Sample records for leverage preferred securities

  1. 13 CFR 107.1450 - Optional redemption of Preferred Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Optional redemption of Preferred Securities. 107.1450 Section 107.1450 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred Securities...

  2. 13 CFR 107.1410 - Requirement to redeem 4 percent Preferred Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement to redeem 4 percent Preferred Securities. 107.1410 Section 107.1410 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred...

  3. 13 CFR 107.1420 - Articles requirements for 4 percent Preferred Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Articles requirements for 4 percent Preferred Securities. 107.1420 Section 107.1420 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred...

  4. 13 CFR 107.1820 - Conditions affecting issuers of Preferred Securities and/or Participating Securities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... receipt of additional Leverage, within 120 days prior to the end of your fiscal year. (10) Nonperformance... during the first eight years following your first issuance of Participating Securities. (ii) This... applicable to you; or you fail to maintain as of the end of each fiscal year the investment ratios or amounts...

  5. 13 CFR 107.1820 - Conditions affecting issuers of Preferred Securities and/or Participating Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... receipt of additional Leverage, within 120 days prior to the end of your fiscal year. (10) Nonperformance... during the first eight years following your first issuance of Participating Securities. (ii) This... applicable to you; or you fail to maintain as of the end of each fiscal year the investment ratios or amounts...

  6. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less

  7. 17 CFR 31.22 - Prohibited trading in leverage contracts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...

  8. 17 CFR 31.22 - Prohibited trading in leverage contracts.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...

  9. 17 CFR 31.22 - Prohibited trading in leverage contracts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...

  10. 17 CFR 31.22 - Prohibited trading in leverage contracts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...

  11. 17 CFR 31.22 - Prohibited trading in leverage contracts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...

  12. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less

  13. Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces

    DTIC Science & Technology

    2009-04-01

    terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT

  14. 17 CFR 31.17 - Records of leverage transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Records of leverage... LEVERAGE TRANSACTIONS § 31.17 Records of leverage transactions. (a) Each leverage transaction merchant receiving a leverage customer's order shall immediately upon receipt thereof prepare a written record of...

  15. 17 CFR 31.23 - Limited right to rescind first leverage contract.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Limited right to rescind first... COMMISSION LEVERAGE TRANSACTIONS § 31.23 Limited right to rescind first leverage contract. (a) A leverage... pursuant to the following provisions: (1) Such customer may be assessed actual price losses accruing to the...

  16. 13 CFR 107.550 - Prior approval of secured third-party debt of leveraged Licensees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Prior approval of secured third-party debt of leveraged Licensees. 107.550 Section 107.550 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Managing the Operations of a Licensee Borrowing by Licensees...

  17. 13 CFR 107.1910 - Non-waiver of SBA's rights or terms of Leverage security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Non-waiver of SBA's rights or terms of Leverage security. 107.1910 Section 107.1910 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Miscellaneous § 107.1910 Non-waiver of SBA's rights or terms...

  18. 13 CFR 107.1910 - Non-waiver of SBA's rights or terms of Leverage security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Non-waiver of SBA's rights or terms of Leverage security. 107.1910 Section 107.1910 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Miscellaneous § 107.1910 Non-waiver of SBA's rights or terms...

  19. 13 CFR 108.1910 - Non-waiver of SBA's rights or terms of Leverage security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Non-waiver of SBA's rights or terms of Leverage security. 108.1910 Section 108.1910 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Miscellaneous § 108.1910 Non-waiver of SBA's rights...

  20. A Unified Approach to Intra-Domain Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shue, Craig A; Kalafut, Andrew J.; Gupta, Prof. Minaxi

    2009-01-01

    While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with a secure version of the DHCP protocol, which has the additional feature of providing each host with a certificate. We then leverage these certificates to secure ARP, prevent spoofing within the domain, and secure SSH and VPN connections between the domain and hosts which have previously interacted with it locally. In doing so, we also develop an incrementally deployable public key infrastructuremore » which can later be leveraged to support inter-domain authentication.« less

  1. 13 CFR 107.1700 - Transfer by SBA of its interest in Licensee's Leverage security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Transfer by SBA of its interest in Licensee's Leverage security. 107.1700 Section 107.1700 Business Credit and Assistance SMALL BUSINESS... will be liable for all damage or loss which SBA may sustain by reason of such disposal, up to the...

  2. 13 CFR 108.1700 - Transfer by SBA of its interest in a NMVC Company's Leverage security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Transfer by SBA of its interest in a NMVC Company's Leverage security. 108.1700 Section 108.1700 Business Credit and Assistance SMALL... be liable for all damage or loss which SBA may sustain by reason of such disposal, up to the amount...

  3. Leveraging Trade Agreements to Meet U.S. Security Aims

    DTIC Science & Technology

    2016-04-08

    NATIONAL DEFENSE UNIVERSITY JOINT FORCES STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL LEVERAGING TRADE AGREEMENTS TO MEET U.S. SECURITY AIMS by...Forces Staff College Joint Advanced Warfighting School 7800 Hampton Blvd Norfolk, VA. 2351 1-1702 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES...my own personal views and are not necessarily endorsed by the Joint Forces Staff College or the Department of Defense. This paper is entirely my own

  4. The military health system's personal health record pilot with Microsoft HealthVault and Google Health.

    PubMed

    Do, Nhan V; Barnhill, Rick; Heermann-Do, Kimberly A; Salzman, Keith L; Gimbel, Ronald W

    2011-01-01

    To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages Microsoft® HealthVault and Google® Health infrastructure based on user preference. A pilot project was conducted in 2008-2009 at Madigan Army Medical Center in Tacoma, Washington. Our PHR was architected to a flexible platform that incorporated standards-based models of Continuity of Document and Continuity of Care Record to map Department of Defense-sourced health data, via a secure Veterans Administration data broker, to Microsoft® HealthVault and Google® Health based on user preference. The project design and implementation were guided by provider and patient advisory panels with formal user evaluation. The pilot project included 250 beneficiary users. Approximately 73.2% of users were < 65 years of age, and 38.4% were female. Of the users, 169 (67.6%) selected Microsoft® HealthVault, and 81 (32.4%) selected Google® Health as their PHR of preference. Sample evaluation of users reflected 100% (n = 60) satisfied with convenience of record access and 91.7% (n = 55) satisfied with overall functionality of PHR. Key lessons learned related to data-transfer decisions (push vs pull), purposeful delays in reporting sensitive information, understanding and mapping PHR use and clinical workflow, and decisions on information patients may choose to share with their provider. Currently PHRs are being viewed as empowering tools for patient activation. Design and implementation issues (eg, technical, organizational, information security) are substantial and must be thoughtfully approached. Adopting standards into design can enhance the national goal of portability and interoperability.

  5. Leveraging the Power of Place: A New Commitment to Personalizing Learning

    ERIC Educational Resources Information Center

    Liebtag, Emily

    2018-01-01

    Personalized learning offers instruction that matches students' learning preferences and specific interests. Taking innovative approaches to engaging with students' individual contexts and interests through place-based education can be particularly meaningful. Place-based education (PBE) is anytime, anywhere learning that leverages the power of…

  6. 13 CFR 107.1440 - Three percent preferred stock issued before November 21, 1989.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Three percent preferred stock issued before November 21, 1989. 107.1440 Section 107.1440 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred...

  7. 13 CFR 108.550 - Prior approval of secured third-party debt of NMVC companies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Managing the Operations of a NMVC Company Borrowing... total outstanding borrowings (not including Leverage) to exceed 50 percent of your Leverageable Capital. Voluntary Decrease in Regulatory Capital ...

  8. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... Committee Management Secretariat, General Services Administration. Name of Committee: Homeland Security...

  9. 17 CFR 31.6 - Registration of leverage commodities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... commodities. 31.6 Section 31.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... applied to the National Futures Association for registration as a leverage transaction merchant; (2... the spot, forward, and futures markets for the generic commodity; (3) Specify a commercial or retail...

  10. 17 CFR 3.10 - Registration of futures commission merchants, retail foreign exchange dealers, introducing...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., commodity pool operators and leverage transaction merchants. 3.10 Section 3.10 Commodity and Securities..., commodity pool operators and leverage transaction merchants. (a) Application for registration. (1)(i) Except... merchant, retail foreign exchange dealers, introducing broker, commodity trading advisor, commodity pool...

  11. Expanding the role of unattended ground sensors to multi-tiered systems

    NASA Astrophysics Data System (ADS)

    Garrison, David R., II

    2009-05-01

    Unattended Ground Sensors (UGS) have recently gained momentum in surveillance and protection applications. Many of these Unattended Ground Sensors are deployed in current operations today across the Department of Defense (DoD) and Department of Homeland Security (DHS). In addition to UGS needs, there is a growing desire to leverage existing UGS for incorporation into higher level systems for a broadening role in defense and homeland security applications. The architecture to achieve this goal and examples of non-traditional scenarios that leverage higher level systems are discussed in this paper.

  12. The military health system's personal health record pilot with Microsoft HealthVault and Google Health

    PubMed Central

    Barnhill, Rick; Heermann-Do, Kimberly A; Salzman, Keith L; Gimbel, Ronald W

    2011-01-01

    Objective To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages Microsoft® HealthVault and Google® Health infrastructure based on user preference. Materials and methods A pilot project was conducted in 2008–2009 at Madigan Army Medical Center in Tacoma, Washington. Our PHR was architected to a flexible platform that incorporated standards-based models of Continuity of Document and Continuity of Care Record to map Department of Defense-sourced health data, via a secure Veterans Administration data broker, to Microsoft® HealthVault and Google® Health based on user preference. The project design and implementation were guided by provider and patient advisory panels with formal user evaluation. Results The pilot project included 250 beneficiary users. Approximately 73.2% of users were <65 years of age, and 38.4% were female. Of the users, 169 (67.6%) selected Microsoft® HealthVault, and 81 (32.4%) selected Google® Health as their PHR of preference. Sample evaluation of users reflected 100% (n=60) satisfied with convenience of record access and 91.7% (n=55) satisfied with overall functionality of PHR. Discussion Key lessons learned related to data-transfer decisions (push vs pull), purposeful delays in reporting sensitive information, understanding and mapping PHR use and clinical workflow, and decisions on information patients may choose to share with their provider. Conclusion Currently PHRs are being viewed as empowering tools for patient activation. Design and implementation issues (eg, technical, organizational, information security) are substantial and must be thoughtfully approached. Adopting standards into design can enhance the national goal of portability and interoperability. PMID:21292705

  13. 7 CFR 4290.1700 - Secretary's transfer of interest in a RBIC's Leverage security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) RURAL BUSINESS-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE RURAL BUSINESS INVESTMENT COMPANY (âRBICâ) PROGRAM Financial Assistance for RBICs (Leverage) Miscellaneous § 4290.1700... consideration as he or she deems reasonable, the Secretary may sell, assign, transfer, or otherwise dispose of...

  14. Leveraging brightness from transportation lighting systems through light source color.

    DOT National Transportation Integrated Search

    2013-11-01

    Roadway transportation lighting is installed for multiple reasons including traffic safety and pedestrian : security. Judgments of pedestrian safety and security along roadways are not strictly correlated to : specified light levels, but the color of...

  15. 13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...

  16. 13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...

  17. 77 FR 70500 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing of Proposed Rule Change To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-26

    ... account in which a Member acting as a registered Market Maker, directly or indirectly, controls trading... the Exchange, or any act, condition, or cause beyond the reasonable control of the Exchange or its... FINRA members applicable to inverse, leveraged, and inverse leveraged securities and options on such...

  18. Hybrid architecture for building secure sensor networks

    NASA Astrophysics Data System (ADS)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  19. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... duties. This determination follows consultation with the Committee Management Secretariat, General..., management processes, and organizational constructs as needed. Upon request, the committee provides...

  20. The Leverage Effect on Wealth Distribution in a Controllable Laboratory Stock Market

    PubMed Central

    Zhu, Chenge; Yang, Guang; An, Kenan; Huang, Jiping

    2014-01-01

    Wealth distribution has always been an important issue in our economic and social life, since it affects the harmony and stabilization of the society. Under the background of widely used financial tools to raise leverage these years, we studied the leverage effect on wealth distribution of a population in a controllable laboratory market in which we have conducted several human experiments, and drawn the conclusion that higher leverage leads to a higher Gini coefficient in the market. A higher Gini coefficient means the wealth distribution among a population becomes more unequal. This is a result of the ascending risk with growing leverage level in the market plus the diversified trading abilities and risk preference of the participants. This work sheds light on the effects of leverage and its related regulations, especially its impact on wealth distribution. It also shows the capability of the method of controllable laboratory markets which could be helpful in several fields of study such as economics, econophysics and sociology. PMID:24968222

  1. The leverage effect on wealth distribution in a controllable laboratory stock market.

    PubMed

    Zhu, Chenge; Yang, Guang; An, Kenan; Huang, Jiping

    2014-01-01

    Wealth distribution has always been an important issue in our economic and social life, since it affects the harmony and stabilization of the society. Under the background of widely used financial tools to raise leverage these years, we studied the leverage effect on wealth distribution of a population in a controllable laboratory market in which we have conducted several human experiments, and drawn the conclusion that higher leverage leads to a higher Gini coefficient in the market. A higher Gini coefficient means the wealth distribution among a population becomes more unequal. This is a result of the ascending risk with growing leverage level in the market plus the diversified trading abilities and risk preference of the participants. This work sheds light on the effects of leverage and its related regulations, especially its impact on wealth distribution. It also shows the capability of the method of controllable laboratory markets which could be helpful in several fields of study such as economics, econophysics and sociology.

  2. Hazardous material transportation safety and security field operational test final evaluation plan : executive summary

    DOT National Transportation Integrated Search

    2003-03-17

    The purpose of this effort is to independently evaluate the Battelle Operational Test Team to test methods for leveraging technology and operations to improve HAZMAT transport security, safety, and operational efficiency. As such, the preceding techn...

  3. AMP: A platform for managing and mining data in the treatment of Autism Spectrum Disorder.

    PubMed

    Linstead, Erik; Burns, Ryan; Duy Nguyen; Tyler, David

    2016-08-01

    We introduce AMP (Autism Management Platform), an integrated health care information system for capturing, analyzing, and managing data associated with the diagnosis and treatment of Autism Spectrum Disorder in children. AMP's mobile application simplifies the means by which parents, guardians, and clinicians can collect and share multimedia data with one another, facilitating communication and reducing data redundancy, while simplifying retrieval. Additionally, AMP provides an intelligent web interface and analytics platform which allow physicians and specialists to aggregate and mine patient data in real-time, as well as give relevant feedback to automatically learn data filtering preferences over time. Together AMP's mobile app, web client, and analytics engine implement a rich set of features that streamline the data collection and analysis process in the context of a secure and easy-to-use system so that data may be more effectively leveraged to guide treatment.

  4. 13 CFR 107.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Effect of prepayment or early... prepayment or early redemption of Leverage on a Trust Certificate. (a) The rights, if any, of a Licensee to prepay any Debenture or make early redemption of any Participating Security are established by the terms...

  5. Leveraging the laboratory response network model for the global health security agenda.

    PubMed

    Mangal, Chris N; Maryogo-Robinson, Lucy

    2014-01-01

    Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.

  6. Leveraging the Laboratory Response Network Model for the Global Health Security Agenda

    PubMed Central

    Maryogo-Robinson, Lucy

    2014-01-01

    Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916

  7. Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations

    DTIC Science & Technology

    2011-03-01

    leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements...Detection with an Autonomous Micro UAV Mesh Network . In the near future police departments, fire brigades and other homeland security ...UAV-based sensor networks with respect to existing constraints and user requirements. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  8. 13 CFR 107.1450 - Optional redemption of Preferred Securities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...

  9. 13 CFR 107.1450 - Optional redemption of Preferred Securities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...

  10. 13 CFR 107.1450 - Optional redemption of Preferred Securities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...

  11. 13 CFR 107.1450 - Optional redemption of Preferred Securities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...

  12. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... developments in systems engineering, cyber- security, knowledge management and how best to leverage related... contribution to a diverse range of science and technology topic areas (including chemical, biological, and... technology capabilities and needs, and the latest thinking in systems engineering), and their depth of...

  13. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources andmore » issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.« less

  14. 77 FR 36591 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-19

    ... issuer or two or more issuers which the Fund controls and which are engaged in the same, similar, or... is the multiple or inverse multiple (i.e., 2Xs and 3Xs) of the Fund's broad-based securities market index (as defined in Form N-1A).\\18\\ The Fund will not invest in leveraged or inverse leveraged...

  15. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rizzo, Davinia; Blackburn, Mark

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper coversmore » the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).« less

  16. Considering IIOT and security for the DoD

    NASA Astrophysics Data System (ADS)

    Klawon, Kevin; Gold, Josh; Bachman, Kristen; Landoll, Darren

    2016-05-01

    The Internet of Things (IoT) has come of age and domestic and industrial devices are all "smart". But how can they be universally classified and queried? How do we know that the underlying architecture is secure enough to deploy on a defense network? By leverage existing platforms designed for interoperability, extensibility, and security that can manage data across multiple domains and runs on any platform.

  17. Marine Corps Private Cloud Computing Environment Strategy

    DTIC Science & Technology

    2012-05-15

    leveraging economies of scale through the MCEITS PCCE, the Marine Corps will measure consumed IT resources more effectively, increase or decrease...flexible broad network access, resource pooling, elastic provisioning and measured services. By leveraging economies of scale the Marine Corps will be able...IaaS SaaS / IaaS 1 1 LCE I ACE Dets I I I I ------------------~ GIG / CJ Internet Security Boundary MCEN I DISN r :------------------ MCEN

  18. The Behavioralist Goes to School: Leveraging Behavioral Economics to Improve Educational Performance. NBER Working Paper No. 18165

    ERIC Educational Resources Information Center

    Levitt, Steven D.; List, John A.; Neckermann, Susanne; Sadoff, Sally

    2012-01-01

    A long line of research on behavioral economics has established the importance of factors that are typically absent from the standard economic framework: reference dependent preferences, hyperbolic preferences, and the value placed on non-financial rewards. To date, these insights have had little impact on the way the educational system operates.…

  19. 13 CFR 107.1710 - SBA authority to collect or compromise its claims.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Miscellaneous... consideration as it deems reasonable, collect or compromise all claims relating to Preferred or Participating...

  20. 13 CFR 107.1530 - How a Licensee computes SBA's Profit Participation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... steps in paragraphs (e) through (g) of this section. (e) Compute the “PLC ratio”—(1) General rule. The “PLC ratio” is the highest ratio of outstanding Participating Securities to Leverageable Capital that... reduced PLC ratio as follows: (i) Divide the highest dollar amount of Participating Securities you have...

  1. 13 CFR 107.1530 - How a Licensee computes SBA's Profit Participation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... steps in paragraphs (e) through (g) of this section. (e) Compute the “PLC ratio”—(1) General rule. The “PLC ratio” is the highest ratio of outstanding Participating Securities to Leverageable Capital that... reduced PLC ratio as follows: (i) Divide the highest dollar amount of Participating Securities you have...

  2. Leveraging the Security -- Development Nexus in East Africa

    DTIC Science & Technology

    2012-02-28

    THE SECURITY-DEVELOPMENT NEXUS IN EAST AFRICA America is in a state of hypnosis . Many outside the beltway do not know, and/or care, how reckless...invariably, what policy makers are implicitly tasked to do, because America will not come out of its hypnosis at the count of three. Endnotes 1 Susan

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Pierson, Lyndon; Bauer, Todd

    Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.

  4. The Centurions vs. the Hydra: French Counterinsurgency in the Peninsular War (1808-1812)

    DTIC Science & Technology

    2011-06-10

    their operational dilemma in different manners. But the analysis also outlined a common denominator to their practices. Leverage of religion , build up...But the analysis also outlined a common denominator to their practices. Leverage of religion , build up of native security forces, and development...armada en los origenese de la Espana liberal, 1808-1823 [Cortes and Military Forces at the Origin of Liberal Spain] (Madrid, Spain: Siglo veintiuno

  5. Democratizing Authority in the Built Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Andersen, Michael P; Kolb, John; Chen, Kaifei

    Operating systems and applications in the built environment have relied upon central authorization and management mechanisms which restrict their scalability, especially with respect to administrative overhead. We propose a new set of primitives encompassing syndication, security, and service execution that unifies the management of applications and services across the built environment, while enabling participants to individually delegate privilege across multiple administrative domains with no loss of security or manageability. We show how to leverage a decentralized authorization syndication platform to extend the design of building operating systems beyond the single administrative domain of a building. The authorization system leveraged ismore » based on blockchain smart contracts to permit decentralized and democratized delegation of authorization without central trust. Upon this, a publish/subscribe syndication tier and a containerized service execution environment are constructed. Combined, these mechanisms solve problems of delegation, federation, device protection and service execution that arise throughout the built environment. We leverage a high-fidelity city-scale emulation to verify the scalability of the authorization tier, and briefly describe a prototypical democratized operating system for the built environment using this foundation.« less

  6. Leveraging Trade Agreements to Meet U.S. Security Aims

    DTIC Science & Technology

    2016-04-08

    TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the

  7. Secure Learning and Learning for Security: Research in the Intersection

    DTIC Science & Technology

    2010-05-13

    researchers to consider how Machine Learning and Statistics might be leveraged for constructing intelli - gent attacks. In a similar vein, security...Quantiles S am pl e Q ua nt ile s...8217 Residuals in Flow 144 Theoretical Quantiles S am pl e Q ua nt ile s 0 1 2 3 4 5 6 7 5. 0e + 07 1. 0e + 08 1. 5e + 08 Comparing Actual and Synthetic

  8. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    DTIC Science & Technology

    2016-03-01

    ric-zai-inc.com/Publications/cops-p143-pub.pdf. 8 Yahoo News, “10 Years Later: The Rookie Police Officer Who Caught Eric Rudolph,” May 20, 2013, http...DC: White House, 2004. ———. Presidential Policy Directive 18 (PPD-18), Maritime Security. Washington, DC: White House, 2012. Yahoo News. “10

  9. Leveraging Safety Programs to Improve and Support Security Programs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leach, Janice; Snell, Mark K.; Pratt, R.

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  10. 12 CFR 1270.5 - Leverage limit and credit rating requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...

  11. 12 CFR 1270.5 - Leverage limit and credit rating requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...

  12. 12 CFR 1270.5 - Leverage limit and credit rating requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...

  13. R&D100: IC ID

    ScienceCinema

    Hamlet, Jason; Pierson, Lyndon; Bauer, Todd

    2018-06-25

    Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.

  14. Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports

    NASA Astrophysics Data System (ADS)

    Auletta, Vincenzo; Blundo, Carlo; de Caro, Angelo; de Cristofaro, Emiliano; Persiano, Giuseppe; Visconti, Ivan

    The recent introduction of electronic passports (e-Passports) motivates the need of a thorough investigation on potential security and privacy issues. In this paper, we focus on the e-Passport implementation adopted in Italy. Leveraging previous attacks to e-Passports adopted in other countries, we analyze (in)security of Italian e-Passports and we investigate additional critical issues.

  15. THE EFFECT OF TAX PREFERENCES ON HEALTH SPENDING

    PubMed Central

    Cogan, John F.; Hubbard, R. Glenn; Kessler, Daniel P.

    2011-01-01

    In this paper, we estimate the effect of the tax preference for health insurance on health care spending using data from the Medical Expenditure Panel Surveys from 1996–2005. We use the fact that Social Security taxes are only levied on earnings below a statutory threshold to identify the impact of the tax preference. Because employer-sponsored health insurance premiums are excluded from Social Security payroll taxes, workers who earn just below the Social Security tax threshold receive a larger tax preference for health insurance than workers who earn just above it. We find a significant effect of the tax preference, consistent with previous research. PMID:22500056

  16. Making the case: leveraging resources toward public health system improvement in Turning Point states.

    PubMed

    Bekemeier, Betty; Riley, Catharine M; Padgett, Stephen M; Berkowitz, Bobbie

    2007-01-01

    Leveraging funds to sustain the efforts of a grant-funded initiative is often an explicit, or implicit, expectation in philanthropy. However, the magnitude of funds leveraged and the factors that facilitate success in leveraging are rarely researched. An example of one of these grant-funded initiatives is the National Turning Point Initiative. Twenty-one states received funding from The Robert Wood Johnson Foundation as part of this initiative to establish and implement strategic goals for achieving significant statewide public health system improvement through diverse, cross-sector partnerships. Leaders from 17 of these 21 states participated in a two-phased study regarding the leveraging of additional funds for their public health infrastructure improvement activities. This article reports on the second phase of the study. In this phase, key informant interviews were conducted to examine how leveraging of resources occurred as part of this large national initiative. Findings indicate that the combination of a comprehensive planning process and a broad-based partnership was crucial in securing resources to expand their efforts. The ability to strategically respond to unexpected events and opportunities also helped states use their plans and partnerships to "make the case" for additional resources to improve their public health infrastructure.

  17. Biometrics in support of special forces medical operations.

    PubMed

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.

  18. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  19. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  20. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  1. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  2. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    PubMed

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, P<0.001 for both). Education and sex-related differences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  3. Risk Assessment Methodology Based on the NISTIR 7628 Guidelines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R

    2013-01-01

    Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards and defined failure scenarios. We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design principles and courses of action in making security-related decisions.

  4. Leveraging Knowledge Management Tools to Support Security Risk Management in the Department of Homeland Security

    DTIC Science & Technology

    2011-12-01

    34 Figure 7. NASA Knowledge Management Environment (From Holm, 2009, p. 5). ......36 x...sharing That are not able to show measurable benefits Loose management support without demonstrating effectiveness Because users do not perceive value...explore KM in one form or another. Both are large agencies with annual budgets in the billions and manage multi -billion dollar projects, whose

  5. Competitive Strategies

    DTIC Science & Technology

    1988-05-27

    Competitive Strategies Individual Essay 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(@) S. CONTRACT OR GRANT NUMBER( e ) Robert M. Davis, LTC, AD S...DO FOe 1473 emIotN or, Nov es IS OBSOLETE -JA I Unclassifi fed SECURITY CLASSIFICATION OF THIS PA7. E (Whrn Does Entered) Unclassified SECURITY...focus within the Department of Defense to provide technical and tactical leverage over the Soviets. Competitive Strategies are a management tool which

  6. Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings

    PubMed Central

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133

  7. Wireless technology infrastructures for authentication of patients: PKI that rings.

    PubMed

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

  8. 17 CFR 239.39 - Form F-9, for registration under the Securities Act of 1933 of certain investment grade debt or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under the Securities Act of 1933 of certain investment grade debt or investment grade preferred... Statements § 239.39 Form F-9, for registration under the Securities Act of 1933 of certain investment grade debt or investment grade preferred securities of certain Canadian issuers. (a) Form F-9 may be used for...

  9. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, andmore » views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.« less

  10. Center for Corporate Climate Leadership Building Internal Support in Supply Chain Management

    EPA Pesticide Factsheets

    Organizations build support for addressing GHG emissions by developing key allies in business units, leveraging one business unit to drive change across the organization, and securing executive support while communicating resource needs.

  11. Leveraging Social Links for Trust and Privacy in Networks

    NASA Astrophysics Data System (ADS)

    Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten

    Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.

  12. Improving the Automated Detection and Analysis of Secure Coding Violations

    DTIC Science & Technology

    2014-06-01

    eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree

  13. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    DTIC Science & Technology

    2008-09-01

    telephone, conference calls, emails, alert notifications, and blackberry . The RDTSF holds conference calls with its stakeholders to provide routine... tunnels ) is monitored by CCTV cameras with live feeds to WMATA’s Operations Control Center (OCC) to detect unauthorized entry into areas not intended for...message by email, blackberry and phone to the Security Coordinators. Dissemination of classified information however, is generally handled through the

  14. International Outreach and Coordination Strategy for the National Strategy for Maritime Security

    DTIC Science & Technology

    2005-11-01

    economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime

  15. 13 CFR 107.1210 - Payment of leverage fee upon receipt of commitment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... percent of the face amount of the Debentures or Participating Securities reserved under the commitment... this section by 5:00 P.M. Eastern Time on the 30th calendar day following the issuance of SBA's...

  16. Residential Preferences: What's Terrorism Got to Do with It?

    ERIC Educational Resources Information Center

    Kay, David; Geisler, Charles; Bills, Nelson

    2010-01-01

    Security has long been recognized as an element in residential preference and its relative importance has risen with fear of extremist attacks on U.S. cities. Using polling data from 2004, this research investigates whether the security breaches of 9/11 in New York City influenced residential preferences in New York State. Our results confirm that…

  17. 12 CFR 163.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Inclusion of subordinated debt securities and... Borrowings § 163.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as... 12 CFR part 116, subpart A seeking the OCC's approval of, or non-objection to, the inclusion of...

  18. 12 CFR 163.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... Borrowings § 163.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as... 12 CFR part 116, subpart A seeking the OCC's approval of, or non-objection to, the inclusion of...

  19. 12 CFR 163.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Inclusion of subordinated debt securities and... Borrowings § 163.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as... 12 CFR part 116, subpart A seeking the OCC's approval of, or non-objection to, the inclusion of...

  20. 78 FR 54700 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... common stocks; preferred securities; warrants to purchase common stocks or preferred securities... rated below investment grade at the time of purchase, or unrated securities deemed by the Fund's Adviser... contracts. The Fund may invest in such loans by purchasing assignments of all or a portion of loans or loan...

  1. Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems

    NASA Astrophysics Data System (ADS)

    Graham, Christopher J.

    2012-05-01

    Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=

  2. Northern Command: A Relevant and Necessary Partner to Increase Security in Mexico

    DTIC Science & Technology

    2010-10-27

    month.19 Drug cartels leverage low pay and offer “ plato o plomo” or “silver or lead” which forces policemen to choose between taking a bribe or a...Scott Stewart, Hezbollah, Radical but Rational , Stratfor Security Weekly, (12 August 2010), http://www.stratfor.com/weekly...34Hezbollah, Radical but Rational ." Stratfor.com. August 12, 2010. http://www.stratfor.com/weekly/20100811_hezbollah_radical_rational (accessed 28

  3. Public-Private Collaboration in the Department of Defense

    DTIC Science & Technology

    2012-07-01

    In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.

  4. Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules.

    PubMed

    Barsocchi, Paolo; Calabrò, Antonello; Ferro, Erina; Gennaro, Claudio; Marchetti, Eda; Vairo, Claudio

    2018-06-08

    Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used to recognize and track the activities that people perform during the day, and to allow communication and cooperation of physical objects. Usually, the available infrastructures and applications leveraging these smart environments have a critical impact on the overall cost of the Smart Home construction, require to be preferably installed during the home construction and are still not user-centric. In this paper, we propose a low cost, easy to install, user-friendly, dynamic and flexible infrastructure able to perform runtime resources management by decoupling the different levels of control rules. The basic idea relies on the usage of off-the-shelf sensors and technologies to guarantee the regular exchange of critical information, without the necessity from the user to develop accurate models for managing resources or regulating their access/usage. This allows us to simplify the continuous updating and improvement, to reduce the maintenance effort and to improve residents’ living and security. A first validation of the proposed infrastructure on a case study is also presented.

  5. 7 CFR 3550.55 - Applications.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... notified in writing and provided with the specific reasons for the rejection. (c) Selection for processing... applicants qualifying for a veterans preference. After selection for processing, loans are funded on a first...-approved Mutual Self-Help project or loans that will leverage funding or financing from other sources. (5...

  6. 7 CFR 3550.55 - Applications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... notified in writing and provided with the specific reasons for the rejection. (c) Selection for processing... applicants qualifying for a veterans preference. After selection for processing, loans are funded on a first...-approved Mutual Self-Help project or loans that will leverage funding or financing from other sources. (5...

  7. Leveraging traffic and surveillance video cameras for urban traffic.

    DOT National Transportation Integrated Search

    2014-12-01

    The objective of this project was to investigate the use of existing video resources, such as traffic : cameras, police cameras, red light cameras, and security cameras for the long-term, real-time : collection of traffic statistics. An additional ob...

  8. Leveraging Global Maritime Partnerships to Increase Global Security in the Maritime Domain

    DTIC Science & Technology

    2008-04-04

    global interdependency (ways to counter the threat), along with the agility and elusiveness of the maritime threat to utilize the vastness of the...is that all of these costs cut into their profit margins and are therefore passed along by way of increased prices for goods purchased by the...costs of security measures and initiatives without cutting into their profit margins . Because of this they are more apt to take on the added risk

  9. Policy and Policy Formulation Considerations for Incorporation of Secure Mobile Devices in USMC Ground Combat Units

    DTIC Science & Technology

    2014-09-01

    power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video

  10. China’s Space Program: A New Tool for PRC Soft Power in International Relations?

    DTIC Science & Technology

    2009-03-01

    programs important and what is China doing to leverage them? A growing number of nations recognize the advantages of space applications. From the...as others far outside of its Asian backyard to market these services to and what it hopes to gain from them. Second, is America’s comparative...Freese, “Strategic Communication with China: What Message About Space?,” China Security, World Security Institute, 2:2 (2006): 45. 4 for

  11. Using secure web services to visualize poison center data for nationwide biosurveillance: a case study.

    PubMed

    Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine

    2010-01-01

    Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.

  12. Virtualized Multi-Mission Operations Center (vMMOC) and its Cloud Services

    NASA Technical Reports Server (NTRS)

    Ido, Haisam Kassim

    2017-01-01

    His presentation will cover, the current and future, technical and organizational opportunities and challenges with virtualizing a multi-mission operations center. The full deployment of Goddard Space Flight Centers (GSFC) Virtualized Multi-Mission Operations Center (vMMOC) is nearly complete. The Space Science Mission Operations (SSMO) organizations spacecraft ACE, Fermi, LRO, MMS(4), OSIRIS-REx, SDO, SOHO, Swift, and Wind are in the process of being fully migrated to the vMMOC. The benefits of the vMMOC will be the normalization and the standardization of IT services, mission operations, maintenance, and development as well as ancillary services and policies such as collaboration tools, change management systems, and IT Security. The vMMOC will also provide operational efficiencies regarding hardware, IT domain expertise, training, maintenance and support.The presentation will also cover SSMO's secure Situational Awareness Dashboard in an integrated, fleet centric, cloud based web services fashion. Additionally the SSMO Telemetry as a Service (TaaS) will be covered, which allows authorized users and processes to access telemetry for the entire SSMO fleet, and for the entirety of each spacecrafts history. Both services leverage cloud services in a secure FISMA High and FedRamp environment, and also leverage distributed object stores in order to house and provide the telemetry. The services are also in the process of leveraging the cloud computing services elasticity and horizontal scalability. In the design phase is the Navigation as a Service (NaaS) which will provide a standardized, efficient, and normalized service for the fleet's space flight dynamics operations. Additional future services that may be considered are Ground Segment as a Service (GSaaS), Telemetry and Command as a Service (TCaaS), Flight Software Simulation as a Service, etc.

  13. Model-Driven Configuration of SELinux Policies

    NASA Astrophysics Data System (ADS)

    Agreiter, Berthold; Breu, Ruth

    The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.

  14. 13 CFR 107.1585 - Exchange of Debentures for Participating Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Capital Investments (at cost) equal to the amount of the Debenture being refinanced; and (d) Classify all your existing Loans and Investments as Earmarked Assets. [63 FR 5869, Feb. 5, 1998] ... SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Participating...

  15. Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?

    PubMed

    Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M

    2015-11-26

    Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. We sought to compare residents' preferences for SMS text messaging compared with other forms of in-hospital communication when considering security versus ease of use. This study was a cross-sectional multi-institutional survey of internal medicine residents. Residents ranked different communication modalities based on efficiency, ease of use, and security using a Likert scale. Communication options included telephone, email, hospital paging, and SMS text messaging. Respondents also reported whether they had received confidential patient identifiers through any of these modalities. SMS text messaging was preferred by 71.7% (94/131) of respondents because of its efficiency and by 79.8% (103/129) of respondents because of its ease of use. For security, 82.5% (104/126) of respondents preferred the hospital paging system, whereas only 20.6% (26/126) of respondents preferred SMS text messaging for secure communication. In all, 70.9% (93/131) of respondents reported having received patient identifiers (first and/or last name), 81.7% (107/131) reported receiving patient initials, and 50.4% (66/131) reported receiving a patient's medical record number through SMS text messages. Residents prefer in-hospital communication through SMS text messaging because of its ease of use and efficiency. Despite security concerns, the majority of residents reported receiving confidential patient information through SMS text messaging. For providers, it is possible that the benefits of improved in-hospital communication with SMS text messaging and the presumed improvement in the coordination and delivery of patient care outweigh security concerns they may have. The tension between the security and convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.

  16. Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa

    DTIC Science & Technology

    2010-04-03

    Charles Wald , “The Phase Zero Campaign,” Joint Force Quarterly, Issue 43, 4th Quarter 2006, available at http://www.ndu.edu/inss. 12 DOD, The Quadrennial...Deputy Under Secretary Henry From the Pentagon,” February 7, 2007. 19 See, for example, Lisa Schirch and Aaron Kishbaugh, “Leveraging ‘3D’ Security...Testimony of General Charles Wald , Member, Military Advisory Board, at a hearing on Climate Change and National Security Threats by the Senate Foreign

  17. The Landscape of International Biosurveillance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hartley, David M.; Nelson, Noele P.; Walters, Ronald A.

    2010-02-01

    Event-based biosurveillance is a scientific discipline in which diverse streams of data, available from the Internet, are characterized prospectively to provide information on infectious disease events. Biosurveillance complements traditional public health surveillance to provide both early warning of infectious disease events as well as situational awareness. The Global Health Security Action Group (GHSAG) of the Global Health Security Initiative is developing a biosurveillance capability that integrates and leverages component systems from member nations. This work discusses these biosurveillance systems and identifies needed future studies.

  18. Leveraging up Summers on Campus; Avoiding Lost Opportunities

    ERIC Educational Resources Information Center

    Gross, Karen

    2014-01-01

    New England's long winter and seemingly interminable wait for spring has this author thinking about what colleges could do with their campuses during the summer. The options are almost infinite, although the cost-benefit analysis clearly varies. For some students, being on campus in the summer is preferable to going home, where the environments…

  19. On Measuring and Reducing Selection Bias with a Quasi-Doubly Randomized Preference Trial

    ERIC Educational Resources Information Center

    Joyce, Ted; Remler, Dahlia K.; Jaeger, David A.; Altindag, Onur; O'Connell, Stephen D.; Crockett, Sean

    2017-01-01

    Randomized experiments provide unbiased estimates of treatment effects, but are costly and time consuming. We demonstrate how a randomized experiment can be leveraged to measure selection bias by conducting a subsequent observational study that is identical in every way except that subjects choose their treatment--a quasi-doubly randomized…

  20. 13 CFR 107.1500 - General description of Participating Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in Equity Capital Investments, as defined in § 107.50. (c) Special features of Participating... SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Participating... rules on: (1) Minimum capital (see § 107.210). (2) Liquidity (see § 107.1505). (3) Non-SBA borrowing...

  1. 45 CFR 96.87 - Leveraging incentive program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... energy, or the purchase of items that help these households meet the cost of home energy, at commonly... fees, application fees, late payment charges, bulk fuel tank rental or purchase costs, and security...; space cooling devices, equipment, and systems; and other tangible items that help low-income households...

  2. 45 CFR 96.87 - Leveraging incentive program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... energy, or the purchase of items that help these households meet the cost of home energy, at commonly... fees, application fees, late payment charges, bulk fuel tank rental or purchase costs, and security...; space cooling devices, equipment, and systems; and other tangible items that help low-income households...

  3. 45 CFR 96.87 - Leveraging incentive program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... energy, or the purchase of items that help these households meet the cost of home energy, at commonly... fees, application fees, late payment charges, bulk fuel tank rental or purchase costs, and security...; space cooling devices, equipment, and systems; and other tangible items that help low-income households...

  4. Global Situational Awareness with Free Tools

    DTIC Science & Technology

    2015-01-15

    Client Technical Solutions • Software Engineering Measurement and Analysis • Architecture Practices • Product Line Practice • Team Software Process...multiple data sources • Snort (Snorby on Security Onion ) • Nagios • SharePoint RSS • Flow • Others • Leverage standard data formats • Keyhole Markup Language

  5. A mobile app for securely capturing and transferring clinical images to the electronic health record: description and preliminary usability study.

    PubMed

    Landman, Adam; Emani, Srinivas; Carlile, Narath; Rosenthal, David I; Semakov, Simon; Pallin, Daniel J; Poon, Eric G

    2015-01-02

    Photographs are important tools to record, track, and communicate clinical findings. Mobile devices with high-resolution cameras are now ubiquitous, giving clinicians the opportunity to capture and share images from the bedside. However, secure and efficient ways to manage and share digital images are lacking. The aim of this study is to describe the implementation of a secure application for capturing and storing clinical images in the electronic health record (EHR), and to describe initial user experiences. We developed CliniCam, a secure Apple iOS (iPhone, iPad) application that allows for user authentication, patient selection, image capture, image annotation, and storage of images as a Portable Document Format (PDF) file in the EHR. We leveraged our organization's enterprise service-oriented architecture to transmit the image file from CliniCam to our enterprise clinical data repository. There is no permanent storage of protected health information on the mobile device. CliniCam also required connection to our organization's secure WiFi network. Resident physicians from emergency medicine, internal medicine, and dermatology used CliniCam in clinical practice for one month. They were then asked to complete a survey on their experience. We analyzed the survey results using descriptive statistics. Twenty-eight physicians participated and 19/28 (68%) completed the survey. Of the respondents who used CliniCam, 89% found it useful or very useful for clinical practice and easy to use, and wanted to continue using the app. Respondents provided constructive feedback on location of the photos in the EHR, preferring to have photos embedded in (or linked to) clinical notes instead of storing them as separate PDFs within the EHR. Some users experienced difficulty with WiFi connectivity which was addressed by enhancing CliniCam to check for connectivity on launch. CliniCam was implemented successfully and found to be easy to use and useful for clinical practice. CliniCam is now available to all clinical users in our hospital, providing a secure and efficient way to capture clinical images and to insert them into the EHR. Future clinical image apps should more closely link clinical images and clinical documentation and consider enabling secure transmission over public WiFi or cellular networks.

  6. 13 CFR 107.1400 - Dividends or partnership distributions on 4 percent Preferred Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Dividends or partnership distributions on 4 percent Preferred Securities. 107.1400 Section 107.1400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...

  7. 13 CFR 107.1430 - Redeeming 4 percent Preferred Securities with proceeds of non-subsidized Debentures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Redeeming 4 percent Preferred Securities with proceeds of non-subsidized Debentures. 107.1430 Section 107.1430 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for...

  8. 24 CFR 970.19 - Disposition of property; use of proceeds.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... fair market value before the property is advertised for bid, the PHA shall have one independent... advertised for bid, HUD may accept a reasonable valuation of the property. (e) A PHA shall use net proceeds... housing; or (ii) Leveraging amounts for securing commercial enterprises, on-site in public housing...

  9. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ..., knowledge management and how best to leverage related technologies funded by other Federal agencies and by the private sector. It also advises the Under Secretary on policies, management processes, and... management; notice of Federal Advisory Committee meeting. SUMMARY: On September 13, 2012, the Department of...

  10. Using Secure Web Services to Visualize Poison Center Data for Nationwide Biosurveillance: A Case Study

    PubMed Central

    Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M. Barry; Lee, Brian; Stinn, John; Worthen, Katherine

    2010-01-01

    Objectives Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. Methods As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Results Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. Discussion This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Conclusion Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance. PMID:23569581

  11. Yet Another Adaptive Learning Management System Based on Felder and Silverman's Learning Styles and Mashup

    ERIC Educational Resources Information Center

    Chang, Yi-Hsing; Chen, Yen-Yi; Chen, Nian-Shing; Lu, You-Te; Fang, Rong-Jyue

    2016-01-01

    This study designs and implements an adaptive learning management system based on Felder and Silverman's Learning Style Model and the Mashup technology. In this system, Felder and Silverman's Learning Style model is used to assess students' learning styles, in order to provide adaptive learning to leverage learners' learning preferences.…

  12. 47 CFR 64.1190 - Preferred carrier freezes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... or social security number) and the information required in §§ 64.1190(d)(3)(ii)(A) through (D... subscriber's date of birth or social security number) and the information required in § 64.1190(d)(3)(ii)(A... or the carrier's marketing agent; must not have any financial incentive to confirm preferred carrier...

  13. 75 FR 31820 - Notice of Applications for Deregistration Under Section 8(f) of the Investment Company Act of 1940

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-04

    .... Each applicant also distributed preferred shares of Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to holders of applicants' Auction Rate Preferred Shares, DARTS, or Auction... distributed Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to the holders of...

  14. Data-Driven Software Framework for Web-Based ISS Telescience

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.

    2005-01-01

    Software that enables authorized users to monitor and control scientific payloads aboard the International Space Station (ISS) from diverse terrestrial locations equipped with Internet connections is undergoing development. This software reflects a data-driven approach to distributed operations. A Web-based software framework leverages prior developments in Java and Extensible Markup Language (XML) to create portable code and portable data, to which one can gain access via Web-browser software on almost any common computer. Open-source software is used extensively to minimize cost; the framework also accommodates enterprise-class server software to satisfy needs for high performance and security. To accommodate the diversity of ISS experiments and users, the framework emphasizes openness and extensibility. Users can take advantage of available viewer software to create their own client programs according to their particular preferences, and can upload these programs for custom processing of data, generation of views, and planning of experiments. The same software system, possibly augmented with a subset of data and additional software tools, could be used for public outreach by enabling public users to replay telescience experiments, conduct their experiments with simulated payloads, and create their own client programs and other custom software.

  15. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.

    PubMed

    de Fuentes, Jose Maria; Gonzalez-Manzano, Lorena; Ribagorda, Arturo

    2018-04-16

    Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices.

  16. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors

    PubMed Central

    Gonzalez-Manzano, Lorena; Ribagorda, Arturo

    2018-01-01

    Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices. PMID:29659542

  17. Cyber Security and Resilient Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less

  18. Secure Borders and Open Doors: Preserving Our Welcome to the World in an Age of Terrorism

    DTIC Science & Technology

    2008-01-01

    maura harty, have made efforts to leverage america’s vast academic assets for public diplomacy. however, the president’s commitment to strike the...robert gluck, walt disney parks and resorts; John hamilton, electronic data Systems corporation; matthew howe, Border trade alliance; Kelly hunt, u.S

  19. Leveraging Successful Collaborative Processes to Improve Performance Outcomes in Large-Scale Event Planning: Super Bowl, A Planned Homeland Security Event

    DTIC Science & Technology

    2010-03-01

    are turning out to be counterproductive because they are culturally anathema (Wollman, 2009). A consideration of psychological tenets by Sigmund ... Freud suggests a principle aspect of dysfunction in collaboration. He reasoned that An Ego governed by social convention and a Superego governed by

  20. Using Social Media to Support the Learning Needs of Future IS Security Professionals

    ERIC Educational Resources Information Center

    Neville, Karen; Heavin, Ciara

    2013-01-01

    The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…

  1. 77 FR 51081 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-23

    ... third party at par at a specified date, and leveraged inverse floating rate instruments (``inverse..., master demand notes, fixed and variable rate loan participations and assignments, inverse floaters, and... securities of other regulated investment companies), (2) two or more issuers that the Fund controls and which...

  2. 12 CFR Appendix C to Subpart A to... - Concentration Measures

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .../publications/handbook/LeveragedLending.pdf, but do not include all of the criteria in the handbook. • Loans or...; or 6 Earnings before interest, taxes, depreciation, and amortization. • Loans or securities that are... residential loan products that allow the borrower to defer repayment of principal or interest and includes all...

  3. 20 CFR 416.621 - What is our order of preference in selecting a representative payee for you?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What is our order of preference in selecting a representative payee for you? 416.621 Section 416.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Representative Payment § 416.621...

  4. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  5. Musical preference correlates closely to professional roles and specialties in operating room: A multicenter cross-sectional cohort study with 672 participants.

    PubMed

    Yamasaki, Alisa; Mise, Yoshihiro; Mise, Yoko; Lee, Jeffrey E; Aloia, Thomas A; Katz, Matthew H; Chang, George J; Lillemoe, Keith D; Raut, Chandrajit P; Conrad, Claudius

    2016-05-01

    It is unclear whether music preferences and perceptions in the operating room (OR) differ by demographic and professional factors and how an improved understanding of these potential differences can be leveraged to enhance team dynamics and the OR work environment. Currently, there is limited knowledge regarding the impact of music on OR team concentration and communication. This study was a multicenter, cross-sectional study of 282 preoperative patients and 390 providers-attending physicians, residents, and nurses in anesthesiology and surgery. Patient and provider responses were measured using a newly developed questionnaire. Patients who highly enjoyed music felt music alleviated stress and enhanced concentration and communication and favored use of music in the OR. The genres favored most by patients were rock music (32%), classical music (28%), and top 40 hits (26%). All providers reported a high frequency of use of music during the operation. Nurses and residents were more likely than attendings to report high enjoyment of music in the OR (P < .02). Surgeons and anesthesiologists had high median scores for enjoyment of music and low median scores for music as distraction. Anesthesiologists preferred classical and jazz/blues at lower volumes compared with surgeons, who favored top 40 music at higher noise pressure levels. Patients and providers perceived music to improve provider concentration and team communication; nurses held the most positive views. Musical preferences and perceptions of the effect of music in the OR differ by both professional status and specialty and provide insight into broader team dynamics that could be leveraged potentially to optimize the OR environment. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

    PubMed

    Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang

    2017-07-26

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.

  7. Applying your corporate compliance skills to the HIPAA security standard.

    PubMed

    Carter, P I

    2000-01-01

    Compliance programs are an increasingly hot topic among healthcare providers. These programs establish policies and procedures covering billing, referrals, gifts, confidentiality of patient records, and many other areas. The purpose is to help providers prevent and detect violations of the law. These programs are voluntary, but are also simply good business practice. Any compliance program should now incorporate the Health Insurance Portability and Accountability Act (HIPAA) security standard. Several sets of guidelines for development of compliance programs have been issued by the federal government, and each is directed toward a different type of healthcare provider. These guidelines share certain key features with the HIPAA security standard. This article examines the common areas between compliance programs and the HIPAA security standard to help you to do two very important things: (1) Leverage your resources by combining compliance with the security standard with other legal and regulatory compliance efforts, and (2) apply the lessons learned in developing your corporate compliance program to developing strategies for compliance with the HIPAA security standard.

  8. Framework for Deploying a Virtualized Computing Environment for Collaborative and Secure Data Analytics

    PubMed Central

    Meyer, Adrian; Green, Laura; Faulk, Ciearro; Galla, Stephen; Meyer, Anne-Marie

    2016-01-01

    Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information. Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training. Conclusion: A platform like SeDAP is not simply successful through technical excellence and performance. It’s adoption is dependent on a collaborative environment where researchers and users plan and evaluate the requirements of all aspects. PMID:27683665

  9. Identification - Friend or Foe? The Strategic Uses and Future Implications of the Revolutionary New ID Technologies

    DTIC Science & Technology

    2006-04-26

    technologies might offer us those means. The Means – Securing the Battlespace by Leveraging Information Dominance A suicide bomber intent on achieving his...be a watershed for netcentric warfare – the transition of information dominance from force multiplier to new capability. 67 It would serve as a prime

  10. A Surveillance Society and the Conflict State: Leveraging Ubiquitous Surveillance and Biometrics Technology to Improve Homeland Security

    DTIC Science & Technology

    2002-09-01

    customs checkpoints. In 2000, customs officials had already deployed these body scanners at JFK Airport in New York, Miami International, Chicago’s... JFK Airport in New York City and Dulles Airport in Washington, D.C. are also considering JetStream trials (Guevin, 9 Apr 2002). Although six of the

  11. The behavioralist as nutritionist: leveraging behavioral economics to improve child food choice and consumption.

    PubMed

    List, John A; Samek, Anya Savikhin

    2015-01-01

    We leverage behavioral economics to explore new approaches to tackling child food choice and consumption. Using a field experiment with >1500 children, we report several key insights. We find that incentives have large influences: in the control, 17% of children prefer the healthy snack, whereas introduction of small incentives increases take-up of the healthy snack to ∼75%. There is some evidence that the effects continue post-treatment, consistent with a model of habit formation. We find little evidence that the framing of incentives (loss vs. gain) matters. Educational messaging alone has little effect, but we observe a combined effect of messaging and incentives: together they provide an important influence on food choice. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Leverage bubble

    NASA Astrophysics Data System (ADS)

    Yan, Wanfeng; Woodard, Ryan; Sornette, Didier

    2012-01-01

    Leverage is strongly related to liquidity in a market and lack of liquidity is considered a cause and/or consequence of the recent financial crisis. A repurchase agreement is a financial instrument where a security is sold simultaneously with an agreement to buy it back at a later date. Repurchase agreement (repo) market size is a very important element in calculating the overall leverage in a financial market. Therefore, studying the behavior of repo market size can help to understand a process that can contribute to the birth of a financial crisis. We hypothesize that herding behavior among large investors led to massive over-leveraging through the use of repos, resulting in a bubble (built up over the previous years) and subsequent crash in this market in early 2008. We use the Johansen-Ledoit-Sornette (JLS) model of rational expectation bubbles and behavioral finance to study the dynamics of the repo market that led to the crash. The JLS model qualifies a bubble by the presence of characteristic patterns in the price dynamics, called log-periodic power law (LPPL) behavior. We show that there was significant LPPL behavior in the market before that crash and that the predicted range of times predicted by the model for the end of the bubble is consistent with the observations.

  13. System and method for leveraging human physiological traits to control microprocessor frequency

    DOEpatents

    Shye, Alex; Pan, Yan; Scholbrock, Benjamin; Miller, J. Scott; Memik, Gokhan; Dinda, Peter A; Dick, Robert P

    2014-03-25

    A system and method for leveraging physiological traits to control microprocessor frequency are disclosed. In some embodiments, the system and method may optimize, for example, a particular processor-based architecture based on, for example, end user satisfaction. In some embodiments, the system and method may determine, for example, whether their users are satisfied to provide higher efficiency, improved reliability, reduced power consumption, increased security, and a better user experience. The system and method may use, for example, biometric input devices to provide information about a user's physiological traits to a computer system. Biometric input devices may include, for example, one or more of the following: an eye tracker, a galvanic skin response sensor, and/or a force sensor.

  14. Lemnos interoperable security project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance inmore » a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.« less

  15. Adult Attachment Affects Neural Response to Preference-Inferring in Ambiguous Scenarios: Evidence From an fMRI Study

    PubMed Central

    Zhang, Xing; Ran, Guangming; Xu, Wenjian; Ma, Yuanxiao; Chen, Xu

    2018-01-01

    Humans are highly social animals, and the ability to cater to the preferences of other individuals is encouraged by society. Preference-inferring is an important aspect of the theory of mind (TOM). Many previous studies have shown that attachment style is closely related to TOM ability. However, little is known about the effects of adult attachment style on preferences inferring under different levels of certainty. Here, we investigated how adult attachment style affects neural activity underlying preferences inferred under different levels of certainty by using functional magnetic resonance imaging (fMRI). The fMRI results demonstrated that adult attachment influenced the activation of anterior insula (AI) and inferior parietal lobule (IPL) in response to ambiguous preference-inferring. More specifically, in the ambiguous preference condition, the avoidant attached groups exhibited a significantly enhanced activation than secure and anxious attached groups in left IPL; the anxious attached groups exhibited a significantly reduced activation secure attached group in left IPL. In addition, the anxious attached groups exhibited a significantly reduced activation than secure and avoidant attached groups in left AI. These results were also further confirmed by the subsequent PPI analysis. The results from current study suggest that, under ambiguous situations, the avoidant attached individuals show lower sensitivity to the preference of other individuals and need to invest more cognitive resources for preference-reasoning; while compared with avoidant attached group, the anxious attached individuals express high tolerance for uncertainty and a higher ToM proficiency. Results from the current study imply that differences in preference-inferring under ambiguous conditions associated with different levels of individual attachment may explain the differences in interpersonal interaction. PMID:29559932

  16. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed

    Duncan, R G; Shabot, M M

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR).

  17. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed Central

    Duncan, R. G.; Shabot, M. M.

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875

  18. Recent work on network application layer: MioNet, the virtual workplace for small businesses

    NASA Astrophysics Data System (ADS)

    Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric; Miller, Brian; Chan, Keith

    2005-11-01

    Small businesses must be extremely efficient and smartly leverage their resources, suppliers, and partners to successfully compete with larger firms. A successful small business requires a set of companies with interlocking business relationships that are dynamic and needs-based. There has been no software solution that creates a secure and flexible way to efficiently connect small business computer-based employees and partners. In this invited paper, we discuss MioNet, a secure and powerful data management platform which may provide millions of small businesses with a virtual workplace and help them to succeed.

  19. SNL Five-Year Facilities & Infrastructure Plan FY2015-2019

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cipriani, Ralph J.

    2014-12-01

    Sandia’s development vision is to provide an agile, flexible, safer, more secure, and efficient enterprise that leverages the scientific and technical capabilities of the workforce and supports national security requirements in multiple areas. Sandia’s Five-Year Facilities & Infrastructure Planning program represents a tool to budget and prioritize immediate and short-term actions from indirect funding sources in light of the bigger picture of proposed investments from direct-funded, Work for Others and other funding sources. As a complementary F&I investment program, Sandia’s indirect investment program supports incremental achievement of the development vision within a constrained resource environment.

  20. Interface Evaluation for Open System Architectures

    DTIC Science & Technology

    2014-03-01

    maker (SDM) is responsible for balancing all of the influences of the IPT when making decisions. Coalescing the IPT perspectives for a single IIM...factors are considered in IIM decisions and that decisions are consistent with the preferences of the SDM, ultimately leading to a balance of schedule... board to perform ranking and weighting determinations. Rank sum, rank exponent, rank reciprocal and ROC leverage a subjective assessment of the

  1. Who gains, who loses and how: leveraging gender and class intersections to secure health entitlements.

    PubMed

    Sen, Gita; Iyer, Aditi

    2012-06-01

    This paper argues that a focus on the middle groups in a multi-dimensional socioeconomic ordering can provide valuable insights into how different axes of advantage and disadvantage intersect with each other. It develops the elements of a framework to analyse the middle groups through an intersectional analysis, and uses it to explore how such groups leverage economic class or gender advantages to secure entitlements to treatment for long-term illness. The study draws upon household survey data on health-seeking for long-term ailments from 60 villages of Koppal district, Karnataka (India). The survey was designed to capture gender, economic class, caste, age and life stage-based inequalities in access to health care during pregnancy and for short and long-term illnesses. There were striking similarities between two important middle groups--non-poor women and poor men--in some key outcomes: their rates of non-treatment when ill, treatment discontinuation and treatment continuation, and the amounts they spent for treatment. These two groups are the obverse of each other in terms of gender and economic class advantage and disadvantage. Non-poor women have an economic advantage and a gender disadvantage, while poor men have the exact opposite. However, despite the similarities in outcomes, the processes by which gender and class advantage were leveraged by each of the groups varied sharply. Similar patterns held for the poorest men except that the class disadvantage they had to overcome was greater, and the results are modified by this. Copyright © 2011 Elsevier Ltd. All rights reserved.

  2. Gender difference in preference of specialty as a career choice among Japanese medical students.

    PubMed

    Kawamoto, Ryuichi; Ninomiya, Daisuke; Kasai, Yoshihisa; Kusunoki, Tomo; Ohtsuka, Nobuyuki; Kumagi, Teru; Abe, Masanori

    2016-11-10

    In Japan, the absolute deficiency of doctors and maldistribution of doctors by specialty is a significant problem in the Japanese health care system. The purpose of this study was to investigate the factors contributing to specialty preference in career choice among Japanese medical students. A total of 368 medical students completed the survey giving an 88.2 % response rate. The subjects comprised 141 women aged 21 ± 3 (range, 18-34) years and 227 men aged 22 ± 4 (range, 18-44) years. Binary Logistic regression analysis was performed using specialty preferences as the criterion variable and the factors in brackets as six motivational variables (e.g., Factor 1: educational experience; Factor 2: job security; Factor 3: advice from others; Factor 4: work-life balance; Factor 5: technical and research specialty; and Factor 6: personal reasons). Women significantly preferred pediatrics, obstetrics & gynecology, and psychology than the men. Men significantly preferred surgery and orthopedics than the women. For both genders, a high odds ratio (OR) of "technical & research specialty" and a low OR for "personal reasons" were associated with preference for surgery. "Technical & research specialty" was positively associated with preference for special internal medicine and negatively for pediatrics. "Work-life balance" was positively associated with preference for psychology and negatively for emergency medicine. Among the women only, "technical & research specialty" was negatively associated with preference for general medicine/family medicine and obstetrics & gynecology, and "job security" was positively associated for general medicine/family medicine and negatively for psychology. Among men only, "educational experience" and "personal reasons" were positively, and "job security" was negatively associated with preference for pediatrics. For both genders, "work-life balance" was positively associated with preference for controllable lifestyle specialties. We must acknowledge that Japanese medical students have dichotomized some motivations for their specialty preference based on gender. Systematic improvements in the working environment are necessary to solve these issues.

  3. Surveillance 101: Leveraging Network Video to Enhance School Security, Student Learning and Teacher Standards

    ERIC Educational Resources Information Center

    Nilsson, Fredrik

    2004-01-01

    In response to this growing trend, an increasing number of schools nationwide are implementing video surveillance systems in an effort to improve student and faculty safety. The United States currently has about 100,000 schools, and only 16% of these facilities have some form of video surveillance system in place. While this figure demonstrates…

  4. Moving Target Techniques: Leveraging Uncertainty for Cyber Defense

    DTIC Science & Technology

    2015-08-24

    vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic  Network   Techniques in the dynamic network domain change the properties

  5. Indonesian Maritime Security Cooperation In the Malacca Straits

    DTIC Science & Technology

    2015-06-01

    archipelagic doctrine was an “unrealistic” decision, one driven by “excessive political emotions.”51 He also argued that the Indonesian Navy was incapable...the archipelagic state doctrine was codified as Indonesian law on 18 February 48 Djalal...Therefore, the Wawasan Nusantara concept has leveraged the archipelagic state doctrine into a geopolitical concept. As a result, Indonesia asserted that

  6. DEAL annual report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Misra, Shashank

    2017-11-01

    The digital electronics at the atomic limit (DEAL) project seeks to leverage Sandia's atomic-precision fabrication capability to realize the theorized orders-of-magnitude improvement in operating voltage for tunnel field effect transistors (TFETs) compared to CMOS. Not only are low-power digital circuits a critical element of many national security systems (e.g. satellites), TFETs can perform circuit functions inaccessible to CMOS (e.g. polymorphism).

  7. 2009 Tactical Wheeled Vehicles Conference (TWV)

    DTIC Science & Technology

    2009-02-03

    Concept / Status / Joint Effort Between TARDEC & CERDEC • Leverage Military / Commercial vehicular technologies to equip tactical vehicles with a common... Vehicles Trailer (HEMAT) Heavy Equipment Transport (HETS) Container Handling Unit (CHU) Armored Security Vehicle Over 1200 systems fielded 978...Important Note: While EMIP is an excellent means to introduce new technologies to the Military , it can not change vehicle systems. Army PM’s are

  8. The Freedom to Choose Secure Attachment Relationships in Adulthood

    ERIC Educational Resources Information Center

    Keren, Einat; Mayseless, Ofra

    2013-01-01

    This study was based on the attachment-security hypothesis (H. Latty-Mann & K. E. Davis, 1996) that predicts that all individuals, regardless of attachment style, should demonstrate a preference for secure partners who are most likely to offer attachment security. It was therefore expected that with the transfer of attachment functions from…

  9. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  10. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  11. Personal value preferences, group identifications, and cultural practices of Palestinian Israelis working in close contact with Jewish Israelis.

    PubMed

    Tartakovsky, Eugene; Abu Kheit, Ayat

    2017-01-01

    The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.

  12. Leveraging Gaming Technology to Deliver Effective Training

    NASA Technical Reports Server (NTRS)

    Cimino, James D.

    2011-01-01

    The best way to engage a soldier is to present them with training content consistent with their learning preference. Blended Interactive Multimedia Instruction (IMI) can be used to leach soldiers what they need to do, how to do each step, and utilize a COTS game engine to actually practices the skills learned. Blended IMI provides an enjoyable experience for the soldier, thereby increasing retention rates and motivation while decreasing the time to subject mastery. And now mobile devices have emerged as an exciting new platform, literally placing the training into the soldier's hands. In this paper, we will discuss how we leveraged commercial game engine technology, tightly integrated with the Blended IMI, to train soldiers on both laptops and mobile devices. We will provide a recent case study of how this training is being utilized, benefits and student/instructor feedback.

  13. An Agro-Climatological Early Warning Tool Based on the Google Earth Engine to Support Regional Food Security Analysis

    NASA Astrophysics Data System (ADS)

    Landsfeld, M. F.; Daudert, B.; Friedrichs, M.; Morton, C.; Hegewisch, K.; Husak, G. J.; Funk, C. C.; Peterson, P.; Huntington, J. L.; Abatzoglou, J. T.; Verdin, J. P.; Williams, E. L.

    2015-12-01

    The Famine Early Warning Systems Network (FEWS NET) focuses on food insecurity in developing nations and provides objective, evidence based analysis to help government decision-makers and relief agencies plan for and respond to humanitarian emergencies. The Google Earth Engine (GEE) is a platform provided by Google Inc. to support scientific research and analysis of environmental data in their cloud environment. The intent is to allow scientists and independent researchers to mine massive collections of environmental data and leverage Google's vast computational resources to detect changes and monitor the Earth's surface and climate. GEE hosts an enormous amount of satellite imagery and climate archives, one of which is the Climate Hazards Group Infrared Precipitation with Stations dataset (CHIRPS). The CHIRPS dataset is land based, quasi-global (latitude 50N-50S), 0.05 degree resolution, and has a relatively long term period of record (1981-present). CHIRPS is on a continuous monthly feed into the GEE as new data fields are generated each month. This precipitation dataset is a key input for FEWS NET monitoring and forecasting efforts. FEWS NET intends to leverage the GEE in order to provide analysts and scientists with flexible, interactive tools to aid in their monitoring and research efforts. These scientists often work in bandwidth limited regions, so lightweight Internet tools and services that bypass the need for downloading massive datasets to analyze them, are preferred for their work. The GEE provides just this type of service. We present a tool designed specifically for FEWS NET scientists to be utilized interactively for investigating and monitoring for agro-climatological issues. We are able to utilize the enormous GEE computing power to generate on-the-fly statistics to calculate precipitation anomalies, z-scores, percentiles and band ratios, and allow the user to interactively select custom areas for statistical time series comparisons and predictions.

  14. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    PubMed

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  15. Policy Effects in Hyperbolic vs. Exponential Models of Consumption and Retirement

    PubMed Central

    Gustman, Alan L.; Steinmeier, Thomas L.

    2012-01-01

    This paper constructs a structural retirement model with hyperbolic preferences and uses it to estimate the effect of several potential Social Security policy changes. Estimated effects of policies are compared using two models, one with hyperbolic preferences and one with standard exponential preferences. Sophisticated hyperbolic discounters may accumulate substantial amounts of wealth for retirement. We find it is frequently difficult to distinguish empirically between models with the two types of preferences on the basis of asset accumulation paths or consumption paths around the period of retirement. Simulations suggest that, despite the much higher initial time preference rate, individuals with hyperbolic preferences may actually value a real annuity more than individuals with exponential preferences who have accumulated roughly equal amounts of assets. This appears to be especially true for individuals with relatively high time preference rates or who have low assets for whatever reason. This affects the tradeoff between current benefits and future benefits on which many of the retirement incentives of the Social Security system rest. Simulations involving increasing the early entitlement age and increasing the delayed retirement credit do not show a great deal of difference whether exponential or hyperbolic preferences are used, but simulations for eliminating the earnings test show a non-trivially greater effect when exponential preferences are used. PMID:22711946

  16. Policy Effects in Hyperbolic vs. Exponential Models of Consumption and Retirement.

    PubMed

    Gustman, Alan L; Steinmeier, Thomas L

    2012-06-01

    This paper constructs a structural retirement model with hyperbolic preferences and uses it to estimate the effect of several potential Social Security policy changes. Estimated effects of policies are compared using two models, one with hyperbolic preferences and one with standard exponential preferences. Sophisticated hyperbolic discounters may accumulate substantial amounts of wealth for retirement. We find it is frequently difficult to distinguish empirically between models with the two types of preferences on the basis of asset accumulation paths or consumption paths around the period of retirement. Simulations suggest that, despite the much higher initial time preference rate, individuals with hyperbolic preferences may actually value a real annuity more than individuals with exponential preferences who have accumulated roughly equal amounts of assets. This appears to be especially true for individuals with relatively high time preference rates or who have low assets for whatever reason. This affects the tradeoff between current benefits and future benefits on which many of the retirement incentives of the Social Security system rest.Simulations involving increasing the early entitlement age and increasing the delayed retirement credit do not show a great deal of difference whether exponential or hyperbolic preferences are used, but simulations for eliminating the earnings test show a non-trivially greater effect when exponential preferences are used.

  17. Preferred Supportive Services for Middle to Higher Income Retirement Housing.

    ERIC Educational Resources Information Center

    Regnier, Victor; Gelwicks, Louis E.

    1981-01-01

    Reports the service and facility feature preferences for retirement housing of middle and upper income elderly. Mandatory services and activities which require physical exertion were rejected, while security, convenient retail services, public transportation, and emergency health services are preferred. Underscores the importance of supportive…

  18. Achieving the four dimensions of food security for resettled refugees in Australia: A systematic review.

    PubMed

    Lawlis, Tanya; Islam, Wasima; Upton, Penney

    2018-04-01

    Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.

  19. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    PubMed

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  20. Motion/imagery secure cloud enterprise architecture analysis

    NASA Astrophysics Data System (ADS)

    DeLay, John L.

    2012-06-01

    Cloud computing with storage virtualization and new service-oriented architectures brings a new perspective to the aspect of a distributed motion imagery and persistent surveillance enterprise. Our existing research is focused mainly on content management, distributed analytics, WAN distributed cloud networking performance issues of cloud based technologies. The potential of leveraging cloud based technologies for hosting motion imagery, imagery and analytics workflows for DOD and security applications is relatively unexplored. This paper will examine technologies for managing, storing, processing and disseminating motion imagery and imagery within a distributed network environment. Finally, we propose areas for future research in the area of distributed cloud content management enterprises.

  1. Generating Southern Africa Precipitation Forecast Using the FEWS Engine, a New Application for the Google Earth Engine

    NASA Astrophysics Data System (ADS)

    Landsfeld, M. F.; Hegewisch, K.; Daudert, B.; Morton, C.; Husak, G. J.; Friedrichs, M.; Funk, C. C.; Huntington, J. L.; Abatzoglou, J. T.; Verdin, J. P.

    2016-12-01

    The Famine Early Warning Systems Network (FEWS NET) focuses on food insecurity in developing nations and provides objective, evidence-based analysis to help government decision-makers and relief agencies plan for and respond to humanitarian emergencies. The network of FEWS NET analysts and scientists require flexible, interactive tools to aid in their monitoring and research efforts. Because they often work in bandwidth-limited regions, lightweight Internet tools and services that bypass the need for downloading massive datasets are preferred for their work. To support food security analysis FEWS NET developed a custom interface for the Google Earth Engine (GEE). GEE is a platform developed by Google to support scientific analysis of environmental data in their cloud computing environment. This platform allows scientists and independent researchers to mine massive collections of environmental data, leveraging Google's vast computational resources for purposes of detecting changes and monitoring the Earth's surface and climate. GEE hosts an enormous amount of satellite imagery and climate archives, one of which is the Climate Hazards Group Infrared Precipitation with Stations dataset (CHIRPS). CHIRPS precipitation dataset is a key input for FEWS NET monitoring and forecasting efforts. In this talk we introduce the FEWS Engine interface. We present an application that highlights the utility of FEWS Engine for forecasting the upcoming seasonal precipitation of southern Africa. Specifically, the current state of ENSO is assessed and used to identify similar historical seasons. The FEWS Engine compositing tool is used to examine rainfall and other environmental data for these analog seasons. The application illustrates the unique benefits of using FEWS Engine for on-the-fly food security scenario development.

  2. Leveraging Non-Cognitive Testing to Predict Success at USMC Scout Sniper Course

    DTIC Science & Technology

    2017-03-01

    sniper, noncognitive, Grit Scale, Big Five, predictions, surveys , military training 15. NUMBER OF PAGES 81 16. PRICE CODE 17. SECURITY...11 LITERATURE REVIEW II. This chapter surveys research previously conducted regarding predictors of success for various military occupational...Course. Furthermore, this research seeks to gain insight into the correlation between “grit” and the different infantry MOSs and the correlation

  3. Data to DecisionsTerminate, Tolerate, Transfer, or Treat

    DTIC Science & Technology

    2016-07-25

    and patching, a risk-based cyber - security decision model that enables a pre- dictive capability to respond to impending cyber -attacks is needed...States. This sensitive data includes business proprietary information on key programs of record and infrastructure, including government documents at...leverage nationally. The Institute for Defense Analyses (IDA) assisted the DoD CIO in formalizing a proof of concept for cyber initiatives and

  4. Moving Target Techniques: Leveraging Uncertainty for CyberDefense

    DTIC Science & Technology

    2015-12-15

    cyberattacks is a continual struggle for system managers. Attackers often need only find one vulnerability (a flaw or bug that an attacker can exploit...additional parsing code itself could have security-relevant software bugs . Dynamic  Network   Techniques in the dynamic network domain change the...evaluation of MT techniques can benefit from a variety of evaluation approaches, including abstract analysis, modeling and simulation, test bed

  5. Clean Cities: Building Partnerships to Cut Petroleum Use in Transportation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2016-01-07

    This brochure provides an overview of the U.S. Department of Energy's (DOE's) Clean Cities program, which advances the nation's economic, environmental, and energy security by supporting local actions to cut petroleum use in transportation. At the national level, the program develops and promotes publications, tools, and other unique resources. At the local level, nearly 100 coalitions leverage these resources to create networks of stakeholders.

  6. Clean Cities: Building Partnerships to Cut Petroleum Use in Transportation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2016-01-01

    This brochure provides an overview of the U.S. Department of Energy's (DOE's) Clean Cities program, which advances the nation's economic, environmental, and energy security by supporting local actions to cut petroleum use in transportation. At the national level, the program develops and promotes publications, tools, and other unique resources. At the local level, nearly 100 coalitions leverage these resources to create networks of stakeholders.

  7. Movement and Maneuver in Deep Space: A Framework to Leverage Advanced Propulsion

    DTIC Science & Technology

    2017-04-01

    array of benefits for the current National Security Enterprise, and for this reason alone demands attention in the form of disciplined investment...discusses a theoretical organization formed and chartered to develop, test, and acquire deep space propulsion technology and includes what the...different forms , particularly via multi-mode propulsion where both chemical thrusters and electric propulsion devices operate on a common

  8. 75 FR 80878 - Self-Regulatory Organizations; The Depository Trust Company; Order Granting Approval of a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ...-capitalized'' under these guidelines, DTC must, among other things, maintain a Total Risk-Based Capital Ratio of at least 10%, a Leverage Ratio of at least 5%, and a Tier 1 Risk-Based Capital Ratio of at least 6... securities and funds which are in the custody or control of the clearing agency or for which it is...

  9. Globus | Informatics Technology for Cancer Research (ITCR)

    Cancer.gov

    Globus software services provide secure cancer research data transfer, synchronization, and sharing in distributed environments at large scale. These services can be integrated into applications and research data gateways, leveraging Globus identity management, single sign-on, search, and authorization capabilities. Globus Genomics integrates Globus with the Galaxy genomics workflow engine and Amazon Web Services to enable cancer genomics analysis that can elastically scale compute resources with demand.

  10. Department of Defense International Space Cooperation Strategy

    DTIC Science & Technology

    2017-01-01

    Secretary of Defense on .January 18. 2017. the unclassified version provides DoD’s approach for invigorating cooperation and collaboration with trusted ...Cooperation Strategy (ISCS) establishes DoD’ s approach for invigorating cooperation and collaboration with trusted allies and partners across the...collaborating with trusted allies and partners to address shared security challenges by leveraging allies’ and partners ’ capabilities to enhance space mission

  11. Novel Therapeutics for Addiction: Behavioral and Neuroeconomic Approaches

    PubMed Central

    Bickel, Warren K.; Mellis, Alexandra M.; Snider, Sarah E.; Moody, Lara; Stein, Jeffrey S.; Quisenberry, Amanda J.

    2016-01-01

    The maturing fields of behavioral- and neuro-economics provides conceptual understanding of the Competing Neurobehavioral Decision Systems theory (CNDS) and reinforcer pathology (i.e. high valuation of and excessive preference for drug reinforcers) allowing us to coherently categorize treatments into a theoretically comprehensive framework of addiction. In this chapter, we identify and clarify how existing and novel interventions can ameliorate reinforcer pathology in light of the CNDS and be leveraged to treat addiction. PMID:28018836

  12. Longitudinal Changes in Emerging Adults' Attachment Preferences for Their Mother, Father, Friends, and Romantic Partner: Focusing on the Start and End of Romantic Relationships

    ERIC Educational Resources Information Center

    Umemura, Tomo; Lacinová, Lenka; Macek, Petr; Kunnen, E. Saskia

    2017-01-01

    Only a few studies have longitudinally explored to whom emerging adults prefer to turn to seek closeness, comfort, and security (called "attachment preferences"), and previous studies on attachment preferences in emerging adults have focused only on the beginning of romantic relationships but not on the end of relationships. Czech…

  13. 75 FR 38557 - Application Nos. and Proposed Exemptions; D-11489, Morgan Stanley & Co., Incorporated; L-11609...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...; (b) The term ``Auction Rate Security'' or ``ARS'' means a security: (1) That is either a debt... Securities (ARS). The applicant describes ARS and the arrangement by which ARS are bought and sold as follows. ARS are securities (issued as debt or preferred stock) with an interest rate or dividend that is reset...

  14. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  15. 75 FR 78768 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-16

    ... Securities, as discussed herein. 2. The Applicant describes Auction Rate Securities (or ARS) and the arrangement by which ARS are bought and sold as follows. Auction Rate Securities are preferred stock or bonds... to perpetuity. ARS interest rates or dividend yields are determined and periodically reset at...

  16. 19 CFR 10.606 - Filing of claim for tariff preference level.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...-Central America-United States Free Trade Agreement Tariff Preference Level § 10.606 Filing of claim for... 19 Customs Duties 1 2010-04-01 2010-04-01 false Filing of claim for tariff preference level. 10.606 Section 10.606 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...

  17. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    PubMed

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  18. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less

  19. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management

    PubMed Central

    Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2015-01-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598

  20. Project 1721: A U.S. Army War College Assessment on Russian Strategy in Eastern Europe and Recommendations on how to Leverage Landpower to Maintain the Peace

    DTIC Science & Technology

    2017-03-01

    daunt- ing security challenges facing the United States and the North Atlantic Treaty Organization (NATO). Project 1721 would not be possible without...America’s Commitment to the North Atlantic Treaty Organization (NATO) Alliance..................................................xix Russia’s...43 Chapter 5: The North Atlantic Treaty Organization (NATO) and the New Russian Strategic Environment

  1. Instilling a Culture of Accountability at the Department of Homeland Security (DHS): Leveraging the Government Performance and Results Modernization Act (GPRA-MA) of 2010

    DTIC Science & Technology

    2013-09-01

    Estrella et al., Learning from Change: Issues and Experiences in Participatory Monitoring and Evaluation (Ottawa, ON, CAN: IDRC Books, 2000); John Denton...afford:60 59 Estrella et al., Learning from Change: Issues and Experiences in...Administrator’s Companion: A Practical Guide. CQ Press, 2010. Estrella , Marisol, with Jutta Blauert, Dindo Campilan, John Gaventa, Julian Gonsalves

  2. Leveraging Gamification Techniques and Strategies as a Means of Improving Maritime Border Security Data Collection

    DTIC Science & Technology

    2017-09-01

    well as a study of the organizational strategies, psychologies , and application techniques, point to the feasibility of gamification features toward...data collection systems and requirements, as well as a study of the organizational strategies, psychologies , and application techniques, point to the...associated with the psychological elements in use and evaluates how people think. Among research reviewed are the work of Csikszzentmihalyi on flow

  3. CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 2, March/April 2010

    DTIC Science & Technology

    2010-04-01

    SDLC phase. 4. Developing secure software depends on understanding the operational con- text in which it will be used. This con- text includes... its development . BSI leverages the Common Weakness Enumeration (CWE) and the Common Attack Pattern Enumeration and Classification (CAPEC) efforts. To...system integrators providing sys- tems (both IT and warfighting) to the Concept Refinement Technology Development System Development and

  4. Department of Defense Chemical and Biological Defense Program. Annual Report to Congress

    DTIC Science & Technology

    2008-05-01

    defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.

    Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  6. Leveraging Observations of Security Force Assistance in Afghanistan for Global Operations

    DTIC Science & Technology

    2013-01-01

    commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under...copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use . For...contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of

  7. Network Data: Statistical Theory and New Models

    DTIC Science & Technology

    2016-02-17

    SECURITY CLASSIFICATION OF: During this period of review, Bin Yu worked on many thrusts of high-dimensional statistical theory and methodologies. Her...research covered a wide range of topics in statistics including analysis and methods for spectral clustering for sparse and structured networks...2,7,8,21], sparse modeling (e.g. Lasso) [4,10,11,17,18,19], statistical guarantees for the EM algorithm [3], statistical analysis of algorithm leveraging

  8. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... face, in bold type: “This security is not a savings account or deposit and it is not insured by the... the same priority as savings accounts or a higher priority; (C) State that the security is not secured...) Except as provided in paragraph (c)(4)(ii) of this section, a savings association must use an indenture...

  9. 78 FR 17970 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-25

    ... product users and they have indicated a preference that premium pricing for mini-options match what is... market participants clarity as to the minimum pricing increments for mini-options, the filing would harmonize penny pricing between mini-options and standard options on the same security. \\3\\ See Securities...

  10. 12 CFR 390.341 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...

  11. 12 CFR 390.341 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...

  12. 12 CFR 390.341 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...

  13. USign--a security enhanced electronic consent model.

    PubMed

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  14. IT Data Mining Tool Uses in Aerospace

    NASA Technical Reports Server (NTRS)

    Monroe, Gilena A.; Freeman, Kenneth; Jones, Kevin L.

    2012-01-01

    Data mining has a broad spectrum of uses throughout the realms of aerospace and information technology. Each of these areas has useful methods for processing, distributing, and storing its corresponding data. This paper focuses on ways to leverage the data mining tools and resources used in NASA's information technology area to meet the similar data mining needs of aviation and aerospace domains. This paper details the searching, alerting, reporting, and application functionalities of the Splunk system, used by NASA's Security Operations Center (SOC), and their potential shared solutions to address aircraft and spacecraft flight and ground systems data mining requirements. This paper also touches on capacity and security requirements when addressing sizeable amounts of data across a large data infrastructure.

  15. Public perspectives on nuclear security. US national security surveys, 1993--1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, K.G.; Jenkins-Smith, H.C.

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between USmore » and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.« less

  16. Security proof of continuous-variable quantum key distribution using three coherent states

    NASA Astrophysics Data System (ADS)

    Brádler, Kamil; Weedbrook, Christian

    2018-02-01

    We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

  17. 75 FR 8128 - Citigroup Inc. and Its Affiliates (Citigroup or the Applicant); Subaru of America, Inc. (Subaru...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Securities outside of the Offer and may otherwise buy, sell, hold or seek to restructure, redeem or otherwise....1 trillion. Citigroup's consumer and corporate banking business is a global franchise encompassing... bought and sold as follows. Auction Rate Securities are securities (issued as debt or preferred stock...

  18. 76 FR 56005 - List of Office of Thrift Supervision Information Collections Transferred to the Office of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-09

    .... Subordinated Debt Securities/ Notice of Issuance of Subordinated Debt or Mandatorily Redeemable Preferred Stock. 1550-0032 Interagency Notice of Change in 1557-0272 1557-0014. Control. 1550-0035 Securities Offering... to that Transferred to the Transferred to the FRB. FRB. 1550-0062 Minimum Security Devices and 1557...

  19. Pandora’s Box: The Key to Close It

    DTIC Science & Technology

    1995-01-01

    security interests. Current nonproliferation efforts have failed to deter nations from seeclng and ootaining WJ- D . Evidenced by discoveries in Iraq and...acversary wA0 aiso Chllders 7 believes in seecing a X& D -free resolution. Preemptive strikes and defensive shields rely on the U.S. developing complete...the specter of ’nuclear winter’.. .perceptions of strategic leverage had to be dramatically adlusted." ( Moffis -,: 6-7; Nitze: 152: A paradox has

  20. Leveraging Social Media to Engage the Public in Homeland Security

    DTIC Science & Technology

    2009-09-01

    are so preoccupied that they have tunnel visions – you never really hear much from them. 10. The key is engaging the public before disaster...organized group). This is info coming from someone on their blackberry or pda. 87  New Zealand – focus is on citizen participation. Building a culture...dynamic information systems (temperature readings, blackberry or iphone network systems).  Need guidelines, a primer on how to use it effectively

  1. Review of intelligent video surveillance with single camera

    NASA Astrophysics Data System (ADS)

    Liu, Ying; Fan, Jiu-lun; Wang, DianWei

    2012-01-01

    Intelligent video surveillance has found a wide range of applications in public security. This paper describes the state-of- the-art techniques in video surveillance system with single camera. This can serve as a starting point for building practical video surveillance systems in developing regions, leveraging existing ubiquitous infrastructure. In addition, this paper discusses the gap between existing technologies and the requirements in real-world scenario, and proposes potential solutions to reduce this gap.

  2. United States National Security Interests and North Korea: Leveraging Common Interests

    DTIC Science & Technology

    2007-06-15

    Initiative ROK Republic of Korea (South Korea) SPOT State Sponsor of Terrorism list WMD Weapons of Mass Destruction WTO World Trade Organization x...Economic dependence has unwittingly tied Japan, South Korea, China, and the US together, binding these nations together by trade . On the other hand...missiles and missile technology a central part of their export trade . 10 Though solid figures are not available for the value of the missile trade , it

  3. Strategy or No Strategy: Explaining the Absence of a Danish National Security Strategy

    DTIC Science & Technology

    2013-06-13

    the very people who are trying to protect and advance Danish interests. These experiences have led me to explore and try to understand the absence...France (Jackson and Soerensen 2007). 4These effects are thoroughly described in complexity theory as in systems thinking . 8...literature fails to examine how alliance policies interact with strategic thinking , or how small states can apply strategy as a leverage to maximize

  4. A Next Generation Repository for Sharing Sensitive Network and Security Data

    DTIC Science & Technology

    2018-01-01

    submission, and 5 yearly IRB reviews d. Provided legal support for MOA data provider and host agreements and amendments e. Feedback and bug reporting...intrusion detection methods and systems , b) event- reconstruction and evidence-based insights into global trends (e.g., DDoS attacks and malware...propagation), and c) situational awareness (e.g., outage detection). We have leveraged IMPACT’s policy and legal framework to minimize any risks associated

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, David G.; Cook, Marvin A.

    This report summarizes collaborative efforts between Secure Scalable Microgrid and Korean Institute of Energy Research team members . The efforts aim to advance microgrid research and development towards the efficient utilization of networked microgrids . The collaboration resulted in the identification of experimental and real time simulation capabilities that may be leveraged for networked microgrids research, development, and demonstration . Additional research was performed to support the demonstration of control techniques within real time simulation and with hardware in the loop for DC microgrids .

  6. Leveraging success: applying Interagency Lessons learned to the Joint Air Delivered Nuclear Weapons Acquisition Process

    DTIC Science & Technology

    Effective coordination and communication between the Department of Energy (DOE) and the Department of Defense (DoD) is necessary to ensure that the... nuclear weapons stockpile remains safe, secure, and effective without nuclear testing. The science-based Stockpile Sustainment Program (SSP) is the...method used to sustain and maintain the nuclear stockpile throughout the weapons life cycle. A comprehensive review was conducted of the joint

  7. Quality and efficiency successes leveraging IT and new processes.

    PubMed

    Chaiken, Barry P; Christian, Charles E; Johnson, Liz

    2007-01-01

    Today, healthcare annually invests billions of dollars in information technology, including clinical systems, electronic medical records and interoperability platforms. While continued investment and parallel development of standards are critical to secure exponential benefits from clinical information technology, intelligent and creative redesign of processes through path innovation is necessary to deliver meaningful value. Reports from two organizations included in this report review the steps taken to reinvent clinical processes that best leverage information technology to deliver safer and more efficient care. Good Samaritan Hospital, Vincennes, Indiana, implemented electronic charting, point-of-care bar coding of medications prior to administration, and integrated clinical documentation for nursing, laboratory, radiology and pharmacy. Tenet Healthcare, during its implementation and deployment of multiple clinical systems across several hospitals, focused on planning that included team-based process redesign. In addition, Tenet constructed valuable and measurable metrics that link outcomes with its strategic goals.

  8. Cattle site preference in northeastern Oregon

    USDA-ARS?s Scientific Manuscript database

    Free-roaming beef cattle naturally gravitate to locations on the landscape that provide them food, water, shelter, and security. In mountainous environments, animals are also sensitive to land physiography, generally preferring level terrain near established trails and travel routes. Our study was...

  9. Effect of rotation preference on spontaneous alternation behavior on Y maze and introduction of a new analytical method, entropy of spontaneous alternation.

    PubMed

    Bak, Jia; Pyeon, Hae-In; Seok, Jin-I; Choi, Yun-Sik

    2017-03-01

    Y maze has been used to test spatial working memory in rodents. To this end, the percentage of spontaneous alternation has been employed. Alternation indicates sequential entries into all three arms; e.g., when an animal visits all three arms clockwise or counterclockwise sequentially, alternation is achieved. Interestingly, animals have a tendency to rotate or turn to a preferred side. Thus, when an animal has a high rotation preference, this may influence their alternation behavior. Here, we have generated a new analytical method, termed entropy of spontaneous alternation, to offset the effect of rotation preference on Y maze. To validate the entropy of spontaneous alternation, we employed a free rotation test using a cylinder and a spatial working memory test on Y maze. We identified that mice showed 65.1% rotation preference on average. Importantly, the percentage of spontaneous alternation in the high preference group (more than 70% rotation to a preferred side) was significantly higher than that in the no preference group (<55%). In addition, there was a clear correlation between rotation preference on cylinder and turning preference on Y maze. On the other hand, this potential leverage effect that arose from rotation preference disappeared when the animal behavior on Y maze was analyzed with the entropy of spontaneous alternation. Further, entropy of spontaneous alternation significantly determined the loss of spatial working memory by scopolamine administration. Combined, these data indicate that the entropy of spontaneous alternation provides higher credibility when spatial working memory is evaluated using Y maze. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. Doctors' experience with handheld computers in clinical practice: qualitative study.

    PubMed

    McAlearney, Ann Scheck; Schweikhart, Sharon B; Medow, Mitchell A

    2004-05-15

    To examine doctors' perspectives about their experiences with handheld computers in clinical practice. Qualitative study of eight focus groups consisting of doctors with diverse training and practice patterns. Six practice settings across the United States and two additional focus group sessions held at a national meeting of general internists. 54 doctors who did or did not use handheld computers. Doctors who used handheld computers in clinical practice seemed generally satisfied with them and reported diverse patterns of use. Users perceived that the devices helped them increase productivity and improve patient care. Barriers to use concerned the device itself and personal and perceptual constraints, with perceptual factors such as comfort with technology, preference for paper, and the impression that the devices are not easy to use somewhat difficult to overcome. Participants suggested that organisations can help promote handheld computers by providing advice on purchase, usage, training, and user support. Participants expressed concern about reliability and security of the device but were particularly concerned about dependency on the device and over-reliance as a substitute for clinical thinking. Doctors expect handheld computers to become more useful, and most seem interested in leveraging (getting the most value from) their use. Key opportunities with handheld computers included their use as a stepping stone to build doctors' comfort with other information technology and ehealth initiatives and providing point of care support that helps improve patient care.

  11. COVERING THE SEAMS IN U.S. NATIONAL SECURITY BY APPLYING NETWORK AND TEAM ATTRIBUTES

    DTIC Science & Technology

    2017-04-06

    Today, one such weakness is the seams that exist in the system . Organizational criteria like geography , functions, and responsibilities often create...establishment by the National Security Act of 1947, the modern U.S. national security system has evolved as a result of legislation, presidential preference...and because of changes in the U.S. and international security environments. With each evolution, the system has found ways to function in dealing

  12. 76 FR 21086 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ... other things, the issuer of the debt security must have at least one class of common or preferred equity... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64287; File No. SR-NYSE-2011-15] Self... 1401 To Modify the Initial Trading Market Value for Debt Securities April 8, 2011. Pursuant to Section...

  13. Neurobehavioral determinants of nutritional security in fetal growth-restricted individuals.

    PubMed

    Portella, André Krumel; Silveira, Patrícia Pelufo

    2014-12-01

    Fetal growth restriction results from a failure to achieve a higher growth potential and has been associated with many maternal conditions, such as chronic diseases (infections, hypertension, and some cases of diabetes and obesity), exposures (tobacco smoke, drugs), and malnutrition. This early adversity induces a series of adaptive physiological responses aimed at improving survival, but imposing increased risk for developing chronic nontransmittable diseases (obesity, type II diabetes, cardiovascular disease) in the long term. Recently, mounting evidence has shown that fetal growth impairment is related to altered feeding behavior and preferences through the life course. When living in countries undergoing nutritional transition, in which individuals experience the coexistence of underweight and overweight problems (the "double burden of malnutrition"), fetal growth-restricted children can be simultaneously growth restricted and overweight-a double burden of malnutrition at the individual level. Considering food preferences as an important aspect of nutrition security, we will summarize the putative neurobiological mechanisms at the core of the relationship between fetal growth and nutrition security over the life course and the evidence linking early life adversity to later food preferences. © 2014 New York Academy of Sciences.

  14. Protecting Sensitive Information in Directory Services Using Virtual Directories

    NASA Astrophysics Data System (ADS)

    Claycomb, William; Shin, Dongwan

    Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.

  15. 12 CFR 362.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... adjustable rate preferred stock, money market (auction rate) preferred stock, or other newly developed...) and the National Market System, i.e., the top tier of the National Association of Securities Dealers... shall be understood to be present whenever the FDIC determines there is a high probability that the...

  16. Leveraging the National Guard’s State Partnership Program in the United States’ Rebalance Toward Asia

    DTIC Science & Technology

    2013-02-14

    the NGB and Combatant Commanders seek to formalize increased funding for SPP engagements via the Future Years Defense Program...shoulder a larger portion of their security burden in the future . The challenge for American diplomats, in and out of uniform, is to reassure our...rebalance? The National Guard’s State Partnership Program (SPP) has a 20-year history of cementing alliances between America and partner nations for

  17. Leveraging Peacekeeping Partners: African Continental Progress One Sub-Region at a Time

    DTIC Science & Technology

    2012-11-01

    mass atrocities, the members of ECOWAS were effectively forced to shift their security stance from conflict management to conflict prevention. 8 In...tack with regards to their role in conflict management across the continent. Following the formation of the AU in the early 2000’s, the AU’s new...Washington, DC: GPO, June 2012). 2 Ibid., 2. 3 Williams, Paul D, “The African Union’s Conflict Management Capabilities,” Council on Foreign

  18. Independent Assessment of the Afghan National Security Forces

    DTIC Science & Technology

    2014-02-01

    of operational objectives for the ANSF that support the U.S. policy goal in Afghanistan through 2018 ; con- ducted a troop-to-task analysis of ANSF...stability in the 2015– 2018 timeframe than it is now. The insurgency has been considerably weakened since the surge of U.S. and NATO forces in 2009, but...conduct high-profile attacks in Kabul and other urban areas, and gain leverage for reconciliation negotiations. In 2016– 2018 , once the insurgency has

  19. The VIDA Framework as an Education Tool: Leveraging Volcanology Data for Educational Purposes

    NASA Astrophysics Data System (ADS)

    Faied, D.; Sanchez, A.

    2009-04-01

    The VIDA Framework as an Education Tool: Leveraging Volcanology Data for Educational Purposes Dohy Faied, Aurora Sanchez (on behalf of SSP08 VAPOR Project Team) While numerous global initiatives exist to address the potential hazards posed by volcanic eruption events and assess impacts from a civil security viewpoint, there does not yet exist a single, unified, international system of early warning and hazard tracking for eruptions. Numerous gaps exist in the risk reduction cycle, from data collection, to data processing, and finally dissemination of salient information to relevant parties. As part of the 2008 International Space University's Space Studies Program, a detailed gap analysis of the state of volcano disaster risk reduction was undertaken, and this paper presents the principal results. This gap analysis considered current sensor technologies, data processing algorithms, and utilization of data products by various international organizations. Recommendations for strategies to minimize or eliminate certain gaps are also provided. In the effort to address the gaps, a framework evolved at system level. This framework, known as VIDA, is a tool to develop user requirements for civil security in hazardous contexts, and a candidate system concept for a detailed design phase. While the basic intention of VIDA is to support disaster risk reduction efforts, there are several methods of leveraging raw science data to support education across a wide demographic. Basic geophysical data could be used to educate school children about the characteristics of volcanoes, satellite mappings could support informed growth and development of societies in at-risk areas, and raw sensor data could contribute to a wide range of university-level research projects. Satellite maps, basic geophysical data, and raw sensor data are combined and accessible in a way that allows the relationships between these data types to be explored and used in a training environment. Such a resource naturally lends itself to research efforts in the subject but also research in operational tools, system architecture, and human/machine interaction in civil protection or emergency scenarios.

  20. Performance Analysis of Cyber Security Awareness Delivery Methods

    NASA Astrophysics Data System (ADS)

    Abawajy, Jemal; Kim, Tai-Hoon

    In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.

  1. Shift scheduling model considering workload and worker’s preference for security department

    NASA Astrophysics Data System (ADS)

    Herawati, A.; Yuniartha, D. R.; Purnama, I. L. I.; Dewi, LT

    2018-04-01

    Security department operates for 24 hours and applies shift scheduling to organize its workers as well as in hotel industry. This research has been conducted to develop shift scheduling model considering the workers physical workload using rating of perceived exertion (RPE) Borg’s Scale and workers’ preference to accommodate schedule flexibility. The mathematic model is developed in integer linear programming and results optimal solution for simple problem. Resulting shift schedule of the developed model has equally distribution shift allocation among workers to balance the physical workload and give flexibility for workers in working hours arrangement.

  2. Creation of security engineering programs by the Southwest Surety Institute

    NASA Astrophysics Data System (ADS)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  3. Evolution of consumer information preferences with market maturity in solar PV adoption

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reeves, D. Cale; Rai, Varun; Margolis, Robert

    Residential adoption of solar photovoltaics (PV) is spreading rapidly, supported by policy initiatives at the federal, state, and local levels. Potential adopters navigate increasingly complex decision-making landscapes in their path to adoption. Much is known about the individual-level drivers of solar PV diffusion that steer adopters through this process, but relatively little is known about the evolution of these drivers as solar PV markets mature. By understanding the evolution of emerging solar PV markets over time, stakeholders in the diffusion of solar PV can increase policy effectiveness and reduce costs. This analysis uses survey data to compare two adjacent marketsmore » across a range of relevant characteristics, then models changes in the importance of local vs cosmopolitan information sources by combining theory relating market maturity to adopter behavior with event-history techniques. In younger markets, earlier, innovative adoptions that are tied to a preference for cosmopolitan information sources are more prevalent than expected, suggesting a frustrated demand for solar PV that segues into adoptions fueled by local information preferences contemporary with similar adoptions in older markets. Furthermore, the analysis concludes with policy recommendations to leverage changing consumer information preferences as markets mature.« less

  4. Evolution of consumer information preferences with market maturity in solar PV adoption

    DOE PAGES

    Reeves, D. Cale; Rai, Varun; Margolis, Robert

    2017-07-04

    Residential adoption of solar photovoltaics (PV) is spreading rapidly, supported by policy initiatives at the federal, state, and local levels. Potential adopters navigate increasingly complex decision-making landscapes in their path to adoption. Much is known about the individual-level drivers of solar PV diffusion that steer adopters through this process, but relatively little is known about the evolution of these drivers as solar PV markets mature. By understanding the evolution of emerging solar PV markets over time, stakeholders in the diffusion of solar PV can increase policy effectiveness and reduce costs. This analysis uses survey data to compare two adjacent marketsmore » across a range of relevant characteristics, then models changes in the importance of local vs cosmopolitan information sources by combining theory relating market maturity to adopter behavior with event-history techniques. In younger markets, earlier, innovative adoptions that are tied to a preference for cosmopolitan information sources are more prevalent than expected, suggesting a frustrated demand for solar PV that segues into adoptions fueled by local information preferences contemporary with similar adoptions in older markets. Furthermore, the analysis concludes with policy recommendations to leverage changing consumer information preferences as markets mature.« less

  5. Evolution of consumer information preferences with market maturity in solar PV adoption

    NASA Astrophysics Data System (ADS)

    Cale Reeves, D.; Rai, Varun; Margolis, Robert

    2017-07-01

    Residential adoption of solar photovoltaics (PV) is spreading rapidly, supported by policy initiatives at the federal, state, and local levels. Potential adopters navigate increasingly complex decision-making landscapes in their path to adoption. Much is known about the individual-level drivers of solar PV diffusion that steer adopters through this process, but relatively little is known about the evolution of these drivers as solar PV markets mature. By understanding the evolution of emerging solar PV markets over time, stakeholders in the diffusion of solar PV can increase policy effectiveness and reduce costs. This analysis uses survey data to compare two adjacent markets across a range of relevant characteristics, then models changes in the importance of local vs cosmopolitan information sources by combining theory relating market maturity to adopter behavior with event-history techniques. In younger markets, earlier, innovative adoptions that are tied to a preference for cosmopolitan information sources are more prevalent than expected, suggesting a frustrated demand for solar PV that segues into adoptions fueled by local information preferences contemporary with similar adoptions in older markets. The analysis concludes with policy recommendations to leverage changing consumer information preferences as markets mature.

  6. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  7. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  8. Reasoning about Probabilistic Security Using Task-PIOAs

    NASA Astrophysics Data System (ADS)

    Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto

    Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.

  9. Strengthening global health security by embedding the International Health Regulations requirements into national health systems

    PubMed Central

    Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin

    2018-01-01

    The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas. PMID:29379650

  10. Strengthening global health security by embedding the International Health Regulations requirements into national health systems.

    PubMed

    Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin

    2018-01-01

    The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.

  11. Making Ends Meet After Prison

    PubMed Central

    Harding, David J.; Wyse, Jessica J.B.; Dobson, Cheyney; Morenoff, Jeffrey D.

    2014-01-01

    Former prisoners are at high risk of economic insecurity due to the challenges they face in finding employment and to the difficulties of securing and maintaining public assistance while incarcerated. This study examines the processes through which former prisoners attain economic security, examining how they meet basic material needs and achieve upward mobility over time. It draws on unique qualitative data from in-depth, unstructured interviews with a sample of former prisoners followed over a two to three year period to assess how subjects draw upon a combination of employment, social supports, and public benefits to make ends meet. Findings reveal considerable struggle among our subjects to meet even minimal needs for shelter and food, although economic security and stability could be attained when employment or public benefits were coupled with familial social support. Sustained economic security was rarely achieved absent either strong social support or access to long-term public benefits. However, a select few were able to leverage material support and social networks into trajectories of upward mobility and economic independence. Policy implications are discussed. PMID:25584015

  12. An evaluation of authentication methods for smartphone based on users’ preferences

    NASA Astrophysics Data System (ADS)

    Sari, P. K.; Ratnasari, G. S.; Prasetio, A.

    2016-04-01

    This study discusses about smartphone screen lock preferences using some types of authentication methods. The purpose is to determine the user behaviours based on the perceived security and convenience, as well as the preferences for different types of authentication methods. Variables used are the considerations for locking the screens and the types of authentication methods. The population consists of the smartphone users with the total samples of 400 respondents within a nonprobability sampling method. Data analysis method used is the descriptive analysis. The results showed that the convenience factor is still the major consideration for locking the smartphone screens. Majority of the users chose the pattern unlock as the most convenient method to use. Meanwhile, fingerprint unlock becomes the most secure method in the users’ perceptions and as the method chosen to be used in the future.

  13. Gender Differences in Work Values: Perpetuating the Myth.

    ERIC Educational Resources Information Center

    Rowe, Reba; Snizek, William E.

    1995-01-01

    General Social Survey data from 1973-90 were analyzed to identify the work value preferences of 7,436 full-time workers (income, security, working hours, advancement opportunities, accomplishment). No support was found for differences between men's and women's work values. Preferences depended more on age, education, and occupational prestige. (SK)

  14. Games for Training: Leveraging Commercial Off the Shelf Multiplayer Gaming Software for Infantry Squad Collective Training

    DTIC Science & Technology

    2005-09-01

    squad training, team training, dismounted training, video games , computer games, multiplayer games. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF...Multiplayer - mode of play for computer and video games in which multiple people can play the same game at the same time (Wikipedia, 2005) D...that “improvements in 3-D image generation on the PC and the speed of the internet” have increased the military’s interest in the use of video games as

  15. An Algorithm to Identify and Localize Suitable Dock Locations from 3-D LiDAR Scans

    DTIC Science & Technology

    2013-05-10

    Locations from 3-D LiDAR Scans 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Graves, Mitchell Robert 5d. PROJECT NUMBER...Ranging ( LiDAR ) scans. A LiDAR sensor is a sensor that collects range images from a rotating array of vertically aligned lasers. Our solution leverages...Algorithm, Dock, Locations, Point Clouds, LiDAR , Identify 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a

  16. Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa

    DTIC Science & Technology

    2009-01-05

    conflict. For more information on the Phase Zero strategy and TSC, also known as peacetime engagement, see General Charles Wald , “The Phase Zero...Principal Deputy Under Secretary Henry From the Pentagon,” February 7, 2007. 16 See, for example, Lisa Schirch and Aaron Kishbaugh, “Leveraging ‘3D...significant climate change.” Testimony of General Charles Wald , Member, Military Advisory Board, at a hearing on Climate Change and National Security

  17. Securing Public Safety Vehicles: Reducing Vulnerabilities by Leveraging Smart Technology and Design Strategies

    DTIC Science & Technology

    2013-12-01

    Protective Equipment Sizing and Design ,” Human Factors: The Journal of the Human Factors and Ergonomics Society 55, no. 1 (2013): 6–35; Hsiao...firefighters. The information will be used to improve apparatus design , revise NFPA 1901 Standard for Automotive Fire Apparatus, and improve cab, seat ... Design .” Human Factors: The Journal of the Human Factors and Ergonomics Society 55, no. 1 (2013): 6–35. ———. Sizing Firefighters and Fire Apparatus

  18. CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 6, November/December 2013

    DTIC Science & Technology

    2013-12-01

    requirements during sprint planning. Automated scanning, which includes automated code-review tools, allows the expert to monitor the system... sprint . This enables the validator to leverage the test results for formal validation and verification, and perform a shortened “hybrid” style of IV&V...per SPRINT (1-4 weeks) 1 week 1 Month Up to four months Ø Deliverable product to user Ø Security posture assessed Ø Accredited to field/operate

  19. Leveraging to Win: The Marine Corps Confronts the Intelligence Challenges of Social Media Versus Operations Security

    DTIC Science & Technology

    2011-01-01

    infonnation on the use of social media, . social networking sites were searched to review online forwns. These forums assisted in identifying some of the...tools such as social networking sites , social media, user-generated contentj social softwC\\.fe, email, instant messaging, and discussion forums (e.g...social media on official computers. The ban was put into effect because, as was stated, "[social media and social networking sites ] in general are a

  20. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor

    DTIC Science & Technology

    2013-08-01

    system (OS). HyperCheck leverages the CPU System Management Mode ( SMM ), present in x86 systems, to securely generate and transmit the full state of the...HyperCheck harnesses the CPU System Management Mode ( SMM ) which is present in all x86 commodity systems to create a snapshot view of the current state of the...protect the software above it. Our assumptions are that the attacker does not have physical access to the machine and that the SMM BIOS is locked and

  1. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  2. International quality improvement initiatives.

    PubMed

    Hickey, Patricia A; Connor, Jean A; Cherian, Kotturathu M; Jenkins, Kathy; Doherty, Kaitlin; Zhang, Haibo; Gaies, Michael; Pasquali, Sara; Tabbutt, Sarah; St Louis, James D; Sarris, George E; Kurosawa, Hiromi; Jonas, Richard A; Sandoval, Nestor; Tchervenkov, Christo I; Jacobs, Jeffery P; Stellin, Giovanni; Kirklin, James K; Garg, Rajnish; Vener, David F

    2017-12-01

    Across the globe, the implementation of quality improvement science and collaborative learning has positively affected the care and outcomes for children born with CHD. These efforts have advanced the collective expertise and performance of inter-professional healthcare teams. In this review, we highlight selected quality improvement initiatives and strategies impacting the field of cardiovascular care and describe implications for future practice and research. The continued leveraging of technology, commitment to data transparency, focus on team-based practice, and recognition of cultural norms and preferences ensure the success of sustainable models of global collaboration.

  3. Affinity proteomics to study endogenous protein complexes: Pointers, pitfalls, preferences and perspectives

    PubMed Central

    LaCava, John; Molloy, Kelly R.; Taylor, Martin S.; Domanski, Michal; Chait, Brian T.; Rout, Michael P.

    2015-01-01

    Dissecting and studying cellular systems requires the ability to specifically isolate distinct proteins along with the co-assembled constituents of their associated complexes. Affinity capture techniques leverage high affinity, high specificity reagents to target and capture proteins of interest along with specifically associated proteins from cell extracts. Affinity capture coupled to mass spectrometry (MS)-based proteomic analyses has enabled the isolation and characterization of a wide range of endogenous protein complexes. Here, we outline effective procedures for the affinity capture of protein complexes, highlighting best practices and common pitfalls. PMID:25757543

  4. Leveraging Python Interoperability Tools to Improve Sapphire's Usability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gezahegne, A; Love, N S

    2007-12-10

    The Sapphire project at the Center for Applied Scientific Computing (CASC) develops and applies an extensive set of data mining algorithms for the analysis of large data sets. Sapphire's algorithms are currently available as a set of C++ libraries. However many users prefer higher level scripting languages such as Python for their ease of use and flexibility. In this report, we evaluate four interoperability tools for the purpose of wrapping Sapphire's core functionality with Python. Exposing Sapphire's functionality through a Python interface would increase its usability and connect its algorithms to existing Python tools.

  5. 24 CFR 884.118 - Responsibilities of the owner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Responsibilities of the owner. (a) The Owner shall be responsible (subject to post-review or audit by HUD or the... Federal selection preferences in accordance with 24 CFR part 5, obtaining and verifying Social Security... this title; obtaining and verifying Social Security Numbers submitted by participants, as provided by...

  6. 24 CFR 884.118 - Responsibilities of the owner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Responsibilities of the owner. (a) The Owner shall be responsible (subject to post-review or audit by HUD or the... Federal selection preferences in accordance with 24 CFR part 5, obtaining and verifying Social Security... this title; obtaining and verifying Social Security Numbers submitted by participants, as provided by...

  7. Patient empowerment by the means of citizen-managed Electronic Health Records: web 2.0 health digital identity scenarios.

    PubMed

    Falcão-Reis, Filipa; Correia, Manuel E

    2010-01-01

    With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.

  8. A Hybrid Authentication and Authorization Process for Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less

  9. Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD

    NASA Astrophysics Data System (ADS)

    Länger, Thomas; Lenhart, Gaby

    2009-05-01

    In recent years, quantum key distribution (QKD) has been the object of intensive research activities and of rapid progress, and it is now developing into a competitive industry with commercial products. Once QKD systems are transferred from the controlled environment of physical laboratories into a real-world environment for practical use, a number of practical security, compatibility and connectivity issues need to be resolved. In particular, comprehensive security evaluation and watertight security proofs need to be addressed to increase trust in QKD. System interoperability with existing infrastructures and applications as well as conformance with specific user requirements have to be assured. Finding common solutions to these problems involving all actors can provide an advantage for the commercialization of QKD as well as for further technological development. The ETSI industry specification group for QKD (ISG-QKD) offers a forum for creating such universally accepted standards and will promote significant leverage effects on coordination, cooperation and convergence in research, technical development and business application of QKD.

  10. Leveraging multi-channel x-ray detector technology to improve quality metrics for industrial and security applications

    NASA Astrophysics Data System (ADS)

    Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.

    2017-09-01

    Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.

  11. Nutritional strategies of Latino farmworker families with preschool children: Identifying leverage points for obesity prevention

    PubMed Central

    Quandt, Sara A.; Grzywacz, Joseph G.; Trejo, Grisel; Arcury, Thomas A.

    2014-01-01

    Obesity and overweight are significant problems for children in the US, particularly for Hispanic children. This paper focuses on the children in families of immigrant Hispanic farmworkers, as farm work is the portal though which many immigrants come to the US. This paper (1) describes a model of the nutritional strategies of child feeding in farmworker families; and (2) uses this model to identify leverage points for efforts to improve the nutritional status of these children. In-depth interviews were conducted in Spanish with 33 mothers of 2–5 year old children in farmworker families recruited in North Carolina in 2010–2011. The purposive sample was balanced by farmworker status (migrant or seasonal), child age, and child gender. Interviews were transcribed and translated. Multiple coders and a team approach to analysis were used. Nutritional strategies centered on domains of procuring food, using food, and maintaining food security. The content of these domains reflected environmental factors (e.g., rural isolation, shared housing), contextual factors (e.g., beliefs about appropriate food, parenting style), and available resources (e.g., income, government programs). Environmental isolation and limited access to resources decrease the amount and diversity of household food supplies. Parental actions (parental sacrifices, reduced dietary variety) attempt to buffer children. Use of government food sources is valuable for eligible families. Leverage points are suggested that would change nutritional strategy components and lower the risk of overweight and obesity. Further prospective research is needed to verify the nutritional strategy identified and to test the ability of leverage points to prevent childhood obesity in this vulnerable population. PMID:25462607

  12. The impact of socio-technical communication styles on the diversity and innovation potential of global science collaboratories

    DOE PAGES

    Ozmen, Ozgur; Yilmaz, Levent; Smith, Jeffrey

    2016-02-09

    Emerging cyber-infrastructure tools are enabling scientists to transparently co-develop, share, and communicate about real-time diverse forms of knowledge artifacts. In these environments, communication preferences of scientists are posited as an important factor affecting innovation capacity and robustness of social and knowledge network structures. Scientific knowledge creation in such communities is called global participatory science (GPS). Recently, using agent-based modeling and collective action theory as a basis, a complex adaptive social communication network model (CollectiveInnoSim) is implemented. This work leverages CollectiveInnoSim implementing communication preferences of scientists. Social network metrics and knowledge production patterns are used as proxy metrics to infer innovationmore » potential of emergent knowledge and collaboration networks. The objective is to present the underlying communication dynamics of GPS in a form of computational model and delineate the impacts of various communication preferences of scientists on innovation potential of the collaboration network. Ultimately, the insight gained can help policy-makers to design GPS environments and promote innovation.« less

  13. The impact of socio-technical communication styles on the diversity and innovation potential of global science collaboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ozmen, Ozgur; Yilmaz, Levent; Smith, Jeffrey

    Emerging cyber-infrastructure tools are enabling scientists to transparently co-develop, share, and communicate about real-time diverse forms of knowledge artifacts. In these environments, communication preferences of scientists are posited as an important factor affecting innovation capacity and robustness of social and knowledge network structures. Scientific knowledge creation in such communities is called global participatory science (GPS). Recently, using agent-based modeling and collective action theory as a basis, a complex adaptive social communication network model (CollectiveInnoSim) is implemented. This work leverages CollectiveInnoSim implementing communication preferences of scientists. Social network metrics and knowledge production patterns are used as proxy metrics to infer innovationmore » potential of emergent knowledge and collaboration networks. The objective is to present the underlying communication dynamics of GPS in a form of computational model and delineate the impacts of various communication preferences of scientists on innovation potential of the collaboration network. Ultimately, the insight gained can help policy-makers to design GPS environments and promote innovation.« less

  14. The Modern Research Data Portal: A Design Pattern for Networked, Data-Intensive Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chard, Kyle; Dart, Eli; Foster, Ian

    Here we describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based data portal to achieve orders-of-magnitude increases in data transfer performance, support new deployment architectures that decouple control logic from data storage, and reduce development and operations costs. We introduce the design pattern; explain how it leverages high-performance Science DMZs and cloud-based data management services; review representative examples at research laboratories and universities, including both experimental facilities and supercomputer sites; describe howmore » to leverage Python APIs for authentication, authorization, data transfer, and data sharing; and use coding examples to demonstrate how these APIs can be used to implement a range of research data portal capabilities. Sample code at a companion web site, https://docs.globus.org/mrdp, provides application skeletons that readers can adapt to realize their own research data portals.« less

  15. The Modern Research Data Portal: a design pattern for networked, data-intensive science

    DOE PAGES

    Chard, Kyle; Dart, Eli; Foster, Ian; ...

    2018-01-15

    We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. Here, we capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based data portal to achieve orders-of-magnitude increases in data transfer performance, support new deployment architectures that decouple control logic from data storage, and reduce development and operations costs. We introduce the design pattern; explain how it leverages high-performance data enclaves and cloud-based data management services; review representative examples at research laboratories and universities, including both experimental facilities and supercomputer sites; describe howmore » to leverage Python APIs for authentication, authorization, data transfer, and data sharing; and use coding examples to demonstrate how these APIs can be used to implement a range of research data portal capabilities. Sample code at a companion web site,https://docs.globus.org/mrdp, provides application skeletons that readers can adapt to realize their own research data portals.« less

  16. The Modern Research Data Portal: a design pattern for networked, data-intensive science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chard, Kyle; Dart, Eli; Foster, Ian

    We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. Here, we capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based data portal to achieve orders-of-magnitude increases in data transfer performance, support new deployment architectures that decouple control logic from data storage, and reduce development and operations costs. We introduce the design pattern; explain how it leverages high-performance data enclaves and cloud-based data management services; review representative examples at research laboratories and universities, including both experimental facilities and supercomputer sites; describe howmore » to leverage Python APIs for authentication, authorization, data transfer, and data sharing; and use coding examples to demonstrate how these APIs can be used to implement a range of research data portal capabilities. Sample code at a companion web site,https://docs.globus.org/mrdp, provides application skeletons that readers can adapt to realize their own research data portals.« less

  17. Leveraging Administrative Data for Program Evaluations: A Method for Linking Data Sets Without Unique Identifiers.

    PubMed

    Lorden, Andrea L; Radcliff, Tiffany A; Jiang, Luohua; Horel, Scott A; Smith, Matthew L; Lorig, Kate; Howell, Benjamin L; Whitelaw, Nancy; Ory, Marcia

    2016-06-01

    In community-based wellness programs, Social Security Numbers (SSNs) are rarely collected to encourage participation and protect participant privacy. One measure of program effectiveness includes changes in health care utilization. For the 65 and over population, health care utilization is captured in Medicare administrative claims data. Therefore, methods as described in this article for linking participant information to administrative data are useful for program evaluations where unique identifiers such as SSN are not available. Following fuzzy matching methodologies, participant information from the National Study of the Chronic Disease Self-Management Program was linked to Medicare administrative data. Linking variables included participant name, date of birth, gender, address, and ZIP code. Seventy-eight percent of participants were linked to their Medicare claims data. Linking program participant information to Medicare administrative data where unique identifiers are not available provides researchers with the ability to leverage claims data to better understand program effects. © The Author(s) 2014.

  18. FACE-IT. A Science Gateway for Food Security Research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Montella, Raffaele; Kelly, David; Xiong, Wei

    Progress in sustainability science is hindered by challenges in creating and managing complex data acquisition, processing, simulation, post-processing, and intercomparison pipelines. To address these challenges, we developed the Framework to Advance Climate, Economic, and Impact Investigations with Information Technology (FACE-IT) for crop and climate impact assessments. This integrated data processing and simulation framework enables data ingest from geospatial archives; data regridding, aggregation, and other processing prior to simulation; large-scale climate impact simulations with agricultural and other models, leveraging high-performance and cloud computing; and post-processing to produce aggregated yields and ensemble variables needed for statistics, for model intercomparison, and to connectmore » biophysical models to global and regional economic models. FACE-IT leverages the capabilities of the Globus Galaxies platform to enable the capture of workflows and outputs in well-defined, reusable, and comparable forms. We describe FACE-IT and applications within the Agricultural Model Intercomparison and Improvement Project and the Center for Robust Decision-making on Climate and Energy Policy.« less

  19. 77 FR 20281 - Designation of Product Categories for Federal Procurement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-04

    ... Security and Rural Investment Act of 2002, as amended by the Food, Conservation, and Energy Act of 2008.... Information regarding the Federal biobased preferred procurement program (one part of the BioPreferred Program... of 2002 (FSRIA), as amended by the Food, Conservation, and Energy Act of 2008 (FCEA), 7 U.S.C. 8102...

  20. Perception of Summer Cooperative Graduates on Employers Generic Skills Preference, Haramaya University, Ethiopia

    ERIC Educational Resources Information Center

    Aman, Mohammed; Sitotaw, Melese

    2014-01-01

    Meeting the needs of employers and equipping graduates with employability skills are considered as among the shared responsibilities of Universities and different organizations. This study intends to assess the perception of summer cooperative graduates on their employers' preference for generic skills to secure employment, based on their…

  1. 19 CFR 10.778 - Filing of claim for tariff preference level.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Filing of claim for tariff preference level. 10.778 Section 10.778 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Morocco...

  2. 19 CFR 10.881 - Filing of claim for tariff preference level.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...

  3. 19 CFR 10.881 - Filing of claim for tariff preference level.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...

  4. 19 CFR 10.881 - Filing of claim for tariff preference level.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...

  5. 19 CFR 10.881 - Filing of claim for tariff preference level.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...

  6. US public perspectives on security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American publicmore » in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.« less

  7. Leveraging electronic health records for clinical research.

    PubMed

    Raman, Sudha R; Curtis, Lesley H; Temple, Robert; Andersson, Tomas; Ezekowitz, Justin; Ford, Ian; James, Stefan; Marsolo, Keith; Mirhaji, Parsa; Rocca, Mitra; Rothman, Russell L; Sethuraman, Barathi; Stockbridge, Norman; Terry, Sharon; Wasserman, Scott M; Peterson, Eric D; Hernandez, Adrian F

    2018-04-30

    Electronic health records (EHRs) can be a major tool in the quest to decrease costs and timelines of clinical trial research, generate better evidence for clinical decision making, and advance health care. Over the past decade, EHRs have increasingly offered opportunities to speed up, streamline, and enhance clinical research. EHRs offer a wide range of possible uses in clinical trials, including assisting with prestudy feasibility assessment, patient recruitment, and data capture in care delivery. To fully appreciate these opportunities, health care stakeholders must come together to face critical challenges in leveraging EHR data, including data quality/completeness, information security, stakeholder engagement, and increasing the scale of research infrastructure and related governance. Leaders from academia, government, industry, and professional societies representing patient, provider, researcher, industry, and regulator perspectives convened the Leveraging EHR for Clinical Research Now! Think Tank in Washington, DC (February 18-19, 2016), to identify barriers to using EHRs in clinical research and to generate potential solutions. Think tank members identified a broad range of issues surrounding the use of EHRs in research and proposed a variety of solutions. Recognizing the challenges, the participants identified the urgent need to look more deeply at previous efforts to use these data, share lessons learned, and develop a multidisciplinary agenda for best practices for using EHRs in clinical research. We report the proceedings from this think tank meeting in the following paper. Copyright © 2018 Elsevier, Inc. All rights reserved.

  8. 78 FR 17738 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ... customer bases of potential product users have indicated a preference that premium pricing for Mini Options... market participants clarity as to the minimum pricing increments for Mini Options, the filing would harmonize penny pricing between Mini Options and standard options on the same security. \\4\\ See Securities...

  9. 7 CFR 765.303 - Use of proceeds from chattel security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... fed to the borrower's livestock, if this is preferable to marketing, provided the Agency obtains a lien or assignment on the livestock, and livestock products, at least equal to the lien on the crops...) Security may be consumed as follows: (i) Livestock may be used by the borrower's family for subsistence...

  10. A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry

    ERIC Educational Resources Information Center

    Stalker, Joshua Dylan

    2012-01-01

    The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…

  11. Doctors' experience with handheld computers in clinical practice: qualitative study

    PubMed Central

    McAlearney, Ann Scheck; Schweikhart, Sharon B; Medow, Mitchell A

    2004-01-01

    Objective To examine doctors' perspectives about their experiences with handheld computers in clinical practice. Design Qualitative study of eight focus groups consisting of doctors with diverse training and practice patterns. Setting Six practice settings across the United States and two additional focus group sessions held at a national meeting of general internists. Participants 54 doctors who did or did not use handheld computers. Results Doctors who used handheld computers in clinical practice seemed generally satisfied with them and reported diverse patterns of use. Users perceived that the devices helped them increase productivity and improve patient care. Barriers to use concerned the device itself and personal and perceptual constraints, with perceptual factors such as comfort with technology, preference for paper, and the impression that the devices are not easy to use somewhat difficult to overcome. Participants suggested that organisations can help promote handheld computers by providing advice on purchase, usage, training, and user support. Participants expressed concern about reliability and security of the device but were particularly concerned about dependency on the device and over-reliance as a substitute for clinical thinking. Conclusions Doctors expect handheld computers to become more useful, and most seem interested in leveraging (getting the most value from) their use. Key opportunities with handheld computers included their use as a stepping stone to build doctors' comfort with other information technology and ehealth initiatives and providing point of care support that helps improve patient care. PMID:15142920

  12. Network-Centric Quantum Communications

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2014-03-01

    Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.

  13. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  14. 78 FR 27269 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ... marketing fees.\\3\\ The increased order flow provided by these Directed Orders benefits Exchange market... Schedule to allow PMMs to access marketing fees generated from Preferred Orders (its equivalent of Directed... (``Preferred Market-Maker'' or ``PMM'') on an order sent to CBOE.\\6\\ CBOE allows the PMM to collect marketing...

  15. 20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...

  16. 20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...

  17. 20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...

  18. 20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...

  19. 20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...

  20. Evaluating options for balancing the water-electricity nexus in California: part 1--securing water availability.

    PubMed

    Tarroja, Brian; AghaKouchak, Amir; Sobhani, Reza; Feldman, David; Jiang, Sunny; Samuelsen, Scott

    2014-11-01

    The technical potential and effectiveness of different water supply options for securing water availability in a large-scale, interconnected water supply system under historical and climate-change augmented inflow and demand conditions were compared. Part 1 of the study focused on determining the scale of the options required to secure water availability and compared the effectiveness of different options. A spatially and temporally resolved model of California's major surface reservoirs was developed, and its sensitivity to urban water conservation, desalination, and water reuse was examined. Potential capacities of the different options were determined. Under historical (baseline) hydrology conditions, many individual options were found to be capable of securing water availability alone. Under climate change augment conditions, a portfolio approach was necessary. The water savings from many individual options other than desalination were insufficient in the latter, however, relying on seawater desalination alone requires extreme capacity installations which have energy, brine disposal, management, and cost implications. The importance of identifying and utilizing points of leverage in the system for choosing where to deploy different options is also demonstrated. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less

  2. Simulation Data Management - Requirements and Design Specification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clay, Robert L.; Friedman-Hill, Ernest J.; Gibson, Marcus J.

    Simulation Data Management (SDM), the ability to securely organize, archive, and share analysis models and the artifacts used to create them, is a fundamental requirement for modern engineering analysis based on computational simulation. We have worked separately to provide secure, network SDM services to engineers and scientists at our respective laboratories for over a decade. We propose to leverage our experience and lessons learned to help develop and deploy a next-generation SDM service as part of a multi-laboratory team. This service will be portable across multiple sites and platforms, and will be accessible via a range of command-line tools andmore » well-documented APIs. In this document, we’ll review our high-level and low-level requirements for such a system, review one existing system, and briefly discuss our proposed implementation.« less

  3. On a simulation study for reliable and secured smart grid communications

    NASA Astrophysics Data System (ADS)

    Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei

    2015-05-01

    Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.

  4. 78 FR 31472 - Medicare and Medicaid Programs; Survey, Certification and Enforcement Procedures; Extension of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...). These revisions would implement certain provisions under the Medicare Improvements for Patients and... with the Social Security Act. The comment period for the proposed rule, which would have ended on June... Stop C4-26-05, 7500 Security Boulevard, Baltimore, MD 21244-1850. 4. By hand or courier. If you prefer...

  5. Unified Facilities Criteria (UFC) Design Guide. Army Reserve Facilities

    DTIC Science & Technology

    2010-02-01

    Laser ...Including Change 3, 1 February 2010 42 use. 3-2.3.1.8 Provide painted striping in POV and MEP areas, and elsewhere as needed. 3-2.3.2 Curb and Gutter...have to meet physical security requirements for security fencing. Most Tenants prefer that fences are located in a strip of rock mulch or

  6. The use of specialty training to retain doctors in Malawi: A discrete choice experiment.

    PubMed

    Mandeville, Kate L; Ulaya, Godwin; Lagarde, Mylène; Muula, Adamson S; Dzowela, Titha; Hanson, Kara

    2016-11-01

    Emigration has contributed to a shortage of doctors in many sub-Saharan African countries. Specialty training is highly valued by doctors and a potential tool for retention. Yet not all types of training may be valued equally. In the first study to examine preferences for postgraduate training in depth, we carried out a discrete choice experiment as part of a cross-sectional survey of all Malawian doctors within seven years of graduation and not yet in specialty training. Over August 2012 to March 2013, 148 doctors took part out of 153 eligible in Malawi. Despite evidence that specialty training is highly sought after, Malawian junior doctors would not accept all types of training. Doctors preferred timely training outside of Malawi in core specialties (internal medicine, general surgery, paediatrics, obstetrics & gynaecology). Specialty preferences are particularly strong, with most junior doctors requiring nearly double their monthly salary to accept training all in Malawi and over six-fold to accept training in ophthalmology (representing a bundle of unpopular but priority specialties). In contrast, the location of work before training did not significantly influence most doctors' choices when guaranteed specialty training. Using a latent class model, we identified four subgroups of junior doctors with distinct preferences. Policy simulations showed that these preferences could be leveraged by policymakers to improve retention in exchange for guaranteed specialty training, however incentivising the uptake of training in priority specialties will only be effective in those with more flexible preferences. These results indicate that indiscriminate expansion of postgraduate training to slow emigration of doctors from sub-Saharan African countries may not be effective unless doctors' preferences are taken into account. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wertsching, Alan Kevin; Trantor, Troy Joseph; Ebner, Matthias Anthony

    A method and device for producing secure, high-density tritium bonded with carbon. A substrate comprising carbon is provided. A precursor is intercalated between carbon in the substrate. The precursor intercalated in the substrate is irradiated until at least a portion of the precursor, preferably a majority of the precursor, is transmutated into tritium and bonds with carbon of the substrate forming bonded tritium. The resulting bonded tritium, tritium bonded with carbon, produces electrons via beta decay. The substrate is preferably a substrate from the list of substrates consisting of highly-ordered pyrolytic graphite, carbon fibers, carbon nanotunes, buckministerfullerenes, and combinations thereof.more » The precursor is preferably boron-10, more preferably lithium-6. Preferably, thermal neutrons are used to irradiate the precursor. The resulting bonded tritium is preferably used to generate electricity either directly or indirectly.« less

  8. Eye-tracking Reveals Abnormal Visual Preference for Geometric Images as an Early Biomarker of an ASD Subtype Associated with Increased Symptom Severity

    PubMed Central

    Pierce, Karen; Marinero, Steven; Hazin, Roxana; McKenna, Benjamin; Barnes, Cynthia Carter; Malige, Ajith

    2015-01-01

    Background Clinically and biologically, ASD is heterogeneous. Unusual patterns of visual preference as indexed by eye-tracking are hallmarks, yet whether they can be used to define an early biomarker of ASD as a whole, or leveraged to define a subtype is unclear. To begin to examine this issue, large cohorts are required. Methods A sample of 334 toddlers from 6 distinct groups (115 ASD, 20 ASD-Features, 57 DD, 53 Other, 64 TD, and 25 Typ SIB) participated. Toddlers watched a movie containing both geometric and social images. Fixation duration and number of saccades within each AOI and validation statistics for this independent sample computed. Next, to maximize power, data from our previous study (N=110) was added totaling 444 subjects. A subset of toddlers repeated the eye-tracking procedure. Results As in the original study, a subset of toddlers with ASD fixated on geometric images greater than 69%. Using this cutoff, sensitivity for ASD was 21%, specificity 98%, and PPV 86%. Toddlers with ASD who strongly preferred geometric images had (a) worse cognitive, language, and social skills relative to toddlers with ASD who strongly preferred social images and (b) fewer saccades when viewing geometric images. Unaffected siblings of ASD probands did not show evidence of heightened preference for geometric images. Test-retest reliability was good. Examination of age effects suggest that this test may not be appropriate with children > 4 years. Conclusions Enhanced visual preference for geometric repetition may be an early developmental biomarker of an ASD subtype with more severe symptoms. PMID:25981170

  9. Adverse Selection and Inertia in Health Insurance Markets: When Nudging Hurts.

    PubMed

    Handel, Benjamin R

    2013-12-01

    This paper investigates consumer inertia in health insurance markets, where adverse selection is a potential concern. We leverage a major change to insurance provision that occurred at a large firm to identify substantial inertia, and develop and estimate a choice model that also quantifies risk preferences and ex ante health risk. We use these estimates to study the impact of policies that nudge consumers toward better decisions by reducing inertia. When aggregated, these improved individual-level choices substantially exacerbate adverse selection in our setting, leading to an overall reduction in welfare that doubles the existing welfare loss from adverse selection.

  10. Eliciting Responsivity: Exploring Programming Interests of Federal Inmates as a Function of Security Classification.

    PubMed

    Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke

    2016-03-01

    Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.

  11. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation

    PubMed Central

    Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-01-01

    Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966

  12. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

    PubMed

    Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-03-05

    Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.

  13. [Effects of social origins and professional socialization on the vocational preferences of medical interns in Mexico].

    PubMed

    Frenk, J

    1985-01-01

    Using data from a survey of 923 medical interns in Mexico, this article analyzes preferences for type of medical activity (general or specialized practice), type of site (ambulatory or hospital), and type of medical care institution (public assistance, social security, or private). Four independent variables are examined: social origin, medical school, place of internship, and assimilation to the internship hospital. The great majority of the interns expressed a preference for specialty practice, hospitals, and social security institutions. The role of social origin was to selectively direct students into different medical schools. From then on, the structural attributes of the school itself and of the place of internship, as well as the socialization experiences that took place there, emerged as the most important determinants of career preferences. Such a process, however, tended to produce a "social specialization" of interns in terms of the role they expect to play in the medical field. It is argued that this kind of specialization has negative implications for the professional status of physicians, although it also poses a challenge to the development of innovative theories about the process of professionalization in medicine.

  14. Laser housing having integral mounts and method of manufacturing same

    DOEpatents

    Herron, Michael Alan; Brickeen, Brian Keith

    2004-10-19

    A housing adapted to position, support, and facilitate aligning various components, including an optical path assembly, of a laser. In a preferred embodiment, the housing is constructed from a single piece of material and broadly comprises one or more through-holes; one or more cavities; and one or more integral mounts, wherein the through-holes and the cavities cooperate to define the integral mounts. Securement holes machined into the integral mounts facilitate securing components within the integral mounts using set screws, adhesive, or a combination thereof. In a preferred method of making the housing, the through-holes and cavities are first machined into the single piece of material, with at least some of the remaining material forming the integral mounts.

  15. 75 FR 69514 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ... these guidelines, DTC must, among other things, maintain a Total Risk-Based Capital Ratio of at least 10... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63254; File No. SR-DTC-2010-14] Self-Regulatory... Preferred Stock November 5, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act...

  16. Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks.

    PubMed

    Zhang, Guang-He; Poon, Carmen C Y; Zhang, Yuan-Ting

    2012-01-01

    Wireless body sensor network (WBSN), a key building block for m-Health, demands extremely stringent resource constraints and thus lightweight security methods are preferred. To minimize resource consumption, utilizing information already available to a WBSN, particularly common to different sensor nodes of a WBSN, for security purposes becomes an attractive solution. In this paper, we tested the randomness and distinctiveness of the 128-bit biometric binary sequences (BSs) generated from interpulse intervals (IPIs) of 20 healthy subjects as well as 30 patients suffered from myocardial infarction and 34 subjects with other cardiovascular diseases. The encoding time of a biometric BS on a WBSN node is on average 23 ms and memory occupation is 204 bytes for any given IPI sequence. The results from five U.S. National Institute of Standards and Technology statistical tests suggest that random biometric BSs can be generated from both healthy subjects and cardiovascular patients and can potentially be used as authentication identifiers for securing WBSNs. Ultimately, it is preferred that these biometric BSs can be used as encryption keys such that key distribution over the WBSN can be avoided.

  17. Genomic cloud computing: legal and ethical points to consider

    PubMed Central

    Dove, Edward S; Joly, Yann; Tassé, Anne-Marie; Burton, Paul; Chisholm, Rex; Fortier, Isabel; Goodwin, Pat; Harris, Jennifer; Hveem, Kristian; Kaye, Jane; Kent, Alistair; Knoppers, Bartha Maria; Lindpaintner, Klaus; Little, Julian; Riegman, Peter; Ripatti, Samuli; Stolk, Ronald; Bobrow, Martin; Cambon-Thomsen, Anne; Dressler, Lynn; Joly, Yann; Kato, Kazuto; Knoppers, Bartha Maria; Rodriguez, Laura Lyman; McPherson, Treasa; Nicolás, Pilar; Ouellette, Francis; Romeo-Casabona, Carlos; Sarin, Rajiv; Wallace, Susan; Wiesner, Georgia; Wilson, Julia; Zeps, Nikolajs; Simkevitz, Howard; De Rienzo, Assunta; Knoppers, Bartha M

    2015-01-01

    The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three key ‘points to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These ‘points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure. PMID:25248396

  18. Genomic cloud computing: legal and ethical points to consider.

    PubMed

    Dove, Edward S; Joly, Yann; Tassé, Anne-Marie; Knoppers, Bartha M

    2015-10-01

    The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three key 'points to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These 'points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure.

  19. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less

  20. Strategic defense initiative: critical issues

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nuckolls, J.H.

    The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to themore » defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)« less

  1. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    NASA Technical Reports Server (NTRS)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  2. Approaches for building community participation: A qualitative case study of Canadian food security programs.

    PubMed

    Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia

    2017-10-01

    There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.

  3. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

    PubMed Central

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S. Cenk; Shimizu, Chisato; Burns, Jane C.; Wright, Victoria J.; Png, Eileen; Hibberd, Martin L.; Lloyd, David D.; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S.; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-01-01

    Abstract Motivation: We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. Results: To demonstrate PRINCESS’ performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). Availability and Implementation: https://github.com/achenfengb/PRINCESS_opensource Contact: shw070@ucsd.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:28065902

  4. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  5. Self-reported difficulty and preferences of wheeled mobility device users for simulated low-floor bus boarding, interior circulation and disembarking.

    PubMed

    D'Souza, Clive; Paquet, Victor L; Lenker, James A; Steinfeld, Edward

    2017-11-13

    Low ridership of public transit buses among wheeled mobility device users suggests the need to identify vehicle design conditions that are either particularly accommodating or challenging. The objective of this study was to determine the effects of low-floor bus interior seating configuration and passenger load on wheeled mobility device user-reported difficulty, overall acceptability and design preference. Forty-eight wheeled mobility users evaluated three interior design layouts at two levels of passenger load (high vs. low) after simulating boarding and disembarking tasks on a static full-scale low-floor bus mockup. User self-reports of task difficulty, acceptability and design preference were analyzed across the different test conditions. Ramp ascent was the most difficult task for manual wheelchair users relative to other tasks. The most difficult tasks for users of power wheelchairs and scooters were related to interior circulation, including moving to the securement area, entry and positioning in the securement area and exiting the securement area. Boarding and disembarking at the rear doorway was significantly more acceptable and preferred compared to the layouts with front doorways. Understanding transit usability barriers, perceptions and preferences among wheeled mobility users is an important consideration for clinicians who recommend mobility-related device interventions to those who use public transportation. Implications for Rehabilitation In order to maximize community participation opportunities for wheeled mobility users, clinicians should consider potential public transit barriers during the processes of wheelchair device selection and skills training. Usability barriers experienced by wheeled mobility device users on transit vehicles differ by mobility device type and vehicle configurations. Full-scale environment simulations are an effective means of identifying usability barriers and design needs in people with mobility impairments and may provide an alternative model for determining readiness for using fixed route buses or eligibility for paratransit.

  6. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    PubMed

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.

  7. Norms, Attitudes, and Preferences: Responses to a Survey of Teens about Sexually Transmitted Infection and Pregnancy Prevention.

    PubMed

    Tschann, Mary; Salcedo, Jennifer; Soon, Reni; Elia, Jennifer; Kaneshiro, Bliss

    2017-02-01

    To assess the values and beliefs regarding sexual behavior, sexual decision-making, and reproductive health learning preferences among teens in Hawaii. Survey regarding teens' knowledge, attitudes, and beliefs about sexual behaviors and preferences for learning about reproductive health. University of Hawaii Department of Obstetrics and Gynecology clinics in Honolulu, Hawaii. Female patients and their male or female companions ages 14-19 years. A 30-question anonymous survey. The main outcome was to describe the norms, attitudes, beliefs, and preferences of teens in this setting with regard to sexual health and sexual health education. For this, we provide a description of response frequencies and a comparison of mean scores across demographic characteristics. We analyzed a total of 100 surveys. Teens endorsed more values and norms protective against sexually transmitted infection than those protective against pregnancy. Younger teens expressed more protective values as a result of the influence of perceived parental values, whereas older teens expressed less protective values on the basis of the influence of peers. Respondents expressed comfort talking with their clinician about sexual health, and also expressed a slight preference that their clinicians initiate these conversations. The influence of parental values and peer norms on sexual behavior must be taken into consideration when designing interventions to address adolescent sexual health. Additionally, teens' greater concern about the consequences of sexually transmitted infection could be leveraged by clinicians to initiate broader conversations about sexual health, and a variety of modalities, including online resources and in-person conversations, should be used to meet the diversity of preferences expressed by teens across demographic groups. Copyright © 2016 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  8. Comparison of the effects of conditional food and cash transfers of the Ethiopian Productive Safety Net Program on household food security and dietary diversity in the face of rising food prices: ways forward for a more nutrition-sensitive program.

    PubMed

    Baye, Kaleab; Retta, Negussie; Abuye, Cherinet

    2014-09-01

    In light of the continuing rise in food prices during and after the 2008 world food crisis, whether food and cash transfers are equally effective in improving food security and diet quality is debatable. To compare the effects of conditional food and cash transfers of the Ethiopian Productive Safety Net Program (PSNP) on household food security and dietary diversity. Data on household dietary diversity, child anthropometry, food security, and preference of transfer modalities (food, cash, or mixed) were generated from a cross-sectional survey of 195 PSNP beneficiary households (67 receiving food and 128 receiving cash) in Hawella Tulla District, Sidama, southern Ethiopia. Most beneficiaries (96%) reported food shortages, and 47% reported food shortages that exceeded 3 months. Households receiving cash had better household dietary diversity scores (p = .02) and higher consumption of oils and fats (p = .003) and vitamin A-rich foods (p = .002). Compared with households receiving food, households receiving cash were more affected by increases in food prices that forced them to reduce their number of daily meals (p < .001) and spend less on nonstaples (p < .001). While most households receiving food (82%) preferred to continue receiving food, households receiving cash (56%) preferred a mix of food and cash. Households receiving cash had better household dietary diversity than households receiving food, a result suggesting that cash transfers may be more effective. However, the continuing rise infood prices may offset these benefits unless cash transfers are index-linked to food price fluctuations.

  9. Situated Usability Testing for Security Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused onmore » matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.« less

  10. Cloud computing and patient engagement: leveraging available technology.

    PubMed

    Noblin, Alice; Cortelyou-Ward, Kendall; Servan, Rosa M

    2014-01-01

    Cloud computing technology has the potential to transform medical practices and improve patient engagement and quality of care. However, issues such as privacy and security and "fit" can make incorporation of the cloud an intimidating decision for many physicians. This article summarizes the four most common types of clouds and discusses their ideal uses, how they engage patients, and how they improve the quality of care offered. This technology also can be used to meet Meaningful Use requirements 1 and 2; and, if speculation is correct, the cloud will provide the necessary support needed for Meaningful Use 3 as well.

  11. Harnessing the Risk-Related Data Supply Chain: An Information Architecture Approach to Enriching Human System Research and Operations Knowledge

    NASA Technical Reports Server (NTRS)

    Buquo, Lynn E.; Johnson-Throop, Kathy A.

    2011-01-01

    An Information Architecture facilitates the understanding and, hence, harnessing of the human system risk-related data supply chain which enhances the ability to securely collect, integrate, and share data assets that improve human system research and operations. By mapping the risk-related data flow from raw data to useable information and knowledge (think of it as a data supply chain), the Human Research Program (HRP) and Space Life Science Directorate (SLSD) are building an information architecture plan to leverage their existing, and often shared, IT infrastructure.

  12. Decoupling of superposed textures in an electrically biased piezoceramic with a 100 preferred orientation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fancher, Chris M.; Blendell, John E.; Bowman, Keith J.

    2017-02-07

    A method leveraging Rietveld full-pattern texture analysis to decouple induced domain texture from a preferred grain orientation is presented in this paper. The proposed method is demonstrated by determining the induced domain texture in a polar polymorph of 100 oriented 0.91Bi 1/2Na 1/2TiO 3-0.07BaTiO 3-0.02K 0.5Na 0.5NbO 3. Domain textures determined using the present method are compared with results obtained via single peak fitting. Texture determined using single peak fitting estimated more domain alignment than that determined using the Rietveld based method. These results suggest that the combination of grain texture and phase transitions can lead to single peak fittingmore » under or over estimating domain texture. Finally, while demonstrated for a bulk piezoelectric, the proposed method can be applied to quantify domain textures in multi-component systems and thin films.« less

  13. Leveraging Multiactions to Improve Medical Personalized Ranking for Collaborative Filtering.

    PubMed

    Gao, Shan; Guo, Guibing; Li, Runzhi; Wang, Zongmin

    2017-01-01

    Nowadays, providing high-quality recommendation services to users is an essential component in web applications, including shopping, making friends, and healthcare. This can be regarded either as a problem of estimating users' preference by exploiting explicit feedbacks (numerical ratings), or as a problem of collaborative ranking with implicit feedback (e.g., purchases, views, and clicks). Previous works for solving this issue include pointwise regression methods and pairwise ranking methods. The emerging healthcare websites and online medical databases impose a new challenge for medical service recommendation. In this paper, we develop a model, MBPR (Medical Bayesian Personalized Ranking over multiple users' actions), based on the simple observation that users tend to assign higher ranks to some kind of healthcare services that are meanwhile preferred in users' other actions. Experimental results on the real-world datasets demonstrate that MBPR achieves more accurate recommendations than several state-of-the-art methods and shows its generality and scalability via experiments on the datasets from one mobile shopping app.

  14. Leveraging Multiactions to Improve Medical Personalized Ranking for Collaborative Filtering

    PubMed Central

    2017-01-01

    Nowadays, providing high-quality recommendation services to users is an essential component in web applications, including shopping, making friends, and healthcare. This can be regarded either as a problem of estimating users' preference by exploiting explicit feedbacks (numerical ratings), or as a problem of collaborative ranking with implicit feedback (e.g., purchases, views, and clicks). Previous works for solving this issue include pointwise regression methods and pairwise ranking methods. The emerging healthcare websites and online medical databases impose a new challenge for medical service recommendation. In this paper, we develop a model, MBPR (Medical Bayesian Personalized Ranking over multiple users' actions), based on the simple observation that users tend to assign higher ranks to some kind of healthcare services that are meanwhile preferred in users' other actions. Experimental results on the real-world datasets demonstrate that MBPR achieves more accurate recommendations than several state-of-the-art methods and shows its generality and scalability via experiments on the datasets from one mobile shopping app. PMID:29118963

  15. A General Tool for Engineering the NAD/NADP Cofactor Preference of Oxidoreductases.

    PubMed

    Cahn, Jackson K B; Werlang, Caroline A; Baumschlager, Armin; Brinkmann-Chen, Sabine; Mayo, Stephen L; Arnold, Frances H

    2017-02-17

    The ability to control enzymatic nicotinamide cofactor utilization is critical for engineering efficient metabolic pathways. However, the complex interactions that determine cofactor-binding preference render this engineering particularly challenging. Physics-based models have been insufficiently accurate and blind directed evolution methods too inefficient to be widely adopted. Building on a comprehensive survey of previous studies and our own prior engineering successes, we present a structure-guided, semirational strategy for reversing enzymatic nicotinamide cofactor specificity. This heuristic-based approach leverages the diversity and sensitivity of catalytically productive cofactor binding geometries to limit the problem to an experimentally tractable scale. We demonstrate the efficacy of this strategy by inverting the cofactor specificity of four structurally diverse NADP-dependent enzymes: glyoxylate reductase, cinnamyl alcohol dehydrogenase, xylose reductase, and iron-containing alcohol dehydrogenase. The analytical components of this approach have been fully automated and are available in the form of an easy-to-use web tool: Cofactor Specificity Reversal-Structural Analysis and Library Design (CSR-SALAD).

  16. 17 CFR 270.10f-3 - Exemption for the acquisition of securities during the existence of an underwriting or selling...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... can be sold at or near their carrying value within a reasonably short period of time and either: (i... portion. (6) Series of a series company means any class or series of a registered investment company that issues two or more classes or series of preferred or special stock, each of which is preferred over all...

  17. 17 CFR 270.10f-3 - Exemption for the acquisition of securities during the existence of an underwriting or selling...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... can be sold at or near their carrying value within a reasonably short period of time and either: (i... portion. (6) Series of a series company means any class or series of a registered investment company that issues two or more classes or series of preferred or special stock, each of which is preferred over all...

  18. 17 CFR 270.10f-3 - Exemption for the acquisition of securities during the existence of an underwriting or selling...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... can be sold at or near their carrying value within a reasonably short period of time and either: (i... portion. (6) Series of a series company means any class or series of a registered investment company that issues two or more classes or series of preferred or special stock, each of which is preferred over all...

  19. Purchasing health care in China: experiences, opportunities and challenges.

    PubMed

    Yip, Winnie; Hanson, Kara

    2009-01-01

    Purchasing has been promoted as a key policy instrument to improve health system performance. Despite its widespread adoption, there is little empirical evidence on how it works, the challenges surrounding its implementation, its impact, and the preconditions for it to function effectively, particularly in low- and middle-income settings. The objective of this chapter is to analyze critically the extent to which purchasing could be, and has been used strategically in China and to identify modifications that are needed for purchasing to be effective in assuring that the government's new funding for health care will result in efficient and effective health services. We present a conceptual framework for purchasing, which identifies three critical principal-agent relationships in purchasing. We draw on evidence from secondary data, results of other research studies, interviews, and the impact evaluation of a social experiment in rural China that explicitly used purchasing to improve quality and efficiency. This information is used to examine purchasing relationships in urban social health insurance (SHI), the rural medical insurance scheme, and purchasing of public health services. To date, use of strategic purchasing is limited in China. Both the urban and the rural health insurance schemes act as passive third-party payers, failing to take advantage of the opportunities to strengthen incentives to improve quality and efficiency. This may be because as government agencies, the extent to which the Ministries of Health and Labor and Social Security can act independently from provider interests, or act in the best interest of the population, is unclear. Other important challenges include ensuring adequate representation of the population's views and preferences and making better use of the leverage provided by purchasing to create appropriate provider incentives, through better integration of financing and improved coordination among purchasers. In designing purchasing arrangements, attention needs to be paid to all three principal-agent relationships. Successful purchasing appears to require mechanisms to mobilize and represent community preferences and more strategic contracting with providers. More research is needed to strengthen the evidence on which purchasing arrangements work, which do not work, and under what conditions different purchasing configurations can work most effectively.

  20. Communication Preferences and Satisfaction of Secure Messaging Among Patients and Providers in the Military Healthcare System.

    PubMed

    Hernandez, Belinda F; Morgan, Brenda J; Ish, Jennifer; Agbator, Lucky O; Lindo-Moon, Soledad; Stotler, Francine F; Gardner, Cubby L

    2018-05-08

    Use of electronic secure messaging (SM) is rapidly growing in various healthcare settings. However, there is a large number of patients that choose not use SM or use it minimally. Thus, understanding preferences for patient-provider communication modalities is critically important, particularly among military healthcare beneficiaries. The purpose of this study was to assess preferences for patient-provider communication modalities (in person, telephone, SM, or mail) among a sample of patients, providers, and staff located at five Air Force military treatment facilities across the USA. We recruited patients, providers, and staff, from five family health clinics to complete a short survey. We measured participants' preferences for communication modality for various healthcare concerns, such as responses to non-urgent medical questions, test results, and medication renewal information. We also measured satisfaction with MiCare, the Air Force's SM system. We conducted chi-square analyses and Fisher's exact tests to assess differences in communication preferences by patients, providers, and staff and we computed frequencies in satisfaction responses. We found that while providers and staff (N = 70) prefer to communicate with patients about various healthcare concerns online through MiCare, patients (N = 1,260) prefer to communicate in-person or through the telephone. Patients were generally satisfied with MiCare; however, there was a large proportion of patients who were undecided about MiCare's impact on the quality of care they received (40.3%). Additionally, although the majority of providers and staff believed MiCare improved their efficiency (58.0%) and communication with patients (72.3%), 65.7% of providers and staff believed MiCare had increased their workload. MiCare is a promising tool to improve patient-provider communication. However, future studies are needed to better understand why patients within the military healthcare system prefer communication modalities other than MiCare and to identify strategies to decrease provider and staff workloads while using MiCare.

  1. Characterization of Nitrated Sugar Alcohols by Atmospheric-Pressure Chemical-Ionization Mass Spectrometry

    DTIC Science & Technology

    2016-07-27

    disclosed here will benefit the area of explosives trace detection for counterterrorism and forensics . INTRODUCTION The military-grade...plasticizer formulation.[4] As a result, methods to detect MHN, SHN, and XPN should be pursued for the same security and forensics applications as...with ion mobility mass spectrometry (IMS) provide direct detection of molecular ions,[8] and thus are preferred for most security and forensic

  2. Network Security Visualization

    DTIC Science & Technology

    1999-09-27

    performing SQL generation and result-set binding, inserting acquired security events into the database and gathering the requested data for Console scene...objects is also auto-generated by a VBA script. Built into the auto-generated table access objects are the preferred join paths between tables. This...much of the Server itself) never have to deal with SQL directly. This is one aspect of laying the groundwork for supporting RDBMSs from multiple vendors

  3. Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.

    PubMed

    Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui

    2016-05-13

    Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.

  4. Popular opinion on tax cuts and Social Security.

    PubMed

    Teixeira, R

    2000-01-01

    A review of recent opinion polls reveals the U.S. public's views on budget priorities and Social Security. The public wants more spending on Social Security, Medicare, and other domestic programs, chiefly education and health care, and prefers these spending priorities--by up to a 70 percent majority--to paying down the national debt and cutting taxes. The public supports the Social Security system but doubts it can continue to deliver the goods. To remedy this problem, it is willing not only to use part of the surplus but to raise the cap on payroll taxes. The public does not support benefit cuts or an increase in the retirement age. And the public remains unsure to hostile about the role of the stock market, whether in individual accounts or in the Social Security trust fund.

  5. Provably secure identity-based identification and signature schemes from code assumptions

    PubMed Central

    Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940

  6. Provably secure identity-based identification and signature schemes from code assumptions.

    PubMed

    Song, Bo; Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.

  7. 4 CFR 28.160 - Request for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... making a request in person shall be required to present satisfactory proof of identity, preferably a..., individuals should submit their names and addresses, dates and places of birth, social security number, and...

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Walter, Andrew

    National policymakers are currently considering a dilemma of critical importance to the continued security of the United States: how can U.S. nuclear weapons policies be leveraged to benefit U.S. nuclear nonproliferation goals in the near-term, without sacrificing U.S. national security? In its role supporting U.S. nuclear weapons policy, Sandia National Laboratories has a responsibility to provide objective technical advice to support policy deliberations on this question. However, to best fulfill this duty Sandia must have a broader understanding of the context of the problem. To help develop this understanding, this paper analyzes the two predominant analytical perspectives of international relationsmore » theory to explore their prescriptions for how nuclear weapons and nonproliferation policies interact. As lenses with which to view and make sense of the world, theories of international relations must play a crucial role in framing the trade-offs at the intersection of the nuclear weapons and nonproliferation policy domains. An analysis of what these theories suggest as courses of action to leverage nuclear weapons policies to benefit nonproliferation goals is then offered, with particular emphasis on where the policy prescriptions resulting from the respective theories align to offer near-term policy changes with broad theoretical support. These policy prescriptions are then compared to the 2001 Nuclear Posture Review to understand what the theories indicate policymakers may have gotten right in their dealing with the nuclear dilemma, and where they may have gone wrong. Finally, a brief international relations research agenda is proposed to help address the dilemma between nuclear deterrence and nuclear nonproliferation policies, with particular emphasis on how such an agenda can best support the needs of the policy community and a potential 'all things nuclear' policy deliberation and decision-support framework.« less

  9. Geographic Information System Technology Leveraged for Crisis Planning, Emergency, Response, and Disaster Management

    NASA Astrophysics Data System (ADS)

    Ross, A.; Little, M. M.

    2013-12-01

    NASA's Atmospheric Science Data Center (ASDC) is piloting the use of Geographic Information System (GIS) technology that can be leveraged for crisis planning, emergency response, and disaster management/awareness. Many different organizations currently use GIS tools and geospatial data during a disaster event. ASDC datasets have not been fully utilized by this community in the past due to incompatible data formats that ASDC holdings are archived in. Through the successful implementation of this pilot effort and continued collaboration with the larger Homeland Defense and Department of Defense emergency management community through the Homeland Infrastructure Foundation-Level Data Working Group (HIFLD WG), our data will be easily accessible to those using GIS and increase the ability to plan, respond, manage, and provide awareness during disasters. The HIFLD WG Partnership has expanded to include more than 5,900 mission partners representing the 14 executive departments, 98 agencies, 50 states (and 3 territories), and more than 700 private sector organizations to directly enhance the federal, state, and local government's ability to support domestic infrastructure data gathering, sharing and protection, visualization, and spatial knowledge management.The HIFLD WG Executive Membership is lead by representatives from the Department of Defense (DoD) Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs - OASD (HD&ASA); the Department of Homeland Security (DHS), National Protection and Programs Directorate's Office of Infrastructure Protection (NPPD IP); the National Geospatial-Intelligence Agency (NGA) Integrated Working Group - Readiness, Response and Recovery (IWG-R3); the Department of Interior (DOI) United States Geological Survey (USGS) National Geospatial Program (NGP), and DHS Federal Emergency Management Agency (FEMA).

  10. Experts advise hospitals to heed warning signs, leverage security to prepare against shootings.

    PubMed

    2014-09-01

    While hospital shootings are not commonplace, studies suggest they are happening with increasing frequency, and that EDs are particularly vulnerable to this type of violence. Researchers report that roughly a third of all hospital shootings occur in the emergency setting. Experts say such incidents are typically targeted events, not random acts. Consequently, effective security programs should emphasize preventive steps to defuse potentially volatile situations and prevent weapons from entering the facility. Hospital security departments should be equipped to provide training to employees throughout the facility so that employees know how to respond if an active shooter is identified. Researchers report that between 2000 and 2012 there were 154 shootings in American hospitals, and that the frequency of these events increased markedly in the later years of the study. Experts say hospital shootings may involve disgruntled patients, dementia patients, or psychiatric patients, but the most common perpetrators are prisoners who are brought into the hospital for treatment under guard. Security experts say effective safety plans should focus on identifying threatening language or other signs of agitation early on so that interventions can be employed. They also advise hospitals to install gun lockers at every entrance point so that lawful weapons can be stored before owners enter the facility. Liberalized gun laws in some regions are making security more difficult at public hospitals. Also, hospitals need to be careful with surveillance activities that could raise privacy concerns.

  11. The Great Game redux: Energy security and the emergence of tripolarity in Eurasia

    NASA Astrophysics Data System (ADS)

    Ozdamar, Ibrahim Ozgur

    Securing energy resources has become a key aspect of foreign policy-making since the 1970s. States have used military and economic foreign policy tools to secure the supply of energy to their domestic markets. With the fall of the USSR in 1991, political and economic competition for penetration into energy-rich regions spread through Eurasia. Inspired from the nineteenth century term to describe Russian-British rivalry in the region, the current rivalry among great powers and their allies is called the "New Great Game". This project analyzes three political conflicts that are shaped by such rivalry that can threaten global energy security. Empirical results from the expected utility model (Bueno de Mesquita 1985) suggest the rivalry among the Western (i.e. EU, US) and Eastern (i.e. Russia, China) powers about the Iranian nuclear program, Nagorno-Karabakh and South Ossetia conflicts is likely to continue and shows some Cold War characteristics. I have also found out the expected outcomes of these conflicts and foreign policy tools and obvious and unseen strategic moves available to actors. The major conclusion of the study is that the EU and US should pursue a coordinated foreign policy and balance the Russian and Chinese influence in the region to secure access to energy resources. Most effective foreign policy tools to achieve such aim appear to be the use of economic relations as leverage against Russia and China and support economic and democratic developments of the newly established republics in Eurasia.

  12. A Systematic Review of Research Studies Examining Telehealth Privacy and Security Practices used by Healthcare Providers.

    PubMed

    Watzlaf, Valerie J M; Zhou, Leming; Dealmeida, Dilhari R; Hartman, Linda M

    2017-01-01

    The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 - 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth. Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen's kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions.

  13. Global Climate Change, Food Security and the U.S. Food System

    NASA Technical Reports Server (NTRS)

    Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula

    2013-01-01

    Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.

  14. 78 FR 73191 - Sunshine Act Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ... in advance and provide your name, date of birth, and social security number (SSN) or passport number.../aboutthefed/boardmeetings/ or if you prefer, a CD recording of the meeting will be available for listening in...

  15. Food security: who is being excluded? A case of older people with dementia in long-term care homes.

    PubMed

    Vahabi, M; Schindel Martin, L

    2014-07-01

    To explore the extent of food security among older people, particularly those with cognitive impairments residing in Canadian long-term care homes (LTCHs) through a focused review of literature. Databases including Medline, Nursing and Health Sciences (SAGE), Psych Info, Social Sciences Abstract, the Cumulative Index of Nursing and Allied Health Literature (CINAHL) and HealthSTAR were searched for peer-reviewed articles related to food experiences of older individuals in industrialized countries including Canada. Only articles that were published in English between 1997-2012 were included. Sixty two studies met the inclusion criteria. Of those 17 focused on older adults in LTCHs. The review found that food security has rarely been examined among older persons living in LTCHs, and has never been examined within the context of cognitive impairment. While a few studies have focused on residents' satisfaction with foods that are provided to them in LTCHs, none have explored the extent of food security in this population. Furthermore, food satisfaction surveys in the LTCH are limited to the assessment of foods that are served to residents, and do not capture residents' food accessibility beyond the food dispensing routines of the organization. Thus, food quality, food preferences, and the traditional meanings and rituals associated with food consumption are not purposefully evaluated. In addition, LTCHs are not required to monitor residents' food satisfaction using a consistent, regular, and standardized approach and there is no regulation in the LTCH Act that requires LTCHs to assess their residents' food security. The findings highlight the need for: 1) expansion of food security research to non-community-based settings including LTCHs; 2) re-conceptualization of food security and modification of measurement tools to assess the extent and determinants of food security among older adults in LTCHs; 3) mandatory monitoring of food security via standardized and regular surveys tailored to meet the unique preferences and needs of the older population, particularly those with dementia; and 4) education of healthcare professionals regarding food security and its assessment in LTCHs.

  16. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.

  17. The Federal Geospatial Platform a shared infrastructure for publishing, discovering and exploiting public data and spatial applications.

    NASA Astrophysics Data System (ADS)

    Dabolt, T. O.

    2016-12-01

    The proliferation of open data and data services continues to thrive and is creating new challenges on how researchers, policy analysts and other decision makes can quickly discover and use relevant data. While traditional metadata catalog approaches used by applications such as data.gov prove to be useful starting points for data search they can quickly frustrate end users who are seeking ways to quickly find and then use data in machine to machine environs. The Geospatial Platform is overcoming these obstacles and providing end users and applications developers a richer more productive user experience. The Geospatial Platform leverages a collection of open source and commercial technology hosted on Amazon Web Services providing an ecosystem of services delivering trusted, consistent data in open formats to all users as well as a shared infrastructure for federal partners to serve their spatial data assets. It supports a diverse array of communities of practice ranging on topics from the 16 National Geospatial Data Assets Themes, to homeland security and climate adaptation. Come learn how you can contribute your data and leverage others or check it out on your own at https://www.geoplatform.gov/

  18. 17 CFR 31.26 - Quarterly reporting requirement.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... leverage contract was repurchased, resold or liquidated; (i) The leverage customer account identification number; (j) Whether the leverage customer had a commercial or noncommercial leverage account; (k) Whether the leverage customer was the owner or holder of a proprietary leverage account as defined in § 31.4(e...

  19. Progress toward a National Water Census

    USGS Publications Warehouse

    Jones, Sonya A.

    2015-01-01

    By evaluating large-scale effects of changes in land use and land cover, water use, and climate on occurrence and distribution of water, water quality, and human and aquatic-ecosystem health, the NWC will also help to inform a broader initiative by the Department of the Interior, WaterSMART (Sustain and Manage America's Resources for Tomorrow), which provides multiagency funding to pursue a sustainable water supply for the Nation as directed under the SECURE Water Act. Through the NWC, the USGS actively engages Federal, regional, and local stakeholders to identify research priorities and leverages current studies and program activities to provide information that is relevant at both the national and regional scales.

  20. Reparative resynchronization in ischemic heart failure: an emerging strategy.

    PubMed

    Yamada, Satsuki; Terzic, Andre

    2014-08-01

    Cardiac dyssynchrony refers to disparity in cardiac wall motion, a serious consequence of myocardial infarction associated with poor outcome. Infarct-induced scar is refractory to device-based cardiac resynchronization therapy, which relies on viable tissue. Leveraging the prospect of structural and functional regeneration, reparative resynchronization has emerged as a potentially achievable strategy. In proof-of-concept studies, stem-cell therapy eliminates contractile deficit originating from infarcted regions and secures long-term synchronization with tissue repair. Limited clinical experience suggests benefit of cell interventions in acute and chronic ischemic heart disease as adjuvant to standard of care. A regenerative resynchronization option for dyssynchronous heart failure thus merits validation.

  1. 17 CFR 31.8 - Cover of leverage contracts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... contracts entered into with leverage customers, and must at all times also maintain cover of at least 90... leverage customers. At least 25 percent of the amount of physical commodities subject to open long leverage... entered into with leverage customers: And, provided further, That the leverage transaction merchant...

  2. Addressing the vulnerabilities of pass-thoughts

    NASA Astrophysics Data System (ADS)

    Fernandez, Gabriel C.; Danko, Amanda S.

    2016-05-01

    As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.

  3. Negotiating contracts for vendor-financed purchases of EHR systems. Providers face extraordinary challenges securing financing for HIT projects, especially ones required to capitalize on ARRA incentives.

    PubMed

    Fox, Steven J; Schick, Vadim

    2010-01-01

    In this economic climate, healthcare providers may face extraordinary challenges securing financing for health IT projects, especially ones required to capitalize on the incentives in ARRA. Vendor financing may be the best option for many such providers. While such arrangements may often seem a win-win for both parties, providers should be aware of the many potential pitfalls inherent in vendorfinanced deals, including: 1.) additional pressure from vendors to accept their standard contractual terms and conditions because vendors have much more leverage if they are also the creditor in the transaction; 2.) failing to obtain necessary warranties and representations from vendors that their systems will comply with all relevant requirements under ARRA and will permit the provider to achieve meaningful use; and 3.) dealing with problems arising if the vendors' product fails to achieve certification, or the provider fails to achieve "meaningful use" in a timely manner.

  4. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.

    PubMed

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S Cenk; Shimizu, Chisato; Burns, Jane C; Wright, Victoria J; Png, Eileen; Hibberd, Martin L; Lloyd, David D; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-03-15

    We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. To demonstrate PRINCESS' performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). https://github.com/achenfengb/PRINCESS_opensource. shw070@ucsd.edu. Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  5. caTIES: a grid based system for coding and retrieval of surgical pathology reports and tissue specimens in support of translational research.

    PubMed

    Crowley, Rebecca S; Castine, Melissa; Mitchell, Kevin; Chavan, Girish; McSherry, Tara; Feldman, Michael

    2010-01-01

    The authors report on the development of the Cancer Tissue Information Extraction System (caTIES)--an application that supports collaborative tissue banking and text mining by leveraging existing natural language processing methods and algorithms, grid communication and security frameworks, and query visualization methods. The system fills an important need for text-derived clinical data in translational research such as tissue-banking and clinical trials. The design of caTIES addresses three critical issues for informatics support of translational research: (1) federation of research data sources derived from clinical systems; (2) expressive graphical interfaces for concept-based text mining; and (3) regulatory and security model for supporting multi-center collaborative research. Implementation of the system at several Cancer Centers across the country is creating a potential network of caTIES repositories that could provide millions of de-identified clinical reports to users. The system provides an end-to-end application of medical natural language processing to support multi-institutional translational research programs.

  6. Credit Enhancements and Capital Markets to Fund Solar Deployment: Leveraging Public Funds to Open Private Sector Investment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mendelsohn, Michael; Urdanick, Marley; Joshi, John

    2015-02-01

    Credit enhancements represent a variety of financial support structures that are designed to reduce risk to those holding the debt, including debt raised via a securitization process, and thus lower the required yield associated with the security. The purpose of all forms of credit enhancement is to increase the collateral against which notes are secured (Lin,1999). The following section evaluates is not guaranteed. Perceived risks of the solar asset class--including those related to technology, offtaker creditworthiness, and regulatory policy--can increase the required yield, increase probability of investor loss of interest and/or principal, or both. In many cases, this is amore » cyclical phenomenon: risk perception is fed by lack of historical knowledge, which is in turn fed by risk perception. Therefore, successful access to capital market investment in order to spur low-cost solar deployment depends on the success of this initial fledgling period.« less

  7. Quantum cascade lasers for defense and security

    NASA Astrophysics Data System (ADS)

    Day, Timothy; Pushkarsky, Michael; Caffey, Dave; Cecchetti, Kristen; Arp, Ron; Whitmore, Alex; Henson, Michael; Takeuchi, Eric B.

    2013-10-01

    Quantum cascade laser (QCL) systems are mature and at the vanguard of a new generation of products that support military applications such as Infrared Countermeasures (IRCM) and targeting. The demanding product requirements for aircraft platforms that include reduced size, weight, power consumption and cost (SWaP-C) extends to portable, battery powered handheld products. QCL technology operates throughout the mid-wave (MWIR) and long-wave (LWIR) infrared to provide new capabilities that leverage existing thermal imaging cameras. In addition to their suitability for aircraft platforms, QCL products are a natural fit to meet operator demands for small, lightweight pointer and beacon capabilities. Field-testing of high power, lightweight, battery operated devices has demonstrated their utility across a range of air and ground applications. This talk will present an overview of QCL technology and the Defense and Security products and capabilities that are enabled by it. This talk will also provide an overview of the extensive environmental and performance testing associated with products based on QCL technology.

  8. Patient choice of providers in a preferred provider organization.

    PubMed

    Wouters, A V; Hester, J

    1988-03-01

    This article is an analysis of patient choice of providers by the employees of the Security Pacific Bank of California and their dependents who have access to the Med Network Preferred Provider Organization (PPO). The empirical results show that not only is the PPO used by individuals who require relatively little medical care (as measured by predicted office visit charges) but that the PPO is most intensively used for low-risk services such as treatment for minor illness and preventive care. Also, the most likely Security Pacific Health Care beneficiary to use a PPO provider is a recently hired employee who lives in the south urban region, has a relatively low income, does not have supplemental insurance coverage, and is without previous attachments to non-PPO primary care providers. In order to maximize their ability to reduce plan paid benefits, insurers who contract with PPOs should focus on increasing PPO utilization among poorer health risks.

  9. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less

  10. A Systematic Review of Research Studies Examining Telehealth Privacy and Security Practices used by Healthcare Providers

    PubMed Central

    WATZLAF, VALERIE J. M.; ZHOU, LEMING; DEALMEIDA, DILHARI R.; HARTMAN, LINDA M.

    2017-01-01

    The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth. Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions. PMID:29238448

  11. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.

    PubMed

    Liu, Ximeng; Lu, Rongxing; Ma, Jianfeng; Chen, Le; Qin, Baodong

    2016-03-01

    Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision support system include not only improving diagnosis accuracy but also reducing diagnosis time. Specifically, with large amounts of clinical data generated everyday, naïve Bayesian classification can be utilized to excavate valuable information to improve a clinical decision support system. Although the clinical decision support system is quite promising, the flourish of the system still faces many challenges including information security and privacy concerns. In this paper, we propose a new privacy-preserving patient-centric clinical decision support system, which helps clinician complementary to diagnose the risk of patients' disease in a privacy-preserving way. In the proposed system, the past patients' historical data are stored in cloud and can be used to train the naïve Bayesian classifier without leaking any individual patient medical data, and then the trained classifier can be applied to compute the disease risk for new coming patients and also allow these patients to retrieve the top- k disease names according to their own preferences. Specifically, to protect the privacy of past patients' historical data, a new cryptographic tool called additive homomorphic proxy aggregation scheme is designed. Moreover, to leverage the leakage of naïve Bayesian classifier, we introduce a privacy-preserving top- k disease names retrieval protocol in our system. Detailed privacy analysis ensures that patient's information is private and will not be leaked out during the disease diagnosis phase. In addition, performance evaluation via extensive simulations also demonstrates that our system can efficiently calculate patient's disease risk with high accuracy in a privacy-preserving way.

  12. Personalized direct marketing using digital publishing

    NASA Astrophysics Data System (ADS)

    Kutty, Cheeniyil L.; Prabhakaran, Jayasree K.

    2006-02-01

    In today's cost-conscious business climate, marketing and customer service decision makers are increasingly concerned with how to increase customer response and retention rates. Companies spend large amounts of money on Customer Relationship Management (CRM) solutions and data acquisition but they don't know how to use the information stored in these systems to improve the effectiveness of their direct marketing campaigns. By leveraging the customer information they already have, companies can create personalized, printed direct mail programs that generate high response rates, greater returns, and stronger customer loyalty, while gaining a significant edge over their competitors. To reach the promised land of one-to-one direct marketing (personalized direct marketing - PDM), companies need an end-to-end solution for creating, managing, printing, and distributing personalized direct mail "on demand." Having access to digital printing is just one piece of the solution. A more complete approach includes leveraging personalization technology into a useful direct marketing tool that provides true one-to-one marketing, allowing variable images and text in a personalized direct mail. This paper discusses integration of CRM with a Print-on-Demand solution so as to create truly personalized printed marketing campaigns for one or many individuals based on the profile information, preferences and purchase history stored in the CRM.

  13. The Effect of Framing and Normative Messages in Building Support for Climate Policies

    PubMed Central

    Hurlstone, Mark J.; Lewandowsky, Stephan; Newell, Ben R.; Sewell, Brittany

    2014-01-01

    Deep cuts in greenhouse gas emissions are required to mitigate climate change. However, there is low willingness amongst the public to prioritise climate policies for reducing emissions. Here we show that the extent to which Australians are prepared to reduce their country's CO2 emissions is greater when the costs to future national income are framed as a “foregone-gain”—incomes rise in the future but not by as much as in the absence of emission cuts—rather than as a “loss”—incomes decrease relative to the baseline expected future levels (Studies 1 & 2). The provision of a normative message identifying Australia as one of the world's largest CO2 emitters did not increase the amount by which individuals were prepared to reduce emissions (Study 1), whereas a normative message revealing the emission policy preferences of other Australians did (Study 2). The results suggest that framing the costs of reducing emissions as a smaller increase in future income and communicating normative information about others' emission policy preferences are effective methods for leveraging public support for emission cuts. PMID:25501009

  14. The effect of framing and normative messages in building support for climate policies.

    PubMed

    Hurlstone, Mark J; Lewandowsky, Stephan; Newell, Ben R; Sewell, Brittany

    2014-01-01

    Deep cuts in greenhouse gas emissions are required to mitigate climate change. However, there is low willingness amongst the public to prioritise climate policies for reducing emissions. Here we show that the extent to which Australians are prepared to reduce their country's CO2 emissions is greater when the costs to future national income are framed as a "foregone-gain"--incomes rise in the future but not by as much as in the absence of emission cuts--rather than as a "loss"--incomes decrease relative to the baseline expected future levels (Studies 1 & 2). The provision of a normative message identifying Australia as one of the world's largest CO2 emitters did not increase the amount by which individuals were prepared to reduce emissions (Study 1), whereas a normative message revealing the emission policy preferences of other Australians did (Study 2). The results suggest that framing the costs of reducing emissions as a smaller increase in future income and communicating normative information about others' emission policy preferences are effective methods for leveraging public support for emission cuts.

  15. SecSIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.

    PubMed

    Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui

    2016-05-13

    Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.

  16. Energy technology evaluation report: Energy security

    NASA Astrophysics Data System (ADS)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  17. Climate Change and Global Food Security: Food Access, Utilization, and the US Food System

    NASA Astrophysics Data System (ADS)

    Brown, M. E.; Antle, J. M.; Backlund, P. W.; Carr, E. R.; Easterling, W. E.; Walsh, M.; Ammann, C. M.; Attavanich, W.; Barrett, C. B.; Bellemare, M. F.; Dancheck, V.; Funk, C.; Grace, K.; Ingram, J. S. I.; Jiang, H.; Maletta, H.; Mata, T.; Murray, A.; Ngugi, M.; Ojima, D. S.; O'Neill, B. C.; Tebaldi, C.

    2015-12-01

    This paper will summarize results from the USDA report entitled 'Climate change, Global Food Security and the U.S. Food system'. The report focuses on the impact of climate change on global food security, defined as "when all people at all times have physical, social, and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life". The assessment brought together authors and contributors from twenty federal, academic, nongovernmental, intergovernmental, and private organizations in four countries to identify climate change effects on food security through 2100, and analyze the U.S.'s likely connections with that world. This talk will describe how climate change will likely affect food access and food utilization, and summarize how the U.S. food system contributes to global food security, and will be affected by climate change.

  18. Econophysics and individual choice

    NASA Astrophysics Data System (ADS)

    Bordley, Robert F.

    2005-08-01

    The subjectivist theory of probability specifies certain axioms of rationality which together lead to both a theory of probability and a theory of preference. The theory of probability is used throughout the sciences while the theory of preferences is used in economics. Results in quantum physics challenge the adequacy of the subjectivist theory of probability. As we show, answering this challenge requires modifying an Archimedean axiom in the subjectivist theory. But changing this axiom modifies the subjectivist theory of preference and therefore has implications for economics. As this paper notes, these implications are consistent with current empirical findings in psychology and economics. As we show, these results also have implications for pricing in securities markets. This suggests further directions for research in econophysics.

  19. 76 FR 76977 - Proposed Information Collection Activity; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-09

    ... Program LIHEAP Leveraging Report. OMB No.: 0970-0121. Description: The LIHEAP leveraging incentive program rewards LIHEAP grantees that have leveraged non-federal home energy resources for low- income households. The LIHEAP leveraging report is the application for leveraging incentive funds that these LIHEAP...

  20. 17 CFR 31.18 - Margin calls.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... a margin deficiency without effecting personal contact with the leverage customer. If a leverage transaction merchant is unable to effect personal contact with a leverage customer, a telegram sent to the leverage customer at the address furnished by the customer to the leverage transaction merchant shall be...

  1. 13 CFR 108.1100 - Type of Leverage and application procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Type of Leverage and application... MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM SBA Financial Assistance for NMVC Companies (Leverage) General Information About Obtaining Leverage § 108.1100 Type of Leverage and application procedures. (a) Type of...

  2. Boys or girls? Parents' preferences and sex control.

    PubMed

    Williamson, N E

    1978-01-01

    Recent evidence from the U.S. and from other selected countries is examined on parent sex preferences for their children and how strongly these are held. This involves the significance of these preferences, the social and economic conditions that foster different types of preferences, and how different individuals and societies deal with them. The traditional preference for boys appears to remain nearly universal, which runs contrary to the ideal of "every child a wanted child," and also presents an obstacle to desired declines in fertility in developing countries where sons are still perceived as needed for economic and emotional security. This tendency has been turned around in Japan, Singapore, Hong Kong, and the U.S., where small families are now the ideal. 3 basic approaches to the scientific selection of sex-specific sperm for preselection, the timing of sexual intercourse, the separation of male- and female-bearing sperm followed by artificial insemination, and selective abortion after fetal sex determination indicate that an effective and practical method of sex control is still further off than predicted.

  3. Information Assurance in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  4. NASA SensorWeb and OGC Standards for Disaster Management

    NASA Technical Reports Server (NTRS)

    Mandl, Dan

    2010-01-01

    I. Goal: Enable user to cost-effectively find and create customized data products to help manage disasters; a) On-demand; b) Low cost and non-specialized tools such as Google Earth and browsers; c) Access via open network but with sufficient security. II. Use standards to interface various sensors and resultant data: a) Wrap sensors in Open Geospatial Consortium (OGC) standards; b) Wrap data processing algorithms and servers with OGC standards c) Use standardized workflows to orchestrate and script the creation of these data; products. III. Target Web 2.0 mass market: a) Make it simple and easy to use; b) Leverage new capabilities and tools that are emerging; c) Improve speed and responsiveness.

  5. Technical Challenges and Opportunities of Centralizing Space Science Mission Operations (SSMO) at NASA Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Ido, Haisam; Burns, Rich

    2015-01-01

    The NASA Goddard Space Science Mission Operations project (SSMO) is performing a technical cost-benefit analysis for centralizing and consolidating operations of a diverse set of missions into a unified and integrated technical infrastructure. The presentation will focus on the notion of normalizing spacecraft operations processes, workflows, and tools. It will also show the processes of creating a standardized open architecture, creating common security models and implementations, interfaces, services, automations, notifications, alerts, logging, publish, subscribe and middleware capabilities. The presentation will also discuss how to leverage traditional capabilities, along with virtualization, cloud computing services, control groups and containers, and possibly Big Data concepts.

  6. Business continuity strategies for cyber defence: battling time and information overload.

    PubMed

    Streufert, John

    2010-11-01

    Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.

  7. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  8. Data fusion in cyber security: first order entity extraction from common cyber data

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2012-06-01

    The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.

  9. DIRECT secure messaging as a common transport layer for reporting structured and unstructured lab results to outpatient providers.

    PubMed

    Sujansky, Walter; Wilson, Tom

    2015-04-01

    This report describes a grant-funded project to explore the use of DIRECT secure messaging for the electronic delivery of laboratory test results to outpatient physicians and electronic health record systems. The project seeks to leverage the inherent attributes of DIRECT secure messaging and electronic provider directories to overcome certain barriers to the delivery of lab test results in the outpatient setting. The described system enables laboratories that generate test results as HL7 messages to deliver these results as structured or unstructured documents attached to DIRECT secure messages. The system automatically analyzes generated HL7 messages and consults an electronic provider directory to determine the appropriate DIRECT address and delivery format for each indicated recipient. The system also enables lab results delivered to providers as structured attachments to be consumed by HL7 interface engines and incorporated into electronic health record systems. Lab results delivered as unstructured attachments may be printed or incorporated into patient records as PDF files. The system receives and logs acknowledgement messages to document the status of each transmitted lab result, and a graphical interface allows searching and review of this logged information. The described system is a fully implemented prototype that has been tested in a laboratory setting. Although this approach is promising, further work is required to pilot test the system in production settings with clinical laboratories and outpatient provider organizations. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. 20 CFR 416.621 - What is our order of preference in selecting a representative payee for you?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Representative Payment § 416.621... organizations who volunteer to serve as payee for a beneficiary. (b) For individuals who are disabled and who...

  11. 6 CFR 17.540 - Advertising.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...

  12. 6 CFR 17.540 - Advertising.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...

  13. 6 CFR 17.540 - Advertising.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...

  14. 6 CFR 17.540 - Advertising.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...

  15. 6 CFR 17.540 - Advertising.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...

  16. 17 CFR 230.902 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... well as the following: (1) Non-participatory preferred stock, which is defined as non-convertible...) Any foreign securities exchange or non-exchange market designated by the Commission. Attributes to be... from the registration requirements; (ii) Contact with persons excluded from the definition of “U.S...

  17. 17 CFR 230.902 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... well as the following: (1) Non-participatory preferred stock, which is defined as non-convertible...) Any foreign securities exchange or non-exchange market designated by the Commission. Attributes to be... from the registration requirements; (ii) Contact with persons excluded from the definition of “U.S...

  18. QKD-Based Secured Burst Integrity Design for Optical Burst Switched Networks

    NASA Astrophysics Data System (ADS)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2016-03-01

    The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. It is quite evident that people prefer optical communication when it comes to large amount of data involving its transmission. The concept of switching in networks has matured enormously with several researches, architecture to implement and methods starting with Optical circuit switching to Optical Burst Switching. Optical burst switching is regarded as viable solution for switching bursts over networks but has several security vulnerabilities. However, this work exploited the security issues associated with Optical Burst Switching with respect to integrity of burst. This proposed Quantum Key based Secure Hash Algorithm (QKBSHA-512) with enhanced compression function design provides better avalanche effect over the conventional integrity algorithms.

  19. A simple analytical model for dynamics of time-varying target leverage ratios

    NASA Astrophysics Data System (ADS)

    Lo, C. F.; Hui, C. H.

    2012-03-01

    In this paper we have formulated a simple theoretical model for the dynamics of the time-varying target leverage ratio of a firm under some assumptions based upon empirical observations. In our theoretical model the time evolution of the target leverage ratio of a firm can be derived self-consistently from a set of coupled Ito's stochastic differential equations governing the leverage ratios of an ensemble of firms by the nonlinear Fokker-Planck equation approach. The theoretically derived time paths of the target leverage ratio bear great resemblance to those used in the time-dependent stationary-leverage (TDSL) model [Hui et al., Int. Rev. Financ. Analy. 15, 220 (2006)]. Thus, our simple model is able to provide a theoretical foundation for the selected time paths of the target leverage ratio in the TDSL model. We also examine how the pace of the adjustment of a firm's target ratio, the volatility of the leverage ratio and the current leverage ratio affect the dynamics of the time-varying target leverage ratio. Hence, with the proposed dynamics of the time-dependent target leverage ratio, the TDSL model can be readily applied to generate the default probabilities of individual firms and to assess the default risk of the firms.

  20. Using Object Storage Technology vs Vendor Neutral Archives for an Image Data Repository Infrastructure.

    PubMed

    Bialecki, Brian; Park, James; Tilkin, Mike

    2016-08-01

    The intent of this project was to use object storage and its database, which has the ability to add custom extensible metadata to an imaging object being stored within the system, to harness the power of its search capabilities, and to close the technology gap that healthcare faces. This creates a non-disruptive tool that can be used natively by both legacy systems and the healthcare systems of today which leverage more advanced storage technologies. The base infrastructure can be populated alongside current workflows without any interruption to the delivery of services. In certain use cases, this technology can be seen as a true alternative to the VNA (Vendor Neutral Archive) systems implemented by healthcare today. The scalability, security, and ability to process complex objects makes this more than just storage for image data and a commodity to be consumed by PACS (Picture Archiving and Communication System) and workstations. Object storage is a smart technology that can be leveraged to create vendor independence, standards compliance, and a data repository that can be mined for truly relevant content by adding additional context to search capabilities. This functionality can lead to efficiencies in workflow and a wealth of minable data to improve outcomes into the future.

  1. Impartial institutions, pathogen stress and the expanding social network.

    PubMed

    Hruschka, Daniel; Efferson, Charles; Jiang, Ting; Falletta-Cowden, Ashlan; Sigurdsson, Sveinn; McNamara, Rita; Sands, Madeline; Munira, Shirajum; Slingerland, Edward; Henrich, Joseph

    2014-12-01

    Anthropologists have documented substantial cross-society variation in people's willingness to treat strangers with impartial, universal norms versus favoring members of their local community. Researchers have proposed several adaptive accounts for these differences. One variant of the pathogen stress hypothesis predicts that people will be more likely to favor local in-group members when they are under greater infectious disease threat. The material security hypothesis instead proposes that institutions that permit people to meet their basic needs through impartial interactions with strangers reinforce a tendency toward impartiality, whereas people lacking such institutions must rely on local community members to meet their basic needs. Some studies have examined these hypotheses using self-reported preferences, but not with behavioral measures. We conducted behavioral experiments in eight diverse societies that measure individuals' willingness to favor in-group members by ignoring an impartial rule. Consistent with the material security hypothesis, members of societies enjoying better-quality government services and food security show a stronger preference for following an impartial rule over investing in their local in-group. Our data show no support for the pathogen stress hypothesis as applied to favoring in-groups and instead suggest that favoring in-group members more closely reflects a general adaptive fit with social institutions that have arisen in each society.

  2. 13 CFR 108.1150 - Maximum amount of Leverage for a NMVC Company.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM SBA Financial Assistance for NMVC Companies (Leverage... percent of its Leverageable Capital. Conditional Commitments by SBA To Reserve Leverage for a NMVC Company ...

  3. Managing Risk in Mobile Applications with Formal Security Policies

    DTIC Science & Technology

    2013-04-01

    Alternatively, Breaux and Powers (2009) found the Business Process Modeling Notation ( BPMN ), a declarative language for describing business processes, to be...the Business Process Execution Language (BPEL), preferred as the candidate formal semantics for BPMN , only works for limited classes of BPMN models

  4. The double-edged sword of electronic health records: implications for patient disclosure.

    PubMed

    Campos-Castillo, Celeste; Anthony, Denise L

    2015-04-01

    Electronic health record (EHR) systems are linked to improvements in quality of care, yet also privacy and security risks. Results from research studies are mixed about whether patients withhold personal information from their providers to protect against the perceived EHR privacy and security risks. This study seeks to reconcile the mixed findings by focusing on whether accounting for patients' global ratings of care reveals a relationship between EHR provider-use and patient non-disclosure. A nationally representative sample from the 2012 Health Information National Trends Survey was analyzed using bivariate and multivariable logit regressions to examine whether global ratings of care suppress the relationship between EHR provider-use and patient non-disclosure. 13% of respondents reported having ever withheld information from a provider because of privacy/security concerns. Bivariate analysis showed that withholding information was unrelated to whether respondents' providers used an EHR. Multivariable analysis showed that accounting for respondents' global ratings of care revealed a positive relationship between having a provider who uses an EHR and withholding information. After accounting for global ratings of care, findings suggest that patients may non-disclose to providers to protect against the perceived EHR privacy and security risks. Despite evidence that EHRs inhibit patient disclosure, their advantages for promoting quality of care may outweigh the drawbacks. Clinicians should leverage the EHR's value in quality of care and discuss patients' privacy concerns during clinic visits, while policy makers should consider how to address the real and perceived privacy and security risks of EHRs. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butler, Nicholas; Watson, Erica E.; Wright, Kyle A.

    The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Mexico, GTRI first made contactmore » in 2005. The project then lost momentum and stalled. At the same time, GTRI’s cooperation with the Republic of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Mexico and to facilitate this cooperation, they offered to invite their Mexican counterparts to Colombia to observe its successful cooperation with GTRI. Shortly after that visit, the Government of Mexico agreed to move forward and requested that the cooperative efforts in Mexico be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians. As a result, 22 of Mexico’s largest radioactive sites have had security upgrades in place within 18 months of cooperation.« less

  6. Health Information Exchange: What do patients want?

    PubMed

    Medford-Davis, Laura N; Chang, Lawrence; Rhodes, Karin V

    2017-12-01

    To determine whether emergency department patients want to share their medical records across health systems through Health Information Exchange and if so, whether they prefer to sign consent or share their records automatically, 982 adult patients presenting to an emergency department participated in a questionnaire-based interview. The majority (N = 906; 92.3%) were willing to share their data in a Health Information Exchange. Half (N = 490; 49.9%) reported routinely getting healthcare outside the system and 78.6 percent reported having records in other systems. Of those who were willing to share their data in a Health Information Exchange, 54.3 percent wanted to sign consent but 90 percent of those would waive consent in the case of an emergency. Privacy and security were primary concerns of patients not willing to participate in Health Information Exchange and preferring to sign consent. Improved privacy and security protections could increase participation, and findings support consideration of "break-the-glass" provider access to Health Information Exchange records in an emergent situation.

  7. All bonds are not alike: A psychoendocrine evaluation of infant attachment.

    PubMed

    Gaudin, Sabrina; Chaillou, Elodie; Wycke, Marie-Anne; Cornilleau, Fabien; Moussu, Chantal; Calandreau, Ludovic; Lainé, Anne-Lyse; Nowak, Raymond

    2018-01-01

    Characteristics of attachment were assessed in peer- and object-reared lambs, and compared to mothered subjects by taking into consideration distress, proximity seeking, and exploration during two separation-reunion tests in both the familiar and a novel environment. Plasma cortisol and oxytocin were assayed as physiological indicators of stress and being comforted during the separation-reunion test. Rewarding properties of the familiar figures were also determined in a conditioned place preference-like paradigm. Between-group analysis revealed the existence of secure attachment with the mother, alteration of secure attachment with the peer and weaker attachment with the object. Weaker attachment was expressed by a lack of distress during separation in the home pen and no preference for the place conditioned with the familiar object. Elevated basal plasma oxytocin levels, but not cortisol, observed in maternally deprived lambs were more likely linked to the absence of a maternal figure rather than social comfort during reunion. © 2017 Wiley Periodicals, Inc.

  8. Leveraging the water-energy-food nexus for a sustainability transition: Institutional and policy design choices in a fragmented world (Invited)

    NASA Astrophysics Data System (ADS)

    Aggarwal, R.

    2013-12-01

    Given the critical - but often subtle - feedbacks between water, energy, and food security, a nexus approach that integrates management and governance across sectors and scales is increasingly being advocated in research and policy circles. As a first step, such an approach calls for an integrated multi-disciplinary assessment of the externalities across sectors and tradeoffs involved in enhancing security in one sector on the other sectors. Recent research efforts have focused on understanding these tradeoffs, say, through estimating the energy costs of expanding irrigation for greater food security; or estimating the embodied land and water costs in increased energy production. While such efforts have increased awareness about the inter-connectedness of such issues, the fundamental question of how such an understanding influences decision-making and how it can lead to coordinated action towards a transition to more sustainable pathways still remains largely unanswered. The long legacy of sectoral organization of political and bureaucratic structures has led to a fragmentary policy and institutional landscape, on which cross-sectoral public action and coordination poses several challenges. Moreover, poorly defined property rights, imperfect or absent markets, and uncertainty about resource dynamics imply that economic signals about relative scarcity in one sector are not necessarily clear to decision makers in the other sectors. In this study, we examine these issues related to water-energy food nexus in the context of semi-arid groundwater irrigated regions of western and southern India. Using a social-ecological systems framework, we begin by characterizing some of the key inter-dependencies among food, water, and energy at the farm household, village and state level. We then examine the factors that influence decision-making at these levels, and the extent to which these decisions internalize the externalities. Specifically, we examine the role of energy pricing and rationing policy on groundwater withdrawals and type of crops grown. Finally, we examine several emerging examples of innovative policies and institutions that have leveraged the synergies among sectors. Although these examples do not necessarily provide optimal solutions, these provide some clues as to how decision- making within individual sectors can be influenced through institutional and policy design to transition towards more sustainable pathways in a second best world. We conclude by exploring what lessons these cases might hold for navigating these tradeoffs in other contexts.

  9. Sex differences in Portuguese lonely hearts advertisements.

    PubMed

    Neto, Félix

    2005-10-01

    Advertisements from "Lonely Hearts" columns in the major daily Portuguese newspaper (Jornal de Notícias) were used to test hypotheses about the mate preferences of men and women. A total of 484 advertisements were coded for demographic descriptors and offers of and appeals for attractiveness, financial security, sincerity, expressiveness, and instrumentality, e.g., intelligence and ambition. Some results supported social exchange and evolutionary predictions: men sought younger women and offered security; women sought older men with status and resources. However, other results challenged such predictions: attractiveness and expressiveness did not differ by sex.

  10. The national operational environment model (NOEM)

    NASA Astrophysics Data System (ADS)

    Salerno, John J.; Romano, Brian; Geiler, Warren

    2011-06-01

    The National Operational Environment Model (NOEM) is a strategic analysis/assessment tool that provides insight into the complex state space (as a system) that is today's modern operational environment. The NOEM supports baseline forecasts by generating plausible futures based on the current state. It supports what-if analysis by forecasting ramifications of potential "Blue" actions on the environment. The NOEM also supports sensitivity analysis by identifying possible pressure (leverage) points in support of the Commander that resolves forecasted instabilities, and by ranking sensitivities in a list for each leverage point and response. The NOEM can be used to assist Decision Makers, Analysts and Researchers with understanding the inter-workings of a region or nation state, the consequences of implementing specific policies, and the ability to plug in new operational environment theories/models as they mature. The NOEM is built upon an open-source, license-free set of capabilities, and aims to provide support for pluggable modules that make up a given model. The NOEM currently has an extensive number of modules (e.g. economic, security & social well-being pieces such as critical infrastructure) completed along with a number of tools to exercise them. The focus this year is on modeling the social and behavioral aspects of a populace within their environment, primarily the formation of various interest groups, their beliefs, their requirements, their grievances, their affinities, and the likelihood of a wide range of their actions, depending on their perceived level of security and happiness. As such, several research efforts are currently underway to model human behavior from a group perspective, in the pursuit of eventual integration and balance of populace needs/demands within their respective operational environment and the capacity to meet those demands. In this paper we will provide an overview of the NOEM, the need for and a description of its main components. We will also provide a detailed discussion of the model and sample use cases.

  11. Understanding Determinants of Consumer Mobile Health Usage Intentions, Assimilation, and Channel Preferences

    PubMed Central

    Chen, Liwei; Pye, Jessica; Baird, Aaron

    2013-01-01

    Background Consumer use of mobile devices as health service delivery aids (mHealth) is growing, especially as smartphones become ubiquitous. However, questions remain as to how consumer traits, health perceptions, situational characteristics, and demographics may affect consumer mHealth usage intentions, assimilation, and channel preferences. Objective We examine how consumers’ personal innovativeness toward mobile services (PIMS), perceived health conditions, health care availability, health care utilization, demographics, and socioeconomic status affect their (1) mHealth usage intentions and extent of mHealth assimilation, and (2) preference for mHealth as a complement or substitute for in-person doctor visits. Methods Leveraging constructs from research in technology acceptance, technology assimilation, consumer behavior, and health informatics, we developed a cross-sectional online survey to study determinants of consumers’ mHealth usage intentions, assimilation, and channel preferences. Data were collected from 1132 nationally representative US consumers and analyzed by using moderated multivariate regressions and ANOVA. Results The results indicate that (1) 430 of 1132 consumers in our sample (37.99%) have started using mHealth, (2) a larger quantity of consumers are favorable to using mHealth as a complement to in-person doctor visits (758/1132, 66.96%) than as a substitute (532/1132, 47.00%), and (3) consumers’ PIMS and perceived health conditions have significant positive direct influences on mHealth usage intentions, assimilation, and channel preferences, and significant positive interactive influences on assimilation and channel preferences. The independent variables within the moderated regressions collectively explained 59.70% variance in mHealth usage intentions, 60.41% in mHealth assimilation, 34.29% in preference for complementary use of mHealth, and 45.30% in preference for substitutive use of mHealth. In a follow-up ANOVA examination, we found that those who were more favorable toward using mHealth as a substitute for in-person doctor visits than as a complement indicated stronger intentions to use mHealth (F 1,702=20.14, P<.001) and stronger assimilation of mHealth (F 1,702=41.866, P<.001). Conclusions Multiple predictors are shown to have significant associations with mHealth usage intentions, assimilation, and channel preferences. We suggest that future initiatives to promote mHealth should shift targeting of consumers from coarse demographics to nuanced considerations of individual dispositions toward mobile service innovations, complementary or substitutive channel use preferences, perceived health conditions, health services availability and utilization, demographics, and socioeconomic characteristics. PMID:23912839

  12. Understanding determinants of consumer mobile health usage intentions, assimilation, and channel preferences.

    PubMed

    Rai, Arun; Chen, Liwei; Pye, Jessica; Baird, Aaron

    2013-08-02

    Consumer use of mobile devices as health service delivery aids (mHealth) is growing, especially as smartphones become ubiquitous. However, questions remain as to how consumer traits, health perceptions, situational characteristics, and demographics may affect consumer mHealth usage intentions, assimilation, and channel preferences. We examine how consumers' personal innovativeness toward mobile services (PIMS), perceived health conditions, health care availability, health care utilization, demographics, and socioeconomic status affect their (1) mHealth usage intentions and extent of mHealth assimilation, and (2) preference for mHealth as a complement or substitute for in-person doctor visits. Leveraging constructs from research in technology acceptance, technology assimilation, consumer behavior, and health informatics, we developed a cross-sectional online survey to study determinants of consumers' mHealth usage intentions, assimilation, and channel preferences. Data were collected from 1132 nationally representative US consumers and analyzed by using moderated multivariate regressions and ANOVA. The results indicate that (1) 430 of 1132 consumers in our sample (37.99%) have started using mHealth, (2) a larger quantity of consumers are favorable to using mHealth as a complement to in-person doctor visits (758/1132, 66.96%) than as a substitute (532/1132, 47.00%), and (3) consumers' PIMS and perceived health conditions have significant positive direct influences on mHealth usage intentions, assimilation, and channel preferences, and significant positive interactive influences on assimilation and channel preferences. The independent variables within the moderated regressions collectively explained 59.70% variance in mHealth usage intentions, 60.41% in mHealth assimilation, 34.29% in preference for complementary use of mHealth, and 45.30% in preference for substitutive use of mHealth. In a follow-up ANOVA examination, we found that those who were more favorable toward using mHealth as a substitute for in-person doctor visits than as a complement indicated stronger intentions to use mHealth (F₁,₇₀₂=20.14, P<.001) and stronger assimilation of mHealth (F₁,₇₀₂=41.866, P<.001). Multiple predictors are shown to have significant associations with mHealth usage intentions, assimilation, and channel preferences. We suggest that future initiatives to promote mHealth should shift targeting of consumers from coarse demographics to nuanced considerations of individual dispositions toward mobile service innovations, complementary or substitutive channel use preferences, perceived health conditions, health services availability and utilization, demographics, and socioeconomic characteristics.

  13. Report of two preventive medicine job market surveys.

    PubMed

    Nitzkin, J L; Falcao, P; Janusz, N; Arraiano, J

    2001-01-01

    The American Association of Public Health Physicians (AAPHP) conducted two surveys to explore the value of general preventive medicine/public health (GPM) training and board certification to physicians seeking GPM jobs. The first survey reviewed advertisements in recent issues of four medical journals. The second surveyed physician registrants at the Prevention 99 meeting. The first survey screened about 18, 500 job advertisements. Of these, 1427 (7.7%) met the study's GPM screening criteria. Only 145 (10.6%) preferred an MPH, management, or related degree. Forty-one (2.9%) preferred a doctorate (MD/DO/PhD) and an MPH, management, or related degree. Only one (0. 07%) required or preferred GPM board certification. Results were consistent across market sectors (federal, state/local, academic, health care delivery) and across job roles (management, direct service, research, technical). The second survey gathered credential, job search, and employment data from 140 physician registrants at Prevention 99 (annual joint meeting of the American College of Preventive Medicine and the Association of Teachers of Preventive Medicine in March 1999). Seventy-eight (55.7%) reported that GPM training was of major importance in securing their current employment. Only 18.5% of physicians holding GPM jobs secured their current employment by responding to an advertisement. GPM board certification is of little or no value when competing for the vast majority of GPM-related jobs. The AAPHP recommends prompt coordinated action by national organizations representing GPM physicians to increase the number of job offerings preferring or requiring physicians with GPM board certification. A six-point action plan is proposed.

  14. An embedded processor for real-time atmoshperic compensation

    NASA Astrophysics Data System (ADS)

    Bodnar, Michael R.; Curt, Petersen F.; Ortiz, Fernando E.; Carrano, Carmen J.; Kelmelis, Eric J.

    2009-05-01

    Imaging over long distances is crucial to a number of defense and security applications, such as homeland security and launch tracking. However, the image quality obtained from current long-range optical systems can be severely degraded by the turbulent atmosphere in the path between the region under observation and the imager. While this obscured image information can be recovered using post-processing techniques, the computational complexity of such approaches has prohibited deployment in real-time scenarios. To overcome this limitation, we have coupled a state-of-the-art atmospheric compensation algorithm, the average-bispectrum speckle method, with a powerful FPGA-based embedded processing board. The end result is a light-weight, lower-power image processing system that improves the quality of long-range imagery in real-time, and uses modular video I/O to provide a flexible interface to most common digital and analog video transport methods. By leveraging the custom, reconfigurable nature of the FPGA, a 20x speed increase over a modern desktop PC was achieved in a form-factor that is compact, low-power, and field-deployable.

  15. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    PubMed

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  16. An overview of the DII-HEP OpenStack based CMS data analysis

    NASA Astrophysics Data System (ADS)

    Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.

    2015-05-01

    An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.

  17. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    NASA Technical Reports Server (NTRS)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  18. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    PubMed

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  19. A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing

    PubMed Central

    Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much. PMID:24688434

  20. Statistical Models for Predicting Threat Detection From Human Behavior.

    PubMed

    Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking.

  1. 20 CFR 435.15 - Metric system of measurement.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Metric system of measurement. 435.15 Section 435.15 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR... metric system is the preferred measurement system for U.S. trade and commerce. The Act requires each...

  2. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs.

    PubMed

    González-Tablas, Ana I; Tapiador, Juan E

    2016-05-11

    We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user's security preferences implicitly captured by policies already in place.

  3. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs

    PubMed Central

    González-Tablas, Ana I.; Tapiador, Juan E.

    2016-01-01

    We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user’s security preferences implicitly captured by policies already in place. PMID:27187385

  4. Army Net Zero Prove Out. Integrated Net Zero Best Practices

    DTIC Science & Technology

    2014-11-18

    leveraged to increase awareness. Public Service Announcements developed by the Army or other installations can be leveraged. Signage for...approaches can be leveraged to increase awareness. Public Service Announcements developed by the Army or other installations can be leveraged. Signage

  5. Fine-scale habitat use by orang-utans in a disturbed peat swamp forest, central Kalimantan, and implications for conservation management.

    PubMed

    Morrogh-Bernard, Helen C; Husson, Simon J; Harsanto, Fransiskus A; Chivers, David J

    2014-01-01

    This study was conducted to see how orang-utans (Pongo pygmaeus wurmbii) were coping with fine-scale habitat disturbance in a selectively logged peat swamp forest in Central Kalimantan, Borneo. Seven habitat classes were defined, and orang-utans were found to use all of these, but were selective in their preference for certain classes over others. Overall, the tall forest classes (≥20 m) were preferred. They were preferred for feeding, irrespective of canopy connectivity, whereas classes with a connected canopy (canopy cover ≥75%), irrespective of canopy height, were preferred for resting and nesting, suggesting that tall trees are preferred for feeding and connected canopy for security and protection. The smaller forest classes (≤10 m high) were least preferred and were used mainly for travelling from patch to patch. Thus, selective logging is demonstrated here to be compatible with orang-utan survival as long as large food trees and patches of primary forest remain. Logged forest, therefore, should not automatically be designated as 'degraded'. These findings have important implications for forest management, forest classification and the designation of protected areas for orang-utan conservation.

  6. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.

    PubMed

    Payyappalli, Vineet M; Zhuang, Jun; Jose, Victor Richmond R

    2017-11-01

    Most attacker-defender games consider players as risk neutral, whereas in reality attackers and defenders may be risk seeking or risk averse. This article studies the impact of players' risk preferences on their equilibrium behavior and its effect on the notion of deterrence. In particular, we study the effects of risk preferences in a single-period, sequential game where a defender has a continuous range of investment levels that could be strategically chosen to potentially deter an attack. This article presents analytic results related to the effect of attacker and defender risk preferences on the optimal defense effort level and their impact on the deterrence level. Numerical illustrations and some discussion of the effect of risk preferences on deterrence and the utility of using such a model are provided, as well as sensitivity analysis of continuous attack investment levels and uncertainty in the defender's beliefs about the attacker's risk preference. A key contribution of this article is the identification of specific scenarios in which the defender using a model that takes into account risk preferences would be better off than a defender using a traditional risk-neutral model. This study provides insights that could be used by policy analysts and decisionmakers involved in investment decisions in security and safety. © 2017 Society for Risk Analysis.

  7. Evolving perceptions of security - US National Security surveys 1993--1995. Progress report, September 30, 1995--November 14, 1995

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, K.G.; Jenkins-Smith, H.C.

    This study analyzes findings from a national survey of 2,490 randomly selected members of the US public conducted between September 30 and November 14, 1995. It provides an over time comparison of public perceptions about nuclear weapons risks and benefits and key nuclear policy issues between 1993 and 1995. Other areas of investigation include policy preferences regarding nuclear proliferation, terrorism, US/Russian nuclear cooperation, and personal security. Public perceptions of post-cold war security were found to be evolving in unexpected ways. The perceived threat of nuclear conflict involving the US had not declined, and the threat of nuclear conflict between othermore » countries and fears of nuclear proliferation and terrorism had increased. Perceived risks associated with managing the US nuclear arsenal were also higher. Perceptions of external and domestic benefits from US nuclear weapons were not declining. Support was found for increasing funding for nuclear weapons safety, training, and maintenance, but most respondents favored decreasing funding for developing and testing new nuclear weapons. Strong support was evident for programs and funding to prevent nuclear proliferation and terrorism. Though skeptical that nuclear weapons can be eliminated, most respondents supported reducing the US nuclear arsenal, banning nuclear test explosions, and ending production of fissile materials to make nuclear weapons. Statistically significant relationships were found between perceptions of nuclear weapons risks and benefits and policy and spending preferences. Demographic variables and basic social and political beliefs were systematically related both to risk and benefit perceptions and policy and spending options.« less

  8. Sequence determinants of improved CRISPR sgRNA design.

    PubMed

    Xu, Han; Xiao, Tengfei; Chen, Chen-Hao; Li, Wei; Meyer, Clifford A; Wu, Qiu; Wu, Di; Cong, Le; Zhang, Feng; Liu, Jun S; Brown, Myles; Liu, X Shirley

    2015-08-01

    The CRISPR/Cas9 system has revolutionized mammalian somatic cell genetics. Genome-wide functional screens using CRISPR/Cas9-mediated knockout or dCas9 fusion-mediated inhibition/activation (CRISPRi/a) are powerful techniques for discovering phenotype-associated gene function. We systematically assessed the DNA sequence features that contribute to single guide RNA (sgRNA) efficiency in CRISPR-based screens. Leveraging the information from multiple designs, we derived a new sequence model for predicting sgRNA efficiency in CRISPR/Cas9 knockout experiments. Our model confirmed known features and suggested new features including a preference for cytosine at the cleavage site. The model was experimentally validated for sgRNA-mediated mutation rate and protein knockout efficiency. Tested on independent data sets, the model achieved significant results in both positive and negative selection conditions and outperformed existing models. We also found that the sequence preference for CRISPRi/a is substantially different from that for CRISPR/Cas9 knockout and propose a new model for predicting sgRNA efficiency in CRISPRi/a experiments. These results facilitate the genome-wide design of improved sgRNA for both knockout and CRISPRi/a studies. © 2015 Xu et al.; Published by Cold Spring Harbor Laboratory Press.

  9. Housing preferences of young adults in Indonesia: housing attributes and consequences

    NASA Astrophysics Data System (ADS)

    Farasa, N.; Kusuma, H. E.

    2018-03-01

    Nowadays, the housing demand of young adults in Indonesia is important issues for the sustainable development of the market. Facing differences of life phases, such as marriage, leaving home after graduation, and new job positioning, young adults become the main segment facing constant housing choice decisions in the housing market. In their particular phase of life, young adults have distinct preferences for housing attributes which bring a great influence on their lives in the future. Data was gathered from a survey questionnaire that was answered by 180 young adults in Indonesia, ranging from age 22-33 years. The findings suggest that the green area and view, location, simplicity, home design, and accessibility are the significant parts as housing attributes for young adults’ housing preferences in Indonesia. The effect of these attributes has many consequences such as security, personalization, mood/ambiance, maintenance, interaction, image, flexibility, environmental, economy, durability, convenience, comfort, and circulation. The biggest group of young adults who prefer comfort as their wanted consequences tend to have high preferences on housing attributes of the green area and view, and simplicity.

  10. Final LDRD Report: Using Linkography of Cyber Attack Patterns to Inform Honeytoken Placement.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mitchell, Robert; Jarocki, John Charles; Fisher, Andrew N

    The war to establish cyber supremacy continues, and the literature is crowded with strictly technical cyber security measures. We present the results of a three year LDRD project using Linkography, a methodology new to the field of cyber security, we establish the foundation neces- sary to track and profile the microbehavior of humans attacking cyber systems. We also propose ways to leverage this understanding to influence and deceive these attackers. We studied the sci- ence of linkography, applied it to the cyber security domain, implemented a software package to manage linkographs, generated the preprocessing blocks necessary to ingest raw data,more » produced machine learning models, created ontology refinement algorithms and prototyped a web applica- tion for researchers and practitioners to apply linkography. Machine learning produced some of our key results: We trained and validated multinomial classifiers with a real world data set and predicted the attacker's next category of action with 86 to 98% accuracy; dimension reduction techniques indicated that the linkography-based features were among the most powerful. We also discovered ontology refinement algorithms that advanced the state of the art in linkography in general and cyber security in particular. We conclude that linkography is a viable tool for cyber security; we look forward to expanding our work to other data sources and using our prediction results to enable adversary deception techniques. Acknowledgements Thanks to Phil Bennett, Michael Bernard, Jeffrey Bigg, Marshall Daniels, Tyler Dean, David Dug- gan, Carson Kent, Josh Maine, Marci McBride, Nick Peterson, Katie Rodhouse, Asael Sorenson, Roger Suppona, Scott Watson and David Zage. We acknowledge support for this work by the LDRD Program at Sandia National Laboratories. Sandia National Laboratories is a multi-mission laboratory operated by Sandia Corporation for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This page intentionally left blank.« less

  11. Aerospace Communications Security Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to the intercom system for audio surveillance. Audio, video, and "black box" data were simultaneously streamed to the ground, where they were displayed to a Glenn audience of senior management and aviation security team members.

  12. Grids: The Top Ten Questions

    DOE PAGES

    Schopf, Jennifer M.; Nitzberg, Bill

    2002-01-01

    The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A distributed infrastructure capable of sophisticated computational functions can bring many benefits to scientific work, but poses many challenges, both technical and socio-political. Technical challenges include having basic software tools, higher-level services, functioning and pervasive security, and standards, while socio-political issues include building a user community, adding incentives for sites to be part of a user-centric environment, and educating funding sources about the needs of this community. This paper details the areasmore » relating to Grid research that we feel still need to be addressed to fully leverage the advantages of the Grid.« less

  13. Process and impact evaluation of a legal assistance and health care community partnership.

    PubMed

    Teufel, James A; Brown, Stephen L; Thorne, Woody; Goffinet, Diane M; Clemons, Latesha

    2009-07-01

    Community health partnerships have increased in popularity, but their effectiveness is often not evaluated. Through secondary data analysis, this study evaluates a program that offered access to legal services to address health-related issues, such as Medicaid reimbursement, Social Security benefits, medication coverage, and divorce. Based on the analysis reimbursements to expenditures, the health and law program appears to be cost-effective and thereby economically sustainable. The cost-effectiveness of this program increases the likelihood that it will be institutionalized and/or expanded. This program evaluation is used to exemplify how community stakeholders could partner to leverage resources to establish a sustainable community health and law program to address the needs of people living in medically underserved areas.

  14. Privacy Policy Enforcement for Ambient Ubiquitous Services

    NASA Astrophysics Data System (ADS)

    Oyomno, Were; Jäppinen, Pekka; Kerttula, Esa

    Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.

  15. Assessing What Factors Are Driving the Army Civilian Acquisition Multigenerational Workforce Age/Experience Mix

    DTIC Science & Technology

    2015-05-06

    45 viii ix Abstract Generation members are born, start school, enter the workforce, have children , and retire at about the...conformity, patience • Satisfaction is a job well done • Being respected • Prefer job security over entrepreneurship — cautious • Unadventurous

  16. 12 CFR 16.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... preferred stock or any derivative thereof. (j) OCC means the Office of the Comptroller of the Currency. (k... means the same as in Commission Rule 501(a) (17 CFR 230.501(a)). (b) Bank means an existing national... means the Securities and Exchange Commission. When used in the rules, regulations, or forms of the...

  17. Missile Defense and Poland’s Transatlantic Relationship: Stormy Water Ahead

    DTIC Science & Technology

    2007-01-01

    rather, on their preference for achieving security through multilateral institutions and a Kantian vision of a ―perpetual peace‖ achieved through...discussion raises a second question: at what level of generality can we even assume a unified European ethic ? Indeed, not all European states have

  18. 75 FR 21597 - Business Development Trade Mission to Baghdad, Iraq

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... total in Iraq), it is the largest city in Iraq and the second largest in the region. Iraq's gross... by participating in Embassy briefings, and explore additional opportunities at networking receptions...--Participants arrive in pre-arranged departure city and assemble on the preferred flight. Day 2--Security...

  19. U.S. Officials Scrutinize Colleges' Deals with Lenders

    ERIC Educational Resources Information Center

    Field, Kelly

    2007-01-01

    In December 2005, purchasing agents at Florida International University issued a request for proposals seeking banks and student-loan companies for a list of "preferred lenders" that the university planned to give to prospective borrowers. The request alone was not unusual. Many colleges use competitive bidding to secure attractive terms…

  20. Questioning the Questions: The Good, the Bad, and the Dicey in Fund-Raising and Alumni Surveys.

    ERIC Educational Resources Information Center

    Trimarco, Paola

    1994-01-01

    A discussion of college alumni surveys considers the kinds of information that are most helpful to the institution in fund raising, including names and preferred forms of address, significant others, demographics, Social Security numbers, occupational information, and income and net worth. (MSE)

  1. 19 CFR 10.608 - Submission of certificate of eligibility.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...-Central America-United States Free Trade Agreement Tariff Preference Level § 10.608 Submission of... 19 Customs Duties 1 2010-04-01 2010-04-01 false Submission of certificate of eligibility. 10.608 Section 10.608 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...

  2. ICS logging solution for network-based attacks using Gumistix technology

    NASA Astrophysics Data System (ADS)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  3. 17 CFR 31.8 - Cover of leverage contracts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... current market value of the commodity represented by each receipt. (ii) Warehouse receipts for gold bullion in the case of leverage contracts on bulk gold coins, bulk gold coins in the case of leverage contracts on gold bullion, silver bullion in the case of leverage contracts on bulk silver coins, bulk...

  4. 17 CFR 31.8 - Cover of leverage contracts.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... current market value of the commodity represented by each receipt. (ii) Warehouse receipts for gold bullion in the case of leverage contracts on bulk gold coins, bulk gold coins in the case of leverage contracts on gold bullion, silver bullion in the case of leverage contracts on bulk silver coins, bulk...

  5. 17 CFR 31.8 - Cover of leverage contracts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... current market value of the commodity represented by each receipt. (ii) Warehouse receipts for gold bullion in the case of leverage contracts on bulk gold coins, bulk gold coins in the case of leverage contracts on gold bullion, silver bullion in the case of leverage contracts on bulk silver coins, bulk...

  6. Solving multistage stochastic programming models of portfolio selection with outstanding liabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Edirisinghe, C.

    1994-12-31

    Models for portfolio selection in the presence of an outstanding liability have received significant attention, for example, models for pricing options. The problem may be described briefly as follows: given a set of risky securities (and a riskless security such as a bond), and given a set of cash flows, i.e., outstanding liability, to be met at some future date, determine an initial portfolio and a dynamic trading strategy for the underlying securities such that the initial cost of the portfolio is within a prescribed wealth level and the expected cash surpluses arising from trading is maximized. While the tradingmore » strategy should be self-financing, there may also be other restrictions such as leverage and short-sale constraints. Usually the treatment is limited to binomial evolution of uncertainty (of stock price), with possible extensions for developing computational bounds for multinomial generalizations. Posing as stochastic programming models of decision making, we investigate alternative efficient solution procedures under continuous evolution of uncertainty, for discrete time economies. We point out an important moment problem arising in the portfolio selection problem, the solution (or bounds) on which provides the basis for developing efficient computational algorithms. While the underlying stochastic program may be computationally tedious even for a modest number of trading opportunities (i.e., time periods), the derived algorithms may used to solve problems whose sizes are beyond those considered within stochastic optimization.« less

  7. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    PubMed

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  8. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    PubMed Central

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-01-01

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409

  9. Learning to Leverage Student Thinking: What Novice Approximations Teach Us about Ambitious Practice

    ERIC Educational Resources Information Center

    Singer-Gabella, Marcy; Stengel, Barbara; Shahan, Emily; Kim, Min-Joung

    2016-01-01

    Central to ambitious teaching is a constellation of practices we have come to call "leveraging student thinking." In leveraging, teachers position students' understanding and reasoning as a central means to drive learning forward. While leveraging typically is described as a feature of mature practice, in this article we examine…

  10. 13 CFR 108.1200 - SBA's Leverage commitment to a NMVC Company-application procedure, amount, and term.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NMVC Company-application procedure, amount, and term. 108.1200 Section 108.1200 Business Credit and... Assistance for NMVC Companies (Leverage) Conditional Commitments by Sba to Reserve Leverage for A Nmvc Company § 108.1200 SBA's Leverage commitment to a NMVC Company—application procedure, amount, and term. (a...

  11. 17 CFR 31.7 - Maintenance of minimum financial, cover and segregation requirements by leverage transaction...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... financial, cover and segregation requirements by leverage transaction merchants. 31.7 Section 31.7 Commodity... of minimum financial, cover and segregation requirements by leverage transaction merchants. (a) Each... required by § 31.8, or that the amount of leverage customer funds in segregation is less than is required...

  12. 17 CFR 31.7 - Maintenance of minimum financial, cover and segregation requirements by leverage transaction...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... financial, cover and segregation requirements by leverage transaction merchants. 31.7 Section 31.7 Commodity... of minimum financial, cover and segregation requirements by leverage transaction merchants. (a) Each... required by § 31.8, or that the amount of leverage customer funds in segregation is less than is required...

  13. Molecules for security measures: from keypad locks to advanced communication protocols.

    PubMed

    Andréasson, J; Pischel, U

    2018-04-03

    The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.

  14. Men's strategic preferences for femininity in female faces.

    PubMed

    Little, Anthony C; Jones, Benedict C; Feinberg, David R; Perrett, David I

    2014-08-01

    Several evolutionarily relevant sources of individual differences in face preference have been documented for women. Here, we examine three such sources of individual variation in men's preference for female facial femininity: term of relationship, partnership status and self-perceived attractiveness. We show that men prefer more feminine female faces when rating for a short-term relationship and when they have a partner (Study 1). These variables were found to interact in a follow-up study (Study 2). Men who thought themselves attractive also preferred more feminized female faces for short-term relationships than men who thought themselves less attractive (Study 1 and Study 2). In women, similar findings for masculine preferences in male faces have been interpreted as adaptive. In men, such preferences potentially reflect that attractive males are able to compete for high-quality female partners in short-term contexts. When a man has secured a mate, the potential cost of being discovered may increase his choosiness regarding short-term partners relative to unpartnered men, who can better increase their short-term mating success by relaxing their standards. Such potentially strategic preferences imply that men also face trade-offs when choosing relatively masculine or feminine faced partners. In line with a trade-off, women with feminine faces were seen as more likely to be unfaithful and more likely to pursue short-term relationships (Study 3), suggesting that risk of cuckoldry is one factor that may limit men's preferences for femininity in women and could additionally lead to preferences for femininity in short-term mates. © 2013 The British Psychological Society.

  15. Consumers' preferences for fresh yam: a focus group study.

    PubMed

    Barlagne, Carla; Cornet, Denis; Blazy, Jean-Marc; Diman, Jean-Louis; Ozier-Lafontaine, Harry

    2017-01-01

    In West and Central Africa and in the Caribbean, yam is one of the most important sources of carbohydrates and has a great potential to improve food security. The yam production sector is, however, now challenged by the satisfaction of evolving consumers' preferences. Since little is known about consumers' preferences regarding yams' characteristics, product quality, and the drivers of yam purchase, six focus group discussions were conducted (for a total of 31 participants). Among the purchasing criteria, price was considered more important than the others. It was followed by the external damage, the origin, and the size of the tuber. The most frequently cited consumption criteria were the taste, the texture, and color of flesh after cooking. Taste was considered more important than the other criteria. Three consumers' profiles were established reflecting heterogeneity in preferences, especially as concerns the willingness to pay for yam and consumption habits. They were designated as the Hedonistic, the Thrifty and the Flexible. Our results suggest that innovations can be implemented to sustain and stimulate the development of the yam sector in Guadeloupe. Two main development paths were identified. The first path is the valorization of the great existing diversity of yam varieties and the increase in the level of information for consumers about product attributes such as the cooking mode, the origin, and the mode of production. Building a marketing strategy based on the valorization of this diversity can help maintain and preserve yam's agro-biodiversity and the satisfaction of rapidly evolving consumption habits. The second path is the definition of yam ideotypes that suit consumers' needs. We expect that tailoring the production to consumers' needs will have a positive impact on global food security in the Caribbean region.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention onmore » elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the option of evaluating equipment from Seagate/Xyratex.) Outline: The remainder of this report is structured as follows: - Section 1: Describes the growing importance of secure storage architectures and highlights some challenges for HPC. - Section 2: Provides background information on HPC storage architectures, relevant supporting technologies for secure storage and details on OpenStack components related to storage. Note, that background material on HPC storage architectures in this chapter can be skipped if the reader is already familiar with Lustre and GPFS. - Section 3: A review of protection mechanisms in two HPC filesystems; details about available isolation, authentication/authorization and performance capabilities are discussed. - Section 4: Describe technologies that can be used to bridge gaps in HPC storage and filesystems to facilitate...« less

  17. 12 CFR 567.8 - Leverage ratio.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Leverage ratio. 567.8 Section 567.8 Banks and... § 567.8 Leverage ratio. (a) The minimum leverage capital requirement for a savings association assigned a composite rating of 1, as defined in § 516.3 of this chapter, shall consist of a ratio of core...

  18. Farmland Tenure Security in China: Influencing Factors of Actual and Perceived Farmland Tenure Security

    NASA Astrophysics Data System (ADS)

    Ren, Guangcheng; Zhu, Xueqin; Heerink, Nico; van Ierland, Ekko; Feng, Shuyi

    2017-04-01

    Tenure security plays an important role in farm households' investment, land renting and other decisions. Recent literature distinguishes between actual farmland tenure security (i.e. farm households' actual control of farmland) and perceived farmland tenure security (i.e. farm households' subjective understanding of their farmland tenure situation and expectation regarding government enforcement and equality of the law). However little is known on what factors influence the actual and perceived farmland tenure security in rural China. Theoretically, actual farmland tenure security is related to village self-governance as a major informal governance rule in rural China. Both economic efficiency and equity considerations are likely to play a role in the distribution of land and its tenure security. Household perceptions of farmland tenure security depend not only on the actual farmland tenure security in a village, but may also be affected by households' investment in and ability of changing social rules. Our study examines what factors contribute to differences in actual and perceived farmland tenure security between different villages and farm households in different regions of China. Applying probit models to the data collected from 1,485 households in 124 villages in Jiangsu, Jiangxi, Liaoning and Chongqing, we find that development of farmland rental market and degree of self-governance of a village have positive impacts, and development of labour market has a negative effect on actual farmland tenure security. Household perceptions of tenure security depend not only on actual farmland tenure security and on households' investment in and ability of changing social rules, but also on risk preferences of households. This finding has interesting policy implications for future land reforms in rural China.

  19. Resource allocation in health care and the role of personal autonomy.

    PubMed

    Gandjour, A

    2015-03-01

    Resource allocation decisions in health care require the consideration of ethical values. Major ethical theories include Amartya Sen's capability approach, Norman Daniels's theory of justice for health, and preference utilitarian theory. This paper argues that while only preference utilitarian theory explicitly considers the impact of an individual's actions on others, all 3 theories agree in terms of providing individual autonomy. Furthermore, it shows that all 3 theories emphasise the role of informed preferences in securing individual autonomy. Still, stressing personal autonomy has limited direct implications for priority setting. 2 priority rules for resource allocation could be identified: 1) to give priority to patients with mental disability (over those with pure physical disability); and 2) to give priority to patients with a large expected loss of autonomy without treatment. © Georg Thieme Verlag KG Stuttgart · New York.

  20. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  1. 78 FR 17985 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-25

    ... with customer bases of potential product users have indicated a preference that premium pricing for... options on the same security. In addition to giving market participants clarity as to the minimum pricing increments for Mini Options, the filing would harmonize penny pricing between Mini Options and standard...

  2. 78 FR 18407 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-26

    ... with customer bases of potential product users have indicated a preference that premium pricing for... clarity as to the minimum pricing increments for Mini Options, the filing would harmonize penny pricing... symbol'' of an underlying security and cannot differentiate, for purposes of minimum variation pricing...

  3. Random Assignment and Informed Consent: A Case Study of Multiple Perspectives

    ERIC Educational Resources Information Center

    Walker, Robert; Hoggart, Lesley; Hamilton, Gayle

    2008-01-01

    Although random assignment is generally the preferred methodology in impact evaluations, it raises numerous ethical concerns, some of which are addressed by securing participants' informed consent. However, there has been little investigation of how consent is obtained in social experiments and the amount of information that can be conveyed--and…

  4. 32 CFR 147.6 - Guidance D-Sexual behavior.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., exploitation, or duress, or reflects lack of judgment or discretion. 1 Sexual orientation or preference may not... 32 National Defense 1 2010-07-01 2010-07-01 false Guidance D-Sexual behavior. 147.6 Section 147.6... Guidance D—Sexual behavior. (a) The concern. Sexual behavior is a security concern if it involves a...

  5. A bill to clarify that certain banking entities are not required to divest from collateralized debt obligations backed by trust preferred securities under the Volcker Rule.

    THOMAS, 113th Congress

    Sen. Manchin, Joe, III [D-WV

    2014-01-09

    Senate - 01/09/2014 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. 77 FR 3590 - Covered Securities of Bats Exchange, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-25

    ... firms' incentives to list with one exchange versus another). \\78\\ It has been noted that NYSE and the...: A Theory of Cross-Listing and Endogenous Listing Standards, 82 J. Fin. Econ. 455, 456 (2006). See... exchanges (in terms of listings) will tend to be favored over smaller ones. In theory, this preference may...

  7. Settlement preferences in the disaster-prone areas of Brantas River

    NASA Astrophysics Data System (ADS)

    Hariyani, S.

    2018-01-01

    Kota Lama is one of the urban villages in Malang city that has settlements along the Brantas River. Kota Lama experienced three landslides and flooding in 2015 and one in 2016. Those disasters caused the community to take action of post-disaster recovery, yet the people still choose to remain living in Kota Lama. Therefore, the study aims at determining the preferences of the citizens living in disaster-prone areas in Brantas River. The research used a factor analysis of 12 variables: 1) neighbourhood situation, 2) air condition, 3) relations between neighbours, 4) security, 5) location, 6) customs, 7) ethnic diversity, 8) the presence of social groups, 9) the community’s customs and habits, 10) proximity to the economic facilities, 11) adequate educational facilities, and 12) adequate medical/health facilities. The results show that two factors have been formed, namely Factor 1 (access) comprising variables of neighbourhood situation, air condition, relations between neighbours, location, ethnic diversity, the presence of a social group, supporting positive habits at home, close to the economic facilities, educational facilities, as well as medical facilities, and Factor 2 (assurance) consisting of customs and security.

  8. 13 CFR 107.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... (Leverage) Funding Leverage by Use of Sba-Guaranteed Trust Certificates (âtcsâ) § 107.1610 Effect of... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 107.1610 Section 107.1610 Business Credit and Assistance SMALL...

  9. 13 CFR 107.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (Leverage) Funding Leverage by Use of Sba-Guaranteed Trust Certificates (âtcsâ) § 107.1610 Effect of... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 107.1610 Section 107.1610 Business Credit and Assistance SMALL...

  10. 13 CFR 108.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Companies (Leverage) Funding Leverage by Use of Sba Guaranteed Trust Certificates (âtcsâ) § 108.1610 Effect... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 108.1610 Section 108.1610 Business Credit and Assistance SMALL...

  11. 13 CFR 108.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Companies (Leverage) Funding Leverage by Use of Sba Guaranteed Trust Certificates (âtcsâ) § 108.1610 Effect... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 108.1610 Section 108.1610 Business Credit and Assistance SMALL...

  12. Buying on margin, selling short in an agent-based market model

    NASA Astrophysics Data System (ADS)

    Zhang, Ting; Li, Honggang

    2013-09-01

    Credit trading, or leverage trading, which includes buying on margin and selling short, plays an important role in financial markets, where agents tend to increase their leverages for increased profits. This paper presents an agent-based asset market model to study the effect of the permissive leverage level on traders’ wealth and overall market indicators. In this model, heterogeneous agents can assume fundamental value-converging expectations or trend-persistence expectations, and their effective demands of assets depend both on demand willingness and wealth constraints, where leverage can relieve the wealth constraints to some extent. The asset market price is determined by a market maker, who watches the market excess demand, and is influenced by noise factors. By simulations, we examine market results for different leverage ratios. At the individual level, we focus on how the leverage ratio influences agents’ wealth accumulation. At the market level, we focus on how the leverage ratio influences changes in the asset price, volatility, and trading volume. Qualitatively, our model provides some meaningful results supported by empirical facts. More importantly, we find a continuous phase transition as we increase the leverage threshold, which may provide a further prospective of credit trading.

  13. Change in career aspirations and job values from study time to working life.

    PubMed

    Rognstad, May-Karin; Aasland, Olaf

    2007-05-01

    The main aim of this paper is to uncover whether the actual career choices and job values of newly qualified nurses are in accordance with the predictions they made at the commencement of their nursing education. A cohort of Norwegian nurse students was followed from the beginning of their education in 1998 through nursing school and 2,years after graduating. Questionnaire data from 221 nursing students at three points in time: 1998, 2001 and 2003 were analysed with frequency distributions and paired samples t-tests. For 140 respondents data from all three points were available. Initially motives like human contact, helping others, job security were important, and 92% had a wish for further education. Career preferences were often midwifery, public heath and nursing practice in high tech areas. Towards the end of the bachelor course (2001), there was more ambiguity in the helping motives. On one hand, the students wanted to be altruistic but on the other hand, they wanted gratitude in return when giving help to patients. Seventy five per cent of the students had plans for further education within a period of about 2 years after graduation. Midwifery, public health work and high tech practice were still preferred. Findings from 2003 indicated only 16% had started or finished further education 2 years after graduation. When appraising future job challenges in 2001 and 2003, there is a decrease in emphasis on the values human contact and part-time work and an increase in emphasis on high salary and job security. During the student period, the bachelor programme was regarded as a basis for further education, but 2 years after graduation only 16% had realized further education. Preferences related to job values regarding a prospective job reveal a decrease in the importance of human contact and an increase in the importance of a high salary and job security from 2001 to 2003.

  14. Toward Game-Based Digital Mental Health Interventions: Player Habits and Preferences

    PubMed Central

    2017-01-01

    Background Designers of digital interventions for mental health often leverage interactions from games because the intrinsic motivation that results from game-based interventions may increase participation and translate into improved treatment efficacy. However, there are outstanding questions about the suitability (eg, are desktop or mobile interventions more appropriate?) and intervention potential (eg, do people with depression activate enough to play?) of games for mental health. Objective In this paper, we aimed to describe the presently unknown relationship between gaming activity and indicators of well-being so that designers make informed choices when designing game-based interventions for mental health. Methods We gathered validated scales of well-being (Beck’s Depression Inventory [BDI-II], Patient Health Questionnaire [PHQ-9], trait anxiety [TA], and basic psychological needs satisfaction [BPNS]), play importance (control over game behavior: control; gamer identity: identity), and play behavior (play frequency, platform preferences, and genre preferences) in a Web-based survey (N=491). Results The majority of our participants played games a few times a week (45.3%, 222/490) or daily (34.3%, 168/490). In terms of depression, play frequency was associated with PHQ-9 (P=.003); PHQ-9 scores were higher for those who played daily than for those who played a few times a week or less. Similarly, for BDI-II (P=.01), scores were higher for those who played daily than for those who played once a week or less. Genre preferences were not associated with PHQ-9 (P=.32) or BDI-II (P=.68); however, platform preference (ie, mobile, desktop, or console) was associated with PHQ-9 (P=.04); desktop-only players had higher PHQ-9 scores than those who used all platforms. Platform preference was not associated with BDI-II (P=.18). In terms of anxiety, TA was not associated with frequency (P=.23), platform preference (P=.07), or genre preference (P=.99). In terms of needs satisfaction, BPNS was not associated with frequency (P=.25) or genre preference (P=.53), but it was associated with platform preference (P=.01); desktop-only players had lower needs satisfaction than those who used all platforms. As expected, play frequency was associated with identity (P<.001) and control (P<.001); those who played more had identified more as a gamer and had less control over their gameplay. Genre preference was associated with identity (P<.001) and control (P<.001); those who played most common genres had higher control over their play and identified most as gamers. Platform preference was not associated with control (P=.80), but was with identity (P=.001); those who played on all devices identified more as a gamer than those who played on mobiles or consoles only. Conclusions Our results suggest that games are a suitable approach for mental health interventions as they are played broadly by people across a range of indicators of mental health. We further unpack the platform preferences and genre preferences of players with varying levels of well-being. PMID:28428161

  15. Toward Game-Based Digital Mental Health Interventions: Player Habits and Preferences.

    PubMed

    Mandryk, Regan Lee; Birk, Max Valentin

    2017-04-20

    Designers of digital interventions for mental health often leverage interactions from games because the intrinsic motivation that results from game-based interventions may increase participation and translate into improved treatment efficacy. However, there are outstanding questions about the suitability (eg, are desktop or mobile interventions more appropriate?) and intervention potential (eg, do people with depression activate enough to play?) of games for mental health. In this paper, we aimed to describe the presently unknown relationship between gaming activity and indicators of well-being so that designers make informed choices when designing game-based interventions for mental health. We gathered validated scales of well-being (Beck's Depression Inventory [BDI-II], Patient Health Questionnaire [PHQ-9], trait anxiety [TA], and basic psychological needs satisfaction [BPNS]), play importance (control over game behavior: control; gamer identity: identity), and play behavior (play frequency, platform preferences, and genre preferences) in a Web-based survey (N=491). The majority of our participants played games a few times a week (45.3%, 222/490) or daily (34.3%, 168/490). In terms of depression, play frequency was associated with PHQ-9 (P=.003); PHQ-9 scores were higher for those who played daily than for those who played a few times a week or less. Similarly, for BDI-II (P=.01), scores were higher for those who played daily than for those who played once a week or less. Genre preferences were not associated with PHQ-9 (P=.32) or BDI-II (P=.68); however, platform preference (ie, mobile, desktop, or console) was associated with PHQ-9 (P=.04); desktop-only players had higher PHQ-9 scores than those who used all platforms. Platform preference was not associated with BDI-II (P=.18). In terms of anxiety, TA was not associated with frequency (P=.23), platform preference (P=.07), or genre preference (P=.99). In terms of needs satisfaction, BPNS was not associated with frequency (P=.25) or genre preference (P=.53), but it was associated with platform preference (P=.01); desktop-only players had lower needs satisfaction than those who used all platforms. As expected, play frequency was associated with identity (P<.001) and control (P<.001); those who played more had identified more as a gamer and had less control over their gameplay. Genre preference was associated with identity (P<.001) and control (P<.001); those who played most common genres had higher control over their play and identified most as gamers. Platform preference was not associated with control (P=.80), but was with identity (P=.001); those who played on all devices identified more as a gamer than those who played on mobiles or consoles only. Our results suggest that games are a suitable approach for mental health interventions as they are played broadly by people across a range of indicators of mental health. We further unpack the platform preferences and genre preferences of players with varying levels of well-being. ©Regan Lee Mandryk, Max Valentin Birk. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 20.04.2017.

  16. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    PubMed

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  17. 78 FR 62834 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Order Granting Approval of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... in inverse ETFs, the Fund will not invest in leveraged or inverse leveraged (e.g., 2X or -3X) ETFs..., according to the Exchange, the Fund's ownership and control of the First Trust Subsidiary will prevent the.... The Fund may invest in inverse ETFs, but it will not invest in leveraged or inverse leveraged ETFs...

  18. Stimulus generalization as a mechanism for learning to trust

    PubMed Central

    FeldmanHall, Oriel; Dunsmoor, Joseph E.; Tompary, Alexa; Hunter, Lindsay E.; Todorov, Alexander; Phelps, Elizabeth A.

    2018-01-01

    How do humans learn to trust unfamiliar others? Decisions in the absence of direct knowledge rely on our ability to generalize from past experiences and are often shaped by the degree of similarity between prior experience and novel situations. Here, we leverage a stimulus generalization framework to examine how perceptual similarity between known individuals and unfamiliar strangers shapes social learning. In a behavioral study, subjects play an iterative trust game with three partners who exhibit highly trustworthy, somewhat trustworthy, or highly untrustworthy behavior. After learning who can be trusted, subjects select new partners for a second game. Unbeknownst to subjects, each potential new partner was parametrically morphed with one of the three original players. Results reveal that subjects prefer to play with strangers who implicitly resemble the original player they previously learned was trustworthy and avoid playing with strangers resembling the untrustworthy player. These decisions to trust or distrust strangers formed a generalization gradient that converged toward baseline as perceptual similarity to the original player diminished. In a second imaging experiment we replicate these behavioral gradients and leverage multivariate pattern similarity analyses to reveal that a tuning profile of activation patterns in the amygdala selectively captures increasing perceptions of untrustworthiness. We additionally observe that within the caudate adaptive choices to trust rely on neural activation patterns similar to those elicited when learning about unrelated, but perceptually familiar, individuals. Together, these findings suggest an associative learning mechanism efficiently deploys moral information encoded from past experiences to guide future choice. PMID:29378964

  19. Dynamic Tunnel Usability Study: Format Recommendations for Synthetic Vision System Primary Flight Displays

    NASA Technical Reports Server (NTRS)

    Arthur, Jarvis J., III; Prinzel, Lawrence J., III; Kramer, Lynda J.; Bailey, Randall E.

    2006-01-01

    A usability study evaluating dynamic tunnel concepts has been completed under the Aviation Safety and Security Program, Synthetic Vision Systems Project. The usability study was conducted in the Visual Imaging Simulator for Transport Aircraft Systems (VISTAS) III simulator in the form of questionnaires and pilot-in-the-loop simulation sessions. Twelve commercial pilots participated in the study to determine their preferences via paired comparisons and subjective rankings regarding the color, line thickness and sensitivity of the dynamic tunnel. The results of the study showed that color was not significant in pilot preference paired comparisons or in pilot rankings. Line thickness was significant for both pilot preference paired comparisons and in pilot rankings. The preferred line/halo thickness combination was a line width of 3 pixels and a halo of 4 pixels. Finally, pilots were asked their preference for the current dynamic tunnel compared to a less sensitive dynamic tunnel. The current dynamic tunnel constantly gives feedback to the pilot with regard to path error while the less sensitive tunnel only changes as the path error approaches the edges of the tunnel. The tunnel sensitivity comparison results were not statistically significant.

  20. How will I be remembered? Conserving the environment for the sake of one's legacy.

    PubMed

    Zaval, Lisa; Markowitz, Ezra M; Weber, Elke U

    2015-02-01

    Long time horizons and social distance are viewed as key psychological barriers to proenvironmental action, particularly regarding climate change. We suggest that these challenges can be turned into opportunities by making salient long-term goals and motives, thus shifting preferences between the present self and future others. We tested whether individuals' motivation to leave a positive legacy can be leveraged to increase engagement with climate change and other environmental problems. In a pilot study, we found that individual differences in legacy motivation were positively associated with proenvironmental behaviors and intentions. In a subsequent experiment, we demonstrated that priming legacy motives increased donations to an environmental charity, proenvironmental intentions, and climate-change beliefs. Domain-general legacy motives represent a previously understudied and powerful mechanism for promoting proenvironmental behavior. © The Author(s) 2015.

  1. Leveraging complex understandings of urban education for transformative science pedagogy

    NASA Astrophysics Data System (ADS)

    Davis, Natalie R.; Ingber, Jenny; McLaughlin, Cheryl A.

    2014-12-01

    Despite the abundance of literature that attests to a myriad of complex and entrenched problems within urban education, the authors of this forum maintain that in addition to shedding light on oppressive structures and ideologies, critical pedagogues must remain steadfastly engaged in solution-oriented endeavors. Using Cheryl McLaughlin's analysis as a worthy starting point, we consider both old paradigms and new ideas regarding the transformation of public science education. Topics for discussion include theoretical framing, urban teacher preparation, science education reform approaches, and the role of scholarship. While it is evident that securing rigorous and empowering science education for diverse learners will require arduous, collective effort on many fronts, this text upholds a sense of optimism in the potential of activist-teacher-researchers to overcome barriers to liberatory science teaching and learning.

  2. A comparative study of machine learning models for ethnicity classification

    NASA Astrophysics Data System (ADS)

    Trivedi, Advait; Bessie Amali, D. Geraldine

    2017-11-01

    This paper endeavours to adopt a machine learning approach to solve the problem of ethnicity recognition. Ethnicity identification is an important vision problem with its use cases being extended to various domains. Despite the multitude of complexity involved, ethnicity identification comes naturally to humans. This meta information can be leveraged to make several decisions, be it in target marketing or security. With the recent development of intelligent systems a sub module to efficiently capture ethnicity would be useful in several use cases. Several attempts to identify an ideal learning model to represent a multi-ethnic dataset have been recorded. A comparative study of classifiers such as support vector machines, logistic regression has been documented. Experimental results indicate that the logical classifier provides a much accurate classification than the support vector machine.

  3. The Economic and Social Value of an Image Exchange Network: A Case for the Cloud.

    PubMed

    Mayo, Ray Cody; Pearson, Kathryn L; Avrin, David E; Leung, Jessica W T

    2017-01-01

    As the health care environment continually changes, radiologists look to the ACR's Imaging 3.0 ® initiative to guide the search for value. By leveraging new technology, a cloud-based image exchange network could provide secure universal access to prior images, which were previously siloed, to facilitate accurate interpretation, improved outcomes, and reduced costs. The breast imaging department represents a viable starting point given the robust data supporting the benefit of access to prior imaging studies, existing infrastructure for image sharing, and the current workflow reliance on prior images. This concept is scalable not only to the remainder of the radiology department but also to the broader medical record. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  4. Configuration Management and Infrastructure Monitoring Using CFEngine and Icinga for Real-time Heterogeneous Data Taking Environment

    NASA Astrophysics Data System (ADS)

    Poat, M. D.; Lauret, J.; Betts, W.

    2015-12-01

    The STAR online computing environment is an intensive ever-growing system used for real-time data collection and analysis. Composed of heterogeneous and sometimes groups of custom-tuned machines, the computing infrastructure was previously managed by manual configurations and inconsistently monitored by a combination of tools. This situation led to configuration inconsistency and an overload of repetitive tasks along with lackluster communication between personnel and machines. Globally securing this heterogeneous cyberinfrastructure was tedious at best and an agile, policy-driven system ensuring consistency, was pursued. Three configuration management tools, Chef, Puppet, and CFEngine have been compared in reliability, versatility and performance along with a comparison of infrastructure monitoring tools Nagios and Icinga. STAR has selected the CFEngine configuration management tool and the Icinga infrastructure monitoring system leading to a versatile and sustainable solution. By leveraging these two tools STAR can now swiftly upgrade and modify the environment to its needs with ease as well as promptly react to cyber-security requests. By creating a sustainable long term monitoring solution, the detection of failures was reduced from days to minutes, allowing rapid actions before the issues become dire problems, potentially causing loss of precious experimental data or uptime.

  5. Real-time embedded atmospheric compensation for long-range imaging using the average bispectrum speckle method

    NASA Astrophysics Data System (ADS)

    Curt, Petersen F.; Bodnar, Michael R.; Ortiz, Fernando E.; Carrano, Carmen J.; Kelmelis, Eric J.

    2009-02-01

    While imaging over long distances is critical to a number of security and defense applications, such as homeland security and launch tracking, current optical systems are limited in resolving power. This is largely a result of the turbulent atmosphere in the path between the region under observation and the imaging system, which can severely degrade captured imagery. There are a variety of post-processing techniques capable of recovering this obscured image information; however, the computational complexity of such approaches has prohibited real-time deployment and hampers the usability of these technologies in many scenarios. To overcome this limitation, we have designed and manufactured an embedded image processing system based on commodity hardware which can compensate for these atmospheric disturbances in real-time. Our system consists of a reformulation of the average bispectrum speckle method coupled with a high-end FPGA processing board, and employs modular I/O capable of interfacing with most common digital and analog video transport methods (composite, component, VGA, DVI, SDI, HD-SDI, etc.). By leveraging the custom, reconfigurable nature of the FPGA, we have achieved performance twenty times faster than a modern desktop PC, in a form-factor that is compact, low-power, and field-deployable.

  6. FHIR Healthcare Directories: Adopting Shared Interfaces to Achieve Interoperable Medical Device Data Integration.

    PubMed

    Tyndall, Timothy; Tyndall, Ayami

    2018-01-01

    Healthcare directories are vital for interoperability among healthcare providers, researchers and patients. Past efforts at directory services have not provided the tools to allow integration of the diverse data sources. Many are overly strict, incompatible with legacy databases, and do not provide Data Provenance. A more architecture-independent system is needed to enable secure, GDPR-compatible (8) service discovery across organizational boundaries. We review our development of a portable Data Provenance Toolkit supporting provenance within Health Information Exchange (HIE) systems. The Toolkit has been integrated with client software and successfully leveraged in clinical data integration. The Toolkit validates provenance stored in a Blockchain or Directory record and creates provenance signatures, providing standardized provenance that moves with the data. This healthcare directory suite implements discovery of healthcare data by HIE and EHR systems via FHIR. Shortcomings of past directory efforts include the ability to map complex datasets and enabling interoperability via exchange endpoint discovery. By delivering data without dictating how it is stored we improve exchange and facilitate discovery on a multi-national level through open source, fully interoperable tools. With the development of Data Provenance resources we enhance exchange and improve security and usability throughout the health data continuum.

  7. Hitchhiker's guide to multi-dimensional plant pathology.

    PubMed

    Saunders, Diane G O

    2015-02-01

    Filamentous pathogens pose a substantial threat to global food security. One central question in plant pathology is how pathogens cause infection and manage to evade or suppress plant immunity to promote disease. With many technological advances over the past decade, including DNA sequencing technology, an array of new tools has become embedded within the toolbox of next-generation plant pathologists. By employing a multidisciplinary approach plant pathologists can fully leverage these technical advances to answer key questions in plant pathology, aimed at achieving global food security. This review discusses the impact of: cell biology and genetics on progressing our understanding of infection structure formation on the leaf surface; biochemical and molecular analysis to study how pathogens subdue plant immunity and manipulate plant processes through effectors; genomics and DNA sequencing technologies on all areas of plant pathology; and new forms of collaboration on accelerating exploitation of big data. As we embark on the next phase in plant pathology, the integration of systems biology promises to provide a holistic perspective of plant–pathogen interactions from big data and only once we fully appreciate these complexities can we design truly sustainable solutions to preserve our resources.

  8. Potential of Securitization in Solar PV Finance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lowder, Travis; Mendelsohn, Michael

    This report aims to demonstrate, hypothetically and at a high level, what volumes of solar deployment could be supported given solar industry access to the capital markets in the form of security issuance. Securitization is not anticipated to replace tax equity in the near- to mid-term, but it could provide an additional source of funds that would be comparatively inexpensive and could reduce the weighted average cost of capital for a given solar project or portfolio. Thus, the potential to securitize solar assets and seek financing in the capital markets could help to sustain the solar industry when the investmentmore » tax credit (ITC) -- one of the federal incentives that has leveraged billions of dollars of private capital in the solar industry -- drops from 30% to 10% at the close of 2016. The report offers analysis on the size of the U.S. third-party financed solar market, as well as on the volumes (in MW) of solar asset origination possible through a $100 million securitization fund (assuming no overcollateralization). It also provides data on the size of the relevant securities markets and how the solar asset class may fit into these markets.« less

  9. Meeting Regulatory Needs.

    PubMed

    Weber, Michael Fred

    2017-02-01

    The world is experiencing change at an unprecedented pace, as reflected in social, cultural, economic, political, and technological advances around the globe. Regulatory agencies, like the U.S. Nuclear Regulatory Commission (NRC), must also transform in response to and in preparation for these changes. In 2014, the NRC staff commenced Project Aim 2020 to transform the agency by enhancing efficiency, agility, and responsiveness, while accomplishing NRC's safety and security mission. Following Commission review and approval in 2015, the NRC began implementing the approved strategies, including strategic workforce planning to provide confidence that NRC will have employees with the right skills and talents at the right time to accomplish the agency's mission. Based on the work conducted so far, ensuring an adequate pipeline of radiation protection professionals is a significant need that NRC shares with states and other government agencies, private industry, academia, as well as international counterparts. NRC is working to ensure that sufficient radiation protection professionals will be available to fulfill its safety and security mission and leverage the work of the National Council on Radiation Protection and Measurements, the Conference of Radiation Control Program Directors, the Health Physics Society, the Organization of Agreement States, the International Atomic Energy Agency, the Nuclear Energy Agency, and others.

  10. Mixed-Method Quasi-Experimental Study of Outcomes of a Large-Scale Multilevel Economic and Food Security Intervention on HIV Vulnerability in Rural Malawi.

    PubMed

    Weinhardt, Lance S; Galvao, Loren W; Yan, Alice F; Stevens, Patricia; Mwenyekonde, Thokozani Ng'ombe; Ngui, Emmanuel; Emer, Lindsay; Grande, Katarina M; Mkandawire-Valhmu, Lucy; Watkins, Susan C

    2017-03-01

    The objective of the Savings, Agriculture, Governance, and Empowerment for Health (SAGE4Health) study was to evaluate the impact of a large-scale multi-level economic and food security intervention on health outcomes and HIV vulnerability in rural Malawi. The study employed a quasi-experimental non-equivalent control group design to compare intervention participants (n = 598) with people participating in unrelated programs in distinct but similar geographical areas (control, n = 301). We conducted participant interviews at baseline, 18-, and 36-months on HIV vulnerability and related health outcomes, food security, and economic vulnerability. Randomly selected households (n = 1002) were interviewed in the intervention and control areas at baseline and 36 months. Compared to the control group, the intervention led to increased HIV testing (OR 1.90; 95 % CI 1.29-2.78) and HIV case finding (OR = 2.13; 95 % CI 1.07-4.22); decreased food insecurity (OR = 0.74; 95 % CI 0.63-0.87), increased nutritional diversity, and improved economic resilience to shocks. Most effects were sustained over a 3-year period. Further, no significant differences in change were found over the 3-year study period on surveys of randomly selected households in the intervention and control areas. Although there were general trends toward improvement in the study area, only intervention participants' outcomes were significantly better. Results indicate the intervention can improve economic and food security and HIV vulnerability through increased testing and case finding. Leveraging the resources of economic development NGOs to deliver locally-developed programs with scientific funding to conduct controlled evaluations has the potential to accelerate the scientific evidence base for the effects of economic development programs on health.

  11. Lightweight CoAP-Based Bootstrapping Service for the Internet of Things.

    PubMed

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael

    2016-03-11

    The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length.

  12. Lightweight CoAP-Based Bootstrapping Service for the Internet of Things

    PubMed Central

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael

    2016-01-01

    The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length. PMID:26978362

  13. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    NASA Astrophysics Data System (ADS)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  14. Nuclear reactor downcomer flow deflector

    DOEpatents

    Gilmore, Charles B [Greensburg, PA; Altman, David A [Pittsburgh, PA; Singleton, Norman R [Murrysville, PA

    2011-02-15

    A nuclear reactor having a coolant flow deflector secured to a reactor core barrel in line with a coolant inlet nozzle. The flow deflector redirects incoming coolant down an annulus between the core barrel and the reactor vessel. The deflector has a main body with a front side facing the fluid inlet nozzle and a rear side facing the core barrel. The rear side of the main body has at least one protrusion secured to the core barrel so that a gap exists between the rear side of the main body adjacent the protrusion and the core barrel. Preferably, the protrusion is a relief that circumscribes the rear side of the main body.

  15. Hybrid methods for cybersecurity analysis :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less

  16. Statistical Models for Predicting Threat Detection From Human Behavior

    PubMed Central

    Kelley, Timothy; Amon, Mary J.; Bertenthal, Bennett I.

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking. PMID:29713296

  17. Forecasting stock return volatility: A comparison between the roles of short-term and long-term leverage effects

    NASA Astrophysics Data System (ADS)

    Pan, Zhiyuan; Liu, Li

    2018-02-01

    In this paper, we extend the GARCH-MIDAS model proposed by Engle et al. (2013) to account for the leverage effect in short-term and long-term volatility components. Our in-sample evidence suggests that both short-term and long-term negative returns can cause higher future volatility than positive returns. Out-of-sample results show that the predictive ability of GARCH-MIDAS is significantly improved after taking the leverage effect into account. The leverage effect for short-term volatility component plays more important role than the leverage effect for long-term volatility component in affecting out-of-sample forecasting performance.

  18. Framing and conflict: aspiration level contingency, the status quo, and current theories of risky choice.

    PubMed

    Schneider, S L

    1992-09-01

    The effect of positive versus negative frames on risky choice was examined for a variety of scenarios and risks. Preferences in the positive domain were strong and mainly risk averse, with notable exceptions. Preferences in the negative domain, however, were marked by their inconsistency, shown both by an overwhelming lack of significant majority preferences and a surprisingly strong tendency of individual subjects to vacillate in their negatively framed choices across presentations. This finding is accounted for by a proposed aspiration level contingency in which aspiration levels are systematically set to be more difficult to achieve in the face of a perceived loss than a gain. The implications of the results, and the aspiration level contingency, are explored with respect to current theories of risky choice, including Kahneman and Tversky's (1979) prospect theory and Lopes's (1987, 1990) security-potential/aspiration theory.

  19. Mate attraction, retention and expulsion.

    PubMed

    Miner, Emily J; Shackelford, Todd K

    2010-02-01

    Sexual selection theory and parental investment theory have guided much of the evolutionary psychological research on human mating. Based on these theories, researchers have predicted and found sex differences in mating preferences and behaviors. Men generally prefer that their long-term partners are youthful and physically attractive. Women generally prefer that their long-term partners have existing resources or clear potential for securing resources and display a willingness to invest those resources in children the relationship might produce. Both men and women, however, desire long-term partners who are kind and intelligent. Once a partner is obtained, men and women act in sex-specific ways to ensure the continuation and exclusivity of the relationship. Men, in particular, engage in behaviors designed to prevent, correct, and anticipate their partner's sexual infidelity. Relationships dissolve for evolutionarily-relevant reasons: infidelity, childlessness, and infertility. The discussion addresses directions for future research.

  20. Student Preferences and Experiences in Online Thesis Advising: A Case Study of Universitas Terbuka

    ERIC Educational Resources Information Center

    Suciati

    2011-01-01

    Online learning and communication requires new perspectives and habits of learning which oftentimes are not readily acquired by students and faculties. The sense of security in the old habits of face-to-face learning may become a hindrance in the development of positive attitude and ease in online communication. This study explored student…

Top