Sample records for key examples include

  1. Confronting Space Debris: Strategies and Warnings from Comparable Examples Including Deepwater Horizon

    DTIC Science & Technology

    2010-01-01

    Horizon (DH) was an ultra deepwater , semisubmers- ible offshore drilling rig contracted to BP by its owner, Transocean. The rig was capable of...Warnings from Comparable Examples Including Deepwater Horizon 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...research quality and objectivity. StrategieS and WarningS from Comparable exampleS inCluding deepWater Horizon Confronting SpaCe DebriS dave baiocchi

  2. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  3. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  4. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  5. Seven Keys to Successful Study.

    ERIC Educational Resources Information Center

    Edwards, Peter

    Written for secondary, technical, and technical and further education (TAFE) students, this book aims to make learning easier and more enjoyable by showing students how to use a series of basic study skills called "keys." The book offers an explanation, examples, graphic illustrations, and activities for each skill. Chapters include: (1)…

  6. IARC use of oxidative stress as key mode of action characteristic for facilitating cancer classification: Glyphosate case example illustrating a lack of robustness in interpretative implementation.

    PubMed

    Bus, James S

    2017-06-01

    The International Agency for Research on Cancer (IARC) has formulated 10 key characteristics of human carcinogens to incorporate mechanistic data into cancer hazard classifications. The analysis used glyphosate as a case example to examine the robustness of IARC's determination of oxidative stress as "strong" evidence supporting a plausible cancer mechanism in humans. The IARC analysis primarily relied on 14 human/mammalian studies; 19 non-mammalian studies were uninformative of human cancer given the broad spectrum of test species and extensive use of formulations and aquatic testing. The mammalian studies had substantial experimental limitations for informing cancer mechanism including use of: single doses and time points; cytotoxic/toxic test doses; tissues not identified as potential cancer targets; glyphosate formulations or mixtures; technically limited oxidative stress biomarkers. The doses were many orders of magnitude higher than human exposures determined in human biomonitoring studies. The glyphosate case example reveals that the IARC evaluation fell substantially short of "strong" supporting evidence of oxidative stress as a plausible human cancer mechanism, and suggests that other IARC monographs relying on the 10 key characteristics approach should be similarly examined for a lack of robust data integration fundamental to reasonable mode of action evaluations. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  8. Strategies of Educational Decentralization: Key Questions and Core Issues.

    ERIC Educational Resources Information Center

    Hanson, E. Mark

    1998-01-01

    Explains key issues and forces that shape organization and management strategies of educational decentralization, using examples from Colombia, Venezuela, Argentina, Nicaragua, and Spain. Core decentralization issues include national and regional goals, planning, political stress, resource distribution, infrastructure development, and job…

  9. Multiple Paths to Mathematics Practice in Al-Kashi's Key to Arithmetic

    NASA Astrophysics Data System (ADS)

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his Key to Arithmetic, a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life and his contributions to mathematics and astronomy. Section 2 starts with a brief discussion of the contents and pedagogy of the Key to Arithmetic. Al-Kashi's multiple approaches are discussed through four different examples of his versatility in presenting a topic from multiple perspectives. These examples are multiple definitions, multiple algorithms, multiple formulas, and multiple methods for solving word problems. Section 3 is devoted to some benefits that can be gained by implementing al-Kashi's multiple paths approach in modern curricula. For this discussion, examples from two teaching modules taken from the Key to Arithmetic and implemented in Pre-Calculus and mathematics courses for preservice teachers are discussed. Also, the conclusions are supported by some aspects of these modules. This paper is an attempt to help mathematics educators explore more benefits from reading from original sources.

  10. Screening tests: a review with examples

    PubMed Central

    Niebo, Ron; Utell, Mark J.

    2014-01-01

    Screening tests are widely used in medicine to assess the likelihood that members of a defined population have a particular disease. This article presents an overview of such tests including the definitions of key technical (sensitivity and specificity) and population characteristics necessary to assess the benefits and limitations of such tests. Several examples are used to illustrate calculations, including the characteristics of low dose computed tomography as a lung cancer screen, choice of an optimal PSA cutoff and selection of the population to undergo mammography. The importance of careful consideration of the consequences of both false positives and negatives is highlighted. Receiver operating characteristic curves are explained as is the need to carefully select the population group to be tested. PMID:25264934

  11. Key concepts relevant to quality of complex and shared decision-making in health care: a literature review.

    PubMed

    Dy, Sydney M; Purnell, Tanjala S

    2012-02-01

    High-quality provider-patient decision-making is key to quality care for complex conditions. We performed an analysis of key elements relevant to quality and complex, shared medical decision-making. Based on a search of electronic databases, including Medline and the Cochrane Library, as well as relevant articles' reference lists, reviews of tools, and annotated bibliographies, we developed a list of key concepts and applied them to a decision-making example. Key concepts identified included provider competence, trustworthiness, and cultural competence; communication with patients and families; information quality; patient/surrogate competence; and roles and involvement. We applied this concept list to a case example, shared decision-making for live donor kidney transplantation, and identified the likely most important concepts as provider and cultural competence, information quality, and communication with patients and families. This concept list may be useful for conceptualizing the quality of complex shared decision-making and in guiding research in this area. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Evaluating HIV prevention strategies for populations in key affected groups: the example of Cabo Verde.

    PubMed

    Monteiro, João Filipe G; Galea, Sandro; Flanigan, Timothy; Monteiro, Maria de Lourdes; Friedman, Samuel R; Marshall, Brandon D L

    2015-05-01

    We used an individual-based model to evaluate the effects of hypothetical prevention interventions on HIV incidence trajectories in a concentrated, mixed epidemic setting from 2011 to 2021, and using Cabo Verde as an example. Simulations were conducted to evaluate the extent to which early HIV treatment and optimization of care, HIV testing, condom distribution, and substance abuse treatment could eliminate new infections (i.e., reduce incidence to less than 10 cases per 10,000 person-years) among non-drug users, female sex workers (FSW), and people who use drugs (PWUD). Scaling up all four interventions resulted in the largest decreases in HIV, with estimates ranging from 1.4 (95 % CI 1.36-1.44) per 10,000 person-years among non-drug users to 8.2 (95 % CI 7.8-8.6) per 10,000 person-years among PWUD in 2021. Intervention scenarios prioritizing FWS and PWUD also resulted in HIV incidence estimates at or below 10 per 10,000 person-years by 2021 for all population sub-groups. Our results suggest that scaling up multiple interventions among entire population is necessary to achieve elimination. However, prioritizing key populations with this combination prevention strategy may also result in a substantial decrease in total incidence.

  13. Evaluating HIV prevention strategies for populations in key affected groups: The example of Cabo Verde

    PubMed Central

    Monteiro, João Filipe G.; Galea, Sandro; Flanigan, Timothy; Monteiro, Maria de Lourdes; Friedman, Samuel R.; Marshall, Brandon DL

    2015-01-01

    Objectives We used an individual-based model to evaluate the effects of hypothetical prevention interventions on HIV incidence trajectories in a concentrated, mixed epidemic setting from 2011 to 2021, and using Cabo Verde as an example. Methods Simulations were conducted to evaluate the extent to which early HIV treatment and optimization of care, HIV testing, condom distribution, and substance abuse treatment could eliminate new infections (i.e., reduce incidence to less than 10 cases per 10,000 person-years) among non-drug users, female sex workers (FSW), and people who use drugs (PWUD). Results Scaling up all four interventions resulted in the largest decreases in HIV, with estimates ranging from 1.4 (95%CI:1.36–1.44) per 10,000 person-years among non-drug users to 8.2 (95%CI:7.8–8.6) per 10,000 person-years among PWUD in 2021. Intervention scenarios targeting FWS and PWUD also resulted in HIV incidence estimates at or below 10 per 10,000 person-years by 2021 for all population sub-groups. Conclusions Our results suggest that scaling up multiple interventions among entire population is necessary to achieve elimination. However, prioritizing key populations with this combination prevention strategy may also result in a substantial decrease in total incidence. PMID:25838121

  14. The Power of Examples: Illustrative Examples Enhance Conceptual Learning of Declarative Concepts

    ERIC Educational Resources Information Center

    Rawson, Katherine A.; Thomas, Ruthann C.; Jacoby, Larry L.

    2015-01-01

    Declarative concepts (i.e., key terms with short definitions of the abstract concepts denoted by those terms) are a common kind of information that students are expected to learn in many domains. A common pedagogical approach for supporting learning of declarative concepts involves presenting students with concrete examples that illustrate how the…

  15. Using protistan examples to dispel the myths of intelligent design.

    PubMed

    Farmer, Mark A; Habura, Andrea

    2010-01-01

    In recent years the teaching of the religiously based philosophy of intelligent design (ID) has been proposed as an alternative to modern evolutionary theory. Advocates of ID are largely motivated by their opposition to naturalistic explanations of biological diversity, in accordance with their goal of challenging the philosophy of scientific materialism. Intelligent design has been embraced by a wide variety of creationists who promote highly questionable claims that purport to show the inadequacy of evolutionary theory, which they consider to be a threat to a theistic worldview. We find that examples from protistan biology are well suited for providing evidence of many key evolutionary concepts, and have often been misrepresented or roundly ignored by ID advocates. These include examples of adaptations and radiations that are said to be statistically impossible, as well as examples of speciation both in the laboratory and as documented in the fossil record. Because many biologists may not be familiar with the richness of the protist evolution dataset or with ID-based criticisms of evolution, we provide examples of current ID arguments and specific protistan counter-examples.

  16. Comparison is key.

    PubMed

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  17. Child-Specific Exposure Scenarios Examples (Final Report) ...

    EPA Pesticide Factsheets

    EPA announced the availability of the final report, Child-Specific Exposure Scenarios Examples. This report is intended to be a companion document to the Exposure Factors Handbook (U.S. EPA 2011). The example scenarios were compiled from questions and inquiries received from users of the Exposure Factors Handbook (EFH) on how to select data from the EFH to assess childhood exposures. The scenarios presented in this report promote the use of the standard set of age groups recommended by the U.S. EPA in the report entitled Guidance on Selecting Age Groups for Monitoring and Assessing Childhood Exposures to Environmental Contaminants (U.S. EPA 2005). The purpose of the Child-Specific Exposure Scenarios Examples Report is to outline scenarios for various child-specific exposure pathways and to demonstrate how data from the Exposure Factors Handbook (U.S. EPA, 2011) may be applied for estimating exposures. The handbook provides data on drinking water consumption, soil ingestion, mouthing behavior, inhalation rates, dermal factors including skin area and soil adherence factors, consumption of fruits and vegetables, fish, meats, dairy products, homegrown foods, human milk, activity patterns, body weight, and consumer products. The example scenarios presented here have been selected to best demonstrate the use of the various key data sets in the Child-Specific Exposure Factors Handbook (U.S. EPA, 2008a), and represent commonly encountered exposure pathways. An exhausti

  18. Interior Secretary Highlights Key Trends, Including Climate Change and Fiscal Constraint

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2014-06-01

    Climate change is "the defining issue of our time," Department of the Interior (DOI) Secretary Sally Jewell said during her 18 June keynote addess at the AGU Science Policy Conference in Washington, D. C. The United States has to "lead by example. We can't be the largest economy in the world and the second largest producer of carbon in the world"—after China—"and not take care of our own problems first to demonstrate to the world what needs to be done," she said.

  19. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  20. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  1. 48 CFR 352.242-70 - Key personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... contracts (or as soon as possible, if an individual must be replaced, for example, as a result of leaving... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.242-70 Key personnel. As prescribed in 342.302(c)(2), the Contracting Officer shall insert the following clause: Key Personnel...

  2. 48 CFR 352.242-70 - Key personnel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contracts (or as soon as possible, if an individual must be replaced, for example, as a result of leaving... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.242-70 Key personnel. As prescribed in 342.302(c)(2), the Contracting Officer shall insert the following clause: Key Personnel...

  3. Learning Algebra from Worked Examples

    ERIC Educational Resources Information Center

    Lange, Karin E.; Booth, Julie L.; Newton, Kristie J.

    2014-01-01

    For students to be successful in algebra, they must have a truly conceptual understanding of key algebraic features as well as the procedural skills to complete a problem. One strategy to correct students' misconceptions combines the use of worked example problems in the classroom with student self-explanation. "Self-explanation" is the…

  4. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  5. Making Physics Fun: Key Concepts, Classroom Activities, and Everyday Examples, Grades K-8

    ERIC Educational Resources Information Center

    Prigo, Robert

    2007-01-01

    Teaching physical science in the elementary and middle grades can be challenging for busy teachers faced with growing science demands and limited classroom resources. Robert Prigo provides fun and engaging activities using safe, available materials that educators can easily incorporate into lesson plans. Extensive examples, sample inquiry…

  6. River conservation and terrestrial mammals: key ecological processes

    Treesearch

    Thomas A. Hanley

    2008-01-01

    Key ecological processes affecting interactions between rivers and terrestrial mammals are identified and explained, using flood plains of Alaska as examples of relatively pristine systems. Both coastal (southeast Alaska) and interior Alaska examples are used. Coastal Alaskan rivers tend to be relatively short, flashy, rain-driven systems, whereas interior Alaska...

  7. A practical guide to assessing clinical decision-making skills using the key features approach.

    PubMed

    Farmer, Elizabeth A; Page, Gordon

    2005-12-01

    This paper in the series on professional assessment provides a practical guide to writing key features problems (KFPs). Key features problems test clinical decision-making skills in written or computer-based formats. They are based on the concept of critical steps or 'key features' in decision making and represent an advance on the older, less reliable patient management problem (PMP) formats. The practical steps in writing these problems are discussed and illustrated by examples. Steps include assembling problem-writing groups, selecting a suitable clinical scenario or problem and defining its key features, writing the questions, selecting question response formats, preparing scoring keys, reviewing item quality and item banking. The KFP format provides educators with a flexible approach to testing clinical decision-making skills with demonstrated validity and reliability when constructed according to the guidelines provided.

  8. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    PubMed

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  9. Key Reconciliation for High Performance Quantum Key Distribution

    PubMed Central

    Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente

    2013-01-01

    Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440

  10. Prefixed-threshold real-time selection method in free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Wenyuan; Xu, Feihu; Lo, Hoi-Kwong

    2018-03-01

    Free-space quantum key distribution allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate and the secure key rate. Previous postselection methods to combat atmospheric turbulence require a threshold value determined after all quantum transmission. In contrast, here we propose a method where we predetermine the optimal threshold value even before quantum transmission. Therefore, the receiver can discard useless data immediately, thus greatly reducing data storage requirements and computing resources. Furthermore, our method can be applied to a variety of protocols, including, for example, not only single-photon BB84 but also asymptotic and finite-size decoy-state BB84, which can greatly increase its practicality.

  11. Examples of Mathematical Modeling

    PubMed Central

    Johnston, Matthew D.; Edwards, Carina M.; Bodmer, Walter F.; Maini, Philip K.; Chapman, S. Jonathan

    2008-01-01

    Mathematical modeling is being increasingly recognized within the biomedical sciences as an important tool that can aid the understanding of biological systems. The heavily regulated cell renewal cycle in the colonic crypt provides a good example of how modeling can be used to find out key features of the system kinetics, and help to explain both the breakdown of homeostasis and the initiation of tumorigenesis. We use the cell population model by Johnston et al.5 to illustrate the power of mathematical modeling by considering two key questions about the cell population dynamics in the colonic crypt. We ask: how can a model describe both homeostasis and unregulated growth in tumorigenesis; and to which parameters in the system is the model most sensitive? In order to address these questions, we discuss what type of modeling approach is most appropriate in the crypt. We use the model to argue why tumorigenesis is observed to occur in stages with long lag phases between periods of rapid growth, and we identify the key parameters. PMID:17873520

  12. Passive and active adaptive management: Approaches and an example

    USGS Publications Warehouse

    Williams, B.K.

    2011-01-01

    Adaptive management is a framework for resource conservation that promotes iterative learning-based decision making. Yet there remains considerable confusion about what adaptive management entails, and how to actually make resource decisions adaptively. A key but somewhat ambiguous distinction in adaptive management is between active and passive forms of adaptive decision making. The objective of this paper is to illustrate some approaches to active and passive adaptive management with a simple example involving the drawdown of water impoundments on a wildlife refuge. The approaches are illustrated for the drawdown example, and contrasted in terms of objectives, costs, and potential learning rates. Some key challenges to the actual practice of AM are discussed, and tradeoffs between implementation costs and long-term benefits are highlighted. ?? 2010 Elsevier Ltd.

  13. Scaffolding Meta-Cognitive Skills for Effective Analogical Problem Solving via Tailored Example Selection

    ERIC Educational Resources Information Center

    Muldner, Kasia; Conati, Cristina

    2010-01-01

    Although worked-out examples play a key role in cognitive skill acquisition, research demonstrates that students have various levels of meta-cognitive abilities for using examples effectively. The Example Analogy (EA)-Coach is an Intelligent Tutoring System that provides adaptive support to foster meta-cognitive behaviors relevant to a specific…

  14. Experimental evaluation of a new form of M-ary (M = 8) phase shift keying including design of the transmitter and receiver

    NASA Astrophysics Data System (ADS)

    Thompson, G. E.

    1984-12-01

    For transmitting digital information over bandpass channels, M-ary Phase Shift Keying 8(PSK) schemes are used to conserve bandwidth at the expense of signal power. A block of k bits is used to change the phase of the carrier. These k bits represent M possible phase shifts since M = 2. Common forms of M-ary PSK use equally spaced phase angles. For example, if M = 8 and k=3, 8-ary PSK uses eight phase angles spaced 45 degrees apart. This thesis considers a hybrid form of PSK when M = 8 and k = 3. Each of eight blocks of data with three bits per block are represented by different phase shifts of the carrier. The phase angles are chosen to give an equal distance between states (symbols) when projected onto the sine axis and the cosine axis of a phasor diagram. Thus, when the three bits are recovered, using two coherent phase detectors, the separation of the decision regions (voltage levels) are equal.

  15. Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taggart, J.; Sikora, J.; Wiehagen, J.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling andmore » quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.« less

  16. Are Key Principles for improved health technology assessment supported and used by health technology assessment organizations?

    PubMed

    Neumann, Peter J; Drummond, Michael F; Jönsson, Bengt; Luce, Bryan R; Schwartz, J Sanford; Siebert, Uwe; Sullivan, Sean D

    2010-01-01

    Previously, our group-the International Working Group for HTA Advancement-proposed a set of fifteen Key Principles that could be applied to health technology assessment (HTA) programs in different jurisdictions and across a range of organizations and perspectives. In this commentary, we investigate the extent to which these principles are supported and used by fourteen selected HTA organizations worldwide. We find that some principles are broadly supported: examples include being explicit about HTA goals and scope; considering a wide range of evidence and outcomes; and being unbiased and transparent. Other principles receive less widespread support: examples are addressing issues of generalizability and transferability; being transparent on the link between HTA findings and decision-making processes; considering a full societal perspective; and monitoring the implementation of HTA findings. The analysis also suggests a lack of consensus in the field about some principles--for example, considering a societal perspective. Our study highlights differences in the uptake of key principles for HTA and indicates considerable room for improvement for HTA organizations to adopt principles identified to reflect good HTA practices. Most HTA organizations espouse certain general concepts of good practice--for example, assessments should be unbiased and transparent. However, principles that require more intensive follow-up--for example, monitoring the implementation of HTA findings--have received little support and execution.

  17. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  18. Applying remote sensing to invasive species science—A tamarisk example

    USGS Publications Warehouse

    Morisette, Jeffrey T.

    2011-01-01

    The Invasive Species Science Branch of the Fort Collins Science Center provides research and technical assistance relating to management concerns for invasive species, including understanding how these species are introduced, identifying areas vulnerable to invasion, forecasting invasions, and developing control methods. This fact sheet considers the invasive plant species tamarisk (Tamarix spp), addressing three fundamental questions: *Where is it now? *What are the potential or realized ecological impacts of invasion? *Where can it survive and thrive if introduced? It provides peer-review examples of how the U.S. Geological Survey, working with other federal agencies and university partners, are applying remote-sensing technologies to address these key questions.

  19. Application of artificial intelligence in Geodesy - A review of theoretical foundations and practical examples

    NASA Astrophysics Data System (ADS)

    Reiterer, Alexander; Egly, Uwe; Vicovac, Tanja; Mai, Enrico; Moafipoor, Shahram; Grejner-Brzezinska, Dorota A.; Toth, Charles K.

    2010-12-01

    Artificial Intelligence (AI) is one of the key technologies in many of today's novel applications. It is used to add knowledge and reasoning to systems. This paper illustrates a review of AI methods including examples of their practical application in Geodesy like data analysis, deformation analysis, navigation, network adjustment, and optimization of complex measurement procedures. We focus on three examples, namely, a geo-risk assessment system supported by a knowledge-base, an intelligent dead reckoning personal navigator, and evolutionary strategies for the determination of Earth gravity field parameters. Some of the authors are members of IAG Sub-Commission 4.2 - Working Group 4.2.3, which has the main goal to study and report on the application of AI in Engineering Geodesy.

  20. A new UKIDSS proper motion survey and key early results, including new benchmark systems

    NASA Astrophysics Data System (ADS)

    Smith, L.; Lucas, P.; Burningham, B.; Jones, H.; Pinfield, D.; Smart, R.; Andrei, A.

    We present a proper motion catalogue for the 1500 deg2 of 2 epoch J-band UKIDSS Large Area Survey (LAS) data, which includes 120,000 stellar sources with motions detected above the 5sigma level. Our upper limit on proper motion detection is 3\\farcs3 yr-1 and typical uncertainties are of order 10 mas yr-1 for bright sources from data with a modest 1.8-7.0 year epoch baseline. We developed a bespoke proper motion pipeline which applies a source-unique second order polynomial transformation to UKIDSS array coordinates to counter potential local non-uniformity in the focal plane. Our catalogue agrees well with the proper motion data supplied in the current WFCAM Science Archive (WSA) tenth data release (DR10) catalogue where there is overlap, and in various optical catalogues, but it benefits from some improvements, such as a larger matching radius and relative to absolute proper motion correction. We present proper motion results for 128 T dwarfs in the UKIDSS LAS and key early results of projects utilising our catalogue, in particular searches for brown dwarf benchmark systems through cross matches with existing proper motion catalogues. We report the discovery of two new T dwarf benchmark systems.

  1. Targeting as a Mode of Science Communication: Principles, Issues and a Practical Example

    NASA Astrophysics Data System (ADS)

    Holland, G. J.; Vigh, J. L.

    2011-12-01

    Today's media landscape contains a rich and diverse range of communications opportunities. New media, such as the internet, blogosphere and social networks, are complementing, supplementing and also replacing the traditional mass media communications through print, radio and television. This diversification certainly contains pitfalls and difficulties as has been demonstrated in the Climategate affair. But there are also real opportunities for utilizing the diversity to provide targeted science communications that are framed in the context of the specific group of interest. That such targeting of audience attitudes and beliefs is an important key to effective science communications has been demonstrated by, for example, Leiserowitz, Maibach et al (2009). This approach does require an understanding of the audience and a careful framing of the message in terms familiar to the targeted group. Here many factors come into play, including: including immediacy, economics, culture, community leaders, emotional framing, and ideological filters. In this talk we shall elaborate on the principles, issues and opportunities. A practical example of working with the religious community on communicating the science of climate change will also be presented. This will include the approach adopted, progress to date and the lessons learnt.

  2. How Effective Is Example Generation for Learning Declarative Concepts?

    ERIC Educational Resources Information Center

    Rawson, Katherine A.; Dunlosky, John

    2016-01-01

    Declarative concepts (i.e., key terms and corresponding definitions for abstract concepts) represent foundational knowledge that students learn in many content domains. Thus, investigating techniques to enhance concept learning is of critical importance. Various theoretical accounts support the expectation that example generation will serve this…

  3. Data publication and dissemination of interactive keys under the open access model

    USDA-ARS?s Scientific Manuscript database

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  4. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  5. 15 CFR 700.52 - Examples of assistance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Examples of assistance. 700.52 Section... DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Special Priorities Assistance § 700.52 Examples of assistance... an item needed to fill a rated order. (b) Other examples of special priorities assistance include: (1...

  6. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  7. Example-Based Learning: Effects of Different Types of Examples on Student Performance, Cognitive Load and Self-Efficacy in a Statistical Learning Task

    ERIC Educational Resources Information Center

    Huang, Xiaoxia

    2017-01-01

    Previous research has indicated the disconnect between example-based research focusing on worked examples (WEs) and that focusing on modeling examples. The purpose of this study was to examine and compare the effect of four different types of examples from the two separate lines of research, including standard WEs, erroneous WEs, expert (masterly)…

  8. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  9. Developing and validating a nutrition knowledge questionnaire: key methods and considerations.

    PubMed

    Trakman, Gina Louise; Forsyth, Adrienne; Hoye, Russell; Belski, Regina

    2017-10-01

    To outline key statistical considerations and detailed methodologies for the development and evaluation of a valid and reliable nutrition knowledge questionnaire. Literature on questionnaire development in a range of fields was reviewed and a set of evidence-based guidelines specific to the creation of a nutrition knowledge questionnaire have been developed. The recommendations describe key qualitative methods and statistical considerations, and include relevant examples from previous papers and existing nutrition knowledge questionnaires. Where details have been omitted for the sake of brevity, the reader has been directed to suitable references. We recommend an eight-step methodology for nutrition knowledge questionnaire development as follows: (i) definition of the construct and development of a test plan; (ii) generation of the item pool; (iii) choice of the scoring system and response format; (iv) assessment of content validity; (v) assessment of face validity; (vi) purification of the scale using item analysis, including item characteristics, difficulty and discrimination; (vii) evaluation of the scale including its factor structure and internal reliability, or Rasch analysis, including assessment of dimensionality and internal reliability; and (viii) gathering of data to re-examine the questionnaire's properties, assess temporal stability and confirm construct validity. Several of these methods have previously been overlooked. The measurement of nutrition knowledge is an important consideration for individuals working in the nutrition field. Improved methods in the development of nutrition knowledge questionnaires, such as the use of factor analysis or Rasch analysis, will enable more confidence in reported measures of nutrition knowledge.

  10. Key technology issues for space robotic systems

    NASA Technical Reports Server (NTRS)

    Schappell, Roger T.

    1987-01-01

    Robotics has become a key technology consideration for the Space Station project to enable enhanced crew productivity and to maximize safety. There are many robotic functions currently being studied, including Space Station assembly, repair, and maintenance as well as satellite refurbishment, repair, and retrieval. Another area of concern is that of providing ground based experimenters with a natural interface that they might directly interact with their hardware onboard the Space Station or ancillary spacecraft. The state of the technology is such that the above functions are feasible; however, considerable development work is required for operation in this gravity-free vacuum environment. Furthermore, a program plan is evolving within NASA that will capitalize on recent government, university, and industrial robotics research and development (R and D) accomplishments. A brief summary is presented of the primary technology issues and physical examples are provided of the state of the technology for the initial operational capability (IOC) system as well as for the eventual final operational capability (FOC) Space Station.

  11. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  12. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  13. Key drivers of airline loyalty.

    PubMed

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  14. Key drivers of airline loyalty

    PubMed Central

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  15. Ocean Commission Report Includes Key Recommendations for Science and Governance

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2004-05-01

    The preliminary report of the U.S. Commission on Ocean Policy, released on 20 April, calls for ecosystem-based management of the oceans, dramatically restructuring federal governance oversight of ocean issues, and doubling the federal ocean and coastal research budget over the next five years to $1.3 billion per year. The report by the congressionally-mandated and presidentially-appointed commission includes nearly 200 recommendations for establishing a coordinated and comprehensive national ocean policy framework.

  16. 28 CFR 51.13 - Examples of changes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... THE VOTING RIGHTS ACT OF 1965, AS AMENDED General Provisions § 51.13 Examples of changes. Changes affecting voting include, but are not limited to, the following examples: (a) Any change in qualifications... in the constituency of an official or the boundaries of a voting unit (e.g., through redistricting...

  17. 28 CFR 51.13 - Examples of changes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... THE VOTING RIGHTS ACT OF 1965, AS AMENDED General Provisions § 51.13 Examples of changes. Changes affecting voting include, but are not limited to, the following examples: (a) Any change in qualifications... in the constituency of an official or the boundaries of a voting unit (e.g., through redistricting...

  18. The Need for Flexibility in Conservation Practices: Exotic Species as an Example

    NASA Astrophysics Data System (ADS)

    Prévot-Julliard, Anne-Caroline; Clavel, Joanne; Teillac-Deschamps, Pauline; Julliard, Romain

    2011-03-01

    To garner support for biodiversity from the World's human population, conservation biologists need an open-minded, integrated conservation strategy. We suggest that this strategy should include efforts to (1) preserve existing high quality, diverse ecosystems, (2) remediate impaired systems, (3) balance the needs of people and ecological resources, and (4) engender appreciation of nature and its services. We refer to these four key tenets as reservation, restoration, reconciliation, and reconnection. We illustrate these concepts by presenting the debate surrounding the management of exotic species from an unusual perspective, the benefits of exotic species. By this example we hope to encourage an integrated approach to conservation in which management strategies can be flexible, adjusting to society's needs and the overall goals of conservation.

  19. Server-Side Includes Made Simple.

    ERIC Educational Resources Information Center

    Fagan, Jody Condit

    2002-01-01

    Describes server-side include (SSI) codes which allow Webmasters to insert content into Web pages without programming knowledge. Explains how to enable the codes on a Web server, provides a step-by-step process for implementing them, discusses tags and syntax errors, and includes examples of their use on the Web site for Southern Illinois…

  20. Promoting College Students' Problem Understanding Using Schema-Emphasizing Worked Examples

    ERIC Educational Resources Information Center

    Yan, Jie; Lavigne, Nancy C.

    2014-01-01

    Statistics learners often bypass the critical step of understanding a problem before executing solutions. Worked-out examples that identify problem information (e.g., data type, number of groups, purpose of analysis) key to determining a solution (e.g., "t" test, chi-square, correlation) can address this concern. The authors examined the…

  1. The Geology of the Florida Keys.

    ERIC Educational Resources Information Center

    Shinn, Eugene A.

    1988-01-01

    Describes some of the ancient geologic history of the Florida Keys from Key Largo to Key West including the effects of glaciers, sea level rise, reef distribution, spurs and grooves, backstepping and ecological zonation, growth rates and erosion. Predicts future changes in this area. (CW)

  2. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  3. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  4. A Unifying Probability Example.

    ERIC Educational Resources Information Center

    Maruszewski, Richard F., Jr.

    2002-01-01

    Presents an example from probability and statistics that ties together several topics including the mean and variance of a discrete random variable, the binomial distribution and its particular mean and variance, the sum of independent random variables, the mean and variance of the sum, and the central limit theorem. Uses Excel to illustrate these…

  5. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  6. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  7. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  8. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  9. IMPACCT Kids’ Care: a real-world example of stakeholder involvement in comparative effectiveness research

    PubMed Central

    Likumahuwa-Ackman, Sonja; Angier, Heather; Sumic, Aleksandra; Harding, Rose L; Cottrell, Erika K; Cohen, Deborah J; Nelson, Christine A; Burdick, Timothy E; Wallace, Lorraine S; Gallia, Charles; DeVoe, Jennifer E

    2015-01-01

    The Patient-Centered Outcomes Research Institute has accelerated conversations about the importance of actively engaging stakeholders in all aspects of comparative effectiveness research (CER). Other scientific disciplines have a history of stakeholder engagement, yet few empirical examples exist of how these stakeholders can inform and enrich CER. Here we present a case study which includes the methods used to engage stakeholders, what we learned from them, and how we incorporated their ideas in a CER project. We selected stakeholders from key groups, built relationships with them and collected their feedback through interviews, observation and ongoing meetings during the four research process phases: proposal development, adapting study methods, understanding the context and information technology tool design and refinement. PMID:26274796

  10. IMPACCT Kids' Care: a real-world example of stakeholder involvement in comparative effectiveness research.

    PubMed

    Likumahuwa-Ackman, Sonja; Angier, Heather; Sumic, Aleksandra; Harding, Rose L; Cottrell, Erika K; Cohen, Deborah J; Nelson, Christine A; Burdick, Timothy E; Wallace, Lorraine S; Gallia, Charles; DeVoe, Jennifer E

    2015-08-01

    The Patient-Centered Outcomes Research Institute has accelerated conversations about the importance of actively engaging stakeholders in all aspects of comparative effectiveness research (CER). Other scientific disciplines have a history of stakeholder engagement, yet few empirical examples exist of how these stakeholders can inform and enrich CER. Here we present a case study which includes the methods used to engage stakeholders, what we learned from them, and how we incorporated their ideas in a CER project. We selected stakeholders from key groups, built relationships with them and collected their feedback through interviews, observation and ongoing meetings during the four research process phases: proposal development, adapting study methods, understanding the context and information technology tool design and refinement.

  11. Captured key electrical safety lockout system

    DOEpatents

    Darimont, Daniel E.

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  12. Captured key electrical safety lockout system

    DOEpatents

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  13. Design of virtual simulation experiment based on key events

    NASA Astrophysics Data System (ADS)

    Zhong, Zheng; Zhou, Dongbo; Song, Lingxiu

    2018-06-01

    Considering complex content and lacking of guidance in virtual simulation experiments, the key event technology in VR narrative theory was introduced for virtual simulation experiment to enhance fidelity and vividness process. Based on the VR narrative technology, an event transition structure was designed to meet the need of experimental operation process, and an interactive event processing model was used to generate key events in interactive scene. The experiment of" margin value of bees foraging" based on Biologic morphology was taken as an example, many objects, behaviors and other contents were reorganized. The result shows that this method can enhance the user's experience and ensure experimental process complete and effectively.

  14. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  15. A Review of Computational Methods in Materials Science: Examples from Shock-Wave and Polymer Physics

    PubMed Central

    Steinhauser, Martin O.; Hiermaier, Stefan

    2009-01-01

    This review discusses several computational methods used on different length and time scales for the simulation of material behavior. First, the importance of physical modeling and its relation to computer simulation on multiscales is discussed. Then, computational methods used on different scales are shortly reviewed, before we focus on the molecular dynamics (MD) method. Here we survey in a tutorial-like fashion some key issues including several MD optimization techniques. Thereafter, computational examples for the capabilities of numerical simulations in materials research are discussed. We focus on recent results of shock wave simulations of a solid which are based on two different modeling approaches and we discuss their respective assets and drawbacks with a view to their application on multiscales. Then, the prospects of computer simulations on the molecular length scale using coarse-grained MD methods are covered by means of examples pertaining to complex topological polymer structures including star-polymers, biomacromolecules such as polyelectrolytes and polymers with intrinsic stiffness. This review ends by highlighting new emerging interdisciplinary applications of computational methods in the field of medical engineering where the application of concepts of polymer physics and of shock waves to biological systems holds a lot of promise for improving medical applications such as extracorporeal shock wave lithotripsy or tumor treatment. PMID:20054467

  16. Evolving Systems and Adaptive Key Component Control

    NASA Technical Reports Server (NTRS)

    Frost, Susan A.; Balas, Mark J.

    2009-01-01

    We propose a new framework called Evolving Systems to describe the self-assembly, or autonomous assembly, of actively controlled dynamical subsystems into an Evolved System with a higher purpose. An introduction to Evolving Systems and exploration of the essential topics of the control and stability properties of Evolving Systems is provided. This chapter defines a framework for Evolving Systems, develops theory and control solutions for fundamental characteristics of Evolving Systems, and provides illustrative examples of Evolving Systems and their control with adaptive key component controllers.

  17. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  18. Some examples of geomorphodiversity in Italy

    NASA Astrophysics Data System (ADS)

    Panizza, Mario

    2014-05-01

    The concept of geomorphodiversity (Panizza, 2009) is presented: "the critical and specific assessment of the geomorphological features of a territory, by comparing them in a way both extrinsic (comparison of the geomorphological characteristics with those from other territories) and intrinsic (comparison of the geomorphological characteristics with other areas within the territory itself) and taking into account the level of their scientific quality, the scale of investigation and the purpose of the research". A first example concerns the Dolomites: they have been included in the UNESCO World Heritage List because of their exceptional beauty and unique landscape, together with their scientific importance from the geological and geomorphological point of view. They are of international significance for geomorphodiversity, as the classic site for the development of mountains in dolomite limestone and present a wide range of landforms related to erosion, tectonics and glaciation. They represent a kind of high altitude, open air laboratory of geomorphological heritage of exceptional global value, among the most extraordinary and accessible in the world and ideal for researching, teaching, understanding and developing Earth Science theories. The second example concerns the Emilia-Romagna Apennines, candidate for enrolment in the List of European Geoparks: they show a multifaceted and complex image from the international and regional geomorphological (extrinsic and intrinsic geomorphodiversity) point of view and are an educational example for illustrating morphotectonic evolution, stratigraphic and sedimentological sequences and morpholithological peculiarities connected with gypsum karst and clay mass wasting phenomena. The third example concerns the Vesuvius, one of the National Italian Parks: it shows an extrinsic geomorphodiversity mainly referred to the type of eruptions, with some exemplary processes inserted in international volcanic nomenclature; it makes up an

  19. Cellular Automata with Anticipation: Examples and Presumable Applications

    NASA Astrophysics Data System (ADS)

    Krushinsky, Dmitry; Makarenko, Alexander

    2010-11-01

    One of the most prospective new methodologies for modelling is the so-called cellular automata (CA) approach. According to this paradigm, the models are built from simple elements connected into regular structures with local interaction between neighbours. The patterns of connections usually have a simple geometry (lattices). As one of the classical examples of CA we mention the game `Life' by J. Conway. This paper presents two examples of CA with anticipation property. These examples include a modification of the game `Life' and a cellular model of crowd movement.

  20. The development of small, cabled, real-time video based observation systems for near shore coastal marine science including three examples and lessons learned

    USGS Publications Warehouse

    Hatcher, Gerry; Okuda, Craig

    2016-01-01

    The effects of climate change on the near shore coastal environment including ocean acidification, accelerated erosion, destruction of coral reefs, and damage to marine habitat have highlighted the need for improved equipment to study, monitor, and evaluate these changes [1]. This is especially true where areas of study are remote, large, or beyond depths easily accessible to divers. To this end, we have developed three examples of low cost and easily deployable real-time ocean observation platforms. We followed a scalable design approach adding complexity and capability as familiarity and experience were gained with system components saving both time and money by reducing design mistakes. The purpose of this paper is to provide information for the researcher, technician, or engineer who finds themselves in need of creating or acquiring similar platforms.

  1. Closed-form solutions for linear regulator-design of mechanical systems including optimal weighting matrix selection

    NASA Technical Reports Server (NTRS)

    Hanks, Brantley R.; Skelton, Robert E.

    1991-01-01

    This paper addresses the restriction of Linear Quadratic Regulator (LQR) solutions to the algebraic Riccati Equation to design spaces which can be implemented as passive structural members and/or dampers. A general closed-form solution to the optimal free-decay control problem is presented which is tailored for structural-mechanical systems. The solution includes, as subsets, special cases such as the Rayleigh Dissipation Function and total energy. Weighting matrix selection is a constrained choice among several parameters to obtain desired physical relationships. The closed-form solution is also applicable to active control design for systems where perfect, collocated actuator-sensor pairs exist. Some examples of simple spring mass systems are shown to illustrate key points.

  2. Statistical Literacy in Public Debate--Examples from the UK 2015 General Election

    ERIC Educational Resources Information Center

    Arnold, Phoebe

    2017-01-01

    Full Fact is an independent, non-partisan fact-checking charity. A particular focus is the analysis of factual claims in political debate in the UK; for example, fact-checking claims and counterclaims made during Prime Minister's questions. Facts do not appear in a vacuum as they are often used as key elements in an effort to make a coherent…

  3. Sierra/SolidMechanics 4.46 Example Problems Manual.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Plews, Julia A.; Crane, Nathan K; de Frias, Gabriel Jose

    Presented in this document are tests that exist in the Sierra/SolidMechanics example problem suite, which is a subset of the Sierra/SM regression and performance test suite. These examples showcase common and advanced code capabilities. A wide variety of other regression and verification tests exist in the Sierra/SM test suite that are not included in this manual.

  4. WJG sets an example of internationalization for other Chinese academic journals.

    PubMed

    Zu, Guang-An

    2010-06-14

    Supported by the "Special Fund for Key Academic Journals" of the National Natural Science Foundation of China, World Journal of Gastroenterology (WJG) has become a high-impact international clinical medical journal due to the great efforts of Professor Lian-Sheng Ma, Editor-in-Chief, and his team over several years. Now, WJG has successfully achieved a high degree of internationalization and sets a good example for other Chinese academic journals.

  5. Treasures ... of black wood, brilliantly polished : five examples of Taino sculpture from the tenth-sixteenth century Caribbean.

    Treesearch

    Joanna Ostapkowicz; Alex Wiedenhoeft; Christopher Bronk Ramsey; Erika Ribechini; Samuel Wilson; Fiona Brock; Tom Higham

    2011-01-01

    Five wooden sculptures from the pre-contact Caribbean, long held in museum collections, are here dated and given a context for the first time. The examples studied were made from dense Guaiacum wood, carved, polished and inlaid with shell fastened with resin. Dating the heartwood, sapwood and resins takes key examples of ‘Classic’ Ta´ýno art back to the tenth century...

  6. Key design considerations on comparative clinical efficacy studies for biosimilars: adalimumab as an example.

    PubMed

    Lai, Zhihong; La Noce, Anna

    2016-01-01

    The global development of a biosimilar product is a methodologically complex affair, lined with potential design pitfalls and operational missteps to be avoided. Without careful attention to experimental design and meticulous execution, a development programme may fail to demonstrate equivalence, as would be anticipated for a biosimilar product, and not receive regulatory approval based on current guidance. In order to demonstrate similarity of a biosimilar product versus the originator (ie, the branded product), based on regulatory guidance, a stepwise approach is usually taken, starting with a comprehensive structural and functional characterisation of the new biological moiety. Given the sequential nature of the review process, the extent and nature of the non-clinical in vivo studies and the clinical studies to be performed depend on the level of evidence obtained in these previous step(s). A clinical efficacy trial is often required to further demonstrate biosimilarity of the two products (biosimilar vs branded) in terms of comparative safety and effectiveness. Owing to the focus on demonstrating biosimilarity and not safety and efficacy de novo, designing an adequate phase III (potentially pivotal) clinical efficacy study of a biosimilar may present some unique challenges. Using adalimumab as an example, we highlight design elements that may deserve special attention.

  7. [Depopulation and aging: the example of Gers].

    PubMed

    Le Gleau, J P; Pradel De Lamaze, F

    1980-01-01

    The authors examine the process of depopulation and aging in a rural French community using the example of the department of Gers. Some projections of future population trends up to 1985 are included.

  8. Active Learning with Irrelevant Examples

    NASA Technical Reports Server (NTRS)

    Wagstaff, Kiri; Mazzoni, Dominic

    2009-01-01

    An improved active learning method has been devised for training data classifiers. One example of a data classifier is the algorithm used by the United States Postal Service since the 1960s to recognize scans of handwritten digits for processing zip codes. Active learning algorithms enable rapid training with minimal investment of time on the part of human experts to provide training examples consisting of correctly classified (labeled) input data. They function by identifying which examples would be most profitable for a human expert to label. The goal is to maximize classifier accuracy while minimizing the number of examples the expert must label. Although there are several well-established methods for active learning, they may not operate well when irrelevant examples are present in the data set. That is, they may select an item for labeling that the expert simply cannot assign to any of the valid classes. In the context of classifying handwritten digits, the irrelevant items may include stray marks, smudges, and mis-scans. Querying the expert about these items results in wasted time or erroneous labels, if the expert is forced to assign the item to one of the valid classes. In contrast, the new algorithm provides a specific mechanism for avoiding querying the irrelevant items. This algorithm has two components: an active learner (which could be a conventional active learning algorithm) and a relevance classifier. The combination of these components yields a method, denoted Relevance Bias, that enables the active learner to avoid querying irrelevant data so as to increase its learning rate and efficiency when irrelevant items are present. The algorithm collects irrelevant data in a set of rejected examples, then trains the relevance classifier to distinguish between labeled (relevant) training examples and the rejected ones. The active learner combines its ranking of the items with the probability that they are relevant to yield a final decision about which item

  9. Distorting the Historical Record: One Detailed Example from the Albert Shanker Institute's Report

    ERIC Educational Resources Information Center

    American Educator, 2012

    2012-01-01

    This article presents a detailed example from the Albert Shanker Institute's report that shows the error of U.S. history textbooks and how it is distorting the historical record. One of the most glaring errors in textbooks is the treatment of the role that unions and labor activists played as key participants in the civil rights movement. The…

  10. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  11. WJG sets an example of internationalization for other Chinese academic journals

    PubMed Central

    Zu, Guang-An

    2010-01-01

    Supported by the “Special Fund for Key Academic Journals” of the National Natural Science Foundation of China, World Journal of Gastroenterology (WJG) has become a high-impact international clinical medical journal due to the great efforts of Professor Lian-Sheng Ma, Editor-in-Chief, and his team over several years. Now, WJG has successfully achieved a high degree of internationalization and sets a good example for other Chinese academic journals. PMID:20533589

  12. Quantum hacking on quantum key distribution using homodyne detection

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  13. Key Competencies, Assessment and Learning Stories

    ERIC Educational Resources Information Center

    Davis, Keryn; Wright, Jocelyn; Carr, Margaret; Peters, Sally

    2013-01-01

    Developed in response to a strong interest in the use of Learning Stories in schools, this resource is designed to answer some common questions asked by teachers. The assessment of Key Competencies is a topic that deserves a lot of discussion. A Key Competency is complex: it includes social, emotional, cognitive and cultural aspects, and is…

  14. Video2vec Embeddings Recognize Events When Examples Are Scarce.

    PubMed

    Habibian, Amirhossein; Mensink, Thomas; Snoek, Cees G M

    2017-10-01

    This paper aims for event recognition when video examples are scarce or even completely absent. The key in such a challenging setting is a semantic video representation. Rather than building the representation from individual attribute detectors and their annotations, we propose to learn the entire representation from freely available web videos and their descriptions using an embedding between video features and term vectors. In our proposed embedding, which we call Video2vec, the correlations between the words are utilized to learn a more effective representation by optimizing a joint objective balancing descriptiveness and predictability. We show how learning the Video2vec embedding using a multimodal predictability loss, including appearance, motion and audio features, results in a better predictable representation. We also propose an event specific variant of Video2vec to learn a more accurate representation for the words, which are indicative of the event, by introducing a term sensitive descriptiveness loss. Our experiments on three challenging collections of web videos from the NIST TRECVID Multimedia Event Detection and Columbia Consumer Videos datasets demonstrate: i) the advantages of Video2vec over representations using attributes or alternative embeddings, ii) the benefit of fusing video modalities by an embedding over common strategies, iii) the complementarity of term sensitive descriptiveness and multimodal predictability for event recognition. By its ability to improve predictability of present day audio-visual video features, while at the same time maximizing their semantic descriptiveness, Video2vec leads to state-of-the-art accuracy for both few- and zero-example recognition of events in video.

  15. Desertification treaty includes key role for scientists

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    When Lois Barber, executive director of the non-profit group EarthAction, began efforts to press for U.S. Senate ratification of the United Nations Convention to Combat Desertification several years ago, the treaty's purpose tripped up some people, she said. They wondered whether it might be a treaty related to military personnel who had abandoned their service, de-certification of something or other, or even an overabundance of after-dinner treats. While the issue may not yet rate highly on the U.S. radar screen, U.S. Senate ratification of the Convention to Combat Desertification (CCD) on November 17, 2000 and entry into force of the treaty in the United States on February 2, 2001, could bring additional focus on desertification from the scientific community and policy-makers, according to a number of experts involved with the issue. The treaty now has been ratified by 174 countries.

  16. Anomaly Monitoring Method for Key Components of Satellite

    PubMed Central

    Fan, Linjun; Xiao, Weidong; Tang, Jun

    2014-01-01

    This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM), which is made up of state estimation based on Multivariate State Estimation Techniques (MSET) and anomaly detection based on Sequential Probability Ratio Test (SPRT). On the basis of analysis failure of lithium-ion batteries (LIBs), we divided the failure of LIBs into internal failure, external failure, and thermal runaway and selected electrolyte resistance (R e) and the charge transfer resistance (R ct) as the key parameters of state estimation. Then, through the actual in-orbit telemetry data of the key parameters of LIBs, we obtained the actual residual value (R X) and healthy residual value (R L) of LIBs based on the state estimation of MSET, and then, through the residual values (R X and R L) of LIBs, we detected the anomaly states based on the anomaly detection of SPRT. Lastly, we conducted an example of AMM for LIBs, and, according to the results of AMM, we validated the feasibility and effectiveness of AMM by comparing it with the results of threshold detective method (TDM). PMID:24587703

  17. Economic contribution of recreating visitors to the Florida Keys/Key West

    Treesearch

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  18. Quantum key distribution without the wavefunction

    NASA Astrophysics Data System (ADS)

    Niestegge, Gerd

    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.

  19. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  20. Key principles to improve programmes and interventions in complementary feeding.

    PubMed

    Lutter, Chessa K; Iannotti, Lora; Creed-Kanashiro, Hilary; Guyon, Agnes; Daelmans, Bernadette; Robert, Rebecca; Haider, Rukhsana

    2013-09-01

    Although there are some examples of successful complementary feeding programmes to promote healthy growth and prevent stunting at the community level, to date there are few, if any, examples of successful programmes at scale. A lack of systematic process and impact evaluations on pilot projects to generate lessons learned has precluded scaling up of effective programmes. Programmes to effect positive change in nutrition rarely follow systematic planning, implementation, and evaluation (PIE) processes to enhance effectiveness over the long term. As a result a set of programme-oriented key principles to promote healthy growth remains elusive. The purpose of this paper is to fill this gap by proposing a set of principles to improve programmes and interventions to promote healthy growth and development. Identifying such principles for programme success has three requirements: rethinking traditional paradigms used to promote improved infant and young child feeding; ensuring better linkages to delivery platforms; and, improving programming. Following the PIE model for programmes and learning from experiences from four relatively large-scale programmes described in this paper, 10 key principles are identified in the areas of programme planning, programme implementation, programme evaluation, and dissemination, replication, and scaling up. Nonetheless, numerous operational research questions remain, some of which are highlighted in this paper. © 2013 John Wiley & Sons Ltd.

  1. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    NASA Astrophysics Data System (ADS)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  2. Parametric Bayesian priors and better choice of negative examples improve protein function prediction.

    PubMed

    Youngs, Noah; Penfold-Brown, Duncan; Drew, Kevin; Shasha, Dennis; Bonneau, Richard

    2013-05-01

    Computational biologists have demonstrated the utility of using machine learning methods to predict protein function from an integration of multiple genome-wide data types. Yet, even the best performing function prediction algorithms rely on heuristics for important components of the algorithm, such as choosing negative examples (proteins without a given function) or determining key parameters. The improper choice of negative examples, in particular, can hamper the accuracy of protein function prediction. We present a novel approach for choosing negative examples, using a parameterizable Bayesian prior computed from all observed annotation data, which also generates priors used during function prediction. We incorporate this new method into the GeneMANIA function prediction algorithm and demonstrate improved accuracy of our algorithm over current top-performing function prediction methods on the yeast and mouse proteomes across all metrics tested. Code and Data are available at: http://bonneaulab.bio.nyu.edu/funcprop.html

  3. Examples for Non-Ideal Solution Thermodynamics Study

    ERIC Educational Resources Information Center

    David, Carl W.

    2004-01-01

    A mathematical model of a non-ideal solution is presented, where it is shown how and where the non-ideality manifests itself in the standard thermodynamics tableau. Examples related to the non-ideal solution thermodynamics study are also included.

  4. Differentiating Instruction: Providing the Right Kinds of Worked Examples for Individual Students

    ERIC Educational Resources Information Center

    Booth, Julie L.; Koedinger, Kenneth R.; Newton, Kristie J.; Lange, Karin E.

    2013-01-01

    A plethora of laboratory studies have shown that including the study of worked examples during problem-solving practice improves learning (Sweller, 1999; Sweller & Cooper, 1985). While most worked-example research focuses on the use of correct examples, recent work suggests that asking children to explain a combination of correct and incorrect…

  5. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  6. Examples as an Instructional Tool in Mathematics and Science Classrooms: Teachers' Perceptions and Attitudes

    ERIC Educational Resources Information Center

    Huang, Xiaoxia; Cribbs, Jennifer

    2017-01-01

    This study examined mathematics and science teachers' perceptions and use of four types of examples, including typical textbook examples (standard worked examples) and erroneous worked examples in the written form as well as mastery modelling examples and peer modelling examples involving the verbalization of the problem-solving process. Data…

  7. J-PAKE: Authenticated Key Exchange without PKI

    NASA Astrophysics Data System (ADS)

    Hao, Feng; Ryan, Peter

    Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.

  8. A harmonized segmentation protocol for hippocampal and parahippocampal subregions: why do we need one and what are the key goals?

    PubMed Central

    Olsen, Rosanna K.; Berron, David; Carr, Valerie A.; Stark, Craig E.L.; Amaral, Robert S.C.; Amunts, Katrin; Augustinack, Jean C.; Bender, Andrew R.; Bernstein, Jeffrey D.; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison; Chakravarty, M. Mallar; Chupin, Marie; Ekstrom, Arne; de Flores, Robin; Insausti, Ricardo; Kanel, Prabesh; Kedo, Olga; Kennedy, Kristen M.; Kerchner, Geoffrey A.; LaRocque, Karen F.; Liu, Xiuwen; Maass, Anne; Malykhin, Nicolai; Mueller, Susanne G.; Ofen, Noa; Palombo, Daniela J.; Parekh, Mansi B.; Pluta, John B.; Pruessner, Jens C.; Raz, Naftali; Rodrigue, Karen M.; Schoemaker, Dorothee; Shafer, Andrea T.; Steve, Trevor A.; Suthana, Nanthia; Wang, Lei; Winterburn, Julie L.; Yassa, Michael A.; Yushkevich, Paul A.; la Joie, Renaud

    2016-01-01

    The advent of high-resolution magnetic resonance imaging (MRI) has enabled in vivo research in a variety of populations and diseases on the structure and function of hippocampal subfields and subdivisions of the parahippocampal gyrus. Due to the many extant and highly discrepant segmentation protocols, comparing results across studies is difficult. To overcome this barrier, the Hippocampal Subfields Group was formed as an international collaboration with the aim of developing a harmonized protocol for manual segmentation of hippocampal and parahippocampal subregions on high-resolution MRI. In this commentary we discuss the goals for this protocol and the associated key challenges involved in its development. These include differences among existing anatomical reference materials, striking the right balance between reliability of measurements and anatomical validity, and the development of a versatile protocol that can be adopted for the study of populations varying in age and health. The commentary outlines these key challenges, as well as the proposed solution of each, with concrete examples from our working plan. Finally, with two examples, we illustrate how the harmonized protocol, once completed, is expected to impact the field by producing measurements that are quantitatively comparable across labs and by facilitating the synthesis of findings across different studies. PMID:27862600

  9. A harmonized segmentation protocol for hippocampal and parahippocampal subregions: Why do we need one and what are the key goals?

    PubMed

    Wisse, Laura E M; Daugherty, Ana M; Olsen, Rosanna K; Berron, David; Carr, Valerie A; Stark, Craig E L; Amaral, Robert S C; Amunts, Katrin; Augustinack, Jean C; Bender, Andrew R; Bernstein, Jeffrey D; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison; Chakravarty, M Mallar; Chupin, Marie; Ekstrom, Arne; de Flores, Robin; Insausti, Ricardo; Kanel, Prabesh; Kedo, Olga; Kennedy, Kristen M; Kerchner, Geoffrey A; LaRocque, Karen F; Liu, Xiuwen; Maass, Anne; Malykhin, Nicolai; Mueller, Susanne G; Ofen, Noa; Palombo, Daniela J; Parekh, Mansi B; Pluta, John B; Pruessner, Jens C; Raz, Naftali; Rodrigue, Karen M; Schoemaker, Dorothee; Shafer, Andrea T; Steve, Trevor A; Suthana, Nanthia; Wang, Lei; Winterburn, Julie L; Yassa, Michael A; Yushkevich, Paul A; la Joie, Renaud

    2017-01-01

    The advent of high-resolution magnetic resonance imaging (MRI) has enabled in vivo research in a variety of populations and diseases on the structure and function of hippocampal subfields and subdivisions of the parahippocampal gyrus. Because of the many extant and highly discrepant segmentation protocols, comparing results across studies is difficult. To overcome this barrier, the Hippocampal Subfields Group was formed as an international collaboration with the aim of developing a harmonized protocol for manual segmentation of hippocampal and parahippocampal subregions on high-resolution MRI. In this commentary we discuss the goals for this protocol and the associated key challenges involved in its development. These include differences among existing anatomical reference materials, striking the right balance between reliability of measurements and anatomical validity, and the development of a versatile protocol that can be adopted for the study of populations varying in age and health. The commentary outlines these key challenges, as well as the proposed solution of each, with concrete examples from our working plan. Finally, with two examples, we illustrate how the harmonized protocol, once completed, is expected to impact the field by producing measurements that are quantitatively comparable across labs and by facilitating the synthesis of findings across different studies. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  10. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  11. Patch reef modeling: a comparison of Devonian and recent examples

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Precht, W.F.

    In reef research, models have been developed to define variations in the lithic and biotic development of facies. Walker and Alberstadt, and Hoffman and Narkiewicz developed models for growth of ancient reef communities. Although these models form a solid foundation by which patch reefs can be classed and zoned, they are neither complete nor accurate for all reef types. A comparison was made of Lower Devonian patch reefs from the Appalachian basin of New York, New Jersey, and Pennsylvania, and Holocene examples from the Bahamas and Florida Keys to identify the structure, orientation, community variability, and succession of the reefmore » biofacies. The complexion and genesis of the carbonate lithofacies were also studied. Results show similarities; these include the size, areal distribution, 3-D geometry, wave-resistance potential, lateral sequences of facies, sedimentary textures and structures, vertical zonation explained by growth from low-energy to high-energy regimes, biotic diversity, growth habit and form, and postmortem alteration. Thus, when used in conjunction with the traditional models, the recent can serve as the basis for a general model which include most patch reef types. However, these models should not be used as explicit analogs for all Phanerozoic reefs. Knowing and understanding the limitations of these comparative studies are essential to a fuller comprehension of the potential for variations which exist within and between the traditional models.« less

  12. Non-unique key B-Tree implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ries, D.R.

    1980-12-23

    The B-Trees are an indexed method to allow fast retrieval and order preserving updates to a FRAMIS relation based on a designated set of keys in the relation. A B-Tree access method is being implemented to provide indexed and sequential (in index order) access to FRAMIS relations. The implementation modifies the basic B-Tree structure to correctly allow multiple key values and still maintain the balanced page fill property of B-Trees. The data structures of the B-Tree are presented first, including the FRAMIS solution to the duplicate key value problem. Then the access level routines and utilities are presented. These routinesmore » include the original B-Tree creation; searching the B-Tree; and inserting, deleting, and replacing tuples on the B-Tree. In conclusion, the uses of the B-Tree access structures at the semantic level to enhance the FRAMIS performance are discussed. 10 figures.« less

  13. The Expanding Role of Traceability in Seafood: Tools and Key Initiatives.

    PubMed

    Lewis, Sara G; Boyle, Mariah

    2017-08-01

    In the last decade, a range of drivers within the seafood sector have incentivized the application of traceability to issues beyond food safety and inventory management. Some of the issues motivating the expanded use of traceability within the global seafood sector include: increased media attention on the legal and social risks within some seafood supply chains, governmental traceability requirements, private-sector sustainability commitments, and others. This article begins with an overview of these topics in the seafood industry, and why many nongovernment organizations (NGOs), companies, and government actors have turned to traceability as a tool to address them. We discuss how traceability connects to key requirements of environmental sustainability and social responsibility. Later, we review the range of traceability services, tools, software solutions, and the due diligence measures that are currently being leveraged within the seafood sector. The paper concludes with a discussion of several NGO- and industry-led traceability initiatives that are examples of seafood traceability improvements. © 2017 Institute of Food Technologists®.

  14. Near resonant bubble acoustic cross-section corrections, including examples from oceanography, volcanology, and biomedical ultrasound.

    PubMed

    Ainslie, Michael A; Leighton, Timothy G

    2009-11-01

    The scattering cross-section sigma(s) of a gas bubble of equilibrium radius R(0) in liquid can be written in the form sigma(s)=4piR(0) (2)[(omega(1) (2)omega(2)-1)(2)+delta(2)], where omega is the excitation frequency, omega(1) is the resonance frequency, and delta is a frequency-dependent dimensionless damping coefficient. A persistent discrepancy in the frequency dependence of the contribution to delta from radiation damping, denoted delta(rad), is identified and resolved, as follows. Wildt's [Physics of Sound in the Sea (Washington, DC, 1946), Chap. 28] pioneering derivation predicts a linear dependence of delta(rad) on frequency, a result which Medwin [Ultrasonics 15, 7-13 (1977)] reproduces using a different method. Weston [Underwater Acoustics, NATO Advanced Study Institute Series Vol. II, 55-88 (1967)], using ostensibly the same method as Wildt, predicts the opposite relationship, i.e., that delta(rad) is inversely proportional to frequency. Weston's version of the derivation of the scattering cross-section is shown here to be the correct one, thus resolving the discrepancy. Further, a correction to Weston's model is derived that amounts to a shift in the resonance frequency. A new, corrected, expression for the extinction cross-section is also derived. The magnitudes of the corrections are illustrated using examples from oceanography, volcanology, planetary acoustics, neutron spallation, and biomedical ultrasound. The corrections become significant when the bulk modulus of the gas is not negligible relative to that of the surrounding liquid.

  15. Nuclear Chemistry: Include It in Your Curriculum.

    ERIC Educational Resources Information Center

    Atwood, Charles H.; Sheline, R. K.

    1989-01-01

    Some of the topics that might be included in a nuclear chemistry section are explored. Offers radioactivity, closed shells in nuclei, energy of nuclear processes, nuclear reactions, and fission and fusion as topics of interest. Provided are ideas and examples for each. (MVL)

  16. 12 CFR 222.2 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Examples. 222.2 Section 222.2 Banks and Banking... (REGULATION V) General Provisions § 222.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes compliance with this part. Examples in a...

  17. 12 CFR 334.2 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Examples. 334.2 Section 334.2 Banks and Banking... General Provisions § 334.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes compliance with this part. Examples in a paragraph...

  18. 12 CFR 41.2 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Examples. 41.2 Section 41.2 Banks and Banking... Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes compliance with this part. Examples in a paragraph illustrate only the issue described in the...

  19. 12 CFR 571.2 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Examples. 571.2 Section 571.2 Banks and Banking... Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes compliance with this part. Examples in a paragraph illustrate only the issue described in the...

  20. 12 CFR 717.2 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Examples. 717.2 Section 717.2 Banks and Banking... Provisions § 717.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes compliance with this part. Examples in a paragraph illustrate only the...

  1. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  2. Drama in the Key Stage 3 English Framework. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    Effective drama teaching improves the following student skills: speaking and listening, reading and writing through developing thinking, communication skills, and critical analysis. Drama is part of young people's core curriculum entitlement in the United Kingdom. It is included in the English Curriculum Orders and in the Key Stage 3 Framework for…

  3. Hugh's book and Krogh's animals: biodiversity and textbook examples in teaching.

    PubMed

    Robischon, Marcel

    2014-09-01

    The medieval simile of the world as a book seems to anticipate modern notions of biodiversity as a key to insights and learning. This thought is translated into the practice of research in the August Krogh principle, which provides argumentative support for researchers who dare to venture beyond the range of commonly used models by choosing a new experimental organism for a particular scientific question. Established model organisms often hold high exploratory power to the researcher yet little explanatory power to the student, in particular when represented in a secondary source. This essay puts forward the suggestion that Krogh's principle applies to the use of organisms as instructional models and textbook examples too and encourages educators to continuously venture beyond established illustrative teaching examples in a continuous exploration of the "book of the world" and the "treasure house of nature." Copyright © 2014 The American Physiological Society.

  4. Hugh's book and Krogh's animals: biodiversity and textbook examples in teaching

    PubMed Central

    2014-01-01

    The medieval simile of the world as a book seems to anticipate modern notions of biodiversity as a key to insights and learning. This thought is translated into the practice of research in the August Krogh principle, which provides argumentative support for researchers who dare to venture beyond the range of commonly used models by choosing a new experimental organism for a particular scientific question. Established model organisms often hold high exploratory power to the researcher yet little explanatory power to the student, in particular when represented in a secondary source. This essay puts forward the suggestion that Krogh's principle applies to the use of organisms as instructional models and textbook examples too and encourages educators to continuously venture beyond established illustrative teaching examples in a continuous exploration of the “book of the world” and the “treasure house of nature.” PMID:25179607

  5. Key Facts about Higher Education in Washington. 2012

    ERIC Educational Resources Information Center

    Washington Higher Education Coordinating Board, 2012

    2012-01-01

    "Key Facts about Higher Education in Washington" provides vital data to chart higher education's progress and challenges. First published in 2002 by the Washington Higher Education Coordinating Board, this annual report highlights "Key Facts" about Washington's postsecondary institutions--including faculty, students, budgets,…

  6. Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-06-01

    One crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In a typical QKD protocol the users have to sacrifice part of their raw data to estimate the parameters of the communication channel as, for example, the error rate. This introduces a trade-off between the secret key rate and the accuracy of parameter estimation in the finite-size regime. Here we show that continuous-variable QKD is not subject to this constraint as the whole raw keys can be used for both parameter estimation and secret key generation, without compromising the security. First, we show that this property holds for measurement-device-independent (MDI) protocols, as a consequence of the fact that in a MDI protocol the correlations between Alice and Bob are postselected by the measurement performed by an untrusted relay. This result is then extended beyond the MDI framework by exploiting the fact that MDI protocols can simulate device-dependent one-way QKD with arbitrarily high precision.

  7. RNA-mediated regulation in Gram-positive pathogens: an overview punctuated with examples from the group A Streptococcus

    PubMed Central

    Miller, Eric W.; Cao, Tram N.; Pflughoeft, Kathryn J.; Sumby, Paul

    2014-01-01

    RNA-based mechanisms of regulation represent a ubiquitous class of regulators that are associated with diverse processes including nutrient sensing, stress response, modulation of horizontal gene transfer, and virulence factor expression. While better studied in Gram-negative bacteria, the literature is replete with examples of the importance of RNA-mediated regulatory mechanisms to the virulence and fitness of Gram-positives. Regulatory RNAs are classified as cis-acting, e.g. riboswitches, which modulate the transcription, translation, or stability of co-transcribed RNA, or trans-acting, e.g. small regulatory RNAs, which target separate mRNAs or proteins. The group A Streptococcus (GAS, Streptococcus pyogenes) is a Gram-positive bacterial pathogen from which several regulatory RNA mechanisms have been characterized. The study of RNA-mediated regulation in GAS has uncovered novel concepts with respect to how small regulatory RNAs may positively regulate target mRNA stability, and to how CRISPR RNAs are processed from longer precursors. This review provides an overview of RNA-mediated regulation in Gram-positive bacteria, and is highlighted with specific examples from GAS research. The key roles that these systems play in regulating bacterial virulence are discussed and future perspectives outlined. PMID:25091277

  8. Practical issues in quantum-key-distribution postprocessing

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.

    2010-01-01

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  9. Development of fluorescent probes based on protection-deprotection of the key functional groups for biological imaging.

    PubMed

    Tang, Yonghe; Lee, Dayoung; Wang, Jiaoliang; Li, Guanhan; Yu, Jinghua; Lin, Weiying; Yoon, Juyoung

    2015-08-07

    Recently, the strategy of protection-deprotection of functional groups has been widely employed to design fluorescent probes, as the protection-deprotection of functional groups often induces a marked change in electronic properties. Significant advances have been made in the development of analyte-responsive fluorescent probes based on the protection-deprotection strategy. In this tutorial review, we highlight the representative examples of small-molecule based fluorescent probes for bioimaging, which are operated via the protection-deprotection of key functional groups such as aldehyde, hydroxyl, and amino functional groups reported from 2010 to 2014. The discussion includes the general protection-deprotection methods for aldehyde, hydroxyl, or amino groups, as well as the design strategies, sensing mechanisms, and deprotection modes of the representative fluorescent imaging probes applied to bio-imaging.

  10. Examples of Pre-College Programs that Teach Sustainability

    NASA Astrophysics Data System (ADS)

    Passow, M. J.

    2015-12-01

    Programs to help pre-college students understand the importance of Sustainability can be found around the world. A key feature for many is the collaboration among educators, researchers, and business. Two examples will be described to indicate what is being done and goals for the future. "Educação para a Sustentabilidade" ("Education for Sustainability", http://sustentabilidade.colband.net.br/) developed at the Colegio Bandeirantes in Sao Paulo, Brazil, is a popular extracurricular offering at one of Brazil's top schools that empowers students to investigate major issues facing their country and the world. They recognized that merely knowing is insufficient, so they have created several efforts towards an "environmentally friendly, socially just, and economically viable" world. The Education Project for Sustainability Science interacts with students in various grade levels within the school, participates in sustainability initiatives in other parts of the nation, and communicates electronically with like-minded programs in other countries. A second example will spotlight the CHANGE Viewer (Climate and Health Analysis for Global Education Viewer, http://climatechangehumanhealth.org/), a visualization tool that uses NASA World Wind to explore climate science through socio-economic datasets. Collaboration among scientists, programmers, and classroom educators created a suite of activities available to teach about Food Security, Water Resources, Rising Sea Level, and other themes.

  11. Argo workstation: a key component of operational oceanography

    NASA Astrophysics Data System (ADS)

    Dong, Mingmei; Xu, Shanshan; Miao, Qingsheng; Yue, Xinyang; Lu, Jiawei; Yang, Yang

    2018-02-01

    Operational oceanography requires the quantity, quality, and availability of data set and the timeliness and effectiveness of data products. Without steady and strong operational system supporting, operational oceanography will never be proceeded far. In this paper we describe an integrated platform named Argo Workstation. It operates as a data processing and management system, capable of data collection, automatic data quality control, visualized data check, statistical data search and data service. After it is set up, Argo workstation provides global high quality Argo data to users every day timely and effectively. It has not only played a key role in operational oceanography but also set up an example for operational system.

  12. Consensus building for interlaboratory studies, key comparisons, and meta-analysis

    NASA Astrophysics Data System (ADS)

    Koepke, Amanda; Lafarge, Thomas; Possolo, Antonio; Toman, Blaza

    2017-06-01

    Interlaboratory studies in measurement science, including key comparisons, and meta-analyses in several fields, including medicine, serve to intercompare measurement results obtained independently, and typically produce a consensus value for the common measurand that blends the values measured by the participants. Since interlaboratory studies and meta-analyses reveal and quantify differences between measured values, regardless of the underlying causes for such differences, they also provide so-called ‘top-down’ evaluations of measurement uncertainty. Measured values are often substantially over-dispersed by comparison with their individual, stated uncertainties, thus suggesting the existence of yet unrecognized sources of uncertainty (dark uncertainty). We contrast two different approaches to take dark uncertainty into account both in the computation of consensus values and in the evaluation of the associated uncertainty, which have traditionally been preferred by different scientific communities. One inflates the stated uncertainties by a multiplicative factor. The other adds laboratory-specific ‘effects’ to the value of the measurand. After distinguishing what we call recipe-based and model-based approaches to data reductions in interlaboratory studies, we state six guiding principles that should inform such reductions. These principles favor model-based approaches that expose and facilitate the critical assessment of validating assumptions, and give preeminence to substantive criteria to determine which measurement results to include, and which to exclude, as opposed to purely statistical considerations, and also how to weigh them. Following an overview of maximum likelihood methods, three general purpose procedures for data reduction are described in detail, including explanations of how the consensus value and degrees of equivalence are computed, and the associated uncertainty evaluated: the DerSimonian-Laird procedure; a hierarchical Bayesian

  13. 17 CFR 248.102 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Examples. 248.102 Section 248... AND S-AM Regulation S-AM: Limitations on Affiliate Marketing § 248.102 Examples. The examples in this subpart are not exclusive. The examples in this subpart provide guidance concerning the rules' application...

  14. 29 CFR 4022.104 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Examples. 4022.104 Section 4022.104 Labor Regulations... Future Periods After Death § 4022.104 Examples. The following examples show how the rules in §§ 4022.101.... (1) Example 1: where surviving beneficiary predeceases participant. Ellen died before Charlie. As...

  15. 16 CFR 680.2 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Examples. 680.2 Section 680.2 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT AFFILIATE MARKETING § 680.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes...

  16. 16 CFR 680.2 - Examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Examples. 680.2 Section 680.2 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT AFFILIATE MARKETING § 680.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes...

  17. 16 CFR 680.2 - Examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Examples. 680.2 Section 680.2 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT AFFILIATE MARKETING § 680.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes...

  18. 16 CFR 680.2 - Examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Examples. 680.2 Section 680.2 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT AFFILIATE MARKETING § 680.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes...

  19. 16 CFR 680.2 - Examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Examples. 680.2 Section 680.2 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT AFFILIATE MARKETING § 680.2 Examples. The examples in this part are not exclusive. Compliance with an example, to the extent applicable, constitutes...

  20. Materializing Heart Regeneration: Biomimicry of Key Observations in Cell Transplantation Therapies and Natural Cardiac Regeneration

    NASA Astrophysics Data System (ADS)

    Kong, Yen P.; Jongpaiboonkit, Leena

    2016-07-01

    New regenerative paradigms are needed to address the growing global problem of heart failure as existing interventions are unsatisfactory. Outcomes from the current paradigm of cell transplantation have not been stellar but the mechanistic knowledge learned from them is instructive in the development of future paradigms. An emerging biomaterial-based approach incorporating key mechanisms and additional ones scrutinized from the process of natural heart regeneration in zebrafish may become the next evolution in cardiac repair. We highlight, with examples, tested key concepts and pivotal ones that may be integrated into a successful therapy.

  1. Examples of measurement uncertainty evaluations in accordance with the revised GUM

    NASA Astrophysics Data System (ADS)

    Runje, B.; Horvatic, A.; Alar, V.; Medic, S.; Bosnjakovic, A.

    2016-11-01

    The paper presents examples of the evaluation of uncertainty components in accordance with the current and revised Guide to the expression of uncertainty in measurement (GUM). In accordance with the proposed revision of the GUM a Bayesian approach was conducted for both type A and type B evaluations.The law of propagation of uncertainty (LPU) and the law of propagation of distribution applied through the Monte Carlo method, (MCM) were used to evaluate associated standard uncertainties, expanded uncertainties and coverage intervals. Furthermore, the influence of the non-Gaussian dominant input quantity and asymmetric distribution of the output quantity y on the evaluation of measurement uncertainty was analyzed. In the case when the probabilistically coverage interval is not symmetric, the coverage interval for the probability P is estimated from the experimental probability density function using the Monte Carlo method. Key highlights of the proposed revision of the GUM were analyzed through a set of examples.

  2. 29 CFR 4022.95 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Examples. 4022.95 Section 4022.95 Labor Regulations... IN TERMINATED SINGLE-EMPLOYER PLANS Certain Payments Owed Upon Death § 4022.95 Examples. The following examples show how the rules in §§ 4022.91 through 4022.94 apply. For examples on how these rules...

  3. 42 CFR 408.26 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Examples. 408.26 Section 408.26 Public Health... PREMIUMS FOR SUPPLEMENTARY MEDICAL INSURANCE Amount of Monthly Premiums § 408.26 Examples. Example 1. Mr. J... 10 percent greater than if he had enrolled in his initial enrollment period. Example 2. Mr. V, who...

  4. Reaction schemes visualized in network form: the syntheses of strychnine as an example.

    PubMed

    Proudfoot, John R

    2013-05-24

    Representation of synthesis sequences in a network form provides an effective method for the comparison of multiple reaction schemes and an opportunity to emphasize features such as reaction scale that are often relegated to experimental sections. An example of data formatting that allows construction of network maps in Cytoscape is presented, along with maps that illustrate the comparison of multiple reaction sequences, comparison of scaffold changes within sequences, and consolidation to highlight common key intermediates used across sequences. The 17 different synthetic routes reported for strychnine are used as an example basis set. The reaction maps presented required a significant data extraction and curation, and a standardized tabular format for reporting reaction information, if applied in a consistent way, could allow the automated combination of reaction information across different sources.

  5. CADDIS Volume 3. Examples and Applications: Analytical Examples

    EPA Pesticide Factsheets

    Examples illustrating the use of statistical analysis to support different types of evidence, stream temperature, temperature inferred from macroinverterbate, macroinvertebrate responses, zinc concentrations, observed trait characteristics.

  6. The Importance of Prior Knowledge when Comparing Examples: Influences on Conceptual and Procedural Knowledge of Equation Solving

    ERIC Educational Resources Information Center

    Rittle-Johnson, Bethany; Star, Jon R.; Durkin, Kelley

    2009-01-01

    Comparing multiple examples typically supports learning and transfer in laboratory studies and is considered a key feature of high-quality mathematics instruction. This experimental study investigated the importance of prior knowledge in learning from comparison. Seventh- and 8th-grade students (N = 236) learned to solve equations by comparing…

  7. Key Principles of Superfund Remedy Selection

    EPA Pesticide Factsheets

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  8. Hamming's "open doors" and group creativity as keys to scientific excellence: the example of Cambridge.

    PubMed

    Erren, Thomas C

    2008-01-01

    Dr. Charlton used diverse approaches to identify research institutions which provided home to outstanding scientists and work. One intriguing example of long-lasting scientific excellence is Cambridge with 19 Nobel laureates who worked at the University or at the MRC Molecular Biology Unit when they received the prize between 1947 and 2006. With specific reference to Cambridge, I would like to complement the primarily quantitative assessment and offer considerations as to why and how research achievements may have clustered in space and time. Indeed, observations voiced by the mathematician Richard Hamming as to how great research can be pursued offer explanations for the series of great science in the UK. In my view, the most important determinant of the clustering may be illustrated by Hamming's fitting picture of "open doors": working in environments with the doors open allows constant interactions with peers with various disciplinary backgrounds, and thus fast avoidance of detours or dead ends in science and, ultimately, a focus on and the solution of problems of paramount, rather than of tangential, importance. Narrative insights into a strong argumentative tradition at Cambridge provided by Drs. Watson and Magueijo between 1968 and 2003 are in line with Hamming's suggestion and the value of group creativity. In the internet age with abundant interactions beyond home institutions we should not be surprised if clusters of great science were no longer confined to the usual suspect institutions which were awarded disproportionally with Nobel prizes in the past.

  9. Evaluation of effectiveness of information systems implementation in organization (by example of ERP-systems)

    NASA Astrophysics Data System (ADS)

    Demyanova, O. V.; Andreeva, E. V.; Sibgatullina, D. R.; Kireeva-Karimova, A. M.; Gafurova, A. Y.; Zakirova, Ch S.

    2018-05-01

    ERP in a modern enterprise information system allowed optimizing internal business processes, reducing production costs and increasing the attractiveness of enterprises for investors. It is an important component of success in the competition and an important condition for attracting investments in the key sector of the state. A vivid example of these systems are enterprise information systems using the methodology of ERP (Enterprise Resource Planning - enterprise resource planning). ERP is an integrated set of methods, processes, technologies and tools. It is based on: supply chain management; advanced planning and scheduling; sales automation; tool responsible for configuring; final resource planning; intelligence business; OLAP technology; block e- Commerce; management of product data. The main purpose of ERP systems is the automation of interrelated processes of planning, accounting and management in key areas of the company. ERP systems are automated systems that effectively address complex problems, including optimal allocation of business resources, ensuring quick and efficient delivery of goods and services to the consumer. Knowledge embedded in ERP systems provided enterprise-wide automation to introduce the activities of all functional departments of the company as a single complex system. At the level of quality estimates, most managers understand that the implementations of ERP systems is a necessary and useful procedure. Assessment of the effectiveness of the information systems implementation is relevant.

  10. Accounting for multiple sources of uncertainty in impact assessments: The example of the BRACE study

    NASA Astrophysics Data System (ADS)

    O'Neill, B. C.

    2015-12-01

    Assessing climate change impacts often requires the use of multiple scenarios, types of models, and data sources, leading to a large number of potential sources of uncertainty. For example, a single study might require a choice of a forcing scenario, climate model, bias correction and/or downscaling method, societal development scenario, model (typically several) for quantifying elements of societal development such as economic and population growth, biophysical model (such as for crop yields or hydrology), and societal impact model (e.g. economic or health model). Some sources of uncertainty are reduced or eliminated by the framing of the question. For example, it may be useful to ask what an impact outcome would be conditional on a given societal development pathway, forcing scenario, or policy. However many sources of uncertainty remain, and it is rare for all or even most of these sources to be accounted for. I use the example of a recent integrated project on the Benefits of Reduced Anthropogenic Climate changE (BRACE) to explore useful approaches to uncertainty across multiple components of an impact assessment. BRACE comprises 23 papers that assess the differences in impacts between two alternative climate futures: those associated with Representative Concentration Pathways (RCPs) 4.5 and 8.5. It quantifies difference in impacts in terms of extreme events, health, agriculture, tropical cyclones, and sea level rise. Methodologically, it includes climate modeling, statistical analysis, integrated assessment modeling, and sector-specific impact modeling. It employs alternative scenarios of both radiative forcing and societal development, but generally uses a single climate model (CESM), partially accounting for climate uncertainty by drawing heavily on large initial condition ensembles. Strengths and weaknesses of the approach to uncertainty in BRACE are assessed. Options under consideration for improving the approach include the use of perturbed physics

  11. A zebrafish model of PINK1 deficiency reveals key pathway dysfunction including HIF signaling.

    PubMed

    Priyadarshini, M; Tuimala, J; Chen, Y C; Panula, P

    2013-06-01

    The PTEN induced putative kinase 1 (PINK1) gene is mutated in patients with hereditary early onset Parkinson's disease (PD). The targets of PINK1 and the mechanisms in PD are still not fully understood. Here, we carried out a high-throughput and unbiased microarray study to identify novel functions and pathways for PINK1. In larval zebrafish, the function of pink1 was inhibited using splice-site morpholino oligonucleotides and the samples were hybridized on a two-color gene expression array. We found 177 significantly altered genes in pink1 morphants compared with the uninjected wildtype controls (log fold change values from -1.6 to +0.9). The five most prominent pathways based on critical biological processes and key toxicological responses were hypoxia-inducible factor (HIF) signaling, TGF-β signaling, mitochondrial dysfunction, RAR activation, and biogenesis of mitochondria. Furthermore, we verified that potentially important genes such as hif1α, catalase, SOD3, and atp1a2a were downregulated in pink1 morphants, whereas genes such as fech, pax2a, and notch1a were upregulated. Some of these genes have been found to play important roles in HIF signaling pathways. The pink1 morphants were found to have heart dysfunction, increased erythropoiesis, increased expression of vascular endothelial growth factors, and increased ROS. Our findings suggest that a lack of pink1 in zebrafish alters many vital and critical pathways in addition to the HIF signaling pathway. Copyright © 2013 Elsevier Inc. All rights reserved.

  12. Aristotle's Example: The Rhetorical Induction.

    ERIC Educational Resources Information Center

    Benoit, William Lyon

    1980-01-01

    Examines the concept of example in Aristotle's inventional theory. Rejects recent claims that the example reasons from part to part, without a mediating generalization, and then explicates Aristotle's view of the example. (JMF)

  13. Gas storage materials, including hydrogen storage materials

    DOEpatents

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2013-02-19

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  14. Gas storage materials, including hydrogen storage materials

    DOEpatents

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2014-11-25

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material, such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  15. Key to trematodes reported in waterfowl

    USGS Publications Warehouse

    McDonald, Malcolm Edwin

    1981-01-01

    The trematodes show the greatest variety of forms among the helminth parasites of waterfowl, including over half of all species reported; sometimes this group also includes the greatest part of the worms in a single bird. Over 500 species of trematodes have been reported in waterfowl. Almost all of these have been included in the present set of keys; it was not possible, however, to obtain the descriptions of a few forms (7 of 525).

  16. Opportunities for Enhanced Strategic Use of Surveys, Medical Records, and Program Data for HIV Surveillance of Key Populations: Scoping Review

    PubMed Central

    Baral, Stefan D; Edwards, Jessie K; Zadrozny, Sabrina; Hargreaves, James; Zhao, Jinkou; Sabin, Keith

    2018-01-01

    Background Normative guidelines from the World Health Organization recommend tracking strategic information indicators among key populations. Monitoring progress in the global response to the HIV epidemic uses indicators put forward by the Joint United Nations Programme on HIV/AIDS. These include the 90-90-90 targets that require a realignment of surveillance data, routinely collected program data, and medical record data, which historically have developed separately. Objective The aim of this study was to describe current challenges for monitoring HIV-related strategic information indicators among key populations ((men who have sex with men [MSM], people in prisons and other closed settings, people who inject drugs, sex workers, and transgender people) and identify future opportunities to enhance the use of surveillance data, programmatic data, and medical record data to describe the HIV epidemic among key populations and measure the coverage of HIV prevention, care, and treatment programs. Methods To provide a historical perspective, we completed a scoping review of the expansion of HIV surveillance among key populations over the past three decades. To describe current efforts, we conducted a review of the literature to identify published examples of SI indicator estimates among key populations. To describe anticipated challenges and future opportunities to improve measurement of strategic information indicators, particularly from routine program and health data, we consulted participants of the Third Global HIV Surveillance Meeting in Bangkok, where the 2015 World Health Organization strategic information guidelines were launched. Results There remains suboptimal alignment of surveillance and programmatic data, as well as routinely collected medical records to facilitate the reporting of the 90-90-90 indicators for HIV among key populations. Studies (n=3) with estimates of all three 90-90-90 indicators rely on cross-sectional survey data. Programmatic data and

  17. LabKey Server: an open source platform for scientific data integration, analysis and collaboration.

    PubMed

    Nelson, Elizabeth K; Piehler, Britt; Eckels, Josh; Rauch, Adam; Bellew, Matthew; Hussey, Peter; Ramsay, Sarah; Nathe, Cory; Lum, Karl; Krouse, Kevin; Stearns, David; Connolly, Brian; Skillman, Tom; Igra, Mark

    2011-03-09

    Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350 organizations. It tracks

  18. LabKey Server: An open source platform for scientific data integration, analysis and collaboration

    PubMed Central

    2011-01-01

    Background Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. Results To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350

  19. Generic Example Proving Criteria for All

    ERIC Educational Resources Information Center

    Yopp, David; Ely, Rob; Johnson­-Leung, Jennifer

    2015-01-01

    We review literature that discusses generic example proving and highlight ambiguities that pervade our research community's discourse about generic example arguments. We distinguish between pedagogical advice for choosing good examples that can serve as generic examples when teaching and advice for developing generic example arguments. We provide…

  20. Interprofessional collaboration within Canadian integrative healthcare clinics: Key components.

    PubMed

    Gaboury, Isabelle; Bujold, Mathieu; Boon, Heather; Moher, David

    2009-09-01

    Research shows that interprofessional collaboration has become an important factor in the implementation of effective healthcare models. To date, the literature has not focused on the collaboration between medical doctors and complementary and alternative medicine (CAM) healthcare practitioners, an example of interdisciplinary collaboration called integrative healthcare (IHC). Drawing on in-depth, semi-standardized interviews conducted with 21 practitioners working in Canadian IHC clinics, this paper explored and interpreted how IHC is experienced by those working in Canadian IHC clinics. The interview questions and analysis were guided by the Input, Process, Output conceptual framework drawn from the organizational management theory (McGrath, J. E. (1964). Social psychology: A brief introduction. New York: Holt, Rinehart and Winston.) to study collaboration within teams. We found that constructs contributing to collaboration included practitioners' attitudes and educational background, as well as external factors such as the healthcare system and financial pressures. Major processes affecting collaboration included communication, patient referral and power relationships. These determinants of collaboration were found to result in learning opportunities for practitioners, modified burden of work and ultimately, higher affective commitment toward the clinic. These constructs serve as a guide for further investigation of interprofessional collaboration within an IHC clinic. This exploration of interprofessional collaboration in IHC identified a broad array of key factors associated with interprofessional collaboration. These factors are critical to better understand the functioning of IHC clinics, and provide guidance for creation or maintenance of successful clinics.

  1. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    PubMed Central

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  2. Benthic boundary layer processes in the Lower Florida Keys

    USGS Publications Warehouse

    Lavoie, D.L.; Richardson, M.D.; Holmes, C.

    1997-01-01

    This special issue of Geo-Marine Letters, "Benthic Boundary Layer Processes in the Lower Florida Keys," includes 12 papers that present preliminary results from the Key West Campaign. The Dry Tortugas and Marquesas Keys test sites were selected by a group of 115 scientists and technicians to study benthic boundary layer processes in a carbonate environment controlled by bioturbation and biogeochemical processes. Major activities included remote sediment classification; high-frequency acoustic scattering experiments; sediment sampling for radiological, geotechnical, biological, biogeochemical, physical, and geoacoustic studies; and hydrodynamic studies using an instrumented tetrapod. All these data are being used to improve our understanding of the effects of environmental processes on sediment structure and behavior.

  3. The value of forecasting key-decision variables for rain-fed farming

    NASA Astrophysics Data System (ADS)

    Winsemius, Hessel; Werner, Micha

    2013-04-01

    Rain-fed farmers are highly vulnerable to variability in rainfall. Timely knowledge of the onset of the rainy season, the expected amount of rainfall and the occurrence of dry spells can help rain-fed farmers to plan the cropping season. Seasonal probabilistic weather forecasts may provide such information to farmers, but need to provide reliable forecasts of key variables with which farmers can make decisions. In this contribution, we present a new method to evaluate the value of meteorological forecasts in predicting these key variables. The proposed method measures skill by assessing whether a forecast was useful to this decision. This is done by taking into account the required accuracy of timing of the event to make the decision useful. The method progresses the estimate of forecast skill to forecast value by taking into account the required accuracy that is needed to make the decision valuable, based on the cost/loss ratio of possible decisions. The method is applied over the Limpopo region in Southern Africa. We demonstrate the method using the example of temporary water harvesting techniques. Such techniques require time to construct and must be ready long enough before the occurrence of a dry spell to be effective. The value of the forecasts to the decision used as an example is shown to be highly sensitive to the accuracy in the timing of forecasted dry spells, and the tolerance in the decision to timing error. The skill with which dry spells can be predicted is shown to be higher in some parts of the basin, indicating that these forecasts have higher value for the decision in those parts than in others. Through assessing the skill of forecasting key decision variables to the farmers we show that it is easier to understand if the forecasts have value in reducing risk, or if other adaptation strategies should be implemented.

  4. What Would Buffy Do? The Use of Popular Culture Examples in Undergraduate Library Instruction.

    ERIC Educational Resources Information Center

    Marshall, Jerilyn

    This paper presents results of a survey that gathered information on the use of popular culture examples in college library instruction sessions, including the types of popular culture materials currently being used as examples, the types of courses in which they are used, the librarians' purposes in using the examples, and the librarians'…

  5. Transforming Passive Receptivity of Knowledge into Deep Learning Experiences at the Undergraduate Level: An Example from Music Theory

    ERIC Educational Resources Information Center

    Ferenc, Anna

    2015-01-01

    This article discusses transformation of passive knowledge receptivity into experiences of deep learning in a lecture-based music theory course at the second-year undergraduate level through implementation of collaborative projects that evoke natural critical learning environments. It presents an example of such a project, addresses key features…

  6. Designing worked examples for learning tangent lines to circles

    NASA Astrophysics Data System (ADS)

    Retnowati, E.; Marissa

    2018-03-01

    Geometry is a branch of mathematics that deals with shape and space, including the circle. A difficult topic in the circle may be the tangent line to circle. This is considered a complex material since students have to simultaneously apply several principles to solve the problems, these are the property of circle, definition of the tangent, measurement and Pythagorean theorem. This paper discusses designs of worked examples for learning tangent line to circles and how to apply this design to an effective and efficient instructional activity. When students do not have sufficient prior knowledge, solving tangent problems might be clumsy, and as a consequence, the problem-solving activity hinders learning. According to a Cognitive Load Theory, learning occurs when students can construct new knowledge based on the relevant knowledge previously learned. When the relevant knowledge is unavailable, providing students with the worked example is suggested. Worked example may reduce unproductive process during learning that causes extraneous cognitive load. Nevertheless, worked examples must be created in such a way facilitate learning.

  7. Interlinking journal and wiki publications through joint citation: Working examples from ZooKeys and Plazi on Species-ID

    PubMed Central

    Penev, Lyubomir; Hagedorn, Gregor; Mietchen, Daniel; Georgiev, Teodor; Stoev, Pavel; Sautter, Guido; Agosti, Donat; Plank, Andreas; Balke, Michael; Hendrich, Lars; Erwin, Terry

    2011-01-01

    Abstract Scholarly publishing and citation practices have developed largely in the absence of versioned documents. The digital age requires new practices to combine the old and the new. We describe how the original published source and a versioned wiki page based on it can be reconciled and combined into a single citation reference. We illustrate the citation mechanism by way of practical examples focusing on journal and wiki publishing of taxon treatments. Specifically, we discuss mechanisms for permanent cross-linking between the static original publication and the dynamic, versioned wiki, as well as for automated export of journal content to the wiki, to reduce the workload on authors, for combining the journal and the wiki citation and for integrating it with the attribution of wiki contributors. PMID:21594104

  8. 26 CFR 1.826-7 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Examples. 1.826-7 Section 1.826-7 Internal....826-7 Examples. The application of section 826 may be illustrated by the following examples: Example 1... percent of 8 exceeds 25 percent of 0), may remain in such account beyond the taxable year 1968. Example 2...

  9. Data Access, Interoperability and Sustainability: Key Challenges for the Evolution of Science Capabilities

    NASA Astrophysics Data System (ADS)

    Walton, A. L.

    2015-12-01

    In 2016, the National Science Foundation (NSF) will support a portfolio of activities and investments focused upon challenges in data access, interoperability, and sustainability. These topics are fundamental to science questions of increasing complexity that require multidisciplinary approaches and expertise. Progress has become tractable because of (and sometimes complicated by) unprecedented growth in data (both simulations and observations) and rapid advances in technology (such as instrumentation in all aspects of the discovery process, together with ubiquitous cyberinfrastructure to connect, compute, visualize, store, and discover). The goal is an evolution of capabilities for the research community based on these investments, scientific priorities, technology advances, and policies. Examples from multiple NSF directorates, including investments by the Advanced Cyberinfrastructure Division, are aimed at these challenges and can provide the geosciences research community with models and opportunities for participation. Implications for the future are highlighted, along with the importance of continued community engagement on key issues.

  10. Informed Choice? How the United Kingdom's Key Information Set Fails to Represent Pedagogy to Potential Students

    ERIC Educational Resources Information Center

    Barefoot, Helen; Oliver, Martin; Mellar, Harvey

    2016-01-01

    This paper explores the ways in which information about course pedagogy has been represented to potential students through national descriptors and specifications such as the United Kingdom's Key Information Set. It examines the extent to which such descriptors provide helpful information about pedagogy, for example innovative uses of technology.…

  11. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  12. Key Issues in Instructional Computer Graphics.

    ERIC Educational Resources Information Center

    Wozny, Michael J.

    1981-01-01

    Addresses key issues facing universities which plan to establish instructional computer graphics facilities, including computer-aided design/computer aided manufacturing systems, role in curriculum, hardware, software, writing instructional software, faculty involvement, operations, and research. Thirty-seven references and two appendices are…

  13. 48 CFR 9.508 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Examples. 9.508 Section 9... CONTRACTOR QUALIFICATIONS Organizational and Consultant Conflicts of Interest 9.508 Examples. The examples in... officer apply the general rules in 9.505 to individual contract situations. (a) Company A agrees to...

  14. 17 CFR 248.102 - Examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Examples. 248.102 Section 248.102 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P, S-AM, AND S-ID Regulation S-AM: Limitations on Affiliate Marketing § 248.102 Examples. The examples...

  15. 17 CFR 248.102 - Examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Examples. 248.102 Section 248.102 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-AM: Limitations on Affiliate Marketing § 248.102 Examples. The examples in this...

  16. 17 CFR 248.102 - Examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Examples. 248.102 Section 248.102 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-AM: Limitations on Affiliate Marketing § 248.102 Examples. The examples in this...

  17. 17 CFR 248.102 - Examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Examples. 248.102 Section 248.102 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-AM: Limitations on Affiliate Marketing § 248.102 Examples. The examples in this...

  18. Stages of Plasma Cell Neoplasms (Including Multiple Myeloma)

    MedlinePlus

    ... Health Professional Plasma Cell Neoplasms Treatment Research Plasma Cell Neoplasms (Including Multiple Myeloma) Treatment (PDQ®)–Patient Version General Information About Plasma Cell Neoplasms Go to Health Professional Version Key Points ...

  19. Rebuilding DEMATEL threshold value: an example of a food and beverage information system.

    PubMed

    Hsieh, Yi-Fang; Lee, Yu-Cheng; Lin, Shao-Bin

    2016-01-01

    This study demonstrates how a decision-making trial and evaluation laboratory (DEMATEL) threshold value can be quickly and reasonably determined in the process of combining DEMATEL and decomposed theory of planned behavior (DTPB) models. Models are combined to identify the key factors of a complex problem. This paper presents a case study of a food and beverage information system as an example. The analysis of the example indicates that, given direct and indirect relationships among variables, if a traditional DTPB model only simulates the effects of the variables without considering that the variables will affect the original cause-and-effect relationships among the variables, then the original DTPB model variables cannot represent a complete relationship. For the food and beverage example, a DEMATEL method was employed to reconstruct a DTPB model and, more importantly, to calculate reasonable DEMATEL threshold value for determining additional relationships of variables in the original DTPB model. This study is method-oriented, and the depth of investigation into any individual case is limited. Therefore, the methods proposed in various fields of study should ideally be used to identify deeper and more practical implications.

  20. Key Concepts in Microbial Oceanography

    NASA Astrophysics Data System (ADS)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  1. LabKey Server NAb: A tool for analyzing, visualizing and sharing results from neutralizing antibody assays

    PubMed Central

    2011-01-01

    Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb) assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the LabKey Server NAb tool without

  2. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    NASA Astrophysics Data System (ADS)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  3. Implementing ethics in the professions: examples from environmental epidemiology.

    PubMed

    Soskolne, Colin L; Sieswerda, Lee E

    2003-04-01

    The need to integrate ethics into professional life, from the grassroots up, has been recognized, and a comprehensive ethics program has been proposed as a model. The model includes the four dimensions of: consensus building, ethics guidelines development and review, education, and implementation. The activities of the International Society for Environmental Epidemiology (ISEE) are presented as examples and compared with the proposed model. Several innovative activities are described and incentives for ethical professional conduct are highlighted. The examples are provided for emulation by other professional organizations in the hope that, thereby, greater protection of the public interest will be achieved.

  4. Best practices for learning video concept detectors from social media examples (Author’s Manuscript)

    DTIC Science & Technology

    2014-05-23

    Best practices for learning video concept detectors from social media examples Svetlana Kordumova & Xirong Li & Cees G. M. Snoek Received: 25...September 2013 /Revised: 3 April 2014 /Accepted: 25 April 2014 # Springer Science+Business Media New York 2014 Abstract Learning video concept detectors from...While the potential has been recognized by many, and progress on the topic has been impressive, we argue that key questions crucial to know how to learn

  5. Key to nematodes reported in waterfowl

    USGS Publications Warehouse

    McDonald, Malcolm E.

    1974-01-01

    This key, covering 171 species and subspecies of nematodes in 49 genera, is based on the the listings in the author's "Catalogue of Helminths of Waterfowl" (McDonald, 1969b), but includes 19 additional forms from his continuing survey of new literature.

  6. Which Book and Why: Using Book Bands and Book Levels for Guided Reading in Key Stage 1 [Includes CD-ROM

    ERIC Educational Resources Information Center

    Bodman, Sue, Ed.; Franklin, Glen, Ed.

    2014-01-01

    We want all children to love reading, and Which Book and Why demonstrates how effective guided reading for children in Foundation Stage and Key Stage 1 can help teachers make this happen. Balancing theory and practice, this book explores how schools and teachers can implement guided reading more confidently and more effectively. Which Book and Why…

  7. Novel view synthesis by interpolation over sparse examples

    NASA Astrophysics Data System (ADS)

    Liang, Bodong; Chung, Ronald C.

    2006-01-01

    Novel view synthesis (NVS) is an important problem in image rendering. It involves synthesizing an image of a scene at any specified (novel) viewpoint, given some images of the scene at a few sample viewpoints. The general understanding is that the solution should bypass explicit 3-D reconstruction of the scene. As it is, the problem has a natural tie to interpolation, despite that mainstream efforts on the problem have been adopting formulations otherwise. Interpolation is about finding the output of a function f(x) for any specified input x, given a few input-output pairs {(xi,fi):i=1,2,3,...,n} of the function. If the input x is the viewpoint, and f(x) is the image, the interpolation problem becomes exactly NVS. We treat the NVS problem using the interpolation formulation. In particular, we adopt the example-based everything or interpolation (EBI) mechanism-an established mechanism for interpolating or learning functions from examples. EBI has all the desirable properties of a good interpolation: all given input-output examples are satisfied exactly, and the interpolation is smooth with minimum oscillations between the examples. We point out that EBI, however, has difficulty in interpolating certain classes of functions, including the image function in the NVS problem. We propose an extension of the mechanism for overcoming the limitation. We also present how the extended interpolation mechanism could be used to synthesize images at novel viewpoints. Real image results show that the mechanism has promising performance, even with very few example images.

  8. ChoiceKey: a real-time speech recognition program for psychology experiments with a small response set.

    PubMed

    Donkin, Christopher; Brown, Scott D; Heathcote, Andrew

    2009-02-01

    Psychological experiments often collect choice responses using buttonpresses. However, spoken responses are useful in many cases-for example, when working with special clinical populations, or when a paradigm demands vocalization, or when accurate response time measurements are desired. In these cases, spoken responses are typically collected using a voice key, which usually involves manual coding by experimenters in a tedious and error-prone manner. We describe ChoiceKey, an open-source speech recognition package for MATLAB. It can be optimized by training for small response sets and different speakers. We show ChoiceKey to be reliable with minimal training for most participants in experiments with two different responses. Problems presented by individual differences, and occasional atypical responses, are examined, and extensions to larger response sets are explored. The ChoiceKey source files and instructions may be downloaded as supplemental materials for this article from brm.psychonomic-journals.org/content/supplemental.

  9. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    PubMed

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  10. Key Performance Indicators for Primary Schools.

    ERIC Educational Resources Information Center

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  11. Empowering Globally Integrated Operations and Mission Command: Revisiting Key West

    DTIC Science & Technology

    2013-03-01

    depended on coordination between commanders. Examples include Captain Thomas McDonough’s 4 U.S...Hedgehog Concept In his book, Good to Great, which describes how good organizations become great ones, Jim Collins borrows an example from an Isaiah ...that it executes with perfection—curling into a ball with its spikes outward. 62 In the words of Archilochus (first line in quotes), Isaiah Berlin

  12. [Key informers. When and How?].

    PubMed

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  13. Coordinating Council. Sixth Meeting: Who Are Our Key Users?

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This NASA Scientific and Technical Information Program Coordinating Council meeting deals with the topic 'Who are our key users?' Presentations were made on the following subtopics: Key users: Who uses the system the most, Who orders the most documents, Users: What do we know about them?, NASA/DOD Aerospace Knowledge Diffusion research project on 'Potential key users', How we meet the user's needs, and STI Council user requirements update. Summaries of discussions after the presentations are included along with visuals for the presentations.

  14. Limitations and Functions: Four Examples of Integrating Thermodynamics

    ERIC Educational Resources Information Center

    Chang, Wheijen

    2011-01-01

    Physics students are usually unaware of the limitations and functions of related principles, and they tend to adopt "hot formulas" inappropriately. This paper introduces four real-life examples for bridging five principles, from fluids to thermodynamics, including (1) buoyant force, (2) thermal expansion, (3) the ideal-gas law, (4) the 1st law,…

  15. Distillation of secret-key from a class of compound memoryless quantum sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boche, H., E-mail: boche@tum.de; Janßen, G., E-mail: gisbert.janssen@tum.de

    We consider secret-key distillation from tripartite compound classical-quantum-quantum (cqq) sources with free forward public communication under strong security criterion. We design protocols which are universally reliable and secure in this scenario. These are shown to achieve asymptotically optimal rates as long as a certain regularity condition is fulfilled by the set of its generating density matrices. We derive a multi-letter formula which describes the optimal forward secret-key capacity for all compound cqq sources being regular in this sense. We also determine the forward secret-key distillation capacity for situations where the legitimate sending party has perfect knowledge of his/her marginal statemore » deriving from the source statistics. In this case regularity conditions can be dropped. Our results show that the capacities with and without the mentioned kind of state knowledge are equal as long as the source is generated by a regular set of density matrices. We demonstrate that regularity of cqq sources is not only a technical but also an operational issue. For this reason, we give an example of a source which has zero secret-key distillation capacity without sender knowledge, while achieving positive rates is possible if sender marginal knowledge is provided.« less

  16. Transformation of Learning in Education and Training: Key Qualifications Revisited. CEDEFOP Reference Series.

    ERIC Educational Resources Information Center

    Kamarainen, Pekka, Ed.; Attwell, Graham, Ed.; Brown, Alan, Ed.

    This book contains 15 papers examining European approaches to the theme of key qualifications. The following papers are included: "Key Qualifications Revisited: An Introduction" (Pekka Kamarainen); "Exploring Key Qualifications: Context, Theory, and Practice in Europe" (Pekka Kamarainen); "Rethinking Key Qualifications:…

  17. Space physics education via examples in the undergraduate physics curriculum

    NASA Astrophysics Data System (ADS)

    Martin, R.; Holland, D. L.

    2011-12-01

    The field of space physics is rich with examples of basic physics and analysis techniques, yet it is rarely seen in physics courses or textbooks. As space physicists in an undergraduate physics department we like to use research to inform teaching, and we find that students respond well to examples from magnetospheric science. While we integrate examples into general education courses as well, this talk will focus on physics major courses. Space physics examples are typically selected to illustrate a particular concept or method taught in the course. Four examples will be discussed, from an introductory electricity and magnetism course, a mechanics/nonlinear dynamics course, a computational physics course, and a plasma physics course. Space physics provides examples of many concepts from introductory E&M, including the application of Faraday's law to terrestrial magnetic storm effects and the use of the basic motion of charged particles as a springboard to discussion of the inner magnetosphere and the aurora. In the mechanics and nonlinear dynamics courses, the motion of charged particles in a magnetotail current sheet magnetic field is treated as a Newtonian dynamical system, illustrating the Poincaré surface-of-section technique, the partitioning of phase space, and the KAM theorem. Neural network time series analysis of AE data is used as an example in the computational physics course. Finally, among several examples, current sheet particle dynamics is utilized in the plasma physics course to illustrate the notion of adiabatic/guiding center motion and the breakdown of the adiabatic approximation. We will present short descriptions of our pedagogy and student assignments in this "backdoor" method of space physics education.

  18. The Genus Cerion (Gastropoda: Cerionidae) in the Florida Keys

    PubMed Central

    2015-01-01

    The systematic relationships and phylogeography of Cerion incanum, the only species of Cerion native to the Florida Keys, are reviewed based on partial sequences of the mitochondrial COI and 16S genes derived from 18 populations spanning the range of this species and including the type localities of all four described subspecies. Our samples included specimens of Cerion casablancae, a species introduced to Indian Key in 1912, and a population of C. incanum x C. casablancae hybrids descended from a population of C. casablancae introduced onto Bahia Honda Key in the same year. Molecular data did not support the partition of C. incanum into subspecies, nor could populations be apportioned reliably into subspecies based on morphological features used to define the subspecies. Phylogenetic analyses affirmed the derived relationship of C. incanum relative to other cerionids, and indicated a Bahamian origin for the Cerion fauna of southern Florida. Relationships among the populations throughout the Keys indicate that the northernmost populations, closest to the Tomeu paleoislands that had been inhabited by Cerion petuchi during the Calabrian Pleistocene, are the oldest. The range of Cerion incanum expanded as the archipelago that is the Florida Keys was formed since the lower Tarantian Pleistocene by extension from the northeast to the southwest, with new islands populated as they were formed. The faunas of the High Coral Keys in the northeast and the Oölite Keys in the southwest, both with large islands that host multiple discontinuous populations of Cerion, are each composed of well supported clades that are characterized by distinctive haplotypes. In contrast, the fauna of the intervening Low Coral Keys consist of a heterogeneous series of populations, some with haplotypes derived from the High Coral Keys, others from the Oölite Keys. Individuals from the C. incanum x C. casablancae hybrid population inhabiting the southeastern coast of Bahia Honda Key were readily

  19. The Genus Cerion (Gastropoda: Cerionidae) in the Florida Keys.

    PubMed

    Shrestha, Yesha; Wirshing, Herman H; Harasewych, M G

    2015-01-01

    The systematic relationships and phylogeography of Cerion incanum, the only species of Cerion native to the Florida Keys, are reviewed based on partial sequences of the mitochondrial COI and 16S genes derived from 18 populations spanning the range of this species and including the type localities of all four described subspecies. Our samples included specimens of Cerion casablancae, a species introduced to Indian Key in 1912, and a population of C. incanum x C. casablancae hybrids descended from a population of C. casablancae introduced onto Bahia Honda Key in the same year. Molecular data did not support the partition of C. incanum into subspecies, nor could populations be apportioned reliably into subspecies based on morphological features used to define the subspecies. Phylogenetic analyses affirmed the derived relationship of C. incanum relative to other cerionids, and indicated a Bahamian origin for the Cerion fauna of southern Florida. Relationships among the populations throughout the Keys indicate that the northernmost populations, closest to the Tomeu paleoislands that had been inhabited by Cerion petuchi during the Calabrian Pleistocene, are the oldest. The range of Cerion incanum expanded as the archipelago that is the Florida Keys was formed since the lower Tarantian Pleistocene by extension from the northeast to the southwest, with new islands populated as they were formed. The faunas of the High Coral Keys in the northeast and the Oölite Keys in the southwest, both with large islands that host multiple discontinuous populations of Cerion, are each composed of well supported clades that are characterized by distinctive haplotypes. In contrast, the fauna of the intervening Low Coral Keys consist of a heterogeneous series of populations, some with haplotypes derived from the High Coral Keys, others from the Oölite Keys. Individuals from the C. incanum x C. casablancae hybrid population inhabiting the southeastern coast of Bahia Honda Key were readily

  20. Taxonomy and systematics are key to biological information: Arabidopsis, Eutrema (Thellungiella), Noccaea and Schrenkiella (Brassicaceae) as examples

    PubMed Central

    Koch, Marcus A.; German, Dmitry A.

    2013-01-01

    Taxonomy and systematics provide the names and evolutionary framework for any biological study. Without these names there is no access to a biological context of the evolutionary processes which gave rise to a given taxon: close relatives and sister species (hybridization), more distantly related taxa (ancestral states), for example. This is not only true for the single species a research project is focusing on, but also for its relatives, which might be selected for comparative approaches and future research. Nevertheless, taxonomical and systematic knowledge is rarely fully explored and considered across biological disciplines. One would expect the situation to be more developed with model organisms such as Noccaea, Arabidopsis, Schrenkiella and Eutrema (Thellungiella). However, we show the reverse. Using Arabidopsis halleri and Noccaea caerulescens, two model species among metal accumulating taxa, we summarize and reflect past taxonomy and systematics of Arabidopsis and Noccaea and provide a modern synthesis of taxonomic, systematic and evolutionary perspectives. The same is presented for several species of Eutrema s. l. and Schrenkiella recently appeared as models for studying stress tolerance in plants and widely known under the name Thellungiella. PMID:23914192

  1. Communication in cancer care: psycho-social, interactional, and cultural issues. A general overview and the example of India.

    PubMed

    Chaturvedi, Santosh K; Strohschein, Fay J; Saraf, Gayatri; Loiselle, Carmen G

    2014-01-01

    Communication is a core aspect of psycho-oncology care. This article examines key psychosocial, cultural, and technological factors that affect this communication. Drawing from advances in clinical work and accumulating bodies of empirical evidence, the authors identify determining factors for high quality, efficient, and sensitive communication and support for those affected by cancer. Cancer care in India is highlighted as a salient example. Cultural factors affecting cancer communication in India include beliefs about health and illness, societal values, integration of spiritual care, family roles, and expectations concerning disclosure of cancer information, and rituals around death and dying. The rapidly emerging area of e-health significantly impacts cancer communication and support globally. In view of current globalization, understanding these multidimensional psychosocial, and cultural factors that shape communication are essential for providing comprehensive, appropriate, and sensitive cancer care.

  2. Alpha particle effects in burning tokamak plasmas: overview and specific examples

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sigmar, D.J.

    1986-07-01

    Using the total power balance of an ignited tokamak plasma as a guideline, a range of alpha driven effects is surveyed regarding their impact on achieving and maintaining fusion burn. Specific examples of MHD and kinetic modes and multi species transport dynamics are discussed, including the possible interaction of these categories of effects. This power balance approach rather than a straightforward enumeration of possible effects serves to reveal their non-linear dependence and the ensuing fragility of our understanding of the approach to and maintenance of ignition. Specific examples are given of the interaction between ..cap alpha..-power driven sawtoothing and idealmore » MHD stability, and direct ..cap alpha..-effects on MHD modes including kinetic corrections. Anomalous ion heat transport and central impurity peaking mechanisms and anomalous and collisional ..cap alpha..-transport including the ambipolar electric field are discussed.« less

  3. 26 CFR 20.2013-6 - Examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 14 2011-04-01 2010-04-01 true Examples. 20.2013-6 Section 20.2013-6 Internal...; ESTATES OF DECEDENTS DYING AFTER AUGUST 16, 1954 Credits Against Tax § 20.2013-6 Examples. The application of §§ 20.2013-1 to 20.2013-5 may be further illustrated by the following examples: Example (1). (a) A...

  4. 26 CFR 20.2013-6 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 14 2010-04-01 2010-04-01 false Examples. 20.2013-6 Section 20.2013-6 Internal...; ESTATES OF DECEDENTS DYING AFTER AUGUST 16, 1954 Credits Against Tax § 20.2013-6 Examples. The application of §§ 20.2013-1 to 20.2013-5 may be further illustrated by the following examples: Example (1). (a) A...

  5. 26 CFR 7.465-5 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 14 2010-04-01 2010-04-01 false Examples. 7.465-5 Section 7.465-5 Internal... INCOME TAX REGULATIONS UNDER THE TAX REFORM ACT OF 1976 § 7.465-5 Examples. The provisions of § 7.465-1 and § 7.465-2 may be illustrated by the following examples: Example (1). J and K, as equal partners...

  6. Different perspectives on the key challenges facing rural health: The challenges of power and knowledge.

    PubMed

    Malatzky, Christina; Bourke, Lisa

    2018-05-25

    To examine the effects of dominant knowledge in rural health, including how they shape issues central to rural health. In particular, this article examines the roles of: (i) deficit knowledge of rural health workforce; (ii) dominant portrayals of generalism; and (iii) perceptions of inferiority about rural communities in maintaining health disparities between rural- and metropolitan-based Australians. A Foucauldian framework is applied to literature, evidence, case studies and key messages in rural health. Three scenarios are used to provide practical examples of specific knowledge that is prioritised or marginalised. The analysis of three areas in rural health identifies how deficit knowledge is privileged despite it undermining the purpose of rural health. First, deficit knowledge highlights the workforce shortage rather than the type of work in rural practice or the oversupply of workforce in metropolitan areas. Second, the construction of generalist practice as less skilled and more monotonous undermines other knowledge that it is diverse and challenging. Third, dominant negative stereotypes of rural communities discourage rural careers and highlight undesirable aspects of rural practice. The privileging of deficit knowledge pertaining to rural health workforce, broader dominant discourses of generalism and the nature of rural Australian communities reproduces many of the key challenges in rural health today, including persisting health disparities between rural- and metropolitan-based Australians. To disrupt the operations of power that highlight deficit knowledge and undermine other knowledge, we need to change the way in which rural health is currently constructed and understood. © 2018 National Rural Health Alliance Ltd.

  7. Illustrated key for identification of the species included in the genus Leptoglossus (Hemiptera: Heteroptera: Coreidae: Coreinae: Anisoscelini), and descriptions of five new species and new synonyms.

    PubMed

    Brailovsky, Harry

    2014-05-05

    Five new species of Leptoglossus are described: L.caicosensis from Turks and Caicos Island, L. egeri and L. impensus from Bolivia, L. franckei from Costa Rica, and L. polychromus from Ecuador, Cooperative Republic of Guiana (British Guiana), and French Guiana. Leptoglossus argentinus Bergroth is synonymized under L. chilensis chilensis (Spinola) and Narnia anaticula Brailovsky & Barrera under Leptoglossus occidentalis Heidemann. Dorsal view drawings and key to the 61 known species and 1 subspecies are included; a complete checklist, and the position of each species within the species-group defined herein, are given except for two species L. macrophylus Stål and L. polychromus sp.nov., that are insertae-sedis. The pronotal disk, hind legs, and male genital capsule of the new species here described are illustrated.

  8. When Should Zero Be Included on a Scale Showing Magnitude?

    ERIC Educational Resources Information Center

    Kozak, Marcin

    2011-01-01

    This article addresses an important problem of graphing quantitative data: should one include zero on the scale showing magnitude? Based on a real time series example, the problem is discussed and some recommendations are proposed.

  9. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  10. Some key features in the evolution of self psychology and psychoanalysis.

    PubMed

    Fosshage, James L

    2009-04-01

    Psychoanalysis, as every science and its application, has continued to evolve over the past century, especially accelerating over the last 30 years. Self psychology has played a constitutive role in that evolution and has continued to change itself. These movements have been supported and augmented by a wide range of emergent research and theory, especially that of cognitive psychology, infant and attachment research, rapid eye movement and dream research, psychotherapy research, and neuroscience. I present schematically some of what I consider to be the key features of the evolution of self psychology and their interconnection with that of psychoanalysis at large, including the revolutionary paradigm changes, the new epistemology, listening/experiencing perspectives, from narcissism to the development of the self, the new organization model of transference, the new organization model of dreams, and the implicit and explicit dimensions of analytic work. I conclude with a focus on the radical ongoing extension of the analyst's participation in the analytic relationship, using, as an example, the co-creation of analytic love, and providing several brief clinical illustrations. The leading edge question guiding my discussion is "How does analytic change occur?"

  11. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae)

    PubMed Central

    Hernández, Macotulio Soto; Jones, Robert W.; Castillo, Pedro Reyes

    2013-01-01

    Abstract Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included. PMID:23717181

  12. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  13. Compact FPGA hardware architecture for public key encryption in embedded devices.

    PubMed

    Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).

  14. A Key to the New Library.

    ERIC Educational Resources Information Center

    Gerryts, Egbert; Pienaar, Heila

    This paper discusses finding the key to a new library in order to ensure its future, stressing the importance of alignment between strategy and people. The first section addresses management philosophy for renewal, including replacing the inflexible hierarchical pyramidal structure by a network organization with a service and competency management…

  15. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  16. Observational evidence and strength of evidence domains: case examples

    PubMed Central

    2014-01-01

    Background Systematic reviews of healthcare interventions most often focus on randomized controlled trials (RCTs). However, certain circumstances warrant consideration of observational evidence, and such studies are increasingly being included as evidence in systematic reviews. Methods To illustrate the use of observational evidence, we present case examples of systematic reviews in which observational evidence was considered as well as case examples of individual observational studies, and how they demonstrate various strength of evidence domains in accordance with current Agency for Healthcare Research and Quality (AHRQ) Evidence-based Practice Center (EPC) methods guidance. Results In the presented examples, observational evidence is used when RCTs are infeasible or raise ethical concerns, lack generalizability, or provide insufficient data. Individual study case examples highlight how observational evidence may fulfill required strength of evidence domains, such as study limitations (reduced risk of selection, detection, performance, and attrition); directness; consistency; precision; and reporting bias (publication, selective outcome reporting, and selective analysis reporting), as well as additional domains of dose-response association, plausible confounding that would decrease the observed effect, and strength of association (magnitude of effect). Conclusions The cases highlighted in this paper demonstrate how observational studies may provide moderate to (rarely) high strength evidence in systematic reviews. PMID:24758494

  17. Interdisciplinary Social Science: An Example of Vertical and Horizontal Integrative Strategies

    NASA Astrophysics Data System (ADS)

    Durlabhji, Subhash

    2005-03-01

    A "Concept-Centered" strategy for Integrative Studies was proposed and implemented in the creation of the book Power in Focus: Perspectives from Multiple Disciplines. Essays on the ubiquitous concept of Power were solicited internationally and a final cut of ten essays from ten different disciplines, written specifically for this project, were included. This provides an example of what might be called Horizontal Integration, as it cut across multiple disciplines. One of the essays in the volume provides an example of Vertical Integration, as it applies a psychodynamic hypothesis concerning the development of Power relations among humans across hierarchical levels, from the child to the family to other groups and institutions in society, including finally entire nations and regions of the world.

  18. Progress in satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bedington, Robert; Arrazola, Juan Miguel; Ling, Alexander

    2017-08-01

    Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world.

  19. Interactions of water quality and integrated groundwater management: Examples from the United States and Europe: Chapter 14

    USGS Publications Warehouse

    Warner, Kelly L.; Barataud, Fabienne; Hunt, Randall J.; Benoit, Marc; Anglade, Juliette; Borchardt, Mark A.

    2015-01-01

    Groundwater is available in many parts of the world, but the quality of the water may limit its use. Contaminants can limit the use of groundwater through concerns associated with human health, aquatic health, economic costs, or even societal perception. Given this broad range of concerns, this chapter focuses on examples of how water quality issues influence integrated groundwater management. One example evaluates the importance of a naturally occurring contaminant Arsenic (As) for drinking water supply, one explores issues resulting from agricultural activities on the land surface and factors that influence related groundwater management, and the last examines unique issues that result from human-introduced viral pathogens for groundwater-derived drinking water vulnerability. The examples underscore how integrated groundwater management lies at the intersections of environmental characterization, engineering constraints, societal needs, and human perception of acceptable water quality. As such, water quality factors can be a key driver for societal decision making.

  20. Example Elaboration as a Neglected Instructional Strategy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Girill, T R

    Over the last decade an unfolding cognitive-psychology research program on how learners use examples to develop effective problem solving expertise has yielded well-established empirical findings. Chi et al., Renkl, Reimann, and Neubert (in various papers) have confirmed statistically significant differences in how good and poor learners inferentially elaborate (self explain) example steps as they study. Such example elaboration is highly relevant to software documentation and training, yet largely neglected in the current literature. This paper summarizes the neglected research on example use and puts its neglect in a disciplinary perspective. The author then shows that differences in support for examplemore » elaboration in commercial software documentation reveal previously over looked usability issues. These issues involve example summaries, using goals and goal structures to reinforce example elaborations, and prompting readers to recognize the role of example parts. Secondly, I show how these same example elaboration techniques can build cognitive maturity among underperforming high school students who study technical writing. Principle based elaborations, condition elaborations, and role recognition of example steps all have their place in innovative, high school level, technical writing exercises, and all promote far transfer problem solving. Finally, I use these studies to clarify the constructivist debate over what writers and readers contribute to text meaning. I argue that writers can influence how readers elaborate on examples, and that because of the great empirical differences in example study effectiveness (and reader choices) writers should do what they can (through within text design features) to encourage readers to elaborate examples in the most successful ways. Example elaboration is a uniquely effective way to learn from worked technical examples. This paper summarizes years of research that clarifies example elaboration. I then show how

  1. Treatment Options for Plasma Cell Neoplasms (Including Multiple Myeloma)

    MedlinePlus

    ... Health Professional Plasma Cell Neoplasms Treatment Research Plasma Cell Neoplasms (Including Multiple Myeloma) Treatment (PDQ®)–Patient Version General Information About Plasma Cell Neoplasms Go to Health Professional Version Key Points ...

  2. Treatment Option Overview (Plasma Cell Neoplasms Including Multiple Myeloma)

    MedlinePlus

    ... Health Professional Plasma Cell Neoplasms Treatment Research Plasma Cell Neoplasms (Including Multiple Myeloma) Treatment (PDQ®)–Patient Version General Information About Plasma Cell Neoplasms Go to Health Professional Version Key Points ...

  3. Scaling up in international health: what are the key issues?

    PubMed

    Mangham, Lindsay J; Hanson, Kara

    2010-03-01

    The term 'scaling up' is now widely used in the international health literature, though it lacks an agreed definition. We review what is meant by scaling up in the context of changes in international health and development over the last decade. We argue that the notion of scaling up is primarily used to describe the ambition or process of expanding the coverage of health interventions, though the term has also referred to increasing the financial, human and capital resources required to expand coverage. We discuss four pertinent issues in scaling up the coverage of health interventions: the costs of scaling up coverage; constraints to scaling up; equity and quality concerns; and key service delivery issues when scaling up. We then review recent progress in scaling up the coverage of health interventions. This includes a considerable increase in the volume of aid, accompanied by numerous new health initiatives and financing mechanisms. There have also been improvements in health outcomes and some examples of successful large-scale programmes. Finally, we reflect on the importance of obtaining a better understanding of how to deliver priority health interventions at scale, the current emphasis on health system strengthening and the challenges of sustaining scaling up in the prevailing global economic environment.

  4. Targeting chemokine (C-C motif) ligand 2 (CCL2) as an example of translation of cancer molecular biology to the clinic.

    PubMed

    Zhang, Jian; Patel, Lalit; Pienta, Kenneth J

    2010-01-01

    Chemokines are a family of small and secreted proteins that play pleiotropic roles in inflammation-related pathological diseases, including cancer. Among the identified 50 human chemokines, chemokine (C-C motif) ligand 2 (CCL2) is of particular importance in cancer development since it serves as one of the key mediators of interactions between tumor and host cells. CCL2 is produced by cancer cells and multiple different host cells within the tumor microenvironment. CCL2 mediates tumorigenesis in many different cancer types. For example, CCL2 has been reported to promote prostate cancer cell proliferation, migration, invasion, and survival, via binding to its functional receptor CCR2. Furthermore, CCL2 induces the recruitment of macrophages and induces angiogenesis and matrix remodeling. Targeting CCL2 has been demonstrated as an effective therapeutic approach in preclinical prostate cancer models, and currently, neutralizing monoclonal antibody against CCL2 has entered into clinical trials in prostate cancer. In this chapter, targeting CCL2 in prostate cancer will be used as an example to show translation of laboratory findings from cancer molecular biology to the clinic. Copyright © 2010 Elsevier Inc. All rights reserved.

  5. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  6. 48 CFR 25.504 - Evaluation Examples.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Evaluation Examples. 25... PROGRAMS FOREIGN ACQUISITION Evaluating Foreign Offers-Supply Contracts 25.504 Evaluation Examples. The following examples illustrate the application of the evaluation procedures in 25.502 and 25.503. The...

  7. 48 CFR 225.504 - Evaluation examples.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Evaluation examples. 225.504 Section 225.504 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM... 225.504 Evaluation examples. For examples that illustrate the evaluation procedures in 225.502(c)(ii...

  8. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  9. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  10. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  11. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  12. 48 CFR 225.504 - Evaluation examples.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Evaluation examples. 225..., DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Evaluating Foreign Offers-Supply Contracts 225.504 Evaluation examples. For examples that illustrate the evaluation procedures in 225.502(c)(ii...

  13. 48 CFR 25.504 - Evaluation Examples.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... PROGRAMS FOREIGN ACQUISITION Evaluating Foreign Offers-Supply Contracts 25.504 Evaluation Examples. The... examples assume that the contracting officer has eliminated all offers that are unacceptable for reasons... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Evaluation Examples. 25...

  14. Paradigms: examples from the bacterium Xylella fastidiosa.

    PubMed

    Purcell, Alexander

    2013-01-01

    The history of advances in research on Xylella fastidiosa provides excellent examples of how paradigms both advance and limit our scientific understanding of plant pathogens and the plant diseases they cause. I describe this from a personal perspective, having been directly involved with many persons who made paradigm-changing discoveries, beginning with the discovery that a bacterium, not a virus, causes Pierce's disease of grape and other plant diseases in numerous plant species, including important crop and forest species.

  15. Analysis of key technologies for virtual instruments metrology

    NASA Astrophysics Data System (ADS)

    Liu, Guixiong; Xu, Qingui; Gao, Furong; Guan, Qiuju; Fang, Qiang

    2008-12-01

    Virtual instruments (VIs) require metrological verification when applied as measuring instruments. Owing to the software-centered architecture, metrological evaluation of VIs includes two aspects: measurement functions and software characteristics. Complexity of software imposes difficulties on metrological testing of VIs. Key approaches and technologies for metrology evaluation of virtual instruments are investigated and analyzed in this paper. The principal issue is evaluation of measurement uncertainty. The nature and regularity of measurement uncertainty caused by software and algorithms can be evaluated by modeling, simulation, analysis, testing and statistics with support of powerful computing capability of PC. Another concern is evaluation of software features like correctness, reliability, stability, security and real-time of VIs. Technologies from software engineering, software testing and computer security domain can be used for these purposes. For example, a variety of black-box testing, white-box testing and modeling approaches can be used to evaluate the reliability of modules, components, applications and the whole VI software. The security of a VI can be assessed by methods like vulnerability scanning and penetration analysis. In order to facilitate metrology institutions to perform metrological verification of VIs efficiently, an automatic metrological tool for the above validation is essential. Based on technologies of numerical simulation, software testing and system benchmarking, a framework for the automatic tool is proposed in this paper. Investigation on implementation of existing automatic tools that perform calculation of measurement uncertainty, software testing and security assessment demonstrates the feasibility of the automatic framework advanced.

  16. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  17. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  18. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  19. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  20. WRKY Transcription Factors: Key Components in Abscisic Acid Signaling

    DTIC Science & Technology

    2011-01-01

    Review article WRKY transcription factors : key components in abscisic acid signalling Deena L. Rushton1, Prateek Tripathi1, Roel C. Rabara1, Jun Lin1...May 2011. *Correspondence (Tel +605 688 5749; fax +605 688 5624; email paul.rushton@sdstate.edu) Keywords: abscisic acid, WRKY transcription factor ...seed germination, drought, abiotic stress. Summary WRKY transcription factors (TFs) are key regulators of many plant processes, including the responses

  1. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  2. Scaling-up HIV responses with key populations in West Africa.

    PubMed

    Wheeler, Tisha; Wolf, R Cameron; Kapesa, Laurent; Cheng Surdo, Alison; Dallabetta, Gina

    2015-03-01

    Despite decades of HIV responses in pockets of West and Central Africa (WCA), the HIV response with key populations remains an understudied area. Recently, there has been a proliferation of studies highlighting epidemiologic and behavioral data that challenge attitudes of complacency among donors and country governments uncomfortable in addressing key populations. The articles in this series highlight new studies that provide a better understanding of the epidemiologic and structural burden facing key populations in the WCA region and how to improve responses through more effective targeting. Key populations face pervasive structural barriers including institutional and sexual violence and an intersection of stigma, criminalization, and marginalization as sexual minorities. Despite decades of smaller interventions that have shown the importance of integrated services for key populations, there remains incongruent provision of outreach or testing or family planning pointing to sustained risk. There remains an incongruent resource provision for key populations where they shoulder the burden of HIV and their access to services alone could turn around HIV epidemics within the region. These proximal and distal determinants must be addressed in regional efforts, led by the community, and resourced for scale, targeting those most at risk for the acquisition and transmission of HIV. This special issue builds the knowledge base for the region focusing on interventions that remove barriers to service access including treatment uptake for those living with HIV. Better analysis and use of data for strategic planning are shown to lead to more effective targeting of prevention, care, and HIV treatment programs with key populations. These articles further demonstrate the immediate need for comprehensive action to address HIV among key populations throughout the WCA region.

  3. Keys To The Kansas Environment. 4-H School Enrichment Program.

    ERIC Educational Resources Information Center

    Kansas State Univ., Manhattan. Extension Service.

    The 4-H Club packet for preschool and elementary school children contains nine "keys", or short learning exercises, designed to enrich science and environmental education both in and out of the classroom. Each "key" includes the purpose of the activity, the intended audience, the best time of the year for the activity,…

  4. Standards: The Keys to Domestic and International Competitiveness.

    ERIC Educational Resources Information Center

    Hunter, Robert D.

    1993-01-01

    Demonstrates the importance of standards for the competitiveness of U.S. companies and for international trade. The value of standards in research and development, marketing, design, purchasing, manufacturing, installation, and service is explained. Examples of specific standards and their application to the computer industry are included. (10…

  5. Many-objective optimization and visual analytics reveal key trade-offs for London's water supply

    NASA Astrophysics Data System (ADS)

    Matrosov, Evgenii S.; Huskova, Ivana; Kasprzyk, Joseph R.; Harou, Julien J.; Lambert, Chris; Reed, Patrick M.

    2015-12-01

    In this study, we link a water resource management simulator to multi-objective search to reveal the key trade-offs inherent in planning a real-world water resource system. We consider new supplies and demand management (conservation) options while seeking to elucidate the trade-offs between the best portfolios of schemes to satisfy projected water demands. Alternative system designs are evaluated using performance measures that minimize capital and operating costs and energy use while maximizing resilience, engineering and environmental metrics, subject to supply reliability constraints. Our analysis shows many-objective evolutionary optimization coupled with state-of-the art visual analytics can help planners discover more diverse water supply system designs and better understand their inherent trade-offs. The approach is used to explore future water supply options for the Thames water resource system (including London's water supply). New supply options include a new reservoir, water transfers, artificial recharge, wastewater reuse and brackish groundwater desalination. Demand management options include leakage reduction, compulsory metering and seasonal tariffs. The Thames system's Pareto approximate portfolios cluster into distinct groups of water supply options; for example implementing a pipe refurbishment program leads to higher capital costs but greater reliability. This study highlights that traditional least-cost reliability constrained design of water supply systems masks asset combinations whose benefits only become apparent when more planning objectives are considered.

  6. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Example 5. Investment Company Z, which keeps its books and makes its returns on the basis of the calendar... solely as a result of such distributions. Example 6. Investment Company Q, which keeps its books and... TAXES Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The...

  7. Morphology of Labronemella major n. sp. (Nematoda: Dorylaimida), a soil-dwelling nematode from China, including a revised key to species of the genus.

    PubMed

    Wu, W J; Yan, L; Xie, H; Xu, C L; Wang, K; Jin, S Y

    2017-01-01

    One new species from Qinghai Province, China, Labronemella major n. sp., is described. The new species is characterized by a body length of 3.03-3.34 mm; lip region wide, offset by a distinct depression, disc-like with six separated inner liplets; amphid fovea funnel-shaped, distinctly bulged on body surface in scanning electron micrographs; odontostyle long (35-39 μm) with distinct lumen, aperture about 39-47% of its length; odontophore rod-like and long; guiding ring double; pharyngeal basal expansion about half of the total neck length; uterus relatively long and tripartite; vulva transverse and sclerotized; spicules 81-90 μm long; ventromedial supplements 19-23; tail short, rounded to conoid. It can be differentiated from all other species of the genus by its relatively longer body, odontostyle and spicules, and wider lip region. Due to the lip region being offset by a deep constriction, and the long (three or more times the body diameter at mid-body) tripartite uterus, the new species is close to Labronemella czernowitzensis (Micoletzky, 1922) Andrássy, 2002 and Labronemella labiata Andrássy, 1985. An improved key to the genus including the new species is provided.

  8. Teaching Abstract Concepts: Keys to the World of Ideas.

    ERIC Educational Resources Information Center

    Flatley, Joannis K.; Gittinger, Dennis J.

    1990-01-01

    Specific teaching strategies to help hearing-impaired secondary students comprehend abstract concepts include (1) pinpointing facts and fallacies, (2) organizing information visually, (3) categorizing ideas, and (4) reinforcing new vocabulary and concepts. Figures provide examples of strategy applications. (DB)

  9. The Pedagogical Examples of Groups and Rings That Algebraists Think Are Most Important in an Introductory Course

    ERIC Educational Resources Information Center

    Cook, John Paul; Fukawa-Connelly, Tim

    2015-01-01

    This article reports on an exploratory study designed to investigate the reasoning behind algebraists' selection of examples. Variation theory provided a lens to analyze their collections of examples. Our findings include the classes of examples of groups and rings that algebraists believe to be most pedagogically useful. Chief among their…

  10. smwrData—An R package of example hydrologic data, version 1.1.1

    USGS Publications Warehouse

    Lorenz, David L.

    2015-11-06

    A collection of 24 datasets, including streamflow, well characteristics, groundwater elevations, and discrete water-quality concentrations, is provided to produce a consistent set of example data to demonstrate typical data manipulations or statistical analysis of hydrologic data. These example data are provided in an R package called smwrData. The data in the package have been collected by the U.S. Geological Survey or published in its reports, for example Helsel and Hirsch (2002). The R package provides a convenient mechanism for distributing the data to users of R within the U.S. Geological Survey and other users in the R community.

  11. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    PubMed

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  12. Strategy Guideline: Quality Management in Existing Homes - Cantilever Floor Example

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taggart, J.; Sikora, J.; Wiehagen, J.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented.

  13. Computerized Business Calculus Using Calculators, Examples from Mathematics to Finance.

    ERIC Educational Resources Information Center

    Vest, Floyd

    1991-01-01

    After discussing the role of supercalculators within the business calculus curriculum, several examples are presented which allow the reader to examine the capabilities and codes of calculators specific to different major manufacturers. The topics examined include annuities, Newton's method, fixed point iteration, graphing, solvers, and…

  14. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  15. The structure and composition of Holocene coral reefs in the Middle Florida Keys

    USGS Publications Warehouse

    Toth, Lauren T.; Stathakopoulos, Anastasios; Kuffner, Ilsa B.

    2016-07-21

    The Florida Keys reef tract (FKRT) is the largest coral-reef ecosystem in the continental United States. The modern FKRT extends for 362 kilometers along the coast of South Florida from Dry Tortugas National Park in the southwest, through the Florida Keys National Marine Sanctuary (FKNMS), to Fowey Rocks reef in Biscayne National Park in the northeast. Most reefs along the FKRT are sheltered by the exposed islands of the Florida Keys; however, large channels are located between the islands of the Middle Keys. These openings allow for tidal transport of water from Florida Bay onto reefs in the area. The characteristics of the water masses coming from Florida Bay, which can experience broad swings in temperature, salinity, nutrients, and turbidity over short periods of time, are generally unfavorable or “inimical” to coral growth and reef development.Although reef habitats are ubiquitous throughout most of the Upper and Lower Keys, relatively few modern reefs exist in the Middle Keys most likely because of the impacts of inimical waters from Florida Bay. The reefs that are present in the Middle Keys generally are poorly developed compared with reefs elsewhere in the region. For example, Acropora palmata has been the dominant coral on shallow-water reefs in the Caribbean over the last 1.5 million years until populations of the coral declined throughout the region in recent decades. Although A. palmata was historically abundant in the Florida Keys, it was conspicuously absent from reefs in the Middle Keys. Instead, contemporary reefs in the Middle Keys have been dominated by occasional massive (that is, boulder or head) corals and, more often, small, non-reef-building corals.Holocene reef cores have been collected from many locations along the FKRT; however, despite the potential importance of the history of reefs in the Middle Florida Keys to our understanding of the environmental controls on reef development throughout the FKRT, there are currently no published

  16. Foreign Languages: Key Links in the Chain of Learning.

    ERIC Educational Resources Information Center

    Mead, Robert G., Jr., Ed.

    The articles discuss the necessity of including foreign language as an integral part of the curriculum at all levels of instruction. The following chapters are included: "Elementary School Foreign Language: Key Link in the Chain of Learning" (rationale, innovations, immersion programs, and interdisciplinary approaches); "Foreign…

  17. Projecting biodiversity and wood production in future forest landscapes: 15 key modeling considerations.

    PubMed

    Felton, Adam; Ranius, Thomas; Roberge, Jean-Michel; Öhman, Karin; Lämås, Tomas; Hynynen, Jari; Juutinen, Artti; Mönkkönen, Mikko; Nilsson, Urban; Lundmark, Tomas; Nordin, Annika

    2017-07-15

    A variety of modeling approaches can be used to project the future development of forest systems, and help to assess the implications of different management alternatives for biodiversity and ecosystem services. This diversity of approaches does however present both an opportunity and an obstacle for those trying to decide which modeling technique to apply, and interpreting the management implications of model output. Furthermore, the breadth of issues relevant to addressing key questions related to forest ecology, conservation biology, silviculture, economics, requires insights stemming from a number of distinct scientific disciplines. As forest planners, conservation ecologists, ecological economists and silviculturalists, experienced with modeling trade-offs and synergies between biodiversity and wood biomass production, we identified fifteen key considerations relevant to assessing the pros and cons of alternative modeling approaches. Specifically we identified key considerations linked to study question formulation, modeling forest dynamics, forest processes, study landscapes, spatial and temporal aspects, and the key response metrics - biodiversity and wood biomass production, as well as dealing with trade-offs and uncertainties. We also provide illustrative examples from the modeling literature stemming from the key considerations assessed. We use our findings to reiterate the need for explicitly addressing and conveying the limitations and uncertainties of any modeling approach taken, and the need for interdisciplinary research efforts when addressing the conservation of biodiversity and sustainable use of environmental resources. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. TriatoKey: a web and mobile tool for biodiversity identification of Brazilian triatomine species

    PubMed Central

    Márcia de Oliveira, Luciana; Nogueira de Brito, Raissa; Anderson Souza Guimarães, Paul; Vitor Mastrângelo Amaro dos Santos, Rômulo; Gonçalves Diotaiuti, Liléia; de Cássia Moreira de Souza, Rita

    2017-01-01

    Abstract Triatomines are blood-sucking insects that transmit the causative agent of Chagas disease, Trypanosoma cruzi. Despite being recognized as a difficult task, the correct taxonomic identification of triatomine species is crucial for vector control in Latin America, where the disease is endemic. In this context, we have developed a web and mobile tool based on PostgreSQL database to help healthcare technicians to overcome the difficulties to identify triatomine vectors when the technical expertise is missing. The web and mobile version makes use of real triatomine species pictures and dichotomous key method to support the identification of potential vectors that occur in Brazil. It provides a user example-driven interface with simple language. TriatoKey can also be useful for educational purposes. Database URL: http://triatokey.cpqrr.fiocruz.br PMID:28605769

  19. Strong smoker interest in 'setting an example to children' by quitting: national survey data.

    PubMed

    Thomson, George; Wilson, Nick; Weerasekera, Deepa; Edwards, Richard

    2011-02-01

    To further explore smoker views on reasons to quit. As part of the multi-country ITC Project, a national sample of 1,376 New Zealand adult (18+ years) smokers was surveyed in 2007/08. This sample included boosted sampling of Māori, Pacific and Asian New Zealanders. 'Setting an example to children' was given as 'very much' a reason to quit by 51%, compared to 45% giving personal health concerns. However, the 'very much' and 'somewhat' responses (combined) were greater for personal health (81%) than 'setting an example to children' (74%). Price was the third ranked reason (67%). In a multivariate analysis, women were significantly more likely to state that 'setting an example to children' was 'very much' or 'somewhat' a reason to quit; as were Māori, or Pacific compared to European; and those suffering financial stress. The relatively high importance of 'example to children' as a reason to quit is an unusual finding, and may have arisen as a result of social marketing campaigns encouraging cessation to protect families in New Zealand. The policy implications could include a need for a greater emphasis on social reasons (e.g. 'example to children'), in pack warnings, and in social marketing for smoking cessation. © 2011 The Authors. ANZJPH © 2010 Public Health Association of Australia.

  20. Quantum key distribution with passive decoy state selection

    NASA Astrophysics Data System (ADS)

    Mauerer, Wolfgang; Silberhorn, Christine

    2007-05-01

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical postprocessing. This allows one to improve the effective signal statistics and achievable distance.

  1. Key-Node-Separated Graph Clustering and Layouts for Human Relationship Graph Visualization.

    PubMed

    Itoh, Takayuki; Klein, Karsten

    2015-01-01

    Many graph-drawing methods apply node-clustering techniques based on the density of edges to find tightly connected subgraphs and then hierarchically visualize the clustered graphs. However, users may want to focus on important nodes and their connections to groups of other nodes for some applications. For this purpose, it is effective to separately visualize the key nodes detected based on adjacency and attributes of the nodes. This article presents a graph visualization technique for attribute-embedded graphs that applies a graph-clustering algorithm that accounts for the combination of connections and attributes. The graph clustering step divides the nodes according to the commonality of connected nodes and similarity of feature value vectors. It then calculates the distances between arbitrary pairs of clusters according to the number of connecting edges and the similarity of feature value vectors and finally places the clusters based on the distances. Consequently, the technique separates important nodes that have connections to multiple large clusters and improves the visibility of such nodes' connections. To test this technique, this article presents examples with human relationship graph datasets, including a coauthorship and Twitter communication network dataset.

  2. Unconstrained Capacities of Quantum Key Distribution and Entanglement Distillation for Pure-Loss Bosonic Broadcast Channels.

    PubMed

    Takeoka, Masahiro; Seshadreesan, Kaushik P; Wilde, Mark M

    2017-10-13

    We consider quantum key distribution (QKD) and entanglement distribution using a single-sender multiple-receiver pure-loss bosonic broadcast channel. We determine the unconstrained capacity region for the distillation of bipartite entanglement and secret key between the sender and each receiver, whenever they are allowed arbitrary public classical communication. A practical implication of our result is that the capacity region demonstrated drastically improves upon rates achievable using a naive time-sharing strategy, which has been employed in previously demonstrated network QKD systems. We show a simple example of a broadcast QKD protocol overcoming the limit of the point-to-point strategy. Our result is thus an important step toward opening a new framework of network channel-based quantum communication technology.

  3. Explanation and elaboration of the Standards for UNiversal reporting of patient Decision Aid Evaluations (SUNDAE) guidelines: examples of reporting SUNDAE items from patient decision aid evaluation literature

    PubMed Central

    Hoffman, Aubri S; Abhyankar, Purva; Sheridan, Stacey; Bekker, Hilary; LeBlanc, Annie; Levin, Carrie; Ropka, Mary; Shaffer, Victoria; Stacey, Dawn; Stalmeier, Peep; Vo, Ha; Wills, Celia; Thomson, Richard

    2018-01-01

    This Explanation and Elaboration (E&E) article expands on the 26 items in the Standards for UNiversal reporting of Decision Aid Evaluations guidelines. The E&E provides a rationale for each item and includes examples for how each item has been reported in published papers evaluating patient decision aids. The E&E focuses on items key to reporting studies evaluating patient decision aids and is intended to be illustrative rather than restrictive. Authors and reviewers may wish to use the E&E broadly to inform structuring of patient decision aid evaluation reports, or use it as a reference to obtain details about how to report individual checklist items. PMID:29467235

  4. Fundamental quantitative security in quantum key generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less

  5. 26 CFR 1.663(c)-5 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Examples. 1.663(c)-5 Section 1.663(c)-5 Internal... TAXES Estates and Trusts Which May Accumulate Income Or Which Distribute Corpus § 1.663(c)-5 Examples. Section 663(c) may be illustrated by the following examples: Example 1. (i) A single trust was created in...

  6. Teaching with Games: Online Resources and Examples for Entry Level Courses

    NASA Astrophysics Data System (ADS)

    Teed, R.; Manduca, C.

    2004-12-01

    Using games to teach introductory geoscience can motivate students to enthusiastically learn material that they might otherwise condemn as "boring". A good educational game is one that immerses the players in the material and engages them for as long as it takes to master that material. There are some good geoscience games already available, but instructors can also create their own, suitable to their students and the content that they are teaching. Game-Based Learning is a module on the Starting Point website for faculty teaching entry level geosciences. It assists faculty in using games in their teaching by providing a description of the features of game-based learning, why you would use it, how to use games to teach geoscience, examples, and references. Other issues discussed include the development of video games for teaching, having your students create educational games, what makes a good game, handling competition in the classroom, and grading. The examples include descriptions of and rules for a GPS treasure hunt, a geology quiz show, and an earthquake game, as well as links to several online geological video games, and advice on how to design a paleontology board game. Starting Point is intended to help both experienced faculty and new instructors meet the challenge of teaching introductory geoscience classes, including environmental science and oceanography as well as more traditional geology classes. For many students, these classes are both the first and the last college-level science class that they will ever take. They need to learn enough about the Earth in that one class to sustain them for many decades as voters, consumers, and sometimes even as teachers. Starting Point is produced by a group of authors working with the Science Education Resource Center. It contains dozens of detailed examples categorized by geoscience topic with advice about using them and assessing learning. Each example is linked to one of many modules, such as Game

  7. 10 CFR 1706.9 - Examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... FACILITIES SAFETY BOARD ORGANIZATIONAL AND CONSULTANT CONFLICTS OF INTERESTS § 1706.9 Examples. The examples... work being performed for DOE to ensure no potential or actual conflict of interest would be created through award of the Board contract. Should the Board determine that no potential or actual conflict of...

  8. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  9. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  10. Research on the architecture and key technologies of SIG

    NASA Astrophysics Data System (ADS)

    Fu, Zhongliang; Meng, Qingxiang; Huang, Yan; Liu, Shufan

    2007-06-01

    Along with the development of computer network, Grid has become one of the hottest issues of researches on sharing and cooperation of Internet resources throughout the world. This paper illustrates a new architecture of SIG-a five-hierarchy architecture (including Data Collecting Layer, Grid Layer, Service Layer, Application Layer and Client Layer) of SIG from the traditional three hierarchies (only including resource layer, service layer and client layer). In the paper, the author proposes a new mixed network mode of Spatial Information Grid which integrates CAG (Certificate Authority of Grid) and P2P (Peer to Peer) in the Grid Layer, besides, the author discusses some key technologies of SIG and analysis the functions of these key technologies.

  11. Code query by example

    NASA Astrophysics Data System (ADS)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  12. Usability Guidelines for Product Recommenders Based on Example Critiquing Research

    NASA Astrophysics Data System (ADS)

    Pu, Pearl; Faltings, Boi; Chen, Li; Zhang, Jiyong; Viappiani, Paolo

    Over the past decade, our group has developed a suite of decision tools based on example critiquing to help users find their preferred products in e-commerce environments. In this chapter, we survey important usability research work relative to example critiquing and summarize the major results by deriving a set of usability guidelines. Our survey is focused on three key interaction activities between the user and the system: the initial preference elicitation process, the preference revision process, and the presentation of the systems recommendation results. To provide a basis for the derivation of the guidelines, we developed a multi-objective framework of three interacting criteria: accuracy, confidence, and effort (ACE). We use this framework to analyze our past work and provide a specific context for each guideline: when the system should maximize its ability to increase users' decision accuracy, when to increase user confidence, and when to minimize the interaction effort for the users. Due to the general nature of this multi-criteria model, the set of guidelines that we propose can be used to ease the usability engineering process of other recommender systems, especially those used in e-commerce environments. The ACE framework presented here is also the first in the field to evaluate the performance of preference-based recommenders from a user-centric point of view.

  13. Example Problems in LES Combustion

    DTIC Science & Technology

    2016-09-26

    AFRL-RW-EG-TP-2016-002 Example Problems in LES Combustion Douglas V. Nance Air Force Research Laboratory Munitions...AIR FORCE RESEARCH LABORATORY MUNITIONS DIRECTORATE  Air Force...4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Example Problem in LES Combustion 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER

  14. Rent Seeking: A Textbook Example

    ERIC Educational Resources Information Center

    Pecorino, Paul

    2007-01-01

    The author argues that the college textbook market provides a clear example of monopoly seeking as described by Tullock (1967, 1980). This behavior is also known as rent seeking. Because this market is important to students, this example of rent seeking will be of particular interest to them. (Contains 24 notes.)

  15. Monitoring and modeling for investigating driver/pressure-state/impact relationships in coastal ecosystems: Examples from the Lagoon of Venice

    NASA Astrophysics Data System (ADS)

    Pastres, Roberto; Solidoro, Cosimo

    2012-01-01

    In this paper, we show how the integration of monitoring data and mathematical model can generate valuable information by using a few examples taken from a well studied but complex ecosystem, namely the Lagoon of Venice. We will focus on three key issues, which are of concern also for many other coastal ecosystems, namely: (1) Nitrogen and Phosphorus annual budgets; (2) estimation of Net Ecosystem Metabolism and early warnings for anoxic events; (3) assessment of ecosystem status. The results highlight the importance of framing monitoring activities within the "DPSIR" conceptual model, thus going far beyond the monitoring of major biogeochemical variables and including: (1) the estimation of the fluxes of the main constituents at the boundaries; (2) the use of appropriate mathematical models. These tools can provide quantitative links among Pressures and State/Impacts, thus enabling decision makers and stakeholders to evaluate the effects of alternative management scenarios.

  16. Compact FPGA hardware architecture for public key encryption in embedded devices

    PubMed Central

    Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in GF(p), commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x). PMID:29360824

  17. Energy and Environment Guide to Action - Chapter 4.5: Lead by Example

    EPA Pesticide Factsheets

    Provides recommendations on designing, implementing, and evaluating lead by example programs, which offer states opportunities to achieve substantial energy cost savings within their operations. State success stories are included for reference.

  18. Field keys to predators of the balsam woolly aphid in North Carolina

    Treesearch

    Gene D. Amman

    1970-01-01

    These keys will be useful for field identification of immature insect, adult mite, and slug predators of the balsam woolly aphid. The keys include, in addition to native predators, the larvae of three species introduced to North Carolina.

  19. An Example of a Practical Biochemistry Examination for Health Professional Students.

    ERIC Educational Resources Information Center

    Otsuka, Allen; Kadis, Barney

    1988-01-01

    Uses clinical cases taken from the medical or dental literature for examination of understanding certain aspects of the dental profession. Formulates questions derived from data presented in the case or attempts to present broad principles. Includes 15 example test questions. (MVL)

  20. Setting objectives for managing Key deer

    USGS Publications Warehouse

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  1. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  2. Include dispersion in quantum chemical modeling of enzymatic reactions: the case of isoaspartyl dipeptidase.

    PubMed

    Zhang, Hai-Mei; Chen, Shi-Lu

    2015-06-09

    The lack of dispersion in the B3LYP functional has been proposed to be the main origin of big errors in quantum chemical modeling of a few enzymes and transition metal complexes. In this work, the essential dispersion effects that affect quantum chemical modeling are investigated. With binuclear zinc isoaspartyl dipeptidase (IAD) as an example, dispersion is included in the modeling of enzymatic reactions by two different procedures, i.e., (i) geometry optimizations followed by single-point calculations of dispersion (approach I) and (ii) the inclusion of dispersion throughout geometry optimization and energy evaluation (approach II). Based on a 169-atom chemical model, the calculations show a qualitative consistency between approaches I and II in energetics and most key geometries, demonstrating that both approaches are available with the latter preferential since both geometry and energy are dispersion-corrected in approach II. When a smaller model without Arg233 (147 atoms) was used, an inconsistency was observed, indicating that the missing dispersion interactions are essentially responsible for determining equilibrium geometries. Other technical issues and mechanistic characteristics of IAD are also discussed, in particular with respect to the effects of Arg233.

  3. The Columbia Debris Loan Program; Examples of Microscopic Analysis

    NASA Technical Reports Server (NTRS)

    Russell, Rick; Thurston, Scott; Smith, Stephen; Marder, Arnold; Steckel, Gary

    2006-01-01

    Following the tragic loss of the Space Shuttle Columbia NASA formed The Columbia Recovery Office (CRO). The CRO was initially formed at the Johnson Space Center after the conclusion of recovery operations on May 1,2003 and then transferred .to the Kennedy Space Center on October 6,2003 and renamed The Columbia Recovery Office and Preservation. An integral part of the preservation project was the development of a process to loan Columbia debris to qualified researchers and technical educators. The purposes of this program include aiding in the advancement of advanced spacecraft design and flight safety development, the advancement of the study of hypersonic re-entry to enhance ground safety, to train and instruct accident investigators and to establish an enduring legacy for Space Shuttle Columbia and her crew. Along with a summary of the debris loan process examples of microscopic analysis of Columbia debris items will be presented. The first example will be from the reconstruction following the STS- 107 accident and how the Materials and Proessteesa m used microscopic analysis to confirm the accident scenario. Additionally, three examples of microstructural results from the debris loan process from NASA internal, academia and private industry will be presented.

  4. HIV epidemic among key populations in west Africa.

    PubMed

    Djomand, Gaston; Quaye, Silas; Sullivan, Patrick S

    2014-09-01

    Globally, HIV infection remains a significant issue for key populations such as men who have sex with men (MSM) and female sex workers. A review of recent articles was conducted for west African countries to assess the burden of disease among female sex workers and MSM, access to services and identify barriers to implementation of services for key populations. In west Africa, key populations engage in high-risk practices for the acquisition of HIV and other sexually transmitted infections. Available HIV prevalence data fluctuate across and within countries for both MSM and female sex workers and may be five to ten times as high as that of the general population. HIV prevalence varied from 15.9% in The Gambia to 68% in Benin among female sex workers, whereas it ranged from 9.8% in The Gambia to 34.9% in Nigeria for MSM. Yet, important data gaps exist, including key populations size estimations in several countries as well as HIV prevalence, incidence and other biomarkers of HIV risk. Because of sociocultural, legal, political and economic challenges, exacerbated by a poor health system infrastructure, the HIV response is not strategically directed toward programs for key populations in countries with concentrated epidemics. Noteworthy is the low coverage of prevention care and treatment interventions offered to key populations. Sufficient planning and political will with legal and structural frameworks that reconcile public health and human rights are needed to prioritize HIV prevention, care and treatment programming for key populations programs in west Africa.

  5. Land use changing and land use optimization of Lake Baikal basin on the example of two key areas

    NASA Astrophysics Data System (ADS)

    Solodyankina, S.

    2012-04-01

    Lake Baikal contains roughly 20% of the world's unfrozen surface fresh water. It was declared a UNESCO World Heritage Site in 1996. Today levels of urbanization and economic stress on environmental resources is increasing on the shorts of the lake Baikal. The potential of economic development (industry, local tourism, and mining) of the Severobaykalsky and Sludyansky districts is rather high although they are characterized not only by beneficial features for local economy but also by considerable disadvantages for nature of this world valuable territory. This investigation show human-caused landscape changes during economic development of the two key areas in Baikal water catchment basin during 10 years (point of reference is 2000 year). Key areas are 1) the Baikalo-Patomskoe highland in the north of the Baikal catchment basin (Severobaykalsky district, Republic of Buryatia); 2) Khamar-Daban mountain system in the south of the Baikal catchment basin (Sludyansky districy, Irkutsk region). Since 2000 year land use of the territory has changed. Areas of agriculture were reduced but recreation activity on the bank of the lake was increased. Methods of GIS analysis and local statistic analysis of landscape characteristic were used. Nature, rural and urban areas ratio are estimated. Vegetation and soil condition assessment were made. The essence of this research is in helping to make decisions linked to upcoming problems: situation identification, evaluation and forecasting of the potential landscape condition, optimization of land use, mitigation of impact and mapping of territories and nature resources which have a high ecological value or endangered by industrial impact. For this purpose landscape maps of the territories on the base of the remote sensing information and field investigations were created. They used to calculate potential landscape functions of the territory without taking into account present impact of anthropogenic actions. Land use maps for years

  6. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    PubMed Central

    Lee, Tian-Fu; Wang, Zeng-Bo

    2017-01-01

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509

  7. Computational Phenotyping in Psychiatry: A Worked Example.

    PubMed

    Schwartenbeck, Philipp; Friston, Karl

    2016-01-01

    Computational psychiatry is a rapidly emerging field that uses model-based quantities to infer the behavioral and neuronal abnormalities that underlie psychopathology. If successful, this approach promises key insights into (pathological) brain function as well as a more mechanistic and quantitative approach to psychiatric nosology-structuring therapeutic interventions and predicting response and relapse. The basic procedure in computational psychiatry is to build a computational model that formalizes a behavioral or neuronal process. Measured behavioral (or neuronal) responses are then used to infer the model parameters of a single subject or a group of subjects. Here, we provide an illustrative overview over this process, starting from the modeling of choice behavior in a specific task, simulating data, and then inverting that model to estimate group effects. Finally, we illustrate cross-validation to assess whether between-subject variables (e.g., diagnosis) can be recovered successfully. Our worked example uses a simple two-step maze task and a model of choice behavior based on (active) inference and Markov decision processes. The procedural steps and routines we illustrate are not restricted to a specific field of research or particular computational model but can, in principle, be applied in many domains of computational psychiatry.

  8. Key Factors in Development of Man-Made and Natural Ecosystems

    NASA Astrophysics Data System (ADS)

    Pechurkin, N. S.

    1999-01-01

    Key factors of ecosystem functioning are of the same nature for artificial and natural types. An hierarchical approach gives the opportunity for estimation of the quantitative behavior of both individual links and the system as a whole. At the organismic level we can use interactions of studied macroorganisms (man, animal, higher plant) with selected microorganisms as key indicating factors of the organisms immune status. The most informative factor for the population/community level is an age structure of populations and relationships of domination/elimination. The integrated key factors of the ecosystems level are productivity and rates of cycling of the limiting substances. The key factors approach is of great value for growth regulations and monitoring the state of any ecosystem, including the life support system (LSS)-type.

  9. Keys to soil taxonomy by soil survey staff (sixth edition)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1994-12-31

    This publication, Keys to Soil Taxonomy, serves two purposes. It provides the taxonomic keys necessary for the classification of soils according to Soil Taxonomy in a form that can be used easily in the field, and it also acquaints users of Soil Taxonomy with recent changes in the classification system. This volume includes all revisions of the keys that have so far been approved, replacing the original keys in Soil Taxonomy: A Basic System of Soil Classification for Making and Interpreting Soil Surveys (1975), the work on which this abridged version, first published in 1983, is based. This publication incorporatesmore » all amendments approved to date and published in National Soil Taxonomy Handbook (NSTH) Issues 1-17.« less

  10. The "Key" Method of Identifying Igneous and Metamorphic Rocks in Introductory Laboratory.

    ERIC Educational Resources Information Center

    Eves, Robert Leo; Davis, Larry Eugene

    1987-01-01

    Proposes that identification keys provide an orderly strategy for the identification of igneous and metamorphic rocks in an introductory geology course. Explains the format employed in the system and includes the actual key guides for both igneous and metamorphic rocks. (ML)

  11. KeyWare: an open wireless distributed computing environment

    NASA Astrophysics Data System (ADS)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  12. Analog Computer Laboratory with Biological Examples.

    ERIC Educational Resources Information Center

    Strebel, Donald E.

    1979-01-01

    The use of biological examples in teaching applications of the analog computer is discussed and several examples from mathematical ecology, enzyme kinetics, and tracer dynamics are described. (Author/GA)

  13. Security of quantum key distribution with iterative sifting

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos

    2018-01-01

    Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.

  14. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  15. 25 CFR 1000.228 - What are examples of waivers prohibited by law?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... ANNUAL FUNDING AGREEMENTS UNDER THE TRIBAL SELF-GOVERNMENT ACT AMENDMENTS TO THE INDIAN SELF...? Examples of when a waiver is prohibited by Federal law include: (a) When the effect would be to waive or...

  16. 25 CFR 1000.228 - What are examples of waivers prohibited by law?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ANNUAL FUNDING AGREEMENTS UNDER THE TRIBAL SELF-GOVERNMENT ACT AMENDMENTS TO THE INDIAN SELF...? Examples of when a waiver is prohibited by Federal law include: (a) When the effect would be to waive or...

  17. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  18. Avoidant restrictive food intake disorder: an illustrative case example.

    PubMed

    Bryant-Waugh, Rachel

    2013-07-01

    Avoidant/restrictive food intake disorder (ARFID) is a new diagnostic category in DSM-5. Although replacing Feeding Disorder of Infancy or Early Childhood, it is not restricted to childhood presentations. In keeping with the broader aim of revising and updating criteria and text to better reflect lifespan issues and clinical expression across the age range, ARFID is a diagnosis relevant to children, adolescents, and adults. This case example of a 13-year old boy with ARFID illustrates key issues in diagnosis and treatment planning. The issues discussed are not exhaustive, but serve as a guide for central diagnostic and treatment issues to be considered by the clinician. It is anticipated that the inclusion of specific criteria for ARFID as a category within Feeding and Eating Disorders in DSM-5 will stimulate research into its typology, prevalence, and incidence in different populations and facilitate the development of effective, evidence-based interventions for this patient group. Copyright © 2013 Wiley Periodicals, Inc.

  19. 34 CFR Appendix B to Part 403 - Examples for 34 CFR 403.194-Comparability Requirements

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TECHNOLOGY EDUCATION PROGRAM Pt. 403, App. B Appendix B to Part 403—Examples for 34 CFR 403.194—Comparability Requirements Methods by which a local educational agency can demonstrate its compliance with the comparability requirements in 34 CFR 403.194(a) include the following: Example 1: The local educational agency files with the...

  20. Importing, Working With, and Sharing Microstructural Data in the StraboSpot Digital Data System, Including an Example Dataset from the Pilbara Craton, Western Australia.

    NASA Astrophysics Data System (ADS)

    Roberts, N.; Cunningham, H.; Snell, A.; Newman, J.; Tikoff, B.; Chatzaras, V.; Walker, J. D.; Williams, R. T.

    2017-12-01

    There is currently no repository where a geologist can survey microstructural datasets that have been collected from a specific field area or deformation experiment. New development of the StraboSpot digital data system provides a such a repository as well as visualization and analysis tools. StraboSpot is a graph database that allows field geologists to share primary data and develop new types of scientific questions. The database can be accessed through: 1) a field-based mobile application that runs on iOS and Android mobile devices; and 2) a desktop system. We are expanding StraboSpot to include the handling of a variety of microstructural data types. Presented here is the detailed vocabulary and logic used for the input of microstructural data, and how this system operates with the anticipated workflow of users. Microstructural data include observations and interpretations from photomicrographs, scanning electron microscope images, electron backscatter diffraction, and transmission electron microscopy data. The workflow for importing microstructural data into StraboSpot is organized into the following tabs: Images, Mineralogy & Composition; Sedimentary; Igneous; Metamorphic; Fault Rocks; Grain size & configuration; Crystallographic Preferred Orientation; Reactions; Geochronology; Relationships; and Interpretations. Both the sample and the thin sections are also spots. For the sample spot, the user can specify whether a sample is experimental or natural; natural samples are inherently linked to their field context. For the thin section (sub-sample) spot, the user can select between different options for sample preparation, geometry, and methods. A universal framework for thin section orientation is given, which allows users to overlay different microscope images of the same area and keeps georeferenced orientation. We provide an example dataset of field and microstructural data from the Mt Edgar dome, a granitic complex in the Paleoarchean East Pilbara craton

  1. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  2. Sewage in ground water in the Florida Keys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shinn, E.A.

    1995-12-31

    More than 24,000 septic tanks, 5,000 cesspools, and greater than 600 shallow disposal wells introduce sewage effluents into porous and permeable limestone underlying the Florida Keys. To porous and permeable limestone underlying the Florida Keys. To assess the fate of sewage nutrients, 21 2- to 20-m-deep wells were core drilled and completed as water-monitoring wells. The wells were sampled quarterly and analyzed for 17 parameters. including nutrients and bacteria. Nutrients (mainly NH4, - which is 30 to 40 times higher than in surface sea water) were detected in ground water beneath the Keys and offshore coral reefs. Highest levels weremore » beneath reefs 5 to 8 km offshore. Ground waters were generally hypersaline and fecal bacteria (fecal coliform and streptococci) were detected in ground water beneath living coral reefs. Higher sea level on the Florida Bay side of the Keys is proposed as the mechanism for forcing ground water toward offshore coral reefs. Tidal pumping, which is more pronounced near the Keys, causes leakage of ground water where the sediment is thin. Areas lacking sediment cover consist of bare limestone bedrock or permeable coral reefs. These are the areas where coral diseases and algal growth have increased in recent years. Pollutants entering the ground water beneath the Florida Keys are likely to be transported seaward beneath impermeable Holocene sediments and may be upwelling through coral reefs and other hardbottom communities.« less

  3. Fundamental Travel Demand Model Example

    NASA Technical Reports Server (NTRS)

    Hanssen, Joel

    2010-01-01

    Instances of transportation models are abundant and detailed "how to" instruction is available in the form of transportation software help documentation. The purpose of this paper is to look at the fundamental inputs required to build a transportation model by developing an example passenger travel demand model. The example model reduces the scale to a manageable size for the purpose of illustrating the data collection and analysis required before the first step of the model begins. This aspect of the model development would not reasonably be discussed in software help documentation (it is assumed the model developer comes prepared). Recommendations are derived from the example passenger travel demand model to suggest future work regarding the data collection and analysis required for a freight travel demand model.

  4. Young People and Sexuality Education: Rethinking Key Debates

    ERIC Educational Resources Information Center

    Allen, Louisa

    2011-01-01

    This book innovatively re-envisions the possibilities of sexuality education. Utilizing student critiques of programs it reconfigures key debates in sexuality education including: Should pleasure be part of the curriculum? Who makes the best educators? Do students prefer single or mixed gender classes?

  5. Radiology Aide. Instructor Key [and] Student Manual.

    ERIC Educational Resources Information Center

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  6. Foundational Data Products for Europa: A Planetary Spatial Data Infrastructure Example

    NASA Astrophysics Data System (ADS)

    Archinal, B. A.; Laura, J.; Becker, T. L.; Bland, M. T.; Kirk, R. L.

    2017-12-01

    Any Spatial Data Infrastructure (SDI), including a Planetary SDI (PSDI [1]), includes primary components such as "policy, access network, technical standards, people (including partnerships), and data" [2]. Data is largely categorized into critical foundational products and framework data products. Of data themes [3] previously identified for the U. S. National SDI, we identify [4] three types of products that are foundational to a PSDI: geodetic coordinate reference systems, elevation information, and orthomosaics. We previously listed examples of such products for the Moon (ibid.). Here, we list the current state of these three foundational products for Europa, a key destination in the outer Solar System. Geodetic coordinate reference systems for Europa are based on photogrammetric control networks generated from processing of Voyager and Galileo images, the most recent being that created by M. Davies and T. Colvin at The RAND Corporation in the late 1990s. The Voyager and Galileo images provide insufficient stereo coverage to derive a detailed global topographic model, but various global ellipsoidal shape models have been derived using e.g. the RAND network or limb profile data. The best-known global mosaic of Europa is a controlled orthomosaic produced by the U.S. Geological Survey [5], based on the RAND network and triaxial ellipsoid shape model. Near future needs include comparing the resolution and accuracy of these products with estimates for newer products that might supersede them, including released or unreleased regional products (such as digital terrain models or mosaics) and products that could be made by processing of extant data. Understanding these PSDI fundamental needs will also improve assessing and prioritizing products that are planned for by the upcoming NASA Europa Clipper mission. This effort is not only useful for Europa science, but is also a first step toward developing such summaries for all Solar System bodies with relevant data, which

  7. A New Three Dimensional Based Key Generation Technique in AVK

    NASA Astrophysics Data System (ADS)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2017-08-01

    In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.

  8. Secret-key-assisted private classical communication capacity over quantum channels

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd

    2008-10-01

    We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.

  9. ChiloKey, an interactive identification tool for the geophilomorph centipedes of Europe (Chilopoda, Geophilomorpha).

    PubMed

    Bonato, Lucio; Minelli, Alessandro; Lopresti, Massimo; Cerretti, Pierfilippo

    2014-01-01

    ChiloKey is a matrix-based, interactive key to all 179 species of Geophilomorpha (Chilopoda) recorded from Europe, including species of uncertain identity and those whose morphology is known partially only. The key is intended to assist in identification of subadult and adult specimens, by means of microscopy and simple dissection techniques whenever necessary. The key is freely available through the web at: http://www.biologia.unipd.it/chilokey/ and at http://www.interactive-keys.eu/chilokey/.

  10. Interviewing Objects: Including Educational Technologies as Qualitative Research Participants

    ERIC Educational Resources Information Center

    Adams, Catherine A.; Thompson, Terrie Lynn

    2011-01-01

    This article argues the importance of including significant technologies-in-use as key qualitative research participants when studying today's digitally enhanced learning environments. We gather a set of eight heuristics to assist qualitative researchers in "interviewing" technologies-in-use (or other relevant objects), drawing on concrete…

  11. Key enablers to facilitate healthy behavior change: workshop summary.

    PubMed

    Teyhen, Deydre S; Aldag, Matt; Centola, Damon; Edinborough, Elton; Ghannadian, Jason D; Haught, Andrea; Jackson, Theresa; Kinn, Julie; Kunkler, Kevin J; Levine, Betty; Martindale, Valerie E; Neal, David; Snyder, Leslie B; Styn, Mindi A; Thorndike, Frances; Trabosh, Valerie; Parramore, David J

    2014-05-01

    The increases in preventable chronic diseases and the rising costs of health care are unsustainable. The US Army Surgeon General's vision to transition from a health care system to a system of health requires the identification of key health enablers to facilitate the adoption of healthy behaviors. In support of this vision, the US Army Telemedicine and Advanced Technology Research Center hosted a workshop in April 2013 titled "Incentives to Create and Sustain Change for Health." Members of government and academia participated to identify key health enablers that could ultimately be leveraged by technology. The key health enablers discussed included (1) public health messaging, (2) changing health habits and the environmental influence on health, (3) goal setting and tracking, (4) the role of incentives in behavior-change intervention, and (5) the role of peer and social networks on change. This report summarizes leading evidence and the group consensus on evidence-based practices with respect to the key enablers in creating healthy behavior change.

  12. Tailored combination prevention packages and PrEP for young key populations

    PubMed Central

    Pettifor, Audrey; Nguyen, Nadia L; Celum, Connie; Cowan, Frances M; Go, Vivian; Hightow-Weidman, Lisa

    2015-01-01

    Introduction Young key populations, defined in this article as men who have sex with men, transgender persons, people who sell sex and people who inject drugs, are at particularly high risk for HIV. Due to the often marginalized and sometimes criminalized status of young people who identify as members of key populations, there is a need for HIV prevention packages that account for the unique and challenging circumstances they face. Pre-exposure prophylaxis (PrEP) is likely to become an important element of combination prevention for many young key populations. Objective In this paper, we discuss important challenges to HIV prevention among young key populations, identify key components of a tailored combination prevention package for this population and examine the role of PrEP in these prevention packages. Methods We conducted a comprehensive review of the evidence to date on prevention strategies, challenges to prevention and combination prevention packages for young key populations. We focused specifically on the role of PrEP in these prevention packages and on young people under the age of 24, and 18 in particular. Results and discussion Combination prevention packages that include effective, acceptable and scalable behavioural, structural and biologic interventions are needed for all key populations to prevent new HIV infections. Interventions in these packages should meaningfully involve beneficiaries in the design and implementation of the intervention, and take into account the context in which the intervention is being delivered to thoughtfully address issues of stigma and discrimination. These interventions will likely be most effective if implemented in conjunction with strategies to facilitate an enabling environment, including increasing access to HIV testing and health services for PrEP and other prevention strategies, decriminalizing key populations’ practices, increasing access to prevention and care, reducing stigma and discrimination, and

  13. Statistical Learning Theory for High Dimensional Prediction: Application to Criterion-Keyed Scale Development

    PubMed Central

    Chapman, Benjamin P.; Weiss, Alexander; Duberstein, Paul

    2016-01-01

    Statistical learning theory (SLT) is the statistical formulation of machine learning theory, a body of analytic methods common in “big data” problems. Regression-based SLT algorithms seek to maximize predictive accuracy for some outcome, given a large pool of potential predictors, without overfitting the sample. Research goals in psychology may sometimes call for high dimensional regression. One example is criterion-keyed scale construction, where a scale with maximal predictive validity must be built from a large item pool. Using this as a working example, we first introduce a core principle of SLT methods: minimization of expected prediction error (EPE). Minimizing EPE is fundamentally different than maximizing the within-sample likelihood, and hinges on building a predictive model of sufficient complexity to predict the outcome well, without undue complexity leading to overfitting. We describe how such models are built and refined via cross-validation. We then illustrate how three common SLT algorithms–Supervised Principal Components, Regularization, and Boosting—can be used to construct a criterion-keyed scale predicting all-cause mortality, using a large personality item pool within a population cohort. Each algorithm illustrates a different approach to minimizing EPE. Finally, we consider broader applications of SLT predictive algorithms, both as supportive analytic tools for conventional methods, and as primary analytic tools in discovery phase research. We conclude that despite their differences from the classic null-hypothesis testing approach—or perhaps because of them–SLT methods may hold value as a statistically rigorous approach to exploratory regression. PMID:27454257

  14. Statistical learning theory for high dimensional prediction: Application to criterion-keyed scale development.

    PubMed

    Chapman, Benjamin P; Weiss, Alexander; Duberstein, Paul R

    2016-12-01

    Statistical learning theory (SLT) is the statistical formulation of machine learning theory, a body of analytic methods common in "big data" problems. Regression-based SLT algorithms seek to maximize predictive accuracy for some outcome, given a large pool of potential predictors, without overfitting the sample. Research goals in psychology may sometimes call for high dimensional regression. One example is criterion-keyed scale construction, where a scale with maximal predictive validity must be built from a large item pool. Using this as a working example, we first introduce a core principle of SLT methods: minimization of expected prediction error (EPE). Minimizing EPE is fundamentally different than maximizing the within-sample likelihood, and hinges on building a predictive model of sufficient complexity to predict the outcome well, without undue complexity leading to overfitting. We describe how such models are built and refined via cross-validation. We then illustrate how 3 common SLT algorithms-supervised principal components, regularization, and boosting-can be used to construct a criterion-keyed scale predicting all-cause mortality, using a large personality item pool within a population cohort. Each algorithm illustrates a different approach to minimizing EPE. Finally, we consider broader applications of SLT predictive algorithms, both as supportive analytic tools for conventional methods, and as primary analytic tools in discovery phase research. We conclude that despite their differences from the classic null-hypothesis testing approach-or perhaps because of them-SLT methods may hold value as a statistically rigorous approach to exploratory regression. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  15. 14 CFR 1216.203 - Definition of key terms.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Floodplain and Wetlands Management § 1216.203 Definition of key terms. (a) Action—any NASA activity including... buildings, structures and utility items, marine structures, bridges and other land development items, such... wetlands. (i) Floodproofing—the modification of individual structures and facilities, their sites, and...

  16. Key Higher-Education Issues in the States

    ERIC Educational Resources Information Center

    Fischer, Karin; Hebel, Sara

    2007-01-01

    Legislatures are set to convene in January in 43 states. This article presents the key issues that are expected to be debated by legislatures in states this year. These issues include: (1) Annulment of a controversial law in Texas that guarantees students who graduate in the top 10 percent of their high-school classes admission to any public…

  17. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  18. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  19. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  20. Simpson's Paradox: Examples.

    PubMed

    Wang, Bokai; Wu, Pan; Kwan, Brian; Tu, Xin M; Feng, Changyong

    2018-04-25

    Simpson's paradox is very prevalent in many areas. It characterizes the inconsistency between the conditional and marginal interpretations of the data. In this paper, we illustrate through some examples how the Simpson's paradox can happen in continuous, categorical, and time-to-event data.

  1. Planning Curriculum Development: With Examples from Projects for the Mentally Retarded.

    ERIC Educational Resources Information Center

    Mayer, William V., Ed.

    Presented are guidelines based on five federally funded projects for planning and developing curriculum for the mentally retarded. Discussed are the initial steps of identifying the target population, needs, and objectives. Examples of curriculum design, including the rationale and conceptual framework, are provided. Considered are elements of…

  2. 41 CFR 102-5.80 - What are some examples of positions that may involve field work?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... of positions that may involve field work? 102-5.80 Section 102-5.80 Public Contracts and Property...-HOME-TO-WORK TRANSPORTATION Authorizing Home-to-Work Transportation § 102-5.80 What are some examples of positions that may involve field work? Examples of positions that may involve field work include...

  3. 41 CFR 102-5.80 - What are some examples of positions that may involve field work?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... of positions that may involve field work? 102-5.80 Section 102-5.80 Public Contracts and Property...-HOME-TO-WORK TRANSPORTATION Authorizing Home-to-Work Transportation § 102-5.80 What are some examples of positions that may involve field work? Examples of positions that may involve field work include...

  4. 41 CFR 102-5.80 - What are some examples of positions that may involve field work?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of positions that may involve field work? 102-5.80 Section 102-5.80 Public Contracts and Property...-HOME-TO-WORK TRANSPORTATION Authorizing Home-to-Work Transportation § 102-5.80 What are some examples of positions that may involve field work? Examples of positions that may involve field work include...

  5. 41 CFR 102-5.80 - What are some examples of positions that may involve field work?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of positions that may involve field work? 102-5.80 Section 102-5.80 Public Contracts and Property...-HOME-TO-WORK TRANSPORTATION Authorizing Home-to-Work Transportation § 102-5.80 What are some examples of positions that may involve field work? Examples of positions that may involve field work include...

  6. 41 CFR 102-5.80 - What are some examples of positions that may involve field work?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of positions that may involve field work? 102-5.80 Section 102-5.80 Public Contracts and Property...-HOME-TO-WORK TRANSPORTATION Authorizing Home-to-Work Transportation § 102-5.80 What are some examples of positions that may involve field work? Examples of positions that may involve field work include...

  7. Simple Perturbation Example for Quantum Chemistry.

    ERIC Educational Resources Information Center

    Goodfriend, P. L.

    1985-01-01

    Presents a simple example that illustrates various aspects of the Rayleigh-Schrodinger perturbation theory. The example is a particularly good one because it is straightforward and can be compared with both the exact solution and with experimental data. (JN)

  8. Platelet activation is a key event in the pathogenesis of streptococcal infections.

    PubMed

    Jia, Ming; Xiong, Yuling; Lu, Hua; Li, Ruqing; Wang, Tiantian; Ye, Yanyao; Song, Min; Li, Bing; Jiang, Tianlun; Zhao, Shuming

    2015-06-01

    Diverse Streptococcus species including Streptococcus Pneumoniae, Sanguis, Gordonii, Mitis and Mutans cause life-threatening conditions including pneumonia, bacteremia and meningitis. These diseases bear a high morbidity and mortality and for this reason, understanding the key events in the pathogenesis of these infections have a great significance in their prevention and/or treatment. Here, we describe as how the activation of the platelets and their affinity to bind to bacterial proteins act as early key events in the pathogenesis of Streptococcal infections.

  9. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  10. The key technique study of a kind of personal navigation oriented LBS system

    NASA Astrophysics Data System (ADS)

    Yan, Lei; Zheng, Jianghua; Zhang, Xin; Peng, Chunhua; He, Lina

    2005-11-01

    With the integration of GIS, IT technology and wireless communication techniques, LBS is fast developing and caused wide concern. Personal navigation is the critical application of LBS. It has higher requirement of data quality, positioning accuracy and multi-model services. The study discusses the key techniques of a personal navigation oriented LBS system. As an example for service platform of China Unicom, NAVISTAR especially emphasizes the importance of spatial data organization. Based-on CDMA1X network, it adopts gpsOne\\MS-Assisted dynamic positioning technique, and puts forward a data organization solution to realize multi-scale representation.

  11. Key Features of High-Quality Policies and Guidelines to Support Social and Emotional Learning: Recommendations and Examples for the Collaborating States Initiative (CSI)

    ERIC Educational Resources Information Center

    Dusenbury, Linda; Yoder, Nick

    2017-01-01

    The current document serves two purposes. First, it provides an overview of six key features of a high-quality, comprehensive package of policies and guidance to support student social and emotional learning (SEL). These features are based on Collaborative for Academic Social, and Emotional Learning's (CASEL's) review of the research literature on…

  12. Supramolecular chemistry-general principles and selected examples from anion recognition and metallosupramolecular chemistry.

    PubMed

    Albrecht, Markus

    2007-12-01

    This review gives an introduction into supramolecular chemistry describing in the first part general principles, focusing on terms like noncovalent interaction, molecular recognition, self-assembly, and supramolecular function. In the second part those will be illustrated by simple examples from our laboratories. Supramolecular chemistry is the science that bridges the gap between the world of molecules and nanotechnology. In supramolecular chemistry noncovalent interactions occur between molecular building blocks, which by molecular recognition and self-assembly form (functional) supramolecular entities. It is also termed the "chemistry of the noncovalent bond." Molecular recognition is based on geometrical complementarity based on the "key-and-lock" principle with nonshape-dependent effects, e.g., solvatization, being also highly influential. Self-assembly leads to the formation of well-defined aggregates. Hereby the overall structure of the target ensemble is controlled by the symmetry features of the certain building blocks. Finally, the aggregates can possess special properties or supramolecular functions, which are only found in the ensemble but not in the participating molecules. This review gives an introduction on supramolecular chemistry and illustrates the fundamental principles by recent examples from our group.

  13. Institutional Research: The Key to Successful Enrollment Management.

    ERIC Educational Resources Information Center

    Clagett, Craig A.

    Enrollment management includes the processes and activities that influence the size, shape, and characteristics of a student body by directing institutional efforts in marketing, recruitment, admissions, pricing, and financial aid. Institutional research plays an essential, if not the key, role in enrollment management. This report discusses the…

  14. 25 CFR 309.15 - What are examples of apparel that are Indian products?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... products. (b) Specific examples include, but are not limited to: seal skin parkas, ribbon appliqué dance shawls, smoked moose hide slippers, deer skin boots, patchwork jackets, calico ribbon shirts, wing...

  15. 25 CFR 309.15 - What are examples of apparel that are Indian products?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... products. (b) Specific examples include, but are not limited to: seal skin parkas, ribbon appliqué dance shawls, smoked moose hide slippers, deer skin boots, patchwork jackets, calico ribbon shirts, wing...

  16. 25 CFR 309.15 - What are examples of apparel that are Indian products?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... products. (b) Specific examples include, but are not limited to: seal skin parkas, ribbon appliqué dance shawls, smoked moose hide slippers, deer skin boots, patchwork jackets, calico ribbon shirts, wing...

  17. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  18. Securing quantum key distribution systems using fewer states

    NASA Astrophysics Data System (ADS)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  19. Studies in International Relations; A Post-Modern Example from the Twenties

    ERIC Educational Resources Information Center

    Petersen, Keith S.

    1970-01-01

    Articles published in the Quarterly are reviewed. David Y. Thomas's Mexican Legislation in the Light of Internation Law" (Sept. 1928) is reprinted as one excellent example. (In the 1920's, emphasis was on diplomatic history and international law rather than political science.) A biographical sketch is included. (SE)

  20. When Does an Argument Use a Generic Example?

    ERIC Educational Resources Information Center

    Yopp, David A.; Ely, Rob

    2016-01-01

    We offer criteria that an observer can use to determine whether an argument that uses an example to argue for a general claim appeals to that example generically. We review existing literature on generic example and note the strengths of each contribution, as well as inconsistencies among uses of the term. We offer several examples from the…

  1. 15 CFR 710.4 - Overview of scheduled chemicals and examples of affected industries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... provides examples of the types of industries that may be affected by the CWCR (parts 710 through 729 of...) Batteries; (vi) Cyanic acid; (vii) Toiletries, including perfumes and scents; (viii) Organic phosphate...

  2. 15 CFR 710.4 - Overview of scheduled chemicals and examples of affected industries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... provides examples of the types of industries that may be affected by the CWCR (parts 710 through 729 of...) Batteries; (vi) Cyanic acid; (vii) Toiletries, including perfumes and scents; (viii) Organic phosphate...

  3. Dynamic Network-Based Epistasis Analysis: Boolean Examples

    PubMed Central

    Azpeitia, Eugenio; Benítez, Mariana; Padilla-Longoria, Pablo; Espinosa-Soto, Carlos; Alvarez-Buylla, Elena R.

    2011-01-01

    In this article we focus on how the hierarchical and single-path assumptions of epistasis analysis can bias the inference of gene regulatory networks. Here we emphasize the critical importance of dynamic analyses, and specifically illustrate the use of Boolean network models. Epistasis in a broad sense refers to gene interactions, however, as originally proposed by Bateson, epistasis is defined as the blocking of a particular allelic effect due to the effect of another allele at a different locus (herein, classical epistasis). Classical epistasis analysis has proven powerful and useful, allowing researchers to infer and assign directionality to gene interactions. As larger data sets are becoming available, the analysis of classical epistasis is being complemented with computer science tools and system biology approaches. We show that when the hierarchical and single-path assumptions are not met in classical epistasis analysis, the access to relevant information and the correct inference of gene interaction topologies is hindered, and it becomes necessary to consider the temporal dynamics of gene interactions. The use of dynamical networks can overcome these limitations. We particularly focus on the use of Boolean networks that, like classical epistasis analysis, relies on logical formalisms, and hence can complement classical epistasis analysis and relax its assumptions. We develop a couple of theoretical examples and analyze them from a dynamic Boolean network model perspective. Boolean networks could help to guide additional experiments and discern among alternative regulatory schemes that would be impossible or difficult to infer without the elimination of these assumption from the classical epistasis analysis. We also use examples from the literature to show how a Boolean network-based approach has resolved ambiguities and guided epistasis analysis. Our article complements previous accounts, not only by focusing on the implications of the hierarchical and

  4. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  5. Comparing Examples: WebAssign versus Textbook

    NASA Astrophysics Data System (ADS)

    Richards, Evan; Polak, Jeff; Hardin, Ashley; Risley, John, , Dr.

    2005-11-01

    Research shows students can learn from worked examples.^1 This pilot study compared two groups of students' performance (10 each) in solving physics problems. One group had access to interactive examples^2 released in WebAssign^3, while the other group had access to the counterpart textbook examples. Verbal data from students in problem solving sessions was collected using a think aloud protocol^4 and the data was analyzed using Chi's procedures.^5 An explanation of the methodology and results will be presented. Future phases of this pilot study based upon these results will also be discussed. ^1Atkinson, R.K., Derry, S.J., Renkl A., Wortham, D. (2000). ``Learning from Examples: Instructional Principles from the Worked Examples Research'', Review of Educational Research, vol. 70, n. 2, pp. 181-214. ^2Serway, R.A. & Faughn, J.S. (2006). College Physics (7^th ed.). Belmont, CA: Thomson Brooks/Cole. ^3 see www.webassign.net ^4 Ericsson, K.A. & Simon, H.A. (1984). Protocol Analysis: Verbal Reports as Data. Cambridge, Massachusetts: The MIT Press. ^5 Chi, Michelene T.H. (1997). ``Quantifying Qualitative Analyses of Verbal Data: A Practical Guide,'' The Journal of the Learning Sciences, vol. 6, n. 3, pp. 271-315.

  6. Exploring Key Sustainable Development Themes through Learning Activities

    ERIC Educational Resources Information Center

    Cruickshank, Heather; Fenner, Richard

    2012-01-01

    Purpose: The purpose of the paper is to examine how a number of key themes are introduced in the Master's programme in Engineering for Sustainable Development, at Cambridge University, through student-centred activities. These themes include dealing with complexity, uncertainty, change, other disciplines, people, environmental limits, whole life…

  7. Key Problems in Science and Technology in Thailand.

    ERIC Educational Resources Information Center

    Yuthavong, Yongyuth; And Others

    1985-01-01

    Cites the need for promoting science/technology management and policy formation in Thailand, viewing contributions of science/technology to the socioeconomic development of the country as high priorities. Criteria for selecting priority areas and key problems are noted; they include relevance to development, availability of human resources, and…

  8. Managing clinical education through understanding key principles.

    PubMed

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  9. Example-based learning: comparing the effects of additionally providing three different integrative learning activities on physiotherapy intervention knowledge.

    PubMed

    Dyer, Joseph-Omer; Hudon, Anne; Montpetit-Tourangeau, Katherine; Charlin, Bernard; Mamede, Sílvia; van Gog, Tamara

    2015-03-07

    Example-based learning using worked examples can foster clinical reasoning. Worked examples are instructional tools that learners can use to study the steps needed to solve a problem. Studying worked examples paired with completion examples promotes acquisition of problem-solving skills more than studying worked examples alone. Completion examples are worked examples in which some of the solution steps remain unsolved for learners to complete. Providing learners engaged in example-based learning with self-explanation prompts has been shown to foster increased meaningful learning compared to providing no self-explanation prompts. Concept mapping and concept map study are other instructional activities known to promote meaningful learning. This study compares the effects of self-explaining, completing a concept map and studying a concept map on conceptual knowledge and problem-solving skills among novice learners engaged in example-based learning. Ninety-one physiotherapy students were randomized into three conditions. They performed a pre-test and a post-test to evaluate their gains in conceptual knowledge and problem-solving skills (transfer performance) in intervention selection. They studied three pairs of worked/completion examples in a digital learning environment. Worked examples consisted of a written reasoning process for selecting an optimal physiotherapy intervention for a patient. The completion examples were partially worked out, with the last few problem-solving steps left blank for students to complete. The students then had to engage in additional self-explanation, concept map completion or model concept map study in order to synthesize and deepen their knowledge of the key concepts and problem-solving steps. Pre-test performance did not differ among conditions. Post-test conceptual knowledge was higher (P < .001) in the concept map study condition (68.8 ± 21.8%) compared to the concept map completion (52.8 ± 17.0%) and self

  10. 12 CFR 1016.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... companies: (1) For your everyday business purposes, such as [include all that apply] to process transactions... retailers, magazine publishers, airlines, and direct marketers; and (iii) Others, followed by examples such... business in person at your office, maintain copies of the notice on hand that you provide to the consumer...

  11. 12 CFR 1016.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... companies: (1) For your everyday business purposes, such as [include all that apply] to process transactions... retailers, magazine publishers, airlines, and direct marketers; and (iii) Others, followed by examples such... business in person at your office, maintain copies of the notice on hand that you provide to the consumer...

  12. 40 CFR 1037.205 - What must I include in my application?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the application (including the test procedures, test parameters, and test fuels) to show you meet the... basic parameters of the vehicle's design and emission controls. List the fuel type on which your vehicles are designed to operate (for example, ultra low-sulfur diesel fuel). (b) Explain how the emission...

  13. 40 CFR 1037.205 - What must I include in my application?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the application (including the test procedures, test parameters, and test fuels) to show you meet the... basic parameters of the vehicle's design and emission controls. List the fuel type on which your vehicles are designed to operate (for example, ultra low-sulfur diesel fuel). (b) Explain how the emission...

  14. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  15. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  16. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  17. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  18. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  19. Input from Key Stakeholders in the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  20. Computational Phenotyping in Psychiatry: A Worked Example

    PubMed Central

    2016-01-01

    Abstract Computational psychiatry is a rapidly emerging field that uses model-based quantities to infer the behavioral and neuronal abnormalities that underlie psychopathology. If successful, this approach promises key insights into (pathological) brain function as well as a more mechanistic and quantitative approach to psychiatric nosology—structuring therapeutic interventions and predicting response and relapse. The basic procedure in computational psychiatry is to build a computational model that formalizes a behavioral or neuronal process. Measured behavioral (or neuronal) responses are then used to infer the model parameters of a single subject or a group of subjects. Here, we provide an illustrative overview over this process, starting from the modeling of choice behavior in a specific task, simulating data, and then inverting that model to estimate group effects. Finally, we illustrate cross-validation to assess whether between-subject variables (e.g., diagnosis) can be recovered successfully. Our worked example uses a simple two-step maze task and a model of choice behavior based on (active) inference and Markov decision processes. The procedural steps and routines we illustrate are not restricted to a specific field of research or particular computational model but can, in principle, be applied in many domains of computational psychiatry. PMID:27517087

  1. Engineering issues for hand-held sensing devices, with examples

    NASA Astrophysics Data System (ADS)

    Freiwald, David A.; Freiwald, Joyce

    1994-03-01

    It is now U.S. defense policy that there will be no new platform starts. The emphasis for platforms will be on O&M cost reduction, life-extension improvements, and force-multiplier- device upgrades. There is also an increasing emphasis on hand-held force-multiplier devices for individuals, which is the focus of this paper. Engineering issues include operations analysis, weight, cube, cost, prime power, ease of use, data storage, reliability, fault tolerance, data communications and human factors. Two examples of hand-held devices are given. Applications include USMC, Army, SOCOM, DEA, FBI, SS, Border Patrol and others. Barriers to adoption of such technology are also discussed.

  2. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  3. Research Says / Mindsets Are Key to Effective Data Use

    ERIC Educational Resources Information Center

    Goodwin, Bryan

    2015-01-01

    All around us are examples of people and organizations with good information making bad decisions. Consider the case of Blockbuster. Less than a decade ago, Blockbuster had 8,000 stores in 17 countries and millions of customers. It was awash in data, including customer surveys that said people disliked going to video stores and hated late fees.…

  4. Non-Logical Discourse: Key to the Composing Process?

    ERIC Educational Resources Information Center

    Poulsen, Richard C.

    One niche in which scholars have not looked for keys to the composing process is the sometimes illusory but vital area of nonlogical discourse, which includes fantasy, hallucination, dream, reverie, vision, trance, and meditation. Abundant evidence exists about the genesis, importance, and use of nonlogical discourse, but this evidence comes…

  5. Key components of financial-analysis education for clinical nurses.

    PubMed

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  6. Method for adding nodes to a quantum key distribution system

    DOEpatents

    Grice, Warren P

    2015-02-24

    An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can establish a secret key without the need for a secret meeting between the clients. The new clients perform operations on photons as they pass through nodes in the quantum channel, and participate in a non-secret protocol that is amended to include the new clients. The system and method significantly increase the number of clients that can be supported by a conventional QKD system, with only a modest increase in cost. The system and method are compatible with a variety of QKD schemes, including polarization, time-bin, continuous variable and entanglement QKD.

  7. Problem-Solving Examples as Interactive Learning Objects for Educational Digital Libraries

    ERIC Educational Resources Information Center

    Brusilovsky, Peter; Yudelson, Michael; Hsiao, I-Han

    2009-01-01

    The paper analyzes three major problems encountered by our team as we endeavored to turn problem solving examples in the domain of programming into highly reusable educational activities, which could be included as first class objects in various educational digital libraries. It also suggests three specific approaches to resolving these problems,…

  8. ACIRF user's guide: Theory and examples

    NASA Astrophysics Data System (ADS)

    Dana, Roger A.

    1989-12-01

    Design and evaluation of radio frequency systems that must operate through ionospheric disturbances resulting from high altitude nuclear detonations requires an accurate channel model. This model must include the effects of high gain antennas that may be used to receive the signals. Such a model can then be used to construct realizations of the received signal for use in digital simulations of trans-ionospheric links or for use in hardware channel simulators. The FORTRAN channel model ACIRF (Antenna Channel Impulse Response Function) generates random realizations of the impulse response function at the outputs of multiple antennas. This user's guide describes the FORTRAN program ACIRF (version 2.0) that generates realizations of channel impulse response functions at the outputs of multiple antennas with arbitrary beamwidths, pointing angles, and relatives positions. This channel model is valid under strong scattering conditions when Rayleigh fading statistics apply. Both frozen-in and turbulent models for the temporal fluctuations are included in this version of ACIRF. The theory of the channel model is described and several examples are given.

  9. Interactive simulations for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  10. Contract Example: Monrovia, CA

    EPA Pesticide Factsheets

    Example Residential and Commercial Solid Waste Franchise Agreement designed to advance zero waste goals between the city of Monrovia and Arakelian Enterprises, Inc. dba Athens Services, a California corporation.

  11. Using Eight Key Questions as an Inquiry-Based Framework for Ethical Reasoning Issues in a General Education Earth Systems and Climate Change Course

    NASA Astrophysics Data System (ADS)

    Johnson, E. A.; Ball, T. C.

    2014-12-01

    An important objective in general education geoscience courses is to help students evaluate social and ethical issues based upon scientific knowledge. It can be difficult for instructors trained in the physical sciences to design effective ways of including ethical issues in large lecture courses where whole-class discussions are not practical. The Quality Enhancement Plan for James Madison University, "The Madison Collaborative: Ethical Reasoning in Action," (http://www.jmu.edu/mc/index.shtml) has identified eight key questions to be used as a framework for developing ethical reasoning exercises and evaluating student learning. These eight questions are represented by the acronym FOR CLEAR and are represented by the concepts of Fairness, Outcomes, Responsibilities, Character, Liberty, Empathy, Authority, and Rights. In this study, we use the eight key questions as an inquiry-based framework for addressing ethical issues in a 100-student general education Earth systems and climate change course. Ethical reasoning exercises are presented throughout the course and range from questions of personal behavior to issues regarding potential future generations and global natural resources. In the first few exercises, key questions are identified for the students and calibrated responses are provided as examples. By the end of the semester, students are expected to identify key questions themselves and justify their own ethical and scientific reasoning. Evaluation rubrics are customized to this scaffolding approach to the exercises. Student feedback and course data will be presented to encourage discussion of this and other approaches to explicitly incorporating ethical reasoning in general education geoscience courses.

  12. Measurement-device-independent entanglement-based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Liu, Hongwei; Yin, Zhenqiang; Li, Zuohan; Lian, Shibin; Du, Yungang; Wu, Lingan

    2016-05-01

    We present a quantum key distribution protocol in a model in which the legitimate users gather statistics as in the measurement-device-independent entanglement witness to certify the sources and the measurement devices. We show that the task of measurement-device-independent quantum communication can be accomplished based on monogamy of entanglement, and it is fairly loss tolerate including source and detector flaws. We derive a tight bound for collective attacks on the Holevo information between the authorized parties and the eavesdropper. Then with this bound, the final secret key rate with the source flaws can be obtained. The results show that long-distance quantum cryptography over 144 km can be made secure using only standard threshold detectors.

  13. Electrical machines and assemblies including a yokeless stator with modular lamination stacks

    DOEpatents

    Qu, Ronghai; Jansen, Patrick Lee; Bagepalli, Bharat Sampathkumar; Carl, Jr., Ralph James; Gadre, Aniruddha Dattatraya; Lopez, Fulton Jose

    2010-04-06

    An electrical machine includes a rotor with an inner rotor portion and an outer rotor portion, and a double-sided yokeless stator. The yokeless stator includes modular lamination stacks and is configured for radial magnetic flux flow. The double-sided yokeless stator is concentrically disposed between the inner rotor portion and the outer rotor portion of the electrical machine. Examples of particularly useful embodiments for the electrical machine include wind turbine generators, ship propulsion motors, switch reluctance machines and double-sided synchronous machines.

  14. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  15. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  16. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  17. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  18. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  19. Concept design theory and model for multi-use space facilities: Analysis of key system design parameters through variance of mission requirements

    NASA Astrophysics Data System (ADS)

    Reynerson, Charles Martin

    This research has been performed to create concept design and economic feasibility data for space business parks. A space business park is a commercially run multi-use space station facility designed for use by a wide variety of customers. Both space hardware and crew are considered as revenue producing payloads. Examples of commercial markets may include biological and materials research, processing, and production, space tourism habitats, and satellite maintenance and resupply depots. This research develops a design methodology and an analytical tool to create feasible preliminary design information for space business parks. The design tool is validated against a number of real facility designs. Appropriate model variables are adjusted to ensure that statistical approximations are valid for subsequent analyses. The tool is used to analyze the effect of various payload requirements on the size, weight and power of the facility. The approach for the analytical tool was to input potential payloads as simple requirements, such as volume, weight, power, crew size, and endurance. In creating the theory, basic principles are used and combined with parametric estimation of data when necessary. Key system parameters are identified for overall system design. Typical ranges for these key parameters are identified based on real human spaceflight systems. To connect the economics to design, a life-cycle cost model is created based upon facility mass. This rough cost model estimates potential return on investments, initial investment requirements and number of years to return on the initial investment. Example cases are analyzed for both performance and cost driven requirements for space hotels, microgravity processing facilities, and multi-use facilities. In combining both engineering and economic models, a design-to-cost methodology is created for more accurately estimating the commercial viability for multiple space business park markets.

  20. Dynamic Programming: An Introduction by Example

    ERIC Educational Resources Information Center

    Zietz, Joachim

    2007-01-01

    The author introduces some basic dynamic programming techniques, using examples, with the help of the computer algebra system "Maple". The emphasis is on building confidence and intuition for the solution of dynamic problems in economics. To integrate the material better, the same examples are used to introduce different techniques. One covers the…

  1. Six Key Factors for Changing Preservice Teachers' Attitudes/Beliefs about Diversity

    ERIC Educational Resources Information Center

    Garmon, M. Arthur

    2005-01-01

    In this article the author postulates there are six key factors associated with changing preservice teachers' attitudes toward and beliefs about diversity-their dispositions, which include openness, self-awarenesss/self-reflectiveness, and commitment to social justice; and their experiences, which include intercultural, educational, and support…

  2. Mucus and microbiota as emerging players in gut nanotoxicology: The example of dietary silver and titanium dioxide nanoparticles.

    PubMed

    Mercier-Bonin, Muriel; Despax, Bernard; Raynaud, Patrice; Houdeau, Eric; Thomas, Muriel

    2018-04-13

    Given the growing use of nanotechnology in many common consumer products, including foods, evaluation of the consequences of chronic exposure to nanoparticles in humans has become a major public health issue. The oral route of exposure has been poorly explored, despite the presence of a fraction of nanosized particles in certain food additives/supplements and the incorporation of such particles into packaging in contact with foods. After their ingestion, these nanoparticles pass through the digestive tract, where they may undergo physicochemical transformations, with consequences for the luminal environment, before crossing the epithelial barrier to reach the systemic compartment. In this review, we consider two examples, nanosilver and nanotitanium dioxide. Despite the specific features of these particles and the differences between them, both display a close relationship between physicochemical reactivity and bioavailability/biopersistence in the gastrointestinal tract. Few studies have focused on the interactions of nanoparticles of silver or titanium dioxide with the microbiota and mucus. However, the microbiota and mucus play key roles in intestinal homeostasis and host health and are undoubtedly involved in controlling the distribution of nanoparticles in the systemic compartment.

  3. Estimation in SEM: A Concrete Example

    ERIC Educational Resources Information Center

    Ferron, John M.; Hess, Melinda R.

    2007-01-01

    A concrete example is used to illustrate maximum likelihood estimation of a structural equation model with two unknown parameters. The fitting function is found for the example, as are the vector of first-order partial derivatives, the matrix of second-order partial derivatives, and the estimates obtained from each iteration of the Newton-Raphson…

  4. Two new species of Oobius Trjapitzin (Hymenoptera, Encyrtidae) egg parasitoids of Agrilus spp. (Coleoptera, Buprestidae) from the USA, including a key and taxonomic notes on other congeneric Nearctic taxa

    PubMed Central

    Triapitsyn, Serguei V.; Petrice, Toby R.; Gates, Michael W.; Bauer, Leah S.

    2015-01-01

    Abstract Oobius Trjapitzin (Hymenoptera, Encyrtidae) species are egg parasitoids that are important for the biological control of some Buprestidae and Cerambycidae (Coleoptera). Two species, Oobius agrili Zhang & Huang and Oobius longoi (Siscaro), were introduced into North America for classical biocontrol and have successfully established. Two new native North American species that parasitize eggs of Agrilus spp. (Buprestidae) are described and illustrated from the USA: Oobius minusculus Triapitsyn & Petrice, sp. n. (Michigan), an egg parasitoid of both Agrilus subcinctus Gory on ash (Fraxinus spp.) and Agrilus egenus Gory on black locust (Robinia pseudoacacia L.) trees, and Oobius whiteorum Triapitsyn, sp. n. (Pennsylvania), an egg parasitoid of Agrilus anxius Gory on European white birch (Betula pendula Roth). A taxonomic key and notes on the Nearctic native and introduced Oobius species are also included. PMID:25931963

  5. Examples of Holistic Good Practices in Promoting and Protecting Mental Health in the Workplace: Current and Future Challenges.

    PubMed

    Sivris, Kelly C; Leka, Stavroula

    2015-12-01

    While attention has been paid to physical risks in the work environment and the promotion of individual employee health, mental health protection and promotion have received much less focus. Psychosocial risk management has not yet been fully incorporated in such efforts. This paper presents good practices in promoting mental health in the workplace in line with World Health Organization (WHO) guidance by identifying barriers, opportunities, and the way forward in this area. Semistructured interviews were conducted with 17 experts who were selected on the basis of their knowledge and expertise in relation to good practice identified tools. Interviewees were asked to evaluate the approaches on the basis of the WHO model for healthy workplaces. The examples of good practice for Workplace Mental Health Promotion (WMHP) are in line with the principles and the five keys of the WHO model. They support the third objective of the WHO comprehensive mental health action plan 2013-2020 for multisectoral implementation of WMHP strategies. Examples of good practice include the engagement of all stakeholders and representatives, science-driven practice, dissemination of good practice, continual improvement, and evaluation. Actions to inform policies/legislation, promote education on psychosocial risks, and provide better evidence were suggested for higher WMHP success. The study identified commonalities in good practice approaches in different countries and stressed the importance of a strong policy and enforcement framework as well as organizational responsibility for WMHP. For progress to be achieved in this area, a holistic and multidisciplinary approach was unanimously suggested as a way to successful implementation.

  6. Examples of Holistic Good Practices in Promoting and Protecting Mental Health in the Workplace: Current and Future Challenges

    PubMed Central

    Sivris, Kelly C.; Leka, Stavroula

    2015-01-01

    Background While attention has been paid to physical risks in the work environment and the promotion of individual employee health, mental health protection and promotion have received much less focus. Psychosocial risk management has not yet been fully incorporated in such efforts. This paper presents good practices in promoting mental health in the workplace in line with World Health Organization (WHO) guidance by identifying barriers, opportunities, and the way forward in this area. Methods Semistructured interviews were conducted with 17 experts who were selected on the basis of their knowledge and expertise in relation to good practice identified tools. Interviewees were asked to evaluate the approaches on the basis of the WHO model for healthy workplaces. Results The examples of good practice for Workplace Mental Health Promotion (WMHP) are in line with the principles and the five keys of the WHO model. They support the third objective of the WHO comprehensive mental health action plan 2013–2020 for multisectoral implementation of WMHP strategies. Examples of good practice include the engagement of all stakeholders and representatives, science-driven practice, dissemination of good practice, continual improvement, and evaluation. Actions to inform policies/legislation, promote education on psychosocial risks, and provide better evidence were suggested for higher WMHP success. Conclusion The study identified commonalities in good practice approaches in different countries and stressed the importance of a strong policy and enforcement framework as well as organizational responsibility for WMHP. For progress to be achieved in this area, a holistic and multidisciplinary approach was unanimously suggested as a way to successful implementation. PMID:26929841

  7. System concepts and design examples for optical communication with planetary spacecraft

    NASA Astrophysics Data System (ADS)

    Lesh, James R.

    Systems concepts for optical communication with future deep-space (planetary) spacecraft are described. These include not only the optical transceiver package aboard the distant spacecraft, but the earth-vicinity optical-communications receiving station as well. Both ground-based, and earth-orbiting receivers are considered. Design examples for a number of proposed or potential deep-space missions are then presented. These include an orbital mission to Saturn, a Lander and Rover mission to Mars, and an astronomical mission to a distance of 1000 astronomical units.

  8. [Application of bioassay in quality control of Chinese materia medica-taking Radix Isatidis as an example].

    PubMed

    Yan, Dan; Ren, Yongshen; Luo, Jiaoyang; Li, Hanbing; Feng, Xue; Xiao, Xiaohe

    2010-10-01

    Bioassay, which construct the characteristics consistents with Chinese medical science, is the core mode and methods for the quality control of Chinese materia medica. Taking the bioassay of Radix Isatidis as an example, the contribution, status and application of bioassay in the quality control of Chinese materia medica were introduced in this article, and two key issue (the selection of reference and measurement methods) in the process of establishing bioassay were also explained. This article expects to provide a reference for the development and improvement of the bioassay of Chinese materia medica in a practical manipulation level.

  9. The genomes of two key bumblebee species with primitive eusocial organization.

    PubMed

    Sadd, Ben M; Barribeau, Seth M; Bloch, Guy; de Graaf, Dirk C; Dearden, Peter; Elsik, Christine G; Gadau, Jürgen; Grimmelikhuijzen, Cornelis J P; Hasselmann, Martin; Lozier, Jeffrey D; Robertson, Hugh M; Smagghe, Guy; Stolle, Eckart; Van Vaerenbergh, Matthias; Waterhouse, Robert M; Bornberg-Bauer, Erich; Klasberg, Steffen; Bennett, Anna K; Câmara, Francisco; Guigó, Roderic; Hoff, Katharina; Mariotti, Marco; Munoz-Torres, Monica; Murphy, Terence; Santesmasses, Didac; Amdam, Gro V; Beckers, Matthew; Beye, Martin; Biewer, Matthias; Bitondi, Márcia M G; Blaxter, Mark L; Bourke, Andrew F G; Brown, Mark J F; Buechel, Severine D; Cameron, Rossanah; Cappelle, Kaat; Carolan, James C; Christiaens, Olivier; Ciborowski, Kate L; Clarke, David F; Colgan, Thomas J; Collins, David H; Cridge, Andrew G; Dalmay, Tamas; Dreier, Stephanie; du Plessis, Louis; Duncan, Elizabeth; Erler, Silvio; Evans, Jay; Falcon, Tiago; Flores, Kevin; Freitas, Flávia C P; Fuchikawa, Taro; Gempe, Tanja; Hartfelder, Klaus; Hauser, Frank; Helbing, Sophie; Humann, Fernanda C; Irvine, Frano; Jermiin, Lars S; Johnson, Claire E; Johnson, Reed M; Jones, Andrew K; Kadowaki, Tatsuhiko; Kidner, Jonathan H; Koch, Vasco; Köhler, Arian; Kraus, F Bernhard; Lattorff, H Michael G; Leask, Megan; Lockett, Gabrielle A; Mallon, Eamonn B; Antonio, David S Marco; Marxer, Monika; Meeus, Ivan; Moritz, Robin F A; Nair, Ajay; Näpflin, Kathrin; Nissen, Inga; Niu, Jinzhi; Nunes, Francis M F; Oakeshott, John G; Osborne, Amy; Otte, Marianne; Pinheiro, Daniel G; Rossié, Nina; Rueppell, Olav; Santos, Carolina G; Schmid-Hempel, Regula; Schmitt, Björn D; Schulte, Christina; Simões, Zilá L P; Soares, Michelle P M; Swevers, Luc; Winnebeck, Eva C; Wolschin, Florian; Yu, Na; Zdobnov, Evgeny M; Aqrawi, Peshtewani K; Blankenburg, Kerstin P; Coyle, Marcus; Francisco, Liezl; Hernandez, Alvaro G; Holder, Michael; Hudson, Matthew E; Jackson, LaRonda; Jayaseelan, Joy; Joshi, Vandita; Kovar, Christie; Lee, Sandra L; Mata, Robert; Mathew, Tittu; Newsham, Irene F; Ngo, Robin; Okwuonu, Geoffrey; Pham, Christopher; Pu, Ling-Ling; Saada, Nehad; Santibanez, Jireh; Simmons, DeNard; Thornton, Rebecca; Venkat, Aarti; Walden, Kimberly K O; Wu, Yuan-Qing; Debyser, Griet; Devreese, Bart; Asher, Claire; Blommaert, Julie; Chipman, Ariel D; Chittka, Lars; Fouks, Bertrand; Liu, Jisheng; O'Neill, Meaghan P; Sumner, Seirian; Puiu, Daniela; Qu, Jiaxin; Salzberg, Steven L; Scherer, Steven E; Muzny, Donna M; Richards, Stephen; Robinson, Gene E; Gibbs, Richard A; Schmid-Hempel, Paul; Worley, Kim C

    2015-04-24

    The shift from solitary to social behavior is one of the major evolutionary transitions. Primitively eusocial bumblebees are uniquely placed to illuminate the evolution of highly eusocial insect societies. Bumblebees are also invaluable natural and agricultural pollinators, and there is widespread concern over recent population declines in some species. High-quality genomic data will inform key aspects of bumblebee biology, including susceptibility to implicated population viability threats. We report the high quality draft genome sequences of Bombus terrestris and Bombus impatiens, two ecologically dominant bumblebees and widely utilized study species. Comparing these new genomes to those of the highly eusocial honeybee Apis mellifera and other Hymenoptera, we identify deeply conserved similarities, as well as novelties key to the biology of these organisms. Some honeybee genome features thought to underpin advanced eusociality are also present in bumblebees, indicating an earlier evolution in the bee lineage. Xenobiotic detoxification and immune genes are similarly depauperate in bumblebees and honeybees, and multiple categories of genes linked to social organization, including development and behavior, show high conservation. Key differences identified include a bias in bumblebee chemoreception towards gustation from olfaction, and striking differences in microRNAs, potentially responsible for gene regulation underlying social and other traits. These two bumblebee genomes provide a foundation for post-genomic research on these key pollinators and insect societies. Overall, gene repertoires suggest that the route to advanced eusociality in bees was mediated by many small changes in many genes and processes, and not by notable expansion or depauperation.

  10. 32 CFR 644.102 - Examples of involuntary acquisitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Examples of involuntary acquisitions. 644.102... PROPERTY REAL ESTATE HANDBOOK Acquisition Involuntary Acquisition by the United States § 644.102 Examples... property, as prescribed by Pub. L. 91-646. Examples of involuntary acquisition are: (a) Damage to real...

  11. Key metrics for HFIR HEU and LEU models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ilas, Germina; Betzler, Benjamin R.; Chandler, David

    This report compares key metrics for two fuel design models of the High Flux Isotope Reactor (HFIR). The first model represents the highly enriched uranium (HEU) fuel currently in use at HFIR, and the second model considers a low-enriched uranium (LEU) interim design fuel. Except for the fuel region, the two models are consistent, and both include an experiment loading that is representative of HFIR's current operation. The considered key metrics are the neutron flux at the cold source moderator vessel, the mass of 252Cf produced in the flux trap target region as function of cycle time, the fast neutronmore » flux at locations of interest for material irradiation experiments, and the reactor cycle length. These key metrics are a small subset of the overall HFIR performance and safety metrics. They were defined as a means of capturing data essential for HFIR's primary missions, for use in optimization studies assessing the impact of HFIR's conversion from HEU fuel to different types of LEU fuel designs.« less

  12. Locally acquired Dengue--Key West, Florida, 2009-2010.

    PubMed

    2010-05-21

    Dengue is the most common vector-borne viral disease in the world, causing an estimated 50-100 million infections and 25,000 deaths each year. During 1946-1980, no cases of dengue acquired in the continental United States were reported. Since 1980, a few locally acquired U.S. cases have been confirmed along the Texas-Mexico border, temporally associated with large outbreaks in neighboring Mexican cities. On September 1, 2009, a New York physician notified the Monroe County (Florida) Health Department (MCHD) and the Florida Department of Health (FDOH) of a suspected dengue case in a New York state resident whose only recent travel was to Key West, Florida. CDC confirmed the diagnosis, and a press release was issued to notify the public and Key West physicians of the potential risk for locally acquired dengue infections. In the next 2 weeks, two dengue infections in Key West residents without recent travel were reported and confirmed. Subsequently, enhanced and active surveillance identified 24 more Key West cases during 2009. On April 13, 2010, another Key West dengue case was reported to FDOH, bringing the total to 28. This report describes the first three dengue cases reported in 2009, briefly summarizes the 2010 case, highlights preliminary findings from the ongoing investigation, and outlines measures used to mitigate and control the outbreak. Clinicians should include dengue in the differential diagnosis of acute febrile illnesses in patients who live in or have recently traveled to subtropical areas of the United States or to the tropics.

  13. Cyclic Polyynes as Examples of the Quantum Mechanical Particle on a Ring

    ERIC Educational Resources Information Center

    Anderson, Bruce D.

    2012-01-01

    Many quantum mechanical models are discussed as part of the undergraduate physical chemistry course to help students understand the connection between eigenvalue expressions and spectroscopy. Typical examples covered include the particle in a box, the harmonic oscillator, the rigid rotor, and the hydrogen atom. This article demonstrates that…

  14. Principles of visual key construction-with a visual identification key to the Fagaceae of the southeastern United States.

    PubMed

    Kirchoff, Bruce K; Leggett, Roxanne; Her, Va; Moua, Chue; Morrison, Jessica; Poole, Chamika

    2011-01-01

    Advances in digital imaging have made possible the creation of completely visual keys. By a visual key we mean a key based primarily on images, and that contains a minimal amount of text. Characters in visual keys are visually, not verbally defined. In this paper we create the first primarily visual key to a group of taxa, in this case the Fagaceae of the southeastern USA. We also modify our recently published set of best practices for image use in illustrated keys to make them applicable to visual keys. Photographs of the Fagaceae were obtained from internet and herbarium databases or were taken specifically for this project. The images were printed and then sorted into hierarchical groups. These hierarchical groups of images were used to create the 'couplets' in the key. A reciprocal process of key creation and testing was used to produce the final keys. Four keys were created, one for each of the parts-leaves, buds, fruits and bark. Species description pages consisting of multiple images were also created for each of the species in the key. Creation and testing of the key resulted in a modified list of best practices for image use visual keys. The inclusion of images into paper and electronic keys has greatly increased their ease of use. However, virtually all of these keys are still based upon verbally defined, atomistic characters. The creation of primarily visual keys allows us to overcome the well-known limitations of linguistic-based characters and create keys that are much easier to use, especially for botanical novices.

  15. Standardization of health data – ICAR guidelines including health key

    USDA-ARS?s Scientific Manuscript database

    Systematic improvement of animal health requires knowledge about the status quo and reliable measures to characterize it. In dairy herds, health monitoring has gained importance to ensure sustainable and cost-efficient milk production in accordance with public expectations. In this context, standard...

  16. Using Learner Generated Examples to Introduce New Concepts

    ERIC Educational Resources Information Center

    Watson, Anne; Shipman, Steve

    2008-01-01

    In this paper we describe learners being asked to generate examples of new mathematical concepts, thus developing and exploring example spaces. First we elaborate the theoretical background for learner generated examples (LGEs) in learning new concepts. The data we then present provides evidence of the possibility of learning new concepts through…

  17. A free-access online key to identify Amazonian ferns.

    PubMed

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp.

  18. A free-access online key to identify Amazonian ferns

    PubMed Central

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    Abstract There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp. PMID:28781548

  19. Maximizing the benefits of antiretroviral therapy for key affected populations.

    PubMed

    Grubb, Ian R; Beckham, Sarah W; Kazatchkine, Michel; Thomas, Ruth M; Albers, Eliot R; Cabral, Mauro; Lange, Joep; Vella, Stefano; Kurian, Manoj; Beyrer, Chris

    2014-01-01

    Scientific research has demonstrated the clinical benefits of earlier initiation of antiretroviral treatment (ART), and that ART can markedly reduce HIV transmission to sexual partners. Ensuring universal access to ART for those who need it has long been a core principle of the HIV response, and extending the benefits of ART to key populations is critical to increasing the impact of ART and the overall effectiveness of the HIV response. However, this can only be achieved through coordinated efforts to address political, social, legal and economic barriers that key populations face in accessing HIV services. Recent analyses show that HIV prevalence levels among key populations are far higher than among the general population, and they experience a range of biological and behavioural factors, and social, legal and economic barriers that increase their vulnerability to HIV and have resulted in alarmingly low ART coverage. World Health Organization 2014 consolidated guidance on HIV among key populations offers the potential for increased access to ART by key populations, following the same principles as for the general adult population. However, it should not be assumed that key populations will achieve greater access to ART unless stigma, discrimination and punitive laws, policies and practices that limit access to ART and other HIV interventions in many countries are addressed. Rights-based approaches and investments in critical enablers, such as supportive legal and policy environments, are essential to enable wider access to ART and other HIV interventions for key populations. The primary objective of ART should always be to treat the person living with HIV; prevention is an important, additional benefit. ART should be provided only with informed consent. The preventive benefits of treatment must not be used as a pretext for failure to provide other necessary HIV programming for key populations, including comprehensive harm reduction and other prevention

  20. Screening of the key volatile organic compounds of Tuber melanosporum fermentation by aroma sensory evaluation combination with principle component analysis

    PubMed Central

    Liu, Rui-Sang; Jin, Guang-Huai; Xiao, Deng-Rong; Li, Hong-Mei; Bai, Feng-Wu; Tang, Ya-Jie

    2015-01-01

    Aroma results from the interplay of volatile organic compounds (VOCs) and the attributes of microbial-producing aromas are significantly affected by fermentation conditions. Among the VOCs, only a few of them contribute to aroma. Thus, screening and identification of the key VOCs is critical for microbial-producing aroma. The traditional method is based on gas chromatography-olfactometry (GC-O), which is time-consuming and laborious. Considering the Tuber melanosporum fermentation system as an example, a new method to screen and identify the key VOCs by combining the aroma evaluation method with principle component analysis (PCA) was developed in this work. First, an aroma sensory evaluation method was developed to screen 34 potential favorite aroma samples from 504 fermentation samples. Second, PCA was employed to screen nine common key VOCs from these 34 samples. Third, seven key VOCs were identified by the traditional method. Finally, all of the seven key VOCs identified by the traditional method were also identified, along with four others, by the new strategy. These results indicate the reliability of the new method and demonstrate it to be a viable alternative to the traditional method. PMID:26655663

  1. Real-Time Biologically Inspired Action Recognition from Key Poses Using a Neuromorphic Architecture.

    PubMed

    Layher, Georg; Brosch, Tobias; Neumann, Heiko

    2017-01-01

    Intelligent agents, such as robots, have to serve a multitude of autonomous functions. Examples are, e.g., collision avoidance, navigation and route planning, active sensing of its environment, or the interaction and non-verbal communication with people in the extended reach space. Here, we focus on the recognition of the action of a human agent based on a biologically inspired visual architecture of analyzing articulated movements. The proposed processing architecture builds upon coarsely segregated streams of sensory processing along different pathways which separately process form and motion information (Layher et al., 2014). Action recognition is performed in an event-based scheme by identifying representations of characteristic pose configurations (key poses) in an image sequence. In line with perceptual studies, key poses are selected unsupervised utilizing a feature-driven criterion which combines extrema in the motion energy with the horizontal and the vertical extendedness of a body shape. Per class representations of key pose frames are learned using a deep convolutional neural network consisting of 15 convolutional layers. The network is trained using the energy-efficient deep neuromorphic networks ( Eedn ) framework (Esser et al., 2016), which realizes the mapping of the trained synaptic weights onto the IBM Neurosynaptic System platform (Merolla et al., 2014). After the mapping, the trained network achieves real-time capabilities for processing input streams and classify input images at about 1,000 frames per second while the computational stages only consume about 70 mW of energy (without spike transduction). Particularly regarding mobile robotic systems, a low energy profile might be crucial in a variety of application scenarios. Cross-validation results are reported for two different datasets and compared to state-of-the-art action recognition approaches. The results demonstrate, that (I) the presented approach is on par with other key pose based

  2. Real-Time Biologically Inspired Action Recognition from Key Poses Using a Neuromorphic Architecture

    PubMed Central

    Layher, Georg; Brosch, Tobias; Neumann, Heiko

    2017-01-01

    Intelligent agents, such as robots, have to serve a multitude of autonomous functions. Examples are, e.g., collision avoidance, navigation and route planning, active sensing of its environment, or the interaction and non-verbal communication with people in the extended reach space. Here, we focus on the recognition of the action of a human agent based on a biologically inspired visual architecture of analyzing articulated movements. The proposed processing architecture builds upon coarsely segregated streams of sensory processing along different pathways which separately process form and motion information (Layher et al., 2014). Action recognition is performed in an event-based scheme by identifying representations of characteristic pose configurations (key poses) in an image sequence. In line with perceptual studies, key poses are selected unsupervised utilizing a feature-driven criterion which combines extrema in the motion energy with the horizontal and the vertical extendedness of a body shape. Per class representations of key pose frames are learned using a deep convolutional neural network consisting of 15 convolutional layers. The network is trained using the energy-efficient deep neuromorphic networks (Eedn) framework (Esser et al., 2016), which realizes the mapping of the trained synaptic weights onto the IBM Neurosynaptic System platform (Merolla et al., 2014). After the mapping, the trained network achieves real-time capabilities for processing input streams and classify input images at about 1,000 frames per second while the computational stages only consume about 70 mW of energy (without spike transduction). Particularly regarding mobile robotic systems, a low energy profile might be crucial in a variety of application scenarios. Cross-validation results are reported for two different datasets and compared to state-of-the-art action recognition approaches. The results demonstrate, that (I) the presented approach is on par with other key pose based

  3. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    NASA Astrophysics Data System (ADS)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  4. Nephrology key information for internists

    PubMed Central

    Salim, Sohail Abdul; Medaura, Juan A.; Malhotra, Bharat; Garla, Vishnu; Ahuja, Shradha; Lawson, Nicki; Pamarthy, Amaleswari; Sonani, Hardik; Kovvuru, Karthik; Palabindala, Venkataraman

    2017-01-01

    ABSTRACT Hospitalists and primary care physicians encounter renal disease daily. Although most cases of acute kidney injury (AKI) are secondary to dehydration and resolve by giving fluids, many cases of AKI are due to not uncommon but unfamiliar causes needing nephrology evaluation. Common indications to consult a nephrologist on an emergency basis include hyperkalemia or volume overload in end stage renal disease patients (ESRD). Other causes of immediate consultation are cresenteric glomerulonephritis / rapidly progressive glomerulonephritis in which renal prognosis of the patient depends on timely intervention. The following evidence-based key information could improve patient care and outcomes. Abbreviations: AKI: Acute kidney injury ESRD: End stage renal disease patients PMID:28638567

  5. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    PubMed

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  6. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  7. Key recovery factors for the August 24, 2014, South Napa Earthquake

    USGS Publications Warehouse

    Hudnut, Kenneth W.; Brocher, Thomas M.; Prentice, Carol S.; Boatwright, John; Brooks, Benjamin A.; Aagaard, Brad T.; Blair, James Luke; Fletcher, Jon Peter B.; Erdem, Jemile; Wicks, Chuck; Murray, Jessica R.; Pollitz, Fred F.; Langbein, John O.; Svarc, Jerry L.; Schwartz, David P.; Ponti, Daniel J.; Hecker, Suzanne; DeLong, Stephen B.; Rosa, Carla M.; Jones, Brenda; Lamb, Rynn M.; Rosinski, Anne M.; McCrink, Timothy P.; Dawson, Timothy E.; Seitz, Gordon G.; Glennie, Craig; Hauser, Darren; Ericksen, Todd; Mardock, Dan; Hoirup, Don F.; Bray, Jonathan D.; Rubin, Ron S.

    2014-01-01

    Through discussions between the Federal Emergency Management Agency (FEMA) and the U.S. Geological Survey (USGS) following the South Napa earthquake, it was determined that several key decision points would be faced by FEMA for which additional information should be sought and provided by USGS and its partners. This report addresses the four tasks that were agreed to. These tasks are (1) assessment of ongoing fault movement (called afterslip) especially in the Browns Valley residential neighborhood, (2) assessment of the shaking pattern in the downtown area of the City of Napa, (3) improvement of information on the fault hazards posed by the West Napa Fault System (record of past earthquakes and slip rate, for example), and (4) imagery acquisition and data processing to provide overall geospatial information support to FEMA.

  8. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  9. PUMAS: The On-line journal of Math and Science Examples for Pre-College Education

    NASA Astrophysics Data System (ADS)

    Trainer, Melissa G.; Kahn, Ralph A.

    2015-11-01

    PUMAS - “Practical Uses of Math And Science” - is an on-line collection of brief examples showing how math and science topics taught in K-12 classes can be used in interesting settings, including every day life. The examples are written primarily by scientists, engineers, and other content experts having practical experience with the material. They are aimed mainly at classroom teachers to enrich their presentation of math and science topics. The goal of PUMAS is to capture, for the benefit of pre-college education, the flavor of the vast experience that working scientists have with interesting and practical uses of math and science. There are currently over 80 examples in the PUMAS collection, and they are organized by curriculum topics and tagged with relevant grade levels and curriculum topic benchmarks. The published examples cover a wide range of subject matter: from demonstrating why summer is hot, to describing the fluid dynamics of a lava lamp, to calculating the best age to collect Social Security Benefits. The examples are available to all interested parties via the PUMAS web site: http://pumas.nasa.gov/.We invite the community to participate in the PUMAS collection. We seek scientists and scientific thinkers to provide innovative examples of practical uses for teachers to use to enrich the classroom experience, and content experts to participate in peer-review. We also seek teachers to review examples for originality, accuracy of content, clarity of presentation, and grade-level appropriateness. Finally, we encourage teachers to mine this rich repository for real-world examples to demonstrate the value of math in science in everyday life.

  10. Learning Probabilistic Logic Models from Probabilistic Examples

    PubMed Central

    Chen, Jianzhong; Muggleton, Stephen; Santos, José

    2009-01-01

    Abstract We revisit an application developed originally using abductive Inductive Logic Programming (ILP) for modeling inhibition in metabolic networks. The example data was derived from studies of the effects of toxins on rats using Nuclear Magnetic Resonance (NMR) time-trace analysis of their biofluids together with background knowledge representing a subset of the Kyoto Encyclopedia of Genes and Genomes (KEGG). We now apply two Probabilistic ILP (PILP) approaches - abductive Stochastic Logic Programs (SLPs) and PRogramming In Statistical modeling (PRISM) to the application. Both approaches support abductive learning and probability predictions. Abductive SLPs are a PILP framework that provides possible worlds semantics to SLPs through abduction. Instead of learning logic models from non-probabilistic examples as done in ILP, the PILP approach applied in this paper is based on a general technique for introducing probability labels within a standard scientific experimental setting involving control and treated data. Our results demonstrate that the PILP approach provides a way of learning probabilistic logic models from probabilistic examples, and the PILP models learned from probabilistic examples lead to a significant decrease in error accompanied by improved insight from the learned results compared with the PILP models learned from non-probabilistic examples. PMID:19888348

  11. Learning Probabilistic Logic Models from Probabilistic Examples.

    PubMed

    Chen, Jianzhong; Muggleton, Stephen; Santos, José

    2008-10-01

    We revisit an application developed originally using abductive Inductive Logic Programming (ILP) for modeling inhibition in metabolic networks. The example data was derived from studies of the effects of toxins on rats using Nuclear Magnetic Resonance (NMR) time-trace analysis of their biofluids together with background knowledge representing a subset of the Kyoto Encyclopedia of Genes and Genomes (KEGG). We now apply two Probabilistic ILP (PILP) approaches - abductive Stochastic Logic Programs (SLPs) and PRogramming In Statistical modeling (PRISM) to the application. Both approaches support abductive learning and probability predictions. Abductive SLPs are a PILP framework that provides possible worlds semantics to SLPs through abduction. Instead of learning logic models from non-probabilistic examples as done in ILP, the PILP approach applied in this paper is based on a general technique for introducing probability labels within a standard scientific experimental setting involving control and treated data. Our results demonstrate that the PILP approach provides a way of learning probabilistic logic models from probabilistic examples, and the PILP models learned from probabilistic examples lead to a significant decrease in error accompanied by improved insight from the learned results compared with the PILP models learned from non-probabilistic examples.

  12. Examples from Astronomy for High School Physics

    NASA Astrophysics Data System (ADS)

    Dieterich, Sergio

    2016-01-01

    A formal course in physics is increasingly becoming a standard requirement in the high school curriculum. With that dissemination comes the challenge of reaching and motivating a population that is more diverse in their academic abilities and intrinsic motivation. The abstract nature of pure physics is often made more accessible when motivated by examples from everyday life, and providing copious mathematical as well as conceptual examples has become standard practice in high school physics textbooks. Astronomy is a naturally captivating subject and astronomical examples are often successful in capturing the curiosity of high school students as well as the general population. This project seeks to diversify the range of pedagogical materials available to the high school physics instructor by compiling and publishing specific examples where an astronomical concept can be used to motivate the physics curriculum. This collection of examples will consist of both short problems suitable for daily homework assignments as well as longer project style activities. Collaborations are encouraged and inquiries should be directed to sdieterich at carnegiescience dot edu.This work is funded by the NSF Astronomy and Astrophysics Postdoctoral Fellowship Program through NSF grant AST-1400680.

  13. 31 CFR Appendix A to Subpart C of... - Examples

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Examples A Appendix A to Subpart C of... A to Subpart C of Part 29—Examples This appendix contains sample calculations of Federal Benefit Payments in a variety of situations. Optional Retirement Examples Example 1: No Unused Sick Leave A. In...

  14. Examples in the Teaching of Mathematics: Teachers' Perceptions

    ERIC Educational Resources Information Center

    Ng, Lay Keow; Dindyal, Jaguthsing

    2015-01-01

    As part of a study examining how teachers in Singapore select and use examples for teaching mathematics, 121 teachers from 24 secondary schools responded to three open-ended questions about the use of examples in teaching. The results show that students' abilities and the difficulty level of the examples were among the topmost considerations…

  15. Motivation of synthesis, with an example on groundwater quality sustainability

    NASA Astrophysics Data System (ADS)

    Fogg, G. E.; Labolle, E. M.

    2007-12-01

    Synthesis of ideas and theories from disparate disciplines is necessary for addressing the major problems faced by society. Such integration happens neither via edict nor via lofty declarations of what is needed or what is best. It happens mainly through two mechanisms: limited scope collaborations (e.g., ~2-3 investigators) in which the researchers believe deeply in their need for each other's expertise and much larger scope collaborations driven by the 'big idea.' Perhaps the strongest motivation for broad, effective synthesis is the 'big idea' that is sufficiently important and inspiring to marshal the appropriate collaborative efforts. Examples include the Manhattan Project, the quest for cancer cures, predicting effects of climate change, and groundwater quality sustainability. The latter is posed as an example of a 'big idea' that would potentially unify research efforts in both the sciences and social sciences toward a common, pressing objective.

  16. Undergraduates talk about their choice to study physics at university: what was key to their participation?

    NASA Astrophysics Data System (ADS)

    Rodd, Melissa; Reiss, Michael; Mujtaba, Tamjid

    2013-07-01

    Background . The research on which this article is based was commissioned because of concerns about perceived shortages of willing and able young people choosing to study physics at university. Purpose This article reports on first year physics undergraduates' narratives of why they are studying physics and uses these narratives to identify reasons for their choice. Design and method Narrative-style interviewing with a purposive sample of first year undergraduates yielded data that revealed complexities around decision making, including choice of university course. Analysis of the texts was informed by psychoanalytical notions rooted in the work of Sigmund Freud. These psychoanalytical notions were used both in generating the interview data - the undergraduate volunteer interviewees were conceptualised as 'defended subjects' - and in analysing these interviews in order to conjecture how unconscious forces might figure in young people's decision making. Results After analysing the interviews with physics undergraduates, with respect to the question 'why are they reading physics?', the claim is that identification with a key adult is an important element in an individual's participation. On the other hand, we discerned no evidence that experience of the sorts of innovation typically designed to increase physics uptake - for example 'fun projects' or competitions - had been key with respect to a desire to read physics. Conclusion Attempts to recruit more students to university to study physics should note that a young person who identifies with a significant adult associated with physics, typically a teacher or family member, is in a good position to believe that physics is a subject that is worth studying.

  17. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    NASA Astrophysics Data System (ADS)

    Datta, Shounak; Goswami, Suchetana; Pramanik, Tanumoy; Majumdar, A. S.

    2017-03-01

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment.

  18. Using Framework Analysis in nursing research: a worked example.

    PubMed

    Ward, Deborah J; Furber, Christine; Tierney, Stephanie; Swallow, Veronica

    2013-11-01

    To demonstrate Framework Analysis using a worked example and to illustrate how criticisms of qualitative data analysis including issues of clarity and transparency can be addressed. Critics of the analysis of qualitative data sometimes cite lack of clarity and transparency about analytical procedures; this can deter nurse researchers from undertaking qualitative studies. Framework Analysis is flexible, systematic, and rigorous, offering clarity, transparency, an audit trail, an option for theme-based and case-based analysis and for readily retrievable data. This paper offers further explanation of the process undertaken which is illustrated with a worked example. Data were collected from 31 nursing students in 2009 using semi-structured interviews. The data collected are not reported directly here but used as a worked example for the five steps of Framework Analysis. Suggestions are provided to guide researchers through essential steps in undertaking Framework Analysis. The benefits and limitations of Framework Analysis are discussed. Nurses increasingly use qualitative research methods and need to use an analysis approach that offers transparency and rigour which Framework Analysis can provide. Nurse researchers may find the detailed critique of Framework Analysis presented in this paper a useful resource when designing and conducting qualitative studies. Qualitative data analysis presents challenges in relation to the volume and complexity of data obtained and the need to present an 'audit trail' for those using the research findings. Framework Analysis is an appropriate, rigorous and systematic method for undertaking qualitative analysis. © 2013 Blackwell Publishing Ltd.

  19. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  20. Query by example video based on fuzzy c-means initialized by fixed clustering center

    NASA Astrophysics Data System (ADS)

    Hou, Sujuan; Zhou, Shangbo; Siddique, Muhammad Abubakar

    2012-04-01

    Currently, the high complexity of video contents has posed the following major challenges for fast retrieval: (1) efficient similarity measurements, and (2) efficient indexing on the compact representations. A video-retrieval strategy based on fuzzy c-means (FCM) is presented for querying by example. Initially, the query video is segmented and represented by a set of shots, each shot can be represented by a key frame, and then we used video processing techniques to find visual cues to represent the key frame. Next, because the FCM algorithm is sensitive to the initializations, here we initialized the cluster center by the shots of query video so that users could achieve appropriate convergence. After an FCM cluster was initialized by the query video, each shot of query video was considered a benchmark point in the aforesaid cluster, and each shot in the database possessed a class label. The similarity between the shots in the database with the same class label and benchmark point can be transformed into the distance between them. Finally, the similarity between the query video and the video in database was transformed into the number of similar shots. Our experimental results demonstrated the performance of this proposed approach.

  1. An Interactive Multimedia Dichotomous Key for Teaching Plant Identification

    ERIC Educational Resources Information Center

    Jacquemart, Anne-Laure; Lhoir, Pierre; Binard, Fabian; Descamps, Charlotte

    2016-01-01

    Teaching plant identification includes demonstrating how to use dichotomous keys; this requires knowledge of numerous botanical terms and can be challenging, confusing and frustrating for students. Here, we developed a multimedia tool to help students (1) learn botanical terms, (2) practice, train and test their knowledge of plant identification…

  2. Cancer and Intellectual Disability: A Review of Some Key Contextual Issues

    ERIC Educational Resources Information Center

    Hogg, James; Tuffrey-Wijne, Irene

    2008-01-01

    Research into the health of people with intellectual disabilities has increasingly focused on the occurrence of cancer in this population. Information on the incidence and prevalence of cancer is reviewed in both institutional and community settings. Examples of environmental causation are considered including "Helicobacter pylori."…

  3. 21 CFR 1000.15 - Examples of electronic products subject to the Radiation Control for Health and Safety Act of 1968.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... (a) Examples of electronic products which may emit x-rays and other ionizing electromagnetic radiation, electrons, neutrons, and other particulate radiation include: Ionizing electromagnetic radiation... radiation and ionizing electromagnetic radiation: Electron microscopes. Neutron generators. (b) Examples of...

  4. 21 CFR 1000.15 - Examples of electronic products subject to the Radiation Control for Health and Safety Act of 1968.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... (a) Examples of electronic products which may emit x-rays and other ionizing electromagnetic radiation, electrons, neutrons, and other particulate radiation include: Ionizing electromagnetic radiation... radiation and ionizing electromagnetic radiation: Electron microscopes. Neutron generators. (b) Examples of...

  5. 21 CFR 1000.15 - Examples of electronic products subject to the Radiation Control for Health and Safety Act of 1968.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... (a) Examples of electronic products which may emit x-rays and other ionizing electromagnetic radiation, electrons, neutrons, and other particulate radiation include: Ionizing electromagnetic radiation... radiation and ionizing electromagnetic radiation: Electron microscopes. Neutron generators. (b) Examples of...

  6. 21 CFR 1000.15 - Examples of electronic products subject to the Radiation Control for Health and Safety Act of 1968.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... (a) Examples of electronic products which may emit x-rays and other ionizing electromagnetic radiation, electrons, neutrons, and other particulate radiation include: Ionizing electromagnetic radiation... radiation and ionizing electromagnetic radiation: Electron microscopes. Neutron generators. (b) Examples of...

  7. 21 CFR 1000.15 - Examples of electronic products subject to the Radiation Control for Health and Safety Act of 1968.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... (a) Examples of electronic products which may emit x-rays and other ionizing electromagnetic radiation, electrons, neutrons, and other particulate radiation include: Ionizing electromagnetic radiation... radiation and ionizing electromagnetic radiation: Electron microscopes. Neutron generators. (b) Examples of...

  8. An intelligent computer tutor to guide self-explanation while learning from examples

    NASA Astrophysics Data System (ADS)

    Conati, Cristina

    1999-11-01

    Many studies in cognitive science show that self-explanation---the process of clarifying and making more complete to oneself the solution of an example---improves learning, and that guiding self-explanation extends these benefits. This thesis presents an intelligent computer tutor that aims to improve learning from examples by supporting self-explanation. The tutor, known as the SE (self-explanation) Coach, is innovative in two ways. First, it represents the first attempt to develop a computer tutor that supports example studying instead of problem solving. Second, it explicitly guides a domain-general, meta-cognitive skill: self-explanation. The SE-Coach is part of the Andes tutoring system for college physics and is meant to be used in conjunction with the problem solving tasks that Andes supports. In order to maximize the system capability to trigger the same beneficial cognitive processes, every element of the SE-Coach embeds existing hypotheses about the features that make self-explanation effective for learning. Designing the SE-Coach involved finding solutions for three main challenges: (1) To design an interface that effectively monitors and supports self-explanation. (2) To devise a student model that allows the assessment of example understanding from reading and self-examination actions. (3) To effectively elicit further self-explanation that improves student's example understanding. In this work we present our solutions to these challenges: (1) An interface including principled, interactive tools to explore examples and build self-explanations under the SECoach's supervision. (2) A probabilistic student model based on a Bayesian network, which integrates a model of correct self-explanation and information on the student's knowledge and studying actions to generate a probabilistic assessment of the student's example understanding. (3) Tutorial interventions that rely on the student model to detect deficits in the student's example understanding and

  9. An overview of key technology thrusts at Bell Helicopter Textron

    NASA Technical Reports Server (NTRS)

    Harse, James H.; Yen, Jing G.; Taylor, Rodney S.

    1988-01-01

    Insight is provided into several key technologies at Bell. Specific topics include the results of ongoing research and development in advanced rotors, methodology development, and new configurations. The discussion on advanced rotors highlight developments on the composite, bearingless rotor, including the development and testing of full scale flight hardware as well as some of the design support analyses and verification testing. The discussion on methodology development concentrates on analytical development in aeromechanics, including correlation studies and design application. New configurations, presents the results of some advanced configuration studies including hardware development.

  10. 76 FR 68314 - Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ...-AA08 Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL AGENCY: Coast... World Championship, a series of high-speed boat races. The event is scheduled to take place on Wednesday... Key West World Championship, a series of high-speed boat races. The event will be held on the waters...

  11. Measuring Sexual Behavior Stigma to Inform Effective HIV Prevention and Treatment Programs for Key Populations

    PubMed Central

    Hargreaves, James R; Sprague, Laurel; Stangl, Anne L; Baral, Stefan D

    2017-01-01

    Background The levels of coverage of human immunodeficiency virus (HIV) treatment and prevention services needed to change the trajectory of the HIV epidemic among key populations, including gay men and other men who have sex with men (MSM) and sex workers, have consistently been shown to be limited by stigma. Objective The aim of this study was to propose an agenda for the goals and approaches of a sexual behavior stigma surveillance effort for key populations, with a focus on collecting surveillance data from 4 groups: (1) members of key population groups themselves (regardless of HIV status), (2) people living with HIV (PLHIV) who are also members of key populations, (3) members of nonkey populations, and (4) health workers. Methods We discuss strengths and weaknesses of measuring multiple different types of stigma including perceived, anticipated, experienced, perpetrated, internalized, and intersecting stigma as measured among key populations themselves, as well as attitudes or beliefs about key populations as measured among other groups. Results With the increasing recognition of the importance of stigma, consistent and validated stigma metrics for key populations are needed to monitor trends and guide immediate action. Evidence-based stigma interventions may ultimately be the key to overcoming the barriers to coverage and retention in life-saving antiretroviral-based HIV prevention and treatment programs for key populations. Conclusions Moving forward necessitates the integration of validated stigma scales in routine HIV surveillance efforts, as well as HIV epidemiologic and intervention studies focused on key populations, as a means of tracking progress toward a more efficient and impactful HIV response. PMID:28446420

  12. Resolving the chemical structures of off-odorants and potentially harmful substances in toys-example of children's swords.

    PubMed

    Denk, Philipp; Velasco-Schön, Cristina; Buettner, Andrea

    2017-09-01

    Most children's toys on the market are primarily made out of plastic and other complex composite materials. Consumer complaints about offensive odors or irritating effects associated with toy products have increased in recent years. One example is the strongly perceivable negative odor reported for a particular series of toy swords. Characterizing the presence of contaminants, including those that have the potential to be deleterious to health, in such products is a significant analytical challenge due to the high baseline abundance of chemical constituents of the materials used in the products. In the present study, the nature of offensive odorants associated with toy sword products was examined by gas chromatography (GC). After initial sensory evaluations, the volatile compounds from the toy products were recovered using solvent extraction and solvent-assisted flavor evaporation. The extracts were analyzed using GC-olfactometry (GC-O) and two-dimensional GC-O coupled with mass spectrometry (GC-GC-MS/O). A total of 26 odor-active compounds, including aromatic hydrocarbons and phenols, were identified among numerous non-odorous volatile by-products. These substances also included polycyclic aromatic hydrocarbons, which were analyzed by GC-MS. Representative substances were naphthalene and 1,2-dihydronaphthalene that exhibited moldy, mothball-like odor impressions, and phenol derivatives with leather-like, phenolic, horse-stable-like smells. The odorants detected correlated with the assigned attributes from the sensory analyses. This study clearly shows that the detection and identification of such odorous contaminants can provide key indications of potentially harmful yet unknown substances in everyday products such as toys. Graphical abstract ᅟ.

  13. Linking performance benchmarking of refinery process chemicals to refinery key performance indicators

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cook, J.M.; Nieman, L.D.

    In 1977 Solomon Associates, Inc. issued its first study of refining in the US entitled, Comparative Performance Analysis for Fuel Product Refineries, most commonly referred to as the Solomon Study, or the Fuels Study. In late 1993, both the Water and Waste Water Management, and Petroleum Divisions of Nalco Chemical Company came to the same conclusion; that they must have a better understanding of the Solomon Study process, and have some input to this system of measurement. The authors first approached Solomon Associates with the idea that a specific study should be done of specialty chemicals used in the refinery.more » They felt that this would result in two studies, one for water treatment applications, and one for process. The water treatment study came first, and was completed in 1993 with the United States Petroleum Refineries Water Treatment Performance Analysis for Operating Year 1993. The process study, entitled United States Petroleum Refinery Process Treatment Performance Analysis for Operating Years 1994--95 will be issued in the 2nd quarter of this year by Nalco/Exxon Energy Chemicals, L.P, which includes the combined resources of the former Petroleum Division of Nalco Chemical Company (including the petroleum related portions of most of its overseas companies), and the petroleum related specialty chemical operations of Exxon Chemical on a global basis. What follows is a recap of the process study focus, some examples of output, and comment on both the linkage to key refinery operating indicators, as well as the perception of the effect of such measurement on the supplier relationship of the future.« less

  14. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  15. Vulnerable Children's Access to Examinations at Key Stage 4. Research Report RR639

    ERIC Educational Resources Information Center

    Kendall, Sally; Johnson, Annie; Martin, Kerry; Kinder; Kay

    2005-01-01

    This research project was commissioned by the Department for Education and Skills (DfES) in 2004 to examine barriers to vulnerable children accessing examinations at the end of key stage 4 and to identify strategies employed to overcome these barriers. Key groups of vulnerable children identified by the DfES included: (1) Looked-after children;…

  16. Field Keys to Common Hawaiian Marine Animals and Plants.

    ERIC Educational Resources Information Center

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Presented are keys for identifying common Hawaiian marine algae, beach plants, reef corals, sea urchins, tidepool fishes, and sea cucumbers. Nearly all species considered can be distinguished by characteristics visible to the naked eye. Line drawings illustrate most plants and animals included, and a list of suggested readings follows each…

  17. Key Lessons about Induction for Policy Makers and Researchers

    ERIC Educational Resources Information Center

    Wayne, Andrew J.

    2012-01-01

    The purpose of this chapter is to digest the core chapters of this volume, which draws together some of the most sophisticated thinking on new teacher induction from the last decade. This chapter attends to five key understandings about induction programs, including their context, design, implementation, and outcomes. These understandings emerge…

  18. Child-Specific Exposure Scenarios Examples (Final Report)

    EPA Science Inventory

    EPA announced the availability of the final report, Child-Specific Exposure Scenarios Examples. This report is intended to be a companion document to the Exposure Factors Handbook (U.S. EPA 2011). The example scenarios were compiled from questions and inquiries r...

  19. A brief review on key technologies in the battery management system of electric vehicles

    NASA Astrophysics Data System (ADS)

    Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng

    2018-04-01

    Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.

  20. Summary on several key techniques in 3D geological modeling.

    PubMed

    Mei, Gang

    2014-01-01

    Several key techniques in 3D geological modeling including planar mesh generation, spatial interpolation, and surface intersection are summarized in this paper. Note that these techniques are generic and widely used in various applications but play a key role in 3D geological modeling. There are two essential procedures in 3D geological modeling: the first is the simulation of geological interfaces using geometric surfaces and the second is the building of geological objects by means of various geometric computations such as the intersection of surfaces. Discrete geometric surfaces that represent geological interfaces can be generated by creating planar meshes first and then spatially interpolating; those surfaces intersect and then form volumes that represent three-dimensional geological objects such as rock bodies. In this paper, the most commonly used algorithms of the key techniques in 3D geological modeling are summarized.

  1. Summary on Several Key Techniques in 3D Geological Modeling

    PubMed Central

    2014-01-01

    Several key techniques in 3D geological modeling including planar mesh generation, spatial interpolation, and surface intersection are summarized in this paper. Note that these techniques are generic and widely used in various applications but play a key role in 3D geological modeling. There are two essential procedures in 3D geological modeling: the first is the simulation of geological interfaces using geometric surfaces and the second is the building of geological objects by means of various geometric computations such as the intersection of surfaces. Discrete geometric surfaces that represent geological interfaces can be generated by creating planar meshes first and then spatially interpolating; those surfaces intersect and then form volumes that represent three-dimensional geological objects such as rock bodies. In this paper, the most commonly used algorithms of the key techniques in 3D geological modeling are summarized. PMID:24772029

  2. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS.

    PubMed

    Kim, Hyunsung

    2014-12-10

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  3. Pedagogies in Action: A Community Resource Linking Teaching Methods to Examples of their Use

    NASA Astrophysics Data System (ADS)

    Manduca, C. A.; Fox, S. P.; Iverson, E. A.; Kirk, K.; Ormand, C. J.

    2009-12-01

    The Pedagogies in Action portal (http://serc.carleton.edu/sp) provides access to information on more than 40 teaching methods with examples of their use in geoscience and beyond. Each method is described with pages addressing what the method is, why or when it is useful, and how it can be implemented. New methods added this year include Teaching with Google Earth, Jigsaw, Teaching the Process of Science, Guided Discovery Problems, Teaching Urban Students, and Using ConceptTests. Examples then show specifically how the method has been used to teach concepts in a variety of disciplines. The example collection now includes 775 teaching activities of which more than 550 are drawn from the geosciences. Geoscience faculty are invited to add their own examples to this collection or to test examples in the collection and provide a review. Evaluation results show that the combination of modules and activities inspires teachers at all levels to use a new pedagogy and increases their confidence that they can use it successfully. In addition, submitting activities to the collection, including writing summary information for other instructors, helps them think more carefully about the design of their activity. The activity collections are used both for ready to use activities and to find ideas for new activities. The portal provides overarching access to materials developed by a wide variety of collaborating partners each of which uses the service to create a customized pedagogic portal addressing a more specific audience. Of interest to AGU members are pedagogic portals on Starting Point: Teaching Introductory Geoscience (http://serc.carleton.edu/introgeo); On the Cutting Edge (http://serc.carleton.edu/NAGTWorkshops); Enduring Resources for Earth System Education (http://earthref.org/ERESE) Microbial Life Educational Resources (http://serc.carleton.edu/microbe_life); the National Numeracy Network (http://serc.carleton.edu/nnn/index.html); CAUSE: The Consortium for

  4. Connecting Satellite Observations with Water Cycle Variables Through Land Data Assimilation: Examples Using the NASA GEOS-5 LDAS

    NASA Technical Reports Server (NTRS)

    Reichle, Rolf H.; De Lannoy, Gabrielle J. M.; Forman, Barton A.; Draper, Clara S.; Liu, Qing

    2013-01-01

    A land data assimilation system (LDAS) can merge satellite observations (or retrievals) of land surface hydrological conditions, including soil moisture, snow, and terrestrial water storage (TWS), into a numerical model of land surface processes. In theory, the output from such a system is superior to estimates based on the observations or the model alone, thereby enhancing our ability to understand, monitor, and predict key elements of the terrestrial water cycle. In practice, however, satellite observations do not correspond directly to the water cycle variables of interest. The present paper addresses various aspects of this seeming mismatch using examples drawn from recent research with the ensemble-based NASA GEOS-5 LDAS. These aspects include (1) the assimilation of coarse-scale observations into higher-resolution land surface models, (2) the partitioning of satellite observations (such as TWS retrievals) into their constituent water cycle components, (3) the forward modeling of microwave brightness temperatures over land for radiance-based soil moisture and snow assimilation, and (4) the selection of the most relevant types of observations for the analysis of a specific water cycle variable that is not observed (such as root zone soil moisture). The solution to these challenges involves the careful construction of an observation operator that maps from the land surface model variables of interest to the space of the assimilated observations.

  5. Key Questions in Marine Megafauna Movement Ecology.

    PubMed

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. The forest health monitoring national technical reports: examples of analyses and results from 2001-2004

    Treesearch

    Mark J. Ambrose; Barbara L. Conkling; Kurt H. Riitters; John W. Coulston

    2008-01-01

    This brochure presents examples of analyses included in the first four Forest Health Monitoring (FHM) national technical reports. Its purpose is to introduce the reader to the kinds of information available in these and subsequent FHM national technical reports. Indicators presented here include drought, air pollution, forest fragmentation, and tree mortality. These...

  7. Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks.

    PubMed

    Van Torre, Patrick

    2016-09-08

    Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption. Body-worn sensor networks are deployed in conditions where the wireless communication channel varies dramatically due to fading and shadowing, which is considered a disadvantage for communication. Interestingly, these channel variations can be employed to extract a common encryption key at both sides of the link. Legitimate users share a unique physical channel and the variations thereof provide data series on both sides of the link, with highly correlated values. An eavesdropper, however, does not share this physical channel and cannot extract the same information when intercepting the signals. This paper documents a practical wearable communication system implementing channel-based key generation, including an implementation and a measurement campaign comprising indoor as well as outdoor measurements. The results provide insight into the performance of channel-based key generation in realistic practical conditions. Employing a process known as key reconciliation, error free keys are generated in all tested scenarios. The key-generation system is computationally simple and therefore compatible with the low-power micro controllers and low-data rate transmissions commonly used in wireless sensor networks.

  8. 25 CFR 502.14 - Key employee.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  9. Soft active matter: a contemporary example of Edwardsian statistical mechanics

    NASA Astrophysics Data System (ADS)

    Liverpool, Tanniemola

    Colonies of swimming bacteria, algae or spermatozoa are examples of active systems composed of interacting units that consume energy and collectively generate motion and mechanical stresses. Due to the anisotropy of their interactions, these active particles can exhibit orientational order at high concentrations and have been called ``living liquid crystals''. Biology at the cellular and multicellular scale provides numerous examples of these active systems. They provide a novel class of experimentally accessible system far from equilibrium. Their rich collective behaviour includes non-equilibrium phase transitions and pattern formation on mesoscopic scales. Interestingly however, some of the theoretical insights gained from field theories applied to equilibrium soft matter systems can be used to explain aspects of their behaviour, but with a number of surprising new twists. I will describe and summarise recent theoretical results characterising the behaviour of such soft active systems highlighting in particular the effects of their internal dynamics on their macroscopic behaviour. With support of the EPSRC Grant No. EP/G026440/1.

  10. [Problem areas and examples of best practice in intersectoral medication treatment--a literature review].

    PubMed

    Mehrmann, Lena; Ollenschläger, Günter

    2014-01-01

    Transitions between the outpatient and inpatient sector are a critical phase in medication treatment. This article provides an overview of published problem areas and examples of best practice in the intersectoral medication treatment. Data with regard to related problem areas and examples of best practice was collected in August 2011 by a systematic literature research. The relevant literature was identified using the following databases and search engines: MEDLINE, The Cochrane Library, EMBASE, Google, and Google Scholar. Additionally, a hand search was done on the websites of SpringerLink and Thieme Connect. The initial search yielded a total of 4,409 records which were further selected in two screening steps and analysed according to their relevance. Of the remaining 63 records, 3 exclusively described problem areas, 11 of them examples of best practice, and 49 provided information on both problem areas and examples of best practice with regard to intersectoral medication treatment. Among other things, problem areas include varying legal regulations in inpatient and outpatient medication treatment, drug therapy interruptions after hospital discharge, or deficits in communication and continuity of care. Examples of best practice are projects, programmes, initiatives, recommendations, and points to consider with respect to medication reconciliation, pharmaceutical support, or transitions of care. Problem areas as well as examples of best practice are mainly focused on the transition from inpatient to outpatient care. Copyright © 2013. Published by Elsevier GmbH.

  11. The Water Risks of Hydraulic Fracturing (Fracking): Key Issues from the New California Assessment

    NASA Astrophysics Data System (ADS)

    Gleick, P. H.

    2015-12-01

    A key component of the Water-Energy Nexus is the effort over the past decade or so to quantify the volumes and form of water required for the energy fuel cycle from extraction to generation to waste disposal. The vast majority of the effort in this area has focused on the water needs of electricity generation, but other fuel-cycle components also entail significant water demands and threats to water quality. Recent work for the State of California (managed by the California Council on Science and Technology - CCST) has produced a new state-of-the-art assessment of a range of potential water risks associated with hydraulic fracturing and related oil and gas extraction, including volumetric water demands, methods of disposal of produced water, and aquifer contamination. For example, this assessment produced new information on the disposal of produced water in surface percolation pits and the potential for contamination of local groundwater (see Figure). Understanding these risks raises questions about current production and future plans to expand production, as well as tools used by state and federal agencies to manage these risks. This talk will summarize the science behind the CCST assessment and related policy recommendations for both water and energy managers.

  12. Maximizing the benefits of antiretroviral therapy for key affected populations

    PubMed Central

    Grubb, Ian R; Beckham, Sarah W; Kazatchkine, Michel; Thomas, Ruth M; Albers, Eliot R; Cabral, Mauro; Lange, Joep; Vella, Stefano; Kurian, Manoj; Beyrer, Chris

    2014-01-01

    Introduction Scientific research has demonstrated the clinical benefits of earlier initiation of antiretroviral treatment (ART), and that ART can markedly reduce HIV transmission to sexual partners. Ensuring universal access to ART for those who need it has long been a core principle of the HIV response, and extending the benefits of ART to key populations is critical to increasing the impact of ART and the overall effectiveness of the HIV response. However, this can only be achieved through coordinated efforts to address political, social, legal and economic barriers that key populations face in accessing HIV services. Discussion Recent analyses show that HIV prevalence levels among key populations are far higher than among the general population, and they experience a range of biological and behavioural factors, and social, legal and economic barriers that increase their vulnerability to HIV and have resulted in alarmingly low ART coverage. World Health Organization 2014 consolidated guidance on HIV among key populations offers the potential for increased access to ART by key populations, following the same principles as for the general adult population. However, it should not be assumed that key populations will achieve greater access to ART unless stigma, discrimination and punitive laws, policies and practices that limit access to ART and other HIV interventions in many countries are addressed. Conclusions Rights-based approaches and investments in critical enablers, such as supportive legal and policy environments, are essential to enable wider access to ART and other HIV interventions for key populations. The primary objective of ART should always be to treat the person living with HIV; prevention is an important, additional benefit. ART should be provided only with informed consent. The preventive benefits of treatment must not be used as a pretext for failure to provide other necessary HIV programming for key populations, including comprehensive harm

  13. PEM public key certificate cache server

    NASA Astrophysics Data System (ADS)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  14. Learning about Functions through Learner-Generated Examples

    ERIC Educational Resources Information Center

    Dinkelman, Martha O.; Cavey, Laurie O.

    2015-01-01

    In many mathematics classrooms, the teacher provides "worked examples" to demonstrate how students should perform certain algorithms or processes. Some students find it difficult to generalize from the examples that teachers provide and cannot apply what they have learned in new situations (Watson and Mason 2002). Instead, teachers might…

  15. Toward an instructionally oriented theory of example-based learning.

    PubMed

    Renkl, Alexander

    2014-01-01

    Learning from examples is a very effective means of initial cognitive skill acquisition. There is an enormous body of research on the specifics of this learning method. This article presents an instructionally oriented theory of example-based learning that integrates theoretical assumptions and findings from three research areas: learning from worked examples, observational learning, and analogical reasoning. This theory has descriptive and prescriptive elements. The descriptive subtheory deals with (a) the relevance and effectiveness of examples, (b) phases of skill acquisition, and (c) learning processes. The prescriptive subtheory proposes instructional principles that make full exploitation of the potential of example-based learning possible. Copyright © 2013 Cognitive Science Society, Inc.

  16. WalkThrough Example Procedures for MAMA

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruggiero, Christy E.; Gaschen, Brian Keith; Bloch, Jeffrey Joseph

    This documentation is a growing set of walk through examples of analyses using the MAMA V2.0 software. It does not cover all the features or possibilities with the MAMA software, but will address using many of the basic analysis tools to quantify particle size and shape in an image. This document will continue to evolve as additional procedures and examples are added. The starting assumption is that the MAMA software has been successfully installed.

  17. Advances in Clinical Cardiology 2016: A Summary of the Key Clinical Trials.

    PubMed

    Gray, Alastair; McQuillan, Conor; Menown, Ian B A

    2017-07-01

    The findings of many new cardiology clinical trials over the last year have been published or presented at major international meetings. This paper aims to describe and place in context a summary of the key clinical trials in cardiology presented between January and December 2016. The authors reviewed clinical trials presented at major cardiology conferences during 2016 including the American College of Cardiology (ACC), European Association for Percutaneous Cardiovascular Interventions (EuroPCR), European Society of Cardiology (ESC), European Association for the Study of Diabetes (EASD), Transcatheter Cardiovascular Therapeutics (TCT), and the American Heart Association (AHA). Selection criteria were trials with a broad relevance to the cardiology community and those with potential to change current practice. A total of 57 key cardiology clinical trials were identified for inclusion. Here we describe and place in clinical context the key findings of new data relating to interventional and structural cardiology including delayed stenting following primary angioplasty, contrast-induced nephropathy, management of jailed wires, optimal duration of dual antiplatelet therapy (DAPT), stenting vs bypass for left main disease, new generation stents (BioFreedom, Orsiro, Absorb), transcatheter aortic valve implantation (Edwards Sapien XT, transcatheter embolic protection), and closure devices (Watchman, Amplatzer). New preventative cardiology data include trials of bariatric surgery, empagliflozin, liraglutide, semaglutide, PCSK9 inhibitors (evolocumab and alirocumab), and inclisiran. Antiplatelet therapy trials include platelet function monitoring and ticagrelor vs clopidogrel for peripheral vascular disease. New data are also presented in fields of heart failure (sacubitril/valsartan, aliskiren, spironolactone), atrial fibrillation (rivaroxaban in patients undergoing coronary intervention, edoxaban in DC cardioversion), cardiac devices (implantable cardioverter

  18. Field test of quantum key distribution in the Tokyo QKD Network.

    PubMed

    Sasaki, M; Fujiwara, M; Ishizuka, H; Klaus, W; Wakui, K; Takeoka, M; Miki, S; Yamashita, T; Wang, Z; Tanaka, A; Yoshino, K; Nambu, Y; Takahashi, S; Tajima, A; Tomita, A; Domeki, T; Hasegawa, T; Sakai, Y; Kobayashi, H; Asai, T; Shimizu, K; Tokura, T; Tsurumaru, T; Matsui, M; Honjo, T; Tamaki, K; Takesue, H; Tokura, Y; Dynes, J F; Dixon, A R; Sharpe, A W; Yuan, Z L; Shields, A J; Uchikoga, S; Legré, M; Robyr, S; Trinkler, P; Monat, L; Page, J-B; Ribordy, G; Poppe, A; Allacher, A; Maurhart, O; Länger, T; Peev, M; Zeilinger, A

    2011-05-23

    A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to demonstrate the world-first secure TV conferencing over a distance of 45km. The network includes a commercial QKD product for long-term stable operation, and application interface to secure mobile phones. Detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.

  19. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  20. 78 FR 33221 - Special Local Regulation; Annual Swim Around Key West, Atlantic Ocean and Gulf of Mexico; Key...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-04

    ... Fort Zach State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key... State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key Channel and West...

  1. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  2. ClinicalKey 2.0: Upgrades in a Point-of-Care Search Engine.

    PubMed

    Huslig, Mary Ann; Vardell, Emily

    2015-01-01

    ClinicalKey 2.0, launched September 23, 2014, offers a mobile-friendly design with a search history feature for targeting point-of-care resources for health care professionals. Browsing is improved with searchable, filterable listings of sources highlighting new resources. ClinicalKey 2.0 improvements include more than 1,400 new Topic Pages for quick access to point-of-care content. A sample search details some of the upgrades and content options.

  3. Key Performance Indicators in the Evaluation of the Quality of Radiation Safety Programs.

    PubMed

    Schultz, Cheryl Culver; Shaffer, Sheila; Fink-Bennett, Darlene; Winokur, Kay

    2016-08-01

    Beaumont is a multiple hospital health care system with a centralized radiation safety department. The health system operates under a broad scope Nuclear Regulatory Commission license but also maintains several other limited use NRC licenses in off-site facilities and clinics. The hospital-based program is expansive including diagnostic radiology and nuclear medicine (molecular imaging), interventional radiology, a comprehensive cardiovascular program, multiple forms of radiation therapy (low dose rate brachytherapy, high dose rate brachytherapy, external beam radiotherapy, and gamma knife), and the Research Institute (including basic bench top, human and animal). Each year, in the annual report, data is analyzed and then tracked and trended. While any summary report will, by nature, include items such as the number of pieces of equipment, inspections performed, staff monitored and educated and other similar parameters, not all include an objective review of the quality and effectiveness of the program. Through objective numerical data Beaumont adopted seven key performance indicators. The assertion made is that key performance indicators can be used to establish benchmarks for evaluation and comparison of the effectiveness and quality of radiation safety programs. Based on over a decade of data collection, and adoption of key performance indicators, this paper demonstrates one way to establish objective benchmarking for radiation safety programs in the health care environment.

  4. Blackhole formula and example relativity

    NASA Astrophysics Data System (ADS)

    Shin, Philip

    Black hole formula 1) Second dimension (x,y) f(x)=y Energy E=m*c2 2) Third dimension (x,y,z) really x=y=z Black hole formula Root(c2)=c=Root(E/m) As mass go the velocity of light, mass become black hole so there are energy as multiply by mass. Example relativity When E=m*c2 1) Root(c2)=c=Root(E/m) 2) 3*c*Root(c2)=3*c*Root(E/m)=3*c2 From 1) to 2) as an example, As velocity is faster, mass increased. It means when velocity is increased, sec(time) is slower, and m(distance) is increased. The number is good to study physics.

  5. A Key for the Identification of Eighteen Common Timbers.

    ERIC Educational Resources Information Center

    Thomas, P. A.

    1991-01-01

    Dichotomous key for 18 woods in common domestic and architectural use in Britain is provided. It is based upon structures visible with the naked eye and a hand-lens. Descriptions of the necessary anatomy and terminology are given. Timbers include yew, pine, spruce, oak, sweet chestnut, elm, ash, teak, cherry, walnut, mahogany, box, beech,…

  6. Using Worked Examples Assignments in Classroom Instruction

    ERIC Educational Resources Information Center

    Paré-Blagoev, Juliana; Booth, Julie; Elliot, Andrew; Koedinger, Ken

    2013-01-01

    As highlighted by the National Math Panel Report (2008), consistent results from laboratory studies have demonstrated that interleaving worked examples with problems to solve improves learning for novices. The purpose of this work is to create materials and tests that can be used flexibly in classrooms and which employ worked examples interleaved…

  7. Inspiring Examples in Rearrangements of Infinite Series

    ERIC Educational Resources Information Center

    Ramasinghe, W.

    2002-01-01

    Simple examples are really encouraging in the understanding of rearrangements of infinite series, since many texts and teachers provide only existence theorems. In the absence of examples, an existence theorem is just a statement and lends little confidence to understanding. Iterated sums of double series seem to have a similar spirit of…

  8. Compound flooding: examples, methods, and challenges

    NASA Astrophysics Data System (ADS)

    Wahl, T.

    2017-12-01

    When different climatic extremes occur simultaneously or in close succession, the impacts to the environment, built infrastructure and society at large are often significantly escalated. These events are collectively referred to as "compound" events. Although they are typically regarded as highly "surprising" when they occur, the dependencies and multi-scale nature of many climate phenomena mean that such events occur much more likely than might be expected by random chance alone. However, despite their high impacts, compound extremes are not, or only poorly covered in current risk analysis frameworks and policy agendas. Floods in particular, which are among the most dangerous and costly natural hazards, are rarely a function of just one driver. Rather, they often arise through the joint occurrence of different source mechanisms. This can include oceanographic drivers such as tides, storm surges, or waves, as well as hydrologic drivers such as rainfall runoff (pluvial) or river discharge (fluvial). Often, two or more of these flood drivers affect the same region and are correlated with each other, which needs to be accounted for in flood risk assessments. This presentation will briefly introduce the different types of compound flooding along with recent examples from around the globe where those high impact events led to substantial damages and loss of lives. A broad overview will be provided of existing statistical modelling tools to identify and simulate dependencies between flood drivers, for example when calculating joint probabilities. Finally, some of the most pressing challenges in developing improved strategies to assess and mitigate the risks of climatic compound extremes, and compound flooding in particular, will be discussed.

  9. Encrypting Digital Camera with Automatic Encryption Key Deletion

    NASA Technical Reports Server (NTRS)

    Oakley, Ernest C. (Inventor)

    2007-01-01

    A digital video camera includes an image sensor capable of producing a frame of video data representing an image viewed by the sensor, an image memory for storing video data such as previously recorded frame data in a video frame location of the image memory, a read circuit for fetching the previously recorded frame data, an encryption circuit having an encryption key input connected to receive the previously recorded frame data from the read circuit as an encryption key, an un-encrypted data input connected to receive the frame of video data from the image sensor and an encrypted data output port, and a write circuit for writing a frame of encrypted video data received from the encrypted data output port of the encryption circuit to the memory and overwriting the video frame location storing the previously recorded frame data.

  10. From Concrete Examples to Abstract Relations: The Rostrolateral Prefrontal Cortex Integrates Novel Examples into Relational Categories.

    PubMed

    Davis, Tyler; Goldwater, Micah; Giron, Josue

    2017-04-01

    The ability to form relational categories for objects that share few features in common is a hallmark of human cognition. For example, anything that can play a preventative role, from a boulder to poverty, can be a "barrier." However, neurobiological research has focused solely on how people acquire categories defined by features. The present functional magnetic resonance imaging study examines how relational and feature-based category learning compare in well-matched learning tasks. Using a computational model-based approach, we observed a cluster in left rostrolateral prefrontal cortex (rlPFC) that tracked quantitative predictions for the representational distance between test and training examples during relational categorization. Contrastingly, medial and dorsal PFC exhibited graded activation that tracked decision evidence during both feature-based and relational categorization. The results suggest that rlPFC computes an alignment signal that is critical for integrating novel examples during relational categorization whereas other PFC regions support more general decision functions. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  11. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    PubMed Central

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  12. Entangled quantum key distribution over two free-space optical links.

    PubMed

    Erven, C; Couteau, C; Laflamme, R; Weihs, G

    2008-10-13

    We report on the first real-time implementation of a quantum key distribution (QKD) system using entangled photon pairs that are sent over two free-space optical telescope links. The entangled photon pairs are produced with a type-II spontaneous parametric down-conversion source placed in a central, potentially untrusted, location. The two free-space links cover a distance of 435 m and 1,325 m respectively, producing a total separation of 1,575 m. The system relies on passive polarization analysis units, GPS timing receivers for synchronization, and custom written software to perform the complete QKD protocol including error correction and privacy amplification. Over 6.5 hours during the night, we observed an average raw key generation rate of 565 bits/s, an average quantum bit error rate (QBER) of 4.92%, and an average secure key generation rate of 85 bits/s.

  13. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan

    Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.

  14. Key performance indicators to benchmark hospital information systems - a delphi study.

    PubMed

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  15. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  16. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  17. An updated checklist and key to the open-panicled species of Poa L. (Poaceae) in Peru including three new species, Poa ramoniana, Poa tayacajaensis, and Poa urubambensis

    PubMed Central

    Sylvester, Steven P.; Soreng, Robert J.; Peterson, Paul M.; Sylvester, Mitsy D.P.V.

    2016-01-01

    Abstract We provide an updated checklist and key to the 30 Poa species with open panicles from Peru which includes previously circumscribed Dissanthelium and Aphanelytrum species, new taxon records, and three undescribed species. Poa compressa, Poa grisebachii, and Poa leioclada are recorded from Peru for the first time. A number of species are placed in synonymy: Poa carazensis, Poa ferreyrae and Poa tovarii are synonymized under the name Poa fibrifera; Poa adusta (tentatively) and Poa pilgeri are synonymized under Poa candamoana; Poa superata is synonymized under Poa grisebachii; and Poa paramoensis is synonymized under Poa huancavelicae. Included within this treatment are three new species, Poa ramoniana, Poa tayacajaensis and Poa urubambensis, which are described and illustrated. Poa ramoniana, found growing near lakes in high elevation Puna grasslands of Junín, is similar to a small form of Poa glaberrima, but differs in having rhizomes and growing to only 5 cm tall. Poa tayacajaensis, found from shrublands on Andean slopes of Huancavelica and Huánuco, bears similarities to Poa aequatoriensis but differs in having shorter lemmas which are pubescent between the veins, densely scabrous sheaths with smooth, glabrous throats, and shorter ligules. Poa urubambensis, a common element of the undisturbed Polylepis forest understory of the Cordillera Urubamba, Cusco, is distinct from all other members of open-panicled Poa’s by having glabrous lemmas with a smooth and glabrous callus, and notably small anthers. The type material for the name Poa adusta is discussed and a lectotype is selected. PMID:27489489

  18. Key Largo Limestone revisited: Pleistocene shelf-edge facies, Florida Keys, USA

    USGS Publications Warehouse

    Gray, Multer H.; Gischler, E.; Lundberg, J.; Simmons, K.R.; Shinn, E.A.

    2002-01-01

    New dates and analysis of 12 deep and 57 shallow cores allow a more detailed interpretation of the Pleistocene shelf edge of the Florida Platform as found in various facies of the Key Largo Limestone beneath the Florida Keys. In this study a three-phase evolution of the Quaternary units (Q1-Q5) of the Key Largo is presented with new subdivision of the Q5. (1) In the first phase, the Q1 and Q2 (perhaps deposited during oxygen-isotope stage 11) deep-water quartz-rich environment evolved into a shallow carbonate phase. (2) Subsequently, a Q3 (presumably corresponding to oxygen-isotope stage 9) flourishing reef and productive high-platform sediment phase developed. (3) Finally, a Q4 and Q5 (corresponding to oxygen-isotope stages 7 and 5) stabilization phase occured with reefs and leeward productive lagoons, followed by lower sea levels presenting a sequence of younger (isotope substages 5c, 5a) shelf-margin wedges, sediment veneers and outlier reefs. The Key Largo Limestone provides an accessible model of a carbonate shelf edge with fluctuating water depth, bordering a deep seaward basin for a period of at least 300 ka. During this time, at least four onlaps/offlaps, often separated by periods of karst development with associated diagenetic alterations, took place. The story presented by this limestone not only allows a better understanding of the history of south Florida but also aids in the interpretation of similar persistent shelf-edge sites bordering deep basins in other areas.

  19. Evolving Systems: Adaptive Key Component Control and Inheritance of Passivity and Dissipativity

    NASA Technical Reports Server (NTRS)

    Frost, S. A.; Balas, M. J.

    2010-01-01

    We propose a new framework called Evolving Systems to describe the self-assembly, or autonomous assembly, of actively controlled dynamical subsystems into an Evolved System with a higher purpose. Autonomous assembly of large, complex flexible structures in space is a target application for Evolving Systems. A critical requirement for autonomous assembling structures is that they remain stable during and after assembly. The fundamental topic of inheritance of stability, dissipativity, and passivity in Evolving Systems is the primary focus of this research. In this paper, we develop an adaptive key component controller to restore stability in Nonlinear Evolving Systems that would otherwise fail to inherit the stability traits of their components. We provide sufficient conditions for the use of this novel control method and demonstrate its use on an illustrative example.

  20. Human mobility in an emerging epidemic: a key aspect for response planning

    NASA Astrophysics Data System (ADS)

    Poletto, Chiara; Bajardi, Paolo; Colizza, Vittoria; Ramasco, Jose J.; Tizzoni, Michele; Vespignani, Alessandro

    2010-03-01

    Human mobility and interactions represent key ingredients in the spreading dynamics of an infectious disease. The flows of traveling people form a network characterized by complex features, such as strong topological and traffic heterogeneities, that unfolds at different temporal and spatial scales, from short ranges to the global scale. Computational models can be developed that integrate detailed network structures based on demographic and mobility data, in order to simulate the spatial evolution of an epidemic. Focusing on the recent A(H1N1) influenza pandemic as a paradigmatic example, these approaches allow the assessment of the interplay between individual mobility and epidemic dynamics, quantifying the effects of travel restrictions in delaying the epidemic spread and the role of mobility as an additional source of information for the understanding of the early outbreak.

  1. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  2. Policies to Enable Bioenergy Deployment: Key Considerations and Good Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smolinksi, Sharon; Cox, Sadie

    2016-05-01

    Bioenergy is renewable energy generated from biological source materials, and includes electricity, transportation fuels and heating. Source materials are varied types of biomass, including food crops such as corn and sugarcane, non-edible lignocellulosic materials such as agricultural and forestry waste and dedicated crops, and municipal and livestock wastes. Key aspects of policies for bioenergy deployment are presented in this brief as part of the Clean Energy Solutions Center's Clean Energy Policy Brief Series.

  3. A fast image matching algorithm based on key points

    NASA Astrophysics Data System (ADS)

    Wang, Huilin; Wang, Ying; An, Ru; Yan, Peng

    2014-05-01

    Image matching is a very important technique in image processing. It has been widely used for object recognition and tracking, image retrieval, three-dimensional vision, change detection, aircraft position estimation, and multi-image registration. Based on the requirements of matching algorithm for craft navigation, such as speed, accuracy and adaptability, a fast key point image matching method is investigated and developed. The main research tasks includes: (1) Developing an improved celerity key point detection approach using self-adapting threshold of Features from Accelerated Segment Test (FAST). A method of calculating self-adapting threshold was introduced for images with different contrast. Hessian matrix was adopted to eliminate insecure edge points in order to obtain key points with higher stability. This approach in detecting key points has characteristics of small amount of computation, high positioning accuracy and strong anti-noise ability; (2) PCA-SIFT is utilized to describe key point. 128 dimensional vector are formed based on the SIFT method for the key points extracted. A low dimensional feature space was established by eigenvectors of all the key points, and each eigenvector was projected onto the feature space to form a low dimensional eigenvector. These key points were re-described by dimension-reduced eigenvectors. After reducing the dimension by the PCA, the descriptor was reduced to 20 dimensions from the original 128. This method can reduce dimensions of searching approximately near neighbors thereby increasing overall speed; (3) Distance ratio between the nearest neighbour and second nearest neighbour searching is regarded as the measurement criterion for initial matching points from which the original point pairs matched are obtained. Based on the analysis of the common methods (e.g. RANSAC (random sample consensus) and Hough transform cluster) used for elimination false matching point pairs, a heuristic local geometric restriction

  4. The bedside assistant in robotic surgery--keys to success.

    PubMed

    Yuh, Bertram

    2013-01-01

    Taking on the position of bedside assistant for a surgical robotic team can be a daunting task. Keys to success include preparation, proper operation set up, effective use of instruments to augment the actions of the console surgeon, and readiness for surgical emergencies. Effective communication, repetitive execution, and readiness facilitate the efforts of the surgical team.

  5. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  6. SlNCED1 and SlCYP707A2: key genes involved in ABA metabolism during tomato fruit ripening

    PubMed Central

    Ji, Kai; Kai, Wenbin; Zhao, Bo; Sun, Yufei; Yuan, Bing; Dai, Shengjie; Li, Qian; Chen, Pei; Wang, Ya; Pei, Yuelin; Wang, Hongqing; Guo, Yangdong; Leng, Ping

    2014-01-01

    Abscisic acid (ABA) plays an important role in fruit development and ripening. Here, three NCED genes encoding 9-cis-epoxycarotenoid dioxygenase (NCED, a key enzyme in the ABA biosynthetic pathway) and three CYP707A genes encoding ABA 8′-hydroxylase (a key enzyme in the oxidative catabolism of ABA) were identified in tomato fruit by tobacco rattle virus-induced gene silencing (VIGS). Quantitative real-time PCR showed that VIGS-treated tomato fruits had significant reductions in target gene transcripts. In SlNCED1-RNAi-treated fruits, ripening slowed down, and the entire fruit turned to orange instead of red as in the control. In comparison, the downregulation of SlCYP707A2 expression in SlCYP707A2-silenced fruit could promote ripening; for example, colouring was quicker than in the control. Silencing SlNCED2/3 or SlCYP707A1/3 made no significant difference to fruit ripening comparing RNAi-treated fruits with control fruits. ABA accumulation and SlNCED1transcript levels in the SlNCED1-RNAi-treated fruit were downregulated to 21% and 19% of those in control fruit, respectively, but upregulated in SlCYP707A2-RNAi-treated fruit. Silencing SlNCED1 or SlCYP707A2 by VIGS significantly altered the transcripts of a set of both ABA-responsive and ripening-related genes, including ABA-signalling genes (PYL1, PP2C1, and SnRK2.2), lycopene-synthesis genes (SlBcyc, SlPSY1 and SlPDS), and cell wall-degrading genes (SlPG1, SlEXP, and SlXET) during ripening. These data indicate that SlNCED1 and SlCYP707A2 are key genes in the regulation of ABA synthesis and catabolism, and are involved in fruit ripening as positive and negative regulators, respectively. PMID:25039074

  7. INCLUDING AORTIC VALVE MORPHOLOGY IN COMPUTATIONAL FLUID DYNAMICS SIMULATIONS: INITIAL FINDINGS AND APPLICATION TO AORTIC COARCTATION

    PubMed Central

    Wendell, David C.; Samyn, Margaret M.; Cava, Joseph R.; Ellwein, Laura M.; Krolikowski, Mary M.; Gandy, Kimberly L.; Pelech, Andrew N.; Shadden, Shawn C.; LaDisa, John F.

    2012-01-01

    Computational fluid dynamics (CFD) simulations quantifying thoracic aortic flow patterns have not included disturbances from the aortic valve (AoV). 80% of patients with aortic coarctation (CoA) have a bicuspid aortic valve (BAV) which may cause adverse flow patterns contributing to morbidity. Our objectives were to develop a method to account for the AoV in CFD simulations, and quantify its impact on local hemodynamics. The method developed facilitates segmentation of the AoV, spatiotemporal interpolation of segments, and anatomic positioning of segments at the CFD model inlet. The AoV was included in CFD model examples of a normal (tricuspid AoV) and a post-surgical CoA patient (BAV). Velocity, turbulent kinetic energy (TKE), time-averaged wall shear stress (TAWSS), and oscillatory shear index (OSI) results were compared to equivalent simulations using a plug inlet profile. The plug inlet greatly underestimated TKE for both examples. TAWSS differences extended throughout the thoracic aorta for the CoA BAV, but were limited to the arch for the normal example. OSI differences existed mainly in the ascending aorta for both cases. The impact of AoV can now be included with CFD simulations to identify regions of deleterious hemodynamics thereby advancing simulations of the thoracic aorta one step closer to reality. PMID:22917990

  8. Inspiring Examples in Rearrangements of Infinite Products

    ERIC Educational Resources Information Center

    Ramasinghe, W.

    2007-01-01

    It is well known that simple examples are really encouraging in the understanding of rearrangements of infinite series. In this paper a similar role is played by simple examples in the case of infinite products. Iterated products of double products seem to have a similar spirit of rearrangements of products, although they are not the same.…

  9. Applicability of bioanalysis of multiple analytes in drug discovery and development: review of select case studies including assay development considerations.

    PubMed

    Srinivas, Nuggehally R

    2006-05-01

    The development of sound bioanalytical method(s) is of paramount importance during the process of drug discovery and development culminating in a marketing approval. Although the bioanalytical procedure(s) originally developed during the discovery stage may not necessarily be fit to support the drug development scenario, they may be suitably modified and validated, as deemed necessary. Several reviews have appeared over the years describing analytical approaches including various techniques, detection systems, automation tools that are available for an effective separation, enhanced selectivity and sensitivity for quantitation of many analytes. The intention of this review is to cover various key areas where analytical method development becomes necessary during different stages of drug discovery research and development process. The key areas covered in this article with relevant case studies include: (a) simultaneous assay for parent compound and metabolites that are purported to display pharmacological activity; (b) bioanalytical procedures for determination of multiple drugs in combating a disease; (c) analytical measurement of chirality aspects in the pharmacokinetics, metabolism and biotransformation investigations; (d) drug monitoring for therapeutic benefits and/or occupational hazard; (e) analysis of drugs from complex and/or less frequently used matrices; (f) analytical determination during in vitro experiments (metabolism and permeability related) and in situ intestinal perfusion experiments; (g) determination of a major metabolite as a surrogate for the parent molecule; (h) analytical approaches for universal determination of CYP450 probe substrates and metabolites; (i) analytical applicability to prodrug evaluations-simultaneous determination of prodrug, parent and metabolites; (j) quantitative determination of parent compound and/or phase II metabolite(s) via direct or indirect approaches; (k) applicability in analysis of multiple compounds in select

  10. Key Elements of a Successful Drive toward Marketing Strategy Making

    ERIC Educational Resources Information Center

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  11. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    ERIC Educational Resources Information Center

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  12. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network

    PubMed Central

    Yang, Bin; Zhang, Jianfeng

    2017-01-01

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme. PMID:28657588

  13. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    PubMed

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  14. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  15. A New Paradigm for Intelligent Tutoring Systems: Example-Tracing Tutors

    ERIC Educational Resources Information Center

    Aleven, Vincent; McLaren, Bruce M.; Sewall, Jonathan; Koedinger, Kenneth R.

    2009-01-01

    The Cognitive Tutor Authoring Tools (CTAT) support creation of a novel type of tutors called example-tracing tutors. Unlike other types of ITSs (e.g., model-tracing tutors, constraint-based tutors), example-tracing tutors evaluate student behavior by flexibly comparing it against generalized examples of problem-solving behavior. Example-tracing…

  16. CCM key comparison CCM.D-K4 'Hydrometer'

    NASA Astrophysics Data System (ADS)

    Lorefice, S.; Becerra, L. O.; Lenard, E.; Lee, Y. J.; Lee, W. G.; Madec, T.; Meury, P. A.; Caceres, J.; Santos, C.; Vamossy, C.; Man, J.; Fen, K.; Toda, K.; Wright, J.; Bettin, H.; Toth, H.

    2016-01-01

    This report presents the comparison philosophy, methodology, analysis and the results of the designed CCM.D-K4 key comparison that covered the calibration of high resolution hydrometers for liquid and alcoholometers in the density range 600 kg/m3 to 2000 kg/m3 at the temperature of 20°C. The main purpose of this comparison was not only to evaluate the degree of equivalence in the calibration of high accuracy hydrometers between NMI participants, but also to link, were it is possible, the results of previous comparisons to Key Comparison Reference Values (KCRVs) of CCM.D-K4. Eleven NMI laboratories took part in the CCM.D-K4 divided in two groups (petals). With the CCM.D-K4 purpose, two similar sets consisting of three hydrometers for liquid density determinations and an alcoholometer were circulated to the NMI participants as a travelling standard in the time interval from January 2011 to April 2012. Twelve Key Comparison Reference Values (KCRVs) for each petal have been obtained at the density values related to the tested density marks of the transfer standards by the results of participants. The KCRVs and corresponding uncertainties were calculated by the weighted mean in the case of consistent results, otherwise the median was used. The degree of equivalence (DoE) with respect to the corresponding KCRV was determined for each participant and, in this particular comparison, the Weighted Least Squares (WLS) method was used to link the individual DoE of each participant by a continuous function. Significant drift of the transfer standards was not detected. This report also gives instructions on calculating pair-wise degrees of equivalence, with the addition of any information on correlations that may be necessary to estimate more accurately as well as the procedure for linking international comparisons to the CCM.D-K4. Finally an example of linkage to the CCM.D-K4 is given by dealing with the results of the bilateral comparison between INRiM and NMIA, which was

  17. [Key content and formulation of national Chinese materia medica resources survey at county level].

    PubMed

    Lu, Jian-Wei; Zhang, Xiao-Bo; Li, Hai-Tao; Guo, Lan-Ping; Zhao, Run-Huai; Zhang, Ben-Gang; Sun, Li-Ying; Huang, Lu-Qi

    2013-08-01

    According to National Census for Water, National Population Census, National Land and Resources Survey, and work experience of experimental measures for national Chinese materia medica resources(CMMR) survey,the national CMMR survey at the county level is the key point of whole survey, that includes organization and management, field survey, sorting data three key links. Organization and management works of national CMMR survey needs to finish four key contents, there are definite goals and tasks, practicable crew, preparation directory, and security assurance. Field survey works of the national CMMR survey needs to finish five key contents, there are preparation works for field survey, the choice of the key survey area (samples), fill in the questionnaire, video data collection, specimen and other physical collection. Sorting data works of the national CMMR survey needs to finish tree key contents, there are data, specimen and census results.

  18. 31 CFR Appendix A to Subpart C of... - Examples

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... this example, an individual covered by the Police and Firefighters Plan hired before 1980 retires in... the Police and Firefighters Plan was hired earlier than in example 1A and thus performed more service... this example, an individual covered by the Police and Firefighters Plan and hired before 1980 retires...

  19. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    PubMed Central

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606

  20. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.

    PubMed

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.