Sample records for key areas requiring

  1. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  2. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  3. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  4. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  5. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  6. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  7. Area navigation and required navigation performance procedures and depictions

    DOT National Transportation Integrated Search

    2012-09-30

    Area navigation (RNAV) and required navigation performance (RNP) procedures are fundamental to the implementation of a performance based navigation (PBN) system, which is a key enabling technology for the Next Generation Air Transportation System (Ne...

  8. BARI+: a biometric based distributed key management approach for wireless body area networks.

    PubMed

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  9. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    PubMed Central

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain. PMID:22319333

  10. Key areas for wintering North American herons

    USGS Publications Warehouse

    Mikuska, T.; Kushlan, J.A.; Hartley, S.

    1998-01-01

    Nearly all North American heron populations are migratory, but details of where they winter are little known. Locations where North American herons winter were identified using banding recovery data. North American herons winter from Canada through northern South America but especially in eastern North America south of New York, Florida, California, Louisiana, Texas, Mexico and Cuba, these areas accounting for 63% of winter recoveries. We identified regions where recoveries for various species clustered as 'key areas.' These forty-three areas constitute a network of areas that hold sites that likely are important to wintering herons. The relative importance of each area and site within the network must be evaluated by further on the ground inventory. Because of biases inherent in the available data, these hypothesized key areas are indicative rather than exhaustive. As a first cut, this network of areas can serve to inform further inventory activities and can provide an initial basis to begin planning for the year-round conservation of North American heron populations.

  11. Key areas for wintering North American herons

    USGS Publications Warehouse

    Mikuska, T.; Kushlan, J.A.; Hartley, S.

    1998-01-01

    Nearly all North American heron populations are migratory, but details of where they winter are little known. Locations where North American herons winter were identified using banding recovery data. North American herons winter from Canada through northern South America but especially in eastern North America south of New York, Florida, California, Louisiana, Texas, Mexico and Cuba, these areas accounting for 63% of winter recoveries. We identified regions where recoveries for various species clustered as "key areas." These forty-three areas constitute a network of areas that hold sites that likely are important to wintering North American herons. Within each area, we identify specific sites that are potentially important to wintering herons. The relative importance of each area and site within the network must be evaluated by further on the ground inventory. Because of biases inherent in the available data, these hypothesized key areas are indicative rather than exhaustive. As a first cut, this network of areas can serve to inform further inventory activities and can provide an initial basis to begin planning for the year-round conservation of North American heron populations.

  12. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  13. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  14. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  15. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  16. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  17. Curriculum Guide for Maximizing Student Potential in Required Subject Areas.

    ERIC Educational Resources Information Center

    Richert, E. Susanne

    This curriculum guide is intended to assist educators to maximize the performance of gifted students and others in required subject areas and is keyed to initiatives of the Kansas State Board of Education (KSBE). Part 1, the introduction, describes the guide's development, states the guide's purpose, specifies the students to be served, and…

  18. 13. VIEW INTO BLOCK AREA SHOWING KEY MECHANISM, NOTE FLOOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. VIEW INTO BLOCK AREA SHOWING KEY MECHANISM, NOTE FLOOR SEPARATION AT THRESHOLD AND KEY-WINDING MECHANISM - Montgomery County Jail, Washington & Spring Streets, Crawfordsville, Montgomery County, IN

  19. On the Compliance of Simbol-X Mirror Roughness with its Effective Area Requirements

    NASA Astrophysics Data System (ADS)

    Spiga, D.; Basso, S.; Cotroneo, V.; Pareschi, G.; Tagliaferri, G.

    2009-05-01

    Surface microroughness of X-ray mirrors is a key issue for the angular resolution of Simbol-X to comply with the required one (<20 arcsec at 30 keV). The maximum tolerable microroughness for Simbol-X mirrors, in order to satisfy the required imaging capability, has already been derived in terms of its PSD (Power Spectral Density). However, also the Effective Area of the telescope is affected by the mirror roughness. In this work we will show how the expected effective area of the Simbol-X mirror module can be computed from the roughness PSD tolerance, checking its compliance with the requirements.

  20. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 3 2014-07-01 2014-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  1. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  2. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  3. 33 CFR 334.610 - Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted areas and danger zone. 334.610 Section 334.610 Navigation and... RESTRICTED AREA REGULATIONS § 334.610 Key West Harbor, at U.S. Naval Base, Key West, Fla.; naval restricted...

  4. Geology is the Key to Explain Igneous Activity in the Mediterranean Area

    NASA Astrophysics Data System (ADS)

    Lustrino, M.

    2014-12-01

    Igneous activity in tectonically complex areas can be interpreted in many different ways, producing completely different petrogenetic models. Processes such as oceanic and continental subduction, lithospheric delamination, changes in subduction polarity, slab break-off and mantle plumes have all been advocated as causes for changes in plate boundaries and magma production, including rate and temporal distribution, in the circum-Mediterranean area. This region thus provides a natural laboratory to investigate a range of geodynamic and magmatic processes. Although many petrologic and tectonic models have been proposed, a number of highly controversial questions still remain. No consensus has yet been reached about the capacity of plate-tectonic processes to explain the origin and style of the magmatism. Similarly, there is still not consensus on the ability of geochemical and petrological arguments to reveal the geodynamic evolution of the area. The wide range of chemical and mineralogical magma compositions produced within and around the Mediterranean, from carbonatites to strongly silica-undersaturated silico-carbonatites and melilitites to strongly silica-oversaturated rhyolites, complicate models and usually require a large number of unconstrained assumptions. Can the calcalkaline-sodic alkaline transition be related to any common petrogenetic point? Is igneous activity plate-tectonic- (top-down) or deep-mantle-controlled (bottom-up)? Do the rare carbonatites and carbonate-rich igneous rocks derive from the deep mantle or a normal, CO2-bearing upper mantle? Do ultrapotassic compositions require continental subduction? Understanding chemically complex magmas emplaced in tectonically complex areas require open minds, and avoiding dogma and assumptions. Studying the geology and shallow dynamics, not speculating about the deep lower mantle, is the key to understanding the igneous activity.

  5. Planet Formation Imager (PFI): science vision and key requirements

    NASA Astrophysics Data System (ADS)

    Kraus, Stefan; Monnier, John D.; Ireland, Michael J.; Duchêne, Gaspard; Espaillat, Catherine; Hönig, Sebastian; Juhasz, Attila; Mordasini, Chris; Olofsson, Johan; Paladini, Claudia; Stassun, Keivan; Turner, Neal; Vasisht, Gautam; Harries, Tim J.; Bate, Matthew R.; Gonzalez, Jean-François; Matter, Alexis; Zhu, Zhaohuan; Panic, Olja; Regaly, Zsolt; Morbidelli, Alessandro; Meru, Farzana; Wolf, Sebastian; Ilee, John; Berger, Jean-Philippe; Zhao, Ming; Kral, Quentin; Morlok, Andreas; Bonsor, Amy; Ciardi, David; Kane, Stephen R.; Kratter, Kaitlin; Laughlin, Greg; Pepper, Joshua; Raymond, Sean; Labadie, Lucas; Nelson, Richard P.; Weigelt, Gerd; ten Brummelaar, Theo; Pierens, Arnaud; Oudmaijer, Rene; Kley, Wilhelm; Pope, Benjamin; Jensen, Eric L. N.; Bayo, Amelia; Smith, Michael; Boyajian, Tabetha; Quiroga-Nuñez, Luis Henry; Millan-Gabet, Rafael; Chiavassa, Andrea; Gallenne, Alexandre; Reynolds, Mark; de Wit, Willem-Jan; Wittkowski, Markus; Millour, Florentin; Gandhi, Poshak; Ramos Almeida, Cristina; Alonso Herrero, Almudena; Packham, Chris; Kishimoto, Makoto; Tristram, Konrad R. W.; Pott, Jörg-Uwe; Surdej, Jean; Buscher, David; Haniff, Chris; Lacour, Sylvestre; Petrov, Romain; Ridgway, Steve; Tuthill, Peter; van Belle, Gerard; Armitage, Phil; Baruteau, Clement; Benisty, Myriam; Bitsch, Bertram; Paardekooper, Sijme-Jan; Pinte, Christophe; Masset, Frederic; Rosotti, Giovanni

    2016-08-01

    The Planet Formation Imager (PFI) project aims to provide a strong scientific vision for ground-based optical astronomy beyond the upcoming generation of Extremely Large Telescopes. We make the case that a breakthrough in angular resolution imaging capabilities is required in order to unravel the processes involved in planet formation. PFI will be optimised to provide a complete census of the protoplanet population at all stellocentric radii and over the age range from 0.1 to 100 Myr. Within this age period, planetary systems undergo dramatic changes and the final architecture of planetary systems is determined. Our goal is to study the planetary birth on the natural spatial scale where the material is assembled, which is the "Hill Sphere" of the forming planet, and to characterise the protoplanetary cores by measuring their masses and physical properties. Our science working group has investigated the observational characteristics of these young protoplanets as well as the migration mechanisms that might alter the system architecture. We simulated the imprints that the planets leave in the disk and study how PFI could revolutionise areas ranging from exoplanet to extragalactic science. In this contribution we outline the key science drivers of PFI and discuss the requirements that will guide the technology choices, the site selection, and potential science/technology tradeoffs.

  6. Sustainable health systems: addressing three key areas.

    PubMed

    Chhanabhai, Prajesh N; Holt, Alec; Benwell, George

    2007-01-01

    In the modern context sustainable health systems are being developed using the newest technological and communication technologies. This is proving to be a great success for the growth of Health Informatics and healthcare improvement. However this revolution is not being reached by a lot of the world population. This paper will address the importance of closing the Digital Divide, Empowerment of health consumers and the importance of converging communications. Key areas in the development of a truly sustainable health system.

  7. Summary Letter of Key Requirements for FLM Notification Process

    EPA Pesticide Factsheets

    Letter from Anna Marie Wood, Director of EPA’s Air Quality Policy Division, to Carol McCoy, Chief of the Air Resources Division of the National Park Service (NPS) summarizing the key requirements for the Federal Land Managers (FLMs) notification process.

  8. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  9. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this presentation is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  10. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  11. Evolution of area access safety training required for gaining access to Space Shuttle launch and landing facilities

    NASA Technical Reports Server (NTRS)

    Willams, M. C.

    1985-01-01

    Assuring personnel and equipment are fully protected during the Space Shuttle launch and landing operations has been a primary concern of NASA and its associated contractors since the inception of the program. A key factor in support of this policy has been the area access safety training requirements for badging of employees assigned to work on Space Shuttle Launch and Facilities. This requirement was targeted for possible cost savings and the transition of physical on-site walkdowns to the use of television tapes has realized program cost savings while continuing to fully satisfy the area access safety training requirements.

  12. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  13. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  14. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  15. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  16. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the private...

  17. 50 CFR 300.36 - Closed area stowage requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Closed area stowage requirements. 300.36... REGULATIONS South Pacific Tuna Fisheries § 300.36 Closed area stowage requirements. At all times while a vessel is in a Closed Area, the fishing gear of the vessel shall be stowed in a manner as not to be...

  18. 50 CFR 300.36 - Closed area stowage requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 11 2013-10-01 2013-10-01 false Closed area stowage requirements. 300.36 Section 300.36 Wildlife and Fisheries INTERNATIONAL FISHING AND RELATED ACTIVITIES INTERNATIONAL FISHERIES REGULATIONS South Pacific Tuna Fisheries § 300.36 Closed area stowage requirements. At all times while a...

  19. 50 CFR 300.36 - Closed area stowage requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 11 2014-10-01 2014-10-01 false Closed area stowage requirements. 300.36 Section 300.36 Wildlife and Fisheries INTERNATIONAL FISHING AND RELATED ACTIVITIES INTERNATIONAL FISHERIES REGULATIONS South Pacific Tuna Fisheries § 300.36 Closed area stowage requirements. At all times while a...

  20. 50 CFR 300.36 - Closed area stowage requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 11 2012-10-01 2012-10-01 false Closed area stowage requirements. 300.36 Section 300.36 Wildlife and Fisheries INTERNATIONAL FISHING AND RELATED ACTIVITIES INTERNATIONAL FISHERIES REGULATIONS South Pacific Tuna Fisheries § 300.36 Closed area stowage requirements. At all times while a...

  1. 50 CFR 300.36 - Closed area stowage requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 9 2011-10-01 2011-10-01 false Closed area stowage requirements. 300.36 Section 300.36 Wildlife and Fisheries INTERNATIONAL FISHING AND RELATED ACTIVITIES INTERNATIONAL FISHERIES REGULATIONS South Pacific Tuna Fisheries § 300.36 Closed area stowage requirements. At all times while a...

  2. Why and how might genetic and phylogenetic diversity be reflected in the identification of key biodiversity areas?

    PubMed

    Brooks, T M; Cuttelod, A; Faith, D P; Garcia-Moreno, J; Langhammer, P; Pérez-Espona, S

    2015-02-19

    'Key biodiversity areas' are defined as sites contributing significantly to the global persistence of biodiversity. The identification of these sites builds from existing approaches based on measures of species and ecosystem diversity and process. Here, we therefore build from the work of Sgró et al. (2011 Evol. Appl. 4, 326-337. (doi:10.1111/j.1752-4571.2010.00157.x)) to extend a framework for how components of genetic diversity might be considered in the identification of key biodiversity areas. We make three recommendations to inform the ongoing process of consolidating a key biodiversity areas standard: (i) thresholds for the threatened species criterion currently consider a site's share of a threatened species' population; expand these to include the proportion of the species' genetic diversity unique to a site; (ii) expand criterion for 'threatened species' to consider 'threatened taxa' and (iii) expand the centre of endemism criterion to identify as key biodiversity areas those sites holding a threshold proportion of the compositional or phylogenetic diversity of species (within a taxonomic group) whose restricted ranges collectively define a centre of endemism. We also recommend consideration of occurrence of EDGE species (i.e. threatened phylogenetic diversity) in key biodiversity areas to prioritize species-specific conservation actions among sites.

  3. Why and how might genetic and phylogenetic diversity be reflected in the identification of key biodiversity areas?

    PubMed Central

    Brooks, T. M.; Cuttelod, A.; Faith, D. P.; Garcia-Moreno, J.; Langhammer, P.; Pérez-Espona, S.

    2015-01-01

    Key biodiversity areas' are defined as sites contributing significantly to the global persistence of biodiversity. The identification of these sites builds from existing approaches based on measures of species and ecosystem diversity and process. Here, we therefore build from the work of Sgró et al. (2011 Evol. Appl. 4, 326–337. (doi:10.1111/j.1752-4571.2010.00157.x)) to extend a framework for how components of genetic diversity might be considered in the identification of key biodiversity areas. We make three recommendations to inform the ongoing process of consolidating a key biodiversity areas standard: (i) thresholds for the threatened species criterion currently consider a site's share of a threatened species' population; expand these to include the proportion of the species' genetic diversity unique to a site; (ii) expand criterion for ‘threatened species' to consider ‘threatened taxa’ and (iii) expand the centre of endemism criterion to identify as key biodiversity areas those sites holding a threshold proportion of the compositional or phylogenetic diversity of species (within a taxonomic group) whose restricted ranges collectively define a centre of endemism. We also recommend consideration of occurrence of EDGE species (i.e. threatened phylogenetic diversity) in key biodiversity areas to prioritize species-specific conservation actions among sites. PMID:25561678

  4. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  5. Global conservation outcomes depend on marine protected areas with five key features.

    PubMed

    Edgar, Graham J; Stuart-Smith, Rick D; Willis, Trevor J; Kininmonth, Stuart; Baker, Susan C; Banks, Stuart; Barrett, Neville S; Becerro, Mikel A; Bernard, Anthony T F; Berkhout, Just; Buxton, Colin D; Campbell, Stuart J; Cooper, Antonia T; Davey, Marlene; Edgar, Sophie C; Försterra, Günter; Galván, David E; Irigoyen, Alejo J; Kushner, David J; Moura, Rodrigo; Parnell, P Ed; Shears, Nick T; Soler, German; Strain, Elisabeth M A; Thomson, Russell J

    2014-02-13

    In line with global targets agreed under the Convention on Biological Diversity, the number of marine protected areas (MPAs) is increasing rapidly, yet socio-economic benefits generated by MPAs remain difficult to predict and under debate. MPAs often fail to reach their full potential as a consequence of factors such as illegal harvesting, regulations that legally allow detrimental harvesting, or emigration of animals outside boundaries because of continuous habitat or inadequate size of reserve. Here we show that the conservation benefits of 87 MPAs investigated worldwide increase exponentially with the accumulation of five key features: no take, well enforced, old (>10 years), large (>100 km(2)), and isolated by deep water or sand. Using effective MPAs with four or five key features as an unfished standard, comparisons of underwater survey data from effective MPAs with predictions based on survey data from fished coasts indicate that total fish biomass has declined about two-thirds from historical baselines as a result of fishing. Effective MPAs also had twice as many large (>250 mm total length) fish species per transect, five times more large fish biomass, and fourteen times more shark biomass than fished areas. Most (59%) of the MPAs studied had only one or two key features and were not ecologically distinguishable from fished sites. Our results show that global conservation targets based on area alone will not optimize protection of marine biodiversity. More emphasis is needed on better MPA design, durable management and compliance to ensure that MPAs achieve their desired conservation value.

  6. Global conservation outcomes depend on marine protected areas with five key features

    NASA Astrophysics Data System (ADS)

    Edgar, Graham J.; Stuart-Smith, Rick D.; Willis, Trevor J.; Kininmonth, Stuart; Baker, Susan C.; Banks, Stuart; Barrett, Neville S.; Becerro, Mikel A.; Bernard, Anthony T. F.; Berkhout, Just; Buxton, Colin D.; Campbell, Stuart J.; Cooper, Antonia T.; Davey, Marlene; Edgar, Sophie C.; Försterra, Günter; Galván, David E.; Irigoyen, Alejo J.; Kushner, David J.; Moura, Rodrigo; Parnell, P. Ed; Shears, Nick T.; Soler, German; Strain, Elisabeth M. A.; Thomson, Russell J.

    2014-02-01

    In line with global targets agreed under the Convention on Biological Diversity, the number of marine protected areas (MPAs) is increasing rapidly, yet socio-economic benefits generated by MPAs remain difficult to predict and under debate. MPAs often fail to reach their full potential as a consequence of factors such as illegal harvesting, regulations that legally allow detrimental harvesting, or emigration of animals outside boundaries because of continuous habitat or inadequate size of reserve. Here we show that the conservation benefits of 87 MPAs investigated worldwide increase exponentially with the accumulation of five key features: no take, well enforced, old (>10 years), large (>100km2), and isolated by deep water or sand. Using effective MPAs with four or five key features as an unfished standard, comparisons of underwater survey data from effective MPAs with predictions based on survey data from fished coasts indicate that total fish biomass has declined about two-thirds from historical baselines as a result of fishing. Effective MPAs also had twice as many large (>250mm total length) fish species per transect, five times more large fish biomass, and fourteen times more shark biomass than fished areas. Most (59%) of the MPAs studied had only one or two key features and were not ecologically distinguishable from fished sites. Our results show that global conservation targets based on area alone will not optimize protection of marine biodiversity. More emphasis is needed on better MPA design, durable management and compliance to ensure that MPAs achieve their desired conservation value.

  7. Group Key Agreement Efficient in Communication

    DTIC Science & Technology

    2003-10-14

    Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent

  8. Minimizing the area required for time constants in integrated circuits

    NASA Technical Reports Server (NTRS)

    Lyons, J. C.

    1972-01-01

    When a medium- or large-scale integrated circuit is designed, efforts are usually made to avoid the use of resistor-capacitor time constant generators. The capacitor needed for this circuit usually takes up more surface area on the chip than several resistors and transistors. When the use of this network is unavoidable, the designer usually makes an effort to see that the choice of resistor and capacitor combinations is such that a minimum amount of surface area is consumed. The optimum ratio of resistance to capacitance that will result in this minimum area is equal to the ratio of resistance to capacitance which may be obtained from a unit of surface area for the particular process being used. The minimum area required is a function of the square root of the reciprocal of the products of the resistance and capacitance per unit area. This minimum occurs when the area required by the resistor is equal to the area required by the capacitor.

  9. An Improved EKG-Based Key Agreement Scheme for Body Area Networks

    NASA Astrophysics Data System (ADS)

    Ali, Aftab; Khan, Farrukh Aslam

    Body area networks (BANs) play an important role in mobile health monitoring such as, monitoring the health of patients in a hospital or physical status of soldiers in a battlefield. By securing the BAN, we actually secure the lives of soldiers or patients. This work presents an electrocardiogram (EKG) based key agreement scheme using discrete wavelet transform (DWT) for the sake of generating a common key in a body area network. The use of EKG brings plug-and-play capability in BANs; i.e., the sensors are just placed on the human body and a secure communication is started among these sensors. The process is made secure by using the iris or fingerprints to lock and then unlock the blocks during exchange between the communicating sensors. The locking and unlocking is done through watermarking. When a watermark is added at the sender side, the block is locked and when it is removed at the receiver side, the block is unlocked. By using iris or fingerprints, the security of the technique improves and its plug-and-play capability is not affected. The analysis is done by using real 2-lead EKG data sampled at a rate of 125 Hz taken from MIT PhysioBank database.

  10. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    PubMed

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  11. Identifying key areas of ecosystem services potential to improve ecological management in Chongqing City, southwest China.

    PubMed

    Xiao, Yang; Xiao, Qiang

    2018-03-29

    Because natural ecosystems and ecosystem services (ES) are both critical to the well-being of humankind, it is important to understand their relationships and congruence for conservation planning. Spatial conservation planning is required to set focused preservation priorities and to assess future ecological implications. This study uses the combined measures of ES models and ES potential to estimate and analyze all four groups of ecosystem services to generate opportunities to maximize ecosystem services. Subsequently, we identify the key areas of conservation priorities as future forestation and conservation hotspot zones to improve the ecological management in Chongqing City, located in the upper reaches of the Three Gorges Reservoir Area, China. Results show that ecosystem services potential is extremely obvious. Compared to ecosystem services from 2000, we determined that soil conservation could be increased by 59.11%, carbon sequestration by 129.51%, water flow regulation by 83.42%, and water purification by 84.42%. According to our prioritization results, approximately 48% of area converted to forests exhibited high improvements in all ecosystem services (categorized as hotspot-1, hotspot-2, and hotspot-3). The hotspots identified in this study can be used as an excellent surrogate for evaluation ecological engineering benefits and can be effectively applied in improving ecological management planning.

  12. Field and long-term demonstration of a wide area quantum key distribution network.

    PubMed

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-09-08

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.

  13. 7 CFR 25.103 - Area size and boundary requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... requirements. A nominated area: (1) May not exceed one thousand square miles in total land area; (2) Must have... section to Round II, Round IIS and Round III designations: (i) A Census tract larger than 1,000 square miles shall be reduced to a 1,000 square mile area with a continuous boundary, if necessary, after...

  14. 7 CFR 25.103 - Area size and boundary requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... requirements. A nominated area: (1) May not exceed one thousand square miles in total land area; (2) Must have... section to Round II, Round IIS and Round III designations: (i) A Census tract larger than 1,000 square miles shall be reduced to a 1,000 square mile area with a continuous boundary, if necessary, after...

  15. 7 CFR 25.103 - Area size and boundary requirements

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requirements. A nominated area: (1) May not exceed one thousand square miles in total land area; (2) Must have... section to Round II, Round IIS and Round III designations: (i) A Census tract larger than 1,000 square miles shall be reduced to a 1,000 square mile area with a continuous boundary, if necessary, after...

  16. 7 CFR 25.103 - Area size and boundary requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... requirements. A nominated area: (1) May not exceed one thousand square miles in total land area; (2) Must have... section to Round II, Round IIS and Round III designations: (i) A Census tract larger than 1,000 square miles shall be reduced to a 1,000 square mile area with a continuous boundary, if necessary, after...

  17. Quantum key distribution over an installed multimode optical fiber local area network.

    PubMed

    Namekata, Naoto; Mori, Shigehiko; Inoue, Shuichiro

    2005-12-12

    We have investigated the possibility of a multimode fiber link for a quantum channel. Transmission of light in an extremely underfilled mode distribution promises a single-mode-like behavior in the multimode fiber. To demonstrate the performance of the fiber link we performed quantum key distribution, on the basis of the BB84 four-state protocol, over 550 m of an installed multimode optical fiber local area network, and the quantum-bit-error rate of 1.09 percent was achieved.

  18. Transition in Education: Policy Making and the Key Educational Policy Areas in the Central-European and Baltic Countries.

    ERIC Educational Resources Information Center

    Rado, Peter

    This report examines transition in educational systems and identifies key policy areas in Central-Eastern European countries. It summarizes policy implications of the transition process within the educational context of these countries. Chapter 1, "Transition and Education," outlines key characteristics of the transition process and…

  19. 40 CFR 93.129 - Special exemptions from conformity requirements for pilot program areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... with the conformity requirements of the pilot area's implementation plan revision for § 51.390 of this chapter and all other requirements in 40 CFR parts 51 and 93 that are not covered by the pilot area's... requirements for pilot program areas. 93.129 Section 93.129 Protection of Environment ENVIRONMENTAL PROTECTION...

  20. 40 CFR 93.129 - Special exemptions from conformity requirements for pilot program areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... with the conformity requirements of the pilot area's implementation plan revision for § 51.390 of this chapter and all other requirements in 40 CFR parts 51 and 93 that are not covered by the pilot area's... requirements for pilot program areas. 93.129 Section 93.129 Protection of Environment ENVIRONMENTAL PROTECTION...

  1. 40 CFR 93.129 - Special exemptions from conformity requirements for pilot program areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... with the conformity requirements of the pilot area's implementation plan revision for § 51.390 of this chapter and all other requirements in 40 CFR parts 51 and 93 that are not covered by the pilot area's... requirements for pilot program areas. 93.129 Section 93.129 Protection of Environment ENVIRONMENTAL PROTECTION...

  2. 40 CFR 93.129 - Special exemptions from conformity requirements for pilot program areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... with the conformity requirements of the pilot area's implementation plan revision for § 51.390 of this chapter and all other requirements in 40 CFR parts 51 and 93 that are not covered by the pilot area's... requirements for pilot program areas. 93.129 Section 93.129 Protection of Environment ENVIRONMENTAL PROTECTION...

  3. 40 CFR 93.129 - Special exemptions from conformity requirements for pilot program areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... with the conformity requirements of the pilot area's implementation plan revision for § 51.390 of this chapter and all other requirements in 40 CFR parts 51 and 93 that are not covered by the pilot area's... requirements for pilot program areas. 93.129 Section 93.129 Protection of Environment ENVIRONMENTAL PROTECTION...

  4. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Sea scallop access area program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop access area program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  5. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false Sea scallop access area program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop access area program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  6. 50 CFR 648.60 - Sea scallop area access program requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Sea scallop area access program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop area access program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  7. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Sea scallop access area program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop access area program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  8. 50 CFR 648.60 - Sea scallop area access program requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Sea scallop area access program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop area access program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  9. Compact FPGA hardware architecture for public key encryption in embedded devices.

    PubMed

    Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).

  10. Social capital as a key determinant of perceived benefits of community-based marine protected areas.

    PubMed

    Diedrich, Amy; Stoeckl, Natalie; Gurney, Georgina G; Esparon, Michelle; Pollnac, Richard

    2017-04-01

    Globally, marine protected areas (MPAs) have been relatively unsuccessful in meeting biodiversity objectives. To be effective, they require some alteration of people's use and access to marine resources, which they will resist if they do not perceive associated benefits. Stakeholders' support is crucial to ecological success of MPAs, and their support is likely to depend on their capacity to adapt to and benefit from MPAs. We examined the influence of social adaptive capacity (SAC) on perceived benefits of MPAs in Siquijor, Philippines, in the Coral Triangle. This region has substantial biodiversity and a population of over 120 million people, many of them dependent on marine resources for food and income. The region has many MPAs, most of which are managed under decentralized governance systems. We collected survey data from 540 households in 19 villages with associated MPAs. We evaluated the influence of multiple SAC variables (e.g., occupational multiplicity and social capital) on perceived benefits with decision trees (CHAID) and qualitatively analyzed this relationship with respect to types and recipients of benefits. Our models revealed the key role of social capital, particularly trust in leadership, in influencing perceptions of benefits (χ 2 = 14.762, p = 0.000). A path analysis revealed that perceptions of distributional equity were a key mechanism through which social capital affected perceived MPA benefits (root mean-square error of approximation = 0.050). Building social capital and equity within communities could lead to more effective management of MPAs and thus to expenditure of fewer resources relative to, for example, regulation enforcement. © 2016 Society for Conservation Biology.

  11. [Strategy of comprehensive control for schistosomiasis and its effect in key areas of Jiangsu Province].

    PubMed

    Sun, Le-Ping; Tian, Zeng-Xi; Yang, Kun; Hong, Qing-Biao; Gao, Yang; Gao, Yuan; Zhang, Lian-Heng; Yang, Guo-Jing; Min, Jie; Ge, Jun; Wu, Hong-Hui; Huang, Yi-Xin; Liang, You-Sheng

    2011-12-01

    To evaluate the effect of comprehensive control for schistosomiasis in key areas of Jiangsu Province. The basic data and the data of implementation of comprehensive control measures were collected from the key areas of Jiangsu Province, including 30 townships, 87 marshlands and 78 anchor points. A field survey was carried out to investigate the Oncomelania snail status by using the systematic sampling method and schistosomiasis morbidity in humans and animals in the 12 key counties (districts). The changes of snail status and morbidity of humans and animals were statistically analyzed in key counties (districts) where comprehensive control measures was implemented, and the effects of schistosomiasis control before and after the implementation of the comprehensive control were compared. From 2008 to 2010, a total of 84 100 harmless latrines were constructed, 339 600 persons were examined, 2.6938 million people received health education, 112 000 protective creams and 798 000 publicity materials were allocated, 9 085 domestic animals were reared in pens, 11 800 domestic animals were examined, 130 high-risk cattle were eliminated in 30 key townships of 12 countries (districts), Jiangsu Province. A total of 19 640.78 hm2 were controlled with molluscicides, 798 warning tablets were placed, 116.07 hm2 of farmlands were ploughed up and planted, 306.80 hm2 were dug for fish culture, and 506.74 hm2 were planted with trees for snail control in 87 high-risk marshlands. A total of 118.83 million Yuan were invested into the water resources development projects, 39.82 km-long rivers were dredged, 70.04 km-long bank were concreted, 30 culvert gates were re-constructed, and 22 snail sedimentation tanks were built. In the 78 anchor points, 95 harmless public toilets were built, 3 192 stool container were allocated, 28 700 boatmen were examined, 71 600 protective creams and 53 200 publicity materials were allocated, and 46 600 persons received health education. Following the

  12. 24 CFR 599.105 - Economic condition requirements for a nominated area.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Economic condition requirements for... Requirements for Nomination of Renewal Communities § 599.105 Economic condition requirements for a nominated area. (a) Certification for economic requirements. An official or officials authorized to do so by the...

  13. 24 CFR 599.105 - Economic condition requirements for a nominated area.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 3 2012-04-01 2012-04-01 false Economic condition requirements for... Requirements for Nomination of Renewal Communities § 599.105 Economic condition requirements for a nominated area. (a) Certification for economic requirements. An official or officials authorized to do so by the...

  14. 24 CFR 599.105 - Economic condition requirements for a nominated area.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 3 2013-04-01 2013-04-01 false Economic condition requirements for... Requirements for Nomination of Renewal Communities § 599.105 Economic condition requirements for a nominated area. (a) Certification for economic requirements. An official or officials authorized to do so by the...

  15. 24 CFR 599.105 - Economic condition requirements for a nominated area.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 3 2011-04-01 2010-04-01 true Economic condition requirements for... Requirements for Nomination of Renewal Communities § 599.105 Economic condition requirements for a nominated area. (a) Certification for economic requirements. An official or officials authorized to do so by the...

  16. 24 CFR 599.105 - Economic condition requirements for a nominated area.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 3 2014-04-01 2013-04-01 true Economic condition requirements for... Requirements for Nomination of Renewal Communities § 599.105 Economic condition requirements for a nominated area. (a) Certification for economic requirements. An official or officials authorized to do so by the...

  17. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  18. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    PubMed

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  19. Exploration maturity key to ranking search areas

    USGS Publications Warehouse

    Attanasi, E.D.; Freeman, P.A.

    2008-01-01

    The study area of US Geological Survey Circular 1288, the world outside the US and Canada, was partitioned into 44 countries and country groups. Map figures such as Fig. 2 and graphs similar to Figs. 3 and 4 provide a visual summary of maturity of oil and gas exploration. From 1992 through 2001, exploration data show that in the study area the delineated prospective area expanded at a rate of about 50,000 sq miles/year, while the explored area grew at a rate of 11,000 sq miles/year. The delineated prospective area established by 1970 accounts for less than 40% of total delineated prospective area but contains 75% of the oil discovered to date in the study area. From 1991 through 2000, offshore discoveries accounted for 59% of the oil and 77% of the gas discovered in the study area.

  20. Large area crop inventory experiment crop assessment subsystem software requirements document

    NASA Technical Reports Server (NTRS)

    1975-01-01

    The functional data processing requirements are described for the Crop Assessment Subsystem of the Large Area Crop Inventory Experiment. These requirements are used as a guide for software development and implementation.

  1. Air Force Officer Accession Planning: Addressing Key Gaps in Meeting Career Field Academic Degree Requirements for Nonrated Officers

    DTIC Science & Technology

    2016-06-09

    C O R P O R A T I O N Research Report Air Force Officer Accession Planning Addressing Key Gaps in Meeting Career Field Academic Degree Requirements...various Air Force missions in particular career fields. Key to this goal for nonrated officers is establishing and enforcing academic degree...35 Developing Accession Targets by Academic Degree Type

  2. Compact FPGA hardware architecture for public key encryption in embedded devices

    PubMed Central

    Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in GF(p), commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x). PMID:29360824

  3. An informatics research agenda to support precision medicine: seven key areas

    PubMed Central

    Avillach, Paul; Benham-Hutchins, Marge; Breitenstein, Matthew K; Crowgey, Erin L; Hoffman, Mark A; Jiang, Xia; Madhavan, Subha; Mattison, John E; Nagarajan, Radhakrishnan; Ray, Bisakha; Shin, Dmitriy; Visweswaran, Shyam; Zhao, Zhongming; Freimuth, Robert R

    2016-01-01

    The recent announcement of the Precision Medicine Initiative by President Obama has brought precision medicine (PM) to the forefront for healthcare providers, researchers, regulators, innovators, and funders alike. As technologies continue to evolve and datasets grow in magnitude, a strong computational infrastructure will be essential to realize PM’s vision of improved healthcare derived from personal data. In addition, informatics research and innovation affords a tremendous opportunity to drive the science underlying PM. The informatics community must lead the development of technologies and methodologies that will increase the discovery and application of biomedical knowledge through close collaboration between researchers, clinicians, and patients. This perspective highlights seven key areas that are in need of further informatics research and innovation to support the realization of PM. PMID:27107452

  4. Perspectives of self-direction: a systematic review of key areas contributing to service users' engagement and choice-making in self-directed disability services and supports.

    PubMed

    Lakhani, Ali; McDonald, Donna; Zeeman, Heidi

    2018-05-01

    Self-directed disability support policies aim to encourage greater choice and control for service users in terms of the health and social care they receive. The proliferation of self-directed disability support policies throughout the developed world has resulted in a growing amount of research exploring the outcomes for service users, and their families and carers. Our understanding of the issues faced by people with disabilities, particularly how they make health and social care decisions and the key areas that determine their engagement with service providers within a self-directed environment is limited. A synthesis of research is timely and can provide knowledge for service users and health and social care support providers to ensure their successful participation. A systematic review guided by the PRISMA approach explored (i) the key areas determining service users' engagement with self-directed disability services and supports, and (ii) how service users make informed decisions about providers. In October 2014 and April 2016, three databases - MEDLINE, CINAHL and Web of Science - were searched for research and review articles. Eighteen sources met the search criteria. Findings were mapped into either: key areas determining service user engagement, or service users' informed decision-making. Findings concerning key areas determining engagement fell into three themes - personal responsibility for budgeting, personalised approaches, and a cultural shift in practice and delivery among service providers. Findings about decision-making yielded two themes - supporting informed decision-making and inhibiting informed decision-making. Literature suggests that self-directed models of care may provide service users with increased control over the services that they receive. Increased control for some service users and their families requires independent external decision-making support, particularly around the domains of budgeting, planning and hiring. Future research

  5. Habitat area requirements of breeding forest birds of the middle Atlantic states

    USGS Publications Warehouse

    Robbins, Chandler S.; Dawson, Deanna K.; Dowell, Barbara A.

    1989-01-01

    Conservation of birds requires an understanding of their nesting requirements, including area as well as structural characteristics of the habitat. Previous studies have shown that many neotropical migrant bird species seem to depend on extensive forested areas, but the specific area requirements of individual species have not been clarified sufficiently to aid in design and management of effective preserves. For this 5-year study, bird and vegetation data were obtained at 469 points in forests ranging in area from 0.1 ha to more than 3,000 ha in Maryland and adjacent states. Data were analyzed first by stepwise regression to identify habitat factors that had the greatest influence on relative abundance of each bird species. In the relatively undisturbed mature forests studied, degree of isolation and area were significant predictors of relative abundance for more bird species than were any habitat variables. For species for which forest area was a significant predictor of abundance, we used logistic regression to examine the relationship between forest area and the probability of detecting the species. In managing forest lands for wildlife, top priority should go toward providing for the needs of area-sensitive or rare species rather than increasing species diversity per se. Avian species that occur in small and disturbed forests are generalists that are adapted to survival under edge conditions and need no special assistance from man. Forest reserves with thousands of hectares are required to have the highest probability of providing for the least common species of forest birds in a region. However, if preservation of large contiguous forest tracts is not a realistic option, results of this study suggest 2 alternative approaches. First, if other habitat attributes also are considered, smaller forests may provide suitable breeding sites for relatively rare species. Second, smaller tracts in close proximity to other forests may serve to attract or retain area

  6. Preliminary survey of potential STOL terminal area operational requirements

    DOT National Transportation Integrated Search

    1971-06-01

    A preliminary survey of potential operational requirements for STOL in the terminal area was made. The presentation of the survey is in three sections. The first section presents the motivation for the survey. The second section discusses the markets...

  7. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    PubMed Central

    Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.

    2018-01-01

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921

  8. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    PubMed

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  9. First direct landscape-scale measurement of tropical rain forest Leaf Area Index, a key driver of global primary productivity

    Treesearch

    David B. Clark; Paulo C. Olivas; Steven F. Oberbauer; Deborah A. Clark; Michael G. Ryan

    2008-01-01

    Leaf Area Index (leaf area per unit ground area, LAI) is a key driver of forest productivity but has never previously been measured directly at the landscape scale in tropical rain forest (TRF). We used a modular tower and stratified random sampling to harvest all foliage from forest floor to canopy top in 55 vertical transects (4.6 m2) across 500 ha of old growth in...

  10. Area requirements of grassland birds: A regional perspective

    USGS Publications Warehouse

    Johnson, Douglas H.; Igl, Lawrence D.

    2001-01-01

    Area requirements of grassland birds have not been studied except in tallgrass prairie. We studied the relation between both species-occurrence and density and patch size by conducting 699 fixed-radius point counts of 15 bird species on 303 restored grassland areas in nine counties in four northern Great Plains states. Northern Harrier (Circus cyaneus), Sedge Wren (Cistothorus platensis), Clay-colored Sparrow (Spizella pallida), Grasshopper Sparrow (Ammodramus savannarum), Baird's Sparrow (Ammodramus bairdii), Le Conte's Sparrow (Ammodramus leconteii), and Bobolink (Dolichonyx oryzivorus) were shown to favor larger grassland patches in one or more counties. Evidence of area sensitivity was weak or ambivalent for Eastern Kingbird (Tyrannus tyrannus), Common Yellowthroat (Geothlypis trichas), Savannah Sparrow (Passerculus sandwichensis), and Western Meadowlark (Sturnella neglecta). Red-winged Blackbirds (Agelaius phoeniceus) preferred larger patches in some counties, and smaller patches in others. Mourning Doves (Zenaida macroura) and Brown- headed Cowbirds (Molothrus ater) tended to favor smaller grassland patches. Three species showed greater area sensitivity in counties where each species was more common. Five species demonstrated some spatial pattern of area sensitivity, either north to south or east to west. This study demonstrates the importance of replication in space; results from one area may not apply to others because of differences in study design, analytical methods, location relative to range of the species, and surrounding landscapes.

  11. The minimum area requirements (MAR) for giant panda: an empirical study.

    PubMed

    Qing, Jing; Yang, Zhisong; He, Ke; Zhang, Zejun; Gu, Xiaodong; Yang, Xuyu; Zhang, Wen; Yang, Biao; Qi, Dunwu; Dai, Qiang

    2016-12-08

    Habitat fragmentation can reduce population viability, especially for area-sensitive species. The Minimum Area Requirements (MAR) of a population is the area required for the population's long-term persistence. In this study, the response of occupancy probability of giant pandas against habitat patch size was studied in five of the six mountain ranges inhabited by giant panda, which cover over 78% of the global distribution of giant panda habitat. The probability of giant panda occurrence was positively associated with habitat patch area, and the observed increase in occupancy probability with patch size was higher than that due to passive sampling alone. These results suggest that the giant panda is an area-sensitive species. The MAR for giant panda was estimated to be 114.7 km 2 based on analysis of its occupancy probability. Giant panda habitats appear more fragmented in the three southern mountain ranges, while they are large and more continuous in the other two. Establishing corridors among habitat patches can mitigate habitat fragmentation, but expanding habitat patch sizes is necessary in mountain ranges where fragmentation is most intensive.

  12. Roadmap for High School Feedback Reports: Key Focus Areas to Ensure Quality Implementation. Data for Action

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2014

    2014-01-01

    High school feedback reports let school and district leaders know where their students go after graduation and how well they are prepared for college and beyond. This roadmap discusses the seven key focus areas the Data Quality Campaign (DQC) recommends states work on to ensure quality implementation of high school feedback reports.

  13. 24 CFR 35.940 - Special requirements for insular areas.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Special requirements for insular areas. 35.940 Section 35.940 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES...

  14. 24 CFR 35.940 - Special requirements for insular areas.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Special requirements for insular areas. 35.940 Section 35.940 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES...

  15. 24 CFR 35.940 - Special requirements for insular areas.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Special requirements for insular areas. 35.940 Section 35.940 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES...

  16. 24 CFR 35.940 - Special requirements for insular areas.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Special requirements for insular areas. 35.940 Section 35.940 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES...

  17. 24 CFR 35.940 - Special requirements for insular areas.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Special requirements for insular areas. 35.940 Section 35.940 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES...

  18. An informatics research agenda to support precision medicine: seven key areas.

    PubMed

    Tenenbaum, Jessica D; Avillach, Paul; Benham-Hutchins, Marge; Breitenstein, Matthew K; Crowgey, Erin L; Hoffman, Mark A; Jiang, Xia; Madhavan, Subha; Mattison, John E; Nagarajan, Radhakrishnan; Ray, Bisakha; Shin, Dmitriy; Visweswaran, Shyam; Zhao, Zhongming; Freimuth, Robert R

    2016-07-01

    The recent announcement of the Precision Medicine Initiative by President Obama has brought precision medicine (PM) to the forefront for healthcare providers, researchers, regulators, innovators, and funders alike. As technologies continue to evolve and datasets grow in magnitude, a strong computational infrastructure will be essential to realize PM's vision of improved healthcare derived from personal data. In addition, informatics research and innovation affords a tremendous opportunity to drive the science underlying PM. The informatics community must lead the development of technologies and methodologies that will increase the discovery and application of biomedical knowledge through close collaboration between researchers, clinicians, and patients. This perspective highlights seven key areas that are in need of further informatics research and innovation to support the realization of PM. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  19. Philippine protected areas are not meeting the biodiversity coverage and management effectiveness requirements of Aichi Target 11.

    PubMed

    Mallari, Neil Aldrin D; Collar, Nigel J; McGowan, Philip J K; Marsden, Stuart J

    2016-04-01

    Aichi Target 11 of the Convention on Biological Diversity urges, inter alia, that nations protect at least 17 % of their land, and that protection is effective and targets areas of importance for biodiversity. Five years before reporting on Aichi targets is due, we assessed the Philippines' current protected area system for biodiversity coverage, appropriateness of management regimes and capacity to deliver protection. Although protected estate already covers 11 % of the Philippines' land area, 64 % of its key biodiversity areas (KBAs) remain unprotected. Few protected areas have appropriate management and governance infrastructures, funding streams, management plans and capacity, and a serious mismatch exists between protected area land zonation regimes and conservation needs of key species. For the Philippines to meet the biodiversity coverage and management effectiveness elements of Aichi Target 11, protected area and KBA boundaries should be aligned, management systems reformed to pursue biodiversity-led targets and effective management capacity created.

  20. Management Requirements of the 3COM Ethernet Local Area Network

    DTIC Science & Technology

    1988-09-01

    Management Information System . With the introduction of new technology comes the requirement to administer the network. This paper describes LAN services available on the network, management philosophies for the LAN services, and areas of LAN administration considered important to the successful operation and maintenance of a LAN. LAN administration problems identified by users are also addressed. Keywords included; Local area network (LAN); Lan management; Lan administration; 3COM ETHERNET LAN.

  1. Elementary and Secondary Education: Flexibility Initiatives Do Not Address Districts' Key Concerns about Federal Requirements. Report to Congressional Requesters.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Health, Education, and Human Services Div.

    The Government Accounting Office (GAO) was asked to: (1) describe major federal requirements that affect school districts; (2) identify key issues school districts face in implementing these requirements; and (3) analyze the impact of the Department of Education's flexibility initiatives on school districts' ability to address these implementation…

  2. 47 CFR 80.753 - Signal strength requirements at the service area contour.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Signal strength requirements at the service... Station VHF Coverage § 80.753 Signal strength requirements at the service area contour. (a) The requirements for reception by a marine VHF shipboard receiver are satisfied if the field strength from the...

  3. 47 CFR 80.753 - Signal strength requirements at the service area contour.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Signal strength requirements at the service... Station VHF Coverage § 80.753 Signal strength requirements at the service area contour. (a) The requirements for reception by a marine VHF shipboard receiver are satisfied if the field strength from the...

  4. The minimum area requirements (MAR) for giant panda: an empirical study

    PubMed Central

    Qing, Jing; Yang, Zhisong; He, Ke; Zhang, Zejun; Gu, Xiaodong; Yang, Xuyu; Zhang, Wen; Yang, Biao; Qi, Dunwu; Dai, Qiang

    2016-01-01

    Habitat fragmentation can reduce population viability, especially for area-sensitive species. The Minimum Area Requirements (MAR) of a population is the area required for the population’s long-term persistence. In this study, the response of occupancy probability of giant pandas against habitat patch size was studied in five of the six mountain ranges inhabited by giant panda, which cover over 78% of the global distribution of giant panda habitat. The probability of giant panda occurrence was positively associated with habitat patch area, and the observed increase in occupancy probability with patch size was higher than that due to passive sampling alone. These results suggest that the giant panda is an area-sensitive species. The MAR for giant panda was estimated to be 114.7 km2 based on analysis of its occupancy probability. Giant panda habitats appear more fragmented in the three southern mountain ranges, while they are large and more continuous in the other two. Establishing corridors among habitat patches can mitigate habitat fragmentation, but expanding habitat patch sizes is necessary in mountain ranges where fragmentation is most intensive. PMID:27929520

  5. The Acquisition of Key Executive Skills and Attitudes Required for International Business in the Third Millennium.

    ERIC Educational Resources Information Center

    Satterlee, Brian

    This study used a multimethod research technique to examine the acquisition of key executive skills and attitudes required for success in the international business arena. Following a review of the literature, the report presents the results of responses by a panel of 36 international business experts from Canada, Mexico, and the United States to…

  6. 18. Interior view, 'Inside Key Route Inspection Bldg.', view to ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. Interior view, 'Inside Key Route Inspection Bldg.', view to east, August 16, 1939. Note inspection pits and work areas beneath tracks. The Key Route and Interurban Electric Railway Bridge Yard Shop buildings were identical, and this view provides an in-service look at the well-lit interior. While Key Route articulated cars were quite different in design from the Interurban Electric Railway cars, the maintenance requirements were quite similar. The Key Route Bridge Yard Shop building was demolished in the 1970s. Its last use was storage of much of the historic railway equipment now on display at the California State Railroad Museum in Sacramento. - Interurban Electric Railway Bridge Yard Shop, Interstate 80 at Alameda County Postmile 2.0, Oakland, Alameda County, CA

  7. Managing Legal Texts in Requirements Engineering

    NASA Astrophysics Data System (ADS)

    Otto, Paul N.; Antón, Annie I.

    Laws and regulations are playing an increasingly important role in requirements engineering and systems development. Monitoring systems for requirements and policy compliance has been recognized in the requirements engineering community as a key area for research. Similarly, legal compliance is critical in systems development, especially given that non-compliance can result in both financial and criminal penalties. Working with legal texts can be very challenging, however, because they contain numerous ambiguities, cross-references, domain-specific definitions, and acronyms, and are frequently amended via new statutes, regulations, and case law. Requirements engineers and compliance auditors must be able to identify relevant legal texts, extract requirements and other key concepts, and monitor compliance. This chapter surveys research efforts over the past 50 years in handling legal texts for systems development. This survey can aid requirements engineers and auditors to better specify, test, and monitor systems for compliance.

  8. Crew Escape Technologies (CREST) Mission Area Requirements Study Current and Future Crew Escape Requirements

    DTIC Science & Technology

    1992-02-01

    purchased from: National Tecnical Information Service 5285 Port Royal Road Springfield VA 22161 Federal Governmet agencies and their contractors registered...Engineering Incpora:ted (IME) to organize and executi a tecnical approach to the QP= 14. SUIUECT TERMS Mission Area Requiremts, REST Escape SystM IS...the aerodynamic stabilization subsystems to become effective (drogue parachutes, or fins for the S4S), and the time required for the recovery parachute

  9. 76 FR 1360 - Regulated Navigation Area; Reporting Requirements for Barges Loaded With Certain Dangerous...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-10

    ... requirements under the Regulated Navigation Area (RNA) established by 33 CFR 165.830 for barges loaded with... the RNA. This suspension of the CDC reporting requirements in no way relieves towing vessel operators and fleeting area managers responsible for CDC barges in the RNA from their dangerous cargo or vessel...

  10. 49 CFR 195.12 - What requirements apply to low-stress pipelines in rural areas?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false What requirements apply to low-stress pipelines in... low-stress pipelines in rural areas? (a) General. This Section sets forth the requirements for each category of low-stress pipeline in a rural area set forth in paragraph (b) of this Section. This Section...

  11. Summary of Energy Assessment Requirements under the Area Source Boiler Rule

    EPA Pesticide Factsheets

    This document provides an overview of the energy assessment requirements for the national emission standards for hazardous air pollutants (NESHAP) for area sources: industrial, commercial and Institutional boilers, 40 CFR Part 63, Subpart JJJJJJ.

  12. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  13. Evaluation of solar sludge drying alternatives by costs and area requirements.

    PubMed

    Kurt, Mayıs; Aksoy, Ayşegül; Sanin, F Dilek

    2015-10-01

    Thermal drying is a common method to reach above 90% dry solids content (DS) in sludge. However, thermal drying requires high amount of energy and can be expensive. A greenhouse solar dryer (GSD) can be a cost-effective substitute if the drying performance, which is typically 70% DS, can be increased by additional heat. In this study feasibility of GSD supported with solar panels is evaluated as an alternative to thermal dryers to reach 90% DS. Evaluations are based on capital and O&M costs as well as area requirements for 37 wastewater treatment plants (WWTPs) with various sludge production rates. Costs for the supported GSD system are compared to that of conventional and co-generation thermal dryers. To calculate the optimal costs associated with the drying system, an optimization model was developed in which area limitation was a constraint. Results showed that total cost was minimum when the DS in the GSD (DS(m,i)) was equal to the maximum attainable value (70% DS). On average, 58% of the total cost and 38% of total required area were associated with the GSD. Variations in costs for 37 WWTPs were due to differences in initial DS (DS(i,i)) and sludge production rates, indicating the importance of dewatering to lower drying costs. For large plants, GSD supported with solar panels provided savings in total costs especially in long term when compared to conventional and co-generation thermal dryers. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Uptake of a Dashboard Designed to Give Realtime Feedback to a Sentinel Network About Key Data Required for Influenza Vaccine Effectiveness Studies.

    PubMed

    Pathirannehelage, Sameera; Kumarapeli, Pushpa; Byford, Rachel; Yonova, Ivelina; Ferreira, Filipa; de Lusignan, Simon

    2018-01-01

    Dashboards are technologies that bringing together a range of data sources for observational or analytical purposes. We have created a customised dashboard that includes all the key data elements required for monitoring flu vaccine effectiveness (FVE). This delivers a unique dashboard for each primary care provider (general practice) providing data to the Royal College of General Practitioners (RCGP) Research and Surveillance Centre (RSC), one of the oldest European surveillance systems. These FVE studies use a test negative case control (TNCC) design. TNCC requires knowledge of practice denominator; vaccine exposure, and results of influenza virology swabs carried out to identify in an influenza-like-illness (ILI), a clinical diagnosis, really is influenza. The dashboard displays the denominator uploaded each week into the surveillance system, compared with the nationally known practice size (providing face-validity for the denominator); it identifies those exposed to the vaccine (by age group and risk category) and virology specimens taken and missed opportunities for surveillance (again by category). All sentinel practices can access in near real time (4 working days in areas) their rates of vaccine exposure and swabs conducted. Initial feedback is positive; 80% (32/40) practices responded positively.

  15. Elucidating Key Motifs Required for Arp2/3-Dependent and Independent Actin Nucleation by Las17/WASP

    PubMed Central

    Urbanek, Agnieszka N.; Smaczynska-de Rooij, Iwona I.

    2016-01-01

    Actin nucleation is the key rate limiting step in the process of actin polymerization, and tight regulation of this process is critical to ensure actin filaments form only at specific times and at defined regions of the cell. Arp2/3 is a well-characterised protein complex that can promote nucleation of new filaments, though its activity requires additional nucleation promotion factors (NPFs). The best recognized of these factors are the WASP family of proteins that contain binding motifs for both monomeric actin and for Arp2/3. Previously we demonstrated that the yeast WASP homologue, Las17, in addition to activating Arp2/3 can also nucleate actin filaments de novo, independently of Arp2/3. This activity is dependent on its polyproline rich region. Through biochemical and in vivo analysis we have now identified key motifs within the polyproline region that are required for nucleation and elongation of actin filaments, and have addressed the role of the WH2 domain in the context of actin nucleation without Arp2/3. We have also demonstrated that full length Las17 is able to bind liposomes giving rise to the possibility of direct linkage of nascent actin filaments to specific membrane sites to which Las17 has been recruited. Overall, we propose that Las17 functions as the key initiator of de novo actin filament formation at endocytic sites by nucleating, elongating and tethering nascent filaments which then serve as a platform for Arp2/3 recruitment and function. PMID:27637067

  16. Efficient expansion of global protected areas requires simultaneous planning for species and ecosystems

    PubMed Central

    Polak, Tal; Watson, James E. M.; Fuller, Richard A.; Joseph, Liana N.; Martin, Tara G.; Possingham, Hugh P.; Venter, Oscar; Carwardine, Josie

    2015-01-01

    The Convention on Biological Diversity (CBD)'s strategic plan advocates the use of environmental surrogates, such as ecosystems, as a basis for planning where new protected areas should be placed. However, the efficiency and effectiveness of this ecosystem-based planning approach to adequately capture threatened species in protected area networks is unknown. We tested the application of this approach in Australia according to the nation's CBD-inspired goals for expansion of the national protected area system. We set targets for ecosystems (10% of the extent of each ecosystem) and threatened species (variable extents based on persistence requirements for each species) and then measured the total land area required and opportunity cost of meeting those targets independently, sequentially and simultaneously. We discover that an ecosystem-based approach will not ensure the adequate representation of threatened species in protected areas. Planning simultaneously for species and ecosystem targets delivered the most efficient outcomes for both sets of targets, while planning first for ecosystems and then filling the gaps to meet species targets was the most inefficient conservation strategy. Our analysis highlights the pitfalls of pursuing goals for species and ecosystems non-cooperatively and has significant implications for nations aiming to meet their CBD mandated protected area obligations. PMID:26064645

  17. MSAT wide-area fleet management: End-user requirements and applications

    NASA Technical Reports Server (NTRS)

    Pedersen, Allister

    1995-01-01

    MSAT (Mobile SATellite) Services will become a reality in North America in 1995. MSAT will provide wide-area voice, data and fax services to land, marine and aeronautical mobile users anywhere in North America including 200 nautical miles off the coasts and into the Arctic waters. MSAT will also convey GPS position information from mobiles to dispatch centers. One broad application of MSAT is Wide Area Fleet Management (WAFM). This paper defines WAFM, outlines end-user requirements and identifies potential applications of MSAT WAFM. The paper draws from information obtained in several preMSAT WAFM field trials in land, marine and aeronautical mobile environments. The paper concludes with an outline of the potential benefits of MSAT WAFM.

  18. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  19. Functional requirements for Waste Area Grouping 6 Monitoring Station 3 upgrade

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fiuzat, A.A.

    1991-06-01

    The surface Waste Area Grouping (WAG)6 at ORNL may undergo many changes in the future as part of the closure activities. Changes in surface characteristics will cause changes in runoff characteristics of the MS 3 watershed. Appropriate assumptions are to be made in this project regarding the future surface conditions of the watershed. The extent to which the assumed surface conditions will affect the project objectives (defined in Section 1.0) is to be identified. The purpose of this FRD is to establish performance requirements for MS 3 consisting of the following: (1) The expected range of discharges passing through themore » station and the required accuracy levels for discharge measurements. (2) The equipment required to measure the expected discharges at the required accuracy levels. (3) The sampling requirements for monitoring water quality. (4) The hydraulic requirements for the discharge conveyance structure to be located under the IWMF access road. (5) The design loads to be used for the bridge over the IWMF access road. 12 refs., 5 figs.« less

  20. Prediction of Regulation Reserve Requirements in California ISO Control Area based on BAAL Standard

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Etingov, Pavel V.; Makarov, Yuri V.; Samaan, Nader A.

    This paper presents new methodologies developed at Pacific Northwest National Laboratory (PNNL) to estimate regulation capacity requirements in the California ISO control area. Two approaches have been developed: (1) an approach based on statistical analysis of actual historical area control error (ACE) and regulation data, and (2) an approach based on balancing authority ACE limit control performance standard. The approaches predict regulation reserve requirements on a day-ahead basis including upward and downward requirements, for each operating hour of a day. California ISO data has been used to test the performance of the proposed algorithms. Results show that software tool allowsmore » saving up to 30% on the regulation procurements cost .« less

  1. Analysis of safety reports involving area navigation and required navigation performance procedures.

    DOT National Transportation Integrated Search

    2010-11-03

    In order to achieve potential operational and safety benefits enabled by Area Navigation (RNAV) and Required Navigation Performance (RNP) procedures it is important to monitor emerging issues in their initial implementation. Reports from the Aviation...

  2. Evaluation of target acquisition difficulty using recognition distance to measure required retinal area

    NASA Astrophysics Data System (ADS)

    Nilsson, Thomy H.

    2001-09-01

    The psychophysical method of limits was used to measure the distance at which observers could distinguish military vehicles photographed in natural landscapes. Obtained from the TNO-TM Search_2 dataset, these pictures either were rear-projected 35-mm slides or were presented on a computer monitor. Based on the rationale that more difficult vehicle targets would require more visual pathways for recognition, difficult of acquisition was defined in terms of the relative retinal area required for recognition. Relative retinal area was derived from the inverse square of the recognition distance of a particular vehicle relative to the distance of the vehicle that could be seen furthest away. Results are compared with data on the time required to find the vehicles in these pictures. These comparison indicate recognition distance thresholds can be a suitable means of defining standards for the effectiveness of vital graphic information; and the two methods are complementary with respect to distinguishing different degrees of acquisition difficulty, and together may provide a means to measure the total information processing required for recognition.

  3. The Geology of the Florida Keys.

    ERIC Educational Resources Information Center

    Shinn, Eugene A.

    1988-01-01

    Describes some of the ancient geologic history of the Florida Keys from Key Largo to Key West including the effects of glaciers, sea level rise, reef distribution, spurs and grooves, backstepping and ecological zonation, growth rates and erosion. Predicts future changes in this area. (CW)

  4. Power requirements for commercial communications spacecraft

    NASA Technical Reports Server (NTRS)

    Billerbeck, W. J.

    1985-01-01

    Historical data on commercial spacecraft power systems are presented and their power requirements to the growth of satellite communications channel usage are related. Some approaches for estimating future power requirements of this class of spacecraft through the year 2000 are proposed. The key technology drivers in satellite power systems are addressed. Several technological trends in such systems are described, focusing on the most useful areas for research and development of major subsystems, including solar arrays, energy storage, and power electronics equipment.

  5. 77 FR 43567 - Medical Area Body Network

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... document requests comment on a number of issues related to the designation of Medical Body Area Network... also determined that additional notice and comment was required on key aspects related to the process and criteria for designating an MBAN coordinator. DATES: Comments must be filed on or before September...

  6. 40 CFR 51.914 - What new source review requirements apply for 8-hour ozone nonattainment areas?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... apply for 8-hour ozone nonattainment areas? 51.914 Section 51.914 Protection of Environment... Standard § 51.914 What new source review requirements apply for 8-hour ozone nonattainment areas? The requirements for new source review for the 8-hour ozone standard are located in § 51.165 of this part. [70 FR...

  7. 40 CFR 51.914 - What new source review requirements apply for 8-hour ozone nonattainment areas?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... apply for 8-hour ozone nonattainment areas? 51.914 Section 51.914 Protection of Environment... Standard § 51.914 What new source review requirements apply for 8-hour ozone nonattainment areas? The requirements for new source review for the 8-hour ozone standard are located in § 51.165 of this part. [70 FR...

  8. 40 CFR 51.914 - What new source review requirements apply for 8-hour ozone nonattainment areas?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... apply for 8-hour ozone nonattainment areas? 51.914 Section 51.914 Protection of Environment... Standard § 51.914 What new source review requirements apply for 8-hour ozone nonattainment areas? The requirements for new source review for the 8-hour ozone standard are located in § 51.165 of this part. [70 FR...

  9. 40 CFR 51.914 - What new source review requirements apply for 8-hour ozone nonattainment areas?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... apply for 8-hour ozone nonattainment areas? 51.914 Section 51.914 Protection of Environment... Standard § 51.914 What new source review requirements apply for 8-hour ozone nonattainment areas? The requirements for new source review for the 8-hour ozone standard are located in § 51.165 of this part. [70 FR...

  10. 40 CFR 51.914 - What new source review requirements apply for 8-hour ozone nonattainment areas?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... apply for 8-hour ozone nonattainment areas? 51.914 Section 51.914 Protection of Environment... Standard § 51.914 What new source review requirements apply for 8-hour ozone nonattainment areas? The requirements for new source review for the 8-hour ozone standard are located in § 51.165 of this part. [70 FR...

  11. An SSH key management system: easing the pain of managing key/user/account associations

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  12. 33 CFR 151.69 - Operating requirements: Discharge of garbage outside special areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES... on Environmental Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151.69 Operating requirements: Discharge of garbage outside special areas. (a) When...

  13. 33 CFR 151.69 - Operating requirements: Discharge of garbage outside special areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES... on Environmental Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151.69 Operating requirements: Discharge of garbage outside special areas. (a) When...

  14. 33 CFR 151.69 - Operating requirements: Discharge of garbage outside special areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES... on Environmental Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151.69 Operating requirements: Discharge of garbage outside special areas. (a) When...

  15. 78 FR 60216 - Regulated Navigation Area; Reporting Requirements for Barges Loaded With Certain Dangerous...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-01

    ... published stay (suspension) of reporting requirements under the Regulated Navigation Area (RNA) established... fleeting area managers responsible for CDC barges in the RNA from their dangerous cargo or vessel arrival... preamble as being available in the docket are part of docket USCG-2013-0760. To view documents mentioned in...

  16. 78 FR 25 - Regulated Navigation Area; Reporting Requirements for Barges Loaded With Certain Dangerous...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-02

    ... published stay (suspension) of reporting requirements under the Regulated Navigation Area (RNA) established... vessel operators and fleeting area managers responsible for CDC barges in the RNA from their dangerous...: Documents indicated in this preamble as being available in the docket are part of docket USCG-2012-1074. To...

  17. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE, AIKEN, SC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martin, D

    2006-10-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on ''rapid'' and, because the available keys contained a large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained more genera than we would likely encounter and because this larger number of genera required both more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher) more time was required tomore » process samples. In developing this set of keys I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.« less

  18. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  19. College and Career Ready? Perceptions of High School Students Related to WorkKeys Assessments

    ERIC Educational Resources Information Center

    Schultz, Deanna D.

    2011-01-01

    Concern about college and career readiness has been expressed in both the business and education arenas. Employers are calling for entry-level employees with basic academic skills and educators are being held accountable for student achievement in academic areas similar to those required by employers. In this environment, WorkKeys has emerged as a…

  20. Algorithms for Lightweight Key Exchange †

    PubMed Central

    Santonja, Juan; Zamora, Antonio

    2017-01-01

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks. PMID:28654006

  1. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  2. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  3. Toward Large-Area Sub-Arcsecond X-Ray Telescopes

    NASA Technical Reports Server (NTRS)

    O'Dell, Stephen L.; Aldcroft, Thomas L.; Allured, Ryan; Atkins, Carolyn; Burrows, David N.; Cao, Jian; Chalifoux, Brandon D.; Chan, Kai-Wing; Cotroneo, Vincenzo; Elsner, Ronald F.; hide

    2014-01-01

    The future of x-ray astronomy depends upon development of x-ray telescopes with larger aperture areas (>1 sq m) and finer angular resolution(<1).Combined with the special requirements of nested grazing incidence optics, the mass and envelope constraints of spaceborne telescopes render such advances technologically challenging. Achieving this goal will require precision fabrication, alignment, mounting, and assembly of large areas (>100 sq m) of lightweight (1 kg/sq m areal density) high quality mirrors-possibly entailing active (in-space adjustable) alignment and figure correction. This paper discusses relevant programmatic and technological issues and summarizes progress toward large area sub-arcsecond x-ray telescopes. Key words: X-ray telescopes, x-ray optics, active optics, electroactive devices, silicon mirrors, differential deposition, ion implantation.

  4. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martin, D

    2007-09-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was requiredmore » to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.« less

  5. 33 CFR 165.921 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... RNA must report the information required by this section as set out in table 165.921(g) to this...) Regulated Navigation Area. The following waters are a regulated navigation area (RNA): the Illinois Waterway... RNA. This section does not apply to towing vessel operators responsible for barges not carrying CDC...

  6. 33 CFR 165.921 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... RNA must report the information required by this section as set out in table 165.921(g) to this...) Regulated Navigation Area. The following waters are a regulated navigation area (RNA): the Illinois Waterway... RNA. This section does not apply to towing vessel operators responsible for barges not carrying CDC...

  7. 33 CFR 165.921 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... RNA must report the information required by this section as set out in table 165.921(g) to this...) Regulated Navigation Area. The following waters are a regulated navigation area (RNA): the Illinois Waterway... RNA. This section does not apply to towing vessel operators responsible for barges not carrying CDC...

  8. 33 CFR 165.921 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... RNA must report the information required by this section as set out in table 165.921(g) to this...) Regulated Navigation Area. The following waters are a regulated navigation area (RNA): the Illinois Waterway... RNA. This section does not apply to towing vessel operators responsible for barges not carrying CDC...

  9. 33 CFR 165.921 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... RNA must report the information required by this section as set out in table 165.921(g) to this...) Regulated Navigation Area. The following waters are a regulated navigation area (RNA): the Illinois Waterway... RNA. This section does not apply to towing vessel operators responsible for barges not carrying CDC...

  10. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE PAGES

    Farmer, M. T.; Gerardi, C.; Bremer, N.; ...

    2016-10-31

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  11. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farmer, M. T.; Gerardi, C.; Bremer, N.

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  12. 33 CFR 165.830 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... barges in the RNA must report the information required by this section as set out in table 165.830(g) of... navigation area (RNA): the Mississippi River above mile 235.0, Above Head of Passes, including all its... vessel operators and fleeting area managers responsible for CDC barges in the RNA. This section does not...

  13. 33 CFR 165.830 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... barges in the RNA must report the information required by this section as set out in table 165.830(g) of... navigation area (RNA): the Mississippi River above mile 235.0, Above Head of Passes, including all its... vessel operators and fleeting area managers responsible for CDC barges in the RNA. This section does not...

  14. 33 CFR 165.830 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... barges in the RNA must report the information required by this section as set out in table 165.830(g) of... navigation area (RNA): the Mississippi River above mile 235.0, Above Head of Passes, including all its... vessel operators and fleeting area managers responsible for CDC barges in the RNA. This section does not...

  15. 33 CFR 165.830 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... barges in the RNA must report the information required by this section as set out in table 165.830(g) of... navigation area (RNA): the Mississippi River above mile 235.0, Above Head of Passes, including all its... vessel operators and fleeting area managers responsible for CDC barges in the RNA. This section does not...

  16. 33 CFR 165.830 - Regulated Navigation Area; Reporting Requirements for Barges Loaded with Certain Dangerous...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... barges in the RNA must report the information required by this section as set out in table 165.830(g) of... navigation area (RNA): the Mississippi River above mile 235.0, Above Head of Passes, including all its... vessel operators and fleeting area managers responsible for CDC barges in the RNA. This section does not...

  17. [Investigation of human brucellosis diagnosis and report quality in medical institutions in key areas of Shanxi province].

    PubMed

    Zeng, L J; Yang, W W; Tie, P; Liu, X R; Gao, X R; Li, Z Y; Hou, P; Zhi, Y; Bai, Y F; Geng, M J; Chen, Q L; Cui, B Y; Li, Z J; Wang, L P

    2017-11-10

    Objective: To evaluate the accuracy of human brucellosis diagnosis and reporting in medical institutions in Shanxi province, and understand the performance of clinical doctors to diagnose human brucellosis according to diagnostic criteria. Methods: Field investigation was conducted in 6 medical institutions in the key areas of human brucellosis in Shanxi province. The diagnosis data of the reported brucellosis cases in 2015 were collected and reviewed retrospectively for the evaluation of the diagnosis accuracy with systematic sampling method. The database was established with Excel 2010 and the descriptive analysis and statistical test were conducted with software R 3.3.2. Results: The diagnosis consistent rate of the 377 brucellosis cases reviewed was 70.8% (267/377), the diagnosis consistent rates in medical institutions at city-level and country-level were 77.0% (127/165) and 66.0% (140/212) respectively, the differences had significance ( χ (2)=5.4, P =0.02). Among the reviewed cases, the diagnosis consistent rate of laboratory diagnosis and clinical diagnosis were 87.1% (256/294) and 13.3% (11/83) respectively, and the differences had significance ( χ (2)=170.7, P <0.001). Among the 21 investigated clinical doctors, the numbers of the doctors who correctly diagnosed the suspected cases, probable cases and lab-confirmed cases were only 3, 0 and 8 respectively. All of the clinical doctors knew that it is necessary to report the brucellosis cases within 24 hours after diagnosis. Conclusion: The accuracy of human brucellosis diagnosis in key areas of human brucellosis in Shanxi was low, and the performance of the clinical doctors to diagnose human brucellosis according to diagnostic and case classification criteria was unsatisfied.

  18. Key tasks in healthcare marketing: assessing importance and current level of knowledge.

    PubMed

    Kennett, Pamela A; Henson, Steve W; Crow, Stephen M; Hartman, Sandra J

    2005-01-01

    When examining the healthcare industry, the need for continuing education in internal functions (i.e., HR management) has been documented. However, equally important to success in the healthcare industry are external functions such as marketing. In an expansion of research on internally focused functions, we report findings from an exploratory study designed to examine the perceptions of executives about managerial skill needs in the externally focused area of marketing. Specifically, we examine eight key tasks in marketing and ask executives to rate the level of knowledge required for each and then to assess current, or actual, levels of knowledge in the field. Findings suggest that pricing strategy, product strategy, and segmentation and targeting were the tasks that require the most knowledge for healthcare marketers, and that they do, in fact, perceive various gaps in all of the areas examined. Implications and suggestions for future research are provided.

  19. Content Area Reading Instruction for Secondary Teacher Candidates: A Case Study of a State-Required Online Content Area Reading Course

    ERIC Educational Resources Information Center

    Biggs, Brad

    2014-01-01

    This dissertation examined in a state-required, online preservice teacher course in content area reading instruction (CARI) at a large land-grant university in Minnesota. Few studies have been published to date on revitalized literacy teacher preparation efforts in CARI (See Vagle, Dillon, Davison-Jenkins, & LaDuca, 2005; Dillon, O'Brien,…

  20. Minimum area requirements for an at-risk butterfly based on movement and demography.

    PubMed

    Brown, Leone M; Crone, Elizabeth E

    2016-02-01

    Determining the minimum area required to sustain populations has a long history in theoretical and conservation biology. Correlative approaches are often used to estimate minimum area requirements (MARs) based on relationships between area and the population size required for persistence or between species' traits and distribution patterns across landscapes. Mechanistic approaches to estimating MAR facilitate prediction across space and time but are few. We used a mechanistic MAR model to determine the critical minimum patch size (CMP) for the Baltimore checkerspot butterfly (Euphydryas phaeton), a locally abundant species in decline along its southern range, and sister to several federally listed species. Our CMP is based on principles of diffusion, where individuals in smaller patches encounter edges and leave with higher probability than those in larger patches, potentially before reproducing. We estimated a CMP for the Baltimore checkerspot of 0.7-1.5 ha, in accordance with trait-based MAR estimates. The diffusion rate on which we based this CMP was broadly similar when estimated at the landscape scale (comparing flight path vs. capture-mark-recapture data), and the estimated population growth rate was consistent with observed site trends. Our mechanistic approach to estimating MAR is appropriate for species whose movement follows a correlated random walk and may be useful where landscape-scale distributions are difficult to assess, but demographic and movement data are obtainable from a single site or the literature. Just as simple estimates of lambda are often used to assess population viability, the principles of diffusion and CMP could provide a starting place for estimating MAR for conservation. © 2015 Society for Conservation Biology.

  1. Assessment of Rooftop Area in Austin Energy's Service Territory Suitable for PV Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiese, Steven M.

    The objective of this project was to create a model for assessing the amount of rooftop area on commercial, industrial, institutional, and governmental buildings in Austin Energy's service area suitable for solar electric energy development and, based on this model, determine the potential installed capacity and annual energy production from solar electric installations on the rooftops of these buildings. Key questions addressed by this project were: 1.What is the aggregate rooftop area, rooftop area suitable for PV project development, and potential for PV capacity and energy production from rooftop solar photovoltaic systems on key building types in Austin Energy's servicemore » area? 2.How do the potential capacity and annual energy production from rooftop solar electric systems compare with Austin Energy's current capacity and annual energy requirements?« less

  2. Notice of Final Rulemaking: Regulation of Fuel and Fuel Additives: Reformulated Gasoline Requirements for the Atlanta Covered Area

    EPA Pesticide Factsheets

    This page summaries the final rule determining that the Atlanta metro area is no longer a federal reformulated gasoline (RFG) covered area and there is no requirement to use federal RFG in the Atlanta area.

  3. 9 CFR 72.11 - Quarantined area; cattle considered infested; requirements for placing in noninfectious pens or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Quarantined area; cattle considered... TRANSPORTATION OF ANIMALS (INCLUDING POULTRY) AND ANIMAL PRODUCTS TEXAS (SPLENETIC) FEVER IN CATTLE § 72.11 Quarantined area; cattle considered infested; requirements for placing in noninfectious pens or premises...

  4. 33 CFR 117.272 - Boot Key Harbor.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Boot Key Harbor. 117.272 Section 117.272 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Florida § 117.272 Boot Key Harbor. The draw of the Boot Key Harbor drawbridge, mile 0.13, between...

  5. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  6. Education as a key objective of the interdisciplinary volcanic risk mitigation strategy VESUVIUS PENTALOGUE for developing resilient and sustainable areas around Vesuvius

    NASA Astrophysics Data System (ADS)

    Dobran, F.; Imperatrice, A.

    2017-12-01

    VESUVIUS PENTALOGUE requires the achievement of 5 key objectives for Summa-Vesuvius area: (1) Development of temporary settlements for the inhabitants close to their native homeland until the volcanic crisis subsides; (2) Division of the danger zone into an exclusion nucleus that prohibits all future human settlements and discourages the existing ones, a resilience belt that houses most of the current populations, and a sustainable area beyond the resilience belt that allows for sustainable practices and temporary resettlements of resilience belt citizens following the volcanic crises; (3) Development of built environment construction codes for the population of the danger zone by utilizing plinian eruption scenarios, scenario-based seismic hazard assessment and zonation, global volcanic simulator, and dynamic structural analysis; (4) Implementation of volcanic risk information and education campaigns for different risk areas surrounding the volcano; and (5) Production of a memorandum of understanding between the authorities and scientific communities, and production of periodic progress reports for keeping the populations informed on the developments leading to the realization of the above objectives.For the past 20 years we have devoted considerable efforts towards the achievement of educational objectives. We worked with local volunteers and social and cultural organizations and with our colleagues delivered over 200 public and school seminars in 15 communities around Vesuvius, organized 2 international scientific meetings for allowing the public and high school children to interact directly with the scientists working on this volcano, and established numerous contacts with school teachers for helping them engage their students on Vesuvius from the scientific, artistic, social, and cultural perspectives. Every year GVES has been the promoter of Vesuvius area manifestations where the school children have the opportunities to expose their works on this volcano and

  7. 33 CFR 334.620 - Straits of Florida and Florida Bay in vicinity of Key West, Fla.; operational training area...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA... the exclusion of watercraft is required in the interest of safety or for accomplishment of the mission...

  8. 33 CFR 334.620 - Straits of Florida and Florida Bay in vicinity of Key West, Fla.; operational training area...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA... the exclusion of watercraft is required in the interest of safety or for accomplishment of the mission...

  9. 33 CFR 334.620 - Straits of Florida and Florida Bay in vicinity of Key West, Fla.; operational training area...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA... the exclusion of watercraft is required in the interest of safety or for accomplishment of the mission...

  10. 33 CFR 334.620 - Straits of Florida and Florida Bay in vicinity of Key West, Fla.; operational training area...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA... the exclusion of watercraft is required in the interest of safety or for accomplishment of the mission...

  11. 33 CFR 334.620 - Straits of Florida and Florida Bay in vicinity of Key West, Fla.; operational training area...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA... the exclusion of watercraft is required in the interest of safety or for accomplishment of the mission...

  12. Lunar resource recovery: A definition of requirements

    NASA Technical Reports Server (NTRS)

    Elsworth, D.; Kohler, J. L.; Alexander, S. S.

    1992-01-01

    The capability to locate, mine, and process the natural resources of the Moon will be an essential requirement for lunar base development and operation. The list of materials that will be necessary is extensive and ranges from oxygen and hydrogen for fuel and life support to process tailings for emplacement over habitats. Despite the resources need, little is known about methodologies that might be suitable for utilizing lunar resources. This paper examines some of the requirements and constraints for resource recovery and identifies key areas of research needed to locate, mine, and process extraterrestrial natural resources.

  13. Arctic Freshwater Synthesis: Summary of key emerging issues

    NASA Astrophysics Data System (ADS)

    Prowse, T.; Bring, A.; Mârd, J.; Carmack, E.; Holland, M.; Instanes, A.; Vihma, T.; Wrona, F. J.

    2015-10-01

    In response to a joint request from the World Climate Research Program's Climate and Cryosphere Project, the International Arctic Science Committee, and the Arctic Council's Arctic Monitoring and Assessment Program an updated scientific assessment has been conducted of the Arctic Freshwater System (AFS), entitled the Arctic Freshwater Synthesis (AFSΣ). The major reason behind the joint request was an increasing concern that changes to the AFS have produced, and could produce even greater, changes to biogeophysical and socioeconomic systems of special importance to northern residents and also produce extra-Arctic climatic effects that will have global consequences. The AFSΣ was structured around six key thematic areas: atmosphere, oceans, terrestrial hydrology, terrestrial ecology, resources, and modeling, the review of each coauthored by an international group of scientists and published as separate manuscripts in this special issue of Journal of Geophysical Research-Biogeosciences. This AFSΣ summary manuscript reviews key issues that emerged during the conduct of the synthesis, especially those that are cross-thematic in nature, and identifies future research required to address such issues.

  14. High-capacity quantum key distribution via hyperentangled degrees of freedom

    NASA Astrophysics Data System (ADS)

    Simon, David S.; Sergienko, Alexander V.

    2014-06-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical.

  15. LACIE analyst interpretation keys

    NASA Technical Reports Server (NTRS)

    Baron, J. G.; Payne, R. W.; Palmer, W. F. (Principal Investigator)

    1979-01-01

    Two interpretation aids, 'The Image Analysis Guide for Wheat/Small Grains Inventories' and 'The United States and Canadian Great Plains Regional Keys', were developed during LACIE phase 2 and implemented during phase 3 in order to provide analysts with a better understanding of the expected ranges in color variation of signatures for individual biostages and of the temporal sequences of LANDSAT signatures. The keys were tested using operational LACIE data, and the results demonstrate that their use provides improved labeling accuracy in all analyst experience groupings, in all geographic areas within the U.S. Great Plains, and during all periods of crop development.

  16. Rain Volume Estimation over Areas Using Satellite and Radar Data

    NASA Technical Reports Server (NTRS)

    Doneaud, A. A.; Miller, J. R., Jr.; Johnson, L. R.; Vonderhaar, T. H.; Laybe, P.

    1984-01-01

    The application of satellite data to a recently developed radar technique used to estimate convective rain volumes over areas on a dry environment (the northern Great Plains) is discussed. The area time integral technique (ATI) provides a means of estimating total rain volumes over fixed and floating target areas of the order of 1,000 to 100,000 km(2) for clusters lasting 40 min. The basis of the method is the existence of a strong correlation between the area coverage integrated over the lifetime of the storm (ATI) and the rain volume. One key element in this technique is that it does not require the consideration of the structure of the radar intensities inside the area coverage to generate rain volumes, but only considers the rain event per se. This fact might reduce or eliminate some sources of error in applying the technique to satellite data. The second key element is that the ATI once determined can be converted to total rain volume by using a constant factor (average rain rate) for a given locale.

  17. Land use changing and land use optimization of Lake Baikal basin on the example of two key areas

    NASA Astrophysics Data System (ADS)

    Solodyankina, S.

    2012-04-01

    Lake Baikal contains roughly 20% of the world's unfrozen surface fresh water. It was declared a UNESCO World Heritage Site in 1996. Today levels of urbanization and economic stress on environmental resources is increasing on the shorts of the lake Baikal. The potential of economic development (industry, local tourism, and mining) of the Severobaykalsky and Sludyansky districts is rather high although they are characterized not only by beneficial features for local economy but also by considerable disadvantages for nature of this world valuable territory. This investigation show human-caused landscape changes during economic development of the two key areas in Baikal water catchment basin during 10 years (point of reference is 2000 year). Key areas are 1) the Baikalo-Patomskoe highland in the north of the Baikal catchment basin (Severobaykalsky district, Republic of Buryatia); 2) Khamar-Daban mountain system in the south of the Baikal catchment basin (Sludyansky districy, Irkutsk region). Since 2000 year land use of the territory has changed. Areas of agriculture were reduced but recreation activity on the bank of the lake was increased. Methods of GIS analysis and local statistic analysis of landscape characteristic were used. Nature, rural and urban areas ratio are estimated. Vegetation and soil condition assessment were made. The essence of this research is in helping to make decisions linked to upcoming problems: situation identification, evaluation and forecasting of the potential landscape condition, optimization of land use, mitigation of impact and mapping of territories and nature resources which have a high ecological value or endangered by industrial impact. For this purpose landscape maps of the territories on the base of the remote sensing information and field investigations were created. They used to calculate potential landscape functions of the territory without taking into account present impact of anthropogenic actions. Land use maps for years

  18. 77 FR 65253 - Amendment of Area Navigation Route T-240; AK

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... the legal description of area navigation (RNAV) route T-240 in Alaska by removing one waypoint that is no longer required and has been deleted from the National Airspace System Resources (NASR) database...

  19. Key Reconciliation for High Performance Quantum Key Distribution

    PubMed Central

    Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente

    2013-01-01

    Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440

  20. NOAA budget would boost satellite funding but cut some key areas

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2012-03-01

    The White House's proposed fiscal year (FY) 2013 budget for the National Oceanic and Atmospheric Administration (NOAA), announced on 13 February, looks favorable at first glance. The administration's request calls for $5.1 billion, an increase of $153 million (3.1%) above the FY 2012 estimated budget. However, the increase for NOAA satellites is $163 million, which means that other areas within the agency would be slated for decreased funding, including programs within the National Ocean Service (NOS), National Marine Fisheries Service (NMFS), National Weather Service (NWS), and some NOAA education programs. The proposed overall budget for the agency “reflects the overarching importance of weather satellites to public safety, to national security, and to the economy,” NOAA director Jane Lubchenco said at a 16 February briefing, noting that difficult choices were made regarding the budget. “Due to significant resources required for our weather satellites and the economic conditions in the country, other parts of our budget have been reduced, in some cases quite significantly,” she said. She added that the imperative to fund both the Joint Polar Satellite System (JPSS) and geostationary satellites in FY 2013 “imposes serious constraints on the rest of NOAA's budget.”

  1. Why advanced computing? The key to space-based operations

    NASA Astrophysics Data System (ADS)

    Phister, Paul W., Jr.; Plonisch, Igor; Mineo, Jack

    2000-11-01

    The 'what is the requirement?' aspect of advanced computing and how it relates to and supports Air Force space-based operations is a key issue. In support of the Air Force Space Command's five major mission areas (space control, force enhancement, force applications, space support and mission support), two-fifths of the requirements have associated stringent computing/size implications. The Air Force Research Laboratory's 'migration to space' concept will eventually shift Science and Technology (S&T) dollars from predominantly airborne systems to airborne-and-space related S&T areas. One challenging 'space' area is in the development of sophisticated on-board computing processes for the next generation smaller, cheaper satellite systems. These new space systems (called microsats or nanosats) could be as small as a softball, yet perform functions that are currently being done by large, vulnerable ground-based assets. The Joint Battlespace Infosphere (JBI) concept will be used to manage the overall process of space applications coupled with advancements in computing. The JBI can be defined as a globally interoperable information 'space' which aggregates, integrates, fuses, and intelligently disseminates all relevant battlespace knowledge to support effective decision-making at all echelons of a Joint Task Force (JTF). This paper explores a single theme -- on-board processing is the best avenue to take advantage of advancements in high-performance computing, high-density memories, communications, and re-programmable architecture technologies. The goal is to break away from 'no changes after launch' design to a more flexible design environment that can take advantage of changing space requirements and needs while the space vehicle is 'on orbit.'

  2. Patient Views on Three Key Service Areas within Hospital COPD Care

    ERIC Educational Resources Information Center

    Roberts, C. Michael; Seiger, Anil; Ingham, Jane

    2009-01-01

    Objective: The views of patients with Chronic Obstructive Pulmonary Disease (COPD) about three key services (non-invasive ventilation [NIV], early discharge schemes and rehabilitation) were sought in order to inform recommendations for the delivery of optimum care within a national programme of hospital COPD service development. Design: Four focus…

  3. 40 CFR Table 2d to Subpart Zzzz of... - Requirements for Existing Stationary RICE Located at Area Sources of HAP Emissions

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... RICE Located at Area Sources of HAP Emissions 2d Table 2d to Subpart ZZZZ of Part 63 Protection of... 2d Table 2d to Subpart ZZZZ of Part 63—Requirements for Existing Stationary RICE Located at Area... requirements for existing stationary RICE located at area sources of HAP emissions: For each . . . You must...

  4. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  5. Advanced EVA system design requirements study

    NASA Technical Reports Server (NTRS)

    Woods, T. G.

    1988-01-01

    The results are presented of a study to identify specific criteria regarding space station extravehicular activity system (EVAS) hardware requirements. Key EVA design issues include maintainability, technology readiness, LSS volume vs. EVA time available, suit pressure/cabin pressure relationship and productivity effects, crew autonomy, integration of EVA as a program resource, and standardization of task interfaces. A variety of DOD EVA systems issues were taken into consideration. Recommendations include: (1) crew limitations, not hardware limitations; (2) capability to perform all of 15 generic missions; (3) 90 days on-orbit maintainability with 50 percent duty cycle as minimum; and (4) use by payload sponsors of JSC document 10615A plus a Generic Tool Kit and Specialized Tool Kit description. EVA baseline design requirements and criteria, including requirements of various subsystems, are outlined. Space station/EVA system interface requirements and EVA accommodations are discussed in the areas of atmosphere composition and pressure, communications, data management, logistics, safe haven, SS exterior and interior requirements, and SS airlock.

  6. Key Elements of a Low Voltage, Ultracompact Plasma Spectrometer

    NASA Technical Reports Server (NTRS)

    Scime, E. E.; Barrie, A.; Dugas, M.; Elliott, D.; Ellison, S.; Keesee, A. M.; Pollock, C. J.; Rager, A.; Tersteeg, J.

    2016-01-01

    Taking advantage of technological developments in wafer-scale processing over the past two decades, such as deep etching, 3-D chip stacking, and double-sided lithography, we have designed and fabricated the key elements of an ultracompact 1.5cm (exp 3)plasma spectrometer that requires only low-voltage power supplies, has no microchannel plates, and has a high aperture area to instrument volume ratio. The initial design of the instrument targets the measurement of charged particles in the 3-20keV range with a highly directional field of view and a 100 duty cycle; i.e., the entire energy range Is continuously measured. In addition to reducing mass, size, and voltage requirements, the new design will affect the manufacturing process of plasma spectrometers, enabling large quantities of identical instruments to be manufactured at low individual unit cost. Such a plasma spectrometer is ideal for heliophysics plasma investigations, particularly for small satellite and multispacecraft missions. Two key elements of the instrument have been fabricated: the collimator and the energy analyzer. An initial collimator transparency of 20 with 3deg x 3deg angular resolution was achieved. The targeted 40 collimator transparency appears readily achievable. The targeted energy analyzer scaling factor of 1875 was achieved; i.e.20 keV electrons were selected for only a 10.7V bias voltage in the energy analyzer.

  7. Concept design theory and model for multi-use space facilities: Analysis of key system design parameters through variance of mission requirements

    NASA Astrophysics Data System (ADS)

    Reynerson, Charles Martin

    This research has been performed to create concept design and economic feasibility data for space business parks. A space business park is a commercially run multi-use space station facility designed for use by a wide variety of customers. Both space hardware and crew are considered as revenue producing payloads. Examples of commercial markets may include biological and materials research, processing, and production, space tourism habitats, and satellite maintenance and resupply depots. This research develops a design methodology and an analytical tool to create feasible preliminary design information for space business parks. The design tool is validated against a number of real facility designs. Appropriate model variables are adjusted to ensure that statistical approximations are valid for subsequent analyses. The tool is used to analyze the effect of various payload requirements on the size, weight and power of the facility. The approach for the analytical tool was to input potential payloads as simple requirements, such as volume, weight, power, crew size, and endurance. In creating the theory, basic principles are used and combined with parametric estimation of data when necessary. Key system parameters are identified for overall system design. Typical ranges for these key parameters are identified based on real human spaceflight systems. To connect the economics to design, a life-cycle cost model is created based upon facility mass. This rough cost model estimates potential return on investments, initial investment requirements and number of years to return on the initial investment. Example cases are analyzed for both performance and cost driven requirements for space hotels, microgravity processing facilities, and multi-use facilities. In combining both engineering and economic models, a design-to-cost methodology is created for more accurately estimating the commercial viability for multiple space business park markets.

  8. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  9. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks

    NASA Astrophysics Data System (ADS)

    Ristenpart, Thomas; Yilek, Scott

    Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.

  10. Aid to planning the marketing of mining area boundaries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Giles, R.H. Jr.

    Reducing trespass, legal costs, and timber and wildlife poaching and increasing control, safety, and security are key reasons why mine land boundaries need to be marked. Accidents may be reduced, especially when associated with blast area boundaries, and in some cases increased income may be gained from hunting and recreational fees on well-marked areas. A BASIC computer program for an IBM-PC has been developed that requires minimum inputs to estimate boundary marking costs. This paper describes the rationale for the program and shows representative outputs. 3 references, 3 tables.

  11. 49 CFR 195.12 - What requirements apply to low-stress pipelines in rural areas?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false What requirements apply to low-stress pipelines in... low-stress pipelines in rural areas? (a) General. This section does not apply to a rural low-stress pipeline regulated under this part as a low-stress pipeline that crosses a waterway currently used for...

  12. Sexual Health Services for Young People in a Rural Area of Northern Ireland: A Study of the Key Issues for Those Who Provide Them

    ERIC Educational Resources Information Center

    McCann, Lyndsey; Donnelly, Lyn; Quinn, Phelim; McAnerney, Rosemary

    2008-01-01

    Objective: To identify the key issues for service providers in delivering high quality sexual health services, responsive to the needs of young people, in a rural area of Northern Ireland. Design: A triangulation survey approach using questionnaires, in-depth interviews and focus groups was undertaken with a range of organizations and…

  13. Space and time variability of heating requirements for greenhouse tomato production in the Euro-Mediterranean area.

    PubMed

    Mariani, Luigi; Cola, Gabriele; Bulgari, Roberta; Ferrante, Antonio; Martinetti, Livia

    2016-08-15

    The Euro-Mediterranean area is the seat of a relevant greenhouse activity, meeting the needs of important markets. A quantitative assessment of greenhouse energy consumption and of its variability in space and time is an important decision support tool for both greenhouse-sector policies and farmers. A mathematical model of greenhouse energy balance was developed and parameterized for a state-of-the-art greenhouse to evaluate the heating requirements for vegetables growing. Tomato was adopted as reference crop, due to its high energy requirement for fruit setting and ripening and its economic relevance. In order to gain a proper description of the Euro-Mediterranean area, 56 greenhouse areas located within the ranges 28°N-72°N and 11°W-55°E were analyzed over the period 1973-2014. Moreover, the two 1973-1987 and 1988-2014 sub-periods were separately studied to describe climate change effects on energy consumption. Results account for the spatial variability of energy needs for tomato growing, highlighting the strong influence of latitude on the magnitude of heat requirements. The comparison between the two selected sub-periods shows a decrease of energy demand in the current warm phase, more relevant for high latitudes. Finally, suggestions to reduce energy consumptions are provided. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Patent disclosure requirements for therapeutic antibody patents.

    PubMed

    De Luca, Carmela; Trifonova, Anastassia

    2017-08-01

    Therapeutic antibodies have grown to become an important product class within the biopharmaceutical market. A prerequisite to their commercialization is adequate patent protection. Disclosure requirements and the types of claims available in different jurisdictions can impact the scope of protection available for antibodies. Areas covered: A comparative review of statutory bases, patent office practices and selected decisions in Canada, the United States and the United Kingdom related to disclosure requirements is provided. Expert opinion: Differences in disclosure requirements exist in different jurisdictions which can impact the type of claims obtained and their survival when attacked in litigation. Including a wide variety of claim types is a key strategy to ensuring therapeutic antibodies are adequately protected. Method of use claims may provide advantages and broader protection in some circumstances and should also be considered.

  15. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  16. 23 CFR 230.115 - Special contract requirements for “Hometown” or “Imposed” Plan areas.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Special contract requirements for âHometownâ or âImposedâ Plan areas. 230.115 Section 230.115 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CIVIL RIGHTS EXTERNAL PROGRAMS Equal Employment Opportunity on Federal and Federal-Aid...

  17. 23 CFR 230.115 - Special contract requirements for “Hometown” or “Imposed” Plan areas.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 23 Highways 1 2014-04-01 2014-04-01 false Special contract requirements for âHometownâ or âImposedâ Plan areas. 230.115 Section 230.115 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CIVIL RIGHTS EXTERNAL PROGRAMS Equal Employment Opportunity on Federal and Federal-Aid...

  18. 23 CFR 230.115 - Special contract requirements for “Hometown” or “Imposed” Plan areas.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 23 Highways 1 2013-04-01 2013-04-01 false Special contract requirements for âHometownâ or âImposedâ Plan areas. 230.115 Section 230.115 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CIVIL RIGHTS EXTERNAL PROGRAMS Equal Employment Opportunity on Federal and Federal-Aid...

  19. 23 CFR 230.115 - Special contract requirements for “Hometown” or “Imposed” Plan areas.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 23 Highways 1 2011-04-01 2011-04-01 false Special contract requirements for âHometownâ or âImposedâ Plan areas. 230.115 Section 230.115 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CIVIL RIGHTS EXTERNAL PROGRAMS Equal Employment Opportunity on Federal and Federal-Aid...

  20. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  1. 41 CFR 102-83.110 - When an agency's mission and program requirements call for the location in an urban area, are...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false When an agency's mission... REGULATION REAL PROPERTY 83-LOCATION OF SPACE Location of Space Urban Areas § 102-83.110 When an agency's mission and program requirements call for the location in an urban area, are Executive agencies required...

  2. 41 CFR 102-83.110 - When an agency's mission and program requirements call for the location in an urban area, are...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false When an agency's mission... REGULATION REAL PROPERTY 83-LOCATION OF SPACE Location of Space Urban Areas § 102-83.110 When an agency's mission and program requirements call for the location in an urban area, are Executive agencies required...

  3. 41 CFR 102-83.110 - When an agency's mission and program requirements call for the location in an urban area, are...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false When an agency's mission... REGULATION REAL PROPERTY 83-LOCATION OF SPACE Location of Space Urban Areas § 102-83.110 When an agency's mission and program requirements call for the location in an urban area, are Executive agencies required...

  4. 41 CFR 102-83.110 - When an agency's mission and program requirements call for the location in an urban area, are...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false When an agency's mission... REGULATION REAL PROPERTY 83-LOCATION OF SPACE Location of Space Urban Areas § 102-83.110 When an agency's mission and program requirements call for the location in an urban area, are Executive agencies required...

  5. 41 CFR 102-83.110 - When an agency's mission and program requirements call for the location in an urban area, are...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false When an agency's mission... REGULATION REAL PROPERTY 83-LOCATION OF SPACE Location of Space Urban Areas § 102-83.110 When an agency's mission and program requirements call for the location in an urban area, are Executive agencies required...

  6. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  7. Management of CAD/CAM information: Key to improved manufacturing productivity

    NASA Technical Reports Server (NTRS)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/Industry project designated Integrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 repesentatives from aerospace and computer companies. The IPAD accomplishments to date in development of requirements and prototype software for various levels of company-wide CAD/CAM data management are summarized and plans for development of technology for management of distributed CAD/CAM data and information required to control future knowledge-based CAD/CAM systems are discussed.

  8. Present and future free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.; Peterson, C. Glen; Wipf, Christopher C.

    2002-04-01

    Free-space quantum key distribution (QKD), more popularly know as quantum cryptography, uses single-photon free-space optical communications to distribute the secret keys required for secure communications. At Los Alamos National Laboratory we have demonstrated a fully automated system that is capable of operations at any time of day over a horizontal range of several kilometers. This has proven the technology is capable of operation from a spacecraft to the ground, opening up the possibility of QKD between any group of users anywhere on Earth. This system, the prototyping of a new system for use on a spacecraft, and the techniques required for world-wide quantum key distribution will be described. The operational parameters and performance of a system designed to operate between low earth orbit (LEO) and the ground will also be discussed.

  9. [Blood donation in urban areas].

    PubMed

    Charpentier, F

    2013-05-01

    Medical and technical developments increase the difficulty to provide sufficient safe blood for all patients in developed countries and their sociodemographic and societal changes. Sufficient national blood supply remains a reached, however still actual, challenge. Tomorrow is prepared today: the management of blood donation programs both in line with these developments and with social marketing strategies is one of the keys to success. If the main components of this organization are well known (mobile blood drives in various appropriate environments, and permanent blood donation centers) their proportions in the whole process must evolve and their contents require adaptations, especially for whole blood donation in urban areas. We have to focus on the people's way of life changes related to increasing urbanization of the society and prominent position taken by very large cities. This requires targeting several goals: to draw the attention of the potential blood-giving candidate, to get into position to collect him when he will decide it, to give meaning and recognition to his "sacrifice" (give time rather than donate blood) and to give him desire and opportunity to come back and donate one more time. In this strategy, permanent blood centers in urban areas have significant potential for whole blood collection, highlighted by the decrease of apheresis technology requirements. This potential requires profound changes in their location, conception and organization. The concept of Maison Du Don (MDD) reflects these changes. Copyright © 2013. Published by Elsevier SAS.

  10. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-01-01

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624

  11. ROV's: The key is cost effectiveness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saunders, E.

    1986-10-01

    Although diver-support activities will continue to be required in terms of monitoring and assistance, low-cost, remotely operated vehicles (ROV's) will have an increasing presence in the oil industry and other fields provided there is ongoing improvement in management, preparation, and execution of work. Beyond the safety aspect, the key is cost effectiveness. It is the company's intention wherever possible, and within realistic constraints, to take the man out of the water either by direct ROV replacement of the diver or by assisting him. Shell's exploration and production operations are based in three main areas: the southern, central, and northern Northmore » Sea. These developed fields, which consist of 26 various structures (interconnected), are connected to the mainland by over 1,100 km of submarine pipeline. Maintenance and underwater engineering costs in northern operations alone exceed pounds40 million/year (about $60 million/year) where typical support is an estimated 700 ROV days/year. The utilization analysis indicates a major use in ''eyeball'' vehicles for diver monitoring, and a large percentage for pipeline survey with only a limited amount on structural work and other special applications. The ''Bondi initiative'' in the late 1970s was intended to remove the diver from the water by ROV replacement, but due to lack of development, the capability in many areas has not evolved.« less

  12. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis), a key seed disperser for Patagonian forest regeneration

    PubMed Central

    Bravo, Susana Patricia; Cueto, Victor Rodolfo; Gorosito, Cristian Andrés

    2017-01-01

    Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a result, our understanding about how these birds provide links between South American biomes is almost non-existent. White-crested Elaenia (Elaenia albiceps chilensis) is a long-distance austral migrant that breeds in the Patagonian Forest biome and overwinters in tropical South America. Because this small flycatcher plays a key role in the regeneration of this ecosystem, our objective was to describe the annual cycle of White-crested elaenias to evaluate the degree of migratory connectivity between breeding and wintering areas and therefore to determine if there are specific biomes of northern South America linked by elaenias to Patagonian forests. Fifteen individuals were successfully tracked throughout a complete migration cycle using miniature light-level geolocators. All individuals resided and moved through the same general regions. During fall (March-April-May), elaenias were located in the Caatinga and the Atlantic Forest biomes, from Rio de Janeiro to the region near Salvador da Bahia, Brazil. During winter (June-July-Aug.), birds were located further inland, within the Cerrado biome. Birds used three different routes during fall migration. Our results indicate that some individuals use a direct route, flying between 500–600 km/day, crossing desert and grasslands, while others took a detour, flying 100–200 km/day through forested areas with refueling opportunities. All birds used the Yunga forest during spring migration, with ten out of 15 individuals showing a clear

  13. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    PubMed

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  14. Requirements Analysis is Key to Realizing Increased Value from Remote Sensing

    NASA Technical Reports Server (NTRS)

    Ryan, Robert; Alexander, Timothy M.

    2001-01-01

    This note explores requirements analysis - one of the critical and very often overlooked activities that enable satellites to measure what is important and to translate observations into effective and affordable information. Recent experience at the Stennis Space Center is used to illuminate some approaches for improving requirements practice.

  15. Mapping radon-prone areas using γ-radiation dose rate and geological information.

    PubMed

    García-Talavera, M; García-Pérez, A; Rey, C; Ramos, L

    2013-09-01

    Identifying radon-prone areas is key to policies on the control of this environmental carcinogen. In the current paper, we present the methodology followed to delineate radon-prone areas in Spain. It combines information from indoor radon measurements with γ-radiation and geological maps. The advantage of the proposed approach is that it lessens the requirement for a high density of measurements by making use of commonly available information. It can be applied for an initial definition of radon-prone areas in countries committed to introducing a national radon policy or to improving existing radon maps in low population regions.

  16. DCAA Audits: Widespread Problems with Audit Quality Require Significant Reform

    DTIC Science & Technology

    2009-09-01

    is included in appendix III. DOD contract management continues to be a high- risk area for the government.17 With hundreds of billions of taxpayer...Defense Contract Management : DOD’s Lack of Adherence to Key Contracting Principles on Iraq Oil Contract Put Government Interests at Risk , GAO-07-839...in the Federal Government68 require federal agency managers to identify and assess relevant risks the agency faces from external and internal

  17. Method for encryption and transmission of digital keying data

    DOEpatents

    Mniszewski, Susan M.; Springer, Edward A.; Brenner, David P.

    1988-01-01

    A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.

  18. Key technology issues for space robotic systems

    NASA Technical Reports Server (NTRS)

    Schappell, Roger T.

    1987-01-01

    Robotics has become a key technology consideration for the Space Station project to enable enhanced crew productivity and to maximize safety. There are many robotic functions currently being studied, including Space Station assembly, repair, and maintenance as well as satellite refurbishment, repair, and retrieval. Another area of concern is that of providing ground based experimenters with a natural interface that they might directly interact with their hardware onboard the Space Station or ancillary spacecraft. The state of the technology is such that the above functions are feasible; however, considerable development work is required for operation in this gravity-free vacuum environment. Furthermore, a program plan is evolving within NASA that will capitalize on recent government, university, and industrial robotics research and development (R and D) accomplishments. A brief summary is presented of the primary technology issues and physical examples are provided of the state of the technology for the initial operational capability (IOC) system as well as for the eventual final operational capability (FOC) Space Station.

  19. Future scientific drilling in the Arctic Ocean: Key objectives, areas, and strategies

    NASA Astrophysics Data System (ADS)

    Stein, R.; Coakley, B.; Mikkelsen, N.; O'Regan, M.; Ruppel, C.

    2012-04-01

    Past, Present and Future Changes in Arctic Terrestrial and Marine Systems" (Kananaskis, Alberta/Canada, February 2012). During these workshops, key areas and key scientific themes as well as drilling and site-survey strategies were discussed. Major scientific themes for future Arctic drilling will include: - The Arctic Ocean during the transition from greenhouse to icehouse conditions and millennial scale climate changes; - Physical and chemical changes of the evolving Polar Ocean and Arctic gateways; - Impact of Pleistocene/Holocene warming and sea-level rise on upper continental slope and shelf gas hydrates and on shelf permafrost; - Land-ocean interactions; - Tectonic evolution and birth of the Arctic Ocean basin: Arctic ridges, sea floor spreading and global lithosphere processes. When thinking about future Arctic drilling, it should be clearly emphasized that for the precise planning of future Arctic Ocean drilling campaigns, including site selection, evaluation of proposed drill sites for safety and environmental protection, etc., comprehensive site survey data are needed first. This means that the development of a detailed site survey strategy is a major challenge for the coming years. Here, an overview of perspectives and plans for future Arctic Ocean drilling will be presented.

  20. 9 CFR 72.11 - Quarantined area; cattle considered infested; requirements for placing in noninfectious pens or...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Quarantined area; cattle considered infested; requirements for placing in noninfectious pens or premises. 72.11 Section 72.11 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE INTERSTATE...

  1. Device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Hänggi, Esther

    2010-12-01

    In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.

  2. Sewage in ground water in the Florida Keys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shinn, E.A.

    1995-12-31

    More than 24,000 septic tanks, 5,000 cesspools, and greater than 600 shallow disposal wells introduce sewage effluents into porous and permeable limestone underlying the Florida Keys. To porous and permeable limestone underlying the Florida Keys. To assess the fate of sewage nutrients, 21 2- to 20-m-deep wells were core drilled and completed as water-monitoring wells. The wells were sampled quarterly and analyzed for 17 parameters. including nutrients and bacteria. Nutrients (mainly NH4, - which is 30 to 40 times higher than in surface sea water) were detected in ground water beneath the Keys and offshore coral reefs. Highest levels weremore » beneath reefs 5 to 8 km offshore. Ground waters were generally hypersaline and fecal bacteria (fecal coliform and streptococci) were detected in ground water beneath living coral reefs. Higher sea level on the Florida Bay side of the Keys is proposed as the mechanism for forcing ground water toward offshore coral reefs. Tidal pumping, which is more pronounced near the Keys, causes leakage of ground water where the sediment is thin. Areas lacking sediment cover consist of bare limestone bedrock or permeable coral reefs. These are the areas where coral diseases and algal growth have increased in recent years. Pollutants entering the ground water beneath the Florida Keys are likely to be transported seaward beneath impermeable Holocene sediments and may be upwelling through coral reefs and other hardbottom communities.« less

  3. Key Performance Indicators for Primary Schools.

    ERIC Educational Resources Information Center

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  4. Key Largo Limestone revisited: Pleistocene shelf-edge facies, Florida Keys, USA

    USGS Publications Warehouse

    Gray, Multer H.; Gischler, E.; Lundberg, J.; Simmons, K.R.; Shinn, E.A.

    2002-01-01

    New dates and analysis of 12 deep and 57 shallow cores allow a more detailed interpretation of the Pleistocene shelf edge of the Florida Platform as found in various facies of the Key Largo Limestone beneath the Florida Keys. In this study a three-phase evolution of the Quaternary units (Q1-Q5) of the Key Largo is presented with new subdivision of the Q5. (1) In the first phase, the Q1 and Q2 (perhaps deposited during oxygen-isotope stage 11) deep-water quartz-rich environment evolved into a shallow carbonate phase. (2) Subsequently, a Q3 (presumably corresponding to oxygen-isotope stage 9) flourishing reef and productive high-platform sediment phase developed. (3) Finally, a Q4 and Q5 (corresponding to oxygen-isotope stages 7 and 5) stabilization phase occured with reefs and leeward productive lagoons, followed by lower sea levels presenting a sequence of younger (isotope substages 5c, 5a) shelf-margin wedges, sediment veneers and outlier reefs. The Key Largo Limestone provides an accessible model of a carbonate shelf edge with fluctuating water depth, bordering a deep seaward basin for a period of at least 300 ka. During this time, at least four onlaps/offlaps, often separated by periods of karst development with associated diagenetic alterations, took place. The story presented by this limestone not only allows a better understanding of the history of south Florida but also aids in the interpretation of similar persistent shelf-edge sites bordering deep basins in other areas.

  5. Work Keys: Developing the Assessments.

    ERIC Educational Resources Information Center

    McLarty, Joyce R.

    The American College Testing Program is developing a new program, Work Keys, a system to develop and assess employability skills. It consists of four components: (1) a systematic process for profiling job skill requirements; (2) assessments that measure learners' job skill levels; (3) procedures and formats for conveying assessment results so they…

  6. Symmetric autocompensating quantum key distribution

    NASA Astrophysics Data System (ADS)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  7. Revision of the genera Microplitis and Snellenius (Hymenoptera, Braconidae, Microgastrinae) from Area de Conservacion Guanacaste, Costa Rica, with a key to all species previously described from Mesoamerica

    USDA-ARS?s Scientific Manuscript database

    The genera Microplitis and Snellenius (Hymenoptera: Braconidae, Microgastrinae) from Area de Conservacion Guanacaste (ACG), Costa Rica, are revised. A total of 28 new species are described: 23 of Snellenius (the first record for Mesoamerica) and five of Microplitis. A key is provided to all new spec...

  8. Geology and hydrogeology of the Florida Keys

    USGS Publications Warehouse

    Halley, Robert B.; Vacher, H. L.; Shinn,

    1997-01-01

    This chapter discusses the geology and hydrogeology of the Florida Keys, and focuses on the islands formed of Pleistocene limestone. These islands, which are crossed when driving from Miami to Key West, are typically regarded as "the Florida Keys." The outstanding and fragile character of ecosystems on and around the Florida Keys has prompted State and Federal efforts to protect and preserve the remaining public portions of the region. The Florida Keys were largely ignored during the sixteenth, seventeenth, and eighteenth centuries, although the waters just offshore provided a major shipping thoroughfare to and from the New World. The Florida Keys are now recognized as one of the great recreational and environmental resources of the United States. The islands are outposts of a laid-back, tropical resort culture that has as its foundation warmth and clear water. A significant part of the attraction is fishing, diving, and boating around the area's coral reefs, which the islands protect. But the reefs were not always so highly valued. The Florida Keys that have protected the reefs for millennia, may now be the source of the agents that may accomplish what Agassiz thought was beyond man's power a century ago.

  9. Orthognathic model surgery with LEGO key-spacer.

    PubMed

    Tsang, Alfred Chee-Ching; Lee, Alfred Siu Hong; Li, Wai Keung

    2013-12-01

    A new technique of model surgery using LEGO plates as key-spacers is described. This technique requires less time to set up compared with the conventional plaster model method. It also retains the preoperative setup with the same set of models. Movement of the segments can be measured and examined in detail with LEGO key-spacers. Copyright © 2013 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  10. High key rate continuous-variable quantum key distribution with a real local oscillator.

    PubMed

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Ma, Hongxin; Wang, Shiyu; Zeng, Guihua

    2018-02-05

    Continuous-variable quantum key distribution (CVQKD) with a real local oscillator (LO) has been extensively studied recently due to its security and simplicity. In this paper, we propose a novel implementation of a high-key-rate CVQKD with a real LO. Particularly, with the help of the simultaneously generated reference pulse, the phase drift of the signal is tracked in real time and then compensated. By utilizing the time and polarization multiplexing techniques to isolate the reference pulse and controlling the intensity of it, not only the contamination from it is suppressed, but also a high accuracy of the phase compensation can be guaranteed. Besides, we employ homodyne detection on the signal to ensure the high quantum efficiency and heterodyne detection on the reference pulse to acquire the complete phase information of it. In order to suppress the excess noise, a theoretical noise model for our scheme is established. According to this model, the impact of the modulation variance and the intensity of the reference pulse are both analysed theoretically and then optimized according to the experimental data. By measuring the excess noise in the 25km optical fiber transmission system, a 3.14Mbps key rate in the asymptotic regime proves to be achievable. This work verifies the feasibility of the high-key-rate CVQKD with a real LO within the metropolitan area.

  11. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Seventh Coast Guard District § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area...

  12. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  13. Five keys to real transformation in health care.

    PubMed

    Senzon, Simon A

    2011-11-01

    Transformation in health care requires a deeply holistic approach. Natural leaders of such a transformation are the complementary and alternative medicine practitioners who already share a vision of wellness, prevention, and optimal human function. Central to this shared vision is lifestyle change for patients and practitioners. Yet, to change a lifestyle is to change a self. Assisting individuals to transform their very sense of self in order to live healthier, more fulfilling lives centered on flourishing requires several important keys. Visionary and unified leaders are the first key. Structural support through coordination of health clinics locally and nationally is the second key. This can be optimized by utilizing initiatives of the new Affordable Health Care Act, because it provides a potential impetus for deep structural changes. An expanded evidence base for multifactorial approaches to wellness lifestyles is the third key. A reorganizational orientation with an emphasis on the right timing of transformation is the fourth key. The fifth key is an Integral map, which brings together the personal, behavioral, cultural, and social domains. By utilizing such a map, one ensures that no aspect of the transformative revolution at hand slips away due to any misplaced focus, such as emphasizing only on the things we can see with our eyes. By embracing the essence of transformation in terms of a wholeness to all reality, an evolutionary unifying field with interior depth and exterior expression, health care is redefined more authentically. © Mary Ann Liebert, Inc.

  14. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  15. The segmentation of bones in pelvic CT images based on extraction of key frames.

    PubMed

    Yu, Hui; Wang, Haijun; Shi, Yao; Xu, Ke; Yu, Xuyao; Cao, Yuzhen

    2018-05-22

    Bone segmentation is important in computed tomography (CT) imaging of the pelvis, which assists physicians in the early diagnosis of pelvic injury, in planning operations, and in evaluating the effects of surgical treatment. This study developed a new algorithm for the accurate, fast, and efficient segmentation of the pelvis. The proposed method consists of two main parts: the extraction of key frames and the segmentation of pelvic CT images. Key frames were extracted based on pixel difference, mutual information and normalized correlation coefficient. In the pelvis segmentation phase, skeleton extraction from CT images and a marker-based watershed algorithm were combined to segment the pelvis. To meet the requirements of clinical application, physician's judgment is needed. Therefore the proposed methodology is semi-automated. In this paper, 5 sets of CT data were used to test the overlapping area, and 15 CT images were used to determine the average deviation distance. The average overlapping area of the 5 sets was greater than 94%, and the minimum average deviation distance was approximately 0.58 pixels. In addition, the key frame extraction efficiency and the running time of the proposed method were evaluated on 20 sets of CT data. For each set, approximately 13% of the images were selected as key frames, and the average processing time was approximately 2 min (the time for manual marking was not included). The proposed method is able to achieve accurate, fast, and efficient segmentation of pelvic CT image sequences. Segmentation results not only provide an important reference for early diagnosis and decisions regarding surgical procedures, they also offer more accurate data for medical image registration, recognition and 3D reconstruction.

  16. Multicomponent reactions provide key molecules for secret communication.

    PubMed

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  17. Key-peck durations under behavioral contrast and differential reinforcement

    PubMed Central

    Whipple, William R.; Fantino, Edmund

    1980-01-01

    Pigeons were maintained on a multiple schedule in which both components were variable-interval one-minute schedules. When they were switched to a condition in which one component was extinction, behavioral contrast was observed. The median durations of the key pecks in the unchanged component did not decrease in size. The results are incompatible with a theory of behavioral contrast which considers the added pecks to be short-duration responses. In a second experiment, pigeons were required to emit short-duration key pecks in one component of a multiple schedule, and long-duration pecks in the other. Two of three pigeons learned to emit responses appropriate to the requirements of the component in effect, suggesting that the duration of the key-peck response is sensitive to differential reinforcement. PMID:16812185

  18. Space-based observatories providing key data for climate change applications

    NASA Astrophysics Data System (ADS)

    Lecomte, J.; Juillet, J. J.

    2016-12-01

    The Sentinel-1 & 3 mission are part of the Copernicus program, previously known as GMES (Global Monitoring for Environment and Security), whose overall objective is to support Europe's goals regarding sustainable development and global governance of the environment by providing timely and quality data, information, services and knowledge. This European Earth Observation program is led by the European Commission and the space infrastructure is developed under the European Space Agency leadership. Many services will be developed through the Copernicus program among different thematic areas. The climate change is one of this thematic area and the Sentinel-1 & 3 satellites will provide key space-based observations in this area. The Sentinel-1 mission is based on a constellation of 2 identical satellites each one embarking C-SAR Instrument and provides capability for continuous radar mapping of the Earth with enhanced revisit frequency, coverage, timeliness and reliability for operational services and applications requiring long time series. In particular, Sentinel 1 provides all-weather, day-and-night estimates of soil moisture, wind speed and direction, sea ice, continental ice sheets and glaciers. The Sentinel-3 mission will mainly be devoted to the provision of Ocean observation data in routine, long term (20 years of operations) and continuous fashion with a consistent quality and a very high level of availability. Among these data, very accurate surface temperatures and topography measurements will be provided and will constitute key indicators, once ingested in climate change models, for identifying climate drivers and expected climate impacts. The paper will briefly recall the satellite architectures, their main characteristics and performance. The inflight performance and key features of their images or data of the 3 satellites namely Sentinel 1A, 1B and 3A will be reviewed to demonstrate the quality and high scientific potential of the data as well as their

  19. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  20. Timing and documentation of key events in neonatal resuscitation.

    PubMed

    Heathcote, Adam Charles; Jones, Jacqueline; Clarke, Paul

    2018-04-30

    Only a minority of babies require extended resuscitation at birth. Resuscitations concerning babies who die or who survive with adverse outcomes are increasingly subject to medicolegal scrutiny. Our aim was to describe real-life timings of key resuscitation events observed in a historical series of newborns who required full resuscitation at birth. Twenty-seven babies born in our centre over a 10-year period had an Apgar score of 0 at 1 min and required full resuscitation. The median (95% confidence interval) postnatal age at achieving key events were commencing cardiac compressions, 2.0 (1.5-4.0) min; endotracheal intubation, 3.8 (2.0-6.0) min; umbilical venous catheterisation 9.0 (7.5-12.0) min; and administration of first adrenaline dose 10.0 (8.0-14.0) min. The wide range of timings presented from real-life cases may prove useful to clinicians involved in medical negligence claims and provide a baseline for quality improvements in resuscitation training. What is Known: • Only a minority of babies require extended resuscitation at birth; these cases are often subject to medicolegal interrogation • Timings of key resuscitation events are poorly described and documentation of resuscitation events is often lacking yet is open to medicolegal scrutiny What is New: • We present a wide range of real-life timings of key resuscitation events during the era of routine newborn life support training • These timings may prove useful to clinicians involved in medical negligence claims and provide a baseline for quality improvements in resuscitation training.

  1. 36 CFR 3.3 - Am I required to obtain a permit to operate a vessel in a park area?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 1 2013-07-01 2013-07-01 false Am I required to obtain a permit to operate a vessel in a park area? 3.3 Section 3.3 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR BOATING AND WATER USE ACTIVITIES § 3.3 Am I required to obtain...

  2. 36 CFR 3.3 - Am I required to obtain a permit to operate a vessel in a park area?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 1 2014-07-01 2014-07-01 false Am I required to obtain a permit to operate a vessel in a park area? 3.3 Section 3.3 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR BOATING AND WATER USE ACTIVITIES § 3.3 Am I required to obtain...

  3. 36 CFR 3.3 - Am I required to obtain a permit to operate a vessel in a park area?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Am I required to obtain a permit to operate a vessel in a park area? 3.3 Section 3.3 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR BOATING AND WATER USE ACTIVITIES § 3.3 Am I required to obtain...

  4. 36 CFR 3.3 - Am I required to obtain a permit to operate a vessel in a park area?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 1 2011-07-01 2011-07-01 false Am I required to obtain a permit to operate a vessel in a park area? 3.3 Section 3.3 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR BOATING AND WATER USE ACTIVITIES § 3.3 Am I required to obtain...

  5. 36 CFR 3.3 - Am I required to obtain a permit to operate a vessel in a park area?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 1 2012-07-01 2012-07-01 false Am I required to obtain a permit to operate a vessel in a park area? 3.3 Section 3.3 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR BOATING AND WATER USE ACTIVITIES § 3.3 Am I required to obtain...

  6. March 10, 2006, Transportation Conformity Rule That Addresses Requirements for Project-level Conformity Determinations in PM2.5 and PM10 Nonattainment and Maintenance Areas

    EPA Pesticide Factsheets

    This final rule, published March 10, 2006, establishes requirements for project-level conformity determinations in particulate matter (PM) 2.5 nonattainment and maintenance areas, and revises existing requirements for projects in PM10 areas.

  7. Qualified nurses' rate new nursing graduates as lacking skills in key clinical areas.

    PubMed

    Missen, Karen; McKenna, Lisa; Beauchamp, Alison; Larkins, Jo-Ann

    2016-08-01

    The aim of this study was to explore perceptions of qualified nurses on the abilities of newly registered nursing graduates to perform a variety of clinical skills. Evidence from the literature suggests that undergraduate nursing programmes do not adequately prepare nursing students to be practice-ready on completion of their nursing courses. A descriptive quantitative design was used. Participants were recruited through the Australian Nursing and Midwifery Federation, Victorian branch. A brief explanation of the study and a link to the survey were promoted in their monthly e-newsletter. A total of 245 qualified nurses in the state of Victoria, Australia participated in this study. A survey tool of 51 clinical skills and open-ended questions was used, whereby participants were asked to rate new nursing graduates' abilities using a 5-point Likert scale. Overall participants rated new nursing graduates' abilities for undertaking clinical skills as good or very good in 35·3% of skills, 33·3% were rated as adequate and 31·4% rated as being performed poorly or very poorly. Of concern, essential clinical skills, such as critical thinking and problem solving, working independently and assessment procedures, were found to be poorly executed and affecting new registered nurses graduates' competence. The findings from this study can further serve as a reference for nursing education providers to enhance nursing curricula and work collaboratively with healthcare settings in preparing nurses to be competent, safe practitioners on completion of their studies. Identifying key areas in which new nursing graduates are not yet competent means that educational providers and educators from healthcare settings can focus on these skills in better preparing our nurses to be work ready. © 2016 John Wiley & Sons Ltd.

  8. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  9. Coordinating Council. Sixth Meeting: Who Are Our Key Users?

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This NASA Scientific and Technical Information Program Coordinating Council meeting deals with the topic 'Who are our key users?' Presentations were made on the following subtopics: Key users: Who uses the system the most, Who orders the most documents, Users: What do we know about them?, NASA/DOD Aerospace Knowledge Diffusion research project on 'Potential key users', How we meet the user's needs, and STI Council user requirements update. Summaries of discussions after the presentations are included along with visuals for the presentations.

  10. Technology development, demonstration, and orbital support requirements for manned lunar and Mars missions

    NASA Technical Reports Server (NTRS)

    Llewellyn, Charles P.; Brender, Karen D.

    1990-01-01

    An overview of the critical technology needs and the Space Station Freedom (SSF) focused support requirements for the Office of Exploration's (OEXP) manned lunar and Mars missions is presented. Major emphasis is directed at the technology needs associated with the low earth orbit (LEO) transportation node assembly and vehicle processing functions required by the lunar and Mars mission flight elements. The key technology areas identified as crucial to support the LEO node function include in-space assembly and construction, in-space vehicle processing and refurbishment, space storable cryogenics, and autonomous rendezvous and docking.

  11. Technology needs development and orbital support requirements for manned lunar and Mars missions

    NASA Technical Reports Server (NTRS)

    Brender, Karen D.; Llewellyn, Charles P.

    1990-01-01

    This paper presents an overview of the critical technology needs and the Space Station Freedom focused support requirements for the Office of Exploration's manned lunar and Mars missions. The emphasis is on e directed at the technology needs associated with the low earth orbit (LEO) transportation node assembly and vehicle processing functions required by the lunar Mars mission flight elements. The key technology areas identified as crucial to support the LEO node function include in-space assembly and construction, in-space vehicle processing and refurbishment, space storable cryogenics, and autonomous rendezvous and docking.

  12. A novel horizontal subsurface flow constructed wetland: Reducing area requirements and clogging risk.

    PubMed

    Tatoulis, Triantafyllos; Akratos, Christos S; Tekerlekopoulou, Athanasia G; Vayenas, Dimitrios V; Stefanakis, Alexandros I

    2017-11-01

    The use of Constructed Wetlands (CWs) has been nowadays expanded from municipal to industrial and agro-industrial wastewaters. The main limitations of CWs remain the relatively high area requirements compared to mechanical treatment technologies and the potential occurrence of the clogging phenomenon. This study presents the findings of an innovative CW design where novel materials were used. Four pilot-scale CW units were designed, built and operated for two years. Each unit consisted of two compartments, the first of which (two thirds of the total unit length) contained either fine gravel (in two units) or random type high density polyethylene (HDPE) (in the other two units). This plastic media type was tested in a CW system for the first time. The second compartment of all four units contained natural zeolite. Two units (one with fine gravel and one with HDPE) were planted with common reeds, while the other two were kept unplanted. Second cheese whey was introduced into the units, which were operated under hydraulic residence times (HRT) of 2 and 4 days. After a two-year operation and monitoring period, pollutant removal rates were approximately 80%, 75% and 90% for COD, ammonium and ortho-phosphate, respectively, while temperature and HRT had no significant effect on pollutant removal. CWs containing the plastic media achieved the same removal rates as those containing gravel, despite receiving three times higher hydraulic surface loads (0.08 m/d) and four times higher organic surface loads (620 g/m 2 /d). This reveals that the use of HDPE plastic media could reduce CW surface area requirements by 75%. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Deducing trapdoor primitives in public key encryption schemes

    NASA Astrophysics Data System (ADS)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  14. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  15. Required Area for a Crew Person in a Space Vehicle

    NASA Technical Reports Server (NTRS)

    Mount, Frances E.

    1998-01-01

    This 176 page report was written in circa 1966 to examine the effects of confmement during space flight. One of the topics covered was the required size of a space vehicle for extended missions. Analysis was done using size of crew and length of time in a confmed space. The report was based on all information available at that time. The data collected and analyzed included both NASA and (when possible) Russian missions flown to date, analogs (such as submarines), and ground studies. Both psychological and physiological responses to confmement were examined. Factors evaluated in estimating the degree of impairment included the level of performance of intellectual, perceptual, manual and co-ordinated tasks, response to psychological testing, subjective comments of the participants, nature and extent of physiological change, and the nature and extent of behavioral change and the nature and extent of somatic complaints. Information was not included from studies where elements of perceptual isolation were more than mildly incidental - water immersion studies, studies in darkened and acoustically insulated rooms, studies with distorted environmental inputs - unpattemed light and white noise. Using the graph from the document, the upper line provides a threshold of minimum acceptable volumeall points above the line may be considered acceptable. The lower line provides a threshold of unacceptable volume - all points below the line are unacceptable. The area in between the two lines is the area of doubtful acceptability where impairment tends to increase with reduction in volume and increased duration of exposure. Reference is made of the Gemini VII, 14-day duration mission which had detectable impairment with a combination of 40 cubic feet per man for 14 days. In line with all other data this point should be in the 'marked impairment' zone. It is assumed that the state of fitness, dedication and experience influenced this outcome.

  16. Multi-party quantum key agreement with five-qubit brown states

    NASA Astrophysics Data System (ADS)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  17. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    NASA Astrophysics Data System (ADS)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  18. A key requirement for CD300f in innate immune responses of eosinophils in colitis.

    PubMed

    Moshkovits, I; Reichman, H; Karo-Atar, D; Rozenberg, P; Zigmond, E; Haberman, Y; Ben Baruch-Morgenstern, N; Lampinen, M; Carlson, M; Itan, M; Denson, L A; Varol, C; Munitz, A

    2017-01-01

    Eosinophils are traditionally studied in the context of type 2 immune responses. However, recent studies highlight key innate immune functions for eosinophils especially in colonic inflammation. Surprisingly, molecular pathways regulating innate immune activities of eosinophil are largely unknown. We have recently shown that the CD300f is highly expressed by colonic eosinophils. Nonetheless, the role of CD300f in governing innate immune eosinophil activities is ill-defined. RNA sequencing of 162 pediatric Crohn's disease patients revealed upregulation of multiple Cd300 family members, which correlated with the presence of severe ulcerations and inflammation. Increased expression of CD300 family receptors was also observed in active ulcerative colitis (UC) and in mice following induction of experimental colitis. Specifically, the expression of CD300f was dynamically regulated in monocytes and eosinophils. Dextran sodium sulfate (DSS)-treated Cd300f -/- mice exhibit attenuated disease activity and histopathology in comparison with DSS-treated wild type (WT). Decreased disease activity in Cd300f -/- mice was accompanied with reduced inflammatory cell infiltration and nearly abolished production of pro-inflammatory cytokines. Monocyte depletion and chimeric bone marrow transfer experiments revealed a cell-specific requirement for CD300f in innate immune activation of eosinophils. Collectively, we uncover a new pathway regulating innate immune activities of eosinophils, a finding with significant implications in eosinophil-associated gastrointestinal diseases.

  19. Towards a real-time wide area motion imagery system

    NASA Astrophysics Data System (ADS)

    Young, R. I.; Foulkes, S. B.

    2015-10-01

    It is becoming increasingly important in both the defence and security domains to conduct persistent wide area surveillance (PWAS) of large populations of targets. Wide Area Motion Imagery (WAMI) is a key technique for achieving this wide area surveillance. The recent development of multi-million pixel sensors has provided sensors with wide field of view replete with sufficient resolution for detection and tracking of objects of interest to be achieved across these extended areas of interest. WAMI sensors simultaneously provide high spatial and temporal resolutions, giving extreme pixel counts over large geographical areas. The high temporal resolution is required to enable effective tracking of targets. The provision of wide area coverage with high frame rates generates data deluge issues; these are especially profound if the sensor is mounted on an airborne platform, with finite data-link bandwidth and processing power that is constrained by size, weight and power (SWAP) limitations. These issues manifest themselves either as bottlenecks in the transmission of the imagery off-board or as latency in the time taken to analyse the data due to limited computational processing power.

  20. 40 CFR 51.918 - Can any SIP planning requirements be suspended in 8-hour ozone nonattainment areas that have air...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... suspended in 8-hour ozone nonattainment areas that have air quality data that meets the NAAQS? 51.918... 8-hour Ozone National Ambient Air Quality Standard § 51.918 Can any SIP planning requirements be suspended in 8-hour ozone nonattainment areas that have air quality data that meets the NAAQS? Upon a...

  1. 40 CFR 51.918 - Can any SIP planning requirements be suspended in 8-hour ozone nonattainment areas that have air...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... suspended in 8-hour ozone nonattainment areas that have air quality data that meets the NAAQS? 51.918... 8-hour Ozone National Ambient Air Quality Standard § 51.918 Can any SIP planning requirements be suspended in 8-hour ozone nonattainment areas that have air quality data that meets the NAAQS? Upon a...

  2. Biocompatibility: meeting a key functional requirement of next-generation medical devices.

    PubMed

    Helmus, Michael N; Gibbons, Donald F; Cebon, David

    2008-01-01

    The array of polymeric, biologic, metallic, and ceramic biomaterials will be reviewed with respect to their biocompatibility, which has traditionally been viewed as a requirement to develop a safe medical device. With the emergence of combination products, a paradigm shift is occurring that now requires biocompatibility to be designed into the device. In fact, next-generation medical devices will require enhanced biocompatibility by using, for example, pharmacological agents, bioactive coatings, nano-textures, or hybrid systems containing cells that control biologic interactions to have desirable biologic outcomes. The concept of biocompatibility is moving from a "do no harm" mission (i.e., nontoxic, nonantigenic, nonmutagenic, etc.) to one of doing "good," that is, encouraging positive healing responses. These new devices will promote the formation of normal healthy tissue as well as the integration of the device into adjacent tissue. In some contexts, biocompatibility can become a disruptive technology that can change therapeutic paradigms (e.g., drug-coated stents). New database tools to access biocompatibility data of the materials of construction in existing medical devices will facilitate the use of existing and new biomaterials for new medical device designs.

  3. 7 CFR 1780.11 - Service area requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... that inequities exist within the applicants service area for the same type service proposed (i.e., water or waste disposal) such inequities will be remedied by the applicant prior to loan or grant approval or included as part of the project. Inequities are defined as unjustified variations in...

  4. 7 CFR 1780.11 - Service area requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... that inequities exist within the applicants service area for the same type service proposed (i.e., water or waste disposal) such inequities will be remedied by the applicant prior to loan or grant approval or included as part of the project. Inequities are defined as unjustified variations in...

  5. 20 CFR 661.260 - What are the requirements for automatic designation of workforce investment areas relating to...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... designation of workforce investment areas relating to units of local government with a population of 500,000... population of 500,000 or more? The requirements for automatic designation relating to units of local government with a population of 500,000 or more and to rural concentrated employment programs are contained...

  6. 20 CFR 661.260 - What are the requirements for automatic designation of workforce investment areas relating to...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... designation of workforce investment areas relating to units of local government with a population of 500,000... population of 500,000 or more? The requirements for automatic designation relating to units of local government with a population of 500,000 or more and to rural concentrated employment programs are contained...

  7. 20 CFR 661.260 - What are the requirements for automatic designation of workforce investment areas relating to...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... designation of workforce investment areas relating to units of local government with a population of 500,000... population of 500,000 or more? The requirements for automatic designation relating to units of local government with a population of 500,000 or more and to rural concentrated employment programs are contained...

  8. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  9. RACT Requirements in Ozone Nonattainment Areas

    EPA Pesticide Factsheets

    This document may be of assistance in applying the New Source Review (NSR) air permitting regulations including the Prevention of Significant Deterioration (PSD) requirements. This document is part of the NSR Policy and Guidance Database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  10. 25 CFR 20.201 - How does the Bureau designate a service area and what information is required?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false How does the Bureau designate a service area and what information is required? 20.201 Section 20.201 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR HUMAN SERVICES FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Welfare Reform § 20.201 How does the...

  11. 25 CFR 20.201 - How does the Bureau designate a service area and what information is required?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false How does the Bureau designate a service area and what information is required? 20.201 Section 20.201 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR HUMAN SERVICES FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Welfare Reform § 20.201 How does the...

  12. 25 CFR 20.201 - How does the Bureau designate a service area and what information is required?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true How does the Bureau designate a service area and what information is required? 20.201 Section 20.201 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR HUMAN SERVICES FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Welfare Reform § 20.201 How does the...

  13. 25 CFR 20.201 - How does the Bureau designate a service area and what information is required?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false How does the Bureau designate a service area and what information is required? 20.201 Section 20.201 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR HUMAN SERVICES FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Welfare Reform § 20.201 How does the...

  14. 25 CFR 20.201 - How does the Bureau designate a service area and what information is required?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How does the Bureau designate a service area and what information is required? 20.201 Section 20.201 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR HUMAN SERVICES FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Welfare Reform § 20.201 How does the...

  15. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    PubMed

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  16. Expert perspectives on hereditary angioedema: Key areas for advancements in care across the patient journey

    PubMed Central

    Baş, Murat; Bernstein, Jonathan A.; Boccon-Gibod, Isabelle; Bova, Maria; Dempster, John; Grumach, Anete Sevciovic; Magerl, Markus; Poarch, Kimberly; Ferreira, Manuel Branco

    2016-01-01

    Background: Published literature documents the substantial burden of hereditary angioedema (HAE) with C1 inhibitor deficiency on the quality of life and work productivity of patients. However, despite advances in the field and the availability of guidelines to advise health care providers (HCP) on the diagnosis and management of HAE, there are still many challenges to overcome. For example, delayed diagnosis and misdiagnosis are common, and treatment practices vary worldwide. Objective: An international expert panel was convened to consider opportunities for improvements that would benefit patients with HAE. Methods: Based on professional and personal experiences, the experts developed schematics to describe the journey of patients through the following stages: (1) onset of symptoms and initial evaluation; (2) referral/diagnosis; and (3) management of HAE. More importantly, the panel identified key areas in which it was possible to optimize the support provided to patients and HCPs along this journey. Results: Overall, this approach highlighted the need for wider dissemination of algorithms and scientific data to more effectively educate HCPs from multiple disciplines and the need for more research to inform appropriate treatment decisions. Furthermore, HAE awareness campaigns, accurate online information, and referral to patient advocacy groups were all considered helpful approaches to support patients. Conclusion: More detailed and widespread information on the diagnosis and management of HAE is needed and may lead to advancements in care throughout the journey of the patient with HAE. PMID:27661998

  17. Key principles to improve programmes and interventions in complementary feeding.

    PubMed

    Lutter, Chessa K; Iannotti, Lora; Creed-Kanashiro, Hilary; Guyon, Agnes; Daelmans, Bernadette; Robert, Rebecca; Haider, Rukhsana

    2013-09-01

    Although there are some examples of successful complementary feeding programmes to promote healthy growth and prevent stunting at the community level, to date there are few, if any, examples of successful programmes at scale. A lack of systematic process and impact evaluations on pilot projects to generate lessons learned has precluded scaling up of effective programmes. Programmes to effect positive change in nutrition rarely follow systematic planning, implementation, and evaluation (PIE) processes to enhance effectiveness over the long term. As a result a set of programme-oriented key principles to promote healthy growth remains elusive. The purpose of this paper is to fill this gap by proposing a set of principles to improve programmes and interventions to promote healthy growth and development. Identifying such principles for programme success has three requirements: rethinking traditional paradigms used to promote improved infant and young child feeding; ensuring better linkages to delivery platforms; and, improving programming. Following the PIE model for programmes and learning from experiences from four relatively large-scale programmes described in this paper, 10 key principles are identified in the areas of programme planning, programme implementation, programme evaluation, and dissemination, replication, and scaling up. Nonetheless, numerous operational research questions remain, some of which are highlighted in this paper. © 2013 John Wiley & Sons Ltd.

  18. Completely device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Aguilar, Edgar A.; Ramanathan, Ravishankar; Kofler, Johannes; Pawłowski, Marcin

    2016-08-01

    Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries—an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence our work reduces the requirements needed to perform secure DIQKD and establish safe communication.

  19. Image Stability Requirements For a Geostationary Imaging Fourier Transform Spectrometer (GIFTS)

    NASA Technical Reports Server (NTRS)

    Bingham, G. E.; Cantwell, G.; Robinson, R. C.; Revercomb, H. E.; Smith, W. L.

    2001-01-01

    A Geostationary Imaging Fourier Transform Spectrometer (GIFTS) has been selected for the NASA New Millennium Program (NMP) Earth Observing-3 (EO-3) mission. Our paper will discuss one of the key GIFTS measurement requirements, Field of View (FOV) stability, and its impact on required system performance. The GIFTS NMP mission is designed to demonstrate new and emerging sensor and data processing technologies with the goal of making revolutionary improvements in meteorological observational capability and forecasting accuracy. The GIFTS payload is a versatile imaging FTS with programmable spectral resolution and spatial scene selection that allows radiometric accuracy and atmospheric sounding precision to be traded in near real time for area coverage. The GIFTS sensor combines high sensitivity with a massively parallel spatial data collection scheme to allow high spatial resolution measurement of the Earth's atmosphere and rapid broad area coverage. An objective of the GIFTS mission is to demonstrate the advantages of high spatial resolution (4 km ground sample distance - gsd) on temperature and water vapor retrieval by allowing sampling in broken cloud regions. This small gsd, combined with the relatively long scan time required (approximately 10 s) to collect high resolution spectra from geostationary (GEO) orbit, may require extremely good pointing control. This paper discusses the analysis of this requirement.

  20. Attentive Motion Discrimination Recruits an Area in Inferotemporal Cortex

    PubMed Central

    Stemmann, Heiko

    2016-01-01

    Attentional selection requires the interplay of multiple brain areas. Theoretical accounts of selective attention predict different areas with different functional properties to support endogenous covert attention. To test these predictions, we devised a demanding attention task requiring motion discrimination and spatial selection and performed whole-brain imaging in macaque monkeys. Attention modulated the early visual cortex, motion-selective dorsal stream areas, the lateral intraparietal area, and the frontal eye fields. This pattern of activation supports early selection, feature-based, and biased-competition attention accounts, as well as the frontoparietal theory of attentional control. While high-level motion-selective dorsal stream areas did not exhibit strong attentional modulation, ventral stream areas V4d and the dorsal posterior inferotemporal cortex (PITd) did. The PITd in fact was, consistently across task variations, the most significantly and most strongly attention-modulated area, even though it did not exhibit signs of motion selectivity. Thus the recruitment of the PITd in attention tasks involving different kinds of motion analysis is not predicted by any theoretical account of attention. These functional data, together with known anatomical connections, suggest a general and possibly critical role of the PITd in attentional selection. SIGNIFICANCE STATEMENT Attention is the key cognitive function that selects sensory information relevant to the current goals, relegating other information to the shadows of consciousness. To better understand the neural mechanisms of this interplay between sensory processing and internal cognitive state, we must learn more about the brain areas supporting attentional selection. Here, to test theoretical accounts of attentional selection, we used a novel task requiring sustained attention to motion. We found that, surprisingly, among the most strongly attention-modulated areas is one that is neither selective for

  1. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  2. Phylogenetic diversity meets conservation policy: small areas are key to preserving eucalypt lineages.

    PubMed

    Pollock, Laura J; Rosauer, Dan F; Thornhill, Andrew H; Kujala, Heini; Crisp, Michael D; Miller, Joseph T; McCarthy, Michael A

    2015-02-19

    Evolutionary and genetic knowledge is increasingly being valued in conservation theory, but is rarely considered in conservation planning and policy. Here, we integrate phylogenetic diversity (PD) with spatial reserve prioritization to evaluate how well the existing reserve system in Victoria, Australia captures the evolutionary lineages of eucalypts, which dominate forest canopies across the state. Forty-three per cent of remaining native woody vegetation in Victoria is located in protected areas (mostly national parks) representing 48% of the extant PD found in the state. A modest expansion in protected areas of 5% (less than 1% of the state area) would increase protected PD by 33% over current levels. In a recent policy change, portions of the national parks were opened for development. These tourism development zones hold over half the PD found in national parks with some species and clades falling entirely outside of protected zones within the national parks. This approach of using PD in spatial prioritization could be extended to any clade or area that has spatial and phylogenetic data. Our results demonstrate the relevance of PD to regional conservation policy by highlighting that small but strategically located areas disproportionally impact the preservation of evolutionary lineages.

  3. Time to refine key climate policy models

    NASA Astrophysics Data System (ADS)

    Barron, Alexander R.

    2018-05-01

    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  4. Self-referenced continuous-variable quantum key distribution protocol

    DOE PAGES

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin; ...

    2015-10-21

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  5. Self-referenced continuous-variable quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  6. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lütkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-01

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  7. KEY COMPARISON: Final report on international key comparison CCQM-K53: Oxygen in nitrogen

    NASA Astrophysics Data System (ADS)

    Lee, Jeongsoon; Bok Lee, Jin; Moon, Dong Min; Seog Kim, Jin; van der Veen, Adriaan M. H.; Besley, Laurie; Heine, Hans-Joachim; Martin, Belén; Konopelko, L. A.; Kato, Kenji; Shimosaka, Takuya; Perez Castorena, Alejandro; Macé, Tatiana; Milton, Martin J. T.; Kelley, Mike; Guenther, Franklin; Botha, Angelique

    2010-01-01

    Gravimetry is used as the primary method for the preparation of primary standard gas mixtures in most national metrology institutes, and it requires the combined abilities of purity assessment, weighing technique and analytical skills. At the CCQM GAWG meeting in October 2005, it was agreed that KRISS should coordinate a key comparison, CCQM-K53, on the gravimetric preparation of gas, at a level of 100 µmol/mol of oxygen in nitrogen. KRISS compared the gravimetric value of each cylinder with an analytical instrument. A preparation for oxygen gas standard mixture requires particular care to be accurate, because oxygen is a major component of the atmosphere. Key issues for this comparison are related to (1) the gravimetric technique which needs at least two steps for dilution, (2) oxygen impurity in nitrogen, and (3) argon impurity in nitrogen. The key comparison reference value is obtained from the linear regression line (with origin) of a selected set of participants. The KCRV subset, except one, agree with each other. The standard deviation of the x-residuals of this group (which consists of NMIJ, VSL, NIST, NPL, BAM, KRISS and CENAM) is 0.056 µmol/mol and consistent with the uncertainties given to their standard mixtures. The standard deviation of the residuals of all participating laboratory is 0.182 µmol/mol. With respect to impurity analysis, overall argon amounts of the cylinders are in the region of about 3 µmol/mol however; four cylinders showed an argon amount fraction over 10 µmol/mol. Two of these are inconsistent with the KCRV subset. The explicit separation between two peaks of oxygen and argon in the GC chromatogram is essential to maintain analytical capability. Additionally oxygen impurity analysis in nitrogen is indispensable to ensure the preparative capability. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The

  8. Phylogenetic patterns and correlation of key structures for jumping: bone crests and cross-sectional areas of muscles in Leptodactylus (Anura, Leptodactylidae).

    PubMed

    Ponssa, María Laura; Fratani, Jéssica; Abdala, Virginia

    2018-05-01

    Anurans are characterized by their saltatory mode of locomotion, which is associated with a specific morphology. The coordinated action of the muscles and bones of the pelvic girdle is key to the transmission of the force of the hindlimbs to the axial skeleton during jumping. Two features are critical for optimal locomotory performance: the cross-sectional area of muscle and the bone crest attachment sites. The first character is a proxy of the force exerted by the muscle, whereas the crests are muscle attachments sites related to muscle force. The provisory relationship between these features has previously been identified and bone crest size can be used to infer the magnitude and, therefore, muscle force in fossils records. In this work, we explore the correlation between the cross-sectional area of essential muscles to the jumping mechanism (longissimus dorsi, extensor iliotibialis B, tenuissimus, puboischiofemoralis internus B, coccygeo-sacralis and coccygeo-iliacus) and the bone crests where these muscles are inserted (dorsal tubercle, dorsal crest and urostylar crest) in species of the genus Leptodactylus. This genus, along with other leptodactylids, exhibits a diversity of locomotor modes, including jumping, hopping, swimming and burrowing. We therefore analyzed the morphometric variation in the two features, cross-sectional area and bone crest area, expecting a correlation with different locomotor types. Our results showed: (i) a correlation between the urostylar crest and the cross-sectional area of the related muscles; (ii) that the bone crest surface area of urostyle and ilium and the cross-sectional area of the corresponding muscles can be utilized to infer locomotor faculties in leptodactylid frogs; and (iii) that the evolution of both characters demonstrates a general tendency from lower values in leptodactylid ancestors to higher values in the Leptodactylus genus. The results attest to the importance of the comparison of current ecological and

  9. Speech and Language Functions that Require a Functioning Broca's Area

    ERIC Educational Resources Information Center

    Davis, Cameron; Kleinman, Jonathan T.; Newhart, Melissa; Gingis, Leila; Pawlak, Mikolaj; Hillis, Argye E.

    2008-01-01

    A number of previous studies have indicated that Broca's area has an important role in understanding and producing syntactically complex sentences and other language functions. If Broca's area is critical for these functions, then either infarction of Broca's area or temporary hypoperfusion within this region should cause impairment of these…

  10. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  11. A spatially explicit metapopulation model and cattle trade analysis suggests key determinants for the recurrent circulation of rift valley Fever virus in a pilot area of madagascar highlands.

    PubMed

    Nicolas, Gaëlle; Chevalier, Véronique; Tantely, Luciano Michaël; Fontenille, Didier; Durand, Benoît

    2014-12-01

    Rift Valley fever (RVF) is a vector-borne zoonotic disease that causes high morbidity and mortality in ruminants. In 2008-2009, a RVF outbreak affected the whole Madagascar island, including the Anjozorobe district located in Madagascar highlands. An entomological survey showed the absence of Aedes among the potential RVF virus (RVFV) vector species identified in this area, and an overall low abundance of mosquitoes due to unfavorable climatic conditions during winter. No serological nor virological sign of infection was observed in wild terrestrial mammals of the area, suggesting an absence of wild RVF virus (RVFV) reservoir. However, a three years serological and virological follow-up in cattle showed a recurrent RVFV circulation. The objective of this study was to understand the key determinants of this unexpected recurrent transmission. To achieve this goal, a spatial deterministic discrete-time metapopulation model combined with cattle trade network was designed and parameterized to reproduce the local conditions using observational data collected in the area. Three scenarios that could explain the RVFV recurrent circulation in the area were analyzed: (i) RVFV overwintering thanks to a direct transmission between cattle when viraemic cows calve, vectors being absent during the winter, (ii) a low level vector-based circulation during winter thanks to a residual vector population, without direct transmission between cattle, (iii) combination of both above mentioned mechanisms. Multi-model inference methods resulted in a model incorporating both a low level RVFV winter vector-borne transmission and a direct transmission between animals when viraemic cows calve. Predictions satisfactorily reproduced field observations, 84% of cattle infections being attributed to vector-borne transmission, and 16% to direct transmission. These results appeared robust according to the sensitivity analysis. Interweaving between agricultural works in rice fields, seasonality of

  12. The High/Scope Preschool Key Experiences: Essential Elements of Young Children's Learning.

    ERIC Educational Resources Information Center

    Hohmann, Mary

    2002-01-01

    Discusses High/Scope's preschool key experiences (a set of 58 statements that describe young children's social, cognitive, and physical development). The key experiences are grouped into 10 major developmental areas (creative representation, language and literacy, social relations, movement, music, classification, seriation, number, space, and…

  13. 50 CFR 32.5 - What are the requirements for sportfishing on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 8 2011-10-01 2011-10-01 false What are the requirements for sportfishing on areas of the National Wildlife Refuge System? 32.5 Section 32.5 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE...

  14. 50 CFR 32.5 - What are the requirements for sportfishing on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 9 2012-10-01 2012-10-01 false What are the requirements for sportfishing on areas of the National Wildlife Refuge System? 32.5 Section 32.5 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE...

  15. 50 CFR 32.5 - What are the requirements for sportfishing on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 9 2013-10-01 2013-10-01 false What are the requirements for sportfishing on areas of the National Wildlife Refuge System? 32.5 Section 32.5 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE...

  16. 50 CFR 32.5 - What are the requirements for sportfishing on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false What are the requirements for sportfishing on areas of the National Wildlife Refuge System? 32.5 Section 32.5 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE...

  17. 50 CFR 32.5 - What are the requirements for sportfishing on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 9 2014-10-01 2014-10-01 false What are the requirements for sportfishing on areas of the National Wildlife Refuge System? 32.5 Section 32.5 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE...

  18. 50 CFR 32.2 - What are the requirements for hunting on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 9 2012-10-01 2012-10-01 false What are the requirements for hunting on areas of the National Wildlife Refuge System? 32.2 Section 32.2 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM...

  19. 50 CFR 32.2 - What are the requirements for hunting on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 9 2014-10-01 2014-10-01 false What are the requirements for hunting on areas of the National Wildlife Refuge System? 32.2 Section 32.2 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM...

  20. 50 CFR 32.2 - What are the requirements for hunting on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false What are the requirements for hunting on areas of the National Wildlife Refuge System? 32.2 Section 32.2 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM...

  1. 50 CFR 32.2 - What are the requirements for hunting on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 9 2013-10-01 2013-10-01 false What are the requirements for hunting on areas of the National Wildlife Refuge System? 32.2 Section 32.2 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM...

  2. 50 CFR 32.2 - What are the requirements for hunting on areas of the National Wildlife Refuge System?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 8 2011-10-01 2011-10-01 false What are the requirements for hunting on areas of the National Wildlife Refuge System? 32.2 Section 32.2 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM...

  3. End of life care for people with dementia: The views of health professionals, social care service managers and frontline staff on key requirements for good practice

    PubMed Central

    Lee, Richard Philip; Bamford, Claire; Poole, Marie; McLellan, Emma; Exley, Catherine; Robinson, Louise

    2017-01-01

    Background Evidence consistently shows that people with advanced dementia experience suboptimal end of life care compared to those with cancer; with increased hospitalisation, inadequate pain control and fewer palliative care interventions. Understanding the views of those service managers and frontline staff who organise and provide care is crucial in order to develop better end of life care for people with dementia. Methods and findings Qualitative interviews and focus groups were conducted from 2013 to 2015 with 33 service managers and 54 staff involved in frontline care, including doctors, nurses, nursing and care home managers, service development leads, senior managers/directors, care assistants and senior care assistants/team leads. All were audio recorded and transcribed verbatim. Participants represented a diverse range of service types and occupation. Transcripts were subject to coding and thematic analysis in data meetings. Analysis of the data led to the development of seven key themes: Recognising end of life (EOL) and tools to support end of life care (EOLC), Communicating with families about EOL, Collaborative working, Continuity of care, Ensuring comfort at EOL, Supporting families, Developing and supporting staff. Each is discussed in detail and comprise individual and collective views on approaches to good end of life care for people with dementia. Conclusions The significant challenges of providing good end of life care for people with dementia requires that different forms of expertise should be recognised and used; including the skills and knowledge of care assistants. Successfully engaging with people with dementia and family members and helping them to recognise the dying trajectory requires a supportive integration of emotional and technical expertise. The study strengthens the existing evidence base in this area and will be used with a related set of studies (on the views of other stakeholders and observations and interviews conducted in

  4. End of life care for people with dementia: The views of health professionals, social care service managers and frontline staff on key requirements for good practice.

    PubMed

    Lee, Richard Philip; Bamford, Claire; Poole, Marie; McLellan, Emma; Exley, Catherine; Robinson, Louise

    2017-01-01

    Evidence consistently shows that people with advanced dementia experience suboptimal end of life care compared to those with cancer; with increased hospitalisation, inadequate pain control and fewer palliative care interventions. Understanding the views of those service managers and frontline staff who organise and provide care is crucial in order to develop better end of life care for people with dementia. Qualitative interviews and focus groups were conducted from 2013 to 2015 with 33 service managers and 54 staff involved in frontline care, including doctors, nurses, nursing and care home managers, service development leads, senior managers/directors, care assistants and senior care assistants/team leads. All were audio recorded and transcribed verbatim. Participants represented a diverse range of service types and occupation. Transcripts were subject to coding and thematic analysis in data meetings. Analysis of the data led to the development of seven key themes: Recognising end of life (EOL) and tools to support end of life care (EOLC), Communicating with families about EOL, Collaborative working, Continuity of care, Ensuring comfort at EOL, Supporting families, Developing and supporting staff. Each is discussed in detail and comprise individual and collective views on approaches to good end of life care for people with dementia. The significant challenges of providing good end of life care for people with dementia requires that different forms of expertise should be recognised and used; including the skills and knowledge of care assistants. Successfully engaging with people with dementia and family members and helping them to recognise the dying trajectory requires a supportive integration of emotional and technical expertise. The study strengthens the existing evidence base in this area and will be used with a related set of studies (on the views of other stakeholders and observations and interviews conducted in four services) to develop an evidence

  5. Modeling, Simulation and Analysis of Public Key Infrastructure

    NASA Technical Reports Server (NTRS)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  6. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  7. Effects of climate change on suitable rice cropping areas, cropping systems and crop water requirements in southern China

    DOE PAGES

    Ye, Qing; Yang, Xiaoguang; Dai, Shuwei; ...

    2015-06-05

    Here, we discuss that rice is one of the main crops grown in southern China. Global climate change has significantly altered the local water availability and temperature regime for rice production. In this study, we explored the influence of climate change on suitable rice cropping areas, rice cropping systems and crop water requirements (CWRs) during the growing season for historical (from 1951 to 2010) and future (from 2011 to 2100) time periods. The results indicated that the land areas suitable for rice cropping systems shifted northward and westward from 1951 to 2100 but with different amplitudes.

  8. 24 CFR 92.64 - Applicability of requirements to insular areas.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... requirements in subpart E (Program Requirements), subpart F (Project Requirements), subpart K (Program Administration), and subpart L (Performance Reviews and Sanctions) of this part as participating jurisdictions... K (Program Administration): (i) Section 92.500 (The HOME Investment Trust Fund) does not apply. HUD...

  9. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  10. Advanced technology requirements for large space structures. Part 5: Atlas program requirements

    NASA Technical Reports Server (NTRS)

    Katz, E.; Lillenas, A. N.; Broddy, J. A.

    1977-01-01

    The results of a special study which identifies and assigns priorities to technology requirements needed to accomplish a particular scenario of future large area space systems are described. Proposed future systems analyzed for technology requirements included large Electronic Mail, Microwave Radiometer, and Radar Surveillance Satellites. Twenty technology areas were identified as requirements to develop the proposed space systems.

  11. Key drivers of airline loyalty.

    PubMed

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  12. Key drivers of airline loyalty

    PubMed Central

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  13. 43 CFR 2932.13 - How will I know if individual use of a special area requires a Special Recreation Permit?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Use, Competitive Events, Organized Groups, and Recreation Use in Special Areas § 2932.13 How will I... Register and local and regional news media. We will post permit requirements at major access points for the...

  14. 43 CFR 2932.13 - How will I know if individual use of a special area requires a Special Recreation Permit?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Use, Competitive Events, Organized Groups, and Recreation Use in Special Areas § 2932.13 How will I... Register and local and regional news media. We will post permit requirements at major access points for the...

  15. 43 CFR 2932.13 - How will I know if individual use of a special area requires a Special Recreation Permit?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Use, Competitive Events, Organized Groups, and Recreation Use in Special Areas § 2932.13 How will I... Register and local and regional news media. We will post permit requirements at major access points for the...

  16. 43 CFR 2932.13 - How will I know if individual use of a special area requires a Special Recreation Permit?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Use, Competitive Events, Organized Groups, and Recreation Use in Special Areas § 2932.13 How will I... Register and local and regional news media. We will post permit requirements at major access points for the...

  17. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    PubMed

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  18. Key Questions for Reviewing Virtual Charter School Proposals

    ERIC Educational Resources Information Center

    National Association of Charter School Authorizers (NJ1), 2011

    2011-01-01

    This document contains key questions to consider when evaluating virtual charter school proposals.The insert is designed to help authorizers evaluate school quality and capacity in light of the distinctive attributes of virtual schooling. These questions address major functional areas as well essential questions that authorizers should ask of…

  19. Key Problems in Science and Technology in Thailand.

    ERIC Educational Resources Information Center

    Yuthavong, Yongyuth; And Others

    1985-01-01

    Cites the need for promoting science/technology management and policy formation in Thailand, viewing contributions of science/technology to the socioeconomic development of the country as high priorities. Criteria for selecting priority areas and key problems are noted; they include relevance to development, availability of human resources, and…

  20. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  1. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  2. Non-Logical Discourse: Key to the Composing Process?

    ERIC Educational Resources Information Center

    Poulsen, Richard C.

    One niche in which scholars have not looked for keys to the composing process is the sometimes illusory but vital area of nonlogical discourse, which includes fantasy, hallucination, dream, reverie, vision, trance, and meditation. Abundant evidence exists about the genesis, importance, and use of nonlogical discourse, but this evidence comes…

  3. Wide-area situation awareness in electric power grid

    NASA Astrophysics Data System (ADS)

    Greitzer, Frank L.

    2010-04-01

    Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.

  4. Detector-device-independent quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lim, Charles Ci Wen; Korzh, Boris; Martin, Anthony

    2014-12-01

    Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all measurement side-channel attacks. While mdiQKD is conceptually elegant and offers a supreme level of security, the experimental complexity is challenging for practical systems. For instance, it requires interference between two widely separated independent single-photon sources, and the secret key rates are dependent on detecting two photons—one from each source. Here, we demonstrate a proof-of-principle experiment of a QKD scheme that removes the need for a two-photon system and instead uses the idea of a two-qubit single-photon to significantly simplify themore » implementation and improve the efficiency of mdiQKD in several aspects.« less

  5. Requirements controlled design: A method for discovery of discontinuous system boundaries in the requirements hyperspace

    NASA Astrophysics Data System (ADS)

    Hollingsworth, Peter Michael

    The drive toward robust systems design, especially with respect to system affordability throughout the system life-cycle, has led to the development of several advanced design methods. While these methods have been extremely successful in satisfying the needs for which they have been developed, they inherently leave a critical area unaddressed. None of them fully considers the effect of requirements on the selection of solution systems. The goal of all of current modern design methodologies is to bring knowledge forward in the design process to the regions where more design freedom is available and design changes cost less. Therefore, it seems reasonable to consider the point in the design process where the greatest restrictions are placed on the final design, the point in which the system level requirements are set. Historically the requirements have been treated as something handed down from above. However, neither the customer nor the solution provider completely understood all of the options that are available in the broader requirements space. If a method were developed that provided the ability to understand the full scope of the requirements space, it would allow for a better comparison of potential solution systems with respect to both the current and potential future requirements. The key to a requirements conscious method is to treat requirements differently from the traditional approach. The method proposed herein is known as Requirements Controlled Design (RCD). By treating the requirements as a set of variables that control the behavior of the system, instead of variables that only define the response of the system, it is possible to determine a-priori what portions of the requirements space that any given system is capable of satisfying. Additionally, it should be possible to identify which systems can satisfy a given set of requirements and the locations where a small change in one or more requirements poses a significant risk to a design program

  6. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  7. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following:more » 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.« less

  8. Quantum key distribution using gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Grosshans, Frédéric; Van Assche, Gilles; Wenger, Jérôme; Brouri, Rosa; Cerf, Nicolas J.; Grangier, Philippe

    2003-01-01

    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

  9. 75 FR 81233 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... to fill key conservation gaps in important ocean areas. DATES: Comments on the nominations to the... and management initiatives (such as integrated ocean observing systems, systematic monitoring and evaluation, targeted outreach to key user groups, and helping to identify and address MPA research needs). In...

  10. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  11. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  12. Prefixed-threshold real-time selection method in free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Wenyuan; Xu, Feihu; Lo, Hoi-Kwong

    2018-03-01

    Free-space quantum key distribution allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate and the secure key rate. Previous postselection methods to combat atmospheric turbulence require a threshold value determined after all quantum transmission. In contrast, here we propose a method where we predetermine the optimal threshold value even before quantum transmission. Therefore, the receiver can discard useless data immediately, thus greatly reducing data storage requirements and computing resources. Furthermore, our method can be applied to a variety of protocols, including, for example, not only single-photon BB84 but also asymptotic and finite-size decoy-state BB84, which can greatly increase its practicality.

  13. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  14. 76 FR 6119 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-03

    ... that may be established by managing agencies to fill key conservation gaps in important ocean areas... systems, systematic monitoring and evaluation, targeted outreach to key user groups, and helping to identify and address MPA research needs). In addition, the national system provides a forum for coordinated...

  15. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  16. Key messages for communicating information about BRCA1 and BRCA2 to women with breast or ovarian cancer: Consensus across health professionals and service users.

    PubMed

    Jacobs, Chris; Pichert, Gabriella; Harris, Jackie; Tucker, Kathy; Michie, Susan

    2017-11-01

    Genetic testing of cancer predisposing genes will increasingly be needed in oncology clinics to target cancer treatment. This Delphi study aimed to identify areas of agreement and disagreement between genetics and oncology health professionals and service users about the key messages required by women with breast/ovarian cancer who undergo BRCA1/BRCA2 genetic testing and the optimal timing of communicating key messages. Participants were 16 expert health professionals specialising in oncology/genetics and 16 service users with breast/ovarian cancer and a pathogenic BRCA1/BRCA2 variant. Online questionnaires containing 53 inductively developed information messages were circulated to the groups separately. Participants rated each message as key/not key on a Likert scale and suggested additional messages. Questionnaires were modified according to the feedback and up to 3 rounds were circulated. Consensus was reached when there was ≥75% agreement. Thirty key messages were agreed by both groups with 7 of the key messages agreed by ≥95% of participants: dominant inheritance, the availability of predictive testing, the importance of pretest discussion, increased risk of breast and ovarian cancer, and the option of risk-reducing mastectomy and bilateral salpingo-oophorectomy. Both groups agreed that key messages should be communicated before genetic testing and once a pathogenic variant has been identified. There was a high level of agreement within and between the groups about the information requirements of women with breast/ovarian cancer about BRCA1/BRCA2. These key messages will be helpful in developing new approaches to the delivery of information as genetic testing becomes further integrated into mainstream oncology services. Copyright © 2017 John Wiley & Sons, Ltd.

  17. Efficacy and safety of key hole craniotomy for the evacuation of spontaneous cerebellar hemorrhage.

    PubMed

    Tokimura, Hiroshi; Tajitsu, Kenichiro; Taniguchi, Ayumi; Yamahata, Hitoshi; Tsuchiya, Masahiro; Takayama, Kenji; Shinsato, Tomomi; Arita, Kazunori

    2010-01-01

    The efficacy and safety of cerebellar hemorrhage evacuation by key hole craniotomy and the importance of thorough evacuation and irrigation of the hematoma in the fourth ventricle to resolve obstructive hydrocephalus were assessed in 23 patients with spontaneous cerebellar hemorrhage (SCH) greater than 3 cm or with brainstem compression and hydrocephalus. A 5-cm elongated S-shaped scalp incision was made, and a 3-cm key hole craniotomy was performed over a cerebellar convexity area. The hematoma was immediately evacuated through a small corticotomy. The hematoma in the fourth ventricle was gently removed through the hematoma cavity, followed by thorough saline irrigation to release obstructive hydrocephalus. Patients classified retrospectively into favorable and poor outcome groups using the Glasgow Outcome Scale (GOS) scores of 4-5 vs. 1-3 showed significant differences with respect to the preoperative Glasgow Coma Scale, hematoma size and volume, and brainstem compression. Only 2 of the 23 patients required ventricular drainage and no postoperative complications were recorded. Patients treated by experienced and inexperienced surgeons showed no significant differences in the hematoma evacuation rate, postoperative GOS, and interval from skin incision to start of hematoma evacuation. Our simplified method of key hole craniotomy to treat SCH was less invasive but easy to perform, as even inexperienced neurosurgeons could obtain good surgical results. Thorough cleaning of the fourth ventricle minimized the necessity for ventricular drainage.

  18. Identification and Characterization of Key Human Performance Issues and Research in the Next Generation Air Transportation System (NextGen)

    NASA Technical Reports Server (NTRS)

    Lee, Paul U.; Sheridan, Tom; Poage, james L.; Martin, Lynne Hazel; Jobe, Kimberly K.

    2010-01-01

    This report identifies key human-performance-related issues associated with Next Generation Air Transportation System (NextGen) research in the NASA NextGen-Airspace Project. Four Research Focus Areas (RFAs) in the NextGen-Airspace Project - namely Separation Assurance (SA), Airspace Super Density Operations (ASDO), Traffic Flow Management (TFM), and Dynamic Airspace Configuration (DAC) - were examined closely. In the course of the research, it was determined that the identified human performance issues needed to be analyzed in the context of NextGen operations rather than through basic human factors research. The main gaps in human factors research in NextGen were found in the need for accurate identification of key human-systems related issues within the context of specific NextGen concepts and better design of the operational requirements for those concepts. By focusing on human-system related issues for individual concepts, key human performance issues for the four RFAs were identified and described in this report. In addition, mixed equipage airspace with components of two RFAs were characterized to illustrate potential human performance issues that arise from the integration of multiple concepts.

  19. Characterization of available light for seagrass and patch reef productivity in Sugarloaf Key, Lower Florida Keys

    USGS Publications Warehouse

    Toro-Farmer, Gerardo; Muller-Karger, Frank E.; Vega-Rodriguez, Maria; Melo, Nelson; Yates, Kimberly K.; Johns, Elizabeth; Cerdeira-Estrada, Sergio; Herwitz, Stan R.

    2016-01-01

    Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP) was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively). Higher photosynthetic active radiation (PAR) levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm) had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  20. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  1. Letter Addressing EPA's Requirements for Nonattainment Areas

    EPA Pesticide Factsheets

    This document may be of assistance in applying the New Source Review (NSR) air permitting regulations including the Prevention of Significant Deterioration (PSD) requirements. This document is part of the NSR Policy and Guidance Database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  2. Assessment of PM10 pollution level and required source emission reduction in Belgrade area.

    PubMed

    Todorović, Marija N; Perišić, Mirjana D; Kuzmanoski, Maja M; Stojić, Andreja M; Sostarić, Andrej I; Mijić, Zoran R; Rajšić, Slavica F

    2015-01-01

    The aim of this study was to assess PM10 pollution level and estimate required source emission reduction in Belgrade area, the second largest urban center in the Balkans. Daily mass concentrations and trace metal content (As, Cd, Cr, Mn, Ni, Pb) of PM10 were evaluated for three air quality monitoring sites of different types: urban-traffic (Slavija), suburban (Lazarevac) and rural (Grabovac) under the industrial influence, during the period of 2012-13. Noncompliance with current Air Quality Standards (AQS) was noticeable: annual means were higher than AQS at Slavija and Lazarevac, and daily frequency threshold was exceeded at all three locations. Annual means of As at Lazarevac were about four times higher than the target concentration, which could be attributed to the proximity of coal-fired power plants, and dust resuspension from coal basin and nearby ash landfills. Additionally, levels of Ni and Cr were significantly higher than in other European cities. Carcinogenic health risk of inhabitants' exposure to trace metals was assessed as well. Cumulative cancer risk exceeded the upper limit of acceptable US EPA range at two sites, with Cr and As as the major contributors. To estimate source emission reduction, required to meet AQS, lognormal, Weibull and Pearson 5 probability distribution, functions (PDF) were used to fit daily PM10 concentrations. Based on the rollback equation and best fitting PDF, estimated reduction was within the range of 28-98%. Finally, the required reduction obtained using two-parameter exponential distribution suggested that risks associated to accidental releases of pollutants should be of greater concern.

  3. 23 CFR Appendix G to Subpart A of... - Special Reporting Requirements for “Hometown” or “Imposed” Plan Areas

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 23 Highways 1 2014-04-01 2014-04-01 false Special Reporting Requirements for âHometownâ or âImposedâ Plan Areas G Appendix G to Subpart A of Part 230 Highways FEDERAL HIGHWAY ADMINISTRATION... Federal-Aid Construction Contracts (Including Supportive Services) Pt. 230, Subpt. A, App. G Appendix G to...

  4. 23 CFR Appendix G to Subpart A of... - Special Reporting Requirements for “Hometown” or “Imposed” Plan Areas

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Special Reporting Requirements for âHometownâ or âImposedâ Plan Areas G Appendix G to Subpart A of Part 230 Highways FEDERAL HIGHWAY ADMINISTRATION... Federal-Aid Construction Contracts (Including Supportive Services) Pt. 230, Subpt. A, App. G Appendix G to...

  5. 23 CFR Appendix G to Subpart A of... - Special Reporting Requirements for “Hometown” or “Imposed” Plan Areas

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 23 Highways 1 2011-04-01 2011-04-01 false Special Reporting Requirements for âHometownâ or âImposedâ Plan Areas G Appendix G to Subpart A of Part 230 Highways FEDERAL HIGHWAY ADMINISTRATION... Federal-Aid Construction Contracts (Including Supportive Services) Pt. 230, Subpt. A, App. G Appendix G to...

  6. 23 CFR Appendix G to Subpart A of... - Special Reporting Requirements for “Hometown” or “Imposed” Plan Areas

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 23 Highways 1 2013-04-01 2013-04-01 false Special Reporting Requirements for âHometownâ or âImposedâ Plan Areas G Appendix G to Subpart A of Part 230 Highways FEDERAL HIGHWAY ADMINISTRATION... Federal-Aid Construction Contracts (Including Supportive Services) Pt. 230, Subpt. A, App. G Appendix G to...

  7. 23 CFR Appendix G to Subpart A of... - Special Reporting Requirements for “Hometown” or “Imposed” Plan Areas

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 23 Highways 1 2012-04-01 2012-04-01 false Special Reporting Requirements for âHometownâ or âImposedâ Plan Areas G Appendix G to Subpart A of Part 230 Highways FEDERAL HIGHWAY ADMINISTRATION... Federal-Aid Construction Contracts (Including Supportive Services) Pt. 230, Subpt. A, App. G Appendix G to...

  8. Lunar Exploration Architecture Level Key Drivers and Sensitivities

    NASA Technical Reports Server (NTRS)

    Goodliff, Kandyce; Cirillo, William; Earle, Kevin; Reeves, J. D.; Shyface, Hilary; Andraschko, Mark; Merrill, R. Gabe; Stromgren, Chel; Cirillo, Christopher

    2009-01-01

    Strategic level analysis of the integrated behavior of lunar transportation and lunar surface systems architecture options is performed to assess the benefit, viability, affordability, and robustness of system design choices. This analysis employs both deterministic and probabilistic modeling techniques so that the extent of potential future uncertainties associated with each option are properly characterized. The results of these analyses are summarized in a predefined set of high-level Figures of Merit (FOMs) so as to provide senior NASA Constellation Program (CxP) and Exploration Systems Mission Directorate (ESMD) management with pertinent information to better inform strategic level decision making. The strategic level exploration architecture model is designed to perform analysis at as high a level as possible but still capture those details that have major impacts on system performance. The strategic analysis methodology focuses on integrated performance, affordability, and risk analysis, and captures the linkages and feedbacks between these three areas. Each of these results leads into the determination of the high-level FOMs. This strategic level analysis methodology has been previously applied to Space Shuttle and International Space Station assessments and is now being applied to the development of the Constellation Program point-of-departure lunar architecture. This paper provides an overview of the strategic analysis methodology and the lunar exploration architecture analyses to date. In studying these analysis results, the strategic analysis team has identified and characterized key drivers affecting the integrated architecture behavior. These key drivers include inclusion of a cargo lander, mission rate, mission location, fixed-versus- variable costs/return on investment, and the requirement for probabilistic analysis. Results of sensitivity analysis performed on lunar exploration architecture scenarios are also presented.

  9. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  10. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  11. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  12. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., Port of Manatee, Florida. 165.767 Section 165.767 Navigation and Navigable Waters COAST GUARD... § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area... extending 500 yards from the island's shoreline, in all directions, not to include the Port Manatee Channel...

  13. Field demonstration of a continuous-variable quantum key distribution network.

    PubMed

    Huang, Duan; Huang, Peng; Li, Huasheng; Wang, Tao; Zhou, Yingming; Zeng, Guihua

    2016-08-01

    We report on what we believe is the first field implementation of a continuous-variable quantum key distribution (CV-QKD) network with point-to-point configuration. Four QKD nodes are deployed on standard communication infrastructures connected with commercial telecom optical fiber. Reliable key exchange is achieved in the wavelength-division-multiplexing CV-QKD network. The impact of a complex and volatile field environment on the excess noise is investigated, since excess noise controlling and reduction is arguably the major issue pertaining to distance and the secure key rate. We confirm the applicability and verify the maturity of the CV-QKD network in a metropolitan area, thus paving the way for a next-generation global secure communication network.

  14. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  15. Engaging Key Stakeholders to Assess and Improve the Professional Preparation of MPH Health Educators

    PubMed Central

    Steckler, Allan; Maman, Suzanne; Ellenson, Meg; French, Elizabeth; Blanchard, Lynn; Bowling, Mike; Yamanis, Nina; Succop, Stacey; Davenport, Amy; Moracco, Beth

    2010-01-01

    Objectives. We described the process of engaging key stakeholders in a systematic review of requirements for a master of public health (MPH) degree within the Department of Health Behavior and Health Education, University of North Carolina Gillings School of Global Public Health, and summarized resulting changes. Methods. A benchmarking study of 11 peer institutions was completed. Key stakeholders (i.e., current students, alumni, faculty, staff, employers, and practicum preceptors) received online or print surveys. A faculty retreat was convened to process results and reach consensus on program revisions. Results. MPH program changes included (1) improved advising and mentoring program, (2) elimination of research and practice track options, (3) increased elective and decreased required credit hours, (4) replacement of master's paper requirement with “deliverables” (written products such as reports, documents, and forms) produced as part of the required “Capstone” course, (5) extended community field experience to 2 semesters and moved it to year 2 of the program, and (6) allowed practica of either 200, 300, or 400 hours. Conclusions. Engaging key stakeholders in the program review process yielded important changes to the MPH degree program requirements. Others may consider this approach when undertaking curriculum reviews. PMID:20395575

  16. Key enablers to facilitate healthy behavior change: workshop summary.

    PubMed

    Teyhen, Deydre S; Aldag, Matt; Centola, Damon; Edinborough, Elton; Ghannadian, Jason D; Haught, Andrea; Jackson, Theresa; Kinn, Julie; Kunkler, Kevin J; Levine, Betty; Martindale, Valerie E; Neal, David; Snyder, Leslie B; Styn, Mindi A; Thorndike, Frances; Trabosh, Valerie; Parramore, David J

    2014-05-01

    The increases in preventable chronic diseases and the rising costs of health care are unsustainable. The US Army Surgeon General's vision to transition from a health care system to a system of health requires the identification of key health enablers to facilitate the adoption of healthy behaviors. In support of this vision, the US Army Telemedicine and Advanced Technology Research Center hosted a workshop in April 2013 titled "Incentives to Create and Sustain Change for Health." Members of government and academia participated to identify key health enablers that could ultimately be leveraged by technology. The key health enablers discussed included (1) public health messaging, (2) changing health habits and the environmental influence on health, (3) goal setting and tracking, (4) the role of incentives in behavior-change intervention, and (5) the role of peer and social networks on change. This report summarizes leading evidence and the group consensus on evidence-based practices with respect to the key enablers in creating healthy behavior change.

  17. 40 CFR 51.918 - Can any SIP planning requirements be suspended in 8-hour ozone nonattainment areas that have air...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... suspended in 8-hour ozone nonattainment areas that have air quality data that meets the NAAQS? 51.918 Section 51.918 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... 8-hour Ozone National Ambient Air Quality Standard § 51.918 Can any SIP planning requirements be...

  18. 40 CFR 51.918 - Can any SIP planning requirements be suspended in 8-hour ozone nonattainment areas that have air...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... suspended in 8-hour ozone nonattainment areas that have air quality data that meets the NAAQS? 51.918 Section 51.918 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... 8-hour Ozone National Ambient Air Quality Standard § 51.918 Can any SIP planning requirements be...

  19. 40 CFR 51.918 - Can any SIP planning requirements be suspended in 8-hour ozone nonattainment areas that have air...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... suspended in 8-hour ozone nonattainment areas that have air quality data that meets the NAAQS? 51.918 Section 51.918 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... 8-hour Ozone National Ambient Air Quality Standard § 51.918 Can any SIP planning requirements be...

  20. Socio-economic benefits from protected areas in southeastern Australia.

    PubMed

    Heagney, E C; Kovac, M; Fountain, J; Conner, N

    2015-12-01

    International case studies of protected area performance increasingly report that conservation and socio-economic outcomes are interdependent. Effective conservation requires support and cooperation from local governments and communities, which in turn requires that protected areas contribute to the economic well-being of the communities in which they are sited. Despite increasing recognition of their importance, robust studies that document the socio-economic impacts of protected areas are rare, especially in the developed world context. We proposed 3 potential pathways through which protected areas might benefit local communities in the developed world: the improved local housing value, local business stimulus, and increased local funding pathways. We examined these pathways by undertaking a statistical longitudinal analysis of 110 regional and rural communities covering an area of approximately 600,000 km(2) in southeastern Australia. We compared trends in 10 socio-economic indicators describing employment, income, housing, business development and local government revenue from 2000 to 2010. New protected areas acquisitions led to an increased number of new dwelling approvals and associated developer contributions, increased local business numbers, and increased local government revenue from user-pays services and grants. Longer-term effects of established protected areas included increased local council revenue from a variety of sources. Our findings provide support for each of our 3 proposed benefit pathways and contribute new insights into the cycling of benefits from protected areas through the economy over time. The business and legislative models in our study are typical of those operating in many other developed countries; thus, the benefit pathways reported in our study are likely to be generalizable. By identifying and communicating socio-economic benefits from terrestrial protected areas in a developed world context, our findings represent an important

  1. Key technologies for manufacturing and processing sheet materials: A global perspective

    NASA Astrophysics Data System (ADS)

    Demeri, Mahmoud Y.

    2001-02-01

    Modern industrial technologies continue to seek new materials and processes to produce products that meet design and functional requirements. Sheet materials made from ferrous and non-ferrous metals, laminates, composites, and reinforced plastics constitute a large percentage of today’s products, components, and systems. Major manufacturers of sheet products include automotive, aerospace, appliance, and food-packaging industries. The Second Global Symposium on Innovations in Materials Processing & Manufacturing: Sheet Materials is organized to provide a forum for presenting advances in sheet processing and manufacturing by worldwide researchers and engineers from industrial, research, and academic centers. The symposium, sponsored by the TMS Materials Processing & Manufacturing Division (MPMD), was planned for the 2001 TMS Annual Meeting, New Orleans, Louisiana, February 11 15, 2001. This article is a review of key papers submitted for publication in the concurrent volume. The selected papers present significant developments in the rapidly expanding areas of advanced sheet materials, innovative forming methods, industrial applications, primary and secondary processing, composite processing, and numerical modeling of manufacturing processes.

  2. New maps, new information: Coral reefs of the Florida keys

    USGS Publications Warehouse

    Lidz, B.H.; Reich, C.D.; Peterson, R.L.; Shinn, E.A.

    2006-01-01

    A highly detailed digitized map depicts 22 benthic habitats in 3140.5 km2 of the Florida Keys National Marine Sanctuary. Dominant are a seagrass/lime-mud zone (map area 27.5%) throughout Hawk Channel and seagrass/carbonate-sand (18.7%) and bare carbonate-sand (17.3%) zones on the outer shelf and in The Quicksands. A lime-mud/seagrass-covered muddy carbonate-sand zone (9.6%) abuts the keys. Hardbottom communities (13.2%) consist of bare Pleistocene coralline and oolitic limestone, coral rubble, and senile coral reefs. Smaller terrestrial (4.0%) and marine habitats, including those of live coral (patch reefs, 0.7%), account for the rest (13.7%) of the area. Derived from aerial photomosaics, the seabed dataset fits precisely when transposed onto a newly developed National Geophysical Data Center hydrographic-bathymetry map. Combined, the maps point to new information on unstudied seabed morphologies, among them an erosional nearshore rock ledge bordering the seaward side of the Florida Keys and thousands of patch-reef clusters aligned in mid-Hawk Channel. Preliminary indications are that the ledge may represent the seaward extent of the 125-ka Key Largo and Miami Limestone that form the keys, and the patch reefs colonized landward edges of two noncoralline, non-dune-ridge topographic troughs. The troughs, their substrate, and inner-shelf location along the seaward side of the Hawk Channel bedrock depression are the first of that type of nuclei to be recognized in the Florida reef record. Together, the map datasets establish the efficacy and accuracy of using aerial photographs to define in extraordinary detail the seabed features and habitats in a shallow-reef setting.

  3. Ecotoxicology for risk assessment in arid zones: some key issues.

    PubMed

    Everts, J W

    1997-01-01

    In the hot arid zones of the world, ecotoxicological research is in statu nascendi. In these zones, the major sources of contamination by toxicants are: (1) plant protection and vector control in wet zones; (2) large-scale crop protection campaigns in dry and ephemeral wet zones; (3) refuse and obsolete pesticides in dry zones; and (4) mining. Economic development in many of these zones requires an adequate knowledge of certain basic principles, i.e., where extrapolating existing knowledge does not apply. The vulnerability of ecosystems to contaminants is closely related to water flow. In dry areas, species are susceptible to factors that interfere with the ecophysiological properties regulating water loss. Most hot arid areas are found at low latitudes where temperatures show striking extremes both in time and space. Living organisms are physiologically resistant and/or show adaptive behavior to these temperature extremes. Very little is known about the effects of toxicants on these key resistant and adaptive functions, although by extrapolation a few assumptions can be made. The effects of hyperthermia, for instance, can be aggravated by GSH depleting substances, and the temporary disabling effects characteristic of many pesticides may prove fatal under these circumstances. Most wet areas show a spatial concentration of both human activity and wildlife. In mesic zones, the contamination of water represents a health risk to both humans and other living organisms. The vast majority of aquatic communities are those inhabiting temporary pools and streams. Their populations are characterized by short reproductive cycles and/or long dormant stages. Toxicants affecting growth in these areas have been shown to have a deleterious effect. In a synthesis of existing knowledge the most prominent gaps are identified and priorities for further research are made.

  4. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  5. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  6. Exploring employer job requirements: An analysis of pharmacy job announcements.

    PubMed

    Wheeler, James S; Ngo, Tien; Cecil, Jasmine; Borja-Hart, Nancy

    Postgraduate training, dual degrees, and board certifications are credentials viewed by academic pharmacy communities and professional organizations as positive assets for those seeking pharmacist jobs; however, a key question merits further investigation: do these views match employer expectations? The primary objective of this study was to identify the most common qualifications employers require as stated in job advertisements. Pharmacist job postings from the aggregate jobs website Indeed.com were evaluated for the 20 largest metropolitan areas in the United States. Search criteria included: pharmacist, full-time, and within a 50-mile radius of the metropolitan area. Positions were excluded if they were not pharmacist specific, did not require a pharmacy degree, were part-time, or were temporary. Required and preferred qualifications were collected in the following categories: practice type, experience needed, training, certification, and desired skills. Six hundred and eleven of 1356 postings met inclusion criteria. Positions were classified as community (113), health-system (264), industry (149), academia (9), or other (76). Four hundred and six (66.4%) required a minimum of a Bachelor's of Pharmacy degree, while 174 (28.4%) required a Doctor of Pharmacy degree. Experience was required for 467 positions (range of 6 months to 14 years). Postgraduate training was required for 73 positions (66 residency/7 fellowship). One job required a Master's degree, type unspecified. BPS certifications were required for 7 positions (1.1%) and preferred for 22 positions (3.6%). Certifications and skills most required by employers were verbal and written skills (248), Microsoft Office proficiency (93), immunization certifications (51), and Basic Life Support/Cardiopulmonary Resuscitation certifications (37). Postgraduate training, dual degrees, and board certification were not significant factors in the qualification criteria for the positions identified. The qualifications

  7. 50 CFR Table 20 to Part 679 - Seabird Avoidance Gear Requirements for Vessels, based on Area, Gear, and Vessel Type. (See § 679...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Seabird Avoidance Gear Requirements for Vessels, based on Area, Gear, and Vessel Type. (See § 679.24(e) for complete seabird avoidance program requirements; see 679.24(e)(1) for applicable fisheries) 20 Table 20 to Part 679 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT,...

  8. Knowledge and attitude of key community members towards tuberculosis: mixed method study from BRAC TB control areas in Bangladesh.

    PubMed

    Paul, Sukanta; Akter, Rahima; Aftab, Afzal; Khan, Antora M; Barua, Mrittika; Islam, Shayla; Islam, Akramul; Husain, Ashaque; Sarker, Malabika

    2015-01-31

    Bangladesh National Tuberculosis (TB) Control Programme adopted a number of strategies to facilitate TB diagnosis and treatment. 'Advocacy, Communication and Social Mobilization' (ACSM) was one of the key strategies implemented by BRAC (Bangladesh Rural Advancement Committee, a non-governmental development organization) TB control program. The purpose of this study is to assess the knowledge and attitudes of the key community members (KCMs) participated in ACSM in BRAC TB control areas. This study combined quantitative and qualitative methods using a mixed method approach. KCMs in three districts with low TB case detection rates were targeted to assess the ACSM program. The quantitative survey using a multi-stage random-sampling strategy was conducted among 432 participants. The qualitative study included in-depth interviews (IDIs) of a sub sample of 48 respondents. For quantitative analysis, descriptive statistics were reported using frequencies, percentages, and Chi square tests, while thematic analysis was used for qualitative part. Most (99%) of the participants had heard about TB, and almost all knew that TB is a contagious yet curable disease. More than half (53%) of the KCMs had good knowledge regarding TB, but BRAC workers were found to be more knowledgeable compared to other KCMs. However, considerable knowledge gaps were observed among BRAC community health workers. Qualitative results revealed that the majority of the KCMs were aware about the signs, symptoms and transmission pathways of TB and believed that smoking and addiction were the prime causes of transmission of TB. The knowledge about child TB was poor even among BRAC health workers. Stigma associated with TB was not uncommon. Almost all respondents expressed that young girls diagnosed with TB. This study finding has revealed varying levels of knowledge and mixed attitudes about TB among the KCMs. It also provides insight on the poor knowledge regarding child TB and indicate that despite the

  9. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buddemeier, B R; Dillon, M B

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictionsmore » from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations

  10. Next Generation Microbiology Requirements

    NASA Technical Reports Server (NTRS)

    Ott, C. M.; Oubre, C. M.; Elliott, T. F.; Castro, V. A.; Pierson, D. L.

    2012-01-01

    As humans continue to explore deep into space, microorganisms will travel with them. The primary means to mitigate the risk of infectious disease are a combination of prudent spacecraft design and rigorous operational controls. The effectiveness of these methods are evaluated by microbiological monitoring of spacecraft, food, water, and the crew that is performed preflight, in-flight, and post-flight. Current NASA requirements associated with microbiological monitoring are based on culture-based methodology where microorganisms are grown on a semi-solid growth medium and enumerated. Subsequent identification of the organisms requires specialized labor and large equipment, which historically has been performed on Earth. Requirements that rely strictly on culture-based units limit the use of non-culture based monitoring technology. Specifically, the culture-based "measurement criteria" are Colony Forming Units (CFU, representing the growth of one microorganism at a single location on the agar medium) per a given volume, area, or sample size. As the CFU unit by definition is culture-based, these requirements limit alternative technologies for spaceflight applications. As spaceflight missions such as those to Mars extend further into space, culture-based technology will become difficult to implement due to the (a) limited shelf life of the culture media, (b) mass/volume necessary to carry these consumables, and (c) problems associated with the production of biohazardous material in the habitable volume of the spacecraft. In addition, an extensive amount of new knowledge has been obtained during the Space Shuttle, NASA-Mir, and International Space Station Programs, which gave direction for new or modified microbial control requirements for vehicle design and mission operations. The goal of this task is to develop and recommend a new set of requirements for vehicle design and mission operations, including microbiological monitoring, based upon "lessons learned" and new

  11. Teacher-Student Sexual Relations: Key Risks and Ethical Issues

    ERIC Educational Resources Information Center

    Sikes, Pat

    2010-01-01

    Researching actual or purported sexual contact between teachers and students raises many difficult ethical issues, questions and dilemmas, which may help to explain why few have ventured into the field. This experientially based paper addresses key problem areas under the headings of: the ethics of researching a sensitive taboo topic; the ethics…

  12. Dual Key Speech Encryption Algorithm Based Underdetermined BSS

    PubMed Central

    Zhao, Huan; Chen, Zuo; Zhang, Xixiang

    2014-01-01

    When the number of the mixed signals is less than that of the source signals, the underdetermined blind source separation (BSS) is a significant difficult problem. Due to the fact that the great amount data of speech communications and real-time communication has been required, we utilize the intractability of the underdetermined BSS problem to present a dual key speech encryption method. The original speech is mixed with dual key signals which consist of random key signals (one-time pad) generated by secret seed and chaotic signals generated from chaotic system. In the decryption process, approximate calculation is used to recover the original speech signals. The proposed algorithm for speech signals encryption can resist traditional attacks against the encryption system, and owing to approximate calculation, decryption becomes faster and more accurate. It is demonstrated that the proposed method has high level of security and can recover the original signals quickly and efficiently yet maintaining excellent audio quality. PMID:24955430

  13. Organization and integration of biomedical knowledge with concept maps for key peroxisomal pathways.

    PubMed

    Willemsen, A M; Jansen, G A; Komen, J C; van Hooff, S; Waterham, H R; Brites, P M T; Wanders, R J A; van Kampen, A H C

    2008-08-15

    One important area of clinical genomics research involves the elucidation of molecular mechanisms underlying (complex) disorders which eventually may lead to new diagnostic or drug targets. To further advance this area of clinical genomics one of the main challenges is the acquisition and integration of data, information and expert knowledge for specific biomedical domains and diseases. Currently the required information is not very well organized but scattered over biological and biomedical databases, basic text books, scientific literature and experts' minds and may be highly specific, heterogeneous, complex and voluminous. We present a new framework to construct knowledge bases with concept maps for presentation of information and the web ontology language OWL for the representation of information. We demonstrate this framework through the construction of a peroxisomal knowledge base, which focuses on four key peroxisomal pathways and several related genetic disorders. All 155 concept maps in our knowledge base are linked to at least one other concept map, which allows the visualization of one big network of related pieces of information. The peroxisome knowledge base is available from www.bioinformaticslaboratory.nl (Support-->Web applications). Supplementary data is available from www.bioinformaticslaboratory.nl (Research-->Output--> Publications--> KB_SuppInfo)

  14. Export Control Requirements for Tritium Processing Design and R&D

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hollis, William Kirk; Maynard, Sarah-Jane Wadsworth

    This document will address requirements of export control associated with tritium plant design and processes. Los Alamos National Laboratory has been working in the area of tritium plant system design and research and development (R&D) since the early 1970’s at the Tritium Systems Test Assembly (TSTA). This work has continued to the current date with projects associated with the ITER project and other Office of Science Fusion Energy Science (OS-FES) funded programs. ITER is currently the highest funding area for the DOE OS-FES. Although export control issues have been integrated into these projects in the past a general guidance documentmore » has not been available for reference in this area. To address concerns with currently funded tritium plant programs and assist future projects for FES, this document will identify the key reference documents and specific sections within related to tritium research. Guidance as to the application of these sections will be discussed with specific detail to publications and work with foreign nationals.« less

  15. Export Control Requirements for Tritium Processing Design and R&D

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hollis, William Kirk; Maynard, Sarah-Jane Wadsworth

    2015-10-30

    This document will address requirements of export control associated with tritium plant design and processes. Los Alamos National Laboratory has been working in the area of tritium plant system design and research and development (R&D) since the early 1970’s at the Tritium Systems Test Assembly (TSTA). This work has continued to the current date with projects associated with the ITER project and other Office of Science Fusion Energy Science (OS-FES) funded programs. ITER is currently the highest funding area for the DOE OS-FES. Although export control issues have been integrated into these projects in the past a general guidance documentmore » has not been available for reference in this area. To address concerns with currently funded tritium plant programs and assist future projects for FES, this document will identify the key reference documents and specific sections within related to tritium research. Guidance as to the application of these sections will be discussed with specific detail to publications and work with foreign nationals.« less

  16. An Interactive Multimedia Dichotomous Key for Teaching Plant Identification

    ERIC Educational Resources Information Center

    Jacquemart, Anne-Laure; Lhoir, Pierre; Binard, Fabian; Descamps, Charlotte

    2016-01-01

    Teaching plant identification includes demonstrating how to use dichotomous keys; this requires knowledge of numerous botanical terms and can be challenging, confusing and frustrating for students. Here, we developed a multimedia tool to help students (1) learn botanical terms, (2) practice, train and test their knowledge of plant identification…

  17. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

    PubMed

    Nellore, Vishwa; Xi, Sam; Dwyer, Chris

    2015-12-22

    Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.

  18. Identification of Key Odorants in Used Disposable Absorbent Incontinence Products

    PubMed Central

    Hall, Gunnar; Forsgren-Brusk, Ulla

    2017-01-01

    PURPOSE: The purpose of this study was to identify key odorants in used disposable absorbent incontinence products. DESIGN: Descriptive in vitro study SUBJECTS AND SETTING: Samples of used incontinence products were collected from 8 residents with urinary incontinence living in geriatric nursing homes in the Gothenburg area of Sweden. Products were chosen from a larger set of products that had previously been characterized by descriptive odor analysis. METHODS: Pieces of the used incontinence products were cut from the wet area, placed in glass bottles, and kept frozen until dynamic headspace sampling of volatile compounds was completed. Gas chromatography–olfactometry was used to identify which compounds contributed most to the odors in the samples. Compounds were identified by gas chromatography–mass spectrometry. RESULTS: Twenty-eight volatiles were found to be key odorants in the used incontinence products. Twenty-six were successfully identified. They belonged to the following classes of chemical compounds: aldehydes (6); amines (1); aromatics (3); isothiocyanates (1); heterocyclics (2); ketones (6); sulfur compounds (6); and terpenes (1). CONCLUSION: Nine of the 28 key odorants were considered to be of particular importance to the odor of the used incontinence products: 3-methylbutanal, trimethylamine, cresol, guaiacol, 4,5-dimethylthiazole-S-oxide, diacetyl, dimethyl trisulfide, 5-methylthio-4-penten-2-ol, and an unidentified compound. PMID:28328644

  19. Measurement-device-independent quantum key distribution.

    PubMed

    Lo, Hoi-Kwong; Curty, Marcos; Qi, Bing

    2012-03-30

    How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem--measurement-device-independent quantum key distribution (QKD). It not only removes all detector side channels, but also doubles the secure distance with conventional lasers. Our proposal can be implemented with standard optical components with low detection efficiency and highly lossy channels. In contrast to the previous solution of full device independent QKD, the realization of our idea does not require detectors of near unity detection efficiency in combination with a qubit amplifier (based on teleportation) or a quantum nondemolition measurement of the number of photons in a pulse. Furthermore, its key generation rate is many orders of magnitude higher than that based on full device independent QKD. The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors.

  20. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  1. 75 FR 972 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-07

    ... key conservation gaps in important ocean areas. DATES: Comments on the nominations to the national... the Framework. Executive Order 13158 defines an MPA as: ``any area of the marine environment that has... national system may include both terrestrial and marine components, the term MPA as defined in the...

  2. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    PubMed Central

    Xie, Hualin; Yao, Guanrong; Wang, Peng

    2014-01-01

    Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability. PMID:24590051

  3. Quantum key distribution with prepare-and-measure Bell test

    PubMed Central

    Tan, Yong-gang

    2016-01-01

    The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the communication without being detected. A prepare-and-measure Bell test protocol will be proposed. By randomly carrying out Bell test at the side of the information receiver, Bob, Eve’s illegal information gain within the detector side channel attack can be well bounded. This protocol does not require any improvement on the detectors used in available prepare-and-measure QKD. Though we only illustrate its application in the BB84 protocol, it is applicable for any prepare-and-measure QKD. PMID:27733771

  4. Requirements for Designing Life Support System Architectures for Crewed Exploration Missions Beyond Low-Earth Orbit

    NASA Technical Reports Server (NTRS)

    Howard, David; Perry,Jay; Sargusingh, Miriam; Toomarian, Nikzad

    2016-01-01

    NASA's technology development roadmaps provide guidance to focus technological development on areas that enable crewed exploration missions beyond low-Earth orbit. Specifically, the technology area roadmap on human health, life support and habitation systems describes the need for life support system (LSS) technologies that can improve reliability and in-situ maintainability within a minimally-sized package while enabling a high degree of mission autonomy. To address the needs outlined by the guiding technology area roadmap, NASA's Advanced Exploration Systems (AES) Program has commissioned the Life Support Systems (LSS) Project to lead technology development in the areas of water recovery and management, atmosphere revitalization, and environmental monitoring. A notional exploration LSS architecture derived from the International Space has been developed and serves as the developmental basis for these efforts. Functional requirements and key performance parameters that guide the exploration LSS technology development efforts are presented and discussed. Areas where LSS flight operations aboard the ISS afford lessons learned that are relevant to exploration missions are highlighted.

  5. Lessons Learned from Research about Informal Reading Inventories: Keys to Data-Driven Instructional Recommendations

    ERIC Educational Resources Information Center

    L'Allier, Susan K.

    2013-01-01

    This study examined how effectively candidates in an MSEd in literacy education with a focus on reading program used the results from the Basic Reading Inventory to develop key instructional recommendations. The results indicated that, overall, candidates made about two thirds of the key recommendations suggested by an expert in the area of…

  6. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 1 2014-01-01 2014-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  7. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 1 2012-01-01 2012-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  8. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 1 2011-01-01 2011-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  9. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 1 2013-01-01 2013-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  10. 5 CFR 591.241 - What are the key activities of the COLA Advisory Committees?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false What are the key activities of the COLA... Areas Program Administration § 591.241 What are the key activities of the COLA Advisory Committees? (a) The COLA Advisory Committees may— (1) Advise and assist OPM in planning living-cost surveys; (2...

  11. Free-Space Quantum Key Distribution using Polarization Entangled Photons

    NASA Astrophysics Data System (ADS)

    Kurtsiefer, Christian

    2007-06-01

    We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source [1]. Based on a BB84-equivalent protocol, we generated without interruption over 10 hours a secret key free-space optical link distance of 1.5 km with a rate up to 950 bits per second after error correction and privacy amplification. Our system is based on two time stamp units and relies on no specific hardware channel for coincidence identification besides an IP link. For that, initial clock synchronization with an accuracy of better than 2 ns is achieved, based on a conventional NTP protocol and a tiered cross correlation of time tags on both sides. Time tags are used to servo a local clock, allowing a streamed measurement on correctly identified photon pairs. Contrary to the majority of quantum key distribution systems, this approach does not require a trusted large-bandwidth random number generator, but integrates that into the physical key generation process. We discuss our current progress of implementing a key distribution via an atmospherical link during daylight conditions, and possible attack scenarios on a physical timing information side channel to a entanglement-based key distribution system. [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006).

  12. Final report on key comparison CCQM-K81: Chloramphenicol in pig muscle

    NASA Astrophysics Data System (ADS)

    Polzer, Joachim; Henrion, Andre; Gowik, Petra

    2013-01-01

    Under the auspices of the Organic Analysis Working Group (OAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) a key comparison, CCQM-K81 'Chloramphenicol in pig muscle', was coordinated by BVL and PTB in 2009/2010. Six NMIs/DIs participated in this comparison. Chloramphenicol (CAP) is an effective broad-spectrum antibiotic which can in principle be used for the treatment of humans and animals. Its use for the treatment of food-producing animals is, however, forbidden worldwide in many countries due to potential severe side effects. The key comparison was the follow-up to the successful pilot study 'CCQM-P90: chloramphenicol in milk'. With this key comparison it was intended to demonstrate the capability of NMIs/DIs to analyse traces of CAP in food at concentration levels resulting from legal requirements for food control. Additionally, the quality of this kind of analysis with respect to compliance with legal requirements for food control methods and the international comparability of measurements should be evaluated in general. The study was classified as a 'track C' study (studies in emerging areas of global interest). For the study incurred lyophilised pig muscle material containing CAP (at a mass-fraction level around the maximum allowable level for import for a number of countries) has been produced as a candidate reference material by BVL and IRMM (Institute for Reference Materials and Measurements, JRC of the European Commission). Animal treatment and slaughtering of the animal to gain incurred muscle material as well as pre-testing of the CAP content was done at the BVL. The IRMM did further processing of the material and testing of homogeneity and stability. Participants were invited to assign the mass fraction of free CAP in the comparison sample. CCQM-K81 demonstrated successfully the capability of the participating laboratories to assign chloramphenicol values in tissue down to residue levels of around 0.3 ng/g (referring to the

  13. American Society of Clinical Oncology Summit on Addressing Obesity Through Multidisciplinary Provider Collaboration: Key Findings and Recommendations for Action.

    PubMed

    Ligibel, Jennifer A; Alfano, Catherine M; Hershman, Dawn L; Merrill, Janette K; Basen-Engquist, Karen; Bloomgarden, Zachary T; Demark-Wahnefried, Wendy; Dixon, Suzanne; Hassink, Sandra G; Jakicic, John M; Morton, John Magaña; Okwuosa, Tochi M; Powell-Wiley, Tiffany M; Rothberg, Amy E; Stephens, Mark; Streett, Sarah E; Wild, Robert A; Westman, Eric A; Williams, Ronald J; Wollins, Dana S; Hudis, Clifford A

    2017-11-01

    Given the increasing evidence that obesity increases the risk of developing and dying from malignancy, the American Society of Clinical Oncology (ASCO) launched an Obesity Initiative in 2013 that was designed to increase awareness among oncology providers and the general public of the relationship between obesity and cancer and to promote research in this area. Recognizing that the type of societal change required to impact the obesity epidemic will require a broad-based effort, ASCO hosted the "Summit on Addressing Obesity through Multidisciplinary Collaboration" in 2016. This meeting was held to review current challenges in addressing obesity within the respective health care provider communities and to identify priorities that would most benefit from a collective and cross-disciplinary approach. Efforts focused on four key areas: provider education and training; public education and activation; research; and policy and advocacy. Summit attendees discussed current challenges in addressing obesity within their provider communities and identified priorities that would most benefit from multidisciplinary collaboration. A synopsis of recommendations to facilitate future collaboration, as well as examples of ongoing cooperative efforts, provides a blueprint for multidisciplinary provider collaboration focused on obesity prevention and treatment. © 2017 The Obesity Society.

  14. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  15. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  16. Key Decision Record Creation and Approval Module

    NASA Technical Reports Server (NTRS)

    Hebert, Barrt; Messer, Elizabeth A.; Albasini, Colby; Le, Thang; ORourke, William, Sr.; Stiglets, Tim; Strain, Ted

    2012-01-01

    Retaining good key decision records is critical to ensuring the success of a project or operation. Having adequately documented decisions with supporting documents and rationale can greatly reduce the amount of rework or reinvention over a project's, vehicle's, or facility's lifecycle. Stennis Space Center developed and uses a software tool that automates the Key Decision Record (KDR) process for its engineering and test projects. It provides the ability for a user to log key decisions that are made during the course of a project. By customizing Parametric Technology Corporation's (PTC) Windchill product, the team was able to log all information about a decision, and electronically route that information for approval. Customizing the Windchill product allowed the team to directly connect these decisions to the engineering data that it might affect and notify data owners of the decision. The user interface was created in JSP and Javascript, within the OOTB (Out of the Box) Windchill product, allowing users to create KDRs. Not only does this interface allow users to create and track KDRs, but it also plugs directly into the OOTB ability to associate these decision records with other relevant engineering data such as drawings, designs, models, requirements, or specifications

  17. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  18. Field test of quantum key distribution in the Tokyo QKD Network.

    PubMed

    Sasaki, M; Fujiwara, M; Ishizuka, H; Klaus, W; Wakui, K; Takeoka, M; Miki, S; Yamashita, T; Wang, Z; Tanaka, A; Yoshino, K; Nambu, Y; Takahashi, S; Tajima, A; Tomita, A; Domeki, T; Hasegawa, T; Sakai, Y; Kobayashi, H; Asai, T; Shimizu, K; Tokura, T; Tsurumaru, T; Matsui, M; Honjo, T; Tamaki, K; Takesue, H; Tokura, Y; Dynes, J F; Dixon, A R; Sharpe, A W; Yuan, Z L; Shields, A J; Uchikoga, S; Legré, M; Robyr, S; Trinkler, P; Monat, L; Page, J-B; Ribordy, G; Poppe, A; Allacher, A; Maurhart, O; Länger, T; Peev, M; Zeilinger, A

    2011-05-23

    A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to demonstrate the world-first secure TV conferencing over a distance of 45km. The network includes a commercial QKD product for long-term stable operation, and application interface to secure mobile phones. Detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.

  19. Spatio-temporal patterns of key exploited marine species in the Northwestern Mediterranean Sea.

    PubMed

    Morfin, Marie; Fromentin, Jean-Marc; Jadaud, Angélique; Bez, Nicolas

    2012-01-01

    This study analyzes the temporal variability/stability of the spatial distributions of key exploited species in the Gulf of Lions (Northwestern Mediterranean Sea). To do so, we analyzed data from the MEDITS bottom-trawl scientific surveys from 1994 to 2010 at 66 fixed stations and selected 12 key exploited species. We proposed a geostatistical approach to handle zero-inflated and non-stationary distributions and to test for the temporal stability of the spatial structures. Empirical Orthogonal Functions and other descriptors were then applied to investigate the temporal persistence and the characteristics of the spatial patterns. The spatial structure of the distribution (i.e. the pattern of spatial autocorrelation) of the 12 key species studied remained highly stable over the time period sampled. The spatial distributions of all species obtained through kriging also appeared to be stable over time, while each species displayed a specific spatial distribution. Furthermore, adults were generally more densely concentrated than juveniles and occupied areas included in the distribution of juveniles. Despite the strong persistence of spatial distributions, we also observed that the area occupied by each species was correlated to its abundance: the more abundant the species, the larger the occupation area. Such a result tends to support MacCall's basin theory, according to which density-dependence responses would drive the expansion of those 12 key species in the Gulf of Lions. Further analyses showed that these species never saturated their habitats, suggesting that they are below their carrying capacity; an assumption in agreement with the overexploitation of several of these species. Finally, the stability of their spatial distributions over time and their potential ability to diffuse outside their main habitats give support to Marine Protected Areas as a potential pertinent management tool.

  20. Key Gaps for Enabling Plant Growth in Future Missions

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Motil, Brian; Barta, Dan; Fritsche, Ralph; Massa, Gioia; Quincy, Charlie; Romeyn, Matthew; Wheeler, Ray; Hanford, Anthony

    2017-01-01

    Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space Administration (NASA). It also begins to identify solutions to the simpler questions identified by the group based on work initiated in 2017. Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space

  1. A step towards considering the spatial heterogeneity of urban key features in urban hydrology flood modelling

    NASA Astrophysics Data System (ADS)

    Leandro, J.; Schumann, A.; Pfister, A.

    2016-04-01

    Some of the major challenges in modelling rainfall-runoff in urbanised areas are the complex interaction between the sewer system and the overland surface, and the spatial heterogeneity of the urban key features. The former requires the sewer network and the system of surface flow paths to be solved simultaneously. The latter is still an unresolved issue because the heterogeneity of runoff formation requires high detailed information and includes a large variety of feature specific rainfall-runoff dynamics. This paper discloses a methodology for considering the variability of building types and the spatial heterogeneity of land surfaces. The former is achieved by developing a specific conceptual rainfall-runoff model and the latter by defining a fully distributed approach for infiltration processes in urban areas with limited storage capacity dependent on OpenStreetMaps (OSM). The model complexity is increased stepwise by adding components to an existing 2D overland flow model. The different steps are defined as modelling levels. The methodology is applied in a German case study. Results highlight that: (a) spatial heterogeneity of urban features has a medium to high impact on the estimated overland flood-depths, (b) the addition of multiple urban features have a higher cumulative effect due to the dynamic effects simulated by the model, (c) connecting the runoff from buildings to the sewer contributes to the non-linear effects observed on the overland flood-depths, and (d) OSM data is useful in identifying pounding areas (for which infiltration plays a decisive role) and permeable natural surface flow paths (which delay the flood propagation).

  2. 19 CFR 122.24 - Landing requirements for certain aircraft arriving from areas south of U.S.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... Houston, Tex William P. Hobby Airport. Key West, Fla Key West International Airport. Laredo, Tex Laredo.... West Palm Beach, Fla Palm Beach International Airport. Wilmington, NC New Hanover County Airport Yuma...

  3. 19 CFR 122.24 - Landing requirements for certain aircraft arriving from areas south of U.S.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... Houston, Tex William P. Hobby Airport. Key West, Fla Key West International Airport. Laredo, Tex Laredo.... West Palm Beach, Fla Palm Beach International Airport. Wilmington, NC New Hanover County Airport Yuma...

  4. 19 CFR 122.24 - Landing requirements for certain aircraft arriving from areas south of U.S.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... Houston, Tex William P. Hobby Airport. Key West, Fla Key West International Airport. Laredo, Tex Laredo.... West Palm Beach, Fla Palm Beach International Airport. Wilmington, NC New Hanover County Airport Yuma...

  5. 19 CFR 122.24 - Landing requirements for certain aircraft arriving from areas south of U.S.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... Houston, Tex William P. Hobby Airport. Key West, Fla Key West International Airport. Laredo, Tex Laredo.... West Palm Beach, Fla Palm Beach International Airport. Wilmington, NC New Hanover County Airport Yuma...

  6. Quadrature-quadrature phase-shift keying

    NASA Astrophysics Data System (ADS)

    Saha, Debabrata; Birdsall, Theodore G.

    1989-05-01

    Quadrature-quadrature phase-shift keying (Q2PSK) is a spectrally efficient modulation scheme which utilizes available signal space dimensions in a more efficient way than two-dimensional schemes such as QPSK and MSK (minimum-shift keying). It uses two data shaping pulses and two carriers, which are pairwise quadrature in phase, to create a four-dimensional signal space and increases the transmission rate by a factor of two over QPSK and MSK. However, the bit error rate performance depends on the choice of pulse pair. With simple sinusoidal and cosinusoidal data pulses, the Eb/N0 requirement for Pb(E) = 10 to the -5 is approximately 1.6 dB higher than that of MSK. Without additional constraints, Q2PSK does not maintain constant envelope. However, a simple block coding provides a constant envelope. This coded signal substantially outperforms MSKS and TFM (time-frequency multiplexing) in bandwidth efficiency. Like MSK, Q2PSK also has self-clocking and self-synchronizing ability. An optimum class of pulse shapes for use in Q2PSK-format is presented. One suboptimum realization achieves the Nyquist rate of 2 bits/s/Hz using binary detection.

  7. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    NASA Astrophysics Data System (ADS)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  8. Learning to Learn: A Key-Competence for All Adults?!

    ERIC Educational Resources Information Center

    Hofmann, Peter

    2008-01-01

    Learning to learn is important and increasingly vital for people trying to deal with a rapidly changing world! Or, in the words of the European Union, learning to learn is one of the eight "key competences that citizens require for their personal fulfilment, social inclusion, active citizenship and employability in our knowledge-based…

  9. District-Wide Involvement: The Key to Successful School Improvement.

    ERIC Educational Resources Information Center

    Mundell, Scott; Babich, George

    1989-01-01

    Describes the self-study process used by the Marana Unified School District to meet accreditation requirements with minimal expense, to emphasize curriculum development, and to improve the school. Considers the key feature of the cyclical review model to be the personal involvement of nearly every faculty member in the 10-school district. (DMM)

  10. 75 FR 38779 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ... managing agencies to fill key conservation gaps in important ocean areas. DATES: Comments on the... conservation objectives of the Framework. Executive Order 13158 defines an MPA as: ``any area of the marine... term MPA as defined in the Framework refers only to the marine portion of a site (below the mean high...

  11. GPU: the biggest key processor for AI and parallel processing

    NASA Astrophysics Data System (ADS)

    Baji, Toru

    2017-07-01

    Two types of processors exist in the market. One is the conventional CPU and the other is Graphic Processor Unit (GPU). Typical CPU is composed of 1 to 8 cores while GPU has thousands of cores. CPU is good for sequential processing, while GPU is good to accelerate software with heavy parallel executions. GPU was initially dedicated for 3D graphics. However from 2006, when GPU started to apply general-purpose cores, it was noticed that this architecture can be used as a general purpose massive-parallel processor. NVIDIA developed a software framework Compute Unified Device Architecture (CUDA) that make it possible to easily program the GPU for these application. With CUDA, GPU started to be used in workstations and supercomputers widely. Recently two key technologies are highlighted in the industry. The Artificial Intelligence (AI) and Autonomous Driving Cars. AI requires a massive parallel operation to train many-layers of neural networks. With CPU alone, it was impossible to finish the training in a practical time. The latest multi-GPU system with P100 makes it possible to finish the training in a few hours. For the autonomous driving cars, TOPS class of performance is required to implement perception, localization, path planning processing and again SoC with integrated GPU will play a key role there. In this paper, the evolution of the GPU which is one of the biggest commercial devices requiring state-of-the-art fabrication technology will be introduced. Also overview of the GPU demanding key application like the ones described above will be introduced.

  12. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  13. 7 CFR 25.103 - Area size and boundary requirements

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....103 Agriculture Office of the Secretary of Agriculture RURAL EMPOWERMENT ZONES AND ENTERPRISE... rate for each Census tract in such district is not less than 35 percent for an Empowerment Zone (30... include any portion of an area already included in an Empowerment Zone or Enterprise Community or included...

  14. SARS: Key factors in crisis management.

    PubMed

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  15. 76 FR 1429 - Loveland Area Projects/Western Area Colorado Missouri Balancing Authority-Rate Order No. WAPA-154

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-10

    ... requirements, thus ensuring repayment of the project costs within the cost recovery criteria set forth in DOE... interest) and capital requirements, thus ensuring repayment of the project costs within the cost recovery... DEPARTMENT OF ENERGY Western Area Power Administration Loveland Area Projects/Western Area...

  16. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  17. Imaging Exoplanets with the Exo-S Starshade Mission: Key Enabling Technologies

    NASA Astrophysics Data System (ADS)

    Kasdin, N. Jeremy; Lisman, Doug; Shaklan, Stuart; Thomson, Mark; Webb, David; Cady, Eric; Exo-S Science; Technology Definition Team, Exoplanet Program Probe Study Design Team

    2015-01-01

    There is increasing interest in the use of a starshade, a spacecraft employing a large screen flying in formation with a space telescope, for providing the starlight suppression needed to detect and characterize exoplanets. In particular, Exo-S is a NASA study directed at designing a probe-scale exoplanet mission employing a starshade. In this poster we present the enabling technologies needed to make a starshade mission a reality: flight-like petals, a deployable truss to support the petals, optical edges, optical diffraction studies, and formation sensing and control. We show the status of each technology gap and summarize our progress over the past 5 years with plans for the next 3 years in demonstrating feasibility in all these areas. In particular, since no optical end-to-end test is possible, it is necessary to both show that a starshade can be built and deployed to the required accuracy and, via laboratory experiments at smaller scale, that the optical modeling upon which the accuracy requirements are based is validated. We show our progress verifying key enabling technologies, including demonstrating that a starshade petal made from flight-like materials can be manufactured to the needed accuracy and that a central truss with attached petals can be deployed with the needed precision. We also summarize our sub-scale lab experiments that demonstrate we can achieve the contrast predicted by our optical models.

  18. Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    NASA Astrophysics Data System (ADS)

    Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2018-04-01

    Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.

  19. Evaluating nest supplementation as a recovery strategy for the endangered rodents of the Florida Keys

    USGS Publications Warehouse

    Cove, Michael V.; Simons, Theodore R.; Gardner, Beth; Maurer, Andrew S.; O'Connell, Allan F.

    2017-01-01

    The Key Largo woodrat (Neotoma floridana smalli) and Key Largo cotton mouse (Peromyscus gossypinus allapaticola) are federally endangered subspecies endemic to the tropical hardwood hammocks of Key Largo, Florida. Woodrats are considered generalists in habitat and diet, yet a steady decline in natural stick nests and capture rates over the past several decades suggests that they are limited by the availability of nesting habitat due to habitat loss and fragmentation. The more specialized Key Largo cotton mouse appears to rely on old growth hammock, a habitat type that is rare following past land clearing. In 2004, the U.S. Fish and Wildlife Service started building supplemental nest structures to restore habitat quality and connectivity for these endangered rodents, but nest use requires evaluation. We used camera traps and occupancy models to evaluate the factors influencing woodrat and cotton mouse use of the supplemental nests. We detected woodrats at 65 and cotton mice at 175 of 284 sampled nest structures, with co-occurrence at 38 nests. Woodrat nest use followed a gradient from low nest use in the north to high nest use in the south, which might relate to the proximity of free-ranging domestic cat (Felis catus) colonies in residential developments. Cotton mouse nest use, however, was related positively to mature hammock and related negatively to disturbed areas (e.g. scarified lands). The two species occurred independently of each other. Stick-stacking behavior was observed at supplemental nests and, although it was correlated with detection of woodrats, it was not a strong predictor of their occurrence. We suggest that nest supplementation can be an important tool for species recovery as habitat quality continues to improve with succession.

  20. Encrypted optical storage with wavelength-key and random phase codes.

    PubMed

    Matoba, O; Javidi, B

    1999-11-10

    An encrypted optical memory system that uses a wavelength code as well as input and Fourier-plane random phase codes is proposed. Original data are illuminated by a coherent light source with a specified wavelength and are then encrypted with two random phase codes before being stored holographically in a photorefractive material. Successful decryption requires the use of a readout beam with the same wavelength as that used in the recording, in addition to the correct phase key in the Fourier plane. The wavelength selectivity of the proposed system is evaluated numerically. We show that the number of available wavelength keys depends on the correlation length of the phase key in the Fourier plane. Preliminary experiments of encryption and decryption of optical memory in a LiNbO(3):Fe photorefractive crystal are demonstrated.

  1. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  2. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  3. Key Reading Recovery Strategies to Support Classroom Guided Reading Instruction

    ERIC Educational Resources Information Center

    Lipp, Jamie R.; Helfrich, Sara R.

    2016-01-01

    Effective teachers are continuously striving to improve their instruction. Reading Recovery teachers have detailed and specific literacy training and expertise that can be of great value to classroom teachers, especially in the area of guided reading instruction. This article explores the ways in which key Reading Recovery strategies can be…

  4. A free-access online key to identify Amazonian ferns.

    PubMed

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp.

  5. A free-access online key to identify Amazonian ferns

    PubMed Central

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    Abstract There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp. PMID:28781548

  6. Interim Consequence Management Guidance for a Wide-Area Biological Attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Raber, Ellen; Kirvel, Robert; MacQueen, Don

    2011-05-17

    The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urbanmore » area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and

  7. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  8. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  9. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  10. Locally acquired Dengue--Key West, Florida, 2009-2010.

    PubMed

    2010-05-21

    Dengue is the most common vector-borne viral disease in the world, causing an estimated 50-100 million infections and 25,000 deaths each year. During 1946-1980, no cases of dengue acquired in the continental United States were reported. Since 1980, a few locally acquired U.S. cases have been confirmed along the Texas-Mexico border, temporally associated with large outbreaks in neighboring Mexican cities. On September 1, 2009, a New York physician notified the Monroe County (Florida) Health Department (MCHD) and the Florida Department of Health (FDOH) of a suspected dengue case in a New York state resident whose only recent travel was to Key West, Florida. CDC confirmed the diagnosis, and a press release was issued to notify the public and Key West physicians of the potential risk for locally acquired dengue infections. In the next 2 weeks, two dengue infections in Key West residents without recent travel were reported and confirmed. Subsequently, enhanced and active surveillance identified 24 more Key West cases during 2009. On April 13, 2010, another Key West dengue case was reported to FDOH, bringing the total to 28. This report describes the first three dengue cases reported in 2009, briefly summarizes the 2010 case, highlights preliminary findings from the ongoing investigation, and outlines measures used to mitigate and control the outbreak. Clinicians should include dengue in the differential diagnosis of acute febrile illnesses in patients who live in or have recently traveled to subtropical areas of the United States or to the tropics.

  11. 24 CFR 576.400 - Area-wide systems coordination requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...): (8) Head Start (45 CFR chapter XIII, subchapter B); (9) Mental Health and Substance Abuse Block..., if any, on the homelessness prevention or rapid re-housing assistance that each program participant... HOUSING AND URBAN DEVELOPMENT COMMUNITY FACILITIES EMERGENCY SOLUTIONS GRANTS PROGRAM Program Requirements...

  12. 24 CFR 576.400 - Area-wide systems coordination requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...): (8) Head Start (45 CFR chapter XIII, subchapter B); (9) Mental Health and Substance Abuse Block..., if any, on the homelessness prevention or rapid re-housing assistance that each program participant... HOUSING AND URBAN DEVELOPMENT COMMUNITY FACILITIES EMERGENCY SOLUTIONS GRANTS PROGRAM Program Requirements...

  13. 24 CFR 576.400 - Area-wide systems coordination requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...): (8) Head Start (45 CFR chapter XIII, subchapter B); (9) Mental Health and Substance Abuse Block..., if any, on the homelessness prevention or rapid re-housing assistance that each program participant... HOUSING AND URBAN DEVELOPMENT COMMUNITY FACILITIES EMERGENCY SOLUTIONS GRANTS PROGRAM Program Requirements...

  14. Leaf-IT: An Android application for measuring leaf area.

    PubMed

    Schrader, Julian; Pillar, Giso; Kreft, Holger

    2017-11-01

    The use of plant functional traits has become increasingly popular in ecological studies because plant functional traits help to understand key ecological processes in plant species and communities. This also includes changes in diversity, inter- and intraspecific interactions, and relationships of species at different spatiotemporal scales. Leaf traits are among the most important traits as they describe key dimensions of a plant's life history strategy. Further, leaf area is a key parameter with relevance for other traits such as specific leaf area, which in turn correlates with leaf chemical composition, photosynthetic rate, leaf longevity, and carbon investment. Measuring leaf area usually involves the use of scanners and commercial software and can be difficult under field conditions. We present Leaf-IT, a new smartphone application for measuring leaf area and other trait-related areas. Leaf-IT is free, designed for scientific purposes, and runs on Android 4 or higher. We tested the precision and accuracy using objects with standardized area and compared the area measurements of real leaves with the well-established, commercial software WinFOLIA using the Altman-Bland method. Area measurements of standardized objects show that Leaf-IT measures area with high accuracy and precision. Area measurements with Leaf-IT of real leaves are comparable to those of WinFOLIA. Leaf-IT is an easy-to-use application running on a wide range of smartphones. That increases the portability and use of Leaf-IT and makes it possible to measure leaf area under field conditions typical for remote locations. Its high accuracy and precision are similar to WinFOLIA. Currently, its main limitation is margin detection of damaged leaves or complex leaf morphologies.

  15. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  16. Monitoring the inputs required to extend and sustain hygiene promotion: findings from the GLAAS 2013/2014 survey.

    PubMed

    Moreland, Leslie D; Gore, Fiona M; Andre, Nathalie; Cairncross, Sandy; Ensink, Jeroen H J

    2016-08-01

    There are significant gaps in information about the inputs required to effectively extend and sustain hygiene promotion activities to improve people's health outcomes through water, sanitation and hygiene (WASH) interventions. We sought to analyse current country and global trends in the use of key inputs required for effective and sustainable implementation of hygiene promotion to help guide hygiene promotion policy and decision-making after 2015. Data collected in response to the GLAAS 2013/2014 survey from 93 countries of 94 were included, and responses were analysed for 12 questions assessing the inputs and enabling environment for hygiene promotion under four thematic areas. Data were included and analysed from 20 External Support Agencies (ESA) of 23 collected through self-administered surveys. Firstly, the data showed a large variation in the way in which hygiene promotion is defined and what constitutes key activities in this area. Secondly, challenges to implement hygiene promotion are considerable: include poor implementation of policies and plans, weak coordination mechanisms, human resource limitations and a lack of available hygiene promotion budget data. Despite the proven benefits of hand washing with soap, a critical hygiene-related factor in minimising infection, GLAAS 2013/2014 survey data showed that hygiene promotion remains a neglected component of WASH. Additional research to identify the context-specific strategies and inputs required to enhance the effectiveness of hygiene promotion at scale are needed. Improved data collection methods are also necessary to advance the availability and reliability of hygiene-specific information. © 2016 John Wiley & Sons Ltd.

  17. Requirements' Role in Mobilizing and Enabling Design Conversation

    NASA Astrophysics Data System (ADS)

    Bergman, Mark

    Requirements play a critical role in a design conversation of systems and products. Product and system design exists at the crossroads of problems, solutions and requirements. Requirements contextualize problems and solutions, pointing the way to feasible outcomes. These are captured with models and detailed specifications. Still, stakeholders need to be able to understand one-another using shared design representations in order to mobilize bias and transform knowledge towards legitimized, desired results. Many modern modeling languages, including UML, as well as detailed, logic-based specifications are beyond the comprehension of key stakeholders. Hence, they inhibit, rather than promote design conversation. Improved design boundary objects (DBO), especially design requirements boundary objects (DRBO), need to be created and refined to improve the communications between principals. Four key features of design boundary objects that improve and promote design conversation are discussed in detail. A systems analysis and design case study is presented which demonstrates these features in action. It describes how a small team of analysts worked with key stakeholders to mobilize and guide a complex system design discussion towards an unexpected, yet desired outcome within a short time frame.

  18. Constructed wetlands and waste stabilization ponds for small rural communities in the United Kingdom: a comparison of land area requirements, performance and costs.

    PubMed

    Mara, D D

    2006-07-01

    Land area requirements for secondary subsurface horizontal-flow constructed wetlands (CW) and primary and secondary facultative ponds with either unaerated or aerated rock filters were determined for three levels of effluent quality: that specified in the Urban Waste Water Treatment Directive (UWWTD) (< or = 25 mg filtered BOD l(-1) and < or = 150 mg SS l(-1) for waste stabilization ponds (WSP) effluents, and < or = 25 mg unfiltered BOD l(-1) for CW effluents (mean values); and two common requirements of the Environment Agency: < or = 40 mg BOD l(-1) and < or = 60 mg SS l(-1), and < or = 10 mg BOD l(-1), < or = 15 mg SS l(-1) and < or = 5 mg ammonia-N l(-1) (95-percentile values). A secondary CW requires 60 percent more land than a secondary facultative pond to produce an UWWTD-quality effluent, 38 percent more land than a secondary facultative pond and an unaerated rock filter to produce a 40/60 effluent and, were it to be used to produce a 10/15/5 effluent, it would require approximately 480 percent more land than a secondary facultative pond and an aerated rock filter. Its estimated 2005 cost is pound 1100-2600 p.e.(-1), whereas that of a primary facultative pond and rock filter is approximately pound 400 p.e.(-1). On the basis of land area requirements, performance and cost, facultative ponds and unaerated or aerated rock filters are to be preferred to secondary subsurface horizontal-flow constructed wetlands.

  19. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    PubMed

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  20. Infusing Stretch Goal Requirements into the Constellation Program

    NASA Technical Reports Server (NTRS)

    Lee, Young H.; Galpin, Roger A.; Ingoldsby, Kevin

    2008-01-01

    In 2004, the Vision for Space Exploration (VSE) was announced by the United States President's Administration in an effort to explore space and to extend a human presence across our solar system. Subsequently, the National Aeronautics and Space Administration (NASA) established the Exploration Systems Mission Directorate (ESMD) to develop a constellation of new capabilities, supporting technologies, and foundational research that allows for the sustained and affordable exploration of space. Then, ESMD specified the primary mission for the Constellation Program to carry out a series of human expeditions, ranging from Low Earth Orbit (LEO) to the surface of Moon, Mars, and beyond for the purposes of conducting human exploration of space. Thus, the Constellation Program was established at the Lyndon B. Johnson Space Center (JSC) to manage the development of the flight and ground infrastructure and systems that can enable continued and extended human access to space. Constellation Program's "Design Objectives" call for an early attention to the program's life cycle costs management through the Program's Need, Goals, and Objectives (NGO) document, which provides the vision, scope, and key areas of focus for the Program. One general policy of the Constellation Program, found in the Constellation Architecture Requirements Document (CARD), states: "A sustainable program hinges on how effectively total life cycle costs are managed. Developmental costs are a key consideration, but total life cycle costs related to the production, processing, and operation of the entire architecture must be accounted for in design decisions sufficiently to ensure future resources are available for ever more ambitious missions into the solar system....It is the intent of the Constellation Program to aggressively manage this aspect of the program using the design policies and simplicity." To respond to the Program's strong desire to manage the program life cycle costs, special efforts were

  1. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  2. Easy Leaf Area: Automated digital image analysis for rapid and accurate measurement of leaf area.

    PubMed

    Easlon, Hsien Ming; Bloom, Arnold J

    2014-07-01

    Measurement of leaf areas from digital photographs has traditionally required significant user input unless backgrounds are carefully masked. Easy Leaf Area was developed to batch process hundreds of Arabidopsis rosette images in minutes, removing background artifacts and saving results to a spreadsheet-ready CSV file. • Easy Leaf Area uses the color ratios of each pixel to distinguish leaves and calibration areas from their background and compares leaf pixel counts to a red calibration area to eliminate the need for camera distance calculations or manual ruler scale measurement that other software methods typically require. Leaf areas estimated by this software from images taken with a camera phone were more accurate than ImageJ estimates from flatbed scanner images. • Easy Leaf Area provides an easy-to-use method for rapid measurement of leaf area and nondestructive estimation of canopy area from digital images.

  3. Sunk cost and work ethic effects reflect suboptimal choice between different work requirements.

    PubMed

    Magalhães, Paula; White, K Geoffrey

    2013-03-01

    We investigated suboptimal choice between different work requirements in pigeons (Columba livia), namely the sunk cost effect, an irrational tendency to persist with an initial investment, despite the availability of a better option. Pigeons chose between two keys, one with a fixed work requirement to food of 20 pecks (left key), and the other with a work requirement to food which varied across conditions (center key). On some trials within each session, such choices were preceded by an investment of 35 pecks on the center key, whereas on others they were not. On choice trials preceded by the investment, the pigeons tended to stay and complete the schedule associated with the center key, even when the number of pecks to obtain reward was greater than for the concurrently available left key. This result indicates that pigeons, like humans, commit the sunk cost effect. With higher work requirements, this preference was extended to trials where there was no initial investment, so an overall preference for the key associated with more work was evident, consistent with the work ethic effect. We conclude that a more general work ethic effect is amplified by the effect of the prior investment, that is, the sunk cost effect. Copyright © 2013 Elsevier B.V. All rights reserved.

  4. Advanced local area network concepts

    NASA Technical Reports Server (NTRS)

    Grant, Terry

    1985-01-01

    Development of a good model of the data traffic requirements for Local Area Networks (LANs) onboard the Space Station is the driving problem in this work. A parameterized workload model is under development. An analysis contract has been started specifically to capture the distributed processing requirements for the Space Station and then to develop a top level model to simulate how various processing scenarios can handle the workload and what data communication patterns result. A summary of the Local Area Network Extendsible Simulator 2 Requirements Specification and excerpts from a grant report on the topological design of fiber optic local area networks with application to Expressnet are given.

  5. Cryptographic Key Management and Critical Risk Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of

  6. Scaling-up HIV responses with key populations in West Africa.

    PubMed

    Wheeler, Tisha; Wolf, R Cameron; Kapesa, Laurent; Cheng Surdo, Alison; Dallabetta, Gina

    2015-03-01

    Despite decades of HIV responses in pockets of West and Central Africa (WCA), the HIV response with key populations remains an understudied area. Recently, there has been a proliferation of studies highlighting epidemiologic and behavioral data that challenge attitudes of complacency among donors and country governments uncomfortable in addressing key populations. The articles in this series highlight new studies that provide a better understanding of the epidemiologic and structural burden facing key populations in the WCA region and how to improve responses through more effective targeting. Key populations face pervasive structural barriers including institutional and sexual violence and an intersection of stigma, criminalization, and marginalization as sexual minorities. Despite decades of smaller interventions that have shown the importance of integrated services for key populations, there remains incongruent provision of outreach or testing or family planning pointing to sustained risk. There remains an incongruent resource provision for key populations where they shoulder the burden of HIV and their access to services alone could turn around HIV epidemics within the region. These proximal and distal determinants must be addressed in regional efforts, led by the community, and resourced for scale, targeting those most at risk for the acquisition and transmission of HIV. This special issue builds the knowledge base for the region focusing on interventions that remove barriers to service access including treatment uptake for those living with HIV. Better analysis and use of data for strategic planning are shown to lead to more effective targeting of prevention, care, and HIV treatment programs with key populations. These articles further demonstrate the immediate need for comprehensive action to address HIV among key populations throughout the WCA region.

  7. Postfire logging in riparian areas.

    PubMed

    Reeves, Gordon H; Bisson, Peter A; Rieman, Bruce E; Benda, Lee E

    2006-08-01

    We reviewed the behavior of wildfire in riparian zones, primarily in the western United States, and the potential ecological consequences of postfire logging. Fire behavior in riparian zones is complex, but many aquatic and riparian organisms exhibit a suite of adaptations that allow relatively rapid recovery after fire. Unless constrained by other factors, fish tend to rebound relatively quickly, usually within a decade after a wildfire. Additionally, fire and subsequent erosion events contribute wood and coarse sediment that can create and maintain productive aquatic habitats over time. The potential effects of postfire logging in riparian areas depend on the landscape context and disturbance history of a site; however available evidence suggests two key management implications: (1) fire in riparian areas creates conditions that may not require intervention to sustain the long-term productivity of the aquatic network and (2) protection of burned riparian areas gives priority to what is left rather than what is removed. Research is needed to determine how postfire logging in riparian areas has affected the spread of invasive species and the vulnerability of upland forests to insect and disease outbreaks and how postfire logging will affect the frequency and behavior of future fires. The effectiveness of using postfire logging to restore desired riparian structure and function is therefore unproven, but such projects are gaining interest with the departure of forest conditions from those that existed prior to timber harvest, fire suppression, and climate change. In the absence of reliable information about the potential consequence of postfire timber harvest, we conclude that providing postfire riparian zones with the same environmental protections they received before they burned isjustified ecologically Without a commitment to monitor management experiments, the effects of postfire riparian logging will remain unknown and highly contentious.

  8. Ares Knowledge Capture: Summary and Key Themes Presentation

    NASA Technical Reports Server (NTRS)

    Coates, Ralph H.

    2011-01-01

    This report has been developed by the National Aeronautics and Space Administration (NASA) Human Exploration and Operations Mission Directorate (HEOMD) Risk Management team in close coordination with the MSFC Chief Engineers Office. This document provides a point-in-time, cumulative, summary of actionable key lessons learned derived from the design project. Lessons learned invariably address challenges and risks and the way in which these areas have been addressed. Accordingly the risk management thread is woven throughout the document.

  9. Key success factors of health research centers: A mixed method study.

    PubMed

    Tofighi, Shahram; Teymourzadeh, Ehsan; Heydari, Majid

    2017-08-01

    In order to achieve success in future goals and activities, health research centers are required to identify their key success factors. This study aimed to extract and rank the factors affecting the success of research centers at one of the medical universities in Iran. This study is a mixed method (qualitative-quantitative) study, which was conducted between May to October in 2016. The study setting was 22 health research centers. In qualitative phase, we extracted the factors affecting the success in research centers through purposeful interviews with 10 experts of centers, and classified them into themes and sub-themes. In the quantitative phase, we prepared a questionnaire and scored and ranked the factors recognized by 54 of the study samples by Friedman test. Nine themes and 42 sub-themes were identified. Themes included: strategic orientation, management, human capital, support, projects, infrastructure, communications and collaboration, paradigm and innovation and they were rated respectively as components of success in research centers. Among the 42 identified factors, 10 factors were ranked respectively as the key factors of success, and included: science and technology road map, strategic plan, evaluation indexes, committed human resources, scientific evaluation of members and centers, innovation in research and implementation, financial support, capable researchers, equipment infrastructure and teamwork. According to the results, the strategic orientation was the most important component in the success of research centers. Therefore, managers and authorities of research centers should pay more attention to strategic areas in future planning, including the science and technology road map and strategic plan.

  10. Key success factors of health research centers: A mixed method study

    PubMed Central

    Tofighi, Shahram; Teymourzadeh, Ehsan; Heydari, Majid

    2017-01-01

    Background In order to achieve success in future goals and activities, health research centers are required to identify their key success factors. Objective This study aimed to extract and rank the factors affecting the success of research centers at one of the medical universities in Iran. Methods This study is a mixed method (qualitative-quantitative) study, which was conducted between May to October in 2016. The study setting was 22 health research centers. In qualitative phase, we extracted the factors affecting the success in research centers through purposeful interviews with 10 experts of centers, and classified them into themes and sub-themes. In the quantitative phase, we prepared a questionnaire and scored and ranked the factors recognized by 54 of the study samples by Friedman test. Results Nine themes and 42 sub-themes were identified. Themes included: strategic orientation, management, human capital, support, projects, infrastructure, communications and collaboration, paradigm and innovation and they were rated respectively as components of success in research centers. Among the 42 identified factors, 10 factors were ranked respectively as the key factors of success, and included: science and technology road map, strategic plan, evaluation indexes, committed human resources, scientific evaluation of members and centers, innovation in research and implementation, financial support, capable researchers, equipment infrastructure and teamwork. Conclusion According to the results, the strategic orientation was the most important component in the success of research centers. Therefore, managers and authorities of research centers should pay more attention to strategic areas in future planning, including the science and technology road map and strategic plan. PMID:28979733

  11. A more secure parallel keyed hash function based on chaotic neural network

    NASA Astrophysics Data System (ADS)

    Huang, Zhongquan

    2011-08-01

    Although various hash functions based on chaos or chaotic neural network were proposed, most of them can not work efficiently in parallel computing environment. Recently, an algorithm for parallel keyed hash function construction based on chaotic neural network was proposed [13]. However, there is a strict limitation in this scheme that its secret keys must be nonce numbers. In other words, if the keys are used more than once in this scheme, there will be some potential security flaw. In this paper, we analyze the cause of vulnerability of the original one in detail, and then propose the corresponding enhancement measures, which can remove the limitation on the secret keys. Theoretical analysis and computer simulation indicate that the modified hash function is more secure and practical than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function, such as good statistical properties, high message and key sensitivity, and strong collision resistance, etc.

  12. Two Key Strategies for Teaching Prevention: Specialized Course and Infusion

    ERIC Educational Resources Information Center

    Conyne, Robert K.; Newmeyer, Mark D.; Kenny, Maureen; Romano, John L.; Matthews, Constance R.

    2008-01-01

    Prevention is taught only rarely in counseling and counseling psychology curricula. Failure to teach it suggests that graduates may be less likely to conduct prevention. In this article, we describe two key strategies for addressing this problem, where prevention is being taught through (a) required courses, and (b) infusion within existing…

  13. Implications of Key Performance Indicator Issues in Ontario Universities Explored

    ERIC Educational Resources Information Center

    Chan, Vivian

    2015-01-01

    Since 1998, the Ministry of Training, Colleges and Universities in Ontario, Canada, has required that data on specific key performance indicators (KPIs) be made public by its publicly funded universities. The information is intended to be used by universities to demonstrate their achievements, to improve their programmes and services, and to…

  14. Determination of Habitat Requirements For Birds in Suburban Areas

    Treesearch

    Jack Ward Thomas; Richard M. DeGraaf; Joseph C. Mawson

    1977-01-01

    Songbird populations can be related to habitat components by a method that allows the simultaneous determination of habitat requirements for a variety of species . Through correlation and multiple-regression analyses, 10 bird species were studied in a suburban habitat, which was stratified according to human density. Variables used to account for bird distribution...

  15. Introduction strategies raise key questions.

    PubMed

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  16. [Key content and formulation of national Chinese materia medica resources survey at county level].

    PubMed

    Lu, Jian-Wei; Zhang, Xiao-Bo; Li, Hai-Tao; Guo, Lan-Ping; Zhao, Run-Huai; Zhang, Ben-Gang; Sun, Li-Ying; Huang, Lu-Qi

    2013-08-01

    According to National Census for Water, National Population Census, National Land and Resources Survey, and work experience of experimental measures for national Chinese materia medica resources(CMMR) survey,the national CMMR survey at the county level is the key point of whole survey, that includes organization and management, field survey, sorting data three key links. Organization and management works of national CMMR survey needs to finish four key contents, there are definite goals and tasks, practicable crew, preparation directory, and security assurance. Field survey works of the national CMMR survey needs to finish five key contents, there are preparation works for field survey, the choice of the key survey area (samples), fill in the questionnaire, video data collection, specimen and other physical collection. Sorting data works of the national CMMR survey needs to finish tree key contents, there are data, specimen and census results.

  17. Chemical thermodynamic data. 1. The concept of links to the chemical elements and the historical development of key thermodynamic data

    NASA Astrophysics Data System (ADS)

    Wolery, Thomas J.; Jové Colón, Carlos F.

    2017-09-01

    Chemical thermodynamic data remain a keystone for geochemical modeling and reactive transport simulation as applied to an increasing number of applications in the earth sciences, as well as applications in other areas including metallurgy, material science, and industrial process design. The last century has seen the development of a large body of thermodynamic data and a number of major compilations. The past several decades have seen the development of thermodynamic databases in digital form designed to support computer calculations. However, problems with thermodynamic data appear to be persistent. One problem pertains to the use of inconsistent primary key reference data. Such data pertain to elemental reference forms and key, stoichiometrically simple chemical species including metal oxides, CO2, water, and aqueous species such as Na+ and Cl-. A consistent set of primary key data (standard Gibbs energies, standard enthalpies, and standard entropies for key chemical species) for 298.15 K and 1 bar pressure is essential. Thermochemical convention is to define the standard Gibbs energy and the standard enthalpy of an individual chemical species in terms of formation from reference forms of the constituent chemical elements. We propose a formal concept of "links" to the elemental reference forms. This concept involves a documented understanding of all reactions and calculations leading to values for a formation property (standard Gibbs energy or enthalpy). A valid link consists of two parts: (a) the path of reactions and corrections and (b) the associated data, which are key data. Such a link differs from a bare "key" or "reference" datum in that it requires additional information. Some or all of its associated data may also be key data. In evaluating a reported thermodynamic datum, one should identify the links to the chemical elements, a process which can be time-consuming and which may lead to a dead end (an incomplete link). The use of two or more inconsistent

  18. The requirements for implementing Sustainable Development Goals (SDGs) and for planning and implementing Integrated Territorial Investments (ITI) in mining areas

    NASA Astrophysics Data System (ADS)

    Florkowska, Lucyna; Bryt-Nitarska, Izabela

    2018-04-01

    The notion of Integrated Territorial Investments (ITI) appears more and more frequently in contemporary regional development strategies. Formulating the main assumptions of ITI is a response to a growing need for a co-ordinated, multi-dimensional regional development suitable for the characteristics of a given area. Activities are mainly aimed at improving people's quality of life with their significant participation. These activities include implementing the Sustainable development Goals (SDGs). Territorial investments include, among others, projects in areas where land and building use is governed not only by general regulations (Spatial Planning and Land Development Act) but also by separate legal acts. This issue also concerns areas with active mines and post-mining areas undergoing revitalization. For the areas specified above land development and in particular making building investments is subject to the requirements set forth in the Geological and Mining Law and in the general regulations. In practice this means that factors connected with the present and future mining impacts must be taken into consideration in planning the investment process. This article discusses the role of proper assessment of local geological conditions as well as the current and future mining situation in the context of proper planning and performance of the Integrated Territorial Investment programme and also in the context of implementing the SDGs. It also describes the technical and legislative factors which need to be taken into consideration in areas where mining is planned or where it took place in the past.

  19. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    PubMed

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  20. Projections of change in key ecosystem indicators for planning and management of marine protected areas: An example study for European seas

    NASA Astrophysics Data System (ADS)

    Kay, Susan; Butenschön, Momme

    2018-02-01

    Marine Protected Areas (MPAs) are widely used as tools to maintain biodiversity, protect habitats and ensure that development is sustainable. If MPAs are to maintain their role into the future it is important for managers to understand how conditions at these sites may change as a result of climate change and other drivers, and this understanding needs to extend beyond temperature to a range of key ecosystem indicators. This case study demonstrates how spatially-aggregated model results for multiple variables can provide useful projections for MPA planners and managers. Conditions in European MPAs have been projected for the 2040s using unmitigated and globally managed scenarios of climate change and river management, and hence high and low emissions of greenhouse gases and riverborne nutrients. The results highlight the vulnerability of potential refuge sites in the north-west Mediterranean and the need for careful monitoring at MPAs to the north and west of the British Isles, which may be affected by changes in Atlantic circulation patterns. The projections also support the need for more MPAs in the eastern Mediterranean and Adriatic Sea, and can inform the selection of sites.

  1. Key issues concerning environmental enrichment for laboratory-held fish species.

    PubMed

    Williams, T D; Readman, G D; Owen, S F

    2009-04-01

    An improved knowledge and understanding of the fundamental biological requirements is needed for many of the species of fish held in captivity and, without this knowledge it is difficult to determine the optimal conditions for laboratory culture. The aim of this paper is to review the key issues concerning environmental enrichment for laboratory-held fish species and identify where improvements are required. It provides background information on environmental enrichment, describes enrichment techniques currently used in aquatic ecotoxicology studies, identifies potential restrictions in their use and discusses why more detailed and species-specific guidance is needed.

  2. Protein requirements for long term missions

    NASA Astrophysics Data System (ADS)

    Stein, T. P.

    1994-11-01

    A key component of the diet for a space mission is protein. This first part of this paper reviews the reasons for emphasizing protein nutrition and then discusses what the requirements are likely to be. The second part discusses potential advantages of modifying these requirements and describes potential approaches to effecting these modifications based on well established ground based models.

  3. Protein requirements for long term missions

    NASA Technical Reports Server (NTRS)

    Stein, T. P.

    1994-01-01

    A key component of the diet for a space mission is protein. This first part of this paper reviews the reasons for emphasizing protein nurtition and then discusses what the requirements are likely to be. The second part discusses potential advantages of modifying these requirements and describes potential potential approaches to effecting these modificatons based on well established ground based models.

  4. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  5. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  6. From microporous regular frameworks to mesoporous materials with ultrahigh surface area: dynamic reorganization of porous polymer networks.

    PubMed

    Kuhn, Pierre; Forget, Aurélien; Su, Dangsheng; Thomas, Arne; Antonietti, Markus

    2008-10-08

    High surface area organic materials featuring both micro- and mesopores were synthesized under ionothermal conditions via the formation of polyaryltriazine networks. While the polytrimerization of nitriles in zinc chloride at 400 degrees C produces microporous polymers, higher reaction temperatures induce the formation of additional spherical mesopores with a narrow dispersity. The nitrogen-rich carbonaceous polymer materials thus obtained present surface areas and porosities up to 3300 m(2) g(-1) and 2.4 cm(3) g(-1), respectively. The key point of this synthesis relies on the occurrence of several high temperature polymerization reactions, where irreversible carbonization reactions coupled with the reversible trimerization of nitriles allow the reorganization of the dynamic triazine network. The ZnCl2 molten salt fulfills the requirement of a high temperature solvent, but is also required as catalyst. Thus, this dynamic polymerization system provides not only highly micro- and mesoporous materials, but also allows controlling the pore structure in amorphous organic materials.

  7. Facilitating telemedicine project sustainability in medically underserved areas: a healthcare provider participant perspective.

    PubMed

    Paul, David L; McDaniel, Reuben R

    2016-04-26

    Very few telemedicine projects in medically underserved areas have been sustained over time. This research furthers understanding of telemedicine service sustainability by examining teleconsultation projects from the perspective of healthcare providers. Drivers influencing healthcare providers' continued participation in teleconsultation projects and how projects can be designed to effectively and efficiently address these drivers is examined. Case studies of fourteen teleconsultation projects that were part of two health sciences center (HSC) based telemedicine networks was utilized. Semi-structured interviews of 60 key informants (clinicians, administrators, and IT professionals) involved in teleconsultation projects were the primary data collection method. Two key drivers influenced providers' continued participation. First was severe time constraints. Second was remote site healthcare providers' (RSHCPs) sense of professional isolation. Two design steps to address these were identified. One involved implementing relatively simple technology and process solutions to make participation convenient. The more critical and difficult design step focused on designing teleconsultation projects for collaborative, active learning. This learning empowered participating RSHCPs by leveraging HSC specialists' expertise. In order to increase sustainability the fundamental purpose of teleconsultation projects needs to be re-conceptualized. Doing so requires HSC specialists and RSHCPs to assume new roles and highlights the importance of trust. By implementing these design steps, healthcare delivery in medically underserved areas can be positively impacted.

  8. Polarization variations in installed fibers and their influence on quantum key distribution systems.

    PubMed

    Ding, Yu-Yang; Chen, Hua; Wang, Shuang; He, De-Yong; Yin, Zhen-Qiang; Chen, Wei; Zhou, Zheng; Guo, Guang-Can; Han, Zheng-Fu

    2017-10-30

    Polarization variations in the installed fibers are complex and volatile, and would severely affect the performances of polarization-sensitive quantum key distribution (QKD) systems. Based on the recorded data about polarization variations of different installed fibers, we establish an analytical methodology to quantitatively evaluate the influence of polarization variations on polarization-sensitive QKD systems. Using the increased quantum bit error rate induced by polarization variations as a key criteria, we propose two parameters - polarization drift time and required tracking speed - to characterize polarization variations. For field buried and aerial fibers with different length, we quantitatively evaluate the influence of polarization variations, and also provide requirements and suggestions for polarization basis alignment modules of QKD systems deployed in different kind of fibers.

  9. Future Spacelift Requirements Study

    NASA Technical Reports Server (NTRS)

    1997-01-01

    This study addresses future space applications and the derived requirements these potential applications will have on future spacelift systems. This NASA sponsored activity is a comprehensive study of potential missions including those of the military, civil, and commercial users. The study objectively evaluated the key architectural requirements for future launch systems. The results of this study are technical, economic, and policy analyses of future spacelift systems. It is intended to assist NASA and DOD decision-makers in planning technical investments and establishing policy for future U.S. spacelift systems.

  10. Japan-Specific Key Regulatory Aspects for Development of New Biopharmaceutical Drug Products.

    PubMed

    Desai, Kashappa Goud; Obayashi, Hirokazu; Colandene, James D; Nesta, Douglas P

    2018-03-28

    Japan represents the third largest pharmaceutical market in the world. Developing a new biopharmaceutical drug product for the Japanese market is a top business priority for global pharmaceutical companies while aligning with ethical drivers to treat more patients in need. Understanding Japan-specific key regulatory requirements is essential to achieve successful approvals. Understanding the full context of Japan-specific regulatory requirements/expectations is challenging to global pharmaceutical companies due to differences in language and culture. This article summarizes key Japan-specific regulatory aspects/requirements/expectations applicable to new drug development, approval, and postapproval phases. Formulation excipients should meet Japan compendial requirements with respect to the type of excipient, excipient grade, and excipient concentration. Preclinical safety assessments needed to support clinical phases I, II, and III development are summarized. Japanese regulatory authorities have taken appropriate steps to consider foreign clinical data, thereby enabling accelerated drug development and approval in Japan. Other important topics summarized in this article include: Japan new drug application-specific bracketing strategies for critical and noncritical aspects of the manufacturing process, regulatory requirements related to stability studies, release specifications and testing methods, standard processes involved in pre and postapproval inspections, management of postapproval changes, and Japan regulatory authority's consultation services available to global pharmaceutical companies. Copyright © 2018 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  11. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  12. Nine new species of Itaplectops (Diptera: Tachinidae) reared from caterpillars in Area de Conservación Guanacaste, northwestern Costa Rica, with a key to Itaplectops species

    PubMed Central

    Wood, D. Monty; Smith, M. Alex; Janzen, Daniel H.; Hallwachs, Winnie

    2015-01-01

    Abstract Nine new species of Itaplectops Townsend (Diptera: Tachinidae) are described from Area de Conservación Guanacaste (ACG), northwestern Costa Rica. All specimens have been reared from ­various species of ACG caterpillars in the families Limacodidae and Dalceridae. By combining morphological, photographic, and genetic barcode data we provide clear yet concise descriptions. The following nine new species are described in the genus Itaplectops: Itaplectops akselpalolai, Itaplectops anikenpalolae, Itaplectops argentifrons, Itaplectops aurifrons, Itaplectops ericpalolai, Itaplectops griseobasis, Itaplectops omissus, Itaplectops shellymcsweeneyae, Itaplectops tristanpalolai. We move Itaplectops to the tribe Uramyini from its original placement within the Blondeliini, and we discuss its systematic placement. We also provide a key differentiating the, genera of the tribe Uramyini as well as the known species of Itaplectops. PMID:26752964

  13. Requirements and Markets for Nanoelectronics

    NASA Astrophysics Data System (ADS)

    Hoefflinger, Bernd

    The semiconductor market grew 2010 by 70Bio. against 2009, more than in the previous 9 years taken together, and the semiconductor industry launched the biggest investment program in its history with 100Bio. over a 2-year period. This was the overture to a decade with great potential and great challenges. We look at the market segments and the required electronic functions, and we highlight four product and service areas: Approaching 6 Billion mobile-phone subscribers Access to education for any child One Carebot (personal robot) per family Efficient and safe personal mobility. At the level of over four billion active mobile phones 2010, it is clear that mobile electronic companions have become the drivers of nanoelectronic innovations with growth only limited by the creation and support of new, attractive features and services. Energy, bandwidth, size and weight requirements of these consumer products provide the largest pressure for System-on-Chip (SoC) architectures. Other exemplary new products are selected for their significance, some for their lengthy path into the market. Health care is such an example: The non-invasive glucose sensor and the portable ECG recorder" with automatic, neuroprocessor-driven event detection in the size of a quarter would serve hundreds of millions of people. Nanoelectronics for self-guided health is an area of public policy in view of the cost of "a posteriori" medical care. Access to information and education for any child/student will be provided by 1 tablets where service contracts and the spin-offs from surfing and cloud-computing will generate the revenue. Personal robots, coined by the ageing Japanese nation as the key product after the PC and ridiculed by others, will arrive as carebots for education, entertainment, rehabilitation, and home-service, accepted as a large-scale need by 2020 in most developed countries including China. Accident prevention systems on rail and road already would make millions of units per year

  14. Special Education Law: Illustrative Basics and Nuances of Key IDEA Components

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2015-01-01

    Intended as professional development for both new and experienced special educators, this article provides both the basic requirements and nuanced issues for foundational, successive, and overlapping key components under the Individuals With Disabilities Education Act (IDEA): (a) child find, (b) eligibility, and (c) free appropriate public…

  15. The Validity of Two Education Requirement Measures

    ERIC Educational Resources Information Center

    van der Meer, Peter H.

    2006-01-01

    In this paper we investigate the validity of two education requirement measures. This is important because a key part of the ongoing discussion concerning overeducation is about measurement. Thanks to the Dutch Institute for Labour Studies, we have been given a unique opportunity to compare two education requirement measures: first, Huijgen's…

  16. Care initiation area yields dramatic results.

    PubMed

    2009-03-01

    The ED at Gaston Memorial Hospital in Gastonia, NC, has achieved dramatic results in key department metrics with a Care Initiation Area (CIA) and a physician in triage. Here's how the ED arrived at this winning solution: Leadership was trained in and implemented the Kaizen method, which eliminates redundant or inefficient process steps. Simulation software helped determine additional space needed by analyzing arrival patterns and other key data. After only two days of meetings, new ideas were implemented and tested.

  17. Error-correcting pairs for a public-key cryptosystem

    NASA Astrophysics Data System (ADS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-06-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.

  18. Roadmap for Educator Licensure Policy Addressing Data Literacy: Key Focus Areas to Ensure Quality. Data for Action

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2014

    2014-01-01

    State licensure polices are meant to provide teacher preparation programs with direction about the skills teachers need to be qualified to teach, including skills to use data. This roadmap discusses the 10 key data use skills that states can include in a licensure policy with a quality focus on effective data use.

  19. The national strategy for the physical protection of critical infrastructures and key assets

    DOT National Transportation Integrated Search

    2003-02-01

    This document defines the road ahead for a core mission area identified in the President's National Strategy for Homeland Security-reducing the Nation's vulnerability to acts of terrorism by protecting our critical infrastructures and key assets from...

  20. Guiding Requirements for Designing Life Support System Architectures for Crewed Exploration Missions Beyond Low-Earth Orbit

    NASA Technical Reports Server (NTRS)

    Perry, Jay L.; Sargusingh, Miriam J.; Toomarian, Nikzad

    2016-01-01

    The National Aeronautics and Space Administration's (NASA) technology development roadmaps provide guidance to focus technological development in areas that enable crewed exploration missions beyond low-Earth orbit. Specifically, the technology area roadmap on human health, life support and habitation systems describes the need for life support system (LSS) technologies that can improve reliability and in-flight maintainability within a minimally-sized package while enabling a high degree of mission autonomy. To address the needs outlined by the guiding technology area roadmap, NASA's Advanced Exploration Systems (AES) Program has commissioned the Life Support Systems (LSS) Project to lead technology development in the areas of water recovery and management, atmosphere revitalization, and environmental monitoring. A notional exploration LSS architecture derived from the International Space has been developed and serves as the developmental basis for these efforts. Functional requirements and key performance parameters that guide the exploration LSS technology development efforts are presented and discussed. Areas where LSS flight operations aboard the ISS afford lessons learned that are relevant to exploration missions are highlighted.

  1. [Key to chironomid pupal exuviae (Diptera: Chironomidae) of tropical high Andean streams].

    PubMed

    Pratt, Narcís; González-Trujillo, Juan David; Ospina-Torres, Rodulfo

    2014-12-01

    The Chironomidae is a cosmopolitan family of Nematoceran flies with more than 20,000 species described. However the diversity of genera and species of the family in the Andean region beyond the 2,000 m.a.s.l are scarcely known. We conducted faunal surveys and biomonitoring research in different streams of Colombia, Ecuador and Peru from May 2005 to October 2011. Based on specimens collections, a taxonomic key was developed to identify pupae and pupal exuviae of 46 genera of midges (Diptera, Chironomidae) collected from streams at high altitude areas on the Andean tropical mountains. We included illustrations and brief taxonomic descriptions for all genera, of which several ones have not yet been formally described; in this latter case we used the nomenclature of Roback & Coffman (1983). For two genera, Cricotopus and Genus 1, keys to the most com- mon morphospecies were provided. Results showed that in this area the chironomid assemblages are dominated by the members of the subfamily Orthocladiinae (22 genera) followed by the Chironominae (13). Six genera of Tanypodinae were identified, while only three and two genera were present from subfamilies Podonominae and Diamesinae. This key may be very useful for both studies about drift in streams, and for biomonitoring purposes.

  2. E-Area Vault Concrete Material Property And Vault Durability/Degradation Projection Recommendations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phifer, M. A.

    2014-03-11

    Subsequent to the 2008 E-Area Low-Level Waste Facility (ELLWF) Performance Assessment (PA) (WSRC 2008), two additional E-Area vault concrete property testing programs have been conducted (Dixon and Phifer 2010 and SIMCO 2011a) and two additional E-Area vault concrete durability modeling projections have been made (Langton 2009 and SIMCO 2012). All the information/data from these reports has been evaluated and consolidated herein by the Savannah River National Laboratory (SRNL) at the request of Solid Waste Management (SWM) to produce E-Area vault concrete hydraulic and physical property data and vault durability/degradation projection recommendations that are adequately justified for use within associated Specialmore » Analyses (SAs) and future PA updates. The Low Activity Waste (LAW) and Intermediate Level (IL) Vaults structural degradation predictions produced by Carey 2006 and Peregoy 2006, respectively, which were used as the basis for the 2008 ELLWF PA, remain valid based upon the results of the E-Area vault concrete durability simulations reported by Langton 2009 and those reported by SIMCO 2012. Therefore revised structural degradation predictions are not required so long as the mean thickness of the closure cap overlying the vaults is no greater than that assumed within Carey 2006 and Peregoy 2006. For the LAW Vault structural degradation prediction (Carey 2006), the mean thickness of the overlying closure cap was taken as nine feet. For the IL Vault structural degradation prediction (Peregoy 2006), the mean thickness of the overlying closure cap was taken as eight feet. The mean closure cap thicknesses as described here for both E-Area Vaults will be included as a key input and assumption (I&A) in the next revision to the closure plan for the ELLWF (Phifer et al. 2009). In addition, it has been identified as new input to the PA model to be assessed in the ongoing update to the new PA Information UDQE (Flach 2013). Once the UDQE is approved, the SWM Key I

  3. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  4. The maintenance of key biodiversity attributes through ecosystem restoration operations

    Treesearch

    Robert W. Gray; Bruce A. Blackwell

    2008-01-01

    The requirement to manage for key biodiversity attributes in dry forest ecosystems is mandated in the Forest Practices Code Act of British Columbia. These attributes include snags, large old trees, and large organic debris. In the Squamish Forest District dry forest restoration activities center on the use of thinning operations followed by prescribed fire to restore...

  5. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  6. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    PubMed

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  7. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    PubMed Central

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280

  8. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  9. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  10. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  11. Learner Agency: A Dynamic Element of the New Zealand Key Competencies

    ERIC Educational Resources Information Center

    Charteris, Jennifer

    2013-01-01

    Seven years ago The New Zealand Curriculum (NZC) was launched with its emphasis on key competencies as "the capabilities that young people need for growing, working, and participating in their communities" ("Ministry of Education," 2007, p. 38). This raises the question of what dispositions are required for students to…

  12. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  13. Writing testable software requirements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knirk, D.

    1997-11-01

    This tutorial identifies common problems in analyzing requirements in the problem and constructing a written specification of what the software is to do. It deals with two main problem areas: identifying and describing problem requirements, and analyzing and describing behavior specifications.

  14. Predicting materials for sustainable energy sources: The key role of density functional theory

    NASA Astrophysics Data System (ADS)

    Galli, Giulia

    Climate change and the related need for sustainable energy sources replacing fossil fuels are pressing societal problems. The development of advanced materials is widely recognized as one of the key elements for new technologies that are required to achieve a sustainable environment and provide clean and adequate energy for our planet. We discuss the key role played by Density Functional Theory, and its implementations in high performance computer codes, in understanding, predicting and designing materials for energy applications.

  15. Design test request No. 1263 K Reactor graphite key and VSR channel sleeve test

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kempf, F.J.

    1964-12-10

    The objectives of this test were: (1) Determine the coefficient of friction between two adjacent layers of K Reactor graphite at room temperature. (2) Determine the average load required to cause failure of an unirradiated K Reactor side reflector bar, when subjected to tensile loading applied through the reflector keys. (3) Determine the average load at failure and the average deflection at failure of a single VSR channel key when loaded in keyways with clearances equal to those used in original stack construction. (4) Determine the average load and deflection required to break the four K Reactor VSR keys whenmore » loaded simultaneously in both `3-layer` and `7-layer` mockups. Also determine the mode of key failure; i.e., shear, flexure or combined compression and bending. Following these key rupture tests, determine the strength and deflection characteristics of the proposed K Reactor VSR channel sleeve when loaded in a manner identical to that used to fracture the keys. (5) Determine the average load and deflection at failure of both the proposed K Reactor VSR channel sleeves and the proposed C Reactor sleeves when subjected to crushing loads. (6) Determine the extent of damage to the proposed K Reactor VSR channel sleeve when subjected to the following vertical rod loading conditions. (a) Full rod drop in a channel mockup which has been misaligned 2 1/2 inches. (b) Full rod drop in a channel which has been misaligned an amount equal to the maximum flexibility of a `universal` VSR.« less

  16. The Key Technologies. Some Implications for Education and Training. An Occasional Paper.

    ERIC Educational Resources Information Center

    Mansell, Jack; And Others

    National competitiveness depends in large part on the practical application of technologies. Educational planners must, therefore, identify key (newly emerging) topics in science and engineering that are likely to have a major evolutionary effect on industry and incorporate these areas into existing vocational and technical curricula. Because…

  17. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  18. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  19. Key Planning Factors for Recovery from a Biological Terrorism Incident

    DTIC Science & Technology

    2012-08-30

    Goals, this document identifies key technical planning areas that may be used to inform subsequent FEMA response and recovery guidance documents. The...expressed herein do not necessarily state or reflect those of their respective organizations or the US Government. The modeling and analysis provided by...responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would

  20. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.