, Hugh W

    2018-04-10

    The western Antarctic Peninsula (WAP) is a bellwether of global climate change and natural laboratory for identifying interactions between climate and ecosystems. The Palmer Long-Term Ecological Research (LTER) project has collected data on key ecological and environmental processes along the WAP since 1993. To better understand how key ecological parameters are changing across space and time, we developed a novel seascape classification approach based on in situ temperature, salinity, chlorophyll a, nitrate + nitrite, phosphate, and silicate. We anticipate that this approach will be broadly applicable to other geographical areas. Through the application of self-organizing maps (SOMs), we identified eight recurrent seascape units (SUs) in these data. These SUs have strong fidelity to known regional water masses but with an additional layer of biogeochemical detail, allowing us to identify multiple distinct nutrient profiles in several water masses. To identify the temporal and spatial distribution of these SUs, we mapped them across the Palmer LTER sampling grid via objective mapping of the original parameters. Analysis of the abundance and distribution of SUs since 1993 suggests two year types characterized by the partitioning of chlorophyll a into SUs with different spatial characteristics. By developing generalized linear models for correlated, time-lagged external drivers, we conclude that early spring sea ice conditions exert a strong influence on the distribution of chlorophyll a and nutrients along the WAP, but not necessarily the total chlorophyll a inventory. Because the distribution and density of phytoplankton biomass can have an impact on biomass transfer to the upper trophic levels, these results highlight anticipated links between the WAP marine ecosystem and climate. © 2018 John Wiley & Sons Ltd.

  18. 77 FR 38273 - Availability of Seats for the Florida Keys National Marine Sanctuary Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ...), Tourism--Upper Keys (member), and Tourism--Upper Keys (alternate). Applicants are chosen based upon their particular expertise and experience in relation to the seat for which they are applying; community and...

  19. 77 FR 5492 - Availability of Seat for the Florida Keys National Marine Sanctuary Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-03

    ...: Tourism--Lower Keys (member), and Tourism--Lower Keys (alternate). Applicants are chosen based upon their particular expertise and experience in relation to the seat for which they are applying; community and...

  20. 75 FR 81233 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... to fill key conservation gaps in important ocean areas. DATES: Comments on the nominations to the... and management initiatives (such as integrated ocean observing systems, systematic monitoring and evaluation, targeted outreach to key user groups, and helping to identify and address MPA research needs). In...

  1. Widefield TSCSPC-systems with large-area-detectors: application in simultaneous multi-channel-FLIM

    NASA Astrophysics Data System (ADS)

    Stepanov, Sergei; Bakhlanov, Sergei; Drobchenko, Evgeny; Eckert, Hann-Jörg; Kemnitz, Klaus

    2010-11-01

    Novel proximity-type Time- and Space-Correlated Single Photon Counting (TSCSPC) crossed-delay-line (DL)- and multi-anode (MA)-systems of outstanding performance and homogeneity were developed, using large-area detector heads of 25 and 40 mm diameter. Instrument response functions IRF(space) = (60 +/- 5) μm FWHM and IRF(time) = (28 +/- 3) ps FWHM were achieved over the full 12 cm2 area of the detector. Deadtime at throughput of 105 cps is 10% for "high-resolution" system and 5% in the "video"-system at 106 cps, at slightly reduced time- and space resolution. A fluorescence lifetime of (3.5 +/- 1) ps can be recovered from multi-exponential dynamics of a single living cyanobacterium (Acaryochloris marina). The present large-area detectors are particularly useful in simultaneous multichannel applications, such as 2-colour anisotropy or 4-colour lifetime imaging, utilizing dual- or quad-view image splitters. The long-term stability, low- excitation-intensity (< 100 mW/cm2) widefield systems enable minimal-invasive observation, without significant bleaching or photodynamic reactions, thus allowing long-period observation of up to several hours in living cells.

  2. An official American Thoracic Society/European Respiratory Society statement: key concepts and advances in pulmonary rehabilitation.

    PubMed

    Spruit, Martijn A; Singh, Sally J; Garvey, Chris; ZuWallack, Richard; Nici, Linda; Rochester, Carolyn; Hill, Kylie; Holland, Anne E; Lareau, Suzanne C; Man, William D-C; Pitta, Fabio; Sewell, Louise; Raskin, Jonathan; Bourbeau, Jean; Crouch, Rebecca; Franssen, Frits M E; Casaburi, Richard; Vercoulen, Jan H; Vogiatzis, Ioannis; Gosselink, Rik; Clini, Enrico M; Effing, Tanja W; Maltais, François; van der Palen, Job; Troosters, Thierry; Janssen, Daisy J A; Collins, Eileen; Garcia-Aymerich, Judith; Brooks, Dina; Fahy, Bonnie F; Puhan, Milo A; Hoogendoorn, Martine; Garrod, Rachel; Schols, Annemie M W J; Carlin, Brian; Benzo, Roberto; Meek, Paula; Morgan, Mike; Rutten-van Mölken, Maureen P M H; Ries, Andrew L; Make, Barry; Goldstein, Roger S; Dowson, Claire A; Brozek, Jan L; Donner, Claudio F; Wouters, Emiel F M

    2013-10-15

    Pulmonary rehabilitation is recognized as a core component of the management of individuals with chronic respiratory disease. Since the 2006 American Thoracic Society (ATS)/European Respiratory Society (ERS) Statement on Pulmonary Rehabilitation, there has been considerable growth in our knowledge of its efficacy and scope. The purpose of this Statement is to update the 2006 document, including a new definition of pulmonary rehabilitation and highlighting key concepts and major advances in the field. A multidisciplinary committee of experts representing the ATS Pulmonary Rehabilitation Assembly and the ERS Scientific Group 01.02, "Rehabilitation and Chronic Care," determined the overall scope of this update through group consensus. Focused literature reviews in key topic areas were conducted by committee members with relevant clinical and scientific expertise. The final content of this Statement was agreed on by all members. An updated definition of pulmonary rehabilitation is proposed. New data are presented on the science and application of pulmonary rehabilitation, including its effectiveness in acutely ill individuals with chronic obstructive pulmonary disease, and in individuals with other chronic respiratory diseases. The important role of pulmonary rehabilitation in chronic disease management is highlighted. In addition, the role of health behavior change in optimizing and maintaining benefits is discussed. The considerable growth in the science and application of pulmonary rehabilitation since 2006 adds further support for its efficacy in a wide range of individuals with chronic respiratory disease.

  3. Fragmentation of Thinking Structure's Students to Solving the Problem of Application Definite Integral in Area

    ERIC Educational Resources Information Center

    Wibawa, Kadek Adi; Nusantara, Toto; Subanji; Parta, I. Nengah

    2017-01-01

    This study aims to reveal the fragmentation of thinking structure's students in solving the problems of application definite integral in area. Fragmentation is a term on the computer (storage) that is highly relevant correlated with theoretical constructions that occur in the human brain (memory). Almost every student has a different way to…

  4. A green synthesis method for large area silver thin film containing nanoparticles.

    PubMed

    Shinde, N M; Lokhande, A C; Lokhande, C D

    2014-07-05

    The green synthesis method is inexpensive and convenient for large area deposition of thin films. For the first time, a green synthesis method for large area silver thin film containing nanoparticles is reported. Silver nanostructured films are deposited using silver nitrate solution and guava leaves extract. The study confirmed that the reaction time plays a key role in the growth and shape/size control of silver nanoparticles. The properties of silver films are studied using UV-visible spectrophotometer, scanning electron microscopy (SEM), X-ray diffraction (XRD), atomic force microscopy (AFM), contact angle, Fourier-transform Raman (FT-Raman) spectroscopy and Photoluminescence (PL) techniques. Finally, as an application, these films are used effectively in antibacterial activity study. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. 76 FR 6119 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-03

    ... that may be established by managing agencies to fill key conservation gaps in important ocean areas... systems, systematic monitoring and evaluation, targeted outreach to key user groups, and helping to identify and address MPA research needs). In addition, the national system provides a forum for coordinated...

  6. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  7. MoKey: A versatile exergame creator for everyday usage.

    PubMed

    Eckert, Martina; López, Marcos; Lázaro, Carlos; Meneses, Juan

    2017-11-27

    Currently, virtual applications for physical exercises are highly appreciated as rehabilitation instruments. This article presents a middleware called "MoKey" (Motion Keyboard), which converts standard off-the-shelf software into exergames (exercise games). A configurable set of gestures, captured by a motion capture camera, is translated into the key strokes required by the chosen software. The present study assesses the tool regarding usability and viability on a heterogeneous group of 11 participants, aged 5 to 51, with moderate to severe disabilities, and mostly bound to a wheelchair. In comparison with FAAST (The Flexible Action and Articulated Skeleton Toolkit), MoKey achieved better results in terms of ease of use and computational load. The viability as an exergame creator tool was proven with help of four applications (PowerPoint®, e-book reader, Skype®, and Tetris). Success rates of up to 91% have been achieved, subjective perception was rated with 4.5 points (from 0-5). The middleware provides increased motivation due to the use of favorite software and the advantage of exploiting it for exercise. Used together with communication software or online games, social inclusion can be stimulated. The therapists can employ the tool to monitor the correctness and progress of the exercises.

  8. Key technologies for manufacturing and processing sheet materials: A global perspective

    NASA Astrophysics Data System (ADS)

    Demeri, Mahmoud Y.

    2001-02-01

    Modern industrial technologies continue to seek new materials and processes to produce products that meet design and functional requirements. Sheet materials made from ferrous and non-ferrous metals, laminates, composites, and reinforced plastics constitute a large percentage of today’s products, components, and systems. Major manufacturers of sheet products include automotive, aerospace, appliance, and food-packaging industries. The Second Global Symposium on Innovations in Materials Processing & Manufacturing: Sheet Materials is organized to provide a forum for presenting advances in sheet processing and manufacturing by worldwide researchers and engineers from industrial, research, and academic centers. The symposium, sponsored by the TMS Materials Processing & Manufacturing Division (MPMD), was planned for the 2001 TMS Annual Meeting, New Orleans, Louisiana, February 11 15, 2001. This article is a review of key papers submitted for publication in the concurrent volume. The selected papers present significant developments in the rapidly expanding areas of advanced sheet materials, innovative forming methods, industrial applications, primary and secondary processing, composite processing, and numerical modeling of manufacturing processes.

  9. Characterization of available light for seagrass and patch reef productivity in Sugarloaf Key, Lower Florida Keys

    USGS Publications Warehouse

    Toro-Farmer, Gerardo; Muller-Karger, Frank E.; Vega-Rodriguez, Maria; Melo, Nelson; Yates, Kimberly K.; Johns, Elizabeth; Cerdeira-Estrada, Sergio; Herwitz, Stan R.

    2016-01-01

    Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP) was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively). Higher photosynthetic active radiation (PAR) levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm) had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  10. Stem cells in clinical practice: applications and warnings.

    PubMed

    Lodi, Daniele; Iannitti, Tommaso; Palmieri, Beniamino

    2011-01-17

    Stem cells are a relevant source of information about cellular differentiation, molecular processes and tissue homeostasis, but also one of the most putative biological tools to treat degenerative diseases. This review focuses on human stem cells clinical and experimental applications. Our aim is to take a correct view of the available stem cell subtypes and their rational use in the medical area, with a specific focus on their therapeutic benefits and side effects. We have reviewed the main clinical trials dividing them basing on their clinical applications, and taking into account the ethical issue associated with the stem cell therapy. We have searched Pubmed/Medline for clinical trials, involving the use of human stem cells, using the key words "stem cells" combined with the key words "transplantation", "pathology", "guidelines", "properties" and "risks". All the relevant clinical trials have been included. The results have been divided into different categories, basing on the way stem cells have been employed in different pathological conditions.

  11. Data key to quest for quality.

    PubMed

    Chang, Florence S; Nielsen, Jon; Macias, Charles

    2013-11-01

    Late-binding data warehousing reduces the time it takes to obtain data needed to make crucial decisions. Late binding refers to when and how tightly data from the source applications are bound to the rules and vocabularies that make it useful. In some cases, data can be seen in real time. In historically paper-driven environments where data-driven decisions may be a new concept, buy-in from clinicians, physicians, and hospital leaders is key to success in using data to improve outcomes.

  12. Efficient bit sifting scheme of post-processing in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Le, Dan; Wu, Xianyan; Niu, Xiamu; Guo, Hong

    2015-10-01

    Bit sifting is an important step in the post-processing of quantum key distribution (QKD). Its function is to sift out the undetected original keys. The communication traffic of bit sifting has essential impact on the net secure key rate of a practical QKD system. In this paper, an efficient bit sifting scheme is presented, of which the core is a lossless source coding algorithm. Both theoretical analysis and experimental results demonstrate that the performance of the scheme is approaching the Shannon limit. The proposed scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means the proposed scheme can decrease the secure key consumption for classical channel authentication and increase the net secure key rate of the QKD system, as demonstrated by analyzing the improvement on the net secure key rate. Meanwhile, some recommendations on the application of the proposed scheme to some representative practical QKD systems are also provided.

  13. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  14. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  15. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  16. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  17. BASIC STUDY ON APPLICABILITY OF MODIS DATA FOR VEGETATION MONITORING IN ASHIO AREA

    NASA Astrophysics Data System (ADS)

    Ikeda, Hirokazu; Todate, Hikaru; Tanaka, Hiroshi; Ota, Tametomo

    Ashio Basin was once lushly green until 1800's. However, the forest had been almost lost by copper mine de velopment and forest fire by 1956. From that time on, afforestation has been carried out for over 50 years, and the vegetation is being recovered. Therefore, it is very important to estimate the past afforestation activities, and to propose future directions. There exists an earlier research on vegetation monitoring in Ashio area, but it was performed more than 15 years ago, and used expensive commercial GIS and LANDSAT data. The present study examined a sustainable and inexpensive system with using preferably free data and software. It is shown that, by comparison with aerial photographs and digital national land information, vegetation index (NDVI) by MODIS data, available to download free, are easy to obtain and manipulate, and applicable for vegetation monitoring in Ashio area.

  18. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  19. Application of ANFIS to Phase Estimation for Multiple Phase Shift Keying

    NASA Technical Reports Server (NTRS)

    Drake, Jeffrey T.; Prasad, Nadipuram R.

    2000-01-01

    The paper discusses a novel use of Adaptive Neuro-Fuzzy Inference Systems (ANFIS) for estimating phase in Multiple Phase Shift Keying (M-PSK) modulation. A brief overview of communications phase estimation is provided. The modeling of both general open-loop, and closed-loop phase estimation schemes for M-PSK symbols with unknown structure are discussed. Preliminary performance results from simulation of the above schemes are presented.

  20. Tolerability of Crisaborole Ointment for Application on Sensitive Skin Areas: A Randomized, Double-Blind, Vehicle-Controlled Study in Healthy Volunteers.

    PubMed

    Zane, Lee T; Hughes, Matilda H; Shakib, Sepehr

    2016-10-01

    Inflammatory skin diseases such as atopic dermatitis (AD) and psoriasis often present in sensitive and thin-skinned areas that are at higher risk for topical treatment-related skin irritation (e.g., burning, stinging). Our objective was to address the need for topical treatments that can be safely applied to these areas. We assessed the local tolerability of crisaborole topical ointment when applied to sensitive and thin-skinned areas of healthy volunteers. In this phase I, randomized, double-blind, vehicle-controlled, single-center study, 32 subjects were randomized 3:1 to twice-daily application of crisaborole topical ointment, 2 %, (n = 24) or vehicle ointment (n = 8) for 21 days to 13 anatomic skin areas, including the face/hairline, genitals, extensor, and intertriginous areas. The primary endpoint was assessment of the frequency and severity of local tolerability symptoms (burning/stinging, erythema, and pruritus) using the Local Tolerability Scale. Overall, 98.8 % of all tolerability assessments had a grade of 0 (no signs/symptoms of irritation) and 0.1 % had a grade >1 (mild); no differences were observed in the frequency of local tolerability scores between treatment groups. The total frequency of local tolerability assessments graded >0 (none) was lower across all application sites with crisaborole ointment (0.0-2.2 %) than with vehicle ointment (2.4-7.1 %). Local tolerability did not change over time, and was comparable between sensitive and nonsensitive skin areas. Crisaborole ointment application to sensitive skin areas was well tolerated in healthy volunteers, supporting its potential role as a topical treatment alternative for patients with AD or psoriasis.

  1. 75 FR 78988 - Post-2014 Resource Pool-Loveland Area Projects, Allocation Procedures and Call for Applications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-17

    ... Administration (Western), a Federal power marketing agency of the Department of Energy (DOE), is publishing this... allocation of Federal electric power. Subpart C of the Energy Planning and Management Program (Program... for applications, in conjunction with the Loveland Area Projects (LAP) Final Post-1989 Marketing Plan...

  2. Android Based Area Web Monitoring

    NASA Astrophysics Data System (ADS)

    Kanigoro, Bayu; Galih Salman, Afan; Moniaga, Jurike V.; Chandra, Eric; Rezky Chandra, Zein

    2014-03-01

    The research objective is to develop an application that can be used in the monitoring of an area by using a webcam. It aims to create a sense of security on the user's application because it can monitor an area using mobile phone anywhere. The results obtained in this study is to create an area with a webcam monitoring application that can be accessed anywhere as long as the monitoring results have internet access and can also be accessed through Android Based Mobile Phone.

  3. Radiation-Grafted Polymer Electrolyte Membranes for Water Electrolysis Cells: Evaluation of Key Membrane Properties.

    PubMed

    Albert, Albert; Barnett, Alejandro O; Thomassen, Magnus S; Schmidt, Thomas J; Gubler, Lorenz

    2015-10-14

    Radiation-grafted membranes can be considered an alternative to perfluorosulfonic acid (PFSA) membranes, such as Nafion, in a solid polymer electrolyte electrolyzer. Styrene, acrylonitrile, and 1,3-diisopropenylbenzene monomers are cografted into preirradiated 50 μm ethylene tetrafluoroethylene (ETFE) base film, followed by sulfonation to introduce proton exchange sites to the obtained grafted films. The incorporation of grafts throughout the thickness is demonstrated by scanning electron microscopy/energy-dispersive X-ray spectroscopy (SEM/EDX) analysis of the membrane cross-sections. The membranes are analyzed in terms of grafting kinetics, ion-exchange capacity (IEC), and water uptake. The key properties of radiation-grafted membranes and Nafion, such as gas crossover, area resistance, and mechanical properties, are evaluated and compared. The plot of hydrogen crossover versus area resistance of the membranes results in a property map that indicates the target areas for membrane development for electrolyzer applications. Tensile tests are performed to assess the mechanical properties of the membranes. Finally, these three properties are combined to establish a figure of merit, which indicates that radiation-grafted membranes obtained in the present study are promising candidates with properties superior to those of Nafion membranes. A water electrolysis cell test is performed as proof of principle, including a comparison to a commercial membrane electrode assembly (MEA).

  4. The cold and atmospheric-pressure air surface barrier discharge plasma for large-area sterilization applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang Dacheng; Department of Aeronautics, Fujian Key Laboratory for Plasma and Magnetic Resonance, School of Physics and Mechanical and Electrical Engineering, Xiamen University, Xiamen, Fujian 361005; Zhao Di

    2011-04-18

    This letter reports a stable air surface barrier discharge device for large-area sterilization applications at room temperature. This design may result in visually uniform plasmas with the electrode area scaled up (or down) to the required size. A comparison for the survival rates of Escherichia coli from air, N{sub 2} and O{sub 2} surface barrier discharge plasmas is presented, and the air surface plasma consisting of strong filamentary discharges can efficiently kill Escherichia coli. Optical emission measurements indicate that reactive species such as O and OH generated in the room temperature air plasmas play a significant role in the sterilizationmore » process.« less

  5. Identifying hydrologically sensitive areas using LiDAR DEMs to mitigate critical source areas of diffuse pollution: development and application

    NASA Astrophysics Data System (ADS)

    Thomas, Ian; Jordan, Phil; Mellander, Per-Erik; Fenton, Owen; Shine, Oliver; hUallacháin, Daire Ó.; Creamer, Rachel; McDonald, Noeleen; Dunlop, Paul; Murphy, Paul

    2016-04-01

    Identifying critical source areas (CSAs) of diffuse pollution in agricultural catchments requires the accurate identification of hydrologically sensitive areas (HSAs) at highest propensity for generating surface runoff and transporting pollutants such as phosphorus (P). A new GIS-based HSA Index is presented that identifies HSAs at the sub-field scale. It uses a soil topographic index (STI) and accounts for the hydrological disconnection of overland flow via topographic impediment from flow sinks such as hedgerows and depressions. High resolution (0.25-2 m) LiDAR Digital Elevation Models (DEMs) are utilised to capture these microtopographic controls on flow pathways and hydrological connectivity. The HSA Index was applied to four agricultural catchments (~7.5-12 km2) with contrasting topography and soil types. Catchment HSA sizes were estimated using high resolution rainfall-quickflow measurements during saturated winter storm events in 2009-2014, and mapped using the HSA Index. HSA sizes ranged from 1.6-3.4% of the catchment area during median storm events and 2.9-8.5% during upper quartile events depending on whether well or poorly drained soils dominated, which validated HSA Index value distributions. Total flow sink volume capacities ranged from 8,298-59,584 m3 and caused 8.5-24.2% of overland-flow-generating-areas and 16.8-33.4% of catchment areas to become hydrologically disconnected from the open drainage channel network. HSA maps identified 'delivery points' along surface runoff pathways where transported pollutants such as P are delivered to the open drainage network. Using these as proposed locations for targeting mitigation measures such as riparian buffer strips (RBS) reduced costs compared to blanket implementation within an example agri-environment scheme by 66% and 91% over 1 and 5 years respectively, which included LiDAR DEM acquisition costs. Considering that HSAs are often the dominant P CSA factor in agricultural catchments and can override

  6. Ultra-low thermal conductivities in large-area Si-Ge nanomeshes for thermoelectric applications

    PubMed Central

    Perez-Taborda, Jaime Andres; Muñoz Rojo, Miguel; Maiz, Jon; Neophytou, Neophytos; Martin-Gonzalez, Marisol

    2016-01-01

    In this work, we measure the thermal and thermoelectric properties of large-area Si0.8Ge0.2 nano-meshed films fabricated by DC sputtering of Si0.8Ge0.2 on highly ordered porous alumina matrices. The Si0.8Ge0.2 film replicated the porous alumina structure resulting in nano-meshed films. Very good control of the nanomesh geometrical features (pore diameter, pitch, neck) was achieved through the alumina template, with pore diameters ranging from 294 ± 5nm down to 31 ± 4 nm. The method we developed is able to provide large areas of nano-meshes in a simple and reproducible way, being easily scalable for industrial applications. Most importantly, the thermal conductivity of the films was reduced as the diameter of the porous became smaller to values that varied from κ = 1.54 ± 0.27 W K−1m−1, down to the ultra-low κ = 0.55 ± 0.10 W K−1m−1 value. The latter is well below the amorphous limit, while the Seebeck coefficient and electrical conductivity of the material were retained. These properties, together with our large area fabrication approach, can provide an important route towards achieving high conversion efficiency, large area, and high scalable thermoelectric materials. PMID:27650202

  7. Organization and integration of biomedical knowledge with concept maps for key peroxisomal pathways.

    PubMed

    Willemsen, A M; Jansen, G A; Komen, J C; van Hooff, S; Waterham, H R; Brites, P M T; Wanders, R J A; van Kampen, A H C

    2008-08-15

    One important area of clinical genomics research involves the elucidation of molecular mechanisms underlying (complex) disorders which eventually may lead to new diagnostic or drug targets. To further advance this area of clinical genomics one of the main challenges is the acquisition and integration of data, information and expert knowledge for specific biomedical domains and diseases. Currently the required information is not very well organized but scattered over biological and biomedical databases, basic text books, scientific literature and experts' minds and may be highly specific, heterogeneous, complex and voluminous. We present a new framework to construct knowledge bases with concept maps for presentation of information and the web ontology language OWL for the representation of information. We demonstrate this framework through the construction of a peroxisomal knowledge base, which focuses on four key peroxisomal pathways and several related genetic disorders. All 155 concept maps in our knowledge base are linked to at least one other concept map, which allows the visualization of one big network of related pieces of information. The peroxisome knowledge base is available from www.bioinformaticslaboratory.nl (Support-->Web applications). Supplementary data is available from www.bioinformaticslaboratory.nl (Research-->Output--> Publications--> KB_SuppInfo)

  8. Public-Key Cryptography: A Hardware Implementation and Novel Neural Network-Based Approach

    DTIC Science & Technology

    1992-09-01

    FUNDINGISPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (if applicable ) 8c. ADDRESS (City, State, and ZIP Code) 10...8217....... ......... 4. .. . . iii TABLE OF CONTENTS I. INTRODUCTION ............................. 1 II. MATHEMATICAL BASIS FOR THE DEVELOPMENT OF PUBLIC-KEY...in the spirit of this future that this thesis is presented. It is an in-depth study of the public-key cryptosystem. First, the mathematical basis

  9. Integration and application of optical chemical sensors in microbioreactors.

    PubMed

    Gruber, Pia; Marques, Marco P C; Szita, Nicolas; Mayr, Torsten

    2017-08-08

    The quantification of key variables such as oxygen, pH, carbon dioxide, glucose, and temperature provides essential information for biological and biotechnological applications and their development. Microfluidic devices offer an opportunity to accelerate research and development in these areas due to their small scale, and the fine control over the microenvironment, provided that these key variables can be measured. Optical sensors are well-suited for this task. They offer non-invasive and non-destructive monitoring of the mentioned variables, and the establishment of time-course profiles without the need for sampling from the microfluidic devices. They can also be implemented in larger systems, facilitating cross-scale comparison of analytical data. This tutorial review presents an overview of the optical sensors and their technology, with a view to support current and potential new users in microfluidics and biotechnology in the implementation of such sensors. It introduces the benefits and challenges of sensor integration, including, their application for microbioreactors. Sensor formats, integration methods, device bonding options, and monitoring options are explained. Luminescent sensors for oxygen, pH, carbon dioxide, glucose and temperature are showcased. Areas where further development is needed are highlighted with the intent to guide future development efforts towards analytes for which reliable, stable, or easily integrated detection methods are not yet available.

  10. New maps, new information: Coral reefs of the Florida keys

    USGS Publications Warehouse

    Lidz, B.H.; Reich, C.D.; Peterson, R.L.; Shinn, E.A.

    2006-01-01

    A highly detailed digitized map depicts 22 benthic habitats in 3140.5 km2 of the Florida Keys National Marine Sanctuary. Dominant are a seagrass/lime-mud zone (map area 27.5%) throughout Hawk Channel and seagrass/carbonate-sand (18.7%) and bare carbonate-sand (17.3%) zones on the outer shelf and in The Quicksands. A lime-mud/seagrass-covered muddy carbonate-sand zone (9.6%) abuts the keys. Hardbottom communities (13.2%) consist of bare Pleistocene coralline and oolitic limestone, coral rubble, and senile coral reefs. Smaller terrestrial (4.0%) and marine habitats, including those of live coral (patch reefs, 0.7%), account for the rest (13.7%) of the area. Derived from aerial photomosaics, the seabed dataset fits precisely when transposed onto a newly developed National Geophysical Data Center hydrographic-bathymetry map. Combined, the maps point to new information on unstudied seabed morphologies, among them an erosional nearshore rock ledge bordering the seaward side of the Florida Keys and thousands of patch-reef clusters aligned in mid-Hawk Channel. Preliminary indications are that the ledge may represent the seaward extent of the 125-ka Key Largo and Miami Limestone that form the keys, and the patch reefs colonized landward edges of two noncoralline, non-dune-ridge topographic troughs. The troughs, their substrate, and inner-shelf location along the seaward side of the Hawk Channel bedrock depression are the first of that type of nuclei to be recognized in the Florida reef record. Together, the map datasets establish the efficacy and accuracy of using aerial photographs to define in extraordinary detail the seabed features and habitats in a shallow-reef setting.

  11. Using Key Performance Indicators to Drive Strategic Decision Making.

    ERIC Educational Resources Information Center

    Dolence, Michael G.; Norris, Donald M.

    1994-01-01

    A nine-step method for defining and pursuing key performance indicators (KPIs), derived from a strategic planning process, is outlined, and its applications at the University of Northern Colorado and Illinois Benedictine College are described and tabulated. A chart summarizes current and projected KPIs for Illinois Benedictine College for each…

  12. Conceptual basis for an integrated system for the management of a protected area. Examples from its application in a mediterranean area.

    PubMed

    Cornejo, E; Fungairiño, S G; Barandica, J M; Serrano, J M; Zorrilla, J M; Gómez, T; Zapata, F J; Acosta, F J

    2016-01-15

    Improving the efficiency of management in protected areas is imperative in a generalized context of limited conservation budgets. However, this is overlooked due to flaws in problem definition, general disregard for cost information, and a lack of suitable tools for measuring costs and management quality. This study describes an innovative methodological framework, implemented in the web application SIGEIN, focused on maximizing the quality of management against its costs, establishing an explicit justification for any decision. The tool integrates, with this aim, a procedure for prioritizing management objects according to a conservation value, modified by a functional criterion; a project management module; and a module for management of continuous assessment. This appraisal associates the relevance of the conservation targets, the efficacy of the methods employed, both resource and personnel investments, and the resulting costs. Preliminary results of a prototypical SIGEIN application on the Site of Community Importance Chafarinas Islands are included. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    NASA Astrophysics Data System (ADS)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  14. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  15. Neurocognitive Brain Response to Transient Impairment of Wernicke's Area

    PubMed Central

    Mason, Robert A.; Prat, Chantel S.; Just, Marcel Adam

    2014-01-01

    This study examined how the brain system adapts and reconfigures its information processing capabilities to maintain cognitive performance after a key cortical center [left posterior superior temporal gyrus (LSTGp)] is temporarily impaired during the performance of a language comprehension task. By applying repetitive transcranial magnetic stimulation (rTMS) to LSTGp and concurrently assessing the brain response with functional magnetic resonance imaging, we found that adaptation consisted of 1) increased synchronization between compensating regions coupled with a decrease in synchronization within the primary language network and 2) a decrease in activation at the rTMS site as well as in distal regions, followed by their recovery. The compensatory synchronization included 3 centers: The contralateral homolog (RSTGp) of the area receiving rTMS, areas adjacent to the rTMS site, and a region involved in discourse monitoring (medial frontal gyrus). This approach reveals some principles of network-level adaptation to trauma with potential application to traumatic brain injury, stroke, and seizure. PMID:23322403

  16. Neurocognitive brain response to transient impairment of Wernicke's area.

    PubMed

    Mason, Robert A; Prat, Chantel S; Just, Marcel Adam

    2014-06-01

    This study examined how the brain system adapts and reconfigures its information processing capabilities to maintain cognitive performance after a key cortical center [left posterior superior temporal gyrus (LSTGp)] is temporarily impaired during the performance of a language comprehension task. By applying repetitive transcranial magnetic stimulation (rTMS) to LSTGp and concurrently assessing the brain response with functional magnetic resonance imaging, we found that adaptation consisted of 1) increased synchronization between compensating regions coupled with a decrease in synchronization within the primary language network and 2) a decrease in activation at the rTMS site as well as in distal regions, followed by their recovery. The compensatory synchronization included 3 centers: The contralateral homolog (RSTGp) of the area receiving rTMS, areas adjacent to the rTMS site, and a region involved in discourse monitoring (medial frontal gyrus). This approach reveals some principles of network-level adaptation to trauma with potential application to traumatic brain injury, stroke, and seizure.

  17. Key Factors Influencing Rapid Development of Potentially Dune-Stabilizing Moss-Dominated Crusts

    PubMed Central

    Bu, Chongfeng; Zhang, Kankan; Zhang, Chunyun; Wu, Shufang

    2015-01-01

    Biological soil crusts (BSCs) are a widespread photosynthetic ground cover in arid and semiarid areas. They have many positive ecological functions, such as increasing soil stability, and reducing water and wind erosion. Using artificial technology to achieve the rapid development of BSCs is expected to become a low-cost and highly beneficial ecological restoration measure. In the present study, typical moss-dominated crusts in a region characterized by mobile dunes (Mu Us Sandland, China) were collected, and a 40-day cultivation experiment was performed to investigate key factors, including watering frequency, light intensity and a nutrient addition, which affect the rapid development of moss crusts and their optimal combination. The results demonstrated that watering frequency and illumination had a significant positive effect (P=0.049, three-factor ANOVA) and a highly significant, complicated effect (P=0.000, three-factor ANOVA), respectively, on the plant density of bryophytes, and a highly significant positive effect on the chlorophyll a and exopolysaccharide contents (P=0.000, P=0.000; P=0.000, P=0.000; one-way ANOVA). Knop nutrient solution did not have a significant positive but rather negative effect on the promotion of moss-dominated crust development (P=0.270, three-factor ANOVA). Moss-dominated crusts treated with the combination of moderate-intensity light (6,000 lx) + high watering frequency (1 watering/2 days) - Knop had the highest moss plant densities, while the treatment with high-intensity light (12,000 lx) + high watering frequency (1 watering/2 days) + Knop nutrient solution had higher chlorophyll a contents than that under other treatments. It is entirely feasible to achieve the rapid development of moss crusts under laboratory conditions by regulating key factors and creating the right environment. Future applications may seek to use cultured bryophytes to control erosion in vulnerable areas with urgent needs. PMID:26230324

  18. The Introduction of Key Skills in Schools: Core or Casualty?

    ERIC Educational Resources Information Center

    Glover, Derek; Gleeson, Denis; Johnson, Mike; Spencer, Pat; Watson, Ray

    2000-01-01

    Study of the introduction of generic Key Skills in two local education authorities in Britain found limited implementation. Results suggested the need for strategic district- and school-level management, clear aims and objectives, ownership by school staff, and cross-curricular application. (SK)

  19. Neonatal, placental, and umbilical cord blood parameters in pregnant women residing in areas with intensive pesticide application.

    PubMed

    Quintana, María Martha; Vera, Berta; Magnarelli, Gladis; Guiñazú, Natalia; Rovedatti, María Gabriela

    2017-09-01

    In rural populations, the proximity to areas with intensive pesticide application represents a risk factor of xenobiotic exposure. Here, we investigated whether newborns born to mothers residing in an area with intensive pesticide application show alterations in placental and neonatal morphometric standards, umbilical cord blood (UCB) biochemical parameters, and/or biomarkers related to oxidative stress and oxidative damage. Samples were collected from 151 healthy pregnant women residing in a rural area (rural group; RG) during the pesticide spraying (SS) and nonspraying (NSS) seasons, as well as from women from an urban population (control group; CG), and grouped according to the delivery type (vaginal or cesarean). In the vaginal delivery group, the placental weight and placental index were higher in the RG groups than in the CG (p = 0.01), whereas in the cesarean delivery group, newborn weight was lower in the RG-SS group than in the CG. In the RG-SS group, UCB erythrocyte osmotic fragility and the DNA damage index (DI) were higher, and superoxide dismutase (SOD) activity was lower than in the RG-NSS group. Acetylcholinesterase and SOD activities were found to be inversely correlated with the DI.

  20. Global-local methodologies and their application to nonlinear analysis

    NASA Technical Reports Server (NTRS)

    Noor, Ahmed K.

    1989-01-01

    An assessment is made of the potential of different global-local analysis strategies for predicting the nonlinear and postbuckling responses of structures. Two postbuckling problems of composite panels are used as benchmarks and the application of different global-local methodologies to these benchmarks is outlined. The key elements of each of the global-local strategies are discussed and future research areas needed to realize the full potential of global-local methodologies are identified.

  1. Knowledge and attitude of key community members towards tuberculosis: mixed method study from BRAC TB control areas in Bangladesh.

    PubMed

    Paul, Sukanta; Akter, Rahima; Aftab, Afzal; Khan, Antora M; Barua, Mrittika; Islam, Shayla; Islam, Akramul; Husain, Ashaque; Sarker, Malabika

    2015-01-31

    Bangladesh National Tuberculosis (TB) Control Programme adopted a number of strategies to facilitate TB diagnosis and treatment. 'Advocacy, Communication and Social Mobilization' (ACSM) was one of the key strategies implemented by BRAC (Bangladesh Rural Advancement Committee, a non-governmental development organization) TB control program. The purpose of this study is to assess the knowledge and attitudes of the key community members (KCMs) participated in ACSM in BRAC TB control areas. This study combined quantitative and qualitative methods using a mixed method approach. KCMs in three districts with low TB case detection rates were targeted to assess the ACSM program. The quantitative survey using a multi-stage random-sampling strategy was conducted among 432 participants. The qualitative study included in-depth interviews (IDIs) of a sub sample of 48 respondents. For quantitative analysis, descriptive statistics were reported using frequencies, percentages, and Chi square tests, while thematic analysis was used for qualitative part. Most (99%) of the participants had heard about TB, and almost all knew that TB is a contagious yet curable disease. More than half (53%) of the KCMs had good knowledge regarding TB, but BRAC workers were found to be more knowledgeable compared to other KCMs. However, considerable knowledge gaps were observed among BRAC community health workers. Qualitative results revealed that the majority of the KCMs were aware about the signs, symptoms and transmission pathways of TB and believed that smoking and addiction were the prime causes of transmission of TB. The knowledge about child TB was poor even among BRAC health workers. Stigma associated with TB was not uncommon. Almost all respondents expressed that young girls diagnosed with TB. This study finding has revealed varying levels of knowledge and mixed attitudes about TB among the KCMs. It also provides insight on the poor knowledge regarding child TB and indicate that despite the

  2. Teacher-Student Sexual Relations: Key Risks and Ethical Issues

    ERIC Educational Resources Information Center

    Sikes, Pat

    2010-01-01

    Researching actual or purported sexual contact between teachers and students raises many difficult ethical issues, questions and dilemmas, which may help to explain why few have ventured into the field. This experientially based paper addresses key problem areas under the headings of: the ethics of researching a sensitive taboo topic; the ethics…

  3. Techno-economic assessment of novel vanadium redox flow batteries with large-area cells

    NASA Astrophysics Data System (ADS)

    Minke, Christine; Kunz, Ulrich; Turek, Thomas

    2017-09-01

    The vanadium redox flow battery (VRFB) is a promising electrochemical storage system for stationary megawatt-class applications. The currently limited cell area determined by the bipolar plate (BPP) could be enlarged significantly with a novel extruded large-area plate. For the first time a techno-economic assessment of VRFB in a power range of 1 MW-20 MW and energy capacities of up to 160 MWh is presented on the basis of the production cost model of large-area BPP. The economic model is based on the configuration of a 250 kW stack and the overall system including stacks, power electronics, electrolyte and auxiliaries. Final results include a simple function for the calculation of system costs within the above described scope. In addition, the impact of cost reduction potentials for key components (membrane, electrode, BPP, vanadium electrolyte) on stack and system costs is quantified and validated.

  4. A low cost Mobile Network System for monitoring climate and air quality of urban areas at high resolution: a preliminary application in Florence (IT) metropolitan area

    NASA Astrophysics Data System (ADS)

    Dibari, Camilla; Moriondo, Marco; Matese, Alessandro; Sabatini, Francesco; Trombi, Giacomo; Zaldei, Alessandro; Bindi, Marco

    2013-04-01

    The combination of the "Heat island effect" coupled with higher frequencies of extreme events (e.g. heat waves) due to climate change is of great concern for human health in urban areas. Anomalies of summer 2003, mentioned as possible typical climate for the near future summers (Schär et al., 2004), caused about 7,000 deaths in Italy and over 35,000 in the whole Europe. Furthermore, more than 50% of world's population is living in urban areas and, given the unprecedented urbanization rate that is expected in the next future, cities will likely be exposed to a growing environmental pressure in the following decades. Accordingly, climate monitoring of urban areas is gradually becoming a key element of planning that cannot be disregarded for an efficient public health management and for the development of a city scale Heat Waves Warning System tool, which is based on meteorological forecast of both air temperatures and humidity at a synoptic scale (Pascal et al., 2006). Building on these premises, a low cost Mobile Weather Station (MWS), to be placed on urban public transport, has been assembled. This mobile station logs every minute both meteorological variables (i.e. temperature and air humidity) and air quality parameters (i.e. atmospheric CO2 concentration and noise detection); the geographical position of each MWS's measurement is also recorded thanks to the built-in GPS antenna. The system, equipped with a data logger for data storage based on the open-source hardware platform Arduino, can also transmit data in real time via GPRS. The quality of meteorological and environmental data acquired by MWS was evaluated both on pre-existing steady meteorological stations of the metropolitan area of Florence (Petralli et al., 2010), and on professional research-grade data logger (Campbell CR800), logging air temperature in a non-aspirated shield by means of sensors at fast (thermocouple) and slower (digital) time response. Two prototypes of stations were thus designed

  5. Impact of m-health application used by community health volunteers on improving utilisation of maternal, new-born and child health care services in a rural area of Uttar Pradesh, India.

    PubMed

    Prinja, Shankar; Nimesh, Ruby; Gupta, Aditi; Bahuguna, Pankaj; Gupta, Madhu; Thakur, Jarnail Singh

    2017-07-01

    To raise the quality of counselling by community health volunteers resulting in improved uptake of maternal, neonatal and child health services (MNCH), an m-health application was introduced under a project named 'Reducing Maternal and Newborn Deaths (ReMiND)' in district Kaushambi in India. We report the impact of this project on coverage of key MNCH services. A pre- and post-quasi-experimental design was undertaken to assess the impact of intervention. This project was introduced in two community development blocks in Kaushambi district in 2012. Two other blocks from the same district were selected as controls after matching for coverage of two indicators at baseline - antenatal care and institutional deliveries. The Annual Health Survey conducted by the Ministry of Health and Family Welfare in 2011 served as pre-intervention data, whereas a household survey in four blocks of Kaushambi district in 2015 provided post-intervention coverage of key services. Propensity score matched samples from intervention and control areas in pre-intervention and post-intervention periods were analysed using difference-in-difference method to estimate the impact of ReMiND project. We found a statistically significant increase in coverage of iron-folic acid supplementation (12.58%), self-reporting of complication during pregnancy (13.11%) and after delivery (19.6%) in the intervention area. The coverage of three or more antenatal care visits, tetanus toxoid vaccination, full antenatal care and ambulance usage increased in intervention area by 10.3%, 4.28%, 1.1% and 2.06%, respectively; however, the changes were statistically insignificant. Three of eight services which were targeted for improvement under ReMiND project registered a significant improvement as result of m-health intervention. © 2017 John Wiley & Sons Ltd.

  6. Synthetic Aperture Radar (SAR)-based paddy rice monitoring system: Development and application in key rice producing areas in Tropical Asia

    NASA Astrophysics Data System (ADS)

    Setiyono, T. D.; Holecz, F.; Khan, N. I.; Barbieri, M.; Quicho, E.; Collivignarelli, F.; Maunahan, A.; Gatti, L.; Romuga, G. C.

    2017-01-01

    Reliable and regular rice information is essential part of many countries’ national accounting process but the existing system may not be sufficient to meet the information demand in the context of food security and policy. Synthetic Aperture Radar (SAR) imagery is highly suitable for detecting lowland paddy rice, especially in tropical region where pervasive cloud cover in the rainy seasons limits the use of optical imagery. This study uses multi-temporal X-band and C-band SAR imagery, automated image processing, rule-based classification and field observations to classify rice in multiple locations across Tropical Asia and assimilate the information into ORYZA Crop Growth Simulation model (CGSM) to generate high resolution yield maps. The resulting cultivated rice area maps had classification accuracies above 85% and yield estimates were within 81-93% agreement against district level reported yields. The study sites capture much of the diversity in water management, crop establishment and rice maturity durations and the study demonstrates the feasibility of rice detection, yield monitoring, and damage assessment in case of climate disaster at national and supra-national scales using multi-temporal SAR imagery combined with CGSM and automated methods.

  7. State waste discharge permit application: 200 Area Treated Effluent Disposal Facility (Project W-049H)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-08-01

    As part of the original Hanford Federal Facility Agreement and Concent Order negotiations, US DOE, US EPA and the Washington State Department of Ecology agreed that liquid effluent discharges to the ground to the Hanford Site are subject to permitting in the State Waste Discharge Permit Program (SWDP). This document constitutes the SWDP Application for the 200 Area TEDF stream which includes the following streams discharged into the area: Plutonium Finishing Plant waste water; 222-S laboratory Complex waste water; T Plant waste water; 284-W Power Plant waste water; PUREX chemical Sewer; B Plant chemical sewer, process condensate, steam condensate; 242-A-81more » Water Services waste water.« less

  8. Atmospheric applications of high-energy lasers

    NASA Astrophysics Data System (ADS)

    Cook, Joung R.

    2005-03-01

    It has been over forty years since the invention of the laser, which has inspired the imagination of scientists and science fiction writers alike. Many ideas have been realized, many still remain as dreams, and new ones are still being conceived. The High Energy Laser (HEL) has been associated with weapon applications during the past three decades. Much of the same technology can be directly applied to power beaming, laser propulsion, and other potential remote energy and power transfer applications. Economically, these application areas are becoming increasingly more viable. This paper reviews the evolutionarey history of the HEL device technologies. It points out the basic system components and layouts with associated key technologies that drive the effectiveness and efficiency of the system level performance. It describes the fundamental properties and wavelength dependencies of atmospheric propagation that in turn have become the prescription for wavelength properties that are desired from the device.

  9. Identification of Key Odorants in Used Disposable Absorbent Incontinence Products

    PubMed Central

    Hall, Gunnar; Forsgren-Brusk, Ulla

    2017-01-01

    PURPOSE: The purpose of this study was to identify key odorants in used disposable absorbent incontinence products. DESIGN: Descriptive in vitro study SUBJECTS AND SETTING: Samples of used incontinence products were collected from 8 residents with urinary incontinence living in geriatric nursing homes in the Gothenburg area of Sweden. Products were chosen from a larger set of products that had previously been characterized by descriptive odor analysis. METHODS: Pieces of the used incontinence products were cut from the wet area, placed in glass bottles, and kept frozen until dynamic headspace sampling of volatile compounds was completed. Gas chromatography–olfactometry was used to identify which compounds contributed most to the odors in the samples. Compounds were identified by gas chromatography–mass spectrometry. RESULTS: Twenty-eight volatiles were found to be key odorants in the used incontinence products. Twenty-six were successfully identified. They belonged to the following classes of chemical compounds: aldehydes (6); amines (1); aromatics (3); isothiocyanates (1); heterocyclics (2); ketones (6); sulfur compounds (6); and terpenes (1). CONCLUSION: Nine of the 28 key odorants were considered to be of particular importance to the odor of the used incontinence products: 3-methylbutanal, trimethylamine, cresol, guaiacol, 4,5-dimethylthiazole-S-oxide, diacetyl, dimethyl trisulfide, 5-methylthio-4-penten-2-ol, and an unidentified compound. PMID:28328644

  10. 75 FR 972 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-07

    ... key conservation gaps in important ocean areas. DATES: Comments on the nominations to the national... the Framework. Executive Order 13158 defines an MPA as: ``any area of the marine environment that has... national system may include both terrestrial and marine components, the term MPA as defined in the...

  11. Air Force electrochemical power research and technology program for space applications

    NASA Technical Reports Server (NTRS)

    Allen, Douglas

    1987-01-01

    An overview is presented of the existing Air Force electrochemical power, battery, and fuel cell programs for space application. Present thrusts are described along with anticipated technology availability dates. Critical problems to be solved before system applications occur are highlighted. Areas of needed performance improvement of batteries and fuel cells presently used are outlined including target dates for key demonstrations of advanced technology. Anticipated performance and current schedules for present technology programs are reviewed. Programs that support conventional military satellite power systems and special high power applications are reviewed. Battery types include bipolar lead-acid, nickel-cadmium, silver-zinc, nickel-hydrogen, sodium-sulfur, and some candidate advanced couples. Fuel cells for pulsed and transportation power applications are discussed as are some candidate advanced regenerative concepts.

  12. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    PubMed Central

    Xie, Hualin; Yao, Guanrong; Wang, Peng

    2014-01-01

    Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability. PMID:24590051

  13. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  14. Education as a key objective of the interdisciplinary volcanic risk mitigation strategy VESUVIUS PENTALOGUE for developing resilient and sustainable areas around Vesuvius

    NASA Astrophysics Data System (ADS)

    Dobran, F.; Imperatrice, A.

    2017-12-01

    VESUVIUS PENTALOGUE requires the achievement of 5 key objectives for Summa-Vesuvius area: (1) Development of temporary settlements for the inhabitants close to their native homeland until the volcanic crisis subsides; (2) Division of the danger zone into an exclusion nucleus that prohibits all future human settlements and discourages the existing ones, a resilience belt that houses most of the current populations, and a sustainable area beyond the resilience belt that allows for sustainable practices and temporary resettlements of resilience belt citizens following the volcanic crises; (3) Development of built environment construction codes for the population of the danger zone by utilizing plinian eruption scenarios, scenario-based seismic hazard assessment and zonation, global volcanic simulator, and dynamic structural analysis; (4) Implementation of volcanic risk information and education campaigns for different risk areas surrounding the volcano; and (5) Production of a memorandum of understanding between the authorities and scientific communities, and production of periodic progress reports for keeping the populations informed on the developments leading to the realization of the above objectives.For the past 20 years we have devoted considerable efforts towards the achievement of educational objectives. We worked with local volunteers and social and cultural organizations and with our colleagues delivered over 200 public and school seminars in 15 communities around Vesuvius, organized 2 international scientific meetings for allowing the public and high school children to interact directly with the scientists working on this volcano, and established numerous contacts with school teachers for helping them engage their students on Vesuvius from the scientific, artistic, social, and cultural perspectives. Every year GVES has been the promoter of Vesuvius area manifestations where the school children have the opportunities to expose their works on this volcano and

  15. Lessons Learned from Research about Informal Reading Inventories: Keys to Data-Driven Instructional Recommendations

    ERIC Educational Resources Information Center

    L'Allier, Susan K.

    2013-01-01

    This study examined how effectively candidates in an MSEd in literacy education with a focus on reading program used the results from the Basic Reading Inventory to develop key instructional recommendations. The results indicated that, overall, candidates made about two thirds of the key recommendations suggested by an expert in the area of…

  16. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 1 2014-01-01 2014-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  17. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 1 2012-01-01 2012-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  18. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 1 2011-01-01 2011-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  19. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 1 2013-01-01 2013-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  20. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  1. Characterization of Large-Area SiPM Array for PET Applications

    NASA Astrophysics Data System (ADS)

    Du, Junwei; Yang, Yongfeng; Bai, Xiaowei; Judenhofer, Martin S.; Berg, Eric; Di, Kun; Buckley, Steve; Jackson, Carl; Cherry, Simon R.

    2016-02-01

    The performance of an 8 ×8 array of 6.0 ×6.0 mm2 (active area) SiPMs was evaluated for PET applications using crystal arrays with different pitch sizes (3.4, 1.5, 1.35, and 1.2 mm) and custom designed five-channel front-end readout electronics (four channels for position information and one channel for timing information). The total area of this SiPM array is 57.4 ×57.4 mm2, and the pitch size is 7.2 mm. It was fabricated using enhanced blue sensitivity SiPMs (MicroFB-60035-SMT) with peak spectral sensitivity at 420 nm. The performance of the SiPM array was characterized by measuring flood histogram decoding quality, energy resolution, timing resolution and saturation at several bias voltages (from 25.0 to 30.0 V in 0.5 V intervals) and two different temperatures ( 5° C and 20°C). Results show that the best flood histogram was obtained at a bias voltage of 28.0 V and 5°C and an array of polished LSO crystals with a pitch as small as 1.2 mm can be resolved. No saturation was observed up to a bias voltage of 29.5 V during the experiments, due to adequate light sharing between SiPMs. Energy resolution and timing resolution at 5°C ranged from 12.7 ±0.8% to 14.6 ±1.4% and 1.58 ±0.13 ns to 2.50 ±0.44 ns, for crystal array pitch sizes of 3.4 and 1.2 mm, respectively. Superior flood histogram quality, energy resolution and timing resolution were obtained with larger crystal array pitch sizes and at lower temperature. Based on our findings, we conclude that this large-area SiPM array can serve as a suitable photodetector for high-resolution small-animal PET or dedicated human brain PET scanners.

  2. Mapping urban climate zones and quantifying climate behaviors--an application on Toulouse urban area (France).

    PubMed

    Houet, Thomas; Pigeon, Grégoire

    2011-01-01

    Facing the concern of the population to its environment and to climatic change, city planners are now considering the urban climate in their choices of planning. The use of climatic maps, such Urban Climate Zone‑UCZ, is adapted for this kind of application. The objective of this paper is to demonstrate that the UCZ classification, integrated in the World Meteorological Organization guidelines, first can be automatically determined for sample areas and second is meaningful according to climatic variables. The analysis presented is applied on Toulouse urban area (France). Results show first that UCZ differentiate according to air and surface temperature. It has been possible to determine the membership of sample areas to an UCZ using landscape descriptors automatically computed with GIS and remote sensed data. It also emphasizes that climate behavior and magnitude of UCZ may vary from winter to summer. Finally we discuss the influence of climate data and scale of observation on UCZ mapping and climate characterization. Copyright © 2011 Elsevier Ltd. All rights reserved.

  3. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ameme, Dan Selorm Kwami; Guttromson, Ross

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selectionmore » within the simulated network.« less

  4. Large Area Microencapsulated Reflective Guest-Host Liquid Crystal Displays and Their Applications

    NASA Astrophysics Data System (ADS)

    Nakai, Yutaka; Tanaka, Masao; Enomoto, Shintaro; Iwanaga, Hiroki; Hotta, Aira; Kobayashi, Hitoshi; Oka, Toshiyuki; Kizaki, Yukio; Kidzu, Yuko; Naito, Katsuyuki

    2002-07-01

    We have developed reflective liquid crystal displays using microencapsulated guest-host liquid crystals, whose size was sufficiently large for viewing documents. A high-brightness image can be realized because there is no need for polarizers. Easy fabrication processes, consisting of screen-printing of microencapsulated liquid crystal and film adhesion, have enabled the realization of thinner and lighter cell structures. It has been confirmed that the display is tolerant of the pressures to which it would be subject in actual use. The optimization of fabrication processes has enabled the realization of reflectance uniformity in the display area and reduction of the driving voltage. Our developed display is suitable for portable information systems, such as electronic book applications.

  5. Interim Consequence Management Guidance for a Wide-Area Biological Attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Raber, Ellen; Kirvel, Robert; MacQueen, Don

    2011-05-17

    The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urbanmore » area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and

  6. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  7. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  8. Spatio-temporal patterns of key exploited marine species in the Northwestern Mediterranean Sea.

    PubMed

    Morfin, Marie; Fromentin, Jean-Marc; Jadaud, Angélique; Bez, Nicolas

    2012-01-01

    This study analyzes the temporal variability/stability of the spatial distributions of key exploited species in the Gulf of Lions (Northwestern Mediterranean Sea). To do so, we analyzed data from the MEDITS bottom-trawl scientific surveys from 1994 to 2010 at 66 fixed stations and selected 12 key exploited species. We proposed a geostatistical approach to handle zero-inflated and non-stationary distributions and to test for the temporal stability of the spatial structures. Empirical Orthogonal Functions and other descriptors were then applied to investigate the temporal persistence and the characteristics of the spatial patterns. The spatial structure of the distribution (i.e. the pattern of spatial autocorrelation) of the 12 key species studied remained highly stable over the time period sampled. The spatial distributions of all species obtained through kriging also appeared to be stable over time, while each species displayed a specific spatial distribution. Furthermore, adults were generally more densely concentrated than juveniles and occupied areas included in the distribution of juveniles. Despite the strong persistence of spatial distributions, we also observed that the area occupied by each species was correlated to its abundance: the more abundant the species, the larger the occupation area. Such a result tends to support MacCall's basin theory, according to which density-dependence responses would drive the expansion of those 12 key species in the Gulf of Lions. Further analyses showed that these species never saturated their habitats, suggesting that they are below their carrying capacity; an assumption in agreement with the overexploitation of several of these species. Finally, the stability of their spatial distributions over time and their potential ability to diffuse outside their main habitats give support to Marine Protected Areas as a potential pertinent management tool.

  9. Key Gaps for Enabling Plant Growth in Future Missions

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Motil, Brian; Barta, Dan; Fritsche, Ralph; Massa, Gioia; Quincy, Charlie; Romeyn, Matthew; Wheeler, Ray; Hanford, Anthony

    2017-01-01

    Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space Administration (NASA). It also begins to identify solutions to the simpler questions identified by the group based on work initiated in 2017. Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space

  10. Improving the Representation of Land in Climate Models by Application of EOS Observations

    NASA Technical Reports Server (NTRS)

    2004-01-01

    The PI's IDS current and previous investigation has focused on the applications of the land data toward the improvement of climate models. The previous IDS research identified the key factors limiting the accuracy of climate models to be the representation of albedos, land cover, fraction of landscape covered by vegetation, roughness lengths, surface skin temperature and canopy properties such as leaf area index (LAI) and average stomatal conductance. Therefore, we assembled a team uniquely situated to focus on these key variables and incorporate the remotely sensed measures of these variables into the next generation of climate models.

  11. Research on the architecture and key technologies of SIG

    NASA Astrophysics Data System (ADS)

    Fu, Zhongliang; Meng, Qingxiang; Huang, Yan; Liu, Shufan

    2007-06-01

    Along with the development of computer network, Grid has become one of the hottest issues of researches on sharing and cooperation of Internet resources throughout the world. This paper illustrates a new architecture of SIG-a five-hierarchy architecture (including Data Collecting Layer, Grid Layer, Service Layer, Application Layer and Client Layer) of SIG from the traditional three hierarchies (only including resource layer, service layer and client layer). In the paper, the author proposes a new mixed network mode of Spatial Information Grid which integrates CAG (Certificate Authority of Grid) and P2P (Peer to Peer) in the Grid Layer, besides, the author discusses some key technologies of SIG and analysis the functions of these key technologies.

  12. Practical gigahertz quantum key distribution robust against channel disturbance.

    PubMed

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; He, De-Yong; Hui, Cong; Hao, Peng-Lei; Fan-Yuan, Guan-Jie; Wang, Chao; Zhang, Li-Jun; Kuang, Jie; Liu, Shu-Feng; Zhou, Zheng; Wang, Yong-Gang; Guo, Guang-Can; Han, Zheng-Fu

    2018-05-01

    Quantum key distribution (QKD) provides an attractive solution for secure communication. However, channel disturbance severely limits its application when a QKD system is transferred from the laboratory to the field. Here a high-speed Faraday-Sagnac-Michelson QKD system is proposed that can automatically compensate for the channel polarization disturbance, which largely avoids the intermittency limitations of environment mutation. Over a 50 km fiber channel with 30 Hz polarization scrambling, the practicality of this phase-coding QKD system was characterized with an interference fringe visibility of 99.35% over 24 h and a stable secure key rate of 306 k bits/s over seven days without active polarization alignment.

  13. 75 FR 38779 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ... managing agencies to fill key conservation gaps in important ocean areas. DATES: Comments on the... conservation objectives of the Framework. Executive Order 13158 defines an MPA as: ``any area of the marine... term MPA as defined in the Framework refers only to the marine portion of a site (below the mean high...

  14. 13 CFR 120.837 - SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... new CDC or for an existing CDC to expand Area of Operations. 120.837 Section 120.837 Business Credit...) Extending A Cdc's Area of Operations § 120.837 SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations. The processing District Office must solicit the comments of any...

  15. 13 CFR 120.837 - SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... new CDC or for an existing CDC to expand Area of Operations. 120.837 Section 120.837 Business Credit...) Extending A Cdc's Area of Operations § 120.837 SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations. The processing District Office must solicit the comments of any...

  16. 13 CFR 120.837 - SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... new CDC or for an existing CDC to expand Area of Operations. 120.837 Section 120.837 Business Credit...) Extending A Cdc's Area of Operations § 120.837 SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations. The processing District Office must solicit the comments of any...

  17. 13 CFR 120.837 - SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... new CDC or for an existing CDC to expand Area of Operations. 120.837 Section 120.837 Business Credit...) Extending A Cdc's Area of Operations § 120.837 SBA decision on application for a new CDC or for an existing CDC to expand Area of Operations. The processing District Office must solicit the comments of any...

  18. Some Examples of the Applications of the Transonic and Supersonic Area Rules to the Prediction of Wave Drag

    NASA Technical Reports Server (NTRS)

    Nelson, Robert L.; Welsh, Clement J.

    1960-01-01

    The experimental wave drags of bodies and wing-body combinations over a wide range of Mach numbers are compared with the computed drags utilizing a 24-term Fourier series application of the supersonic area rule and with the results of equivalent-body tests. The results indicate that the equivalent-body technique provides a good method for predicting the wave drag of certain wing-body combinations at and below a Mach number of 1. At Mach numbers greater than 1, the equivalent-body wave drags can be misleading. The wave drags computed using the supersonic area rule are shown to be in best agreement with the experimental results for configurations employing the thinnest wings. The wave drags for the bodies of revolution presented in this report are predicted to a greater degree of accuracy by using the frontal projections of oblique areas than by using normal areas. A rapid method of computing wing area distributions and area-distribution slopes is given in an appendix.

  19. A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health.

    PubMed

    Zhang, G H; Poon, Carmen C Y; Zhang, Y T

    2010-01-01

    Body sensor networks (BSNs) have emerged as a new technology for healthcare applications, but the security of communication in BSNs remains a formidable challenge yet to be resolved. The paper discusses the typical attacks faced by BSNs and proposes a fast biometric based approach to generate keys for ensuing confidentiality and authentication in BSN communications. The approach was tested on 900 segments of electrocardiogram. Each segment was 4 seconds long and used to generate a 128-bit key. The results of the study found that entropy of 96% of the keys were above 0.95 and 99% of the hamming distances calculated from any two keys were above 50 bits. Based on the randomness and distinctiveness of these keys, it is concluded that the fast biometric based approach has great potential to be used to secure communication in BSNs for health applications.

  20. T@lemed: Ehealth applications applied to underserved areas in Latin America

    NASA Astrophysics Data System (ADS)

    Sachpazidis, Ilias; Ohl, Roland; Binotto, Alécio Pedro Delazari; Torres, Márcio Soares; Messina, Luiz Ary; Sales, Alexandre; Gomes, Ricardo; Sakas, Georgios

    2006-12-01

    Access to medical care is sometimes very difficult to be reached from people living in rural and underserved areas. This problem is very well known in rural areas in Brazil. Citizens have no access to health care. They have to travel hundreds of kilometres to receive medical care. In this paper, we will propose a medical network based on state-of-the-art medical imaging application that addresses the problems of providing health care from a distance. Additionally, we are going to show preliminarily results of the first year of the system deployment and utilization in undeserved regions in Brazil. The total number of patients submitted to ultrasound examinations, during the 10 months of projects' medical trials, is 321. The exams have begun with the elderly people (hypertension and diabetes cases) with 90% above 50-years-old. Fifty-four percent were male and 46% were female. From those exams, 67 exams (21%) needed a second medical opinion and were transmitted to Santa Casa hospital in Porto Alegre, Brazil, one of the referral medical centres. From those second opinions of Santa Casa, 12 exams had to be repeated since the acquired images were not sufficient to give a correct diagnosis. The Lagoa Tres Cantos medical doctor performed also preventive exams with patients who had not presented any symptoms (70%).

  1. Image-guided removal of supratentorial cavernomas in critical brain areas: application of neuronavigation and intraoperative magnetic resonance imaging.

    PubMed

    Gralla, J; Ganslandt, O; Kober, H; Buchfelder, M; Fahlbusch, R; Nimsky, C

    2003-04-01

    In a retrospective study the postoperative results of 26 patients operated on for supratentorial cavernous hemangiomas either deep-seated or near eloquent brain areas are summarized. An exact surgical approach to these lesions is essential to prevent neurological deterioration. Three different navigation systems were used and compared according to their clinical applicability. Complete removal of the lesion was obtained in all patients of this series. In six cases (23 %) functional data from magnetoencephalography or functional magnetic resonance imaging were integrated into the navigational setup. In 14 cases (54 %) intraoperative magnetic resonance imaging was performed. The follow-up time was 3 - 26 months (mean: 10 months). In the postoperative course one patient (3.8 %) developed a hemiparesis, another one developed quadrantopia. Nineteen patients presented with preoperative seizure history, 16 of these (84 %) had no further or rare seizures after surgery. The better results in seizure control were achieved in those patients with shorter duration of seizure history before surgery. The study indicates that the application of neuronavigation allows surgery on supratentorial cavernous hemangiomas in critical brain areas with low morbidity. The intraoperative visualization of eloquent cortex areas by integration of functional data allows a fast identification and exemption of eloquent brain areas, preventing neurological deterioration. Furthermore, the intraoperative MR resection control ensures a complete resection and illustrates the minimal invasive approach.

  2. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  3. SARS: Key factors in crisis management.

    PubMed

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  4. The key image and case log application: new radiology software for teaching file creation and case logging that incorporates elements of a social network.

    PubMed

    Rowe, Steven P; Siddiqui, Adeel; Bonekamp, David

    2014-07-01

    To create novel radiology key image software that is easy to use for novice users, incorporates elements adapted from social networking Web sites, facilitates resident and fellow education, and can serve as the engine for departmental sharing of interesting cases and follow-up studies. Using open-source programming languages and software, radiology key image software (the key image and case log application, KICLA) was developed. This system uses a lightweight interface with the institutional picture archiving and communications systems and enables the storage of key images, image series, and cine clips. It was designed to operate with minimal disruption to the radiologists' daily workflow. Many features of the user interface have been inspired by social networking Web sites, including image organization into private or public folders, flexible sharing with other users, and integration of departmental teaching files into the system. We also review the performance, usage, and acceptance of this novel system. KICLA was implemented at our institution and achieved widespread popularity among radiologists. A large number of key images have been transmitted to the system since it became available. After this early experience period, the most commonly encountered radiologic modalities are represented. A survey distributed to users revealed that most of the respondents found the system easy to use (89%) and fast at allowing them to record interesting cases (100%). Hundred percent of respondents also stated that they would recommend a system such as KICLA to their colleagues. The system described herein represents a significant upgrade to the Digital Imaging and Communications in Medicine teaching file paradigm with efforts made to maximize its ease of use and inclusion of characteristics inspired by social networking Web sites that allow the system additional functionality such as individual case logging. Copyright © 2014 AUR. Published by Elsevier Inc. All rights reserved.

  5. 40 CFR Table 1 to Subpart Gggggg... - Applicability of General Provisions to Primary Zinc Production Area Sources

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 15 2012-07-01 2012-07-01 false Applicability of General Provisions to Primary Zinc Production Area Sources 1 Table 1 to Subpart GGGGGG of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIE...

  6. 40 CFR Table 1 to Subpart Gggggg... - Applicability of General Provisions to Primary Zinc Production Area Sources

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 15 2014-07-01 2014-07-01 false Applicability of General Provisions to Primary Zinc Production Area Sources 1 Table 1 to Subpart GGGGGG of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIE...

  7. 40 CFR Table 1 to Subpart Gggggg... - Applicability of General Provisions to Primary Zinc Production Area Sources

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 15 2013-07-01 2013-07-01 false Applicability of General Provisions to Primary Zinc Production Area Sources 1 Table 1 to Subpart GGGGGG of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIE...

  8. Summary on several key techniques in 3D geological modeling.

    PubMed

    Mei, Gang

    2014-01-01

    Several key techniques in 3D geological modeling including planar mesh generation, spatial interpolation, and surface intersection are summarized in this paper. Note that these techniques are generic and widely used in various applications but play a key role in 3D geological modeling. There are two essential procedures in 3D geological modeling: the first is the simulation of geological interfaces using geometric surfaces and the second is the building of geological objects by means of various geometric computations such as the intersection of surfaces. Discrete geometric surfaces that represent geological interfaces can be generated by creating planar meshes first and then spatially interpolating; those surfaces intersect and then form volumes that represent three-dimensional geological objects such as rock bodies. In this paper, the most commonly used algorithms of the key techniques in 3D geological modeling are summarized.

  9. Summary on Several Key Techniques in 3D Geological Modeling

    PubMed Central

    2014-01-01

    Several key techniques in 3D geological modeling including planar mesh generation, spatial interpolation, and surface intersection are summarized in this paper. Note that these techniques are generic and widely used in various applications but play a key role in 3D geological modeling. There are two essential procedures in 3D geological modeling: the first is the simulation of geological interfaces using geometric surfaces and the second is the building of geological objects by means of various geometric computations such as the intersection of surfaces. Discrete geometric surfaces that represent geological interfaces can be generated by creating planar meshes first and then spatially interpolating; those surfaces intersect and then form volumes that represent three-dimensional geological objects such as rock bodies. In this paper, the most commonly used algorithms of the key techniques in 3D geological modeling are summarized. PMID:24772029

  10. British Military surgical key performance indicators: time for an update?

    PubMed

    Marsden, Max Er; Sharrock, A E; Hansen, C L; Newton, N J; Bowley, D M; Midwinter, M

    2016-10-01

    Key performance indicators (KPIs) are metrics that compare actual care against an ideal structure, process or outcome standard. KPIs designed to assess performance in deployed military surgical facilities have previously been published. This study aimed to review the overall performance of surgical trauma care for casualties treated at Role 3 Camp Bastion, Medical Treatment Facility, Afghanistan, in light of the existing Defence Medical Services (DMS) KPIs. The secondary aims were to assess the utility of the surgical KPIs and make recommendations for future surgical trauma care review. Data on 22 surgical parameters were prospectively collected for 150 injured patients who had primary surgery at Camp Bastion between 1 May 2013 and 20 August 2013. Additional information for these patients was obtained using the Joint Theatre Trauma Register. The authors assessed data recording, applicability and compliance with the KPIs. Median data recording was 100% (IQR 98%-100%), median applicability was 56% (IQR 10%-99%) and median compliance was 78% (IQR 58%-93%). One KPI was not applicable to any patient in our population. Eleven KPIs achieved >80% compliance, five KPIs had 80%-60% compliance and five KPIs had <60% compliance. Recommendations are made for minor modifications to the current KPIs. 78% compliance with the DMS KPIs provides a snapshot of the performance of the surgical aspect of military trauma care in 2013. The KPIs highlight areas for improvement in service delivery. Individual KPI development should be driven by evidence and reflect advances in practice and knowledge. A method of stakeholder consultation, and sequential refinement following evidence review, may be the right process to develop the future set of DMS KPIs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. Reduction of PM emissions from specific sources reflected on key components concentrations of ambient PM10

    NASA Astrophysics Data System (ADS)

    Minguillon, M. C.; Querol, X.; Monfort, E.; Alastuey, A.; Escrig, A.; Celades, I.; Miro, J. V.

    2009-04-01

    The relationship between specific particulate emission control and ambient levels of some PM10 components (Zn, As, Pb, Cs, Tl) was evaluated. To this end, the industrial area of Castellón (Eastern Spain) was selected, where around 40% of the EU glazed ceramic tiles and a high proportion of EU ceramic frits (middle product for the manufacture of ceramic glaze) are produced. The PM10 emissions from the ceramic processes were calculated over the period 2000 to 2007 taking into account the degree of implementation of corrective measures throughout the study period. Abatement systems (mainly bag filters) were implemented in the majority of the fusion kilns for frit manufacture in the area as a result of the application of the Directive 1996/61/CE, leading to a marked decrease in PM10 emissions. On the other hand, ambient PM10 sampling was carried out from April 2002 to July 2008 at three urban sites and one suburban site of the area and a complete chemical analysis was made for about 35 % of the collected samples, by means of different techniques (ICP-AES, ICP-MS, Ion Chromatography, selective electrode and elemental analyser). The series of chemical composition of PM10 allowed us to apply a source contribution model (Principal Component Analysis), followed by a multilinear regression analysis, so that PM10 sources were identified and their contribution to bulk ambient PM10 was quantified on a daily basis, as well as the contribution to bulk ambient concentrations of the identified key components (Zn, As, Pb, Cs, Tl). The contribution of the sources identified as the manufacture and use of ceramic glaze components, including the manufacture of ceramic frits, accounted for more than 65, 75, 58, 53, and 53% of ambient Zn, As, Pb, Cs and Tl levels, respectively (with the exception of Tl contribution at one of the sites). The important emission reductions of these sources during the study period had an impact on ambient key components levels, such that there was a high

  12. Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    NASA Astrophysics Data System (ADS)

    Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2018-04-01

    Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.

  13. The regulation of mobile medical applications.

    PubMed

    Yetisen, Ali Kemal; Martinez-Hurtado, J L; da Cruz Vasconcellos, Fernando; Simsekler, M C Emre; Akram, Muhammad Safwan; Lowe, Christopher R

    2014-03-07

    The rapidly expanding number of mobile medical applications have the potential to transform the patient-healthcare provider relationship by improving the turnaround time and reducing costs. In September 2013, the U.S. Food and Drug Administration (FDA) issued guidance to regulate these applications and protect consumers by minimising the risks associated with their unintended use. This guidance distinguishes between the subset of mobile medical apps which may be subject to regulation and those that are not. The marketing claims of the application determine the intent. Areas of concern include compliance with regular updates of the operating systems and of the mobile medical apps themselves. In this article, we explain the essence of this FDA guidance by providing examples and evaluating the impact on academia, industry and other key stakeholders, such as patients and clinicians. Our assessment indicates that awareness and incorporation of the guidelines into product development can hasten the commercialisation and market entry process. Furthermore, potential obstacles have been discussed and directions for future development suggested.

  14. Application of the shaped electrode technique to a large area rectangular capacitively coupled plasma reactor to suppress standing wave nonuniformity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sansonnens, L.; Schmidt, H.; Howling, A.A.

    The electromagnetic standing wave effect can become the main source of nonuniformity limiting the use of very high frequency in large area reactors exceeding 1 m{sup 2} required for industrial applications. Recently, it has been proposed and shown experimentally in a cylindrical reactor that a shaped electrode in place of the conventional flat electrode can be used in order to suppress the electromagnetic standing wave nonuniformity. In this study, we show experimental measurements demonstrating that the shaped electrode technique can also be applied in large area rectangular reactors. We also present results of electromagnetic screening by a conducting substrate whichmore » has important consequences for industrial application of the shaped electrode technique.« less

  15. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  16. Key Reading Recovery Strategies to Support Classroom Guided Reading Instruction

    ERIC Educational Resources Information Center

    Lipp, Jamie R.; Helfrich, Sara R.

    2016-01-01

    Effective teachers are continuously striving to improve their instruction. Reading Recovery teachers have detailed and specific literacy training and expertise that can be of great value to classroom teachers, especially in the area of guided reading instruction. This article explores the ways in which key Reading Recovery strategies can be…

  17. Glycopeptide Analysis, Recent Developments and Applications*

    PubMed Central

    Desaire, Heather

    2013-01-01

    Glycopeptide-based analysis is used to inform researchers about the glycans on one or more proteins. The method's key attractive feature is its ability to link glycosylation information to exact locations (glycosylation sites) on proteins. Numerous applications for glycopeptide analysis are known, and several examples are described herein. The techniques used to characterize glycopeptides are still emerging, and recently, research focused on facilitating aspects of glycopeptide analysis has advanced significantly in the areas of sample preparation, MS fragmentation, and automation of data analysis. These recent developments, described herein, provide the foundation for the growth of glycopeptide analysis as a blossoming field. PMID:23389047

  18. A free-access online key to identify Amazonian ferns.

    PubMed

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp.

  19. A free-access online key to identify Amazonian ferns

    PubMed Central

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    Abstract There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp. PMID:28781548

  20. Molecular similarity and diversity in chemoinformatics: from theory to applications.

    PubMed

    Maldonado, Ana G; Doucet, J P; Petitjean, Michel; Fan, Bo-Tao

    2006-02-01

    This review is dedicated to a survey on molecular similarity and diversity. Key findings reported in recent investigations are selectively highlighted and summarized. Even if this overview is mainly centered in chemoinformatics, applications in other areas (pharmaceutical and medical chemistry, combinatorial chemistry, chemical databases management, etc.) are also introduced. The approaches used to define and describe the concepts of molecular similarity and diversity in the context of chemoinformatics are discussed in the first part of this review. We introduce, in the second and third parts, the descriptions and analyses of different methods and techniques. Finally, current applications and problems are enumerated and discussed in the last part.

  1. [Further reduction of nitrogen fertilizer application in paddy field under green manuring of Taihu Area, China].

    PubMed

    Zhao, Dong; Yan, Ting-mei; Qiao, Jun; Yang, Lin-zhang; Tang, Fang; Song, Yun-fei

    2015-06-01

    This study focused on the nitrogen loss via runoff, change of nitrogen in different forms in surface water in paddy field, and grain yield, through further reduction of nitrogen fertilizer application rate under green manuring without basal dressing. Results showed that with 150 kg · hm(-2) inorganic N fertilizer input after return of green manure to soil, no basal dressing could not only sharply reduce N concentration in surface water and decrease 17.2% of N loss, but also increase 2.8% of grain yield in comparison with basal dressing. It was a worthwhile farming method that inorganic nitrogen fertilizer was not used for basal dressing but for topdressing after return of green ma- nure to soil in Taihu Area. However, the grain yield would decrease if the rate of topdressing nitro- gen was excessively reduced or increased. After all, it was feasible to realize harmonization of grain yield and environmental benefits in Taihu Area, with 133 kg · hm(-2) inorganic N fertilizer input after return of green manure to soil as well as no application of basal dressing, which could greatly reduce N fertilizer input and N loss as well as ensure rice yield.

  2. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    PubMed

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  3. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    PubMed Central

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-01-01

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized. PMID:23974152

  4. Locally acquired Dengue--Key West, Florida, 2009-2010.

    PubMed

    2010-05-21

    Dengue is the most common vector-borne viral disease in the world, causing an estimated 50-100 million infections and 25,000 deaths each year. During 1946-1980, no cases of dengue acquired in the continental United States were reported. Since 1980, a few locally acquired U.S. cases have been confirmed along the Texas-Mexico border, temporally associated with large outbreaks in neighboring Mexican cities. On September 1, 2009, a New York physician notified the Monroe County (Florida) Health Department (MCHD) and the Florida Department of Health (FDOH) of a suspected dengue case in a New York state resident whose only recent travel was to Key West, Florida. CDC confirmed the diagnosis, and a press release was issued to notify the public and Key West physicians of the potential risk for locally acquired dengue infections. In the next 2 weeks, two dengue infections in Key West residents without recent travel were reported and confirmed. Subsequently, enhanced and active surveillance identified 24 more Key West cases during 2009. On April 13, 2010, another Key West dengue case was reported to FDOH, bringing the total to 28. This report describes the first three dengue cases reported in 2009, briefly summarizes the 2010 case, highlights preliminary findings from the ongoing investigation, and outlines measures used to mitigate and control the outbreak. Clinicians should include dengue in the differential diagnosis of acute febrile illnesses in patients who live in or have recently traveled to subtropical areas of the United States or to the tropics.

  5. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  6. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  7. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  8. Application Of Optical Techniques To Command, Control, And Communications (C3) Systems

    NASA Astrophysics Data System (ADS)

    Weinberg, M.; Steensma, P. D.

    1981-02-01

    This paper identifies and discusses specific applications of the optical transmission technology to various Command Control and Communications (C3) systems. Candidate C3 systems will first be identified and discussed briefly. These will include: 407L/485L Tactical Air Defense Systems (USAF) TAOC-85 Tactical Air Operations Central (USMC) SACDIN Strategic Air Command Digital Integrated Network (USAF) MX-C3 Missile "X" Command Control Communications Network The first tr are classified as tactical C3 systems while the latter two are classified as strategic C systems. Potential optical applications will be identified along with the benefits derived. Each application will be discussed with key parameters, cost performance benefits, potential problem areas, time frame for development identified.

  9. Quantum key distribution for composite dimensional finite systems

    NASA Astrophysics Data System (ADS)

    Shalaby, Mohamed; Kamal, Yasser

    2017-06-01

    The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.

  10. Review of key concepts in magnetic resonance physics.

    PubMed

    Moore, Michael M; Chung, Taylor

    2017-05-01

    MR physics can be a challenging subject for practicing pediatric radiologists. Although many excellent texts provide very comprehensive reviews of the field of MR physics at various levels of understanding, the authors of this paper explain several key concepts in MR physics that are germane to clinical practice in a non-rigorous but practical fashion. With the basic understanding of these key concepts, practicing pediatric radiologists can build on their knowledge of current clinical MR techniques and future advances in MR applications. Given the challenges of both the increased need for rapid imaging in non-sedated children and the rapid physiological cardiovascular and respiratory motion in pediatric patients, many advances in complex MR techniques are being applied to imaging these children. The key concepts are as follows: (1) structure of a pulse sequence, (2) k-space, (3) "trade-off triangle" and (4) fat suppression. This review is the first of five manuscripts in a minisymposium on pediatric MR. The authors' goal for this review is to aid in understanding the MR techniques described in the subsequent manuscripts on brain imaging and body imaging in this minisymposium.

  11. Environmental assessment of applicability of mineral-organic composite for landfill area rehabilitation

    NASA Astrophysics Data System (ADS)

    Mizerna, Kamila; Król, Anna; Mróz, Adrian

    2017-10-01

    This paper undertakes an assessment of the impact of a mineral-organic composite on the environment as well as the potential for its application for land rehabilitation purposes. The analysis involves the release of the leachable contaminations from the material subjected to testing. This material was formed by a composite manufactured on the basis of communal bottom ash and stabilized sewage sludge. The sludge resulting from wastewater treatment was subjected to stabilization and dehydration in waste pounds at the phase of pre-watering until 20% of dry mass is obtained. Subsequently, they were mixed with bottom ash, which was obtained from selective waste collection, in a 1:1 mass ratio. The analysis involved the leaching of inorganic contaminants in the form of heavy metals, sulphates (VI), chlorides, and fluorides as well as organic compounds in the form of organic carbon solution under the effect of leachant with a various level of pH. The analysed components were characterized by various leaching behaviour depending on the leachant pH. On the basis of the results, it was able to assess the potential hazard posed by the examined material on the environment as a consequence of its application for landfill area rehabilitation.

  12. Privacy authentication using key attribute-based encryption in mobile cloud computing

    NASA Astrophysics Data System (ADS)

    Mohan Kumar, M.; Vijayan, R.

    2017-11-01

    Mobile Cloud Computing is becoming more popular in nowadays were users of smartphones are getting increased. So, the security level of cloud computing as to be increased. Privacy Authentication using key-attribute based encryption helps the users for business development were the data sharing with the organization using the cloud in a secured manner. In Privacy Authentication the sender of data will have permission to add their receivers to whom the data access provided for others the access denied. In sender application, the user can choose the file which is to be sent to receivers and then that data will be encrypted using Key-attribute based encryption using AES algorithm. In which cipher created, and that stored in Amazon Cloud along with key value and the receiver list.

  13. Seismic sample areas defined from incomplete catalogues: an application to the Italian territory

    NASA Astrophysics Data System (ADS)

    Mulargia, F.; Tinti, S.

    1985-11-01

    The comprehensive understanding of earthquake source-physics under real conditions requires the study not of single faults as separate entities but rather of a seismically active region as a whole, accounting for the interaction among different structures. We define "seismic sample area" the most convenient region to be used as a natural laboratory for the study of seismic source physics. This coincides with the region where the average large magnitude seismicity is the highest. To this end, time and space future distributions of large earthquakes are to be estimated. Using catalog seismicity as an input, the rate of occurrence is not constant but appears generally biased by incompleteness in some parts of the catalog and possible nonstationarities in seismic activity. We present a statistical procedure which is capable, under a few mild assumptions, of both detecting nonstationarities in seismicity and finding the incomplete parts of a seismic catalog. The procedure is based on Kolmogorov-Smirnov nonparametric statistics, and can be applied without a priori assuming the parent distribution of the events. The efficiency of this procedure allows the analysis of small data sets. An application to the Italian territory is presented, using the most recent version of the ENEL seismic catalog. Seismic activity takes place in six well defined areas but only five of them have a number of events sufficient for analysis. Barring a few exceptions, seismicity is found stationary throughout the whole catalog span 1000-1980. The eastern Alps region stands out as the best "sample area", with the highest average probability of event occurrence per time and area unit. Final objective of this characterization is to stimulate a program of intensified research.

  14. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  15. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  16. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  17. Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks.

    PubMed

    Van Torre, Patrick

    2016-09-08

    Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption. Body-worn sensor networks are deployed in conditions where the wireless communication channel varies dramatically due to fading and shadowing, which is considered a disadvantage for communication. Interestingly, these channel variations can be employed to extract a common encryption key at both sides of the link. Legitimate users share a unique physical channel and the variations thereof provide data series on both sides of the link, with highly correlated values. An eavesdropper, however, does not share this physical channel and cannot extract the same information when intercepting the signals. This paper documents a practical wearable communication system implementing channel-based key generation, including an implementation and a measurement campaign comprising indoor as well as outdoor measurements. The results provide insight into the performance of channel-based key generation in realistic practical conditions. Employing a process known as key reconciliation, error free keys are generated in all tested scenarios. The key-generation system is computationally simple and therefore compatible with the low-power micro controllers and low-data rate transmissions commonly used in wireless sensor networks.

  18. Application and analysis of debris-flow early warning system in Wenchuan earthquake-affected area

    NASA Astrophysics Data System (ADS)

    Liu, D. L.; Zhang, S. J.; Yang, H. J.; Zhao, L. Q.; Jiang, Y. H.; Tang, D.; Leng, X. P.

    2016-02-01

    The activities of debris flow (DF) in the Wenchuan earthquake-affected area significantly increased after the earthquake on 12 May 2008. The safety of the lives and property of local people is threatened by DFs. A physics-based early warning system (EWS) for DF forecasting was developed and applied in this earthquake area. This paper introduces an application of the system in the Wenchuan earthquake-affected area and analyzes the prediction results via a comparison to the DF events triggered by the strong rainfall events reported by the local government. The prediction accuracy and efficiency was first compared with a contribution-factor-based system currently used by the weather bureau of Sichuan province. The storm on 17 August 2012 was used as a case study for this comparison. The comparison shows that the false negative rate and false positive rate of the new system is, respectively, 19 and 21 % lower than the system based on the contribution factors. Consequently, the prediction accuracy is obviously higher than the system based on the contribution factors with a higher operational efficiency. On the invitation of the weather bureau of Sichuan province, the authors upgraded their prediction system of DF by using this new system before the monsoon of Wenchuan earthquake-affected area in 2013. Two prediction cases on 9 July 2013 and 10 July 2014 were chosen to further demonstrate that the new EWS has high stability, efficiency, and prediction accuracy.

  19. Numerical Investigation of a Chip Printed Antenna Performances for Wireless Implantable Body Area Network Applications

    NASA Astrophysics Data System (ADS)

    Ramli, N. H.; Jaafar, H.; Lee, Y. S.

    2018-03-01

    Recently, wireless implantable body area network (WiBAN) system become an active area of research due to their various applications such as healthcare, support systems for specialized occupations and personal communications. Biomedical sensors networks mounted in the human body have drawn greater attention for health care monitoring systems. The implantable chip printed antenna for WiBAN applications is designed and the antenna performances is investigated in term of gain, efficiency, return loss, operating bandwidth and radiation pattern at different environments. This paper is presents the performances of implantable chip printed antenna in selected part of human body (hand, chest, leg, heart and skull). The numerical investigation is done by using human voxel model in built in the CST Microwave Studio Software. Results proved that the chip printed antenna is suitable to implant in the human hand model. The human hand model has less complex structure as it consists of skin, fat, muscle, blood and bone. Moreover, the antenna is implanted under the skin. Therefore the signal propagation path length to the base station at free space environment is considerably short. The antenna’s gain, efficiency and Specific Absorption Rate (SAR) are - 13.62dBi, 1.50 % and 0.12 W/kg respectively; which confirms the safety of the antenna usage. The results of the investigations can be used as guidance while designing chip implantable antenna in future.

  20. Scaling-up HIV responses with key populations in West Africa.

    PubMed

    Wheeler, Tisha; Wolf, R Cameron; Kapesa, Laurent; Cheng Surdo, Alison; Dallabetta, Gina

    2015-03-01

    Despite decades of HIV responses in pockets of West and Central Africa (WCA), the HIV response with key populations remains an understudied area. Recently, there has been a proliferation of studies highlighting epidemiologic and behavioral data that challenge attitudes of complacency among donors and country governments uncomfortable in addressing key populations. The articles in this series highlight new studies that provide a better understanding of the epidemiologic and structural burden facing key populations in the WCA region and how to improve responses through more effective targeting. Key populations face pervasive structural barriers including institutional and sexual violence and an intersection of stigma, criminalization, and marginalization as sexual minorities. Despite decades of smaller interventions that have shown the importance of integrated services for key populations, there remains incongruent provision of outreach or testing or family planning pointing to sustained risk. There remains an incongruent resource provision for key populations where they shoulder the burden of HIV and their access to services alone could turn around HIV epidemics within the region. These proximal and distal determinants must be addressed in regional efforts, led by the community, and resourced for scale, targeting those most at risk for the acquisition and transmission of HIV. This special issue builds the knowledge base for the region focusing on interventions that remove barriers to service access including treatment uptake for those living with HIV. Better analysis and use of data for strategic planning are shown to lead to more effective targeting of prevention, care, and HIV treatment programs with key populations. These articles further demonstrate the immediate need for comprehensive action to address HIV among key populations throughout the WCA region.

  1. Illustrated Key to Skins and Skulls of Bats in the Southeastern and Mid-Atlantic States

    Treesearch

    Michael A. Menzel; Jennifer M. Menzel; Steven B. Castleberry; James Ozier; W. Mark Ford; John W. Edwards

    2002-01-01

    In teaching students and technicians how to identify the skins and skulls of southeastern bats in the field and laboratory, it was necessary to develop an illustrated key that makes identification both easy and reliable. Many of the existing keys are poorly illustrated, include bat species that are not applicable, and/or contain univariate discriminatory measurements...

  2. Therapeutic clinical applications of reactor-produced radioisotopes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knapp, F.F. Jr.

    1997-12-01

    One of the most rapidly growing areas of clinical nuclear medicine is the therapeutic use of radioisotopes for applications in oncology, rheumatology and, more recently, interventional cardiology. With the rapidly increasing development and evaluation of new agents, their introduction into clinical use, and commercialization, the availability of high levels of therapeutic reactor-produced neutron-rich radioisotopes is of increasing importance. The goals of this paper are to discuss the issues associated with optimization of the production and processing of reactor-produced radioisotopes for therapy, with special emphasis on {sup 188}W, and the optimization of the use of the {sup 188}W/{sup 188}Re generator. Inmore » addition, other key examples of therapeutic radioisotopes of current interest and their specific clinical applications are discussed.« less

  3. Environmental risk analysis of oil handling facilities in port areas. Application to Tarragona harbor (NE Spain).

    PubMed

    Valdor, Paloma F; Gómez, Aina G; Puente, Araceli

    2015-01-15

    Diffuse pollution from oil spills is a widespread problem in port areas (as a result of fuel supply, navigation and loading/unloading activities). This article presents a method to assess the environmental risk of oil handling facilities in port areas. The method is based on (i) identification of environmental hazards, (ii) characterization of meteorological and oceanographic conditions, (iii) characterization of environmental risk scenarios, and (iv) assessment of environmental risk. The procedure has been tested by application to the Tarragona harbor. The results show that the method is capable of representing (i) specific local pollution cases (i.e., discriminating between products and quantities released by a discharge source), (ii) oceanographic and meteorological conditions (selecting a representative subset data), and (iii) potentially affected areas in probabilistic terms. Accordingly, it can inform the design of monitoring plans to study and control the environmental impact of these facilities, as well as the design of contingency plans. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Numerical model validation using experimental data: Application of the area metric on a Francis runner

    NASA Astrophysics Data System (ADS)

    Chatenet, Q.; Tahan, A.; Gagnon, M.; Chamberland-Lauzon, J.

    2016-11-01

    Nowadays, engineers are able to solve complex equations thanks to the increase of computing capacity. Thus, finite elements software is widely used, especially in the field of mechanics to predict part behavior such as strain, stress and natural frequency. However, it can be difficult to determine how a model might be right or wrong, or whether a model is better than another one. Nevertheless, during the design phase, it is very important to estimate how the hydroelectric turbine blades will behave according to the stress to which it is subjected. Indeed, the static and dynamic stress levels will influence the blade's fatigue resistance and thus its lifetime, which is a significant feature. In the industry, engineers generally use either graphic representation, hypothesis tests such as the Student test, or linear regressions in order to compare experimental to estimated data from the numerical model. Due to the variability in personal interpretation (reproducibility), graphical validation is not considered objective. For an objective assessment, it is essential to use a robust validation metric to measure the conformity of predictions against data. We propose to use the area metric in the case of a turbine blade that meets the key points of the ASME Standards and produces a quantitative measure of agreement between simulations and empirical data. This validation metric excludes any belief and criterion of accepting a model which increases robustness. The present work is aimed at applying a validation method, according to ASME V&V 10 recommendations. Firstly, the area metric is applied on the case of a real Francis runner whose geometry and boundaries conditions are complex. Secondly, the area metric will be compared to classical regression methods to evaluate the performance of the method. Finally, we will discuss the use of the area metric as a tool to correct simulations.

  5. 36 CFR 223.190 - Sourcing area application procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... manufacturing facility that processes Federal timber and who is an exporter may apply for a sourcing area... within the proposed sourcing area where the person intends to process timber originating from Federal... knowledge concerning my timber purchasing and export patterns. I certify that the information provided...

  6. Bend-insensitive single-mode photonic crystal fiber with ultralarge effective area for dual applications

    NASA Astrophysics Data System (ADS)

    Islam, Md. Asiful; Alam, M. Shah

    2013-05-01

    A novel photonic crystal fiber (PCF) having circular arrangement of cladding air holes has been designed and numerically optimized to obtain a bend insensitive single mode fiber with large mode area for both wavelength division multiplexing (WDM) communication and fiber-to-the-home (FTTH) application. The bending loss of the proposed bent PCF lies in the range of 10-3 to 10-4 dB/turn or lower over 1300 to 1700 nm, and 2 × 10-4 dB/turn at the wavelength of 1550 nm for a 30-mm bend radius with a higher order mode (HOM) cut-off frequency below 1200 nm for WDM application. When the whole structure of the PCF is scaled down, a bending loss of 6.78×10-4 dB/turn at 1550 nm for a 4-mm bend radius is obtained, and the loss remains in the order of 10-4 dB/turn over the same range of wavelength with an HOM cut-off frequency below 700 nm, and makes the fiber useful for FTTH applications. Furthermore, this structure is also optimized to show a splice loss near zero for fusion-splicing to a conventional single-mode fiber (SMF).

  7. Ares Knowledge Capture: Summary and Key Themes Presentation

    NASA Technical Reports Server (NTRS)

    Coates, Ralph H.

    2011-01-01

    This report has been developed by the National Aeronautics and Space Administration (NASA) Human Exploration and Operations Mission Directorate (HEOMD) Risk Management team in close coordination with the MSFC Chief Engineers Office. This document provides a point-in-time, cumulative, summary of actionable key lessons learned derived from the design project. Lessons learned invariably address challenges and risks and the way in which these areas have been addressed. Accordingly the risk management thread is woven throughout the document.

  8. [Key content and formulation of national Chinese materia medica resources survey at county level].

    PubMed

    Lu, Jian-Wei; Zhang, Xiao-Bo; Li, Hai-Tao; Guo, Lan-Ping; Zhao, Run-Huai; Zhang, Ben-Gang; Sun, Li-Ying; Huang, Lu-Qi

    2013-08-01

    According to National Census for Water, National Population Census, National Land and Resources Survey, and work experience of experimental measures for national Chinese materia medica resources(CMMR) survey,the national CMMR survey at the county level is the key point of whole survey, that includes organization and management, field survey, sorting data three key links. Organization and management works of national CMMR survey needs to finish four key contents, there are definite goals and tasks, practicable crew, preparation directory, and security assurance. Field survey works of the national CMMR survey needs to finish five key contents, there are preparation works for field survey, the choice of the key survey area (samples), fill in the questionnaire, video data collection, specimen and other physical collection. Sorting data works of the national CMMR survey needs to finish tree key contents, there are data, specimen and census results.

  9. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  10. Predicting materials for sustainable energy sources: The key role of density functional theory

    NASA Astrophysics Data System (ADS)

    Galli, Giulia

    Climate change and the related need for sustainable energy sources replacing fossil fuels are pressing societal problems. The development of advanced materials is widely recognized as one of the key elements for new technologies that are required to achieve a sustainable environment and provide clean and adequate energy for our planet. We discuss the key role played by Density Functional Theory, and its implementations in high performance computer codes, in understanding, predicting and designing materials for energy applications.

  11. Web Application for Coastal Area Planning through Analysis of Landslide and Soil Consumption

    NASA Astrophysics Data System (ADS)

    Panizzoni, Giulio; Debiasi, Alberto; Eccher, Matteo; De Amicis, Raffaele

    2016-04-01

    Global warming and rapid climatic changes are producing dramatic effects on coastal area of Mediterranean countries. Italian coastal areas are one of the most urbanized zones of the south western Europe and the extensive use of soil is causing a consistent impact on the hydrogeological context. Moreover, soil consumption combined with extreme meteorological events, facilitates the occurrence of hazardous landslide events. Environmental policy makers and data managers in territorial planning need to face such emergency situation with appropriate tools. We present an application service with the aim of advising user through environmental analysis of Landslide and Soil Consumption impact. This service wants also to improve the sharing of environmental harmonized datasets/metadata across different organizations and the creation of a collaborative environment where the stakeholders and environmental experts can share their data and work cooperatively. We developed a set of processing services providing functionalities to assess impact of landslide on territory and impact of land take and soil sealing. Among others, the service is able to evaluate environmental impacts of landslide events on Cultural Heritage sites. We have also designed a 3D WebGL client customized to execute the processing services and visualize their outputs. It provides high usability in terms of navigation and data visualization. In this way the service provides not only a Spatial Data Infrastructure to access and visualize data but a complete Decision Support Systems for a more effective environmental planning of coastal area.

  12. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  13. mHealth Application Areas and Technology Combinations*. A Comparison of Literature from High and Low/Middle Income Countries.

    PubMed

    Abaza, Haitham; Marschollek, Michael

    2017-08-08

    With the continuous and enormous spread of mobile technologies, mHealth has evolved as a new subfield of eHealth. While eHealth is broadly focused on information and communication technologies, mHealth seeks to explore more into mobile devices and wireless communication. Since mobile phone penetration has exceeded other infrastructure in low and middle-income countries (LMICs), mHealth is seen as a promising component to provide pervasive and patient-centered care. The aim of our research work for this paper is to examine the mHealth literature to identify application areas, target diseases, and mHealth service and technology types that are most appropriate for LMICs. Based on the 2011 WHO mHealth report, a combination of search terms, all including the word "mHealth", was identified. A literature review was conducted by searching the PubMed and IEEE Xplore databases. Articles were included if they were published in English, covered an mHealth solution/ intervention, involved the use of a mobile communication device, and included a pilot evaluation study. Articles were excluded if they did not provide sufficient detail on the solution covered or did not focus on clinical efficacy/effectiveness. Cross-referencing was also performed on included articles. 842 articles were retrieved and analyzed, 255 of which met the inclusion criteria. North America had the highest number of applications (n=74) followed by Europe (n=50), Asia (n=44), Africa (n=25), and Australia (n=9). The Middle East (n=5) and South America (n=3) had the least number of studies. The majority of solutions addressed diabetes (n=51), obesity (n=25), CVDs (n=24), HIV (n=18), mental health (n=16), health behaviors (n=16), and maternal and child's health (MCH) (n=11). Fewer solutions addressed asthma (n=7), cancer (n=5), family health planning (n=5), TB (n=3), malaria (n=2), chronic obtrusive pulmonary disease (COPD) (n=2), vision care (n=2), and dermatology (n=2). Other solutions targeted stroke, dental

  14. Heavy Precipitation impacts and emergency planning - developing applicable strategies for a metropolitan area

    NASA Astrophysics Data System (ADS)

    Kutschker, Thomas; Glade, Thomas

    2016-04-01

    Heavy rainfall in central Europe is one of the assumed effects of climate change, which occurs with large seasonal and regional differences in its magnitude. The extent of loss depends on natural parameters (e.g. topography and vegetation) as well as on socio-economic factors like urbanized and industrialized areas and population density. Dangerous cascade effects appear, if critical infrastructure like the electrical power supply is affected. In some cases mudflows and flash floods cause inundated or undercut roads and cause a high demand for fast and effective assistance of the authorities. The civil protection in Germany is based on a federal system with a bottom-up command-structure and responsibility to the local community. Commonly this responsibility is taken by the fire brigades and civil protection units of the community or district. After heavy rainfall in an urban area, numerous incidents and emergency calls appearing at a time are overstressing the human and technical resources of the fire brigades within the local authority frequently. In this study, a method of comprehensive evaluation of meteorological data and the operation data from local fire brigades shall be developed for the Rhine-Main-Area in order to identify particular affected spots of heavy rain and bundle resources of the fire brigades. It is to be found out if the study area contains regions with a particularly high exposure to heavy rain and high application numbers of the fire department and whether there is a relationship of rainfall and frequency of use. To evaluate particular local effects on the fire brigades capability, a brief analysis of the meteorological data provided by the German Meteorological Service (DWD) as well as the evaluation of the incident data of the affected fire brigades, is used to frame a realistic approach. In particular fire brigade operation data can be used accordingly to describe the intensity of the aftermath when heavy precipitation strikes a certain

  15. Key issues in application of composites to transport aircraft

    NASA Technical Reports Server (NTRS)

    Stone, M.

    1978-01-01

    The application of composite materials to transport aircraft was identified and reviewed including the major contributing disciplines of design, manufacturing, and processing. Factors considered include: crashworthiness considerations (structural integrity, postcrash fires, and structural fusing), electrical/avionics subsystems integration, lightning, and P-static protection design; manufacturing development, evaluation, selection, and refining of tooling and curing procedures; and major joint design considerations. Development of the DC-10 rudder, DC-10 vertical stabilizer, and the DC-9 wing study project was reviewed. The Federal Aviation Administration interface and the effect on component design of compliance with Federal Aviation Regulation 25 Composite Guidelines are discussed.

  16. Atmospheric Propagation of High Energy Lasers and Applications

    NASA Astrophysics Data System (ADS)

    Cook, Joung R.

    2005-04-01

    It has been over forty years since the invention of the laser, which has inspired the imagination of scientists and science fiction writers alike. Many ideas have been realized, still many remain as dreams, and new ones are still being conceived. The High Energy Laser (HEL) has been associated with weapon applications during the past three decades. Much of the same technology can be directly applied to power beaming, laser propulsion, and other potential remote energy and power transfer applications. Economically, these application areas are becoming increasingly more viable. This paper reviews the evolutionary history of the HEL device technologies. It points out the basic system components and layouts with associated key technologies that drive the effectiveness and efficiency of the system level performance. It describes the fundamental properties and wavelength dependencies of atmospheric propagation that in turn have become the prescription for wavelength properties that are desired from the device.

  17. Assessing trail conditions in protected areas: Application of a problem-assessment method in Great Smoky Mountains National Park, USA

    USGS Publications Warehouse

    Leung, Y.-F.; Marion, J.

    1999-01-01

    The degradation of trail resources associated with expanding recreation and tourism visitation is a growing management problem in protected areas worldwide. In order to make judicious trail and visitor management decisions, protected area managers need objective and timely information on trail resource conditions. This paper introduces a trail survey method that efficiently characterizes the lineal extent of common trail problems. The method was applied to a large sample of trails within Great Smoky Mountains National Park, a highuse protected area in the USA. The Trail ProblemAssessment Method (TPAM) employs a continuous search for multiple indicators of predefined tread problems, yielding census data documenting the location, occurrence and extent of each problem. The present application employed 23 different indicators in three categories to gather inventory, resource condition, and design and maintenance data of each surveyed trail. Seventy-two backcountry hiking trails (528 km), or 35% of the Park's total trail length, were surveyed. Soil erosion and wet soil were found to be the two most common impacts on a lineal extent basis. Trails with serious tread problems were well distributed throughout the Park, although wet muddy treads tended to be concentrated in areas where horse use was high. The effectiveness of maintenance features installed to divert water from trail treads was also evaluated. Water bars were found to be more effective than drainage dips. The TPAM was able to provide Park managers with objective and quantitative information for use in trail planning, management and maintenance decisions, and is applicable to other protected areas elsewhere with different environmental and impact characteristics.

  18. Key Findings from the U.S.-India Partnership for Climate Resilience Workshop on Development and Application of Downscaling Climate Projections

    NASA Astrophysics Data System (ADS)

    Kunkel, K.; Dissen, J.; Easterling, D. R.; Kulkarni, A.; Akhtar, F. H.; Hayhoe, K.; Stoner, A. M. K.; Swaminathan, R.; Thrasher, B. L.

    2017-12-01

    s part of the Department of State U.S.-India Partnership for Climate Resilience (PCR), scientists from NOAA NCEI, CICS-NC, Texas Tech University (TTU), Stanford University (SU), and the Indian Institute of Tropical Meteorology (IITM) held a workshop at IITM in Pune, India during 7-9 March 2017 on the development, techniques and applications of downscaled climate projections. Workshop participants from TTU, SU, and IITM presented state-of-the-art climate downscaling techniques using the ARRM method, NASA NEX climate products, CORDEX-South Asia and analysis tools for resilience planning and sustainable development. PCR collaborators in attendance included Indian practitioners, researchers and other NGO including the WRI Partnership for Resilience and Preparedness (PREP), The Energy and Resources Institute (TERI), and NIH. The scientific techniques were provided to workshop participants in a software package written in R by TTU scientists and several sessions were devoted to hands-on experience with the software package. The workshop further examined case studies on the use of downscaled climate data for decision making in a range of sectors, including human health, agriculture, and water resources management as well as to inform the development of the India State Action Plans. This talk will discuss key outcomes including information needs for downscaling climate projections, importance of QA/QC of the data, key findings from select case studies, and the importance of collaborations and partnerships to apply downscaling projections to help inform the development of the India State Action Plans.

  19. Chemical thermodynamic data. 1. The concept of links to the chemical elements and the historical development of key thermodynamic data [plus Supplementary Electronic Annex 2

    DOE PAGES

    Wolery, Thomas J.; Jove Colon, Carlos F.

    2016-09-26

    Chemical thermodynamic data remain a keystone for geochemical modeling and reactive transport simulation as applied to an increasing number of applications in the earth sciences, as well as applications in other areas including metallurgy, material science, and industrial process design. The last century has seen the development of a large body of thermodynamic data and a number of major compilations. The past several decades have seen the development of thermodynamic databases in digital form designed to support computer calculations. However, problems with thermodynamic data appear to be persistent. One problem pertains to the use of inconsistent primary key reference data.more » Such data pertain to elemental reference forms and key, stoichiometrically simple chemical species including metal oxides, CO 2, water, and aqueous species such as Na + and Cl -. A consistent set of primary key data (standard Gibbs energies, standard enthalpies, and standard entropies for key chemical species) for 298.15K and 1 bar pressure is essential. Thermochemical convention is to define the standard Gibbs energy and the standard enthalpy of an individual chemical species in terms of formation from reference forms of the constituent chemical elements. We propose a formal concept of “links” to the elemental reference forms. This concept involves a documented understanding of all reactions and calculations leading to values for a formation property (standard Gibbs energy or enthalpy). A valid link consists of two parts: (a) the path of reactions and corrections and (b) the associated data, which are key data. Such a link differs from a bare “key” or “reference” datum in that it requires additional information. Some or all of its associated data may also be key data. In evaluating a reported thermodynamic datum, one should identify the links to the chemical elements, a process which can be time-consuming and which may lead to a dead end (an incomplete link). The use of

  20. Chemical thermodynamic data. 1. The concept of links to the chemical elements and the historical development of key thermodynamic data [plus Supplementary Electronic Annex 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wolery, Thomas J.; Jove Colon, Carlos F.

    Chemical thermodynamic data remain a keystone for geochemical modeling and reactive transport simulation as applied to an increasing number of applications in the earth sciences, as well as applications in other areas including metallurgy, material science, and industrial process design. The last century has seen the development of a large body of thermodynamic data and a number of major compilations. The past several decades have seen the development of thermodynamic databases in digital form designed to support computer calculations. However, problems with thermodynamic data appear to be persistent. One problem pertains to the use of inconsistent primary key reference data.more » Such data pertain to elemental reference forms and key, stoichiometrically simple chemical species including metal oxides, CO 2, water, and aqueous species such as Na + and Cl -. A consistent set of primary key data (standard Gibbs energies, standard enthalpies, and standard entropies for key chemical species) for 298.15K and 1 bar pressure is essential. Thermochemical convention is to define the standard Gibbs energy and the standard enthalpy of an individual chemical species in terms of formation from reference forms of the constituent chemical elements. We propose a formal concept of “links” to the elemental reference forms. This concept involves a documented understanding of all reactions and calculations leading to values for a formation property (standard Gibbs energy or enthalpy). A valid link consists of two parts: (a) the path of reactions and corrections and (b) the associated data, which are key data. Such a link differs from a bare “key” or “reference” datum in that it requires additional information. Some or all of its associated data may also be key data. In evaluating a reported thermodynamic datum, one should identify the links to the chemical elements, a process which can be time-consuming and which may lead to a dead end (an incomplete link). The use of

  1. Projections of change in key ecosystem indicators for planning and management of marine protected areas: An example study for European seas

    NASA Astrophysics Data System (ADS)

    Kay, Susan; Butenschön, Momme

    2018-02-01

    Marine Protected Areas (MPAs) are widely used as tools to maintain biodiversity, protect habitats and ensure that development is sustainable. If MPAs are to maintain their role into the future it is important for managers to understand how conditions at these sites may change as a result of climate change and other drivers, and this understanding needs to extend beyond temperature to a range of key ecosystem indicators. This case study demonstrates how spatially-aggregated model results for multiple variables can provide useful projections for MPA planners and managers. Conditions in European MPAs have been projected for the 2040s using unmitigated and globally managed scenarios of climate change and river management, and hence high and low emissions of greenhouse gases and riverborne nutrients. The results highlight the vulnerability of potential refuge sites in the north-west Mediterranean and the need for careful monitoring at MPAs to the north and west of the British Isles, which may be affected by changes in Atlantic circulation patterns. The projections also support the need for more MPAs in the eastern Mediterranean and Adriatic Sea, and can inform the selection of sites.

  2. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  3. Application of SAXS and SANS in evaluation of porosity, pore size distribution and surface area of coal

    USGS Publications Warehouse

    Radlinski, A.P.; Mastalerz, Maria; Hinde, A.L.; Hainbuchner, M.; Rauch, H.; Baron, M.; Lin, J.S.; Fan, L.; Thiyagarajan, P.

    2004-01-01

    This paper discusses the applicability of small angle X-ray scattering (SAXS) and small angle neutron scattering (SANS) techniques for determining the porosity, pore size distribution and internal specific surface area in coals. The method is noninvasive, fast, inexpensive and does not require complex sample preparation. It uses coal grains of about 0.8 mm size mounted in standard pellets as used for petrographic studies. Assuming spherical pore geometry, the scattering data are converted into the pore size distribution in the size range 1 nm (10 A??) to 20 ??m (200,000 A??) in diameter, accounting for both open and closed pores. FTIR as well as SAXS and SANS data for seven samples of oriented whole coals and corresponding pellets with vitrinite reflectance (Ro) values in the range 0.55% to 5.15% are presented and analyzed. Our results demonstrate that pellets adequately represent the average microstructure of coal samples. The scattering data have been used to calculate the maximum surface area available for methane adsorption. Total porosity as percentage of sample volume is calculated and compared with worldwide trends. By demonstrating the applicability of SAXS and SANS techniques to determine the porosity, pore size distribution and surface area in coals, we provide a new and efficient tool, which can be used for any type of coal sample, from a thin slice to a representative sample of a thick seam. ?? 2004 Elsevier B.V. All rights reserved.

  4. Study of robotics systems applications to the space station program

    NASA Technical Reports Server (NTRS)

    Fox, J. C.

    1983-01-01

    Applications of robotics systems to potential uses of the Space Station as an assembly facility, and secondarily as a servicing facility, are considered. A typical robotics system mission is described along with the pertinent application guidelines and Space Station environmental assumptions utilized in developing the robotic task scenarios. A functional description of a supervised dual-robot space structure construction system is given, and four key areas of robotic technology are defined, described, and assessed. Alternate technologies for implementing the more routine space technology support subsystems that will be required to support the Space Station robotic systems in assembly and servicing tasks are briefly discussed. The environmental conditions impacting on the robotic configuration design and operation are reviewed.

  5. Oxygen enrichment and its application to life support systems for workers in high-altitude areas

    PubMed Central

    Li, Yongling; Liu, Yingshu

    2014-01-01

    Background: Workers coming from lowland regions are at risk of developing acute mountain sickness (AMS) when working in low oxygen high-altitude areas. Objectives: The aim of this study was to improve the conditions that lead to hypoxia and ensure the safety of the high-altitude workers. We analyzed the influence of low atmospheric pressure on the oxygen enrichment process in high-altitude areas using an engineering method called low-pressure swing adsorption (LPSA). Methods: Fourteen male subjects were screened and divided into three groups by type of oxygen supply system used: (1) oxygen cylinder group; (2) LPSA oxygen dispersal group; and (3) control group. These tests included arterial oxygen saturation (SaO2), pulse rate (PR), breaths per minute (BPM), and blood pressure (BP). Results: The results showed that after supplying oxygen using the LPSA method at the tunnel face, the SaO2 of workers increased; the incidence of acute mountain sickness, PR, and BPM significantly decreased. Conclusions: The LPSA life support system was found to be a simple, convenient, efficient, reliable, and applicable approach to ensure proper working conditions at construction sites in high-altitude areas. PMID:25000108

  6. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    NASA Astrophysics Data System (ADS)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  7. Secure communications using nonlinear silicon photonic keys.

    PubMed

    Grubel, Brian C; Bosworth, Bryan T; Kossey, Michael R; Cooper, A Brinton; Foster, Mark A; Foster, Amy C

    2018-02-19

    We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities. Compared to a large, electronically stored one-time pad, our method provisions large amounts of information within the intrinsically complex nanostructure of the micro-cavities. By probing a micro-cavity with a rapid sequence of spectrally-encoded ultrafast optical pulses and measuring the lightwave responses, we experimentally demonstrate the ability to extract 2.4 Gb of key material from a single micro-cavity device. Subsequently, in a secure communication experiment with pairs of devices, we achieve bit error rates below 10 -5 at code rates of up to 0.1. The PUFs' responses are never transmitted over the channel or stored in digital memory, thus enhancing the security of the system. Additionally, the micro-cavity PUFs are extremely small, inexpensive, robust, and fully compatible with telecommunications infrastructure, components, and electronic fabrication. This approach can serve one-time pad or public key exchange applications where high security is required.

  8. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  9. Nine new species of Itaplectops (Diptera: Tachinidae) reared from caterpillars in Area de Conservación Guanacaste, northwestern Costa Rica, with a key to Itaplectops species

    PubMed Central

    Wood, D. Monty; Smith, M. Alex; Janzen, Daniel H.; Hallwachs, Winnie

    2015-01-01

    Abstract Nine new species of Itaplectops Townsend (Diptera: Tachinidae) are described from Area de Conservación Guanacaste (ACG), northwestern Costa Rica. All specimens have been reared from ­various species of ACG caterpillars in the families Limacodidae and Dalceridae. By combining morphological, photographic, and genetic barcode data we provide clear yet concise descriptions. The following nine new species are described in the genus Itaplectops: Itaplectops akselpalolai, Itaplectops anikenpalolae, Itaplectops argentifrons, Itaplectops aurifrons, Itaplectops ericpalolai, Itaplectops griseobasis, Itaplectops omissus, Itaplectops shellymcsweeneyae, Itaplectops tristanpalolai. We move Itaplectops to the tribe Uramyini from its original placement within the Blondeliini, and we discuss its systematic placement. We also provide a key differentiating the, genera of the tribe Uramyini as well as the known species of Itaplectops. PMID:26752964

  10. Relaxation of Summer Gasoline Volatility Standard for Florida and the Raleigh-Durham-Chapel Hill Area (Triangle Area) and the Greensboro/Winston-Salem/High Point Area (Triad Area) in North Carolina

    EPA Pesticide Factsheets

    The EPA is taking final action to relax the federal volatility (RVP) standard applicable to summer gasoline supplied to three areas in Florida and the Triangle and Triad Areas in North Carolina from 7.8 pounds per square inch (psi) to 9.0 psi.

  11. Optofluidic bioanalysis: fundamentals and applications

    PubMed Central

    Ozcelik, Damla; Cai, Hong; Leake, Kaelyn D.; Hawkins, Aaron R.; Schmidt, Holger

    2017-01-01

    Over the past decade, optofluidics has established itself as a new and dynamic research field for exciting developments at the interface of photonics, microfluidics, and the life sciences. The strong desire for developing miniaturized bioanalytic devices and instruments, in particular, has led to novel and powerful approaches to integrating optical elements and biological fluids on the same chip-scale system. Here, we review the state-of-the-art in optofluidic research with emphasis on applications in bioanalysis and a focus on waveguide-based approaches that represent the most advanced level of integration between optics and fluidics. We discuss recent work in photonically reconfigurable devices and various application areas. We show how optofluidic approaches have been pushing the performance limits in bioanalysis, e.g. in terms of sensitivity and portability, satisfying many of the key requirements for point-of-care devices. This illustrates how the requirements for bianalysis instruments are increasingly being met by the symbiotic integration of novel photonic capabilities in a miniaturized system. PMID:29201591

  12. Care initiation area yields dramatic results.

    PubMed

    2009-03-01

    The ED at Gaston Memorial Hospital in Gastonia, NC, has achieved dramatic results in key department metrics with a Care Initiation Area (CIA) and a physician in triage. Here's how the ED arrived at this winning solution: Leadership was trained in and implemented the Kaizen method, which eliminates redundant or inefficient process steps. Simulation software helped determine additional space needed by analyzing arrival patterns and other key data. After only two days of meetings, new ideas were implemented and tested.

  13. Key techniques for space-based solar pumped semiconductor lasers

    NASA Astrophysics Data System (ADS)

    He, Yang; Xiong, Sheng-jun; Liu, Xiao-long; Han, Wei-hua

    2014-12-01

    In space, the absence of atmospheric turbulence, absorption, dispersion and aerosol factors on laser transmission. Therefore, space-based laser has important values in satellite communication, satellite attitude controlling, space debris clearing, and long distance energy transmission, etc. On the other hand, solar energy is a kind of clean and renewable resources, the average intensity of solar irradiation on the earth is 1353W/m2, and it is even higher in space. Therefore, the space-based solar pumped lasers has attracted much research in recent years, most research focuses on solar pumped solid state lasers and solar pumped fiber lasers. The two lasing principle is based on stimulated emission of the rare earth ions such as Nd, Yb, Cr. The rare earth ions absorb light only in narrow bands. This leads to inefficient absorption of the broad-band solar spectrum, and increases the system heating load, which make the system solar to laser power conversion efficiency very low. As a solar pumped semiconductor lasers could absorb all photons with energy greater than the bandgap. Thus, solar pumped semiconductor lasers could have considerably higher efficiencies than other solar pumped lasers. Besides, solar pumped semiconductor lasers has smaller volume chip, simpler structure and better heat dissipation, it can be mounted on a small satellite platform, can compose satellite array, which can greatly improve the output power of the system, and have flexible character. This paper summarizes the research progress of space-based solar pumped semiconductor lasers, analyses of the key technologies based on several application areas, including the processing of semiconductor chip, the design of small and efficient solar condenser, and the cooling system of lasers, etc. We conclude that the solar pumped vertical cavity surface-emitting semiconductor lasers will have a wide application prospects in the space.

  14. Roadmap for Educator Licensure Policy Addressing Data Literacy: Key Focus Areas to Ensure Quality. Data for Action

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2014

    2014-01-01

    State licensure polices are meant to provide teacher preparation programs with direction about the skills teachers need to be qualified to teach, including skills to use data. This roadmap discusses the 10 key data use skills that states can include in a licensure policy with a quality focus on effective data use.

  15. The national strategy for the physical protection of critical infrastructures and key assets

    DOT National Transportation Integrated Search

    2003-02-01

    This document defines the road ahead for a core mission area identified in the President's National Strategy for Homeland Security-reducing the Nation's vulnerability to acts of terrorism by protecting our critical infrastructures and key assets from...

  16. Efficient key pathway mining: combining networks and OMICS data.

    PubMed

    Alcaraz, Nicolas; Friedrich, Tobias; Kötzing, Timo; Krohmer, Anton; Müller, Joachim; Pauling, Josch; Baumbach, Jan

    2012-07-01

    Systems biology has emerged over the last decade. Driven by the advances in sophisticated measurement technology the research community generated huge molecular biology data sets. These comprise rather static data on the interplay of biological entities, for instance protein-protein interaction network data, as well as quite dynamic data collected for studying the behavior of individual cells or tissues in accordance with changing environmental conditions, such as DNA microarrays or RNA sequencing. Here we bring the two different data types together in order to gain higher level knowledge. We introduce a significantly improved version of the KeyPathwayMiner software framework. Given a biological network modelled as a graph and a set of expression studies, KeyPathwayMiner efficiently finds and visualizes connected sub-networks where most components are expressed in most cases. It finds all maximal connected sub-networks where all nodes but k exceptions are expressed in all experimental studies but at most l exceptions. We demonstrate the power of the new approach by comparing it to similar approaches with gene expression data previously used to study Huntington's disease. In addition, we demonstrate KeyPathwayMiner's flexibility and applicability to non-array data by analyzing genome-scale DNA methylation profiles from colorectal tumor cancer patients. KeyPathwayMiner release 2 is available as a Cytoscape plugin and online at http://keypathwayminer.mpi-inf.mpg.de.

  17. [Key to chironomid pupal exuviae (Diptera: Chironomidae) of tropical high Andean streams].

    PubMed

    Pratt, Narcís; González-Trujillo, Juan David; Ospina-Torres, Rodulfo

    2014-12-01

    The Chironomidae is a cosmopolitan family of Nematoceran flies with more than 20,000 species described. However the diversity of genera and species of the family in the Andean region beyond the 2,000 m.a.s.l are scarcely known. We conducted faunal surveys and biomonitoring research in different streams of Colombia, Ecuador and Peru from May 2005 to October 2011. Based on specimens collections, a taxonomic key was developed to identify pupae and pupal exuviae of 46 genera of midges (Diptera, Chironomidae) collected from streams at high altitude areas on the Andean tropical mountains. We included illustrations and brief taxonomic descriptions for all genera, of which several ones have not yet been formally described; in this latter case we used the nomenclature of Roback & Coffman (1983). For two genera, Cricotopus and Genus 1, keys to the most com- mon morphospecies were provided. Results showed that in this area the chironomid assemblages are dominated by the members of the subfamily Orthocladiinae (22 genera) followed by the Chironominae (13). Six genera of Tanypodinae were identified, while only three and two genera were present from subfamilies Podonominae and Diamesinae. This key may be very useful for both studies about drift in streams, and for biomonitoring purposes.

  18. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  19. Study and Application of Remote Data Moving Transmission under the Network Convergence

    NASA Astrophysics Data System (ADS)

    Zhiguo, Meng; Du, Zhou

    The data transmission is an important problem in remote applications. Advance of network convergence has help to select and use data transmission model. The embedded system and data management platform is a key of the design. With communication module, interface technology and the transceiver which has independent intellectual property rights connected broadband network and mobile network seamlessly. Using the distribution system of mobile base station to realize the wireless transmission, using public networks to implement the data transmission, making the distant information system break through area restrictions and realizing transmission of the moving data, it has been fully recognized in long-distance medical care applications.

  20. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  1. NASA Microgravity Science and Applications Program

    NASA Technical Reports Server (NTRS)

    1992-01-01

    Key elements of the microgravity research program as conducted by the Microgravity Science and Applications Division (MSAD) within the Office of Space Science and Applications (OSSA) during fiscal year (FY) 1992 are described. This NASA funded program supported investigators from the university, industry, and government research communities. The program's goals, the approach taken to achieve those goals, and the resources that were available are summarized. It provides a 'snapshot' of the Program's status at the end of FY 1992 and reviews highlights and progress in the ground and flight-based research during the year. It also describes four major space missions that flew during FY 1992, the advanced technology development (ATD) activities, and the plans to use the research potential of Space Station Freedom and other advanced carriers. The MSAD program structure encompassed five research areas: (1) Biotechnology, (2) Combustion Science, (3) Fluid Physics, (4) Materials Science, and (5) Benchmark Physics.

  2. The perceptions of key stakeholders of the roles of specialist and advanced nursing and midwifery practitioners.

    PubMed

    Casey, Mary; O'Connor, Laserina; Nicholson, Emma; Smith, Rita; O'Brien, Denise; O'Leary, Denise; Fealy, Gerard M; Mcnamara, Martin S; Stokes, Diarmuid; Egan, Claire

    2017-12-01

    To explore the perceptions of key stakeholders of the roles of specialist and advanced nursing and midwifery practitioners. There is evidence that the contribution of these roles to patient care is poorly understood. This research took place over 2 months in 2015 and is part of a larger study involving a rapid review to inform policy development on the specialist and advanced nursing and midwifery practice in Ireland. As an added value, a qualitative element involving thematic analysis was undertaken with key stakeholders. A phenomenological qualitative study was conducted incorporating semi-structured interviews with key stakeholders (n = 15). Purposive sampling with maximum diversity was used to recruit a wide range of perspectives. Participant's perspectives led to seven themes: Impact of these roles; role preparation, experience and organizational support; specialist and advanced practice roles in an interdisciplinary context; different folks but not such different roles; impact of specialist and advanced practice roles on patient outcomes; barriers and facilitators to enacting specialist and advanced practice roles; future development of these roles. There is acknowledgement of the positive impact of specialist and advanced practitioners; however, the evidence is currently not conclusive. Preparation for these roles needs to reflect changes in the calibre of today's professional applicants, and organizational support is paramount to their successful execution. The contribution of their activity to patient outcome needs to be made visible to enhance these roles and to justify the development of new roles across a variety of healthcare areas. © 2017 John Wiley & Sons Ltd.

  3. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  4. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  5. GPU: the biggest key processor for AI and parallel processing

    NASA Astrophysics Data System (ADS)

    Baji, Toru

    2017-07-01

    Two types of processors exist in the market. One is the conventional CPU and the other is Graphic Processor Unit (GPU). Typical CPU is composed of 1 to 8 cores while GPU has thousands of cores. CPU is good for sequential processing, while GPU is good to accelerate software with heavy parallel executions. GPU was initially dedicated for 3D graphics. However from 2006, when GPU started to apply general-purpose cores, it was noticed that this architecture can be used as a general purpose massive-parallel processor. NVIDIA developed a software framework Compute Unified Device Architecture (CUDA) that make it possible to easily program the GPU for these application. With CUDA, GPU started to be used in workstations and supercomputers widely. Recently two key technologies are highlighted in the industry. The Artificial Intelligence (AI) and Autonomous Driving Cars. AI requires a massive parallel operation to train many-layers of neural networks. With CPU alone, it was impossible to finish the training in a practical time. The latest multi-GPU system with P100 makes it possible to finish the training in a few hours. For the autonomous driving cars, TOPS class of performance is required to implement perception, localization, path planning processing and again SoC with integrated GPU will play a key role there. In this paper, the evolution of the GPU which is one of the biggest commercial devices requiring state-of-the-art fabrication technology will be introduced. Also overview of the GPU demanding key application like the ones described above will be introduced.

  6. Novel applications for biogeophysics: Prospects for detecting key subseafloor geomicrobiological processes or habitats

    NASA Astrophysics Data System (ADS)

    Colwell, F. S.; Ntarlagiannis, D.

    2007-05-01

    The new subdiscipline of biogeophysics has focused mostly on the geophysical signatures of microbial processes in contaminated subsurface environments usually undergoing remediation. However, the use of biogeophysics to examine the biogeochemistry of marine sediments has not yet been well-integrated into conceptual models that describe subseafloor processes. Current examples of geophysical measurements that have been used to detect geomicrobiological processes or infer their location in the seafloor include sound surveillance system (SOSUS)-derived data that detect seafloor eruptive events, deep and shallow cross-sectional seismic surveys that determine the presence of hydraulically conductive zones or gas-bearing sediments (e.g., bottom-simulating reflectors or bubble-rich strata), and thermal profiles. One possible area for innovative biogeophysical characterization of the seafloor involves determining the depth of the sulfate-methane interface (SMI) in locations where sulfate diffuses from the seawater and methane emanates from subsurface strata. The SMI demarcates a stratum where microbially-driven anaerobic methane oxidation (AMO) is dependent upon methane as an electron donor and sulfate as an electron acceptor. AMO is carried out by a recently defined, unique consortium of microbes that metabolically temper the flux of methane into the overlying seawater. The depth of the SMI is, respectively, shallow or deep according to whether a high or low rate of methane flux occurs from the deep sediments. Presently, the SMI can only be determined by direct measurements of methane and sulfate concentrations in the interstitial waters or by molecular biological techniques that target the microbes responsible for creating the SMI. Both methods require collection and considerable analysis of sediment samples. Therefore, detection of the SMI by non-destructive methods would be advantageous. As a key biogeochemical threshold in marine sediments, the depth of the SMI defines

  7. Global-local methodologies and their application to nonlinear analysis. [for structural postbuckling study

    NASA Technical Reports Server (NTRS)

    Noor, Ahmed K.

    1986-01-01

    An assessment is made of the potential of different global-local analysis strategies for predicting the nonlinear and postbuckling responses of structures. Two postbuckling problems of composite panels are used as benchmarks and the application of different global-local methodologies to these benchmarks is outlined. The key elements of each of the global-local strategies are discussed and future research areas needed to realize the full potential of global-local methodologies are identified.

  8. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources

    PubMed Central

    Wang, Qin; Wang, Xiang-Bin

    2014-01-01

    We present a model on the simulation of the measurement-device independent quantum key distribution (MDI-QKD) with phase randomized general sources. It can be used to predict experimental observations of a MDI-QKD with linear channel loss, simulating corresponding values for the gains, the error rates in different basis, and also the final key rates. Our model can be applicable to the MDI-QKDs with arbitrary probabilistic mixture of different photon states or using any coding schemes. Therefore, it is useful in characterizing and evaluating the performance of the MDI-QKD protocol, making it a valuable tool in studying the quantum key distributions. PMID:24728000

  9. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.

    PubMed

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-10-14

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.

  10. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

    PubMed Central

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-01-01

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580

  11. An area model for on-chip memories and its application

    NASA Technical Reports Server (NTRS)

    Mulder, Johannes M.; Quach, Nhon T.; Flynn, Michael J.

    1991-01-01

    An area model suitable for comparing data buffers of different organizations and arbitrary sizes is described. The area model considers the supplied bandwidth of a memory cell and includes such buffer overhead as control logic, driver logic, and tag storage. The model gave less than 10 percent error when verified against real caches and register files. It is shown that, comparing caches and register files in terms of area for the same storage capacity, caches generally occupy more area per bit than register files for small caches because the overhead dominates the cache area at these sizes. For larger caches, the smaller storage cells in the cache provide a smaller total cache area per bit than the register set. Studying cache performance (traffic ratio) as a function of area, it is shown that, for small caches, direct-mapped caches perform significantly better than four-way set-associative caches and, for caches of medium areas, both direct-mapped and set-associative caches perform better than fully associative caches.

  12. Recent advances in the fabrication and structure-specific applications of graphene-based inorganic hybrid membranes.

    PubMed

    Zhao, Xinne; Zhang, Panpan; Chen, Yuting; Su, Zhiqiang; Wei, Gang

    2015-03-12

    The preparation and applications of graphene (G)-based materials are attracting increasing interests due to their unique electronic, optical, magnetic, thermal, and mechanical properties. Compared to G-based hybrid and composite materials, G-based inorganic hybrid membrane (GIHM) offers enormous advantages ascribed to their facile synthesis, planar two-dimensional multilayer structure, high specific surface area, and mechanical stability, as well as their unique optical and mechanical properties. In this review, we report the recent advances in the technical fabrication and structure-specific applications of GIHMs with desirable thickness and compositions. In addition, the advantages and disadvantages of the methods utilized for creating GIHMs are discussed in detail. Finally, the potential applications and key challenges of GIHMs for future technical applications are mentioned.

  13. Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bonior, Jason D; Evans, Philip G; Sheets, Gregory S

    2017-01-01

    Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.

  14. Key Planning Factors for Recovery from a Biological Terrorism Incident

    DTIC Science & Technology

    2012-08-30

    Goals, this document identifies key technical planning areas that may be used to inform subsequent FEMA response and recovery guidance documents. The...expressed herein do not necessarily state or reflect those of their respective organizations or the US Government. The modeling and analysis provided by...responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would

  15. Not single brain areas but a network is involved in language: Applications in presurgical planning.

    PubMed

    Alemi, Razieh; Batouli, Seyed Amir Hossein; Behzad, Ebrahim; Ebrahimpoor, Mitra; Oghabian, Mohammad Ali

    2018-02-01

    Language is an important human function, and is a determinant of the quality of life. In conditions such as brain lesions, disruption of the language function may occur, and lesion resection is a solution for that. Presurgical planning to determine the language-related brain areas would enhance the chances of language preservation after the operation; however, availability of a normative language template is essential. In this study, using data from 60 young individuals who were meticulously checked for mental and physical health, and using fMRI and robust imaging and data analysis methods, functional brain maps for the language production, perception and semantic were produced. The obtained templates showed that the language function should be considered as the product of the collaboration of a network of brain regions, instead of considering only few brain areas to be involved in that. This study has important clinical applications, and extends our knowledge on the neuroanatomy of the language function. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Channel Deviation-Based Power Control in Body Area Networks.

    PubMed

    Van, Son Dinh; Cotton, Simon L; Smith, David B

    2018-05-01

    Internet enabled body area networks (BANs) will form a core part of future remote health monitoring and ambient assisted living technology. In BAN applications, due to the dynamic nature of human activity, the off-body BAN channel can be prone to deep fading caused by body shadowing and multipath fading. Using this knowledge, we present some novel practical adaptive power control protocols based on the channel deviation to simultaneously prolong the lifetime of wearable devices and reduce outage probability. The proposed schemes are both flexible and relatively simple to implement on hardware platforms with constrained resources making them inherently suitable for BAN applications. We present the key algorithm parameters used to dynamically respond to the channel variation. This allows the algorithms to achieve a better energy efficiency and signal reliability in everyday usage scenarios such as those in which a person undertakes many different activities (e.g., sitting, walking, standing, etc.). We also profile their performance against traditional, optimal, and other existing schemes for which it is demonstrated that not only does the outage probability reduce significantly, but the proposed algorithms also save up to average transmit power compared to the competing schemes.

  17. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  18. An overview of the applications of graphene-based materials in supercapacitors.

    PubMed

    Huang, Yi; Liang, Jiajie; Chen, Yongsheng

    2012-06-25

    Due to their unique 2D structure and outstanding intrinsic physical properties, such as extraordinarily high electrical conductivity and large surface area, graphene-based materials exhibit great potential for application in supercapacitors. In this review, the progress made so far for their applications in supercapacitors is reviewed, including electrochemical double-layer capacitors, pseudo-capacitors, and asymmetric supercapacitors. Compared with traditional electrode materials, graphene-based materials show some novel characteristics and mechanisms in the process of energy storage and release. Several key issues for improving the structure of graphene-based materials and for achieving better capacitor performance, along with the current outlook for the field, are also discussed. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  20. Key considerations in designing a speech brain-computer interface.

    PubMed

    Bocquelet, Florent; Hueber, Thomas; Girin, Laurent; Chabardès, Stéphan; Yvert, Blaise

    2016-11-01

    Restoring communication in case of aphasia is a key challenge for neurotechnologies. To this end, brain-computer strategies can be envisioned to allow artificial speech synthesis from the continuous decoding of neural signals underlying speech imagination. Such speech brain-computer interfaces do not exist yet and their design should consider three key choices that need to be made: the choice of appropriate brain regions to record neural activity from, the choice of an appropriate recording technique, and the choice of a neural decoding scheme in association with an appropriate speech synthesis method. These key considerations are discussed here in light of (1) the current understanding of the functional neuroanatomy of cortical areas underlying overt and covert speech production, (2) the available literature making use of a variety of brain recording techniques to better characterize and address the challenge of decoding cortical speech signals, and (3) the different speech synthesis approaches that can be considered depending on the level of speech representation (phonetic, acoustic or articulatory) envisioned to be decoded at the core of a speech BCI paradigm. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  1. Potential for Application of PSInSAR Data for Tectonic Modelling in Subduction Areas

    NASA Astrophysics Data System (ADS)

    Musson, R. M.; Julian, B.; Mark, H.; Alessandro, F.

    2002-12-01

    Interest has been increasing over the last few years in the use of satellite radar interferometry data (InSAR) for applications in seismology and tectonics. We report here on a new technique, PSInSAR, which relies on permanent scatterers and offers the possibility of measurements of ground displacements to a degree of accuracy, and over periods of time, previously unobtainable from conventional interferometry. This technique has been developed by TeleRilevamento Europa of the Politecnico di Milano in Italy. A permanent scatterer is any large, permanent angular object, such as building roofs, metallic structures, and even large boulders. Using these data, very accurate displacement histories can be obtained for the period 1991 to the present. Calibration with GPS data show good agreement, but the PSInSAR data are less noisy. The effect is akin to suddenly having a very dense GPS network retrospectively available for the last ten years in any moderately urbanised area in a region for which a satellite data archive exists (about 50 per cent of the globe). Data have been gathered for the area around Suruga Bay, Japan, which is expected to be the locus of a future great Tokai earthquake. Previous studies have used levelling or GPS data to model the locked part of the subduction plane in this area, using the Akaike Bayesian Information Criterion (ABIC) method. This method could be used with PSInSAR data, which would be likely to yield a better result on account of the greater density of data. Furthermore, there is now the potential to use the ABIC method in any subduction area, whether there exist GPS/levelling data or not, provided only that the area is sufficiently urbanised to yield adequate permanent scatterers as data points. This work results from a European Space Agency (ESA) 'Earth Observation Market Development' project entitled 'Developing markets for EO-derived land motion measurement products', involving, NPA (lead), the British Geological Survey (UK

  2. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    PubMed Central

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  3. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  4. Virtual reality as a human factors design analysis tool: Macro-ergonomic application validation and assessment of the Space Station Freedom payload control area

    NASA Technical Reports Server (NTRS)

    Hale, Joseph P.

    1994-01-01

    A virtual reality (VR) Applications Program has been under development at MSFC since 1989. Its objectives are to develop, assess, validate, and utilize VR in hardware development, operations development and support, missions operations training, and science training. A variety of activities are under way within many of these areas. One ongoing macro-ergonomic application of VR relates to the design of the Space Station Freedom Payload Control Area (PCA), the control room from which onboard payload operations are managed. Several preliminary conceptual PCA layouts have been developed and modeled in VR. Various managers and potential end users have virtually 'entered' these rooms and provided valuable feedback. Before VR can be used with confidence in a particular application, it must be validated, or calibrated, for that class of applications. Two associated validation studies for macro-ergonomic applications are under way to help characterize possible distortions of filtering of relevant perceptions in a virtual world. In both studies, existing control rooms and their 'virtual counterparts will be empirically compared using distance and heading estimations to objects and subjective assessments. Approaches and findings of the PCA activities and details of the studies are presented.

  5. In-Space Assembly Capability Assessment for Potential Human Exploration and Science Applications

    NASA Technical Reports Server (NTRS)

    Jefferies, Sharon A.; Jones, Christopher A.; Arney, Dale C.; Stillwagen, Frederic H.; Chai, Patrick R.; Hutchinson, Craig D.; Stafford, Matthew A.; Moses, Robert W.; Dempsey, James A.; Rodgers, Erica M.; hide

    2017-01-01

    Human missions to Mars present several major challenges that must be overcome, including delivering multiple large mass and volume elements, keeping the crew safe and productive, meeting cost constraints, and ensuring a sustainable campaign. Traditional methods for executing human Mars missions minimize or eliminate in-space assembly, which provides a narrow range of options for addressing these challenges and limits the types of missions that can be performed. This paper discusses recent work to evaluate how the inclusion of in-space assembly in space mission architectural concepts could provide novel solutions to address these challenges by increasing operational flexibility, robustness, risk reduction, crew health and safety, and sustainability. A hierarchical framework is presented to characterize assembly strategies, assembly tasks, and the required capabilities to assemble mission systems in space. The framework is used to identify general mission system design considerations and assembly system characteristics by assembly strategy. These general approaches are then applied to identify potential in-space assembly applications to address each challenge. Through this process, several focus areas were identified where applications of in-space assembly could affect multiple challenges. Each focus area was developed to identify functions, potential assembly solutions and operations, key architectural trades, and potential considerations and implications of implementation. This paper helps to identify key areas to investigate were potentially significant gains in addressing the challenges with human missions to Mars may be realized, and creates a foundation on which to further develop and analyze in-space assembly concepts and assembly-based architectures.

  6. The Development Status and Key Technologies of Solar Powered Unmanned Air Vehicle

    NASA Astrophysics Data System (ADS)

    Sai, Li; Wei, Zhou; Xueren, Wang

    2017-03-01

    By analyzing the development status of several typical solar powered unmanned aerial vehicles (UAV) at home and abroad, the key technologies involved in the design and manufacture of solar powered UAV and the technical difficulties need to be solved at present are obtained. It is pointed out that with the improvement of energy system efficiency, advanced aerodynamic configuration design, realization of high applicability flight stability and control system, breakthrough of efficient propulsion system, the application prospect of solar powered UAV will be more extensive.

  7. Key technique study and application of infrared thermography in hypersonic wind tunnel

    NASA Astrophysics Data System (ADS)

    LI, Ming; Yang, Yan-guang; Li, Zhi-hui; Zhu, Zhi-wei; Zhou, Jia-sui

    2014-11-01

    The solutions to some key techniques using infrared thermographic technique in hypersonic wind tunnel, such as temperature measurement under great measurement angle, the corresponding relation between model spatial coordinates and the ones in infrared map, the measurement uncertainty analysis of the test data etc., are studied. The typical results in the hypersonic wind tunnel test are presented, including the comparison of the transfer rates on a thin skin flat plate model with a wedge measured with infrared thermography and thermocouple, the experimental study heating effect on the flat plate model impinged by plume flow and the aerodynamic heating on the lift model.

  8. Assessment of Offshore Wind Energy Leasing Areas for the BOEM Massachusetts Wind Energy Area

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Musial, W.; Parker, Z.; Fields, M.

    2013-12-01

    The U.S. Department of Energy's (DOE) National Renewable Energy Laboratory (NREL), under an interagency agreement with the Bureau of Ocean Energy Management (BOEM), is providing technical assistance to identify and delineate leasing areas for offshore wind energy development within the Atlantic Coast Wind Energy Areas (WEAs) established by BOEM. This report focuses on NREL's development of three delineated leasing area options for the Massachusetts (MA) WEA and the technical evaluation of these leasing areas. The overarching objective of this study is to develop a logical process by which the MA WEA can be subdivided into non-overlapping leasing areas for BOEM'smore » use in developing an auction process in a renewable energy lease sale. NREL worked with BOEM to identify an appropriate number of leasing areas and proposed three delineation alternatives within the MA WEA based on the boundaries announced in May 2012. A primary output of the interagency agreement is this report, which documents the methodology, including key variables and assumptions, by which the leasing areas were identified and delineated.« less

  9. Application of vector analysis on study of illuminated area and Doppler characteristics of airborne pulse radar

    NASA Astrophysics Data System (ADS)

    Wang, Haijiang; Yang, Ling

    2014-12-01

    In this paper, the application of vector analysis tool in the illuminated area and the Doppler frequency distribution research for the airborne pulse radar is studied. An important feature of vector analysis is that it can closely combine the geometric ideas with algebraic calculations. Through coordinate transform, the relationship between the frame of radar antenna and the ground, under aircraft motion attitude, is derived. Under the time-space analysis, the overlap area between the footprint of radar beam and the pulse-illuminated zone is obtained. Furthermore, the Doppler frequency expression is successfully deduced. In addition, the Doppler frequency distribution is plotted finally. Using the time-space analysis results, some important parameters of a specified airborne radar system are obtained. Simultaneously, the results are applied to correct the phase error brought by attitude change in airborne synthetic aperture radar (SAR) imaging.

  10. Dynamic area telethermometry and its clinical applications

    NASA Astrophysics Data System (ADS)

    Anbar, Michael

    1995-03-01

    Dynamic area telethermometry (DAT) is a recent development in thermology, the science of biological heat generation and dissipation. DAT is based on monitoring changes in infrared emission, deriving from them information on the kinetics and mechanisms of biological thermoregulation. Remotely monitoring infrared emission is the most reliable technique to study bioenergetics, because it minimally perturbs the investigated system. Area monitoring of heat dissipating surfaces is needed because temporal changes in the spatial distribution of temperature conveys information on mechanisms of thermoregulation. DAT can be applied to biological systems ranging from single cells (microtelecalorimetry) to large areas of human skin (clinical thermology). DAT requires the accumulation of many (hundreds to thousands) thermal images followed by analysis of the thermokinetics of each pixel or group of pixels. In clinical thermology this analysis uses FFT to extract systemic, regional and local thermoregulatory frequencies (TRFs). DAT also extracts information on local thermoregulation from the temporal behavior of homogeneity of skin temperature (HST). Analysis of the relative contributions (FFT amplitudes) of the different frequencies allows distinction between vascular, neurological, and immunological thermoregulatory dysfunctions. This analysis, which can reveal the mechanism of the dysfunction, can be very useful in the diagnosis and staging of various disorders, ranging from diabetes mellitus and liver cirrhosis to breast cancer and malignant melanoma. From the engineering standpoint DAT requires highly stable imaging systems and effective display of the spatial distribution of TRFs to allow identification of thermoregulatory pathways and their dysfunction.

  11. Feasibility of mileage-based user fees : application in rural/small urban areas of northeast Texas, final report, October 31, 2008.

    DOT National Transportation Integrated Search

    2008-10-31

    This study explores the application of mileage-based user fees, or vehicle-miles traveled (VMT) fees, as an : alternative to the fuel tax in rural and small urban areas. The purpose of the study is to identify the issues : associated with implementat...

  12. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  13. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  14. Developing consistent Landsat data sets for large area applications: the MRLC 2001 protocol

    USGS Publications Warehouse

    Chander, G.; Huang, Chengquan; Yang, Limin; Homer, Collin G.; Larson, C.

    2009-01-01

    One of the major efforts in large area land cover mapping over the last two decades was the completion of two U.S. National Land Cover Data sets (NLCD), developed with nominal 1992 and 2001 Landsat imagery under the auspices of the MultiResolution Land Characteristics (MRLC) Consortium. Following the successful generation of NLCD 1992, a second generation MRLC initiative was launched with two primary goals: (1) to develop a consistent Landsat imagery data set for the U.S. and (2) to develop a second generation National Land Cover Database (NLCD 2001). One of the key enhancements was the formulation of an image preprocessing protocol and implementation of a consistent image processing method. The core data set of the NLCD 2001 database consists of Landsat 7 Enhanced Thematic Mapper Plus (ETM+) images. This letter details the procedures for processing the original ETM+ images and more recent scenes added to the database. NLCD 2001 products include Anderson Level II land cover classes, percent tree canopy, and percent urban imperviousness at 30-m resolution derived from Landsat imagery. The products are freely available for download to the general public from the MRLC Consortium Web site at http://www.mrlc.gov.

  15. 75 FR 3444 - Availability of Seats for the Florida Keys National Marine Sanctuary Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-21

    ... Cultural Resources (alternate), and Tourism--Upper Keys (member). Applicants are chosen based upon their particular expertise and experience in relation to the seat for which they are applying; community and...

  16. Science Application of Area and Ratio Concepts

    ERIC Educational Resources Information Center

    Horak, Virginia M.

    2006-01-01

    This article describes using area and ratio concepts to examine why some animals, or people wearing different types of shoes, sink into the surface on which they are standing. Students compute "sinking values" to explain these differences. (Contains 2 figures.)

  17. Perspective on thermal barrier coatings for industrial gas turbine applications

    NASA Technical Reports Server (NTRS)

    Mutasim, Zaher; Brentnall, William

    1995-01-01

    Thermal barrier coatings (TBC's) have been used in high thrust aircraft engines for many years, and have proved to be very effective in providing thermal protection and increasing engine efficiencies. TBC life requirements for aircraft engines are typically less than those required for industrial gas turbines. This paper describes current and future applications of TBC's in industrial gas turbine engines. Early testing and applications of TBC's is reviewed. Areas of concern from the engine designer's and materials engineer's perspective are identified and evaluated. This paper focuses on the key factors that are expected to influence utilization of TBC's in advanced industrial gas turbine engines. It is anticipated that reliable, durable and highly effective coating systems will be produced that will ultimately improve engine efficiency and performance.

  18. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  19. Research on Key Technologies of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  20. Application of wildfire simulation methods to assess wildfire exposure in a Mediterranean fire-prone area (Sardinia, Italy)

    NASA Astrophysics Data System (ADS)

    Salis, M.; Ager, A.; Arca, B.; Finney, M.; Bacciu, V. M.; Spano, D.; Duce, P.

    2012-12-01

    Spatial and temporal patterns of fire spread and behavior are dependent on interactions among climate, topography, vegetation and fire suppression efforts (Pyne et al. 1996; Viegas 2006; Falk et al. 2007). Humans also play a key role in determining frequency and spatial distribution of ignitions (Bar Massada et al, 2011), and thus influence fire regimes as well. The growing incidence of catastrophic wildfires has led to substantial losses for important ecological and human values within many areas of the Mediterranean basin (Moreno et al. 1998; Mouillot et al. 2005; Viegas et al. 2006a; Riaño et al. 2007). The growing fire risk issue has led to many new programs and policies of fuel management and risk mitigation by environmental and fire agencies. However, risk-based methodologies to help identify areas characterized by high potential losses and prioritize fuel management have been lacking for the region. Formal risk assessment requires the joint consideration of likelihood, intensity, and susceptibility, the product of which estimates the chance of a specific loss (Brillinger 2003; Society of Risk Analysis, 2006). Quantifying fire risk therefore requires estimates of a) the probability of a specific location burning at a specific intensity and location, and b) the resulting change in financial or ecological value (Finney 2005; Scott 2006). When large fires are the primary cause of damage, the application of this risk formulation requires modeling fire spread to capture landscape properties that affect burn probability. Recently, the incorporation of large fire spread into risk assessment systems has become feasible with the development of high performance fire simulation systems (Finney et al. 2011) that permit the simulation of hundreds of thousands of fires to generate fine scale maps of burn probability, flame length, and fire size, while considering the combined effects of weather, fuels, and topography (Finney 2002; Andrews et al. 2007; Ager and Finney 2009