SNMG: a social-level norm-based methodology for macro-governing service collaboration processes
NASA Astrophysics Data System (ADS)
Gao, Ji; Lv, Hexin; Jin, Zhiyong; Xu, Ping
2017-08-01
In order to adapt to the accelerative open tendency of collaborations between enterprises, this paper proposes a Social-level Norm-based methodology for Macro-Governing service collaboration processes, called SNMG, to regulate and control the social-level visible macro-behaviors of the social individuals participating in collaborations. SNMG not only can remove effectively the uncontrollability hindrance confronted with by open social activities, but also enables across-management-domain collaborations to be implemented by uniting the centralized controls of social individuals for respective social activities. Therefore, this paper provides a brand-new system construction mode to promote the development and large-scale deployment of service collaborations.
[Deregulation and equity: the Obras Sociales reconversion process in Argentina].
Findling, Liliana; Arrunada, María; Klimovsky, Ezequiel
2002-01-01
The health care services managed by trade unions and known as "Obras Sociales" form the groundwork for Argentina's Social Security and Health system. However, far from taking an equitable approach, these institutions highlight the country's prevailing income disparities, which in turn lead to major differences in access to care. The main focus of this study was the reformulation of social security health policies within the framework of deregulation from 1998 to 2000, analyzing the effects on availability of health care services from an equity perspective. The methodology used two related analytical levels: (1) a macro level viewing the process from the various players' strategies and (2) a micro level featuring the changes within a well-known trade union social security organization during its reconversion process, emphasizing its institutional scope and the opinions of its membership. The results thus pointed to the slow implementation of reforms initiated by the public sector, hindered by constant negotiations among the main corporate actors seeking to serve their particular interests, along with increased inequity and fragmentation due to the limited opening of free choice by members.
Some methodological issues in the longitudinal analysis of demographic data.
Krishinan, P
1982-12-01
Most demographic data are macro (or aggregate) in nature. Some relevant methodological issues are presented here in a time series study using aggregate data. The micro-macro distinction is relative. Time enters into the micro and macro variables in different ways. A simple micro model of rural-urban migration is given. Method 1 is to assume homogeneity in behavior. Method 2 is a Bayesian estimation. A discusssion of the results follows. Time series models of aggregate data are given. The nature of the model--predictive or explanatory--must be decided on. Explanatory models in longitudinal studies have been developed. Ways to go to the micro level from the macro are discussed. The aggregation-disaggregation problem in demography is not similar to that in econometrics. To understand small populations, separate micro level data have to be collected and analyzed and appropriate models developed. Both types of models have their uses.
Model and Analytic Processes for Export License Assessments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thompson, Sandra E.; Whitney, Paul D.; Weimar, Mark R.
2011-09-29
This paper represents the Department of Energy Office of Nonproliferation Research and Development (NA-22) Simulations, Algorithms and Modeling (SAM) Program's first effort to identify and frame analytical methods and tools to aid export control professionals in effectively predicting proliferation intent; a complex, multi-step and multi-agency process. The report focuses on analytical modeling methodologies that alone, or combined, may improve the proliferation export control license approval process. It is a follow-up to an earlier paper describing information sources and environments related to international nuclear technology transfer. This report describes the decision criteria used to evaluate modeling techniques and tools to determinemore » which approaches will be investigated during the final 2 years of the project. The report also details the motivation for why new modeling techniques and tools are needed. The analytical modeling methodologies will enable analysts to evaluate the information environment for relevance to detecting proliferation intent, with specific focus on assessing risks associated with transferring dual-use technologies. Dual-use technologies can be used in both weapons and commercial enterprises. A decision-framework was developed to evaluate which of the different analytical modeling methodologies would be most appropriate conditional on the uniqueness of the approach, data availability, laboratory capabilities, relevance to NA-22 and Office of Arms Control and Nonproliferation (NA-24) research needs and the impact if successful. Modeling methodologies were divided into whether they could help micro-level assessments (e.g., help improve individual license assessments) or macro-level assessment. Macro-level assessment focuses on suppliers, technology, consumers, economies, and proliferation context. Macro-level assessment technologies scored higher in the area of uniqueness because less work has been done at the macro level. An approach to developing testable hypotheses for the macro-level assessment methodologies is provided. The outcome of this works suggests that we should develop a Bayes Net for micro-level analysis and continue to focus on Bayes Net, System Dynamics and Economic Input/Output models for assessing macro-level problems. Simultaneously, we need to develop metrics for assessing intent in export control, including the risks and consequences associated with all aspects of export control.« less
Andrijcic, Eva; Horowitz, Barry
2006-08-01
The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.
ERIC Educational Resources Information Center
Regehr, Cheryl; Bogo, Marion; Donovan, Kirsten; Lim, April; Anstice, Susan
2012-01-01
Although a growing literature examines competencies in clinical practice, competencies of students in macro social work practice have received comparatively little attention. A grounded-theory methodology was used to elicit field instructor views of student competencies in community, organization, and policy contexts. Competencies described by…
Human Capital Development: Comparative Analysis of BRICs
ERIC Educational Resources Information Center
Ardichvili, Alexandre; Zavyalova, Elena; Minina, Vera
2012-01-01
Purpose: The goal of this article is to conduct macro-level analysis of human capital (HC) development strategies, pursued by four countries commonly referred to as BRICs (Brazil, Russia, India, and China). Design/methodology/approach: This analysis is based on comparisons of macro indices of human capital and innovativeness of the economy and a…
The inland water macro-invertebrate occurrences in Flanders, Belgium.
Vannevel, Rudy; Brosens, Dimitri; Cooman, Ward De; Gabriels, Wim; Frank Lavens; Mertens, Joost; Vervaeke, Bart
2018-01-01
The Flanders Environment Agency (VMM) has been performing biological water quality assessments on inland waters in Flanders (Belgium) since 1989 and sediment quality assessments since 2000. The water quality monitoring network is a combined physico-chemical and biological network, the biological component focusing on macro-invertebrates. The sediment monitoring programme produces biological data to assess the sediment quality. Both monitoring programmes aim to provide index values, applying a similar conceptual methodology based on the presence of macro-invertebrates. The biological data obtained from both monitoring networks are consolidated in the VMM macro-invertebrates database and include identifications at family and genus level of the freshwater phyla Coelenterata, Platyhelminthes, Annelida, Mollusca, and Arthropoda. This paper discusses the content of this database, and the dataset published thereof: 282,309 records of 210 observed taxa from 4,140 monitoring sites located on 657 different water bodies, collected during 22,663 events. This paper provides some background information on the methodology, temporal and spatial coverage, and taxonomy, and describes the content of the dataset. The data are distributed as open data under the Creative Commons CC-BY license.
Shaping the Future: A Holistic Approach to Planning
1992-03-01
history. Revolutionary changes affect the world’s political , economic, and security systems. Because of these changes, the opportuni ty exists to...paralyze our thinking, cause us to muddle through, or vigorously attempt to shape the future. Change causes macro-economic, social, political , and...purposes of this paper, in military and security matters. Today, for example, the United States’ national security relates to domestic politics , global
Crowd macro state detection using entropy model
NASA Astrophysics Data System (ADS)
Zhao, Ying; Yuan, Mengqi; Su, Guofeng; Chen, Tao
2015-08-01
In the crowd security research area a primary concern is to identify the macro state of crowd behaviors to prevent disasters and to supervise the crowd behaviors. The entropy is used to describe the macro state of a self-organization system in physics. The entropy change indicates the system macro state change. This paper provides a method to construct crowd behavior microstates and the corresponded probability distribution using the individuals' velocity information (magnitude and direction). Then an entropy model was built up to describe the crowd behavior macro state. Simulation experiments and video detection experiments were conducted. It was verified that in the disordered state, the crowd behavior entropy is close to the theoretical maximum entropy; while in ordered state, the entropy is much lower than half of the theoretical maximum entropy. The crowd behavior macro state sudden change leads to the entropy change. The proposed entropy model is more applicable than the order parameter model in crowd behavior detection. By recognizing the entropy mutation, it is possible to detect the crowd behavior macro state automatically by utilizing cameras. Results will provide data support on crowd emergency prevention and on emergency manual intervention.
ERIC Educational Resources Information Center
Salinas, Danisa
2017-01-01
The research aims at exploring how macro and micro contextual factors have influenced on the construction of English as a foreign language (EFL) teachers' identity in education reform contexts in Chile based on sociocultural theories. Grounded theory was used in the methodological design to analyse and categorize data utilizing the ATLAS.ti…
Ordered macro-microporous metal-organic framework single crystals
NASA Astrophysics Data System (ADS)
Shen, Kui; Zhang, Lei; Chen, Xiaodong; Liu, Lingmei; Zhang, Daliang; Han, Yu; Chen, Junying; Long, Jilan; Luque, Rafael; Li, Yingwei; Chen, Banglin
2018-01-01
We constructed highly oriented and ordered macropores within metal-organic framework (MOF) single crystals, opening up the area of three-dimensional–ordered macro-microporous materials (that is, materials containing both macro- and micropores) in single-crystalline form. Our methodology relies on the strong shaping effects of a polystyrene nanosphere monolith template and a double-solvent–induced heterogeneous nucleation approach. This process synergistically enabled the in situ growth of MOFs within ordered voids, rendering a single crystal with oriented and ordered macro-microporous structure. The improved mass diffusion properties of such hierarchical frameworks, together with their robust single-crystalline nature, endow them with superior catalytic activity and recyclability for bulky-molecule reactions, as compared with conventional, polycrystalline hollow, and disordered macroporous ZIF-8.
Macro-motion detection using ultra-wideband impulse radar.
Xin Li; Dengyu Qiao; Ye Li
2014-01-01
Radar has the advantage of being able to detect hidden individuals, which can be used in homeland security, disaster rescue, and healthcare monitoring-related applications. Human macro-motion detection using ultra-wideband impulse radar is studied in this paper. First, a frequency domain analysis is carried out to show that the macro-motion yields a bandpass signal in slow-time. Second, the FTFW (fast-time frequency windowing), which has the advantage of avoiding the measuring range reduction, and the HLF (high-pass linear-phase filter), which can preserve the motion signal effectively, are proposed to preprocess the radar echo. Last, a threshold decision method, based on the energy detector structure, is presented.
NASA Technical Reports Server (NTRS)
Jordan, Harry F.; Benten, Muhammad S.; Arenstorf, Norbert S.; Ramanan, Aruna V.
1987-01-01
A methodology for writing parallel programs for shared memory multiprocessors has been formalized as an extension to the Fortran language and implemented as a macro preprocessor. The extended language is known as the Force, and this manual describes how to write Force programs and execute them on the Flexible Computer Corporation Flex/32, the Encore Multimax and the Sequent Balance computers. The parallel extension macros are described in detail, but knowledge of Fortran is assumed.
Bredfeldt, Christine E; Butani, Amy; Padmanabhan, Sandhyasree; Hitz, Paul; Pardee, Roy
2013-03-22
Multi-site health sciences research is becoming more common, as it enables investigation of rare outcomes and diseases and new healthcare innovations. Multi-site research usually involves the transfer of large amounts of research data between collaborators, which increases the potential for accidental disclosures of protected health information (PHI). Standard protocols for preventing release of PHI are extremely vulnerable to human error, particularly when the shared data sets are large. To address this problem, we developed an automated program (SAS macro) to identify possible PHI in research data before it is transferred between research sites. The macro reviews all data in a designated directory to identify suspicious variable names and data patterns. The macro looks for variables that may contain personal identifiers such as medical record numbers and social security numbers. In addition, the macro identifies dates and numbers that may identify people who belong to small groups, who may be identifiable even in the absences of traditional identifiers. Evaluation of the macro on 100 sample research data sets indicated a recall of 0.98 and precision of 0.81. When implemented consistently, the macro has the potential to streamline the PHI review process and significantly reduce accidental PHI disclosures.
Information technology security system engineering methodology
NASA Technical Reports Server (NTRS)
Childs, D.
2003-01-01
A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.
A quality evaluation methodology of health web-pages for non-professionals.
Currò, Vincenzo; Buonuomo, Paola Sabrina; Onesimo, Roberta; de Rose, Paola; Vituzzi, Andrea; di Tanna, Gian Luca; D'Atri, Alessandro
2004-06-01
The proposal of an evaluation methodology for determining the quality of healthcare web sites for the dissemination of medical information to non-professionals. Three (macro) factors are considered for the quality evaluation: medical contents, accountability of the authors, and usability of the web site. Starting from two results in the literature the problem of whether or not to introduce a weighting function has been investigated. This methodology has been validated on a specialized information content, i.e., sore throats, due to the large interest such a topic enjoys with target users. The World Wide Web was accessed using a meta-search system merging several search engines. A statistical analysis was made to compare the proposed methodology with the obtained ranks of the sample web pages. The statistical analysis confirms that the variables examined (per item and sub factor) show substantially similar ranks and are capable of contributing to the evaluation of the main quality macro factors. A comparison between the aggregation functions in the proposed methodology (non-weighted averages) and the weighting functions, derived from the literature, allowed us to verify the suitability of the method. The proposed methodology suggests a simple approach which can quickly award an overall quality score for medical web sites oriented to non-professionals.
2003-06-01
delivery Data Access (1980s) "What were unit sales in New England last March?" Relational databases (RDBMS), Structured Query Language ( SQL ...macros written in Visual Basic for Applications ( VBA ). 32 Iteration Two: Class Diagram Tech OASIS Export ScriptImport Filter Data ProcessingMethod 1...MS Excel * 1 VBA Macro*1 contains sends data to co nt ai ns executes * * 1 1 contains contains Figure 20. Iteration two class diagram The
2013-01-01
Background Multi-site health sciences research is becoming more common, as it enables investigation of rare outcomes and diseases and new healthcare innovations. Multi-site research usually involves the transfer of large amounts of research data between collaborators, which increases the potential for accidental disclosures of protected health information (PHI). Standard protocols for preventing release of PHI are extremely vulnerable to human error, particularly when the shared data sets are large. Methods To address this problem, we developed an automated program (SAS macro) to identify possible PHI in research data before it is transferred between research sites. The macro reviews all data in a designated directory to identify suspicious variable names and data patterns. The macro looks for variables that may contain personal identifiers such as medical record numbers and social security numbers. In addition, the macro identifies dates and numbers that may identify people who belong to small groups, who may be identifiable even in the absences of traditional identifiers. Results Evaluation of the macro on 100 sample research data sets indicated a recall of 0.98 and precision of 0.81. Conclusions When implemented consistently, the macro has the potential to streamline the PHI review process and significantly reduce accidental PHI disclosures. PMID:23521861
Azzini, Elena; Maiani, Giuseppe; Turrini, Aida; Intorre, Federica; Lo Feudo, Gabriella; Capone, Roberto; Bottalico, Francesco; El Bilali, Hamid; Polito, Angela
2018-08-01
The aim of this paper is to provide a methodological approach to evaluate the nutritional sustainability of typical agro-food products, representing Mediterranean eating habits and included in the Mediterranean food pyramid. For each group of foods, suitable and easily measurable indicators were identified. Two macro-indicators were used to assess the nutritional sustainability of each product. The first macro-indicator, called 'business distinctiveness', takes into account the application of different regulations and standards regarding quality, safety and traceability as well as the origin of raw materials. The second macro-indicator, called 'nutritional quality', assesses product nutritional quality taking into account the contents of key compounds including micronutrients and bioactive phytochemicals. For each indicator a 0-10 scoring system was set up, with scores from 0 (unsustainable) to 10 (very sustainable), with 5 as a sustainability benchmark value. The benchmark value is the value from which a product can be considered sustainable. A simple formula was developed to produce a sustainability index. The proposed sustainability index could be considered a useful tool to describe both the qualitative and quantitative value of micronutrients and bioactive phytochemical present in foodstuffs. This methodological approach can also be applied beyond the Mediterranean, to food products in other world regions. © 2018 Society of Chemical Industry. © 2018 Society of Chemical Industry.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gernhofer, S.; Oliver, T.J.; Vasquez, R.
1994-12-31
A macro environmental risk assessment (ERA) methodology was developed for the Philippine Department of Environment and Natural Resources (DENR) as part of the US Agency for International Development Industrial Environmental Management Project. The DENR allocates its limited resources to mitigate those environmental problems that pose the greatest threat to human health and the environment. The National Regional Industry Prioritization Strategy (NRIPS) methodology was developed as a risk assessment tool to establish a national ranking of industrial facilities. The ranking establishes regional and national priorities, based on risk factors, that DENR can use to determine the most effective allocation of itsmore » limited resources. NRIPS is a systematic framework that examines the potential risk to human health and the environment from hazardous substances released from a facility, and, in doing so, generates a relative numerical score that represents that risk. More than 3,300 facilities throughout the Philippines were evaluated successfully with the NRIPS.« less
Predicting Catastrophic BGP Routing Instabilities
2004-03-01
predict a BGP routing instability confine their focus to either macro- or micro -level metrics, but not to both. The inherent limitations of each of...Level and Micro -Level Metrics Correlation; Worm Attack Studies; 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY... micro -level metrics, but not to both. The inherent limitations of each of these forms of metric gives rise to an excessive rate of spurious alerts
Canalization and Control in Automata Networks: Body Segmentation in Drosophila melanogaster
Marques-Pita, Manuel; Rocha, Luis M.
2013-01-01
We present schema redescription as a methodology to characterize canalization in automata networks used to model biochemical regulation and signalling. In our formulation, canalization becomes synonymous with redundancy present in the logic of automata. This results in straightforward measures to quantify canalization in an automaton (micro-level), which is in turn integrated into a highly scalable framework to characterize the collective dynamics of large-scale automata networks (macro-level). This way, our approach provides a method to link micro- to macro-level dynamics – a crux of complexity. Several new results ensue from this methodology: uncovering of dynamical modularity (modules in the dynamics rather than in the structure of networks), identification of minimal conditions and critical nodes to control the convergence to attractors, simulation of dynamical behaviour from incomplete information about initial conditions, and measures of macro-level canalization and robustness to perturbations. We exemplify our methodology with a well-known model of the intra- and inter cellular genetic regulation of body segmentation in Drosophila melanogaster. We use this model to show that our analysis does not contradict any previous findings. But we also obtain new knowledge about its behaviour: a better understanding of the size of its wild-type attractor basin (larger than previously thought), the identification of novel minimal conditions and critical nodes that control wild-type behaviour, and the resilience of these to stochastic interventions. Our methodology is applicable to any complex network that can be modelled using automata, but we focus on biochemical regulation and signalling, towards a better understanding of the (decentralized) control that orchestrates cellular activity – with the ultimate goal of explaining how do cells and tissues ‘compute’. PMID:23520449
Canalization and control in automata networks: body segmentation in Drosophila melanogaster.
Marques-Pita, Manuel; Rocha, Luis M
2013-01-01
We present schema redescription as a methodology to characterize canalization in automata networks used to model biochemical regulation and signalling. In our formulation, canalization becomes synonymous with redundancy present in the logic of automata. This results in straightforward measures to quantify canalization in an automaton (micro-level), which is in turn integrated into a highly scalable framework to characterize the collective dynamics of large-scale automata networks (macro-level). This way, our approach provides a method to link micro- to macro-level dynamics--a crux of complexity. Several new results ensue from this methodology: uncovering of dynamical modularity (modules in the dynamics rather than in the structure of networks), identification of minimal conditions and critical nodes to control the convergence to attractors, simulation of dynamical behaviour from incomplete information about initial conditions, and measures of macro-level canalization and robustness to perturbations. We exemplify our methodology with a well-known model of the intra- and inter cellular genetic regulation of body segmentation in Drosophila melanogaster. We use this model to show that our analysis does not contradict any previous findings. But we also obtain new knowledge about its behaviour: a better understanding of the size of its wild-type attractor basin (larger than previously thought), the identification of novel minimal conditions and critical nodes that control wild-type behaviour, and the resilience of these to stochastic interventions. Our methodology is applicable to any complex network that can be modelled using automata, but we focus on biochemical regulation and signalling, towards a better understanding of the (decentralized) control that orchestrates cellular activity--with the ultimate goal of explaining how do cells and tissues 'compute'.
Moya, Eva M.; Chavez-Baray, Silvia Maria; Martinez, Omar; Mattera, Brian; Adcox, Courtney
2018-01-01
Research and scholarship efforts continue to promote the integration of micro and macro practice in social work practice and education. Despite this, scholarship has documented persistent challenges in the fluid integration between the domains of micro-level service provision and macro-level social change efforts in practice and academic programs. This paper outlines a successful bridge between the micro-macro divide in the form of community-engaged practice to address homelessness and social work education in the U.S.-Mexico border region. MSW students enrolled in a macro-level course at the University of Texas at El Paso’s College of Health Sciences successfully partnered with the Opportunity Center for the Homeless, a grassroots community-based organization serving individuals experiencing homelessness. The narrative describes how students were effectively able to apply both micro- and macro-level skills learned in the classroom to an experiential learning environment while providing much-needed assistance to an underfunded community-based organization. A set of challenges and recommendations are also discussed. Research initiatives are needed to evaluate and test clinical and community work initiatives, including the use of photovoice methodology to address homelessness, while being responsive to community needs and challenges. PMID:29809204
Moya, Eva M; Chavez-Baray, Silvia Maria; Martinez, Omar; Mattera, Brian; Adcox, Courtney
2018-01-01
Research and scholarship efforts continue to promote the integration of micro and macro practice in social work practice and education. Despite this, scholarship has documented persistent challenges in the fluid integration between the domains of micro-level service provision and macro-level social change efforts in practice and academic programs. This paper outlines a successful bridge between the micro-macro divide in the form of community-engaged practice to address homelessness and social work education in the U.S.-Mexico border region. MSW students enrolled in a macro-level course at the University of Texas at El Paso's College of Health Sciences successfully partnered with the Opportunity Center for the Homeless, a grassroots community-based organization serving individuals experiencing homelessness. The narrative describes how students were effectively able to apply both micro- and macro-level skills learned in the classroom to an experiential learning environment while providing much-needed assistance to an underfunded community-based organization. A set of challenges and recommendations are also discussed. Research initiatives are needed to evaluate and test clinical and community work initiatives, including the use of photovoice methodology to address homelessness, while being responsive to community needs and challenges.
Korean Unification and the Future of the U.S.-ROK Alliance
2016-02-01
institutionalized or largely unstruc-tured. Regardless of form, security alliances as instruments of statecraft, at their most fundamental level , reflect a...a unified Korea would, at a macro level , reinforce the inter- national liberal democratic order. At a micro level , it could help ensure security on...Minister of Defense, which has since become an annual platform for strategic- level consultations on the alliance. Similar- ly, the Military Committee was
NASA Astrophysics Data System (ADS)
Kinoshita, Yumiko
When service sectors are a major driver for the growth of the world economy, we are challenged to implement service-oriented infrastructure as e-Gov platform to achieve further growth and innovation for both developed and developing countries. According to recent trends in service industry, it is clarified that main factors for the growth of service sectors are investment into knowledge, trade, and the enhanced capacity of micro, small, and medium-sized enterprises (MSMEs). In addition, the design and deployment of public service platform require appropriate evaluation methodology. Reflecting these observations, this paper proposes macro-micro simulation approach to assess public values (PV) focusing on MSMEs. Linkage aggregate variables (LAVs) are defined to show connection between macro and micro impacts of public services. As a result, the relationship of demography, business environment, macro economy, and socio-economic impact are clarified and their values are quantified from the behavioral perspectives of citizens and firms.
Fraga, Eric S; Ng, Melvin
2015-01-01
Recent developments in catalysts have enhanced the potential for the utilisation of carbon dioxide as a chemical feedstock. Using the appropriate energy efficient catalyst enables a range of chemical pathways leading to desirable products. In doing so, CO2 provides an economically and environmentally beneficial source of C1 feedstock, while improving the issues relating to security of supply that are associated with fossil-based feedstocks. However, the dependence on catalysts brings other supply chains into consideration, supply chains that may also have security of supply issues. The choice of chemical pathways for specific products will therefore entail an assessment not only of economic factors but also the security of supply issues for the catalysts. This is a multi-criteria decision making problem. In this paper, we present a modified 4A framework based on the framework suggested by the Asian Pacific Energy Research centre for macro-economic applications. The 4A methodology is named after the criteria used to compare alternatives: availability, acceptability, applicability and affordability. We have adapted this framework for the consideration of alternative chemical reaction processes using a micro-economic outlook. Data from a number of sources were collected and used to quantify each of the 4A criteria. A graphical representation of the assessments is used to support the decision maker in comparing alternatives. The framework not only allows for the comparison of processes but also highlights current limitations in the CCU processes. The framework presented can be used by a variety of stakeholders, including regulators, investors, and process industries, with the aim of identifying promising routes within a broader multi-criteria decision making process.
NASA Astrophysics Data System (ADS)
Lima Neto, Irineu A.; Misságia, Roseane M.; Ceia, Marco A.; Archilha, Nathaly L.; Oliveira, Lucas C.
2014-11-01
Carbonate reservoirs exhibit heterogeneous pore systems and a wide variety of grain types, which affect the rock's elastic properties and the reservoir parameter relationships. To study the Albian carbonates in the Campos Basin, a methodology is proposed to predict the amount of microporosity and the representative aspect ratio of these inclusions. The method assumes three pore-space scales in two representative inclusion scenarios: 1) a macro-mesopore median aspect ratio from the thin-section digital image analysis (DIA) and 2) a microporosity aspect ratio predicted based on the measured P-wave velocities. Through a laboratory analysis of 10 grainstone core samples of the Albian age, the P- and S-wave velocities (Vp and Vs) are evaluated at effective pressures of 0-10 MPa. The analytical theories in the proposed methodology are functions of the aspect ratios from the differential effective medium (DEM) theory, the macro-mesopore system recognized from the DIA, the amount of microporosity determined by the difference between the porosities estimated from laboratorial helium-gas and the thin-section petrographic images, and the P-wave velocities under dry effective pressure conditions. The DIA procedure is applied to estimate the local and global parameters, and the textural implications concerning ultrasonic velocities and image resolution. The macro-mesopore inclusions contribute to stiffer rocks and higher velocities, whereas the microporosity inclusions contribute to softer rocks and lower velocities. We observe a high potential for this methodology, which uses the microporosity aspect ratio inverted from Vp to predict Vs with a good agreement. The results acceptably characterize the Albian grainstones. The representative macro-mesopore aspect ratio is 0.5, and the inverted microporosity aspect ratio ranges from 0.01 to 0.07. The effective pressure induced an effect of slight porosity reduction during the triaxial tests, mainly in the microporosity inclusions, slightly changing the amount and the aspect ratio of the microporosity.
Shao, Ning; Jiang, Shi-Meng; Zhang, Miao; Wang, Jing; Guo, Shu-Juan; Li, Yang; Jiang, He-Wei; Liu, Cheng-Xi; Zhang, Da-Bing; Yang, Li-Tao; Tao, Sheng-Ce
2014-01-21
The monitoring of genetically modified organisms (GMOs) is a primary step of GMO regulation. However, there is presently a lack of effective and high-throughput methodologies for specifically and sensitively monitoring most of the commercialized GMOs. Herein, we developed a multiplex amplification on a chip with readout on an oligo microarray (MACRO) system specifically for convenient GMO monitoring. This system is composed of a microchip for multiplex amplification and an oligo microarray for the readout of multiple amplicons, containing a total of 91 targets (18 universal elements, 20 exogenous genes, 45 events, and 8 endogenous reference genes) that covers 97.1% of all GM events that have been commercialized up to 2012. We demonstrate that the specificity of MACRO is ~100%, with a limit of detection (LOD) that is suitable for real-world applications. Moreover, the results obtained of simulated complex samples and blind samples with MACRO were 100% consistent with expectations and the results of independently performed real-time PCRs, respectively. Thus, we believe MACRO is the first system that can be applied for effectively monitoring the majority of the commercialized GMOs in a single test.
2002-09-01
Basic for Applications ( VBA ) 6.0 as macros may not be supported in 8 future versions of Access. Access 2000 offers Internet- related features for...security features from Microsoft’s SQL Server. [1] 3. System Requirements Access 2000 is a resource-intensive application as are all Office 2000...1] • Modules – Functions and procedures written in the Visual Basic for Applications ( VBA ) programming language. The capabilities of modules
ERIC Educational Resources Information Center
Uraev, Nikolay N.; Mingaleev, Gaziz F.; Kushimov, Aleksandr T.; Kolesov, Nikolay A.
2016-01-01
This paper considers the methodological aspects of forming a development strategy for the regional socioeconomic system (by the example of radio-electronic enterprises in the Republic of Tatarstan). The paper suggests a conceptual scheme of the macro- and micro-factors' influence on the regional socioeconomic system. This scheme is based on the…
Design-Based Research: Is This a Suitable Methodology for Short-Term Projects?
ERIC Educational Resources Information Center
Pool, Jessica; Laubscher, Dorothy
2016-01-01
This article reports on a design-based methodology of a thesis in which a fully face-to-face contact module was converted into a blended learning course. The purpose of the article is to report on how design-based phases, in the form of micro-, meso- and macro-cycles were applied to improve practice and to generate design principles. Design-based…
Capturing security requirements for software systems.
El-Hadary, Hassan; El-Kassas, Sherif
2014-07-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.
Capturing security requirements for software systems
El-Hadary, Hassan; El-Kassas, Sherif
2014-01-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514
Economic Implications of Japan's Ageing Population: A Macro-economic Demographic Modelling Approach.
ERIC Educational Resources Information Center
Ogawa, Naohiro
1982-01-01
This study discusses the impact of the aging of the Japanese population upon various socioeconomic factors. Major findings are that the rate of real gross national product growth will decline continuously and that more financial resources will be required for government social security programs. (Editor/CT)
Methodological Problems in the Forecasting of Education
ERIC Educational Resources Information Center
Kostanian, S. L.
1978-01-01
Examines how forecasting of educational development in the Soviet Union can be coordinated with forecasts of scientific and technical progress. Predicts that the efficiency of social forecasting will increase when more empirical data on macro- and micro-processes is collected. (Author/DB)
Information security system quality assessment through the intelligent tools
NASA Astrophysics Data System (ADS)
Trapeznikov, E. V.
2018-04-01
The technology development has shown the automated system information security comprehensive analysis necessity. The subject area analysis indicates the study relevance. The research objective is to develop the information security system quality assessment methodology based on the intelligent tools. The basis of the methodology is the information security assessment model in the information system through the neural network. The paper presents the security assessment model, its algorithm. The methodology practical implementation results in the form of the software flow diagram are represented. The practical significance of the model being developed is noted in conclusions.
Combined micro and macro geodynamic modelling of mantle flow: methods, potentialities and limits.
NASA Astrophysics Data System (ADS)
Faccenda, M.
2015-12-01
Over the last few years, geodynamic simulations aiming at reconstructing the Earth's internal dynamics have increasingly attempted to link processes occurring at the micro (i.e., strain-induced lattice preferred orientation (LPO) of crystal aggregates) and macro scale (2D/3D mantle convection). As a major outcome, such a combined approach results in the prediction of the modelled region's elastic properties that, in turn, can be used to perform seismological synthetic experiments. By comparison with observables, the geodynamic simulations can then be considered as a good numerical analogue of specific tectonic settings, constraining their deep structure and recent tectonic evolution. In this contribution, I will discuss the recent methodologies, potentialities and current limits of combined micro- and macro-flow simulations, with particular attention to convergent margins whose dynamics and deep structure is still the object of extensive studies.
The force on the flex: Global parallelism and portability
NASA Technical Reports Server (NTRS)
Jordan, H. F.
1986-01-01
A parallel programming methodology, called the force, supports the construction of programs to be executed in parallel by an unspecified, but potentially large, number of processes. The methodology was originally developed on a pipelined, shared memory multiprocessor, the Denelcor HEP, and embodies the primitive operations of the force in a set of macros which expand into multiprocessor Fortran code. A small set of primitives is sufficient to write large parallel programs, and the system has been used to produce 10,000 line programs in computational fluid dynamics. The level of complexity of the force primitives is intermediate. It is high enough to mask detailed architectural differences between multiprocessors but low enough to give the user control over performance. The system is being ported to a medium scale multiprocessor, the Flex/32, which is a 20 processor system with a mixture of shared and local memory. Memory organization and the type of processor synchronization supported by the hardware on the two machines lead to some differences in efficient implementations of the force primitives, but the user interface remains the same. An initial implementation was done by retargeting the macros to Flexible Computer Corporation's ConCurrent C language. Subsequently, the macros were caused to directly produce the system calls which form the basis for ConCurrent C. The implementation of the Fortran based system is in step with Flexible Computer Corporations's implementation of a Fortran system in the parallel environment.
How Lean the Machine: How Agile the Mind?
ERIC Educational Resources Information Center
Atkinson, Simon Reay; Goodger, Amanda; Caldwell, Nicholas; Hossain, Liaquat
2012-01-01
Purpose: Competition for resources appears to be increasing at a time of political, security (including energy, food and climate) and economic change; leading to potential collapse. The purpose of this conceptual paper is to examine the impact of policies exercised at the macro level on methods and processes applied at the micro level through, for…
Re-Presenting Women and Leadership: A Methodological Journey
ERIC Educational Resources Information Center
Wilkinson, Jane; Blackmore, Jill
2008-01-01
Research on women's leadership has tended to focus upon detailed micro studies of individual women's identity formation or, alternatively, to conduct macro studies of its broader discursive constructions within society. Both approaches, although providing helpful understandings of the issues surrounding constructions of women's leadership, are…
Compression and Instrumented Indentation Measurements on Biomimetic Polymers
2006-09-01
styrene- isoprene triblock copolymer gels are tested and compared using both macro-scale and micro-scale measurements. A methodology is presented to...at stress states and strain rates not available to bulk measurement equipment. In this work, a ballistic gelatin and two styrene- isoprene triblock
Computer-Aided Sensor Development Focused on Security Issues.
Bialas, Andrzej
2016-05-26
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.
Computer-Aided Sensor Development Focused on Security Issues
Bialas, Andrzej
2016-01-01
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research. PMID:27240360
The Stability Analysis Method of the Cohesive Granular Slope on the Basis of Graph Theory.
Guan, Yanpeng; Liu, Xiaoli; Wang, Enzhi; Wang, Sijing
2017-02-27
This paper attempted to provide a method to calculate progressive failure of the cohesivefrictional granular geomaterial and the spatial distribution of the stability of the cohesive granular slope. The methodology can be divided into two parts: the characterization method of macro-contact and the analysis of the slope stability. Based on the graph theory, the vertexes, the edges and the edge sequences are abstracted out to characterize the voids, the particle contact and the macro-contact, respectively, bridging the gap between the mesoscopic and macro scales of granular materials. This paper adopts this characterization method to extract a graph from a granular slope and characterize the macro sliding surface, then the weighted graph is analyzed to calculate the slope safety factor. Each edge has three weights representing the sliding moment, the anti-sliding moment and the braking index of contact-bond, respectively, . The safety factor of the slope is calculated by presupposing a certain number of sliding routes and reducing Weight repeatedly and counting the mesoscopic failure of the edge. It is a kind of slope analysis method from mesoscopic perspective so it can present more detail of the mesoscopic property of the granular slope. In the respect of macro scale, the spatial distribution of the stability of the granular slope is in agreement with the theoretical solution.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-12-17
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-01-01
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409
Feedback Effects of Teaching Quality Assessment: Macro and Micro Evidence
ERIC Educational Resources Information Center
Bianchini, Stefano
2014-01-01
This study investigates the feedback effects of teaching quality assessment. Previous literature looked separately at the evolution of individual and aggregate scores to understand whether instructors and university performance depends on its past evaluation. I propose a new quantitative-based methodology, combining statistical distributions and…
World Culture in the Capitalist World-System in Transition
ERIC Educational Resources Information Center
Griffiths, Tom G.; Arnove, Robert F.
2015-01-01
World culture theory (WCT) offers an explanatory framework for macro-level comparative analyses of systems of mass education, including their structures, accompanying policies and their curricular and pedagogical practices. WCT has contributed to broader efforts to overcome methodological nationalism in comparative research. In this paper, we…
Friedel-Crafts Alkylation Using Elemental Aluminum Catalyst: An Undergraduate Laboratory Experiment.
ERIC Educational Resources Information Center
Meeks, B. Spencer; Lucas, Anita R.
1989-01-01
Provides methodology for carrying out the synthesis of sec-butyltoluene by the Friedel-Crafts alkylation of toluene. Suggests using simple elemental aluminum as the catalyst in place of AlCl3 or amalgamated aluminum. Notes satisfactory results for both macro- and microscale operations. (MVL)
Future Horizons in Anthropology and Education: The View from 1976
ERIC Educational Resources Information Center
Textor, Robert B.
1977-01-01
The outgoing president of the Council on Anthropology and Education discusses "areas of substantive concern that our organization and field might wisely attempt to grow into." He focuses on cultural futuristics, global emphasis, macro approaches, quantitative methodology, political economy, dependency, exploitation, life-long and nonformal…
Rethinking What Is Entrepreneurship Education: A Macro Integrative Perspective
ERIC Educational Resources Information Center
Wu, Hongyun; Gu, Jibao
2017-01-01
Research on entrepreneurship education (EE) has encountered confusing ontological and methodological issues, such as definitional controversy, gaps between research and practice, and lack of theoretical foundations. These are factors holding back the further development of the research and practice in this field. This paper presents a whole…
ERIC Educational Resources Information Center
Bartlett, Lesley; Vavrus, Frances
2014-01-01
How can scholars trace the global production and circulation of educational policies? The vertical case study incorporates three elements: "vertical" attention across micro-, meso-, and macro-levels, or scales; a "horizontal" comparison of how policies unfold in distinct locations; and a "transversal," processual…
The Macro and Micro Structure of the Foreign Language Curriculum.
ERIC Educational Resources Information Center
Politzer, Robert L.
A representative six-year foreign language curriculum (grades 7-12) is analyzed and noted to be based on several underlying principles. Difficulties which arise from rigid adherence to certain methodological principles are discussed, particularly those concerning the relationship between audiolingual and writing skills. Suggestions on ways to…
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
Climate Change and Macro-Economic Cycles in Pre-Industrial Europe
Pei, Qing; Zhang, David D.; Lee, Harry F.; Li, Guodong
2014-01-01
Climate change has been proven to be the ultimate cause of social crisis in pre-industrial Europe at a large scale. However, detailed analyses on climate change and macro-economic cycles in the pre-industrial era remain lacking, especially within different temporal scales. Therefore, fine-grained, paleo-climate, and economic data were employed with statistical methods to quantitatively assess the relations between climate change and agrarian economy in Europe during AD 1500 to 1800. In the study, the Butterworth filter was adopted to filter the data series into a long-term trend (low-frequency) and short-term fluctuations (high-frequency). Granger Causality Analysis was conducted to scrutinize the associations between climate change and macro-economic cycle at different frequency bands. Based on quantitative results, climate change can only show significant effects on the macro-economic cycle within the long-term. In terms of the short-term effects, society can relieve the influences from climate variations by social adaptation methods and self-adjustment mechanism. On a large spatial scale, temperature holds higher importance for the European agrarian economy than precipitation. By examining the supply-demand mechanism in the grain market, population during the study period acted as the producer in the long term, whereas as the consumer in the short term. These findings merely reflect the general interactions between climate change and macro-economic cycles at the large spatial region with a long-term study period. The findings neither illustrate individual incidents that can temporarily distort the agrarian economy nor explain some specific cases. In the study, the scale thinking in the analysis is raised as an essential methodological issue for the first time to interpret the associations between climatic impact and macro-economy in the past agrarian society within different temporal scales. PMID:24516601
Climate change and macro-economic cycles in pre-industrial europe.
Pei, Qing; Zhang, David D; Lee, Harry F; Li, Guodong
2014-01-01
Climate change has been proven to be the ultimate cause of social crisis in pre-industrial Europe at a large scale. However, detailed analyses on climate change and macro-economic cycles in the pre-industrial era remain lacking, especially within different temporal scales. Therefore, fine-grained, paleo-climate, and economic data were employed with statistical methods to quantitatively assess the relations between climate change and agrarian economy in Europe during AD 1500 to 1800. In the study, the Butterworth filter was adopted to filter the data series into a long-term trend (low-frequency) and short-term fluctuations (high-frequency). Granger Causality Analysis was conducted to scrutinize the associations between climate change and macro-economic cycle at different frequency bands. Based on quantitative results, climate change can only show significant effects on the macro-economic cycle within the long-term. In terms of the short-term effects, society can relieve the influences from climate variations by social adaptation methods and self-adjustment mechanism. On a large spatial scale, temperature holds higher importance for the European agrarian economy than precipitation. By examining the supply-demand mechanism in the grain market, population during the study period acted as the producer in the long term, whereas as the consumer in the short term. These findings merely reflect the general interactions between climate change and macro-economic cycles at the large spatial region with a long-term study period. The findings neither illustrate individual incidents that can temporarily distort the agrarian economy nor explain some specific cases. In the study, the scale thinking in the analysis is raised as an essential methodological issue for the first time to interpret the associations between climatic impact and macro-economy in the past agrarian society within different temporal scales.
The Stability Analysis Method of the Cohesive Granular Slope on the Basis of Graph Theory
Guan, Yanpeng; Liu, Xiaoli; Wang, Enzhi; Wang, Sijing
2017-01-01
This paper attempted to provide a method to calculate progressive failure of the cohesive-frictional granular geomaterial and the spatial distribution of the stability of the cohesive granular slope. The methodology can be divided into two parts: the characterization method of macro-contact and the analysis of the slope stability. Based on the graph theory, the vertexes, the edges and the edge sequences are abstracted out to characterize the voids, the particle contact and the macro-contact, respectively, bridging the gap between the mesoscopic and macro scales of granular materials. This paper adopts this characterization method to extract a graph from a granular slope and characterize the macro sliding surface, then the weighted graph is analyzed to calculate the slope safety factor. Each edge has three weights representing the sliding moment, the anti-sliding moment and the braking index of contact-bond, respectively, E1E2E3E1E2E3. The safety factor of the slope is calculated by presupposing a certain number of sliding routes and reducing Weight E3 repeatedly and counting the mesoscopic failure of the edge. It is a kind of slope analysis method from mesoscopic perspective so it can present more detail of the mesoscopic property of the granular slope. In the respect of macro scale, the spatial distribution of the stability of the granular slope is in agreement with the theoretical solution. PMID:28772596
The Armed Forces Casualty Assistance Readiness Enhancement System (CARES): Design for Flexibility
2006-06-01
Special Form SQL Structured Query Language SSA Social Security Administration U USMA United States Military Academy V VB Visual Basic VBA Visual Basic for...of Abbreviations ................................................................... 26 Appendix B: Key VBA Macros and MS Excel Coding...internet portal, CARES Version 1.0 is a MS Excel spreadsheet application that contains a considerable number of Visual Basic for Applications ( VBA
ERIC Educational Resources Information Center
Welton, Anjale D.; Mansfield, Katherine Cumings; Lee, Pei-Ling; Young, Michelle D.
2015-01-01
An essential component to learning and teaching in educational leadership is mentoring graduate students for successful transition to K-12 and higher education positions. This study integrates quantitative and qualitative datasets to examine doctoral students' experiences with mentoring from macro and micro perspectives. Findings show that…
ERIC Educational Resources Information Center
McPhail, Graham J.
2016-01-01
In 2002 Parlo Singh outlined Bernstein's theory of the pedagogic device, elaborating the potential in Bernstein's complex theoretical framework for empirical research. In particular, Singh suggests that Bernstein's concepts provide the means of making explicit the macro and micro structuring of knowledge into pedagogic communication. More…
Advancing Equity in Accountability and Organizational Cultures of Data Use
ERIC Educational Resources Information Center
Gannon-Slater, Nora; La Londe, Priya G.; Crenshaw, Hope L.; Evans, Margaret E.; Greene, Jennifer C.; Schwandt, Thomas A.
2017-01-01
Purpose: Data use cultures in schools determine data use practices. Such cultures can be muted by powerful macro accountability and organizational learning cultures. Further, strong equity-oriented data use cultures are challenging to establish. The purpose of this paper is to engage these cultural tensions. Design/methodology/approach: The data…
Macro-economic assessment of flood risk in Italy under current and future climate
NASA Astrophysics Data System (ADS)
Carrera, Lorenzo; Koks, Elco; Mysiak, Jaroslav; Aerts, Jeroen; Standardi, Gabriele
2014-05-01
This paper explores an integrated methodology for assessing direct and indirect costs of fluvial flooding to estimate current and future fluvial flood risk in Italy. Our methodology combines a Geographic Information System spatial approach, with a general economic equilibrium approach using a downscaled modified version of a Computable General Equilibrium model at NUTS2 scale. Given the level of uncertainty in the behavior of disaster-affected economies, the simulation considers a wide range of business recovery periods. We calculate expected annual losses for each NUTS2 region, and exceedence probability curves to determine probable maximum losses. Given a certain acceptable level of risk, we describe the conditions of flood protection and business recovery periods under which losses are contained within this limit. Because of the difference between direct costs, which are an overestimation of stock losses, and indirect costs, which represent the macro-economic effects, our results have different policy meanings. While the former is relevant for post-disaster recovery, the latter is more relevant for public policy issues, particularly for cost-benefit analysis and resilience assessment.
Rusu, Aura; Tóth, Gergő; Szőcs, Levente; Kökösi, József; Kraszni, Márta; Gyéresi, Árpád; Noszál, Béla
2012-07-01
The complete macro- and microequilibrium analyses of six fluoroquinolone drugs - ciprofloxacin, enrofloxacin, norfloxacin, pefloxacin, ofloxacin and moxifloxacin - are presented. Previous controversial literature data are straightened up, the protonation centers are unambiguously identified, and the protonation macro- and microconstant values are reported. The macroconstants were determined by (1)H NMR-pH titrations while the microconstants were determined by a multi-modal spectroscopic-deductive methodology, in which methyl ester derivatives were synthesized and their NMR-pH titration data contributed to the evaluation of all the microconstants. The full (1)H, (13)C and (15)N NMR assignments, NMR-pH profiles, macro- and microprotonation schemes and species-specific diagrams are included. Our studies show that the fluoroquinolones have three protonation centers: the carboxylate group, the N-1' and N-4' piperazine nitrogens and concentration of the uncharged microspecies is way below the values published earlier. The results could be well interpreted in terms of structural properties. The protonation macro- and microconstant values allow the pre-planned method development in techniques such as capillary zone electrophoresis and also, the interpretation of fluoroquinolone mechanism of biological action, including the pharmacokinetic properties, and antibacterial activities that are all heavily influenced by the states of protonation. Copyright © 2012 Elsevier B.V. All rights reserved.
A Proven Methodology for Developing Secure Software and Applying It to Ground Systems
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2016-01-01
Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?
Physical and property victimization behind bars: a multilevel examination.
Lahm, Karen F
2009-06-01
The majority of the extant literature on inmate victimization considers only one level of analysis, thus ignoring the interaction effects between inmate- and prison-level variables. To extend this literature, multilevel modeling techniques were used to analyze self-report data from more than 1,000 inmates and 30 prisons in Kentucky, Tennessee, and Ohio. Results revealed that demographic variables were strong predictors of physical victimization (i.e., race and assaultive behavior). Also, security level had a contextual direct effect on physical victimization. Property victimization was best explained with an integrated model including inmate (i.e., race, assaultive behavior, prior education, prior employment, and time served), contextual (i.e., security level and proportion non-White), and micro-macro interaction variables (i.e., Race x Security Level). Policy implications and suggestions for future research are discussed.
A methodology for secure recovery of spacecrafts based on a trusted hardware platform
NASA Astrophysics Data System (ADS)
Juliato, Marcio; Gebotys, Catherine
2017-02-01
This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.
NASA Astrophysics Data System (ADS)
Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.
2008-02-01
Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.
Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?
2009-09-01
collaborative effort? C. RESEARCH METHODOLOGY This research project utilized a modified case study methodology. The traditional case study method ...discussing the research method , offering smart practices and culminate with findings and recommendations. Chapter II Homeland Security Collaboration...41 Centers for Regional Excellence, “Building Models.” 16 Chapter III Research Methodology: Modified Case Study Method is
ERIC Educational Resources Information Center
Costa-Font, Joan; Wittenberg, Raphael; Patxot, Concepcio; Comas-Herrera, Adelina; Gori, Cristiano; di Maio, Alessandra; Pickard, Linda; Pozzi, Alessandro; Rothgang, Heinz
2008-01-01
This study examines the sensitivity of future long-term care demand and expenditure estimates to official demographic projections in four selected European countries: Germany, Spain, Italy and the United Kingdom. It uses standardised methodology in the form of a macro-simulation exercise and finds evidence for significant differences in…
ERIC Educational Resources Information Center
Nonnenmacher, Alexandra; Friedrichs, Jurgen
2013-01-01
To explain country differences in an analytical or structural dependent variable, the application of a macro-micro-model containing contextual hypotheses is necessary. Our methodological study examines whether empirical studies apply such a model. We propose that a theoretical base for country differences is well described in multilevel studies,…
Critical Discourse Analysis in Education: A Review of the Literature, 2004 to 2012
ERIC Educational Resources Information Center
Rogers, Rebecca; Schaenen, Inda; Schott, Christopher; O'Brien, Kathryn; Trigos-Carrillo, Lina; Starkey, Kim; Chasteen, Cynthia Carter
2016-01-01
This article reviews critical discourse analysis scholarship in education research from 2004 to 2012. Our methodology was carried out in three stages. First, we searched educational databases. Second, we completed an analytic review template for each article and encoded these data into a digital spreadsheet to assess macro-trends in the field.…
Mun, Chung Jung; Tein, Jenn-Yun; Kim, Hanjoe; Shaw, Daniel S.; Gardner, Frances; Wilson, Melvin N.; Peterson, Jenene
2018-01-01
This study examined the validity of micro social observations and macro ratings of parent–child interaction in early to middle childhood. Seven hundred and thirty-one families representing multiple ethnic groups were recruited and screened as at risk in the context of Women, Infant, and Children (WIC) Nutritional Supplement service settings. Families were randomly assigned to the Family Checkup (FCU) intervention or the control condition at age 2 and videotaped in structured interactions in the home at ages 2, 3, 4, and 5. Parent–child interaction videotapes were microcoded using the Relationship Affect Coding System (RACS) that captures the duration of two mutual dyadic states: positive engagement and coercion. Macro ratings of parenting skills were collected after coding the videotapes to assess parent use of positive behavior support and limit setting skills (or lack thereof). Confirmatory factor analyses revealed that the measurement model of macro ratings of limit setting and positive behavior support was not supported by the data, and thus, were excluded from further analyses. However, there was moderate stability in the families’ micro social dynamics across early childhood and it showed significant improvements as a function of random assignment to the FCU. Moreover, parent–child dynamics were predictive of chronic behavior problems as rated by parents in middle childhood, but not emotional problems. We conclude with a discussion of the validity of the RACS and on methodological advantages of micro social coding over the statistical limitations of macro rating observations. Future directions are discussed for observation research in prevention science. PMID:27620623
Dishion, Thomas J; Mun, Chung Jung; Tein, Jenn-Yun; Kim, Hanjoe; Shaw, Daniel S; Gardner, Frances; Wilson, Melvin N; Peterson, Jenene
2017-04-01
This study examined the validity of micro social observations and macro ratings of parent-child interaction in early to middle childhood. Seven hundred and thirty-one families representing multiple ethnic groups were recruited and screened as at risk in the context of Women, Infant, and Children (WIC) Nutritional Supplement service settings. Families were randomly assigned to the Family Checkup (FCU) intervention or the control condition at age 2 and videotaped in structured interactions in the home at ages 2, 3, 4, and 5. Parent-child interaction videotapes were micro-coded using the Relationship Affect Coding System (RACS) that captures the duration of two mutual dyadic states: positive engagement and coercion. Macro ratings of parenting skills were collected after coding the videotapes to assess parent use of positive behavior support and limit setting skills (or lack thereof). Confirmatory factor analyses revealed that the measurement model of macro ratings of limit setting and positive behavior support was not supported by the data, and thus, were excluded from further analyses. However, there was moderate stability in the families' micro social dynamics across early childhood and it showed significant improvements as a function of random assignment to the FCU. Moreover, parent-child dynamics were predictive of chronic behavior problems as rated by parents in middle childhood, but not emotional problems. We conclude with a discussion of the validity of the RACS and on methodological advantages of micro social coding over the statistical limitations of macro rating observations. Future directions are discussed for observation research in prevention science.
1981-01-01
comparison of formal and informal design methodologies will show how we think they are converging. Lastly, I will describe our involvement with the DoD...computer security must begin with the design methodology , with the objective being provability. The idea ofa formal evaluation and on-the-shelf... Methodologies ] Here we can compare the formal design methodologies with those used by informal practitioners like Control Data. Obviously, both processes
ERIC Educational Resources Information Center
Kirtland, Monika
1981-01-01
Outlines a methodology for standardizing word lists of subject- related fields using a macrothesaurus which provides basic classification structure and terminology for the subject at large and which adapts to the specific needs of its subfields. The example of the Cancer Information Thesaurus (CIT) is detailed. Six references are listed. (FM)
When micro meets macro: microbial lipid analysis and ecosystem ecology
NASA Astrophysics Data System (ADS)
Balser, T.; Gutknecht, J.
2008-12-01
There is growing interest in linking soil microbial community composition and activity with large-scale field studies of nutrient cycling or plant community response to disturbances. And while analysis of microbial communities has moved rapidly in the past decade from culture-based to non-culture based techniques, still it must be asked what have we gained from the move? How well does the necessarily micro-scale of microbial analysis allow us to address questions of interest at the macro-scale? Several challenges exist in bridging the scales, and foremost is the question of methodological feasibility. Past microbiological methodologies have not been readily adaptable to the large sample sizes necessary for ecosystem-scale research. As a result, it has been difficult to generate compatible microbial and ecosystem data sets. We describe the use of a modified lipid extraction method to generate microbial community data sets that allow us to match landscape-scale or long-term ecological studies with microbial community data. We briefly discuss the challenges and advantages associated with lipid analysis as an approach to addressing ecosystem ecological studies, and provide examples from our research in ecosystem restoration and recovery following disturbance and climate change.
NASA Astrophysics Data System (ADS)
Takle, E. S.; Gustafson, D. I.; Beachy, R.; Nelson, G. C.; Mason-D'Croz, D.; Palazzo, A.
2013-12-01
Agreement is developing among agricultural scientists on the emerging inability of agriculture to meet growing global food demands. The lack of additional arable land and availability of freshwater have long been constraints on agriculture. Changes in trends of weather conditions that challenge physiological limits of crops, as projected by global climate models, are expected to exacerbate the global food challenge toward the middle of the 21st century. These climate- and constraint-driven crop production challenges are interconnected within a complex global economy, where diverse factors add to price volatility and food scarcity. We use the DSSAT crop modeling suite, together with mid-century projections of four AR4 global models, as input to the International Food Policy Research Institute IMPACT model to project the impact of climate change on food security through the year 2050 for internationally traded crops. IMPACT is an iterative model that responds to endogenous and exogenous drivers to dynamically solve for the world prices that ensure global supply equals global demand. The modeling methodology reconciles the limited spatial resolution of macro-level economic models that operate through equilibrium-driven relationships at a national level with detailed models of biophysical processes at high spatial resolution. The analysis presented here suggests that climate change in the first half of the 21st century does not represent a near-term threat to food security in the US due to the availability of adaptation strategies (e.g., loss of current growing regions is balanced by gain of new growing regions). However, as climate continues to trend away from 20th century norms current adaptation measures will not be sufficient to enable agriculture to meet growing food demand. Climate scenarios from higher-level carbon emissions exacerbate the food shortfall, although uncertainty in climate model projections (particularly precipitation) is a limitation to impact studies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brigantic, Robert T.; Betzsold, Nick J.; Bakker, Craig KR
In this presentation we overview a methodology for dynamic security risk quantification and optimal resource allocation of security assets for high profile venues. This methodology is especially applicable to venues that require security screening operations such as mass transit (e.g., train or airport terminals), critical infrastructure protection (e.g., government buildings), and largescale public events (e.g., concerts or professional sports). The method starts by decomposing the three core components of risk -- threat, vulnerability, and consequence -- into their various subcomponents. For instance, vulnerability can be decomposed into availability, accessibility, organic security, and target hardness and each of these can bemore » evaluated against the potential threats of interest for the given venue. Once evaluated, these subcomponents are rolled back up to compute the specific value for the vulnerability core risk component. Likewise, the same is done for consequence and threat, and then risk is computed as the product of these three components. A key aspect of our methodology is dynamically quantifying risk. That is, we incorporate the ability to uniquely allow the subcomponents and core components, and in turn, risk, to be quantified as a continuous function of time throughout the day, week, month, or year as appropriate.« less
Symbolic interactionism and critical perspective: divergent or synergistic?
Burbank, Patricia M; Martins, Diane C
2010-01-01
Throughout their history, symbolic interactionism and critical perspective have been viewed as divergent theoretical perspectives with different philosophical underpinnings. A review of their historical and philosophical origins reveals both points of divergence and areas of convergence. Their underlying philosophies of science and views of human freedom are different as is their level of focus with symbolic interactionism having a micro perspective and critical perspective using a macro perspective. This micro/macro difference is reflected in the divergence of their major concepts, goals and basic tenets. While their underlying philosophies are different, however, they are not necessarily contradictory and areas of convergence may include the concepts of reference groups and looking glass self within symbolic interactionism and ideological hegemony within critical perspective. By using a pragmatic approach and combining symbolic interactionism and critical perspectives, both micro and macro levels come into focus and strategies for change across individual and societal levels can be developed and applied. Application of both symbolic interactionism and critical perspective to nursing research and scholarship offers exciting new opportunities for theory development and research methodologies. In nursing education, these two perspectives can give students added insight into patients' and families' problems at the micro level while, at the same time, giving them a lens to see and tools to apply to problems at the macro level in health care. In nursing practice, a combined symbolic interactionism/critical perspective approach assists nurses to give high-quality care at the individual level while also working at the macro level to address the manufacturers of illness. New research questions emerge from this combination of perspectives with new possibilities for theory development, a transformation in nursing education, and the potential for new practice strategies that can address individual client and larger system problems through empowerment of clients and nurses.
DOT National Transportation Integrated Search
2006-08-01
The overall purpose of this research project is to conduct a feasibility study and development of a general methodology to determine the impacts on multi-modal and system efficiency of alternative freight security measures. The methodology to be exam...
Telemedicine security: a systematic review.
Garg, Vaibhav; Brewer, Jeffrey
2011-05-01
Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. © 2011 Diabetes Technology Society.
Telemedicine Security: A Systematic Review
Garg, Vaibhav; Brewer, Jeffrey
2011-01-01
Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592
Open Tools for Integrated Modelling to Understand SDG development - The OPTIMUS program
NASA Astrophysics Data System (ADS)
Howells, Mark; Zepeda, Eduardo; Rogner, H. Holger; Sanchez, Marco; Roehrl, Alexander; Cicowiez, Matrin; Mentis, Dimitris; Korkevelos, Alexandros; Taliotis, Constantinos; Broad, Oliver; Alfstad, Thomas
2016-04-01
The recently adopted Sustainable Development Goals (SDGs) - a set of 17 measurable and time-bound goals with 169 associated targets for 2030 - are highly inclusive challenges before the world community ranging from eliminating poverty to human rights, inequality, a secure world and protection of the environment. Each individual goal or target by themselves present enormous tasks, taken together they are overwhelming. There strong and weak interlinkages, hence trade-offs and complementarities among goals and targets. Some targets may affect several goals while other goals and targets may conflict or be mutually exclusive (Ref). Meeting each of these requires the judicious exploitation of resource, with energy playing an important role. Such complexity demands to be addressed in an integrated way using systems analysis tools to support informed policy formulation, planning, allocation of scarce resources, monitoring progress, effectiveness and review at different scales. There is no one size fits all methodology that conceivably could include all goal and targets simultaneously. But there are methodologies encapsulating critical subsets of the goal and targets with strong interlinkages with a 'soft' reflection on the weak interlinkages. Universal food security or sustainable energy for all inherently support goals and targets on human rights and equality but possibly at the cost of biodiversity or desertification. Integrated analysis and planning tools are not yet commonplace at national universities - or indeed in many policy making organs. What is needed is a fundamental realignment of institutions and integrations of their planning processes and decision making. We introduce a series of open source tools to support the SDG planning and implementation process. The Global User-friendly CLEW Open Source (GLUCOSE) tool optimizes resource interactions and constraints; The Global Electrification Tool kit (GETit) provides the first global spatially explicit electrification simulator; A national CLEW tool allows for the optimization of national level integrated resource use and Macro-CLEW presents the same allowing for detailed economic-biophysical interactions. Finally open Model Management Infrastructure (MoManI) is presented that allows for the rapid prototyping of new additions to, or new resource optimization tools. Collectively these tools provide insights to some fifteen of the SDGs and are made publicly available with support to governments and academic institutions.
2012-04-11
Policy (SWEEP) optimizing our own natural resources in the near term (oil, natural gas, coal, nuclear, wind, solar, hydro, geothermal and synthetics... geothermal and synthetics), and displaces the oil based economy with a long term energy transformation plan based on renewable energy, is vital to...climb and supply begins to diminish. Global energy demands will continue to rise as the developing economies of countries like Brazil, Russia, China
Probabilistic simulation of multi-scale composite behavior
NASA Technical Reports Server (NTRS)
Liaw, D. G.; Shiao, M. C.; Singhal, S. N.; Chamis, Christos C.
1993-01-01
A methodology is developed to computationally assess the probabilistic composite material properties at all composite scale levels due to the uncertainties in the constituent (fiber and matrix) properties and in the fabrication process variables. The methodology is computationally efficient for simulating the probability distributions of material properties. The sensitivity of the probabilistic composite material property to each random variable is determined. This information can be used to reduce undesirable uncertainties in material properties at the macro scale of the composite by reducing the uncertainties in the most influential random variables at the micro scale. This methodology was implemented into the computer code PICAN (Probabilistic Integrated Composite ANalyzer). The accuracy and efficiency of this methodology are demonstrated by simulating the uncertainties in the material properties of a typical laminate and comparing the results with the Monte Carlo simulation method. The experimental data of composite material properties at all scales fall within the scatters predicted by PICAN.
Macro policy responses to oil booms and busts in the United Arab Emirates
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Mutawa, A.K.
1991-01-01
The effects of oil shocks and macro policy changes in the United Arab Emirates are analyzed. A theoretical model is developed within the framework of the Dutch Disease literature. It contains four unique features that are applicable to the United Arab Emirates' economy. There are: (1) the presence of a large foreign labor force; (2) OPEC's oil export quotas; (3) the division of oil profits; and (4) the important role of government expenditures. The model is then used to examine the welfare effects of the above-mentioned shocks. An econometric model is then specified that conforms to the analytical model. Inmore » the econometric model the method of principal components' is applied owing to the undersized sample data. The principal components methodology is used in both the identification testing and the estimation of the structural equations. The oil and macro policy shocks are then simulated. The simulation results show that an oil-quantity boom leads to a higher welfare gain than an oil-price boom. Under certain circumstances, this finding is also confirmed by the comparative statistics that follow from the analytical model.« less
Subsize specimen testing of nuclear reactor pressure vessel material
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, A.S.; Rosinski, S.T.; Cannon, N.S.
1991-01-01
A new methodology is proposed to correlate the upper shelf energy (USE) of full size and subsize Charpy specimens of a nuclear reactor pressure vessel plate material, A533B. The methodology appears to be more satisfactory than the methodologies proposed earlier. USE of a notched-only specimen is partitioned into macro-crack initiation and crack propagation energies. USE of a notched and precracked specimen provides the crack propagation energy. [Delta]USE, the difference between the USE's of notched-only and precracked specimens, is an estimate of the crack initiation energy. [Delta]USE was normalized by a factor involving the dimensions of the Charpy specimen and themore » stress concentration factor at the notch root. The normalized values of the [Delta]USE were found to be invariant with specimen size.« less
NASA Astrophysics Data System (ADS)
de Sa, Arsenio; Moura, Isabel; Abreu, Ana S.; Oliveira, Manuel; Ferreira, Miguel F.; Machado, Ana V.
2017-05-01
The entrapment of quantum dots (QDs) in the inner part of micelles formed by surfactant polymers is a powerful methodology to prepare stable and photoluminescent core nanoparticles with enhanced optical properties. These features are crucial for the application of QDs in the design of hybrid assemblies for light harvesting applications, where energy transfer processes are required. The present work was focused on the synthesis of a surfactant homopolymer, poly (acrylic acid) (PAA) macroRAFT, to be used as a stabilizer of hydrophobic cadmium telluride (CdTe) QDs in aqueous solution. PAA macroRAFT was synthesized by reversible addition-fragmentation chain-transfer (RAFT) polymerization in a single chemical reaction. Its micelles were used to entangle and entrap hydrophobic CdTe QDs, with different molar ratio of polymer and QDs. The morphology and optical properties of the entrapped QDs were determined. The results showed that PAA macroRAFT is able to form micelles with a critical micelle concentration of 2.08 mg/mL. It was also noticed that the molar ratio of polymer and QDs have high influence on the QDs' morphology and their optical properties. The QDs' photoluminescence quantum yield was enhanced approximately 23% upon their entrapment in PAA macroRAFT micelles, using 60 equivalents of polymer. Moreover, while in solution, QDs are well-dispersed, having a 3.5 nm diameter, upon being entrapped in the micelles, tend to form clusters with a size around 100 nm.
Parallel computation with the force
NASA Technical Reports Server (NTRS)
Jordan, H. F.
1985-01-01
A methodology, called the force, supports the construction of programs to be executed in parallel by a force of processes. The number of processes in the force is unspecified, but potentially very large. The force idea is embodied in a set of macros which produce multiproceossor FORTRAN code and has been studied on two shared memory multiprocessors of fairly different character. The method has simplified the writing of highly parallel programs within a limited class of parallel algorithms and is being extended to cover a broader class. The individual parallel constructs which comprise the force methodology are discussed. Of central concern are their semantics, implementation on different architectures and performance implications.
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2011 CFR
2011-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2011-10-01 2011-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2013 CFR
2013-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2013-10-01 2013-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2014 CFR
2014-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2014-10-01 2014-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2012 CFR
2012-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2012-10-01 2012-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2010 CFR
2010-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2010-10-01 2010-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
1989-10-13
and other non -technical aspects of the system). System-wide Perspective. The systerm that is being designed and engineered must include not just the...specifications and is regarded as the lowest-level (implementation) of detail.-’ Ihis decomposition follows the typical "top down" design methodology ...formal verification process has contributed to the security and correctness of the TCB design and implementation. FORMUL METHODOLOGY DESCRIPTION The
Simulation of Attacks for Security in Wireless Sensor Network.
Diaz, Alvaro; Sanchez, Pablo
2016-11-18
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.
Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.
Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis
2016-12-24
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.
Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis
2016-01-01
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119
ERIC Educational Resources Information Center
Warfield, Douglas L.
2011-01-01
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
2010-12-01
Methodology RMAT Risk Management Assessment Tool SIDA Security Identification Display Area SIGINT Signals Intelligence SO18 Aviation Security...aircraft operate (§ 1542.203); • Provide detection and physical security measures for the “Security Identification Display Area” ( SIDA ), i.e., the area
Subsize specimen testing of nuclear reactor pressure vessel material
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, A.S.; Rosinski, S.T.; Cannon, N.S.
1991-12-31
A new methodology is proposed to correlate the upper shelf energy (USE) of full size and subsize Charpy specimens of a nuclear reactor pressure vessel plate material, A533B. The methodology appears to be more satisfactory than the methodologies proposed earlier. USE of a notched-only specimen is partitioned into macro-crack initiation and crack propagation energies. USE of a notched and precracked specimen provides the crack propagation energy. {Delta}USE, the difference between the USE`s of notched-only and precracked specimens, is an estimate of the crack initiation energy. {Delta}USE was normalized by a factor involving the dimensions of the Charpy specimen and themore » stress concentration factor at the notch root. The normalized values of the {Delta}USE were found to be invariant with specimen size.« less
2013-05-15
Corps has increased the number of foreign area and regional area officer opportunities in the Marine Corps. As a result, an increased level of...and contribute to larger ‘whole of government’ system of projecting ‘smart’ power across the range of military operations.”5 On a macro- level , every...Wherefore, the ability to respond will depend on the level of resources and organizational structure of the MAGTF. The Unit Deployment Program (UDP
Romanos, Georgios E
2009-06-01
Immediate loading of oral implants has been extensively described in the international literature and the requirements for long-term success are evaluated. The author presents here the critical aspects of the criteria for success as well as describes the characteristics of an implant macro- and microdesign for immediate loading to control the periimplant crestal bone loss and secure the long-term stability. Information from the literature and the clinical experience will be presented.
Characteristics of a semi-custom library development system
NASA Technical Reports Server (NTRS)
Yancey, M.; Cannon, R.
1990-01-01
Standard cell and gate array macro libraries are in common use with workstation computer aided design (CAD) tools for application specific integrated circuit (ASIC) semi-custom application and have resulted in significant improvements in the overall design efficiencies as contrasted with custom design methodologies. Similar design methodology enhancements in providing for the efficient development of the library cells is an important factor in responding to the need for continuous technology improvement. The characteristics of a library development system that provides design flexibility and productivity enhancements for the library development engineer as he provides libraries in the state-of-the-art process technologies are presented. An overview of Gould's library development system ('Accolade') is also presented.
Simulation of Attacks for Security in Wireless Sensor Network
Diaz, Alvaro; Sanchez, Pablo
2016-01-01
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710
Triple symmetric key cryptosystem for data security
NASA Astrophysics Data System (ADS)
Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.
2017-11-01
As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shull, Doug
The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.
NASA Astrophysics Data System (ADS)
Möller, Thomas; Bellin, Knut; Creutzburg, Reiner
2015-03-01
The aim of this paper is to show the recent progress in the design and prototypical development of a software suite Copra Breeder* for semi-automatic generation of test methodologies and security checklists for IT vulnerability assessment in small and medium-sized enterprises.
Applying discursive approaches to health psychology.
Seymour-Smith, Sarah
2015-04-01
The aim of this paper is to outline the contribution of two strands of discursive research, glossed as 'macro' and 'micro,' to the field of health psychology. A further goal is to highlight some contemporary debates in methodology associated with the use of interview data versus more naturalistic data in qualitative health research. Discursive approaches provide a way of analyzing talk as a social practice that considers how descriptions are put together and what actions they achieve. A selection of recent examples of discursive research from one applied area of health psychology, studies of diet and obesity, are drawn upon in order to illustrate the specifics of both strands. 'Macro' discourse work in psychology incorporates a Foucauldian focus on the way that discourses regulate subjectivities, whereas the concept of interpretative repertoires affords more agency to the individual: both are useful for identifying the cultural context of talk. Both 'macro' and 'micro' strands focus on accountability to varying degrees. 'Micro' Discursive Psychology, however, pays closer attention to the sequential organization of constructions and focuses on naturalistic settings that allow for the inclusion of an analysis of the health professional. Diets are typically depicted as an individual responsibility in mainstream health psychology, but discursive research highlights how discourses are collectively produced and bound up with social practices. (c) 2015 APA, all rights reserved).
Automating Risk Analysis of Software Design Models
Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688
Automating risk analysis of software design models.
Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
Bialas, Andrzej
2011-01-01
Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains. PMID:22164064
Bialas, Andrzej
2011-01-01
Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.
Critical success factors for achieving superior m-health success.
Dwivedi, A; Wickramasinghe, N; Bali, R K; Naguib, R N G
2007-01-01
Recent healthcare trends clearly show significant investment by healthcare institutions into various types of wired and wireless technologies to facilitate and support superior healthcare delivery. This trend has been spurred by the shift in the concept and growing importance of the role of health information and the influence of fields such as bio-informatics, biomedical and genetic engineering. The demand is currently for integrated healthcare information systems; however for such initiatives to be successful it is necessary to adopt a macro model and appropriate methodology with respect to wireless initiatives. The key contribution of this paper is the presentation of one such integrative model for mobile health (m-health) known as the Wi-INET Business Model, along with a detailed Adaptive Mapping to Realisation (AMR) methodology. The AMR methodology details how the Wi-INET Business Model can be implemented. Further validation on the concepts detailed in the Wi-INET Business Model and the AMR methodology is offered via a short vignette on a toolkit based on a leading UK-based healthcare information technology solution.
[Resources of person psychological security depending on the employment status of a pensioner.
Krasnyanskaya, T M; Tylets, V G
2018-01-01
200 pensioners aged of 55 to 65 years differing in employment status (working or resting) after retirement age and character of his choice (voluntary or forced) were surveyed. The content and the structure of the resources of the pensioners' personality, of external determinants of the choice of their employment status, the connection of the external determinants of the choice of employment status and the resources of psychological security of the pensioners' personality were analyzed. The psychological resources consist of development and protection resources, proving the priority of resources security of the pensioners' person. The significance of resource development for working pensioners and the protection resources for real pensioners is established. The level of psychological safety of the personality of pensioners is determined by a combination of nature and voluntary choice of employment status. The choice of employment status depends on a complex assessment of macro-, meso- and microaspects of life. The self-estimation of the development resources is prioritized to save a pensioner work activities.
Cyber / Physical Security Vulnerability Assessment Integration
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Simpkins, Bret E.
Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less
High Pressure X-Ray Diffraction Studies of Nanocrystalline Materials
NASA Technical Reports Server (NTRS)
Palosz, B.; Stel'makh, S.; Grzanka, E.; Gierlotka, S.; Palosz, W.
2004-01-01
Experimental evidence obtained for a variety of nanocrystalline materials suggest that the crystallographic structure of a very small size particle deviates from that in the bulk crystals. In this paper we show the effect of the surface of nanocrystals on their structure by the analysis of generation and distribution of macro- and micro-strains at high pressures and their dependence on the grain size in nanocrystalline powders of Sic. We studied the structure of Sic nanocrystals by in-situ high-pressure powder diffraction technique using synchrotron and neutron sources and hydrostatic or isostatic pressure conditions. The diffraction measurements were done in HASYLAB at DESY using a Diamond Anvil Cell (DAC) in the energy dispersive geometry in the diffraction vector range up to 3.5 - 4/A and under pressures up to 50 GPa at room temperature. In-situ high pressure neutron diffraction measurements were done at LANSCE in Los Alamos National Laboratory using the HIPD and HIPPO diffractometers with the Paris-Edinburgh and TAP-98 cells, respectively, in the diffraction vector range up to 26 Examination of the response of the material to external stresses requires nonstandard methodology of the materials characterization and description. Although every diffraction pattern contains a complete information on macro- and micro-strains, a high pressure experiment can reveal only those factors which contribute to the characteristic diffraction patterns of the crystalline phases present in the sample. The elastic properties of powders with the grain size from several nm to micrometers were examined using three methodologies: (l), the analysis of positions and widths of individual Bragg reflections (used for calculating macro- and micro-strains generated during densification) [I], (2). the analysis of the dependence of the experimental apparent lattice parameter, alp, on the diffraction vector Q [2], and (3), the atomic Pair Distribution Function (PDF) technique [3]. The results of our studies show, that Sic nanocrystals have the features of two phases, each with its distinct elastic properties. and under pressures up to 8 GPa.
Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness
2016-06-01
within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need
A Survey on Security Isolation of Virtualization, Containers, and Unikernels
2017-05-01
this report are not to be construed as an official Department of the Army position unless so designated by other authorized documents. Citation of...characteristics is necessary to understand the potential threats. Each of these technologies contains subtle differences in the methodology and...technologies contains subtle differences in the methodology and software architecture to provide secure isolation between guests. All 3 of these
The Design Process of Physical Security as Applied to a U.S. Border Port of Entry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.
1999-02-22
This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functionsmore » of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.« less
Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises
ERIC Educational Resources Information Center
Shah, Ashish
2017-01-01
Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…
Gothard, David; Tare, Rahul S; Mitchell, Peter D; Dawson, Jonathan I; Oreffo, Richard O C
2011-04-07
Skeletal stem cells (SSCs) show great capacity for bone and cartilage repair however, current in vitro cultures are heterogeneous displaying a hierarchy of differentiation potential. SSCs represent the diminutive true multipotent stem cell fraction of bone marrow mononuclear cell (BMMNC) populations. Endeavours to isolate SSCs have generated a multitude of separation methodologies. SSCs were first identified and isolated by their ability to adhere to culture plastic. Once isolated, further separation is achieved via culture in selective or conditioned media (CM). Indeed, preferential SSC growth has been demonstrated through selective in vitro culture conditions. Other approaches have utilised cell morphology (size and shape) as selection criteria. Studies have also targeted SSCs based on their preferential adhesion to specified compounds, individually or in combination, on both macro and microscale platforms. Nevertheless, most of these methods which represent macroscale function with relatively high throughput, yield insufficient purity. Consequently, research has sought to downsize isolation methodologies to the microscale for single cell analysis. The central approach is identification of the requisite cell populations of SSC-specific surface markers that can be targeted for isolation by either positive or negative selection. SELEX and phage display technology provide apt means to sift through substantial numbers of candidate markers. In contrast, single cell analysis is the paramount advantage of microfluidics, a relatively new field for cell biology. Here cells can be separated under continuous or discontinuous flow according to intrinsic phenotypic and physicochemical properties. The combination of macroscale quantity with microscale specificity to generate robust high-throughput (HT) technology for pure SSC sorting, isolation and enrichment offers significant implications therein for skeletal regenerative strategies as a consequence of lab on chip derived methodology.
Functioning information in the learning health system.
Stucki, Gerold; Bickenbach, Jerome
2017-02-01
In this methodological note on applying the ICF in rehabilitation, we introduce functioning information as fundamental for the "learning health system" and the continuous improvement of the health system's response to people's functioning needs by means of the provision of rehabilitation. A learning health system for rehabilitation operates at the micro-level of the individual patient, meso-level of operational management, and the macro-level of policy that guides rehabilitation programming. All three levels rely on the capacity of the informational system of the health system for standardized documentation and coding of functioning information, and the development of national rehabilitation quality management systems. This methodological note describes how functioning information is used for the continuous improvement of functioning outcomes in a learning health system across these three levels.
Disposal Of Irradiated Cadmium Control Rods From The Plumbrook Reactor Facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Posivak, E.J.; Berger, S.R.; Freitag, A.A.
2008-07-01
Innovative mixed waste disposition from NASA's Plum Brook Reactor Facility was accomplished without costly repackaging. Irradiated characteristic hardware with contact dose rates as high as 8 Sv/hr was packaged in a HDPE overpack and stored in a Secure Environmental Container during earlier decommissioning efforts, awaiting identification of a suitable pathway. WMG obtained regulatory concurrence that the existing overpack would serve as the macro-encapsulant per 40CFR268.45 Table 1.C. The overpack vent was disabled and the overpack was placed in a stainless steel liner to satisfy overburden slumping requirements. The liner was sealed and placed in shielded shoring for transport to themore » disposal site in a US DOT Type A cask. Disposition via this innovative method avoided cost, risk, and dose associated with repackaging the high dose irradiated characteristic hardware. In conclusion: WMG accomplished what others said could not be done. Large D and D contractors advised NASA that the cadmium control rods could only be shipped to the proposed Yucca mountain repository. NASA management challenged MOTA to find a more realistic alternative. NASA and MOTA turned to WMG to develop a methodology to disposition the 'hot and nasty' waste that presumably had no path forward. Although WMG lead a team that accomplished the 'impossible', the project could not have been completed with out the patient, supportive management by DOE-EM, NASA, and MOTA. (authors)« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
... Balance Orders March 22, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act... security. Net Balance Order Pricing The uniform settlement price for net Balance Orders is currently established using a rounding methodology.\\11\\ If the current per share price of the Balance Order Security is...
Information Security Risk Assessment in Hospitals.
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.
Nunnery, Danielle L; Labban, Jeffrey D; Dharod, Jigna M
2018-03-01
To (i) determine differences in the availability of variety of fruits and vegetables (F&V) at home by food security status; and (ii) examine the inter-associations between food security status, availability of variety of F&V at home and frequency of F&V intake, among low-income pregnant women. Design/Setting Participants were interviewed to collect food security status, home availability of variety of F&V and frequency of F&V intake. Bivariate analyses, multivariate regression and exploratory mediation analyses were conducted using IBM SPSS Statistics version 23.0 and the PROCESS macro. Low-income pregnant women (n 198) were interviewed if they were ≥18 years of age, in the second trimester of pregnancy, and spoke English or Spanish. Low/very low food security was found among 43 % of participants. Compared with fully food-secure participants, very low food-secure participants reported a lower variety of fruits (P=0·028) and vegetables (P=0·058) available at home. Mediation analyses indicated that through home availability of variety of fresh F&V, food security status was associated with the daily intake of F&V (indirect effect (95 % CI): fresh fruits, -0·039 (-0·074, -0·013); fresh vegetables, -0·048 (-0·083, -0·023)). As food security worsened, the available variety of fresh F&V decreased, which was associated with lower intake. The study highlights the interlink between food security, home food environment and diet quality, and the importance of nutrition education intervention to promote a healthy home food environment and improved pregnancy outcomes among low-income women.
Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari
2002-01-01
The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.
2011-01-01
Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb) assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the LabKey Server NAb tool without installing the software by using the Atlas Science Portal (https://atlas.scharp.org). Atlas is an installation of LabKey Server. PMID:21619655
Coping with seismic vulnerability: small manufacturing firms in western Athens.
Sapountzaki, Kalliopi
2005-06-01
This paper attempts to contribute to international discourse on the responsibility of macro structures (economic and political) and private agencies for the production and distribution of vulnerability. It does so by focusing on an individual economic entity, small manufacturing firms (SMFs), in a specific location, western Athens, Greece. By evaluating the losses that SMFs sustained in the earthquake of 7 September 1999, the paper points to variations in vulnerability levels among such firms and highlights the 'sources' of vulnerability they confront. Furthermore, the SMF recovery cycle is systematically monitored in parallel with relevant public policies and state reactions to private recovery methods. The analysis illustrates processes that externalise recovery costs, alter the relationship between physical and socio-economic vulnerability and shift the vulnerability load from macro structures to individual agencies or vice versa. It is based on two methodological approaches: the division of vulnerability into three constituent components (exposure, resistance and resilience); and the conceptual split between producers and carriers of vulnerability.
ERIC Educational Resources Information Center
van Ravens, Jan; Aggio, Carlos
2008-01-01
While the critical importance of early childhood care and education (ECCE) is undisputed, few developing countries are presently pursuing strong national policies to expand it. Thus, Goal One of the Education for All (EFA) agenda--"Expanding and improving comprehensive early childhood care and education, especially for the most vulnerable and…
NASA Astrophysics Data System (ADS)
Uvarova, Svetlana; Vlasenko, Vyacheslav; Bukreev, Anatoly; Myshovskaya, Ludmila; Kuzina, Olga
2018-03-01
This article is based on the analysis of modern condition and dynamics of innovational development of high-rise buildings construction. A number of cardinal organizational and economic changes in management at the macro and meso-levels is taken into the account. Principal scheme of development of the methodology of formation of perspective innovation politics in high-ruse buildings construction based on inculcation of modern methods of strategic control of innovational activity is suggested in this article.
Laboratory Study on Macro-Features of Wave Breaking Over Bars and Artificial Reefs
1990-07-01
Prototype and Model Conditions of Case CE400 ( Pilot Test ) . 72 7 List of Design Parameters for Base Tests ... ........... . 72 8 List of Design Parameters...bar configurations, and the procedure was repeated. Pilot test 112. A pilot test was performed as a trial of the methodology and vali- dation of the...criterion on bar depth given by Larson and Kraus (1989) prior to actual testing . In this pilot test , the wave conditions and equilibrium bar formed in a
Al-Ruzouq, Rami; Shanableh, Abdallah; Omar, Maher; Al-Khayyat, Ghadeer
2018-02-17
Waste management involves various procedures and resources for proper handling of waste materials in compliance with health codes and environmental regulations. Landfills are one of the oldest, most convenient, and cheapest methods to deposit waste. However, landfill utilization involves social, environmental, geotechnical, cost, and restrictive regulation considerations. For instance, landfills are considered a source of hazardous air pollutants that can cause health and environmental problems related to landfill gas and non-methanic organic compounds. The increasing number of sensors and availability of remotely sensed images along with rapid development of spatial technology are helping with effective landfill site selection. The present study used fuzzy membership and the analytical hierarchy process (AHP) in a geo-spatial environment for landfill site selection in the city of Sharjah, United Arab Emirates. Macro- and micro-level factors were considered; the macro-level contained social and economic factors, while the micro-level accounted for geo-environmental factors. The weighted spatial layers were combined to generate landfill suitability and overall suitability index maps. Sensitivity analysis was then carried out to rectify initial theoretical weights. The results showed that 30.25% of the study area had a high suitability index for landfill sites in the Sharjah, and the most suitable site was selected based on weighted factors. The developed fuzzy-AHP methodology can be applied in neighboring regions with similar geo-natural conditions.
Song, Cunfeng; Yu, Shirong; Liu, Cheng; Deng, Yuanming; Xu, Yiting; Chen, Xiaoling; Dai, Lizong
2016-05-01
A methodology to prepare thermo-responsive graft copolymer by using a novel macro-RAFT agent was proposed. The macro-RAFT agent with pendant dithioester (ZC(S)SR) was facilely prepared via the combination of RAFT polymerization and esterification reaction. By means of ZC(S)SR-initiated RAFT polymerization, the thermo-responsive graft copolymer consisting of poly(methyl methacrylate-co-hydroxylethyl methacrylate) (P(MMA-co-HEMA)) backbone and hydrophilic poly(N-isopropylacrylamide) (PNIPAAm) side chains was constructed through the "grafting from" approach. The chemical compositions and molecular weight distributions of the synthesized polymers were respectively characterized by (1)H nuclear magnetic resonance ((1)H NMR) and gel permeation chromatography (GPC). Self-assembly behavior of the amphiphilic graft copolymers (P(MMA-co-HEMA)-g-PNIPAAm) was studied by transmission electron microscopy (TEM), dynamic light scattering (DLS) and spectrofluorimeter. The critical micelle concentration (CMC) value was 0.052 mg mL(-1). These micelles have thermo-responsibility and a low critical solution temperature (LCST) of 33.5°C. Further investigation indicated that the guest molecule release property of these micelles, which can be well described by a first-order kinetic model, was significantly affected by temperature. Besides, the micelles exhibited excellent biocompatibility and cellular uptake property. Hence, these micelles are considered to have potential application in controlled drug delivery. Copyright © 2016 Elsevier B.V. All rights reserved.
Matrix Game Methodology - Support to V2010 Olympic Marine Security Planners
2011-02-01
OMOC was called the Integrated Safety /Security Matrix Game – Marine III, and was held 16-17 June 2009. This was the most extensive and complex of...Protection Matrix Game Marine Two .................................................. 12 3.3 Integrated Safety /Security Matrix Game – Marine III...Integrated Safety /Security Matrix Game – Marine III Scenarios........................... 53 ISSMG Marine III – Team Groupings
An Information Security Control Assessment Methodology for Organizations
ERIC Educational Resources Information Center
Otero, Angel R.
2014-01-01
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66398; File No. SR-NSCC-2012-02] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Enhance Its Margining Methodology as Applied to Municipal and Corporate Bonds February 15, 2012...
Practical proof of CP element based design for 14nm node and beyond
NASA Astrophysics Data System (ADS)
Maruyama, Takashi; Takita, Hiroshi; Ikeno, Rimon; Osawa, Morimi; Kojima, Yoshinori; Sugatani, Shinji; Hoshino, Hiromi; Hino, Toshio; Ito, Masaru; Iizuka, Tetsuya; Komatsu, Satoshi; Ikeda, Makoto; Asada, Kunihiro
2013-03-01
To realize HVM (High Volume Manufacturing) with CP (Character Projection) based EBDW, the shot count reduction is the essential key. All device circuits should be composed with predefined character parts and we call this methodology "CP element based design". In our previous work, we presented following three concepts [2]. 1) Memory: We reported the prospects of affordability for the CP-stencil resource. 2) Logic cell: We adopted a multi-cell clustering approach in the physical synthesis. 3) Random interconnect: We proposed an ultra-regular layout scheme using fixed size wiring tiles containing repeated tracks and cutting points at the tile edges. In this paper, we will report the experimental proofs in these methodologies. In full chip layout, CP stencil resource management is critical key. From the MCC-POC (Proof of Concept) result [1], we assumed total available CP stencil resource as 9000um2. We should manage to layout all circuit macros within this restriction. Especially the issues in assignment of CP-stencil resource for the memory macros are the most important as they consume considerable degree of resource because of the various line-ups such as 1RW-, 2RW-SRAMs, Resister Files and ROM which require several varieties of large size peripheral circuits. Furthermore the memory macros typically take large area of more than 40% of die area in the forefront logic LSI products so that the shot count increase impact is serious. To realize CP-stencil resource saving we had constructed automatic CP analyzing system. We developed two types of extraction mode of simple division by block and layout repeatability recognition. By properly controlling these models based upon each peripheral circuit characteristics, we could minimize the consumption of CP stencil resources. The estimation for 14nm technology node had been performed based on the analysis of practical memory compiler. The required resource for memory macro is proved to be affordable value which is 60% of full CP stencil resource and wafer level converted shot count is proved to be the level which meets 100WPH throughput. In logic cell design, circuit performance verification result after the cell clustering has been estimated. The cell clustering by the acknowledgment of physical distance proved to owe large penalty mainly in the wiring length. To reduce this design penalty, we proposed CP cell clustering by the acknowledgment of logical distance. For shot-count reduction of random interconnect area design, we proposed a more structural routing architecture which consists of the track exchange and the via position arrangement. Putting these design approaches together, we can design CP stencils to hit the target throughput within the area constraint. From the analysis for other macros such as analog, I/O, and DUMMY, it has proved that we don't need special CP design approach than legacy pattern matching CP extraction. From all these experimental results we get good prospects to the reality of full CP element based layout.
Security Quality Requirements Engineering (SQUARE) Methodology
2005-11-01
such as Joint Application Development and the Accelerated Requirements Method [Wood 89, Hubbard 99] • Soft Systems Methodology [Checkland 89...investigated were misuse cases [Jacobson 92], Soft Systems Methodology (SSM) [Checkland 89], Quality Function Deployment (QFD) [QFD 05], Con- trolled...html (2005). [Checkland 89] Checkland, Peter. Soft Systems Methodology . Rational Analysis for a Problematic World. New York, NY: John Wiley & Sons
Ng'endo, Mary; Bhagwat, Shonil; Keding, Gudrun B
2018-03-01
Sub-Saharan Africa is the only region in the world where hunger is prevalent in over one-third of the population, with smallholder farming households, producers of over 80% of Africa's food, facing both calorie and micronutrient deficiencies. With agricultural systems serving as the main source of all nutrients, little is known about the extent to which agricultural diversity in different seasons can meet macro- and micronutrient needs in rural Africa. Linkages between nutrient diversity and food species were investigated. A case study was conducted in Western Kenya to assess the seasonal nutrient diversity, seasonal nutrient accessibility levels, and food perceptions in 30 smallholder farms, 7 markets, and among 97 focus group discussion participants, respectively. All present food plant and animal species were inventoried and assigned to 1 of the 7 major Food and Agriculture Organization-defined food groups. Based on 2 macronutrients and 5 micronutrients, dendrogram-based nutrient functional diversity metrics were calculated. On-farm and market food species offered all 7 macro- and micronutrients under investigation, regardless of seasonal variation in species numbers. Although there were varying seasonal nutrient accessibility levels in markets, farms were especially effective in readily availing 4 of the 7 nutrients. However, the main food shortage months coincided only with maize shortage, but a diversity of local foods, deemed to be of low cultural and culinary preferences, were available. Nutrition education on the importance of a diversity of local foods in meeting dietary needs, thus stimulating the demand side, can contribute to achieving year-round household food security.
China’s Energy Security: The Grand Hedging Strategy
2010-05-01
spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s
NASA Astrophysics Data System (ADS)
Peng, Xiang; Zhang, Peng; Cai, Lilong
In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.
Why do nations matter? The struggle for belonging and security in an uncertain world.
Skey, Michael
2013-03-01
This paper explores the reasons why national forms of identification and organization (might) matter in the contemporary era. In contrast to the majority of macro-sociological work dealing with this topic, I develop an analytical framework that draws together recent research on everyday nationalism with micro-sociological and psychological studies pointing to the importance of routine practices, institutional arrangements and symbolic systems in contributing to a relatively settled sense of identity, place and community. The second part of the paper focuses on the hierarchies of belonging that operate within a given national setting. Of particular interest is the largely taken-for-granted status of the ethnic majority and the degree to which it underpins claims to belonging and entitlement that are used to secure key allocative and authoritative resources. © London School of Economics and Political Science 2013.
Indications and Warning Methodology for Strategic Intelligence
2017-12-01
WARNING METHODOLOGY FOR STRATEGIC INTELLIGENCE by Susann Kimmelman December 2017 Thesis Co-Advisors: Robert Simeral James Wirtz THIS...Master’s thesis 4. TITLE AND SUBTITLE INDICATIONS AND WARNING METHODOLOGY FOR STRATEGIC INTELLIGENCE 5. FUNDING NUMBERS 6. AUTHOR(S) Susann...enterprise. The research found that, for homeland security, implementing a human-centric indications and warning methodology that focuses on the actor as
NASA Astrophysics Data System (ADS)
González, M. R.; Lambán, M. P.
2012-04-01
This paper presents the result of designing the subject Quality Engineering and Security of the Product, belonging to the Degree of Engineering in Industrial Design and Product Development, on the basis of the case methodology. Practical sessions of this subject are organized using the whole documents of the Quality System Management of the virtual company BeaLuc S.A.
Information Security Risk Assessment in Hospitals
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
Background: To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective: The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. Method: This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). Results: The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). Conclusion: The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies. PMID:29204226
ERIC Educational Resources Information Center
Sikolia, David Wafula
2013-01-01
User non-compliance with information security policies in organizations due to negligence or ignorance is reported as a key data security problem for organizations. The violation of the confidentiality, integrity and availability of organizational data has led to losses in millions of dollars for organizations in terms of money and time spent…
Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria
ERIC Educational Resources Information Center
Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel
2013-01-01
Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…
NASA Astrophysics Data System (ADS)
Abid, Fathi; Kaffel, Bilel
2018-01-01
Understanding the interrelationships of the global macro assets is crucial for global macro investing. This paper investigates the local variance and the interconnection between the stock, gold, oil, Forex and the implied volatility markets in the time/frequency domains using the wavelet methodology, including the wavelet power spectrum, the wavelet squared coherence and phase difference, the wavelet multiple correlation and cross-correlation. The univariate analysis reveals that, in some crisis periods, underlying asset markets present the same pattern in terms of the wavelet power spectrum indicating high volatility for the medium scale, and that for the other market stress periods, volatility behaves differently. Moreover, unlike the underlying asset markets, the implied volatility markets are characterized by high power regions across the entire period, even in the absence of economic events. Bivariate results show a bidirectional relationship between the underlying assets and their corresponding implied volatility indexes, and a steady co-movement between the stock index and its corresponding fear index. Multiple correlation analysis indicates a strong correlation between markets at high scales with evidence of a nearly perfect integration for a period longer than a year. In addition, the hedging strategies based on the volatility index lead to an increase in portfolio correlation. On the other hand, the results from multiple cross-correlations reveal that the lead-lag effect starts from the medium scale and that the VIX (stock market volatility index) index is the potential leader or follower of the other markets.
Vasta, Robert; Crandell, Ian; Millican, Anthony; House, Leanna; Smith, Eric
2017-10-13
Microphone sensor systems provide information that may be used for a variety of applications. Such systems generate large amounts of data. One concern is with microphone failure and unusual values that may be generated as part of the information collection process. This paper describes methods and a MATLAB graphical interface that provides rapid evaluation of microphone performance and identifies irregularities. The approach and interface are described. An application to a microphone array used in a wind tunnel is used to illustrate the methodology.
NASA Technical Reports Server (NTRS)
Kumosa, M.; Predecki, P. K.; Armentrout, D.; Benedikt, B.; Rupnowski, P.; Gentz, M.; Kumosa, L.; Sutter, J. K.
2002-01-01
This research contributes to the understanding of macro- and micro-failure mechanisms in woven fabric polyimide matrix composites based on medium and high modulus graphite fibers tested under biaxial, shear dominated stress conditions over a temperature range of -50 C to 315 C. The goal of this research is also to provide a testing methodology for determining residual stress distributions in unidirectional, cross/ply and fabric graphite/polyimide composites using the concept of embedded metallic inclusions and X-ray diffraction (XRD) measurements.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Design methodology of Dutch banknotes
NASA Astrophysics Data System (ADS)
de Heij, Hans A. M.
2000-04-01
Since the introduction of a design methodology for Dutch banknotes, the quality of Dutch paper currency has improved in more than one way. The methodology is question provides for (i) a design policy, which helps fix clear objectives; (ii) design management, to ensure a smooth cooperation between the graphic designer, printer, papermaker an central bank, (iii) a program of requirements, a banknote development guideline for all parties involved. This systematic approach enables an objective selection of design proposals, including security features. Furthermore, the project manager obtains regular feedback from the public by conducting market surveys. Each new design of a Netherlands Guilder banknote issued by the Nederlandsche Bank of the past 50 years has been an improvement on its predecessor in terms of value recognition, security and durability.
Danielson, Christian; Mehrnezhad, Ali; YekrangSafakar, Ashkan; Park, Kidong
2017-06-14
Self-folding or micro-origami technologies are actively investigated as a novel manufacturing process to fabricate three-dimensional macro/micro-structures. In this paper, we present a simple process to produce a self-folding structure with a biaxially oriented polystyrene sheet (BOPS) or Shrinky Dinks. A BOPS sheet is known to shrink to one-third of its original size in plane, when it is heated above 160 °C. A grid pattern is engraved on one side of the BOPS film with a laser engraver to decrease the thermal shrinkage of the engraved side. The thermal shrinkage of the non-engraved side remains the same and this unbalanced thermal shrinkage causes folding of the structure as the structure shrinks at high temperature. We investigated the self-folding mechanism and characterized how the grid geometry, the grid size, and the power of the laser engraver affect the bending curvature. The developed fabrication process to locally modulate thermomechanical properties of the material by engraving the grid pattern and the demonstrated design methodology to harness the unbalanced thermal shrinkage can be applied to develop complicated self-folding macro/micro structures.
An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies
2012-09-01
FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security
Meeting EHR security requirements: SeAAS approach.
Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian
2010-01-01
In the last few years, Electronic Health Record (EHR) systems have received a great attention in the literature, as well as in the industry. They are expected to lead to health care savings, increase health care quality and reduce medical errors. This interest has been accompanied by the development of different standards and frameworks to meet EHR challenges. One of the most important initiatives that was developed to solve problems of EHR is IHE (Integrating the Healthcare Enterprise), which adapts the distributed approach to store and manage healthcare data. IHE aims at standardizing the way healthcare systems exchange information in distributed environments. For this purpose it defines several so called Integration Profiles that specify the interactions and the interfaces (Transactions) between various healthcare systems (Actors) or entities. Security was considered also in few profiles that tackled the main security requirements, mainly authentication and audit trails. The security profiles of IHE currently suffer two drawbacks. First, they apply end point security methodology, which has been proven recently to be insufficient and cumbersome in distributed and heterogeneous environment. Second, the current security profiles for more complex security requirements are oversimplified, vague and do not consider architectural design. This recently changed to some extend e.g., with the introduction of newly published white papers regarding privacy [5] and access control [9]. In order to solve the first problem we utilize results of previous studies conducted in the area of security-aware IHE-based systems and the state-of-the-art Security-as-a-Service approach as a convenient methodology to group domain-wide security needs and overcome the end point security shortcomings.
1984-12-01
52242 Prepared for the AIR FORCE OFFICE OF SCIENTIFIC RESEARCH Under Grant No. AFOSR 82-0322 December 1984 ~ " ’w Unclassified SECURITY CLASSIFICATION4...OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS Unclassified None 20 SECURITY CLASSIFICATION...designer .and computer- are 20 DIiRIBUTION/AVAILABI LIT Y 0P ABSTR4ACT 21 ABSTRACT SECURITY CLASSIFICA1ONr UNCLASSIFIED/UNLIMITED SAME AS APT OTIC USERS
From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication
NASA Astrophysics Data System (ADS)
Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San
Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.
[Discovering pathways for health research in dealing with the social movement].
Smeke, E L
1993-01-01
This article is about methodology for scientific research in health, where the researcher is an important part of the object of investigation. The implementation of a broad-based Health Reform in Brazil depends on the involvement of users. It is important to guarantee these social rights. Many experiences sharing this concern are going on in this country. Still, research on the relationship between institutional work in health and the Social Movement lacks a predefined methodology. Therefore, the main objectives of this study are the following: to contribute to the discussion of possible ways of approaching the mechanisms of relationships between health and users of health services, and to collaborate with the development of the citizenship process. This work was done through theoretical research on participatory methodology and "action-based research". The following aspects are particularly important: definition of the object of study, self-positioning by the researcher, subjective explanations, documentary surveys and interviews for case studies, and feedback to theory. Finally, the author concludes that this methodology allows for an understanding of some mechanisms that explain the relationship between macro- and micro-structural analyses. In addition, one also observes a maturation process in the research protagonists.
New perspectives in ecosystem services science as instruments to understand environmental securities
Villa, Ferdinando; Voigt, Brian; Erickson, Jon D.
2014-01-01
As societal demand for food, water and other life-sustaining resources grows, the science of ecosystem services (ES) is seen as a promising tool to improve our understanding, and ultimately the management, of increasingly uncertain supplies of critical goods provided or supported by natural ecosystems. This promise, however, is tempered by a relatively primitive understanding of the complex systems supporting ES, which as a result are often quantified as static resources rather than as the dynamic expression of human–natural systems. This article attempts to pinpoint the minimum level of detail that ES science needs to achieve in order to usefully inform the debate on environmental securities, and discusses both the state of the art and recent methodological developments in ES in this light. We briefly review the field of ES accounting methods and list some desiderata that we deem necessary, reachable and relevant to address environmental securities through an improved science of ES. We then discuss a methodological innovation that, while only addressing these needs partially, can improve our understanding of ES dynamics in data-scarce situations. The methodology is illustrated and discussed through an application related to water security in the semi-arid landscape of the Great Ruaha river of Tanzania. PMID:24535393
Scalar mixing and strain dynamics methodologies for PIV/LIF measurements of vortex ring flows
NASA Astrophysics Data System (ADS)
Bouremel, Yann; Ducci, Andrea
2017-01-01
Fluid mixing operations are central to possibly all chemical, petrochemical, and pharmaceutical industries either being related to biphasic blending in polymerisation processes, cell suspension for biopharmaceuticals production, and fractionation of complex oil mixtures. This work aims at providing a fundamental understanding of the mixing and stretching dynamics occurring in a reactor in the presence of a vortical structure, and the vortex ring was selected as a flow paradigm of vortices commonly encountered in stirred and shaken reactors in laminar flow conditions. High resolution laser induced fluorescence and particle imaging velocimetry measurements were carried out to fully resolve the flow dissipative scales and provide a complete data set to fully assess macro- and micro-mixing characteristics. The analysis builds upon the Lamb-Oseen vortex work of Meunier and Villermaux ["How vortices mix," J. Fluid Mech. 476, 213-222 (2003)] and the engulfment model of Baldyga and Bourne ["Simplification of micromixing calculations. I. Derivation and application of new model," Chem. Eng. J. 42, 83-92 (1989); "Simplification of micromixing calculations. II. New applications," ibid. 42, 93-101 (1989)] which are valid for diffusion-free conditions, and a comparison is made between three methodologies to assess mixing characteristics. The first method is commonly used in macro-mixing studies and is based on a control area analysis by estimating the variation in time of the concentration standard deviation, while the other two are formulated to provide an insight into local segregation dynamics, by either using an iso-concentration approach or an iso-concentration gradient approach to take into account diffusion.
Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian
2007-03-01
Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.
Acquisition Systems Protection Planning the Manhatten Project: A Case Study
1994-06-03
This study examines the counterintelligence and security programs of the Manhattan Project , the United States acquisition of the atomic bomb, using...assessment methodology and counterintelligence techniques and procedures. Acquisition systems, Program protection, Manhattan Project , Atomic bomb, Technology protection, Counterintelligence, Security.
Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure
NASA Astrophysics Data System (ADS)
Arndt, Craig M.; Hall, Nathaniel A.
2004-08-01
Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.
Security Implications of Physical Design Attributes in the Emergency Department.
Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E
2016-07-01
Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.
Mittal, Rochak; Tavanandi, Hrishikesh A; Mantri, Vaibhav A; Raghavarao, K S M S
2017-09-01
Extraction of phycobiliproteins (R-phycoerythrin, R-PE and R-phycocyanin, R-PC) from macro-algae is difficult due to the presence of large polysaccharides (agar, cellulose etc.) present in the cell wall which offer major hindrance for cell disruption. The present study is aimed at developing most suitable methodology for the primary extraction of R-PE and R-PC from marine macro-algae, Gelidium pusillum(Stackhouse) Le Jolis. Such extraction of phycobiliproteins by using ultrasonication and other conventional methods such as maceration, maceration in presence of liquid nitrogen, homogenization, and freezing and thawing (alone and in combinations) is reported for the first time. Standardization of ultrasonication for different parameters such as ultrasonication amplitude (60, 90 and 120µm) and ultrasonication time (1, 2, 4, 6, 8 and 10mins) at different temperatures (30, 35 and 40°C) was carried out. Kinetic parameters were estimated for extraction of phycobiliproteins by ultrasonication based on second order mass transfer kinetics. Based on calorimetric measurements, power, ultrasound intensity and acoustic power density were estimated to be 41.97W, 14.81W/cm 2 and 0.419W/cm 3 , respectively. Synergistic effect of ultrasonication was observed when employed in combination with other conventional primary extraction methods. Homogenization in combination with ultrasonication resulted in an enhancement in efficiency by 9.3% over homogenization alone. Similarly, maceration in combination with ultrasonication resulted in an enhancement in efficiency by 31% over maceration alone. Among all the methods employed, maceration in combination with ultrasonication resulted in the highest extraction efficiency of 77 and 93% for R-PE and R-PC, respectively followed by homogenization in combination with ultrasonication (69.6% for R-PE and 74.1% for R-PC). HPLC analysis was carried out in order to ensure that R-PE was present in the extract and remained intact even after processing. Microscopic studies indicated a clear relation between the extraction efficiency of phycobiliproteins and degree of cell disruption in a given primary extraction method. These combination methods were found to be effective for extraction of phycobiliproteins from rigid biomass of Gelidium pusillum macro-algae and can be employed for downstream processing of biomolecules also from other macro-algae. Copyright © 2017 Elsevier B.V. All rights reserved.
[Heavy metal pollution ecology of macro-fungi: research advances and expectation].
Zhou, Qi-xing; An, Xin-long; Wei, Shu-he
2008-08-01
Macro-fungi are the main component of biosphere and one of the ecological resources, and play very important roles in matter cycling and in maintaining ecological balances. This paper summarized and reviewed the research advances in the eco-toxicological effects of heavy metals on macro-fungi, the bioaccumulation function of macro-fungi on heavy metals, the ecological adaptation mechanisms of macro-fungi to heavy metal pollution, the role of macro-fungi as a bio-indicator of heavy metal pollution, and the potential of macro-fungi in the ecological remediation of contaminated environment. To strengthen the researches on the heavy metal pollution ecology of macro-fungi would be of practical significance in the reasonable utilization of macro-fungi resources and in the ecological remediation of contaminated environment.
To Legalize or not to Legalize? That is the Question
2009-04-01
and international community to improve security and promote development in Afghanistan. The negative effect on the nations overall security, the...the problem/solution methodology. The research explores the current illicit opium cultivation in Afghanistan and its effect on the current...negative effect on the current development efforts. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF
1982-02-23
segregate the computer and storage from the outside world 2. Administrative security to control access to secure computer facilities 3. Network security to...Classification Alternative A- 8 NETWORK KG GENSER DSSCS AMPE TERMINALS TP No. 022-4668-A Figure A-2. Dedicated Switching Architecture Alternative A- 9...communications protocol with the network and GENSER message transmission to the - I-S/A AMPE processor. 7. DSSCS TPU - Handles communications protocol with
Evaluating the risk of industrial espionage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bott, T.F.
1998-12-31
A methodology for estimating the relative probabilities of different compromise paths for protected information by insider and visitor intelligence collectors has been developed based on an event-tree analysis of the intelligence collection operation. The analyst identifies target information and ultimate users who might attempt to gain that information. The analyst then uses an event tree to develop a set of compromise paths. Probability models are developed for each of the compromise paths that user parameters based on expert judgment or historical data on security violations. The resulting probability estimates indicate the relative likelihood of different compromise paths and provide anmore » input for security resource allocation. Application of the methodology is demonstrated using a national security example. A set of compromise paths and probability models specifically addressing this example espionage problem are developed. The probability models for hard-copy information compromise paths are quantified as an illustration of the results using parametric values representative of historical data available in secure facilities, supplemented where necessary by expert judgment.« less
Family, intimacy, and homicide: a macro-social approach.
Parker, R N; Toth, A M
1990-01-01
The study of violence among sexual intimates and family members within sociology is currently developing along two lines that are methodologically distinct. A macrosocial approach analyzes rates of homicide for cities, metropolitan areas, and states, while a microsocial approach, which has focused largely on family violence, relies on surveys to study self-reports of assaultive violence. As the two traditions have developed, they have emphasized a different range of independent variables and types of violence. The macro-social tradition has focused on subcultures, economic deprivation, and trends in lifestyles and daily activity patterns. The micro-social researchers have emphasized the impact of social change on marital roles and expectations, conflict, power and exchange within interpersonal relationships, and the impact of historical patterns and cultural norms concerning the patterns of violence within families and sexually intimate relationships. Similarly, one tradition focuses almost exclusively on homicide while the other has generally studied serious, but not lethal assaults. Ultimately the two traditions could lead to similar conclusions about the causes of violence among intimates. A convergence of findings would enhance confidence in the validity of results, while discrepant findings would point to flaws in theory or method. This paper begins to consider convergences and differences by using the techniques that have been developed in the macro-social tradition along with hypotheses drawn from both traditions. Data on four specific types of homicide from a sample of 299 central cities are examined in a series of parallel models which include indicators of the causes of violence derived from both traditions.
Additive Manufacturing in Production: A Study Case Applying Technical Requirements
NASA Astrophysics Data System (ADS)
Ituarte, Iñigo Flores; Coatanea, Eric; Salmi, Mika; Tuomi, Jukka; Partanen, Jouni
Additive manufacturing (AM) is expanding the manufacturing capabilities. However, quality of AM produced parts is dependent on a number of machine, geometry and process parameters. The variability of these parameters affects the manufacturing drastically and therefore standardized processes and harmonized methodologies need to be developed to characterize the technology for end use applications and enable the technology for manufacturing. This research proposes a composite methodology integrating Taguchi Design of Experiments, multi-objective optimization and statistical process control, to optimize the manufacturing process and fulfil multiple requirements imposed to an arbitrary geometry. The proposed methodology aims to characterize AM technology depending upon manufacturing process variables as well as to perform a comparative assessment of three AM technologies (Selective Laser Sintering, Laser Stereolithography and Polyjet). Results indicate that only one machine, laser-based Stereolithography, was feasible to fulfil simultaneously macro and micro level geometrical requirements but mechanical properties were not at required level. Future research will study a single AM system at the time to characterize AM machine technical capabilities and stimulate pre-normative initiatives of the technology for end use applications.
A methodology for long-range prediction of air transportation
NASA Technical Reports Server (NTRS)
Ayati, M. B.; English, J. M.
1980-01-01
A framework and methodology for long term projection of demand for aviation fuels is presented. The approach taken includes two basic components. The first was a new technique for establishing the socio-economic environment within which the future aviation industry is embedded. The concept utilized was a definition of an overall societal objective for the very long run future. Within a framework so defined, a set of scenarios by which the future will unfold are then written. These scenarios provide the determinants of the air transport industry operations and accordingly provide an assessment of future fuel requirements. The second part was the modeling of the industry in terms of an abstracted set of variables to represent the overall industry performance on a macro scale. The model was validated by testing the desired output variables from the model with historical data over the past decades.
NASA Astrophysics Data System (ADS)
McCartney, Tannis Maureen
Tectonic subsidence curves for over 300 subsurface wells in west-central Alberta indicate that the Western Canada Foreland Basin was initiated at the same time the lower units of the Fernie Formation were being deposited. This evidence is further supported by sedimentological data and fits with the timing of the onset of deformation in the Cordillera and the initiation of the foreland basin in Montana. The volume of subsidence curves in this study required an innovative methodology. Subsidence calculations were performed using customized macros in a spreadsheet. The tectonic subsidence variations were displayed in a tectonic subsidence envelope, which showed the total variation in the subsidence curves, and three suites of maps: tectonic subsidence, tectonic subsidence residuals, and tectonic subsidence ratios. Collectively, the maps of the tectonic subsidence in the Fernie Formation show that there was a western influence on subsidence during deposition of the oldest members of the Fernie Formation.
Global sensitivity analysis of groundwater transport
NASA Astrophysics Data System (ADS)
Cvetkovic, V.; Soltani, S.; Vigouroux, G.
2015-12-01
In this work we address the model and parametric sensitivity of groundwater transport using the Lagrangian-Stochastic Advection-Reaction (LaSAR) methodology. The 'attenuation index' is used as a relevant and convenient measure of the coupled transport mechanisms. The coefficients of variation (CV) for seven uncertain parameters are assumed to be between 0.25 and 3.5, the highest value being for the lower bound of the mass transfer coefficient k0 . In almost all cases, the uncertainties in the macro-dispersion (CV = 0.35) and in the mass transfer rate k0 (CV = 3.5) are most significant. The global sensitivity analysis using Sobol and derivative-based indices yield consistent rankings on the significance of different models and/or parameter ranges. The results presented here are generic however the proposed methodology can be easily adapted to specific conditions where uncertainty ranges in models and/or parameters can be estimated from field and/or laboratory measurements.
ERIC Educational Resources Information Center
Blanc, Michel, Ed.; Hamers, Josiane F., Ed.
Papers from an international conference on the interaction of languages and dialects in contact are presented in this volume. Papers include: "Quelques reflexions sur la variation linguistique"; "The Investigation of 'Language Continuum' and 'Diglossia': A Macrological Case Study and Theoretical Model"; "A Survey of…
A multi-level systems perspective for the science of team science.
Börner, Katy; Contractor, Noshir; Falk-Krzesinski, Holly J; Fiore, Stephen M; Hall, Kara L; Keyton, Joann; Spring, Bonnie; Stokols, Daniel; Trochim, William; Uzzi, Brian
2010-09-15
This Commentary describes recent research progress and professional developments in the study of scientific teamwork, an area of inquiry termed the "science of team science" (SciTS, pronounced "sahyts"). It proposes a systems perspective that incorporates a mixed-methods approach to SciTS that is commensurate with the conceptual, methodological, and translational complexities addressed within the SciTS field. The theoretically grounded and practically useful framework is intended to integrate existing and future lines of SciTS research to facilitate the field's evolution as it addresses key challenges spanning macro, meso, and micro levels of analysis.
A combined use of proximal sensors can magnify the terroir effect of every vintage
NASA Astrophysics Data System (ADS)
Priori, Simone; Bianconi, Nadia; Valboa, Giuseppe; Barbetti, Roberto; Fantappiè, Maria; L'Abate, Giovanni; Lorenzetti, Romina; Mocali, Stefano; Pellegrini, Sergio; Leprini, Marco; Perria, Rita; Storchi, Paolo; Costantini, Edoardo
2014-05-01
Grape composition, which affects the wine sensory qualities, depends on vine features (rootstock, scion, vine health) and vineyard management as much as environmental factors. Mapping soil at the vineyard scale, in particular, helps in optimizing the terroir expression of the wine. The terroir effect however varies every year, in dependence of the interaction between climate and soil. Aim of this research work was to set a methodology to dimension homogeneous harvest zones (HZ) in the vineyard and to test the vintage effect on them. Four terroir macro-units were selected within a wide farm in the Chianti Classico D.O.C.G. district (Siena, Central Italy). The selected macro-units represented the most common viticultural environments of the Chianti Classico D.O.C.G. and they were: 1) hills of high altitude (450-500 m a.s.l.) on feldspathic sandstones, with shallow sandy soils; 2) hills of high altitude (400-500 m a.s.l.) on clayey-calcareous flysches, with stony and calcareous soils; 3) hills of moderate altitude (250-350 m a.s.l.) on Pliocene sandy marine deposits; 4) hills and fluvial terraces of moderate altitude (200-300 m a.s.l., 50-100 m above the present river valley) on ancient fluvial deposits. Selected vineyards of each terroir macro-unit was surveyed by soil proximal sensing, to define two homogeneous zones (HZ) in terms of soil features in each macro-unit. The sensors used were: i) γ-ray spectrometer, to map the variability of soil surface in terms of parent material, texture and stoniness; ii) electromagnetic induction sensor (EMI) to determine the spatial variability of texture and soil moisture in the sub-surface horizons; iii) time domain reflectometry (TDR), to measure soil moisture content in the sub-surface soil horizon (30-50 cm). TDR measurements were performed in fixed points (about 1 each 1,000 m2) three times a year, during spring shoot growth (beginning of April), berries veraison (end of July-beginning of August) and final ripening phase before harvest (September). The moisture content was interpolated on the total surface of the experimental vineyards by regression kriging using the γ-ray and EMI proximal data. HZ were mapped according to several parameters, mainly moisture content homogeneity and soil features, but also farm requirements, like size and simplified geometry for hand-made grape harvesting. Each area should have been about 15,000 m2 in size, so to allow an harvest of about 9 tons of grape and a wine-making in an ordinary vat of the winery. After a six-months aging, the wines were analyzed and tasted by a panel of 10 experts to characterize their quality and peculiarities. To determine grape homogeneity within HZ, three experimental sites for each HZ were selected to determine plant water stress, grape production and wine quality obtained by micro wine-making. After two vintages (2012 and 2013) the main results were: i) terroir macro-units influenced the wine quality and peculiarities in both vintages; ii) HZ strongly magnified wine peculiarities in three-fourths of macro-units in 2012 vintage. In the 2013 vintage instead, characterized by a rainy early summer, the differences between the HZ in each macro-area were less evident. Concluding, the preliminary results of the work seemed to indicate a fruitful use of the HZ within macro-areas, but not every vintage.
77 FR 44699 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
.../Chief Information Officer, Securities and Exchange Commission, c/o Remi Pavlik-Simon, 6432 General Green..., recordkeeping, financial reporting, and oversight rules with respect to registered credit rating agencies. In... methodologies in light of the role they played in determining credit ratings for securities collateralized by or...
Hsieh, Ning
2016-01-01
Although both China and Russia have experienced several decades of market reform, initial evidence suggests that this structural change has compromised mental and physical health among the Russian population but not the Chinese population. Using data from the World Health Organization (WHO) Study on Global AGEing and Adult Health (2007–2010), this study examines the factors associated with the disparity in depression between older adults in China and their Russian counterparts, all of whom experienced market transition in the prime of their lives (N=10,896). Results show that the lower level of depression among Chinese respondents is attributable to higher levels of economic security and social cohesion, as well as stronger effects of economic and social resources on depression, while health-rating style is likely a minor factor. The study advances the sociological understanding of global/comparative mental health by considering the effects of macro-level political, economic, social, and cultural conditions. PMID:26578542
Texting "boosts" felt security.
Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C
2014-01-01
Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
NASA Technical Reports Server (NTRS)
Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.
2018-01-01
River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... information as part of the research needed to write a NIST Special Publication (SP) to help Computer Security.... The NIST SP will identify technical standards, methodologies, procedures, and processes that facilitate prompt and effective response. This RFI requests information regarding technical best practices...
van Geffen, Koert G; Berg, Matty P; Aerts, Rien
2011-12-01
As a result of low decomposition rates, high-latitude ecosystems store large amounts of carbon. Litter decomposition in these ecosystems is constrained by harsh abiotic conditions, but also by the absence of macro-detritivores. We have studied the potential effects of their climate change-driven northward range expansion on the decomposition of two contrasting subarctic litter types. Litter of Alnus incana and Betula pubescens was incubated in microcosms together with monocultures and all possible combinations of three functionally different macro-detritivores (the earthworm Lumbricus rubellus, isopod Oniscus asellus, and millipede Julus scandinavius). Our results show that these macro-detritivores stimulated decomposition, especially of the high-quality A. incana litter and that the macro-detritivores tested differed in their decomposition-stimulating effects, with earthworms having the largest influence. Decomposition processes increased with increasing number of macro-detritivore species, and positive net diveristy effects occurred in several macro-detritivore treatments. However, after correction for macro-detritivore biomass, all interspecific differences in macro-detritivore effects, as well as the positive effects of species number on subarctic litter decomposition disappeared. The net diversity effects also appeared to be driven by variation in biomass, with a possible exception of net diversity effects in mass loss. Based on these results, we conclude that the expected climate change-induced range expansion of macro-detritivores into subarctic regions is likely to result in accelerated decomposition rates. Our results also indicate that the magnitude of macro-detritivore effects on subarctic decomposition will mainly depend on macro-detritivore biomass, rather than on macro-detritivore species number or identity.
Wide Area Security Region Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin
2010-03-31
This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less
Bode, Ingvild
2017-01-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586
Bode, Ingvild
2018-06-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.
Lemons to Lemonade: How Five Challenges in Teaching Macro Practice Helped to Strengthen Our Course
ERIC Educational Resources Information Center
Dooley, Joe; Sellers, Sherril; Gordon-Hempe, Cornelia
2009-01-01
Teaching macro practice can be challenging. While students have some concepts of what macro practice entails, their knowledge may be limited and sometimes inaccurate. Moreover, students may be reluctant to engage in macro change efforts. Given the scarcity of literature regarding teaching macro practice and the growing importance of it in social…
Unexplained high thyroid stimulating hormone: a "BIG" problem.
Mendoza, Heidi; Connacher, Alan; Srivastava, Rajeev
2009-01-01
Macro-hormones and macro-enzymes are high molecular weight conjugates of hormones or enzymes, respectively, often with immunoglobulins. These are referred to as macromolecular complexes, and may cause artefactually elevated biochemical tests results. Macro enzymes of the most commonly measured serum enzymes have been identified and are recognised as a source of elevated measurements that may cause diagnostic confusion; macro-creatine kinase and macro-amylase are the two better known macro-enzymes in clinical practice. Literature on macro-hormones is largely restricted to macro-prolactin. We present a case of a clinically euthyroid patient, who had persistently elevated thyroid stimulating hormone (TSH) but free thyroxine within the reference limits. She underwent repeated thyroid investigations and thyroid hormone interference studies, until macro-TSH was identified as the most likely cause of unexplained elevated TSH. Following the identification and characterisation of this biochemical abnormality, she is no longer subject to repeated blood tests for assessment of thyroid function; the patient currently remains clinically euthyroid.
Darwin's missing link - a novel paradigm for evolution education
NASA Astrophysics Data System (ADS)
Catley, Kefyn M.
2006-09-01
Microevolutionary mechanisms are taught almost exclusively in our schools, to the detriment of those mechanisms that allow us to understand the larger picture - macroevolution. The results are demonstrable; as a result of the strong emphasis on micro processes in evolution education, students and teachers still have poor understanding of the processes which operate at the macro level, and virtually no understanding at all of the history of life on our planet. Natural selection has become synonymous with the suite of processes we call evolution. This paper makes the case for a paradigm shift in evolution education, so that both perspectives - micro and macro - are given equal weight. Increasingly, issues of bioethics, human origins, cloning, etc., are being cast in a light that requires an understanding of macroevolution. To deny our students access to this debate is to deny the call for universal science literacy. A methodology from professional practice is proposed that could achieve this goal, and discussed in light of its utility, theoretical underpinnings, and historical legacy. A mandate for research is proposed that focuses on learners' understanding of several challenging macroevolutionary concepts, including species, the formation of higher groups, deep time, and hierarchical thinking.
Gkiouleka, Anna; Huijts, Tim; Beckfield, Jason; Bambra, Clare
2018-03-01
This essay brings together intersectionality and institutional approaches to health inequalities, suggesting an integrative analytical framework that accounts for the complexity of the intertwined influence of both individual social positioning and institutional stratification on health. This essay therefore advances the emerging scholarship on the relevance of intersectionality to health inequalities research. We argue that intersectionality provides a strong analytical tool for an integrated understanding of health inequalities beyond the purely socioeconomic by addressing the multiple layers of privilege and disadvantage, including race, migration and ethnicity, gender and sexuality. We further demonstrate how integrating intersectionality with institutional approaches allows for the study of institutions as heterogeneous entities that impact on the production of social privilege and disadvantage beyond just socioeconomic (re)distribution. This leads to an understanding of the interaction of the macro and the micro facets of the politics of health. Finally, we set out a research agenda considering the interplay/intersections between individuals and institutions and involving a series of methodological implications for research - arguing that quantitative designs can incorporate an intersectional institutional approach. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.
Doehlert experimental design applied to optimization of light emitting textile structures
NASA Astrophysics Data System (ADS)
Oguz, Yesim; Cochrane, Cedric; Koncar, Vladan; Mordon, Serge R.
2016-07-01
A light emitting fabric (LEF) has been developed for photodynamic therapy (PDT) for the treatment of dermatologic diseases such as Actinic Keratosis (AK). A successful PDT requires homogenous and reproducible light with controlled power and wavelength on the treated skin area. Due to the shape of the human body, traditional PDT with external light sources is unable to deliver homogenous light everywhere on the skin (head vertex, hand, etc.). For better light delivery homogeneity, plastic optical fibers (POFs) have been woven in textile in order to emit laterally the injected light. The previous studies confirmed that the light power could be locally controlled by modifying the radius of POF macro-bendings within the textile structure. The objective of this study is to optimize the distribution of macro-bendings over the LEF surface in order to increase the light intensity (mW/cm2), and to guarantee the best possible light deliver homogeneity over the LEF which are often contradictory. Fifteen experiments have been carried out with Doehlert experimental design involving Response Surface Methodology (RSM). The proposed models are fitted to the experimental data to enable the optimal set up of the warp yarns tensions.
Miniaturized unified imaging system using bio-inspired fluidic lens
NASA Astrophysics Data System (ADS)
Tsai, Frank S.; Cho, Sung Hwan; Qiao, Wen; Kim, Nam-Hyong; Lo, Yu-Hwa
2008-08-01
Miniaturized imaging systems have become ubiquitous as they are found in an ever-increasing number of devices, such as cellular phones, personal digital assistants, and web cameras. Until now, the design and fabrication methodology of such systems have not been significantly different from conventional cameras. The only established method to achieve focusing is by varying the lens distance. On the other hand, the variable-shape crystalline lens found in animal eyes offers inspiration for a more natural way of achieving an optical system with high functionality. Learning from the working concepts of the optics in the animal kingdom, we developed bio-inspired fluidic lenses for a miniature universal imager with auto-focusing, macro, and super-macro capabilities. Because of the enormous dynamic range of fluidic lenses, the miniature camera can even function as a microscope. To compensate for the image quality difference between the central vision and peripheral vision and the shape difference between a solid-state image sensor and a curved retina, we adopted a hybrid design consisting of fluidic lenses for tunability and fixed lenses for aberration and color dispersion correction. A design of the world's smallest surgical camera with 3X optical zoom capabilities is also demonstrated using the approach of hybrid lenses.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Etingov, Pavel V.; Makarov, Yuri V.; Wu, Di
The document describes detailed uncertainty quantification (UQ) methodology developed by PNNL to estimate secure ranges of potential dynamic intra-hour interchange adjustments in the ISO-NE system and provides description of the dynamic interchange adjustment (DINA) tool developed under the same contract. The overall system ramping up and down capability, spinning reserve requirements, interchange schedules, load variations and uncertainties from various sources that are relevant to the ISO-NE system are incorporated into the methodology and the tool. The DINA tool has been tested by PNNL and ISO-NE staff engineers using ISO-NE data.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L
2018-03-01
While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.
Sustainability impact assessment to improve food security of smallholders in Tanzania
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schindler, Jana, E-mail: jana.schindler@zalf.de; Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin; Graef, Frieder, E-mail: graef@zalf.de
The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agriculturalmore » production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... methodology developed by NationsShares, a firm that develops proprietary derivatives-based indexes and options... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To List Options... the Exchange of options on the Nations VolDex index, a new index that measures changes in implied...
2016-01-14
hyperproperty and a liveness hyperproperty. A verification technique for safety hyperproperties is given and is shown to generalize prior tech- niques for...liveness properties are affiliated with specific verification methods. An analogous theory for security policies would be appealing. The fact that security...verified by using invariance arguments. Our verification methodology generalizes prior work on using invariance arguments to verify information-flow
12 CFR Appendix A to Subpart B of... - Risk-Based Capital Test Methodology and Specifications
Code of Federal Regulations, 2010 CFR
2010-01-01
... Statistical Rating Organization (NRSRO) for this security, as of the reporting date Wt Avg Gross Margin Gross... Nationally Recognized Statistical Rating Organization (NRSRO) for this security, as of the reporting date [c... The most current rating issued by any Nationally Recognized Statistical Rating Organization (NRSRO...
2010-11-01
altering drugs ) but must be influenced indirectly through the physical and information dimensions. c. Information Operations modify the three dimensions...restoration of information systems by incorporating protection, detection, and reaction capabilities. (2) Physical Security is that part of security...wargamed using the traditional friendly action, expected enemy reaction , and friendly counteraction methodology. The wargaming process must also occur
Implementing HIPAA security in a membership organization.
Hillabrant, L P; Gaignard, K E
2000-01-01
The upcoming HIPAA security regulations are forcing a change in business and operating procedures that many, if not most, healthcare organizations are ill-prepared to tackle. Of all healthcare organizational structures, membership organizations will most likely face the greatest number of obstacles in preparing for and implementing the HIPAA security regulations. This is because the membership organization as a whole must find a way to accommodate the disparate technologies, business and operating methodologies and processes, and available, limited resources of its individual member organizations, and integrate these into a uniform implementation plan. Compounding these obvious difficulties is the unique challenge of enforcement authority. The individual member organizations are autonomous business entities, whereas the membership organization as a whole merely acts as an advisor or consultant, and has only limited enforcement authority over any individual member organization. This article explores this unique situation in depth. We focus on PROMINA Health System, a nonprofit healthcare membership organization that consists of five disparate member healthcare organizations. We examine the challenges PROMINA has encountered in its quest to institute an organization-wide HIPAA security program and its methodology for accomplishing program implementation.
A data protection scheme for a remote vital signs monitoring healthcare service.
Gritzalis, D; Lambrinoudakis, C
2000-01-01
Personal and medical data processed by Healthcare Information Systems must be protected against unauthorized access, modification and withholding. Security measures should be selected to provide the required level of protection in a cost-efficient manner. This is only feasible if specific characteristics of the information system are examined on a basis of a risk analysis methodology. This paper presents the results of a risk analysis, based on the CRAMM methodology, for a healthcare organization offering a patient home-monitoring service through the transmission of vital signs, focusing on the identified security needs and the proposed countermeasures. The architectural and functional models of this service were utilized for identifying and valuating the system assets, the associated threats and vulnerabilities, as well as for assessing the impact on the patients and on the service provider, should the security of any of these assets is affected. A set of adequate organizational, administrative and technical countermeasures is described for the remote vital signs monitoring service, thus providing the healthcare organization with a data protection framework that can be utilized for the development of its own security plan.
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-05-21
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management.
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-01-01
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management. PMID:23698700
Sustainable Food Security Measurement: A Systemic Methodology
NASA Astrophysics Data System (ADS)
Findiastuti, W.; Singgih, M. L.; Anityasari, M.
2017-04-01
Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.
Personal Retirement Accounts and Saving†
Aguila, Emma
2017-01-01
Aging populations are leading countries worldwide to social security reforms. Many countries are moving from pay-as-you-go to personal retirement account (PRA) systems because of their financial sustainability and positive impact on private savings. PRA systems boost private savings at a macro level by converting a government liability into financial wealth managed by private fund managers. However, at a micro level, changes in retirement wealth affect individuals' saving and consumption patterns through their working lives. Retirement wealth increased for lower-income workers after Mexico introduced PRAs, crowding out saving, increasing consumption, and offsetting some of the PRA effect on private savings. (JEL D14, E21, H55, J26, O16) PMID:28286607
Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving
NASA Astrophysics Data System (ADS)
Porekar, Jan; Klobučar, Tomaž; Šaljič, Svetlana; Gabrijelčič, Dušan
We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future.
Interfacing peripheral nerve with macro-sieve electrodes following spinal cord injury.
Birenbaum, Nathan K; MacEwan, Matthew R; Ray, Wilson Z
2017-06-01
Macro-sieve electrodes were implanted in the sciatic nerve of five adult male Lewis rats following spinal cord injury to assess the ability of the macro-sieve electrode to interface regenerated peripheral nerve fibers post-spinal cord injury. Each spinal cord injury was performed via right lateral hemisection of the cord at the T 9-10 site. Five months post-implantation, the ability of the macro-sieve electrode to interface the regenerated nerve was assessed by stimulating through the macro-sieve electrode and recording both electromyography signals and evoked muscle force from distal musculature. Electromyography measurements were recorded from the tibialis anterior and gastrocnemius muscles, while evoked muscle force measurements were recorded from the tibialis anterior, extensor digitorum longus, and gastrocnemius muscles. The macro-sieve electrode and regenerated sciatic nerve were then explanted for histological evaluation. Successful sciatic nerve regeneration across the macro-sieve electrode interface following spinal cord injury was seen in all five animals. Recorded electromyography signals and muscle force recordings obtained through macro-sieve electrode stimulation confirm the ability of the macro-sieve electrode to successfully recruit distal musculature in this injury model. Taken together, these results demonstrate the macro-sieve electrode as a viable interface for peripheral nerve stimulation in the context of spinal cord injury.
Baker, Hallie E; Brown, Pamela Pitman
2015-01-01
The three-legged stool concept is widely used in gerontological and geriatric education as an explanation on how one should fiscally approach his or her retirement. Financial managers, planners, retirees, business owners, even the Social Security Administration uses this metaphor of fiscal soundness in retirement planning. Gerontologists are moving away from the "tripod of retirement income" and "three-legged stool" term, as more often market work is needed for financial security. This activity focuses on the tripod or three-legged stool concepts of retirement planning using active learning, allowing the students to work collaboratively in a group, reflect upon the activity, and most importantly have fun. The game also allows for an expansion of the tripod concepts into the four pillars of economic security, broaching the use of personal assets and the possible need for longer employment. Game scenarios also emphasize macro- and microlevel forces, such as race, gender, health status, education, or marital status, which can influence timing of retirement or the level of retirement income available. The authors include instructions on how to set up the learning experience including worksheets, as well as reflection questions posed throughout the process.
Li, Jinyu; Zhi, Wei; Xu, Taotao; Shi, Feng; Duan, Ke; Wang, Jianxin; Mu, Yandong; Weng, Jie
2016-01-01
The macro-pore sizes of porous scaffold play a key role for regulating ectopic osteogenesis and angiogenesis but many researches ignored the influence of interconnection between macro-pores with different sizes. In order to accurately reveal the relationship between ectopic osteogenesis and macro-pore sizes in dorsal muscle and abdominal cavities of dogs, hydroxyapatite (HA) scaffolds with three different macro-pore sizes of 500–650, 750–900 and 1100–1250 µm were prepared via sugar spheres-leaching process, which also had similar interconnecting structure determined by keeping the d/s ratio of interconnecting window diameter to macro-pore size constant. The permeability test showed that the seepage flow of fluid through the porous scaffolds increased with the increase of macro-pore sizes. The cell growth in three scaffolds was not affected by the macro-pore sizes. The in vivo ectopic implantation results indicated that the macro-pore sizes of HA scaffolds with the similar interconnecting structure have impact not only the speed of osteogenesis and angiogenesis but also the space distribution of newly formed bone. The scaffold with macro-pore sizes of 750–900 µm exhibited much faster angiogenesis and osteogenesis, and much more uniformly distribution of new bone than those with other macro-pore sizes. This work illustrates the importance of a suitable macro-pore sizes in HA scaffolds with the similar interconnecting structure which provides the environment for ectopic osteogenesis and angiogenesis. PMID:27699059
Macro TSH in patients with subclinical hypothyroidism.
Hattori, Naoki; Ishihara, Takashi; Yamagami, Keiko; Shimatsu, Akira
2015-12-01
TSH is a sensitive indicator of thyroid function. In subclinical hypothyroidism, however, serum TSH concentrations are elevated despite normal thyroid hormone levels, and macro TSH is one of the causes. This study aimed to clarify the prevalence and nature of macro TSH in patients with subclinical hypothyroidism. We conducted a 2-year cross-sectional observational study. We included 681 patients with subclinical hypothyroidism and 38 patients with overt hypothyroidism (controls). Macro TSH was screened by polyethylene glycol (PEG) method and analysed by gel filtration chromatography and bioassays. Among 681 serum samples, 117 exhibited PEG-precipitable TSH ratios greater than 75% (mean + 1·5 SD in controls) and were subjected to gel filtration chromatography. TSH was eluted at a position greater than 100 kDa in 11 patients with subclinical hypothyroidism (1·62%); these patients were diagnosed with macro TSH. The nature of macro TSH included eight anti-TSH autoantibodies of IgG class, two non-IgG-associated and one human anti-mouse antibody (HAMA). Macro TSH showed low bioactivity. Macro TSH was heterogeneous, but it is mostly comprised of TSH and anti-TSH autoantibodies. When PEG-precipitable TSH exceeds 90% in serum samples with TSH above 10 mU/l, clinicians should strongly suspect the presence of macro TSH and confirm it by gel chromatography. Because macro TSH exhibited low bioactivity, thyroid hormone replacement therapy may not be required in patients with subclinical hypothyroidism due to macro TSH except for those with high serum free TSH levels. © 2014 John Wiley & Sons Ltd.
The institutional logic of integrated care: an ethnography of patient transitions.
Shaw, James A; Kontos, Pia; Martin, Wendy; Victor, Christina
2017-03-20
Purpose The purpose of this paper is to use theories of institutional logics and institutional entrepreneurship to examine how and why macro-, meso-, and micro-level influences inter-relate in the implementation of integrated transitional care out of hospital in the English National Health Service. Design/methodology/approach The authors conducted an ethnographic case study of a hospital and surrounding services within a large urban centre in England. Specific methods included qualitative interviews with patients/caregivers, health/social care providers, and organizational leaders; observations of hospital transition planning meetings, community "hub" meetings, and other instances of transition planning; reviews of patient records; and analysis of key policy documents. Analysis was iterative and informed by theory on institutional logics and institutional entrepreneurship. Findings Organizational leaders at the meso-level of health and social care promoted a partnership logic of integrated care in response to conflicting institutional ideas found within a key macro-level policy enacted in 2003 (The Community Care (Delayed Discharges) Act). Through institutional entrepreneurship at the micro-level, the partnership logic became manifest in the form of relationship work among health and social care providers; they sought to build strong interpersonal relationships to enact more integrated transitional care. Originality/value This study has three key implications. First, efforts to promote integrated care should strategically include institutional entrepreneurs at the organizational and clinical levels. Second, integrated care initiatives should emphasize relationship-building among health and social care providers. Finally, theoretical development on institutional logics should further examine the role of interpersonal relationships in facilitating the "spread" of logics between macro-, meso-, and micro-level influences on inter-organizational change.
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards and defined failure scenarios. We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design principles and courses of action in making security-related decisions.
A Multi-Level Systems Perspective for the Science of Team Science
Börner, Katy; Contractor, Noshir; Falk-Krzesinski, Holly J.; Fiore, Stephen M.; Hall, Kara L.; Keyton, Joann; Spring, Bonnie; Stokols, Daniel; Trochim, William; Uzzi, Brian
2012-01-01
This Commentary describes recent research progress and professional developments in the study of scientific teamwork, an area of inquiry termed the “science of team science” (SciTS, pronounced “sahyts”). It proposes a systems perspective that incorporates a mixed-methods approach to SciTS that is commensurate with the conceptual, methodological, and translational complexities addressed within the SciTS field. The theoretically grounded and practically useful framework is intended to integrate existing and future lines of SciTS research to facilitate the field’s evolution as it addresses key challenges spanning macro, meso, and micro levels of analysis. PMID:20844283
Nano-metrology and terrain modelling - convergent practice in surface characterisation
Pike, R.J.
2000-01-01
The quantification of magnetic-tape and disk topography has a macro-scale counterpart in the Earth sciences - terrain modelling, the numerical representation of relief and pattern of the ground surface. The two practices arose independently and continue to function separately. This methodological paper introduces terrain modelling, discusses its similarities to and differences from industrial surface metrology, and raises the possibility of a unified discipline of quantitative surface characterisation. A brief discussion of an Earth-science problem, subdividing a heterogeneous terrain surface from a set of sample measurements, exemplifies a multivariate statistical procedure that may transfer to tribological applications of 3-D metrological height data.
Validating the Octave Allegro Information Systems Risk Assessment Methodology: A Case Study
ERIC Educational Resources Information Center
Keating, Corland G.
2014-01-01
An information system (IS) risk assessment is an important part of any successful security management strategy. Risk assessments help organizations to identify mission-critical IS assets and prioritize risk mitigation efforts. Many risk assessment methodologies, however, are complex and can only be completed successfully by highly qualified and…
Macro creatine kinase: determination and differentiation of two types by their activation energies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stein, W.; Bohner, J.; Steinhart, R.
1982-01-01
Determination of the MB isoenzyme of creatine kinase in patients with acute myocardial infarction may be disturbed by the presence of macro creatine kinase. The relative molecular mass of this form of creatine kinase in human serum is at least threefold that of the ordinary enzyme, and it is more thermostable. Here we describe our method for determination of macro creatine kinases and an easy-to-perform test for differentiating two forms of macro creatine kinase, based on their distinct activation energies. The activation energies of serum enzymes are mostly in the range of 40-65 kJ/mol of substrate. Unlike normal cytoplasmatic creatinemore » kinases and IgG-linked CK-BB (macro creatine kinase type 1) a second form of macro creatine kinase (macro creatine kinase type 2) shows activation energies greater than 80 kJ/mol of substrate. The exact composition of macro creatine kinase type 2 is still unknown, but there is good reason to believe that it is of mitochondrial origin.« less
Security Events and Vulnerability Data for Cybersecurity Risk Estimation.
Allodi, Luca; Massacci, Fabio
2017-08-01
Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.
Marine data security based on blockchain technology
NASA Astrophysics Data System (ADS)
Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang
2018-03-01
With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.
Weaponizing the Final Frontier: The United States and the New Space Race
2017-06-09
42 CHAPTER 3 RESEARCH METHODOLOGY ................................................................43 Documentary Analysis...Commission to Assess United States National Security Space Management and Organization, Executive Summary. The report concluded that to avoid a “Space Pearl...2010), 36. 10 Report of the Commission to Assess United States National Security Space Management and Organization pursuant to Public Law 106-65
The asymmetric effect of coal price on the China's macro economy using NARDL model
NASA Astrophysics Data System (ADS)
Hou, J. C.; Yang, M. C.
2016-08-01
The present work endeavors to explore the asymmetric effect of coal price on the China's macro economy by applying nonlinear autoregressive distributed lag (NARDL) model for the period of January 2005 to June 2015. The obtained results indicate that the coal price has a strong asymmetric effect on China's macro economy in the long-run. Namely one percent increase in coal price leads to 0.6194 percent of the China's macro economy increase; and while the coal price is reduces by 1 percent, the China's macro economy will decrease by 0.008 percent. These data indicate that when coal price rises, the effect on China's macro economy is far greater than the price decline. In the short-run, coal price fluctuation has a positive effect on the China's macro economy.
Methodological Problems on the Way to Integrative Human Neuroscience.
Kotchoubey, Boris; Tretter, Felix; Braun, Hans A; Buchheim, Thomas; Draguhn, Andreas; Fuchs, Thomas; Hasler, Felix; Hastedt, Heiner; Hinterberger, Thilo; Northoff, Georg; Rentschler, Ingo; Schleim, Stephan; Sellmaier, Stephan; Tebartz Van Elst, Ludger; Tschacher, Wolfgang
2016-01-01
Neuroscience is a multidisciplinary effort to understand the structures and functions of the brain and brain-mind relations. This effort results in an increasing amount of data, generated by sophisticated technologies. However, these data enhance our descriptive knowledge , rather than improve our understanding of brain functions. This is caused by methodological gaps both within and between subdisciplines constituting neuroscience, and the atomistic approach that limits the study of macro- and mesoscopic issues. Whole-brain measurement technologies do not resolve these issues, but rather aggravate them by the complexity problem. The present article is devoted to methodological and epistemic problems that obstruct the development of human neuroscience. We neither discuss ontological questions (e.g., the nature of the mind) nor review data, except when it is necessary to demonstrate a methodological issue. As regards intradisciplinary methodological problems, we concentrate on those within neurobiology (e.g., the gap between electrical and chemical approaches to neurophysiological processes) and psychology (missing theoretical concepts). As regards interdisciplinary problems, we suggest that core disciplines of neuroscience can be integrated using systemic concepts that also entail human-environment relations. We emphasize the necessity of a meta-discussion that should entail a closer cooperation with philosophy as a discipline of systematic reflection. The atomistic reduction should be complemented by the explicit consideration of the embodiedness of the brain and the embeddedness of humans. The discussion is aimed at the development of an explicit methodology of integrative human neuroscience , which will not only link different fields and levels, but also help in understanding clinical phenomena.
Methodological Problems on the Way to Integrative Human Neuroscience
Kotchoubey, Boris; Tretter, Felix; Braun, Hans A.; Buchheim, Thomas; Draguhn, Andreas; Fuchs, Thomas; Hasler, Felix; Hastedt, Heiner; Hinterberger, Thilo; Northoff, Georg; Rentschler, Ingo; Schleim, Stephan; Sellmaier, Stephan; Tebartz Van Elst, Ludger; Tschacher, Wolfgang
2016-01-01
Neuroscience is a multidisciplinary effort to understand the structures and functions of the brain and brain-mind relations. This effort results in an increasing amount of data, generated by sophisticated technologies. However, these data enhance our descriptive knowledge, rather than improve our understanding of brain functions. This is caused by methodological gaps both within and between subdisciplines constituting neuroscience, and the atomistic approach that limits the study of macro- and mesoscopic issues. Whole-brain measurement technologies do not resolve these issues, but rather aggravate them by the complexity problem. The present article is devoted to methodological and epistemic problems that obstruct the development of human neuroscience. We neither discuss ontological questions (e.g., the nature of the mind) nor review data, except when it is necessary to demonstrate a methodological issue. As regards intradisciplinary methodological problems, we concentrate on those within neurobiology (e.g., the gap between electrical and chemical approaches to neurophysiological processes) and psychology (missing theoretical concepts). As regards interdisciplinary problems, we suggest that core disciplines of neuroscience can be integrated using systemic concepts that also entail human-environment relations. We emphasize the necessity of a meta-discussion that should entail a closer cooperation with philosophy as a discipline of systematic reflection. The atomistic reduction should be complemented by the explicit consideration of the embodiedness of the brain and the embeddedness of humans. The discussion is aimed at the development of an explicit methodology of integrative human neuroscience, which will not only link different fields and levels, but also help in understanding clinical phenomena. PMID:27965548
Teaching Conversations with the XDS Sigma 7. Systems Description.
ERIC Educational Resources Information Center
Bork, Alfred M.; Mosmann, Charles
Some computers permit conventional programing languages to be extended by the use of macro-instructions, a sophisticated programing tool which is especially useful in writing instructional dialogs. Macro-instructions (or "macro's") are complex commands defined in terms of the machine language or other macro-instructions. Like terms in…
Execution of a self-directed risk assessment methodology to address HIPAA data security requirements
NASA Astrophysics Data System (ADS)
Coleman, Johnathan
2003-05-01
This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.
A DDDAS Framework for Volcanic Ash Propagation and Hazard Analysis
2012-01-01
probability distribution for the input variables (for example, Hermite polynomials for normally distributed parameters, or Legendre for uniformly...parameters and windfields will drive our simulations. We will use uncertainty quantification methodology – polynomial chaos quadrature in combination...quantification methodology ? polynomial chaos quadrature in combination with data integration to complete the DDDAS loop. 15. SUBJECT TERMS 16. SECURITY
ERIC Educational Resources Information Center
Andreassen, Carol; Fletcher, Philip
2007-01-01
This methodology report documents the design, development, and psychometric characteristics of the assessment instruments used in the second wave of the ECLS-B. The assessment instruments discussed measure children's cognitive development (BSF-R), socioemotional functioning (Two Bags Task), security of attachment (TAS-45), and physical development…
Andrade, Luís Renato Balbão; Amaral, Fernando Gonçalves
2012-01-01
Nanotechnologies is a multidisciplinary set of techniques to manipulate matter on nanoscale level, more precisely particles below 100 nm whose characteristic due to small size is essentially different from those found in macro form materials. Regarding to these new properties of the materials there are knowledge gaps about the effects of these particles on human organism and the environment. Although it still being considered emerging technology it is growing increasingly fast as well as the number of products using nanotechnologies in some production level and so the number of researchers involved with the subject. Given this scenario and based on literature related, a comprehensive methodology for health and safety at work for researching laboratories with activities in nanotechnologies was developed, based on ILO structure guidelines for safety and health at work system on which a number of nanospecific recommendations were added to. The work intends to offer food for thought on controlling risks associated to nanotechnologies.
Determinants, Health Problems, and Food Insecurity in Urban Areas of the Largest City in Cape Verde.
Craveiro, Isabel; Alves, Daniela; Amado, Miguel; Santos, Zélia; Fortes, Argentina Tomar; Delgado, António Pedro; Correia, Artur; Gonçalves, Luzia
2016-11-22
Urbanization processes are intertwined with nutritional transition because there is easier access to food of low nutritional quality at reduced prices, changing dietary patterns and leading to an increase of non-communicable chronic diseases. This study aims to understand the perceptions for high blood pressure, obesity, and alcoholism, describing some interactions of these dimensions in the problem of food security in the city of Praia. A qualitative study was carried out under the framework of the research project "UPHI-STAT: Urban Planning and Health Inequalities-moving from macro to micro statistics". Ten focus groups were conducted in three urban areas with distinct characteristics in the city of Praia, with a total of 48 participants. Participants reported frequent consumption of foods with poor nutritional quality, understanding the potential danger in terms of food security in the city of Praia. Easy access to and high levels of alcohol consumption, and poor quality of traditional drinks were mentioned by participants in the study areas. The impact of the economic situation on the possibility of access to safe and healthy options emerged as a differentiating factor.
Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model
NASA Astrophysics Data System (ADS)
Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman
2016-08-01
e-Tendering is an electronic processing of the tender document via internet and allow tenderer to publish, communicate, access, receive and submit all tender related information and documentation via internet. This study aims to design the e-Tendering system using Rational Unified Process approach. RUP provides a disciplined approach on how to assign tasks and responsibilities within the software development process. RUP has four phases that can assist researchers to adjust the requirements of various projects with different scope, problem and the size of projects. RUP is characterized as a use case driven, architecture centered, iterative and incremental process model. However the scope of this study only focusing on Inception and Elaboration phases as step to develop the model and perform only three of nine workflows (business modeling, requirements, analysis and design). RUP has a strong focus on documents and the activities in the inception and elaboration phases mainly concern the creation of diagrams and writing of textual descriptions. The UML notation and the software program, Star UML are used to support the design of e-Tendering. The e-Tendering design based on the RUP approach can contribute to e-Tendering developers and researchers in e-Tendering domain. In addition, this study also shows that the RUP is one of the best system development methodology that can be used as one of the research methodology in Software Engineering domain related to secured design of any observed application. This methodology has been tested in various studies in certain domains, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth. As a conclusion, these studies showed that the RUP one of a good research methodology that can be adapted in any Software Engineering (SE) research domain that required a few artifacts to be generated such as use case modeling, misuse case modeling, activity diagram, and initial class diagram from a list of requirements as identified earlier by the SE researchers
ERIC Educational Resources Information Center
Carberry, Damien
2017-01-01
This paper situates education as an integral component of the overall prison rehabilitation process. The article discusses how an educational practitioner's knowledge of attachment theory and masculinities can be utilized to develop a secure methodological teaching environment in the classroom of a prison education unit and create a space where…
ERIC Educational Resources Information Center
James, Melissa; Warner, Sam
2005-01-01
Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…
ERIC Educational Resources Information Center
Berger, Louis S.; And Others
This report analyzes a two-step program designed to achieve security in the administration of the English Comprehension Level (ECL) test given by the Defense Language Institute. Since the ECL test score is the basis for major administrative and academic decisions, there is great motivation for performing well, and student test compromise is…
2008-02-01
to the process to increase security may have economic consequences.7 Actions to improve security are undertaken with the knowledge that total ...inspections, and improve its facility compliance data. The Department of Homeland Security agreed with GAO’s recommendations. W r f e i o c r U p d w...A c U i s a c c g c r T p u w o a d c i T S To view the full product , including the scope and methodology, click on GAO-08-12. For more
ERIC Educational Resources Information Center
Mehrotra, Gita R.; Tecle, Aster S.; Ha, An Thi; Ghneim, Staci; Gringeri, Christina
2018-01-01
Field education and macro practice have been highlighted as central educational domains in social work education; however, little scholarship has looked at how macro social work practice competencies have been integrated into field-based learning. This exploratory study aimed to gain perspectives from field instructors regarding macro social work…
Macro-Language Planning for Multilingual Education: Focus on Programmes and Provision
ERIC Educational Resources Information Center
Taylor-Leech, Kerry; Liddicoat, Anthony J.
2014-01-01
This overview identifies some common features of macro-level language planning and briefly summarises the changing approaches to the analysis of macro-planning in the field. It previews six cases of language-in-education planning in response to linguistic diversity presented by the contributors to this issue. The cases show how macro-planning can…
Spreadsheet macros for coloring sequence alignments.
Haygood, M G
1993-12-01
This article describes a set of Microsoft Excel macros designed to color amino acid and nucleotide sequence alignments for review and preparation of visual aids. The colored alignments can then be modified to emphasize features of interest. Procedures for importing and coloring sequences are described. The macro file adds a new menu to the menu bar containing sequence-related commands to enable users unfamiliar with Excel to use the macros more readily. The macros were designed for use with Macintosh computers but will also run with the DOS version of Excel.
LARCMACS: A TEX macro set for typesetting NASA reports
NASA Technical Reports Server (NTRS)
Woessner, Linda H.; Mccaskill, Mary K.
1988-01-01
This LARCMACS user's manual describes the February 1988 version of LARCMACS, the TEX macro set used by the Technical Editing Branch (TEB) at NASA Langley Research Center. These macros were developed by the authors to facilitate the typesetting of NASA formal reports. They are also useful, however, for informal NASA reports and other technical documents such as meeting papers. LARCMACS are distributed by TEB for the convenience of the Langley TEX user community. LARCMACS contain macros for obtaining the standard double-column format for NASA reports, for typesetting tables in the ruled format traditional in NASA reports, and for typesetting difficult mathematical expressions. Each macro is described and numerous examples are included. Definitions of the LARCMACS macros are also included.
Agility through Automated Negotiation for C2 Services
2014-06-01
using this e-contract negotiation methodology in a C2 context in Brazil. We have modeled the operations of the Rio de Janeiro Command Center that will be...methodology in a C2 context in Brazil. We have modeled the operations of the Rio de Janeiro Command Center that will be in place for the World Cup (2014...through e-contracts. The scenario chosen to demonstrate this methodology is a security incident in Rio de Janeiro , host city of the next World Cup (2014
A Counter-IED Preparedness Methodology for Large Event Planning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Payne, Patricia W; Koch, Daniel B
Since 2009, Oak Ridge National Laboratory (ORNL) has been involved in a project sponsored by the Department of Homeland Security Science and Technology Directorate aimed at improving preparedness against Improvised Explosive Devices (IED) at large sporting events. Led by the University of Southern Mississippi (USM) as part of the Southeast Region Research Initiative, the project partners have been developing tools and methodologies for use by security personnel and first responders at sports stadiums. ORNL s contribution has been to develop an automated process to gather and organize disparate data that is usually part of an organization s security plan. Themore » organized data informs a table-top exercise (TTX) conducted by USM using additional tools developed by them and their subcontractors. After participating in several pilot TTXs, patterns are beginning to emerge that would enable improvements to be formulated to increase the level of counter-IED preparedness. This paper focuses on the data collection and analysis process and shares insights gained to date.« less
Augmenting Probabilistic Risk Assesment with Malevolent Initiators
DOE Office of Scientific and Technical Information (OSTI.GOV)
Curtis Smith; David Schwieder
2011-11-01
As commonly practiced, the use of probabilistic risk assessment (PRA) in nuclear power plants only considers accident initiators such as natural hazards, equipment failures, and human error. Malevolent initiators are ignored in PRA, but are considered the domain of physical security, which uses vulnerability assessment based on an officially specified threat (design basis threat). This paper explores the implications of augmenting and extending existing PRA models by considering new and modified scenarios resulting from malevolent initiators. Teaming the augmented PRA models with conventional vulnerability assessments can cost-effectively enhance security of a nuclear power plant. This methodology is useful for operatingmore » plants, as well as in the design of new plants. For the methodology, we have proposed an approach that builds on and extends the practice of PRA for nuclear power plants for security-related issues. Rather than only considering 'random' failures, we demonstrated a framework that is able to represent and model malevolent initiating events and associated plant impacts.« less
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy
NASA Astrophysics Data System (ADS)
Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan
2016-11-01
Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.
Security Protection on Trust Delegated Data in Public Mobile Networks
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.
Educational decentralization, public spending, and social justice in Nigeria
NASA Astrophysics Data System (ADS)
Geo-Jaja, Macleans A.
2007-01-01
This study situates the process of educational decentralization in the narrower context of social justice. Its main object, however, is to analyze the implications of decentralization for strategies of equity and social justice in Nigeria. It starts from the premise that the early optimism that supported decentralization as an efficient and effective educational reform tool has been disappointed. The author maintains that decentralization — on its own — cannot improve education service delivery, the capacities of subordinate governments, or the integration of social policy in broader development goals. If the desired goals are to be met, public spending must be increased, greater tax revenues must be secured, and macro-economic stabilization must be achieved without re-instituting the welfare state.
The design of automatic software testing module for civil aviation information system
NASA Astrophysics Data System (ADS)
Qi, Qi; Sun, Yang
2018-05-01
In this paper, the practical innovation design is carried out according to the urgent needs of the automatic testing module of civil aviation information system. Firstly, the background and significance of the automatic testing module of civil aviation information system is expounded, and the current research status of automatic testing module and the advantages and disadvantages of related software are analyzed. Then, from the three aspects of macro demand, module functional requirement and module nonfunctional demand, we further study the needs of automatic testing module of civil aviation information system. Finally, from the four aspects of module structure, module core function, database and security, we have made an innovative plan for the automatic testing module of civil aviation information system.
Studying neighborhood crime across different macro spatial scales: The case of robbery in 4 cities.
Hipp, John R; Wo, James C; Kim, Young-An
2017-11-01
Whereas there is a burgeoning literature focusing on the spatial distribution of crime events across neighborhoods or micro-geographic units in a specific city, the present study expands this line of research by selecting four cities that vary across two macro-spatial dimensions: population in the micro-environment, and population in the broader macro-environment. We assess the relationship between measures constructed at different spatial scales and robbery rates in blocks in four cities: 1) San Francisco (high in micro- and macro-environment population); 2) Honolulu (high in micro- but low in macro-environment population); 3) Los Angeles (low in micro- but high in macro-environment population); 4) Sacramento (low in micro- and macro-environment population). Whereas the socio-demographic characteristics of residents further than ½ mile away do not impact robbery rates, the number of people up to 2.5 miles away are related to robbery rates, especially in the two cities with smaller micro-environment population, implying a larger spatial scale than is often considered. The results show that coefficient estimates differ somewhat more between cities differing in micro-environment population compared to those differing based on macro-environment population. It is therefore necessary to consider the broader macro-environment even when focusing on the level of crime across neighborhoods or micro-geographic units within an area. Copyright © 2017 Elsevier Inc. All rights reserved.
Contaminant attenuation by shallow aquifer systems under steady flow
NASA Astrophysics Data System (ADS)
Soltani, S. S.; Cvetkovic, V.
2017-10-01
We present a framework for analyzing advection-dominated solute transport and transformation in aquifer systems of boreal catchments that are typically shallow and rest on crystalline bedrock. A methodology is presented for estimating tracer discharge based on particle trajectories from recharge to discharge locations and computing their first passage times assuming that the flow pattern is approximately steady-state. Transformation processes can be included by solving one-dimensional reactive transport with randomized water travel time as the independent variable; the distribution of the travel times incorporates morphological dispersion (due to catchment geometry/topography) as well as macro-dispersion (due to heterogeneity of underlying hydraulic properties). The implementation of the framework is illustrated for the well characterized coastal catchment of Forsmark (Sweden). We find that macro-dispersion has a notable effect on attenuation even though the morphological dispersion is significantly larger. Preferential flow on the catchment scale is found to be considerable with only 5% of the Eulerian velocities contributing to transport over the simulation period of 375 years. Natural attenuation is illustrated as a simple (linear decay) transformation process. Simulated natural attenuation can be estimated analytically reasonably well by using basic hydrological and structural information, the latter being the pathway length distribution and average aquifer depth to the bedrock.
11 CFR 9405.5 - Categories of exemptions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... descriptions of manufacturing process, quality control methodology, and test results. The following procedures... lawful national security intelligence investigation, information furnished by a confidential source; (v...
11 CFR 9405.5 - Categories of exemptions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... descriptions of manufacturing process, quality control methodology, and test results. The following procedures... lawful national security intelligence investigation, information furnished by a confidential source; (v...
11 CFR 9405.5 - Categories of exemptions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... descriptions of manufacturing process, quality control methodology, and test results. The following procedures... lawful national security intelligence investigation, information furnished by a confidential source; (v...
11 CFR 9405.5 - Categories of exemptions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... descriptions of manufacturing process, quality control methodology, and test results. The following procedures... lawful national security intelligence investigation, information furnished by a confidential source; (v...
Anatomy of a Security Operations Center
NASA Technical Reports Server (NTRS)
Wang, John
2010-01-01
Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.
Ensuring reliability in expansion schemes.
Kamal-Uddin, Abu Sayed; Williams, Donald Leigh
2005-01-01
Existing electricity power supplies must serve, or be adapted to serve, the expansion of hospital buildings. With the existing power supply assets of many hospitals being up to 20 years old, assessing the security and reliability of the power system must be given appropriate priority to avoid unplanned outages due to overloads and equipment failures. It is imperative that adequate contingency is planned for essential and non-essential electricity circuits. This article describes the methodology undertaken, and the subsequent recommendations that were made, when evaluating the security and reliability of electricity power supplies to a number of major London hospitals. The methodology described aligns with the latest issue of NHS Estates HTM 2011 'Primary Electrical Infrastructure Emergency Electrical Services Design Guidance' (to which ERA Technology has contributed).
NASA Astrophysics Data System (ADS)
Zou, Hua; Melro, Liliana; de Camargo Chaparro, Thaissa; de Souza Filho, Isnaldi Rodrigues; Ananias, Duarte; Bourgeat-Lami, Elodie; dos Santos, Amilton Martins; Barros-Timmons, Ana
2017-02-01
The use of a macromolecular RAFT (macro-RAFT) agent to encapsulate anisotropic nano-objects via emulsion polymerization is an emerging route to prepare polymer/inorganic colloidal nanocomposites. However, a number of requirements have to be fulfilled. This work aims at highlighting the effects of the preparative procedure and dispersion method on the amount of macro-RAFT agent adsorbed onto SiO2-coated Gd2O3:Eu3+ nanorods. The adsorption of macro-RAFT agent was studied using the depletion method with UV-vis spectrophotometry. Measurements were performed at a fixed concentration of nanorods and varying concentrations of the macro-RAFT agent in aqueous dispersion at room temperature. The adsorption isotherms showed that for the same initial macro-RAFT agent concentration, the highest adsorption capacity of the macro-RAFT agent on nanorods was usually achieved for non-calcined thin SiO2-coated nanorods under mild bath sonication.
Filtered cathodic arc deposition apparatus and method
Krauss, Alan R.
1999-01-01
A filtered cathodic arc deposition method and apparatus for the production of highly dense, wear resistant coatings which are free from macro particles. The filtered cathodic arc deposition apparatus includes a cross shaped vacuum chamber which houses a cathode target having an evaporable surface comprised of the coating material, means for generating a stream of plasma, means for generating a transverse magnetic field, and a macro particle deflector. The transverse magnetic field bends the generated stream of plasma in the direction of a substrate. Macro particles are effectively filtered from the stream of plasma by traveling, unaffected by the transverse magnetic field, along the initial path of the plasma stream to a macro particle deflector. The macro particle deflector has a preformed surface which deflects macro particles away from the substrate.
2009-06-01
19 Immanuel Kant, Perpetual Peace, trans. Mary Campbell Smith (New York: Cosimo, Inc., 2005), 10. Democratic Peace theory derives from Kant’s ...1 2 THEORY AND METHODOLOGY ........................................................................ 3 3 RELATIONS IN THE...for the JADSC, the thesis takes a methodological approach through theory , history, application, and analysis. First, prevailing theories of
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott F
Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less
Code of Federal Regulations, 2010 CFR
2010-07-01
... as they are determined according to the test methodology that the Agency prescribes. (f) Export... research, investigations, studies, demonstrations, or training, but not for national security. (k) Test...
Application of the API/NPRA SVA methodology to transportation security issues.
Moore, David A
2006-03-17
Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.
Domestic Cats (Felis silvestris catus) Do Not Show Signs of Secure Attachment to Their Owners
Potter, Alice; Mills, Daniel Simon
2015-01-01
The Ainsworth Strange Situation Test (SST) has been widely used to demonstrate that the bond between both children and dogs to their primary carer typically meets the requirements of a secure attachment (i.e. the carer being perceived as a focus of safety and security in otherwise threatening environments), and has been adapted for cats with a similar claim made. However methodological problems in this latter research make the claim that the cat-owner bond is typically a secure attachment, operationally definable by its behaviour in the SST, questionable. We therefore developed an adapted version of the SST with the necessary methodological controls which include a full counterbalance of the procedure. A cross-over design experiment with 20 cat-owner pairs (10 each undertaking one of the two versions of the SST first) and continuous focal sampling was used to record the duration of a range of behavioural states expressed by the cats that might be useful for assessing secure attachment. Since data were not normally distributed, non-parametric analyses were used on those behaviours shown to be reliable across the two versions of the test (which excluded much cat behaviour). Although cats vocalised more when the owner rather the stranger left the cat with the other individual, there was no other evidence consistent with the interpretation of the bond between a cat and its owner meeting the requirements of a secure attachment. These results are consistent with the view that adult cats are typically quite autonomous, even in their social relationships, and not necessarily dependent on others to provide a sense of security and safety. It is concluded that alternative methods need to be developed to characterise the normal psychological features of the cat-owner bond. PMID:26332470
A conceptual framework to development of construction safety culture in Indonesia
NASA Astrophysics Data System (ADS)
Armyn Machfudiyanto, Rossy; Latief, Yusuf
2017-12-01
Working accidents in the construction industry are among the highest in the world, affecting the three levels of both macro (National) mezzo (Enterprise) and micro (Projects) that need to be integrated in building a safety culture. The purpose of this research is to develop a conceptual framework in improving safety culture in the construction industry in Indonesia. The methodology was developed using literature study and deductive analysis which then performed expert validation to ensure the concept developed. The result of this research is that policy and institution as input to build safety culture which need to be followed up with increasing of company maturity which have implication to safety performance and construction project performance.
Distinguishing advective and powered motion in self-propelled colloids
NASA Astrophysics Data System (ADS)
Byun, Young-Moo; Lammert, Paul E.; Hong, Yiying; Sen, Ayusman; Crespi, Vincent H.
2017-11-01
Self-powered motion in catalytic colloidal particles provides a compelling example of active matter, i.e. systems that engage in single-particle and collective behavior far from equilibrium. The long-time, long-distance behavior of such systems is of particular interest, since it connects their individual micro-scale behavior to macro-scale phenomena. In such analyses, it is important to distinguish motion due to subtle advective effects—which also has long time scales and length scales—from long-timescale phenomena that derive from intrinsically powered motion. Here, we develop a methodology to analyze the statistical properties of the translational and rotational motions of powered colloids to distinguish, for example, active chemotaxis from passive advection by bulk flow.
Secure Embedded System Design Methodologies for Military Cryptographic Systems
2016-03-31
Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis
NASA Astrophysics Data System (ADS)
Hoeft, B.; Epting, U.; Koenig, T.
2008-07-01
While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.
Quantifying causal emergence shows that macro can beat micro.
Hoel, Erik P; Albantakis, Larissa; Tononi, Giulio
2013-12-03
Causal interactions within complex systems can be analyzed at multiple spatial and temporal scales. For example, the brain can be analyzed at the level of neurons, neuronal groups, and areas, over tens, hundreds, or thousands of milliseconds. It is widely assumed that, once a micro level is fixed, macro levels are fixed too, a relation called supervenience. It is also assumed that, although macro descriptions may be convenient, only the micro level is causally complete, because it includes every detail, thus leaving no room for causation at the macro level. However, this assumption can only be evaluated under a proper measure of causation. Here, we use a measure [effective information (EI)] that depends on both the effectiveness of a system's mechanisms and the size of its state space: EI is higher the more the mechanisms constrain the system's possible past and future states. By measuring EI at micro and macro levels in simple systems whose micro mechanisms are fixed, we show that for certain causal architectures EI can peak at a macro level in space and/or time. This happens when coarse-grained macro mechanisms are more effective (more deterministic and/or less degenerate) than the underlying micro mechanisms, to an extent that overcomes the smaller state space. Thus, although the macro level supervenes upon the micro, it can supersede it causally, leading to genuine causal emergence--the gain in EI when moving from a micro to a macro level of analysis.
Method of producing microchannel and nanochannel articles
D'Urso, Brian R.
2010-05-04
A method of making an article having channels therethrough includes the steps of: providing a ductile structure defining at least one macro-channel, the macro-channel containing a salt; drawing the ductile structure in the axial direction of the at least one macro-channel to reduce diameter of the macro-channel; and contacting the salt with a solvent to dissolve the salt to produce an article having at least one microchannel.
Assurance: the power behind PCASSO security.
Baker, D. B.; Masys, D. R.; Jones, R. L.; Barnhart, R. M.
1999-01-01
The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted. While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care. PMID:10566443
Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.
2013-01-01
Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029
Bialas, Andrzej
2010-01-01
The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571
Ellis, M Jane; Livesey, John H; Soule, Steven G
2006-10-01
To examine whether use of the Beckman Coulter Access Prolactin (PRL) assay, which has low reactivity with macro-PRL, obviates the need for screening hyperprolactinemic samples. Samples from 1020 hyperprolactinemic individuals and 401 healthy volunteers were treated with polyethylene glycol (PEG). Macro-PRL was assessed from (1) percent PRL recovery, using cut-off values derived by gel filtration chromatography (GFC) and (2) significant (p<0.05) normalisation of PRL following PEG. PRL recovery was similar in volunteer and hyperprolactinemic samples (mean+/-SD 101+/-13% and 101+/-19%, respectively). In hyperprolactinemic samples, macro-PRL was identified from PRL recovery in 9.7%, although levels were moderate to high in only 3.9%. The total PRL normalised following PEG in 7.4%. Correlations of PRL recovery with the proportions of macro-, big- and monomeric PRL following GFC (n=30 samples, range of PRL and macro-PRL levels) were -0.89, -0.20 and 0.92, respectively. The big-PRL content was 0-28%. Regression analysis suggested that PEG precipitated both macro-PRL and big-PRL. Using the Access assay, macro-PRL can cause apparent hyperprolactinemia and big-PRL may cause misclassification of individuals. Screening using PEG is applicable to assays with low macro-PRL reactivity provided specific reference values are derived.
Matthews, M E; Waldvogel, C F; Mahaffey, M J; Zemel, P C
1978-06-01
Preparation procedures of standardized quantity formulas were analyzed for similarities and differences in production activities, and three entrée classifications were developed, based on these activities. Two formulas from each classification were selected, preparation procedures were divided into elements of production, and the MSD Quantity Food Production Code was applied. Macro elements not included in the existing Code were simulated, coded, assigned associated Time Measurement Units, and added to the MSD Quantity Food Production Code. Repeated occurrence of similar elements within production methods indicated that macro elements could be synthesized for use within one or more entrée classifications. Basic elements were grouped, simulated, and macro elements were derived. Macro elements were applied in the simulated production of 100 portions of each entrée formula. Total production time for each formula and average production time for each entrée classification were calculated. Application of macro elements indicated that this method of predetermining production time was feasible and could be adapted by quantity foodservice managers as a decision technique used to evaluate menu mix, production personnel schedules, and allocation of equipment usage. These macro elements could serve as a basis for further development and refinement of other macro elements which could be applied to a variety of menu item formulas.
An Excel macro for generating trilinear plots.
Shikaze, Steven G; Crowe, Allan S
2007-01-01
This computer note describes a method for creating trilinear plots in Microsoft Excel. Macros have been created in MS Excel's internal language: Visual Basic for Applications (VBA). A simple form has been set up to allow the user to input data from an Excel worksheet. The VBA macro is used to convert the triangular data (which consist of three columns of percentage data) into X-Y data. The macro then generates the axes, labels, and grid for the trilinear plot. The X-Y data are plotted as scatter data in Excel. By providing this macro in Excel, users can create trilinear plots in a quick, inexpensive manner.
2001-08-28
This final rule implements fee schedules for payment of parenteral and enteral nutrition (PEN) items and services furnished under the prosthetic device benefit, defined in section 1861(s)(8) of the Social Security Act. The authority for establishing these fee schedules is provided by the Balanced Budget Act of 1997, which amended the Social Security Act at section 1842(s). Section 1842(s) of the Social Security Act specifies that statewide or other area wide fee schedules may be implemented for the following items and services still subject to the reasonable charge payment methodology: medical supplies; home dialysis supplies and equipment; therapeutic shoes; parenteral and enteral nutrients, equipment, and supplies; electromyogram devices; salivation devices; blood products; and transfusion medicine. This final rule describes changes made to the proposed fee schedule payment methodology for these items and services and provides that the fee schedules for PEN items and services are effective for all covered items and services furnished on or after January 1, 2002. Fee schedules will not be implemented for electromyogram devices and salivation devices at this time since these items are not covered by Medicare. In addition, fee schedules will not be implemented for medical supplies, home dialysis supplies and equipment, therapeutic shoes, blood products, and transfusion medicine at this time since the data required to establish these fee schedules are inadequate.
Nuclear Forensics: A Methodology Applicable to Nuclear Security and to Non-Proliferation
NASA Astrophysics Data System (ADS)
Mayer, K.; Wallenius, M.; Lützenkirchen, K.; Galy, J.; Varga, Z.; Erdmann, N.; Buda, R.; Kratz, J.-V.; Trautmann, N.; Fifield, K.
2011-09-01
Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material and accompanying elements, chemical impurities, macroscopic appearance and microstructure of the material. In the present paper, we discuss the opportunities for attribution of nuclear material offered by nuclear forensics as well as its limitations. Particular attention will be given to the role of nuclear reactions. Such reactions include the radioactive decay of the nuclear material, but also reactions with neutrons. When uranium (of natural composition) is exposed to neutrons, plutonium is formed, as well as 236U. We will illustrate the methodology using the example of a piece of uranium metal that dates back to the German nuclear program in the 1940's. A combination of different analytical techniques and model calculations enables a nuclear forensics interpretation, thus correlating the material characteristics with the production history.
A Methodology to Develop Entrepreneurial Networks: The Tech Ecosystem of Six African Cities
2014-11-01
Information Center. Greve, A. and Salaff, J. W. (2003), Social Networks and Entrepreneurship . Entrepreneurship Theory and Practice, 28: 1–22. doi...methodology enables us to accurately measure social capital and circumvents the massive effort of mapping an individual’s social network before...locating the social resources in it. 15. SUBJECT TERMS Network Analysis, Economic Networks, Network Topology, Network Classification 16. SECURITY
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-04
...] amend Exchange Article 20, Rule 2 to revise the current methodology for determining when to halt trading... Exchange Article 20, Rule 2 to revise the current methodology for determining when to halt trading in all... Article 20, Rule 2(e). \\4\\ CHX Article 20, Rule 10. \\5\\ CHX Article 16, Rule 8a(2). \\6\\ See Securities...
Pelfrey, William V; Pelfrey, William V
2009-02-01
Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent field, the establishment of a program curriculum was forced to draw from a variety of disciplines. Curriculum evaluation was complicated by the rapid changes occurring in the emerging discipline, producing response shift bias, and interfering with the pre-post assessments. To compensate for the validity threat associated with response shift bias, a retrospective pretest-posttest evaluative methodology was used. Data indicate the program has evolved in a significant and orderly fashion and these data support the use of this innovative evaluation approach in the development of any discipline.
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
Numerical characteristics of quantum computer simulation
NASA Astrophysics Data System (ADS)
Chernyavskiy, A.; Khamitov, K.; Teplov, A.; Voevodin, V.; Voevodin, Vl.
2016-12-01
The simulation of quantum circuits is significantly important for the implementation of quantum information technologies. The main difficulty of such modeling is the exponential growth of dimensionality, thus the usage of modern high-performance parallel computations is relevant. As it is well known, arbitrary quantum computation in circuit model can be done by only single- and two-qubit gates, and we analyze the computational structure and properties of the simulation of such gates. We investigate the fact that the unique properties of quantum nature lead to the computational properties of the considered algorithms: the quantum parallelism make the simulation of quantum gates highly parallel, and on the other hand, quantum entanglement leads to the problem of computational locality during simulation. We use the methodology of the AlgoWiki project (algowiki-project.org) to analyze the algorithm. This methodology consists of theoretical (sequential and parallel complexity, macro structure, and visual informational graph) and experimental (locality and memory access, scalability and more specific dynamic characteristics) parts. Experimental part was made by using the petascale Lomonosov supercomputer (Moscow State University, Russia). We show that the simulation of quantum gates is a good base for the research and testing of the development methods for data intense parallel software, and considered methodology of the analysis can be successfully used for the improvement of the algorithms in quantum information science.
Lammoglia, Sabine-Karen; Moeys, Julien; Barriuso, Enrique; Larsbo, Mats; Marín-Benito, Jesús-María; Justes, Eric; Alletto, Lionel; Ubertosi, Marjorie; Nicolardot, Bernard; Munier-Jolain, Nicolas; Mamy, Laure
2017-03-01
The current challenge in sustainable agriculture is to introduce new cropping systems to reduce pesticides use in order to reduce ground and surface water contamination. However, it is difficult to carry out in situ experiments to assess the environmental impacts of pesticide use for all possible combinations of climate, crop, and soils; therefore, in silico tools are necessary. The objective of this work was to assess pesticides leaching in cropping systems coupling the performances of a crop model (STICS) and of a pesticide fate model (MACRO). STICS-MACRO has the advantage of being able to simulate pesticides fate in complex cropping systems and to consider some agricultural practices such as fertilization, mulch, or crop residues management, which cannot be accounted for with MACRO. The performance of STICS-MACRO was tested, without calibration, from measurements done in two French experimental sites with contrasted soil and climate properties. The prediction of water percolation and pesticides concentrations with STICS-MACRO was satisfactory, but it varied with the pedoclimatic context. The performance of STICS-MACRO was shown to be similar or better than that of MACRO. The improvement of the simulation of crop growth allowed better estimate of crop transpiration therefore of water balance. It also allowed better estimate of pesticide interception by the crop which was found to be crucial for the prediction of pesticides concentrations in water. STICS-MACRO is a new promising tool to improve the assessment of the environmental risks of pesticides used in cropping systems.
NASA Astrophysics Data System (ADS)
Anezaki, Takashi; Wakitani, Kouichi; Nakamura, Masatoshi; Kubo, Hiroyasu
Because visual inspection systems are difficult to tune, they create many problems for the kaizen process. This results in increased development costs and time to assure that the inspection systems function properly. In order to improve inspection system development, we designed an easy-tuning system called a “Program-less” visual inspection system. The ROI macro command which consisted of eight kinds of shape recognition macro commands and decision, operation, control commands was built. Furthermore, the macro command editing executive system was developed by the operation of only the GUI without editing source program. The validity of the ROI macro command was proved by the application of 488 places.
Primordial 4He constraints on inelastic macro dark matter revisited
NASA Astrophysics Data System (ADS)
Jacobs, David M.; Allwright, Gwyneth; Mafune, Mpho; Manikumar, Samyukta; Weltman, Amanda
2016-11-01
At present, the best model for the evolution of the cosmos requires that dark matter make up approximately 25% of the energy content of the Universe. Most approaches to explain the microscopic nature of dark matter, to date, have assumed its composition to be of intrinsically weakly interacting particles; however, this need not be the case to have consistency with all extant observations. Given decades of inconclusive evidence to support any dark matter candidate, there is strong motivation to consider alternatives to the standard particle scenario. One such example is macro dark matter, a class of candidates (macros) that could interact strongly with the particles of the Standard Model, have large masses and physical sizes, and yet behave as dark matter. Macros that scatter completely inelastically could have altered the primordial production of the elements, and macro charge-dependent constraints have been obtained previously. Here we reconsider the phenomenology of inelastically interacting macros on the abundance of primordially produced 4He and revise previous constraints by also taking into account improved measurements of the primordial 4He abundance. The constraints derived here are limited in applicability to only leptophobic macros that have a surface potential V (RX)≳0.5 MeV . However, an important conclusion from our analysis is that even neutral macros would likely affect the abundance of the light elements. Therefore, constraints on that scenario are possible and are currently an open question.
Security Considerations for E-Mental Health Interventions
Bennett, Anthony James; Griffiths, Kathleen Margaret
2010-01-01
Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions. PMID:21169173
NASA Technical Reports Server (NTRS)
Kocher, Joshua E; Gilliam, David P.
2005-01-01
Secure computing is a necessity in the hostile environment that the internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world, These network ports are essentially the doorways from the internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid System Administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a website where SAs and Users can request a port scan of their computer. The results are then emailed to the requestor. This tool aids Users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or backdoors, and what ports can be closed.
Shan, Xiu-Juan; Zhuang, Zhi-Meng; Jin, Xian-Shi; Dai, Fang-Qun
2011-12-01
Based on the bottom trawl survey data in May 2007 and May and June 2008, this paper analyzed the effects of the abundance dynamics of macro-jellyfish on the species composition, distribution, and abundance of fishery resource in the Yangtze River estuary and its adjacent waters. From May 2007 to June 2008, the average catch per haul and the top catch per haul of macro-jellyfish increased, up to 222.2 kg x h(-1) and 1800 kg x h(-1) in June 2008, respectively. The macro-jellyfish were mainly distributed in the areas around 50 m isobath, and not beyond 100 m isobath where was the joint front of the coastal waters of East China Sea, Yangtze River runoff, and Taiwan Warm Current. The main distribution area of macro-jellyfish in June migrated northward, as compared with that in May, and the highest catches of macro-jellyfish in May 2007 and May 2008 were found in the same sampling station (122.5 degrees E, 28.5 degrees N). In the sampling stations with higher abundance of macro-jellyfish, the fishery abundance was low, and the fishery species also changed greatly, mainly composed by small-sized species (Trachurus japonicus, Harpadon nehereus, and Acropoma japonicum) and pelagic species (Psenopsis anomala, Octopus variabilis) and Trichiurus japonicus, and P. anomala accounted for 23.7% of the total catch in June 2008. Larimichthys polyactis also occupied higher proportion of the total catch in sampling stations with higher macro-jellyfish abundance, but the demersal species Lophius litulon was not found, and a few crustaceans were collected. This study showed that macro-jellyfish had definite negative effects on the fishery community structure and abundance in the Yangtze River estuary fishery ecosystem, and further, changed the energy flow patterns of the ecosystem through cascading trophic interactions. Therefore, macro-jellyfish was strongly suggested to be an independent ecological group when the corresponding fishery management measures were considered.
Improvement of aquaponic performance through micro- and macro-nutrient addition.
Ru, Dongyun; Liu, Jikai; Hu, Zhen; Zou, Yina; Jiang, Liping; Cheng, Xiaodian; Lv, Zhenting
2017-07-01
Aquaponics is one of the "zero waste" industry in the twenty-first century, and is considered to be one of the major trends for the future development of agriculture. However, the low nitrogen utilization efficiency (NUE) restricted its widely application. To date, many attempts have been conducted to improve its NUE. In the present study, effect of micro- and macro-nutrient addition on performance of tilapia-pak choi aquaponics was investigated. Results showed that the addition of micro- and macro-nutrients improved the growth of plant directly and facilitated fish physiology indirectly, which subsequently increased NUE of aquaponics from 40.42 to 50.64%. In addition, remarkable lower total phosphorus concentration was obtained in aquaponics with micro- and macro-nutrient addition, which was attributed to the formation of struvite. Most of the added micro-nutrients were enriched in plant root, while macro-nutrients mainly existed in water. Moreover, no enrichment of micro- and macro-nutrients in aquaponic products (i.e., fish and plant leaves) was observed, indicating that it had no influence on food safety. The findings here reported manifest that appropriate addition of micro- and macro-nutrients to aquaponics is necessary, and would improve its economic feasibility.
NASA Astrophysics Data System (ADS)
Ginocchio, Rosanna; Arellano, Eduardo; Morales-Ladron de Guevara, Arturo
2016-04-01
Phytostabilization of massive mine tailings (>400 he) under semiarid environments is challenging, particularly when no organic amendments are locally available and no irrigation is possible. Increasing tendency for reprocessing old tailings to recover valued metals further pioneer the need for simple but effective plant covers. The choice of plant species and form of management are thus very important. CODELCO-Chile chose the Cauquenes post-operational tailings storage facility (TFS; 700 ha), that will be reprocessed for copper and other elements in the near future, to evaluate efficacy of the phytostabilization technology under semiarid conditions in central Chile. Surface application of a polymer (Soiltac TM) has been used for wind control of tailings but phytostabilization is considered as a best cost-effective alternative. A field study was performed to define a management program to improve the establishment and cover of an annual native grass (Vulpia myuros var. megalura), a spontaneous colonizer of the TSF. Considered management factors were control of macro herbivores (with and without fence), macronutrient improvement (with and without application of N-rich foliar fertilizer), and improvement of seed retention in the substrate (with and without small-scale rugosity; with and without lived wind-breakers; with and without mechanical wind-breakers). Each treatment was replicated three times and established in 2 m x 2 m quadrats. Plant response variables were monitored after 1 and 2 grass growing seasons. Application of N-rich foliar fertilizer and any wind control mechanism for seed retention in the substrate were effective for significantly improving both grass cover and biomass production in time, irrespective of macro-herbivore control. Seed production was significantly improved when macro herbivores were excluded and was positively and significantly correlated to vegetative biomass production. When applying this management program for tailings phytostabilization at large-scaale, surface ploughing of tailings would be a cheaper alternative for seed retention in the substrate than lived or mechanical wind-breakers. Study funded by CODELCO El Teniente
The Use of Lotus 1-2-3 Macros in Engineering Calculations.
ERIC Educational Resources Information Center
Rosen, Edward M.
1990-01-01
Described are the use of spreadsheet programs in chemical engineering calculations using Lotus 1-2-3 macros. Discusses the macro commands, subroutine operations, and solution of partial differential equation. Provides examples of the subroutine programs and spreadsheet solution. (YP)
Tamper-indicating barcode and method
Cummings, Eric B.; Even, Jr., William R.; Simmons, Blake A.; Dentinger, Paul Michael
2005-03-22
A novel tamper-indicating barcode methodology is disclosed that allows for detection of alteration to the barcode. The tamper-indicating methodology makes use of a tamper-indicating means that may be comprised of a particulate indicator, an optical indicator, a deformable substrate, and/or may be an integrated aspect of the barcode itself. This tamper-indicating information provides greater security for the contents of containers sealed with the tamper-indicating barcodes.
Risk-Based Explosive Safety Analysis
2016-11-30
safety siting of energetic liquids and propellants can be greatly aided by the use of risk-based methodologies. The low probability of exposed...liquids or propellants . 15. SUBJECT TERMS N/A 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...of energetic liquids and propellants can be greatly aided by the use of risk-based methodologies. The low probability of exposed personnel and the
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong
2016-01-01
Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong
2016-01-01
Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421
Quality of protection evaluation of security mechanisms.
Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail
2014-01-01
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.
Complex fluids with mobile charge-regulating macro-ions
NASA Astrophysics Data System (ADS)
Markovich, Tomer; Andelman, David; Podgornik, Rudi
2017-10-01
We generalize the concept of charge regulation of ionic solutions, and apply it to complex fluids with mobile macro-ions having internal non-electrostatic degrees of freedom. The suggested framework provides a convenient tool for investigating systems where mobile macro-ions can self-regulate their charge (e.g., proteins). We show that even within a simplified charge-regulation model, the charge dissociation equilibrium results in different and notable properties. Consequences of the charge regulation include a positional dependence of the effective charge of the macro-ions, a non-monotonic dependence of the effective Debye screening length on the concentration of the monovalent salt, a modification of the electric double-layer structure, and buffering by the macro-ions of the background electrolyte.
NASA Astrophysics Data System (ADS)
Aygunes, Gunes
2017-07-01
The objective of this paper is to survey and determine the macroeconomic factors affecting the level of venture capital (VC) investments in a country. The literary depends on venture capitalists' quality and countries' venture capital investments. The aim of this paper is to give relationship between venture capital investment and macro economic variables via statistical computation method. We investigate the countries and macro economic variables. By using statistical computation method, we derive correlation between venture capital investments and macro economic variables. According to method of logistic regression model (logit regression or logit model), macro economic variables are correlated with each other in three group. Venture capitalists regard correlations as a indicator. Finally, we give correlation matrix of our results.
Rabadan, Jose; Perez-Jimenez, Rafael
2017-01-01
Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks. PMID:29186184
Marin-Garcia, Ignacio; Chavez-Burbano, Patricia; Guerra, Victor; Rabadan, Jose; Perez-Jimenez, Rafael
2017-01-01
Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks.
The Ambulatory Care Workload Management System for Nursing Reference Manual
1991-05-31
MEDICAL DATA SERVICES CENTER BETHESDA, MARYLAND 2088Q-506. 91-03029 SECuRItY CLASSIFICATION OF THIS PAGEr REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY...ORGANIZATION 6b OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION Naval Medical Data Servics (If applicable) Center 6c. ADDRESS (City, State, and ZIPCode) 7b...staffing methodology developed for emergency and ambulatory care departments in naval medical treatment facilities . The staffing model translates varying
2009-09-01
boarding team, COTS, WLAN, smart antenna, OpenVPN application, wireless base station, OFDM, latency, point-to-point wireless link. 16. PRICE CODE 17...16 c. SSL/TLS .................................17 2. OpenVPN ......................................17 III. EXPERIMENT METHODOLOGY...network frame at Layer 2 has already been secured by encryption at a higher level. 2. OpenVPN OpenVPN is open source software that provides a VPN
Security of the food supply chain.
Setola, Roberto; De Maggio, Maria Carla
2009-01-01
The food supply chain could became a dangerous weapon in the hands of enemies, for this reason the strategies developed to fight food adulteration (food safety) should be complemented with specific actions devoted to improve food "security" in the sense of food defence. This paper illustrate the methodological approach used in the EU project SecuFood to analyze threats, vulnerabilities and countermeasures existing in major European countries about what concerns deliberate attacks and manipulations of food.
Determinants, Health Problems, and Food Insecurity in Urban Areas of the Largest City in Cape Verde
Craveiro, Isabel; Alves, Daniela; Amado, Miguel; Santos, Zélia; Fortes, Argentina Tomar; Delgado, António Pedro; Correia, Artur; Gonçalves, Luzia
2016-01-01
Urbanization processes are intertwined with nutritional transition because there is easier access to food of low nutritional quality at reduced prices, changing dietary patterns and leading to an increase of non-communicable chronic diseases. This study aims to understand the perceptions for high blood pressure, obesity, and alcoholism, describing some interactions of these dimensions in the problem of food security in the city of Praia. A qualitative study was carried out under the framework of the research project “UPHI-STAT: Urban Planning and Health Inequalities—moving from macro to micro statistics”. Ten focus groups were conducted in three urban areas with distinct characteristics in the city of Praia, with a total of 48 participants. Participants reported frequent consumption of foods with poor nutritional quality, understanding the potential danger in terms of food security in the city of Praia. Easy access to and high levels of alcohol consumption, and poor quality of traditional drinks were mentioned by participants in the study areas. The impact of the economic situation on the possibility of access to safe and healthy options emerged as a differentiating factor. PMID:27879689
Lopez-Ridaura, Santiago; Frelat, Romain; van Wijk, Mark T; Valbuena, Diego; Krupnik, Timothy J; Jat, M L
2018-01-01
One of the great challenges in agricultural development and sustainable intensification is the assurance of social equity in food security oriented interventions. Development practitioners, researchers, and policy makers alike could benefit from prior insight into what interventions or environmental shocks might differentially affect farmers' food security status, in order to move towards more informed and equitable development. We examined the food security status and livelihood activities of 269 smallholder farm households (HHs) in Bihar, India. Proceeding with a four-step analysis, we first applied a multivariate statistical methodology to differentiate five primary farming system types. We next applied an indicator of food security in the form of HH potential food availability (PFA), and examined the contribution of crop, livestock, and on- and off-farm income generation to PFA within each farm HH type. Lastly, we applied scenario analysis to examine the potential impact of the adoption of 'climate smart' agricultural (CSA) practices in the form of conservation agriculture (CA) and improved livestock husbandry, and environmental shocks on HH PFA. Our results indicate that compared to livestock interventions, CA may hold considerable potential to boost HH PFA, though primarily for wealthier and medium-scale cereal farmers. These farm HH types were however considerably more vulnerable to food insecurity risks resulting from simulated drought, while part-time farmers and resource-poor agricultural laborers generating income from off-farm pursuits were comparatively less vulnerable, due in part to their more diversified income sources and potential to migrate in search of work. Our results underscore the importance of prior planning for development initiatives aimed at increasing smallholder food security while maintaining social equity, while providing a robust methodology to vet the implications of agricultural interventions on an ex ante basis.
Macros for Educational Research.
ERIC Educational Resources Information Center
Woodrow, Janice E. J.
1988-01-01
Describes the design and operation of two macros written in the programming language of Microsoft's EXCEL for educational research applications. The first macro determines the frequency of responses to a Likert-type questionnaire or multiple-choice test; the second performs a one-way analysis of variance test. (Author/LRW)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bao, Rong; Li, Yongdong; Liu, Chunliang
2016-07-15
The output power fluctuations caused by weights of macro particles used in particle-in-cell (PIC) simulations of a backward wave oscillator and a travelling wave tube are statistically analyzed. It is found that the velocities of electrons passed a specific slow-wave structure form a specific electron velocity distribution. The electron velocity distribution obtained in PIC simulation with a relative small weight of macro particles is considered as an initial distribution. By analyzing this initial distribution with a statistical method, the estimations of the output power fluctuations caused by different weights of macro particles are obtained. The statistical method is verified bymore » comparing the estimations with the simulation results. The fluctuations become stronger with increasing weight of macro particles, which can also be determined reversely from estimations of the output power fluctuations. With the weights of macro particles optimized by the statistical method, the output power fluctuations in PIC simulations are relatively small and acceptable.« less
Wu, Bitao; Lu, Huaxi; Chen, Bo; Gao, Zhicheng
2017-01-01
A finite model updating method that combines dynamic-static long-gauge strain responses is proposed for highway bridge static loading tests. For this method, the objective function consisting of static long-gauge stains and the first order modal macro-strain parameter (frequency) is established, wherein the local bending stiffness, density and boundary conditions of the structures are selected as the design variables. The relationship between the macro-strain and local element stiffness was studied first. It is revealed that the macro-strain is inversely proportional to the local stiffness covered by the long-gauge strain sensor. This corresponding relation is important for the modification of the local stiffness based on the macro-strain. The local and global parameters can be simultaneously updated. Then, a series of numerical simulation and experiments were conducted to verify the effectiveness of the proposed method. The results show that the static deformation, macro-strain and macro-strain modal can be predicted well by using the proposed updating model. PMID:28753912
MacroH2A1.1 regulates mitochondrial respiration by limiting nuclear NAD+ consumption.
Posavec Marjanović, Melanija; Hurtado-Bagès, Sarah; Lassi, Maximilian; Valero, Vanesa; Malinverni, Roberto; Delage, Hélène; Navarro, Miriam; Corujo, David; Guberovic, Iva; Douet, Julien; Gama-Perez, Pau; Garcia-Roves, Pablo M; Ahel, Ivan; Ladurner, Andreas G; Yanes, Oscar; Bouvet, Philippe; Suelves, Mònica; Teperino, Raffaele; Pospisilik, J Andrew; Buschbeck, Marcus
2017-11-01
Histone variants are structural components of eukaryotic chromatin that can replace replication-coupled histones in the nucleosome. The histone variant macroH2A1.1 contains a macrodomain capable of binding NAD + -derived metabolites. Here we report that macroH2A1.1 is rapidly induced during myogenic differentiation through a switch in alternative splicing, and that myotubes that lack macroH2A1.1 have a defect in mitochondrial respiratory capacity. We found that the metabolite-binding macrodomain was essential for sustained optimal mitochondrial function but dispensable for gene regulation. Through direct binding, macroH2A1.1 inhibits basal poly-ADP ribose polymerase 1 (PARP-1) activity and thus reduces nuclear NAD + consumption. The resultant accumulation of the NAD + precursor NMN allows for maintenance of mitochondrial NAD + pools that are critical for respiration. Our data indicate that macroH2A1.1-containing chromatin regulates mitochondrial respiration by limiting nuclear NAD + consumption and establishing a buffer of NAD + precursors in differentiated cells.
Wu, Bitao; Lu, Huaxi; Chen, Bo; Gao, Zhicheng
2017-07-19
A finite model updating method that combines dynamic-static long-gauge strain responses is proposed for highway bridge static loading tests. For this method, the objective function consisting of static long-gauge stains and the first order modal macro-strain parameter (frequency) is established, wherein the local bending stiffness, density and boundary conditions of the structures are selected as the design variables. The relationship between the macro-strain and local element stiffness was studied first. It is revealed that the macro-strain is inversely proportional to the local stiffness covered by the long-gauge strain sensor. This corresponding relation is important for the modification of the local stiffness based on the macro-strain. The local and global parameters can be simultaneously updated. Then, a series of numerical simulation and experiments were conducted to verify the effectiveness of the proposed method. The results show that the static deformation, macro-strain and macro-strain modal can be predicted well by using the proposed updating model.
The use of microtomography in structural geology: A new methodology to analyse fault faces
NASA Astrophysics Data System (ADS)
Jacques, Patricia D.; Nummer, Alexis Rosa; Heck, Richard J.; Machado, Rômulo
2014-09-01
This paper describes a new methodology to kinematically analyze faults in microscale dimensions (voxel size = 40 μm), using images obtained by X-ray computed microtomography (μCT). The equipment used is a GE MS8x-130 scanner. It was developed using rocks samples from Santa Catarina State, Brazil, and constructing micro Digital Elevation Models (μDEMs) for the fault surface, for analysing microscale brittle structures including striations, roughness and steps. Shaded relief images were created for the μDEMs, which enabled the generation of profiles to classify the secondary structures associated with the main fault surface. In the case of a sample with mineral growth that covers the fault surface, it is possible to detect the kinematic geometry even with the mineral cover. This technique proved to be useful for determining the sense of movement of faults, especially when it is not possible to determine striations in macro or microscopic analysis. When the sample has mineral deposit on the surface (mineral cover) this technique allows a relative chronology and geometric characterization between the faults with and without covering.
Abdominal surgery process modeling framework for simulation using spreadsheets.
Boshkoska, Biljana Mileva; Damij, Talib; Jelenc, Franc; Damij, Nadja
2015-08-01
We provide a continuation of the existing Activity Table Modeling methodology with a modular spreadsheets simulation. The simulation model developed is comprised of 28 modeling elements for the abdominal surgery cycle process. The simulation of a two-week patient flow in an abdominal clinic with 75 beds demonstrates the applicability of the methodology. The simulation does not include macros, thus programming experience is not essential for replication or upgrading the model. Unlike the existing methods, the proposed solution employs a modular approach for modeling the activities that ensures better readability, the possibility of easily upgrading the model with other activities, and its easy extension and connectives with other similar models. We propose a first-in-first-served approach for simulation of servicing multiple patients. The uncertain time duration of the activities is modeled using the function "rand()". The patients movements from one activity to the next one is tracked with nested "if()" functions, thus allowing easy re-creation of the process without the need of complex programming. Copyright © 2015 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.
Lin, Blossom Yen-Ju; Chao, Te-Hsin; Yao, Yuh; Tu, Shu-Min; Wu, Chun-Ching; Chern, Jin-Yuan; Chao, Shiu-Hsiung; Shaw, Keh-Yuong
2007-04-01
Previous studies have shown the advantages of using activity-based costing (ABC) methodology in the health care industry. The potential values of ABC methodology in health care are derived from the more accurate cost calculation compared to the traditional step-down costing, and the potentials to evaluate quality or effectiveness of health care based on health care activities. This project used ABC methodology to profile the cost structure of inpatients with surgical procedures at the Department of Colorectal Surgery in a public teaching hospital, and to identify the missing or inappropriate clinical procedures. We found that ABC methodology was able to accurately calculate costs and to identify several missing pre- and post-surgical nursing education activities in the course of treatment.
Intersection crash prediction modeling with macro-level data from various geographic units.
Lee, Jaeyoung; Abdel-Aty, Mohamed; Cai, Qing
2017-05-01
There have been great efforts to develop traffic crash prediction models for various types of facilities. The crash models have played a key role to identify crash hotspots and evaluate safety countermeasures. In recent, many macro-level crash prediction models have been developed to incorporate highway safety considerations in the long-term transportation planning process. Although the numerous macro-level studies have found that a variety of demographic and socioeconomic zonal characteristics have substantial effects on traffic safety, few studies have attempted to coalesce micro-level with macro-level data from existing geographic units for estimating crash models. In this study, the authors have developed a series of intersection crash models for total, severe, pedestrian, and bicycle crashes with macro-level data for seven spatial units. The study revealed that the total, severe, and bicycle crash models with ZIP-code tabulation area data performs the best, and the pedestrian crash models with census tract-based data outperforms the competing models. Furthermore, it was uncovered that intersection crash models can be drastically improved by only including random-effects for macro-level entities. Besides, the intersection crash models are even further enhanced by including other macro-level variables. Lastly, the pedestrian and bicycle crash modeling results imply that several macro-level variables (e.g., population density, proportions of specific age group, commuters who walk, or commuters using bicycle, etc.) can be a good surrogate exposure for those crashes. Copyright © 2017 Elsevier Ltd. All rights reserved.
Castells-Nobau, Anna; Nijhof, Bonnie; Eidhof, Ilse; Wolf, Louis; Scheffer-de Gooyert, Jolanda M; Monedero, Ignacio; Torroja, Laura; van der Laak, Jeroen A W M; Schenck, Annette
2017-05-03
Synaptic morphology is tightly related to synaptic efficacy, and in many cases morphological synapse defects ultimately lead to synaptic malfunction. The Drosophila larval neuromuscular junction (NMJ), a well-established model for glutamatergic synapses, has been extensively studied for decades. Identification of mutations causing NMJ morphological defects revealed a repertoire of genes that regulate synapse development and function. Many of these were identified in large-scale studies that focused on qualitative approaches to detect morphological abnormalities of the Drosophila NMJ. A drawback of qualitative analyses is that many subtle players contributing to NMJ morphology likely remain unnoticed. Whereas quantitative analyses are required to detect the subtler morphological differences, such analyses are not yet commonly performed because they are laborious. This protocol describes in detail two image analysis algorithms "Drosophila NMJ Morphometrics" and "Drosophila NMJ Bouton Morphometrics", available as Fiji-compatible macros, for quantitative, accurate and objective morphometric analysis of the Drosophila NMJ. This methodology is developed to analyze NMJ terminals immunolabeled with the commonly used markers Dlg-1 and Brp. Additionally, its wider application to other markers such as Hrp, Csp and Syt is presented in this protocol. The macros are able to assess nine morphological NMJ features: NMJ area, NMJ perimeter, number of boutons, NMJ length, NMJ longest branch length, number of islands, number of branches, number of branching points and number of active zones in the NMJ terminal.
How can you capture cultural dynamics?
Kashima, Yoshihisa
2014-01-01
Cross-cultural comparison is a critical method by which we can examine the interaction between culture and psychological processes. However, comparative methods tend to overlook cultural dynamics – the formation, maintenance, and transformation of cultures over time. The present article gives a brief overview of four different types of research designs that have been used to examine cultural dynamics in the literature: (1) cross-temporal methods that trace medium- to long-term changes in a culture; (2) cross-generational methods that explore medium-term implications of cultural transmission; (3) experimental simulation methods that investigate micro-level mechanisms of cultural dynamics; and (4) formal models and computer simulation methods often used to investigate long-term and macro-level implications of micro-level mechanisms. These methods differ in terms of level of analysis for which they are designed (micro vs. macro-level), scale of time for which they are typically used (short-, medium-, or long-term), and direction of inference (deductive vs. empirical method) that they imply. The paper describes examples of these methods, discuss their strengths and weaknesses, and point to their complementarity in inquiries about cultural change. Because cultural dynamics research is about meaning over time, issues deriving from interpretation of meaning and temporal distance between researchers and objects of inquiry can pose threats to the validity of the research and its findings. The methodological question about hermeneutic circle is recalled and further inquiries are encouraged. PMID:25309476
NASA Astrophysics Data System (ADS)
Kossobokov, Vladimir G.; Nekrasova, Anastasia K.
2018-05-01
We continue applying the general concept of seismic risk analysis in a number of seismic regions worldwide by constructing regional seismic hazard maps based on morphostructural analysis, pattern recognition, and the Unified Scaling Law for Earthquakes (USLE), which generalizes the Gutenberg-Richter relationship making use of naturally fractal distribution of earthquake sources of different size in a seismic region. The USLE stands for an empirical relationship log10 N(M, L) = A + B·(5 - M) + C·log10 L, where N(M, L) is the expected annual number of earthquakes of a certain magnitude M within a seismically prone area of linear dimension L. We use parameters A, B, and C of USLE to estimate, first, the expected maximum magnitude in a time interval at seismically prone nodes of the morphostructural scheme of the region under study, then map the corresponding expected ground shaking parameters (e.g., peak ground acceleration, PGA, or macro-seismic intensity). After a rigorous verification against the available seismic evidences in the past (usually, the observed instrumental PGA or the historically reported macro-seismic intensity), such a seismic hazard map is used to generate maps of specific earthquake risks for population, cities, and infrastructures (e.g., those based on census of population, buildings inventory). The methodology of seismic hazard and risk assessment is illustrated by application to the territory of Greater Caucasus and Crimea.
The following SAS macros can be used to create a multivariate usual intake distribution for multiple dietary components that are consumed nearly every day or episodically. A SAS macro for performing balanced repeated replication (BRR) variance estimation is also included.
SPSS Macros for Assessing the Reliability and Agreement of Student Evaluations of Teaching
ERIC Educational Resources Information Center
Morley, Donald D.
2009-01-01
This article reports and demonstrates two SPSS macros for calculating Krippendorff's alpha and intraclass reliability coefficients in repetitive situations where numerous coefficients are needed. Specifically, the reported SPSS macros were used to evaluate the interrater agreement and reliability of student evaluations of teaching in thousands of…
On Language Management in Multinational Companies in the Czech Republic
ERIC Educational Resources Information Center
Nekvapil, Jiri; Nekula, Marek
2006-01-01
In this paper, we demonstrate the dialectical relationship between micro and macro language planning: macro planning influences micro planning and yet macro planning results (or should result) from micro planning. The relation between the two planning perspectives is illustrated within the framework of Language Management Theory (Jernudd &…
ERIC Educational Resources Information Center
Reisch, Michael
2016-01-01
This article asserts that macro practice is increasingly important in today's rapidly changing and complex practice environment. It briefly explores the history of macro practice in U.S. social work, summarizes its major contributions to the profession and to U.S. society, and provides some suggestions for how social work programs can expand…
A zwitterionic macro-crosslinker for durable non-fouling coatings.
Wang, Wei; Lu, Yang; Xie, Jinbing; Zhu, Hui; Cao, Zhiqiang
2016-03-28
A novel zwitterionic macro-crosslinker was developed and applied to fabricate durable non-fouling coatings on a polyurethane substrate. The zwitterionic macro-crosslinker coating exhibited superior durability over the traditional brush polymer coating and was able to retain its non-fouling property even after weeks of shearing in flowing liquid.
Computer-Aided Modeling and Analysis of Power Processing Systems (CAMAPPS). Phase 1: Users handbook
NASA Technical Reports Server (NTRS)
Kim, S.; Lee, J.; Cho, B. H.; Lee, F. C.
1986-01-01
The EASY5 macro component models developed for the spacecraft power system simulation are described. A brief explanation about how to use the macro components with the EASY5 Standard Components to build a specific system is given through an example. The macro components are ordered according to the following functional group: converter power stage models, compensator models, current-feedback models, constant frequency control models, load models, solar array models, and shunt regulator models. Major equations, a circuit model, and a program listing are provided for each macro component.
Investigation on growth and macro-defects of Er3+-doped BaY2F8 laser crystal
NASA Astrophysics Data System (ADS)
Wang, Shuai; Ruan, Yongfeng; Tsuboi, Taiju; Zhang, Shouchao; Wang, Youfa; Tong, Hongshuang
2013-08-01
Large BaY2F8 and Er3+-doped BaY2F8 single crystals were grown by the temperature gradient method. Three kinds of macro-defects were found in BaY2F8 single crystals. These macro-defects include cracks, growth striations and straight pipes. The morphologies and distribution regularities of these macro-defects were observed and studied using a solid polarization microscope. The formation mechanisms and the methods of eliminating these defects were discussed.
Cline, Rebecca J Welch
2003-05-01
The health care relationship model is undergoing dramatic change. Micro-level communication patterns yield health care relationship models (e.g. paternalism, mutual participation, consumerism). At the same time, macro-level systems appear increasingly likely to influence the nature of micro-level interaction. The intersections of health care communication micro-level and macro-level phenomena provide important venues for research and interventions. This essay identifies theoretical premises regarding the relationships between communication and health-related behavior; explores three prominent and growing macro-level phenomena that observers argue likely influence the physical-patient relationship and communication therein: complementary and alternative medicine, the Internet, and direct-to-consumer advertising of prescription drugs; and offers a research agenda for exploring macro-level influences on micro-level physician-patient communication.
Electroanalytical sensing of chromium(III) and (VI) utilising gold screen printed macro electrodes.
Metters, Jonathan P; Kadara, Rashid O; Banks, Craig E
2012-02-21
We report the fabrication of gold screen printed macro electrodes which are electrochemically characterised and contrasted to polycrystalline gold macroelectrodes with their potential analytical application towards the sensing of chromium(III) and (VI) critically explored. It is found that while these gold screen printed macro electrodes have electrode kinetics typically one order of magnitude lower than polycrystalline gold macroelectrodes as is measured via a standard redox probe, in terms of analytical sensing, these gold screen printed macro electrodes mimic polycrystalline gold in terms of their analytical performance towards the sensing of chromium(III) and (VI), whilst boasting additional advantages over the macro electrode due to their disposable one-shot nature and the ease of mass production. An additional advantage of these gold screen printed macro electrodes compared to polycrystalline gold is the alleviation of the requirement to potential cycle the latter to form the required gold oxide which aids in the simplification of the analytical protocol. We demonstrate that gold screen printed macro electrodes allow the low micro-molar sensing of chromium(VI) in aqueous solutions over the range 10 to 1600 μM with a limit of detection (3σ) of 4.4 μM. The feasibility of the analytical protocol is also tested through chromium(VI) detection in environmental samples.
Effectiveness evaluation of the R&D projects in organizations financed by the budget expenses
NASA Astrophysics Data System (ADS)
Yakovlev, D.; Yushkov, E.; Pryakhin, A.; Bogatyreova, M.
2017-01-01
The issues of R&D project performance and their prospects are closely concerned with knowledge management. In the initial stages of the project development, it is the quality of the project evaluation that is crucial for the result and generation of future knowledge. Currently there does not exist any common methodology for the evaluation of new R&D financed by the budget. Suffice it to say, the assessment of scientific and technical projects (ST projects) varies greatly depending on the type of customer - government or business structures. An extensive methodological groundwork was formed with respect to orders placed by business structures. It included “an internal administrative order” by the company management for the results of STA intended for its own ST divisions. Regretfully this is not the case with state orders in the field of STA although the issue requires state regulation and official methodological support. The article is devoted to methodological assessment of scientific and technical effectiveness of studies performed at the expense of budget funds, and suggests a new concept based on the definition of the cost-effectiveness index. Thus, the study reveals it necessary to extend the previous approach to projects of different levels - micro-, meso-, macro projects. The preliminary results of the research show that there must be a common methodological approach to underpin the financing of projects under government contracts within the framework of budget financing and stock financing. This should be developed as general guidelines as well as recommendations that reflect specific sectors of the public sector, various project levels and forms of financing, as well as different stages of project life cycle.
Boldt, Lea J.; Kochanska, Grazyna; Yoon, Jeung Eun; Nordling, Jamie Koenig
2014-01-01
We examined children’s attachment security with their mothers and fathers in a community sample (N = 100). At 25 months, mothers, fathers, and trained observers completed Attachment Q-Set (AQS). At 100 months, children completed Kerns Security Scale (KSS) for each parent. Children’s adaptation (behavior problems and competence in broader ecologies of school and peer group, child- and parent-reported) was assessed at 100 months. By and large, the child’s security with the mother and father was modestly to robustly concordant across both relationships, depending on the assessment method. Observers’ AQS security scores predicted children’s self-reported security 6 years later. For children with low AQS security scores with mothers, variations in security with fathers had significant implications for adaptation: Those whose security with fathers was also low reported the most behavior problems and were seen as least competent in broader ecologies, but those whose security with fathers was high reported few problems and were seen as competent. Security with fathers, observer-rated and child-reported, predicted children’s higher competence in broader ecologies. A cumulative index of the history of security from toddler age to middle childhood, integrating measures across both relationships and diverse methodologies, was significantly associated with positive adaptation at 100 months. PMID:24605850
Food security in an era of economic volatility.
Naylor, Rosamond L; Falcon, Walter P
2010-01-01
This article analyzes international commodity price movements, assesses food policies in response to price fluctuations, and explores the food security implications of price volatility on low-income groups. It focuses specifically on measurements, causes, and consequences of recent food price trends, variability around those trends, and price spikes. Combining these three components of price dynamics shows that the variation in real prices post-2000 was substantially greater than that in the 1980s and 1990s, and was approximately equal to the extreme volatility in commodity prices that was experienced in the 1970s. Macro policy, exchange rates, and petroleum prices were important determinants of price variability over 2005–2010, highlighting the new linkages between the agriculture-energy and agriculture-finance markets that affect the world food economy today. These linkages contributed in large part to misguided expectations and uncertainty that drove prices to their peak in 2008. The article also argues that there is a long-lasting effect of price spikes on food policy around the world, often resulting in self-sufficiency policies that create even more volatility in international markets. The efforts by governments to stabilize prices frequently contribute to even greater food insecurity among poor households, most of which are in rural areas and survive on the margin of net consumption and net production. Events of 2008—and more recently in 2010—underscore the impact of price variability for food security and the need for refocused policy approaches to prevent and mitigate price spikes.
[Occupational risks among public safety and security forces].
Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V
2006-01-01
The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational-related compensation claims.
Zhiliang Zhu; Brian Bergamaschi; Richard Bernknopf; David Clow; Dennis Dye; Stephen Faulkner; William Forney; Robert Gleason; Todd Hawbaker; Jinxun Liu; Shuguang Liu; Stephen Prisley; Bradley Reed; Matthew Reeves; Matthew Rollins; Benjamin Sleeter; Terry Sohl; Sarah Stackpoole; Stephen Stehman; Robert Striegl; Anne Wein
2010-01-01
This methodology was developed to fulfill a requirement by the Energy Independence and Security Act of 2007 (EISA). The EISA legislation mandates the U.S. Department of the Interior (DOI) to develop a methodology and conduct an assessment of carbon storage, carbon sequestration, and fluxes of three principal greenhouse gases (GHG) for the Nation's ecosystems. The...
Report of the DHS National Small Vessel Security Summit
2007-10-19
and a broad range of public and private sector interests are integral parts of the nation’s strategy of “layered security” in the face of hostile ...proceedings of the NSVSS, forming a record of the discussions (in a neutral, non- attribution format) to serve as the starting point of an ongoing...strives continuously to improve the methodology for calculating risk. Because this methodology influences how funds are allocated, it has been subject
2010-08-01
a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a ...SECURITY CLASSIFICATION OF: This study presents a methodology for computing stochastic sensitivities with respect to the design variables, which are the...Random Variables Report Title ABSTRACT This study presents a methodology for computing stochastic sensitivities with respect to the design variables
Space-Policy Education: Contexts and Constraints, Content and Methodology
2016-04-20
universities, asked, “How do you teach space policy?” Her question made me think about the various teaching methodologies we use at the National Security Space...Do we teach the right things effectively? I’ve attended a number of forums regarding education and space-related topics but have never participated...likely to use? The agenda also included a survey of different types of instructional methods and their relative pros and cons. Unsurprisingly, we
A mapping of information security in health Information Systems in Latin America and Brazil.
Pereira, Samáris Ramiro; Fernandes, João Carlos Lopes; Labrada, Luis; Bandiera-Paiva, Paulo
2013-01-01
In health, Information Systems are patient records, hospital administration or other, have advantages such as cost, availability and integration. However, for these benefits to be fully met, it is necessary to guarantee the security of information maintained and provided by the systems. The lack of security can lead to serious consequences such as lawsuits and induction to medical errors. The management of information security is complex and is used in various fields of knowledge. Often, it is left in the background for not being the ultimate goal of a computer system, causing huge financial losses to corporations. This paper by systematic review methodologies, presented a mapping in the literature, in order to identify the most relevant aspects that are addressed by security researchers of health information, as to the development of computerized systems. They conclude through the results, some important aspects, for which the managers of computerized health systems should remain alert.
An efficient and provable secure revocable identity-based encryption scheme.
Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia
2014-01-01
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.
A finite-element model for moving contact line problems in immiscible two-phase flow
NASA Astrophysics Data System (ADS)
Kucala, Alec
2017-11-01
Accurate modeling of moving contact line (MCL) problems is imperative in predicting capillary pressure vs. saturation curves, permeability, and preferential flow paths for a variety of applications, including geological carbon storage (GCS) and enhanced oil recovery (EOR). The macroscale movement of the contact line is dependent on the molecular interactions occurring at the three-phase interface, however most MCL problems require resolution at the meso- and macro-scale. A phenomenological model must be developed to account for the microscale interactions, as resolving both the macro- and micro-scale would render most problems computationally intractable. Here, a model for the moving contact line is presented as a weak forcing term in the Navier-Stokes equation and applied directly at the location of the three-phase interface point. The moving interface is tracked with the level set method and discretized using the conformal decomposition finite element method (CDFEM), allowing for the surface tension and the wetting model to be computed at the exact interface location. A variety of verification test cases for simple two- and three-dimensional geometries are presented to validate the current MCL model, which can exhibit grid independence when a proper scaling for the slip length is chosen. Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA-0003525.
NASA Astrophysics Data System (ADS)
Priori, Simone; Bianconi, Nadia; Valboa, Giuseppe; Mocali, Stefano; Pellegrini, Sergio; Leprini, Marco; Perria, Rita; Storchi, Paolo; Ciambotti, Aldo; Dell'Oro, Valentina; Costantini, Edoardo A. C.
2015-04-01
Grape composition, which affects the wine sensory qualities, depends on vine features (rootstock, scion, vine health) and vineyard management as much as environmental factors. Mapping soil at the vineyard scale, in particular, helps in optimizing the terroir expression of the wine. The terroir effect however varies year by year, depending on the interaction of several factors, such as climate and soil. Aim of this research work was to set up a methodology to delineate homogeneous harvest zones (HZ) in the vineyard and to evaluate the vintage effect in them. Four terroir macro-units suitable for premium Sangiovese wine, which is the main cultivar of Chianti D.O.C.G., were selected within a wide farm of Chianti Classico district (Siena, Central Italy). The selected macro-units are representative of the most common and suitable viticultural environments of the Chianti Classico D.O.C.G. and include: 1) hills of high altitude (450-500 m a.s.l.) on feldspathic sandstones, with shallow sandy soils; 2) hills of high altitude (400-500 m a.s.l.) on calcareous flysches, with stony, clayey and calcareous soils; 3) hills of moderate altitude (250-350 m a.s.l.) on Pliocene sandy marine deposits; 4) hills and fluvial terraces of moderate altitude (200-300 m a.s.l., 50-100 m above the present river valley) on ancient fluvial deposits. Each terroir macro-unit was surveyed by soil proximal sensing, to define two homogeneous zones (HZs) in terms of soil physics and hydrology. The proximal sensors used to map the HZs were: i) γ-ray spectrometer, to map the variability of soil surface in terms of parent material, texture and stoniness; ii) electromagnetic induction sensor (EMI) to determine the spatial variability of texture and soil moisture in the sub-surface horizons. Thus, the soil moisture of each HZ was monitored during spring shoot growth (beginning of April), berries veraison (end of July-beginning of August) and final ripening phase before harvest (September). Three representative plots of 10 grapevines each were selected within each HZs to monitor: i) grapevine root development; ii) vine physiology and water stress; iii) grape yield and quality. Moreover, the grapes of each HZs were harvested and vinified separately. After three vintages ('12, '13, and '14) the main results are: i) terroir macro-units differentiated the grape and wine peculiarities every vintage; ii) The delineation of HZs within each macro-units, intensified the effect of terroir on wine quality only in the warmest and driest summer '12, whereas the effects under more humid summers, like in '13 and '14, were smaller; iii) the sandy soils on feldspathic sandstones and marine sands increased the quality of the wines only in the warm-dry vintage ('12), whereas the wine quality decreased in humid summers ('13-'14), because of lacking of suitable water stress; iv) the grapevines in the terroir characterized by stony and clayey soils, showed light water stress also in wetter summers ('13-'14) and the wines produced in this terroir showed the highest quality and the greatest stability in typicality during the years. Concluding, the results of our work seem to indicate that the differentiation of HZs within a suitable macro-terroir can be fruitful only in specific vintages, when the soil hydrology plays a major role on the wine quality and typicality.
2010-01-28
Considerations – Position categories: • Hard • Generic or “ soft ” • Advanced Training – Language requirements – Need for • military, combat and/or field...Analysis (DGMPRA) Presentation to MORS WG Personnel and National Security: A Quantitative Approach 25-28 January 2010 Defence Research and...SUPPLEMENTARY NOTES Personnel and National Security: A Quantitative Approach (Unclass), 25-28 January 2010, Johns Hopkins University Applied Physics
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
Regulation of neural macroRNAs by the transcriptional repressor REST
Johnson, Rory; Teh, Christina Hui-Leng; Jia, Hui; Vanisri, Ravi Raj; Pandey, Tridansh; Lu, Zhong-Hao; Buckley, Noel J.; Stanton, Lawrence W.; Lipovich, Leonard
2009-01-01
The essential transcriptional repressor REST (repressor element 1-silencing transcription factor) plays central roles in development and human disease by regulating a large cohort of neural genes. These have conventionally fallen into the class of known, protein-coding genes; recently, however, several noncoding microRNA genes were identified as REST targets. Given the widespread transcription of messenger RNA-like, noncoding RNAs (“macroRNAs”), some of which are functional and implicated in disease in mammalian genomes, we sought to determine whether this class of noncoding RNAs can also be regulated by REST. By applying a new, unbiased target gene annotation pipeline to computationally discovered REST binding sites, we find that 23% of mammalian REST genomic binding sites are within 10 kb of a macroRNA gene. These putative target genes were overlooked by previous studies. Focusing on a set of 18 candidate macroRNA targets from mouse, we experimentally demonstrate that two are regulated by REST in neural stem cells. Flanking protein-coding genes are, at most, weakly repressed, suggesting specific targeting of the macroRNAs by REST. Similar to the majority of known REST target genes, both of these macroRNAs are induced during nervous system development and have neurally restricted expression profiles in adult mouse. We observe a similar phenomenon in human: the DiGeorge syndrome-associated noncoding RNA, DGCR5, is repressed by REST through a proximal upstream binding site. Therefore neural macroRNAs represent an additional component of the REST regulatory network. These macroRNAs are new candidates for understanding the role of REST in neuronal development, neurodegeneration, and cancer. PMID:19050060
Regulation of neural macroRNAs by the transcriptional repressor REST.
Johnson, Rory; Teh, Christina Hui-Leng; Jia, Hui; Vanisri, Ravi Raj; Pandey, Tridansh; Lu, Zhong-Hao; Buckley, Noel J; Stanton, Lawrence W; Lipovich, Leonard
2009-01-01
The essential transcriptional repressor REST (repressor element 1-silencing transcription factor) plays central roles in development and human disease by regulating a large cohort of neural genes. These have conventionally fallen into the class of known, protein-coding genes; recently, however, several noncoding microRNA genes were identified as REST targets. Given the widespread transcription of messenger RNA-like, noncoding RNAs ("macroRNAs"), some of which are functional and implicated in disease in mammalian genomes, we sought to determine whether this class of noncoding RNAs can also be regulated by REST. By applying a new, unbiased target gene annotation pipeline to computationally discovered REST binding sites, we find that 23% of mammalian REST genomic binding sites are within 10 kb of a macroRNA gene. These putative target genes were overlooked by previous studies. Focusing on a set of 18 candidate macroRNA targets from mouse, we experimentally demonstrate that two are regulated by REST in neural stem cells. Flanking protein-coding genes are, at most, weakly repressed, suggesting specific targeting of the macroRNAs by REST. Similar to the majority of known REST target genes, both of these macroRNAs are induced during nervous system development and have neurally restricted expression profiles in adult mouse. We observe a similar phenomenon in human: the DiGeorge syndrome-associated noncoding RNA, DGCR5, is repressed by REST through a proximal upstream binding site. Therefore neural macroRNAs represent an additional component of the REST regulatory network. These macroRNAs are new candidates for understanding the role of REST in neuronal development, neurodegeneration, and cancer.
Application of Lightweight Formal Methods to Software Security
NASA Technical Reports Server (NTRS)
Gilliam, David P.; Powell, John D.; Bishop, Matt
2005-01-01
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines several formal techniques can increase the confidence in the verification of software security properties. Such an approach which species security properties in a library that can be reused by 2 instruments and their methodologies developed for the National Aeronautics and Space Administration (NASA) at the Jet Propulsion Laboratory (JPL) are described herein The Flexible Modeling Framework (FMF) is a model based verijkation instrument that uses Promela and the SPIN model checker. The Property Based Tester (PBT) uses TASPEC and a Text Execution Monitor (TEM). They are used to reduce vulnerabilities and unwanted exposures in software during the development and maintenance life cycles.
Systemic Integration and Macro Steering
ERIC Educational Resources Information Center
Bleiklie, Ivar
2007-01-01
The article deals with the development of national higher education systems and the emergence of macro steering in Europe and to some extent in the USA. It is based on the assumption that this process of integration of higher education systems through macro steering will increasingly be felt as a forceful influence on higher education. Integration…
Teaching Note--Incorporating Social Innovation Content into Macro Social Work Education
ERIC Educational Resources Information Center
Pitt-Catsouphes, Marcie; Cosner Berzin, Stephanie
2015-01-01
The practice of social innovation offers promising approaches for addressing social issues. Although many social innovation strategies are congruent with macro social work theory and practice, some of the insights and tactics that have emerged in the social innovation field have the potential to strengthen current macro practice. Based on our…
Micro-Macro Compatibility: When Does a Complex Systems Approach Strongly Benefit Science Learning?
ERIC Educational Resources Information Center
Samon, Sigal; Levy, Sharona T.
2017-01-01
The study explores how a complexity approach empowers science learning. A complexity approach represents systems as many interacting entities. The construct of micro-macro compatibility is introduced, the degree of similarity between behaviors at the micro- and macro-levels of the system. Seventh-grade students' learning about gases was studied…
Food/Hunger Macro-Analysis Seminar. A Do-It-Yourself Manual for College Courses and Action Groups.
ERIC Educational Resources Information Center
Moyer, William; Thorne, Erika
This guide describes a fifteen-week macro-analysis seminar about food production, distribution, and consumption on international, national, and local levels. The macro-analysis approach emphasizes the interrelatedness of all parts of the food/hunger issue; therefore the seminar also addresses escalating military expenditures, widening poverty, and…
Healthy public policy in poor countries: tackling macro-economic policies.
Mohindra, K S
2007-06-01
Large segments of the population in poor countries continue to suffer from a high level of unmet health needs, requiring macro-level, broad-based interventions. Healthy public policy, a key health promotion strategy, aims to put health on the agenda of policy makers across sectors and levels of government. Macro-economic policy in developing countries has thus far not adequately captured the attention of health promotion researchers. This paper argues that healthy public policy should not only be an objective in rich countries, but also in poor countries. This paper takes up this issue by reviewing the main macro-economic aid programs offered by international financial institutions as a response to economic crises and unmanageable debt burdens. Although health promotion researchers were largely absent during a key debate on structural adjustment programs and health during the 1980s and 1990s, the international macro-economic policy tool currently in play offers a new opportunity to participate in assessing these policies, ensuring new forms of macro-economic policy interventions do not simply reproduce patterns of (neoliberal) economics-dominated development policy.
Development of Hollow Steel Ball Macro-Encapsulated PCM for Thermal Energy Storage Concrete
Dong, Zhijun; Cui, Hongzhi; Tang, Waiching; Chen, Dazhu; Wen, Haibo
2016-01-01
The application of thermal energy storage with phase change materials (PCMs) for energy efficiency of buildings grew rapidly in the last few years. In this research, octadecane paraffin was served as a PCM, and a structural concrete with the function of indoor temperature control was developed by using a macro-encapsulated PCM hollow steel ball (HSB). The macro-encapsulated PCM-HSB was prepared by incorporation of octadecane into HSBs through vacuum impregnation. Test results showed that the maximum percentage of octadecane carried by HSBs was 80.3% by mass. The macro-encapsulated PCM-HSB has a latent heat storage capacity as high as 200.5 J/g. The compressive strength of concrete with macro-encapsulated PCM-HSB at 28 days ranged from 22 to 40 MPa. The indoor thermal performance test revealed that concrete with macro-encapsulated octadecane-HSB was capable of reducing the peak indoor air temperature and the fluctuation of indoor temperature. It can be very effective in transferring the heating and cooling loads away from the peak demand times. PMID:28787859
Development of Hollow Steel Ball Macro-Encapsulated PCM for Thermal Energy Storage Concrete.
Dong, Zhijun; Cui, Hongzhi; Tang, Waiching; Chen, Dazhu; Wen, Haibo
2016-01-19
The application of thermal energy storage with phase change materials (PCMs) for energy efficiency of buildings grew rapidly in the last few years. In this research, octadecane paraffin was served as a PCM, and a structural concrete with the function of indoor temperature control was developed by using a macro-encapsulated PCM hollow steel ball (HSB). The macro-encapsulated PCM-HSB was prepared by incorporation of octadecane into HSBs through vacuum impregnation. Test results showed that the maximum percentage of octadecane carried by HSBs was 80.3% by mass. The macro-encapsulated PCM-HSB has a latent heat storage capacity as high as 200.5 J/g. The compressive strength of concrete with macro-encapsulated PCM-HSB at 28 days ranged from 22 to 40 MPa. The indoor thermal performance test revealed that concrete with macro-encapsulated octadecane-HSB was capable of reducing the peak indoor air temperature and the fluctuation of indoor temperature. It can be very effective in transferring the heating and cooling loads away from the peak demand times.
Xing, Qian-Guo; Zheng, Xiang-Yang; Shi, Ping; Hao, Jia-Jia; Yu, Ding-Feng; Liang, Shou-Zhen; Liu, Dong-Yan; Zhang, Yuan-Zhi
2011-06-01
Landsat-TM (Theme Mapper) and EOS (Earth Observing System)-MODIS (MODerate resolution Imaging Spectrora-diometer) Terra/Aqua images were used to monitor the macro-algae (Ulva prolifera) bloom since 2007 at the Yellow Sea and the East China Sea. At the turbid waters of Northern Jiangsu Shoal, there is strong spectral mixing behavior, and satellite images with finer spatical resolution are more effective in detection of macro-algae patches. Macro-algae patches were detected by the Landsat images for the first time at the Sheyang estuary where is dominated by very turbid waters. The MODIS images showed that the macro-algae from the turbid waters near the Northern Jiangsu Shoal drifted southwardly in the early of May and affected the East China Sea waters; with the strengthening east-asian Summer Monsoon, macro-algae patches mainly drifted in a northward path which was mostly observed at the Yellow Sea. Macro-algae patches were also found to drift eastwardly towards the Korea Peninsular, which are supposed to be driven by the sea surface wind.
Structural Characterization of the Histone Variant macroH2A
Chakravarthy, Srinivas; Gundimella, Sampath Kumar Y.; Caron, Cecile; Perche, Pierre-Yves; Pehrson, John R.; Khochbin, Saadi; Luger, Karolin
2005-01-01
macroH2A is an H2A variant with a highly unusual structural organization. It has a C-terminal domain connected to the N-terminal histone domain by a linker. Crystallographic and biochemical studies show that changes in the L1 loop in the histone fold region of macroH2A impact the structure and potentially the function of nucleosomes. The 1.6-Å X-ray structure of the nonhistone region reveals an α/β fold which has previously been found in a functionally diverse group of proteins. This region associates with histone deacetylases and affects the acetylation status of nucleosomes containing macroH2A. Thus, the unusual domain structure of macroH2A integrates independent functions that are instrumental in establishing a structurally and functionally unique chromatin domain. PMID:16107708
Increasing security through public health: a practical model.
Parker, R David
2011-01-01
As political and social changes sweep the globe, there are opportunities to increase national security through innovative approaches. While traditional security methods such as defense forces and homeland security provide both pre-emptive and defensive protection, new methods could meet emerging challenges by responding to the political, financial, and social trends. One method is the integration of defense, medicine and public health. By assisting a nation by providing basic services, such as healthcare, collaborative efforts can increase stabilization in areas of unrest. Improved health outcomes leads to increased domestic security, which can create a ripple effect across a region. Assessment, uptake and sustainability by the host nation are critical for program success. The proposed methodology focuses on the use of primarily extant resources, such as programs used by Special Operations Forces and other health and defense programs. Additional components include evaluation, set objectives and mission collaborations. As the nexus between foreign affairs, security, and public health is increasingly validated through research and practice, standardized interventions should be developed to minimize overlapping expenditures, promote security and strengthen international relations. 2011.
Security evaluation and assurance of electronic health records.
Weber-Jahnke, Jens H
2009-01-01
Electronic Health Records (EHRs) maintain information of sensitive nature. Security requirements in this context are typically multilateral, encompassing the viewpoints of multiple stakeholders. Two main research questions arise from a security assurance point of view, namely how to demonstrate the internal correctness of EHRs and how to demonstrate their conformance in relation to multilateral security regulations. The above notions of correctness and conformance directly relate to the general concept of system verification, which asks the question "are we building the system right?" This should not be confused with the concept of system validation, which asks the question "are we building the right system?" Much of the research in the medical informatics community has been concerned with the latter aspect (validation). However, trustworthy security requires assurances that standards are followed and specifications are met. The objective of this paper is to contribute to filling this gap. We give an introduction to fundamentals of security assurance, summarize current assurance standards, and report on experiences with using security assurance methodology applied to the EHR domain, specifically focusing on case studies in the Canadian context.
Mentat: An object-oriented macro data flow system
NASA Technical Reports Server (NTRS)
Grimshaw, Andrew S.; Liu, Jane W. S.
1988-01-01
Mentat, an object-oriented macro data flow system designed to facilitate parallelism in distributed systems, is presented. The macro data flow model is a model of computation similar to the data flow model with two principal differences: the computational complexity of the actors is much greater than in traditional data flow systems, and there are persistent actors that maintain state information between executions. Mentat is a system that combines the object-oriented programming paradigm and the macro data flow model of computation. Mentat programs use a dynamic structure called a future list to represent the future of computations.
E-Commerce and Security Governance in Developing Countries
NASA Astrophysics Data System (ADS)
Sanayei, Ali.; Rajabion, Lila
Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.
Quality of Protection Evaluation of Security Mechanisms
Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail
2014-01-01
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683
NASA Astrophysics Data System (ADS)
Raffaelli, D.
2000-07-01
Blooms of opportunistic green macro-algae are a common feature of coastal areas and their effects on mudflat invertebrates can be dramatic. On the Ythan estuary, Aberdeenshire, Scotland, we have carried out a number of manipulative field experiments designed to evaluate the effects on invertebrates of different species of macro-algae with contrasting ecologies, and the effects of invertebrates on the development of the blooms. Macro-algal mats were found to have dramatic nega- tive effects on the density of the amphipod Corophium volutator, with higher algal biomasses having greater impact. The mechanism for this interaction seems to be interference by the algal filaments with the feeding behaviour of the amphipod. In contrast, the polychaete Capitella spp. increases in abundance under macro-algal mats due to enrichment of the sediment with organic material. These two interactions are seen at all scales, in areas of less than 1 m2 to the scale of the entire estuary, irrespective of the species composition of the macro- algal mats. Bioturbation by Corophium and grazing by the snail Hydrobia ulvae had little effect on macro-algal biomass, but there were less algae when the polychaete Nereis diversicolor was present. The most significant interaction in this system is the pronounced negative impact of algal mats on the abundance of Corophium, probably the most important invertebrate species in the diets of the estuary's shorebirds, fish and epibenthic crustaceans.
Methodology for Designing Operational Banking Risks Monitoring System
NASA Astrophysics Data System (ADS)
Kostjunina, T. N.
2018-05-01
The research looks at principles of designing an information system for monitoring operational banking risks. A proposed design methodology enables one to automate processes of collecting data on information security incidents in the banking network, serving as the basis for an integrated approach to the creation of an operational risk management system. The system can operate remotely ensuring tracking and forecasting of various operational events in the bank network. A structure of a content management system is described.
2002-12-01
influence? C. METHODOLOGY The methodology for this thesis will be a qualitative analysis of topical scholarly texts, government policy, personal ...other elements of collective security. The best example of collective defense language is contained in Article 5 of the Washington Treaty which... histrionics , has been essentially powerless to halt the enlargement of NATO. All of the actions taken by Russia during the Kosovo crisis in 1999
Automating the Fireshed Assessment Process with ArcGIS
Alan Ager; Klaus Barber
2006-01-01
A library of macros was developed to automate the Fireshed process within ArcGIS. The macros link a number of vegetation simulation and wildfire behavior models (FVS, SVS, FARSITE, and FlamMap) with ESRI geodatabases, desktop software (Access, Excel), and ArcGIS. The macros provide for (1) an interactive linkage between digital imagery, vegetation data, FVS-FFE, and...
A Macro-Micro-Symbolic Teaching to Promote Relational Understanding of Chemical Reactions
ERIC Educational Resources Information Center
Jaber, Lama Ziad; Boujaoude, Saouma
2012-01-01
The purpose of this research is threefold: (1) to identify the difficulties that Grade 10 students in a Lebanese school have that hinder their conceptual understanding at the micro-macro-symbolic interface in chemistry, (2) to investigate the effect of a macro-micro-symbolic teaching approach on students' relational understanding of chemical…
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-01-01
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-11-04
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.
2016-11-01
low- power RF transmissions used by the OBAN system. B. Threat Analysis Methodology To analyze the risk presented by a particular threat we use a... power efficiency5 and in the absolute worst case a compromise of the wireless channel could result in death. Fitness trackers on the other hand are...analysis is intended to inform the development of secure RT-PSM architectures. I. INTRODUCTION The development of very low- power computing devices and
2017-12-01
SADOP) was authorized as SCNG policy on October 3, 2015. This research constitutes a case study of the SCNG SADOP and catalogs the program from...concealed firearms carry law. C. METHODOLOGY This thesis is a single case study of SADOP, which is an exceptional case and the only one of its kind...CAROLINA NATIONAL GUARD SECURE AREA DUTY OFFICER PROGRAM: A RESERVE COMPONENT ACTIVE SHOOTER CONTINGENCY CASE STUDY by Barry N. Ramey December
1991-03-01
management methodologies claim to be "expert systems" with security intelligence built into them to I derive a body of both facts and speculative data ... Data Administration considerations . III -21 IV. ARTIFICIAL INTELLIGENCE . .. .. .. . .. IV - 1 A. Description of Technologies . . . . . .. IV - 1 1...as intelligent gateways, wide area networks, and distributed databases for the distribution of logistics products. The integrity of CALS data and the
Hybrid Scenario Development Methodology and Tool: An Arctic-Oriented Scenario Example
2011-07-01
T E N D S T A T E = S C E N A R I O T R I G G E R P O I N T SECURITY(INC DEFENCE) LEGAL ENVIRONMENTAL...SECURITY(INC DEFENCE) S C E N A R I O D E V E L O P M E N T E N D S T A T E = S C E N A R I O T R I G G E R P O I N T
Information Systems: Opportunities Exist to Strengthen SEC’s Oversight of Capacity and Security
2001-07-01
Strengthen SEC’s Oversight of Capacity and Security 5 . FUNDING NUMBERS 6. AUTHOR(S) GAO 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...ANSI Std. Z39-18 298-102 Page i GAO-01-863 Information Systems Letter 1 Results in Brief 2 Background 4 Scope and Methodology 5 SEC Uses a Wide Range...or external organizations to conduct the independent reviews. These internal audits are performed cyclically based on an annual risk analysis. SEC
NASA Astrophysics Data System (ADS)
Arakelyan, E. K.; Andryushin, A. V.; Mezin, S. V.; Kosoy, A. A.; Kalinina, Ya V.; Khokhlov, I. S.
2017-11-01
The principle of interaction of the specified systems of technological protections by the Automated process control system (APCS) and information safety in case of incorrect execution of the algorithm of technological protection is offered. - checking the correctness of the operation of technological protection in each specific situation using the functional relationship between the monitored parameters. The methodology for assessing the economic feasibility of developing and implementing an information security system.
NASA Astrophysics Data System (ADS)
Dou, Kun; Yang, Zhenguo; Liu, Qing; Huang, Yunhua; Dong, Hongbiao
2017-07-01
A cellular automaton-finite element coupling model for high-carbon continuously cast bloom of GCr15 steel is established to simulate the solidification structure and to investigate the influence of different secondary cooling modes on characteristic parameters such as equiaxed crystal ratio, grain size and secondary dendrite arm spacing, in which the effect of phase transformation and electromagnetic stirring is taken into consideration. On this basis, evolution of carbon macro-segregation for GCr15 steel bloom is researched correspondingly via industrial tests. Based on above analysis, the relationship among secondary cooling modes, characteristic parameters for solidification structure as well as carbon macro-segregation is illustrated to obtain optimum secondary cooling strategy and alleviate carbon macro-segregation degree for GCr15 steel bloom in continuous casting process. The evaluating method for element macro-segregation is applicable in various steel types.
Pantex Falling Man - Independent Review Panel Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bertolini, Louis; Brannon, Nathan; Olson, Jared
2014-11-01
Consolidated Nuclear Security (CNS) Pantex took the initiative to organize a Review Panel of subject matter experts to independently assess the adequacy of the Pantex Tripping Man Analysis methodology. The purpose of this report is to capture the details of the assessment including the scope, approach, results, and detailed Appendices. Along with the assessment of the analysis methodology, the panel evaluated the adequacy with which the methodology was applied as well as congruence with Department of Energy (DOE) standards 3009 and 3016. The approach included the review of relevant documentation, interactive discussion with Pantex staff, and the iterative process ofmore » evaluating critical lines of inquiry.« less
Shankardass, Ketan; Renahy, Emilie; Muntaner, Carles; O'Campo, Patricia
2015-05-01
To address macro-social and economic determinants of health and equity, there has been growing use of intersectoral action by governments around the world. Health in All Policies (HiAP) initiatives are a special case where governments use cross-sectoral structures and relationships to systematically address health in policymaking by targeting broad health determinants rather than health services alone. Although many examples of HiAP have emerged in recent decades, the reasons for their successful implementation--and for implementation failures--have not been systematically studied. Consequently, rigorous evidence based on systematic research of the social mechanisms that have regularly enabled or hindered implementation in different jurisdictions is sparse. We describe a novel methodology for explanatory case studies that use a scientific realist perspective to study the implementation of HiAP. Our methodology begins with the formulation of a conceptual framework to describe contexts, social mechanisms and outcomes of relevance to the sustainable implementation of HiAP. We then describe the process of systematically explaining phenomena of interest using evidence from literature and key informant interviews, and looking for patterns and themes. Finally, we present a comparative example of how Health Impact Assessment tools have been utilized in Sweden and Quebec to illustrate how this methodology uses evidence to first describe successful practices for implementation of HiAP and then refine the initial framework. The methodology that we describe helps researchers to identify and triangulate rich evidence describing social mechanisms and salient contextual factors that characterize successful practices in implementing HiAP in specific jurisdictions. This methodology can be applied to study the implementation of HiAP and other forms of intersectoral action to reduce health inequities involving multiple geographic levels of government in diverse settings. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2014; all rights reserved.
Preacher, Kristopher J; Hayes, Andrew F
2008-08-01
Hypotheses involving mediation are common in the behavioral sciences. Mediation exists when a predictor affects a dependent variable indirectly through at least one intervening variable, or mediator. Methods to assess mediation involving multiple simultaneous mediators have received little attention in the methodological literature despite a clear need. We provide an overview of simple and multiple mediation and explore three approaches that can be used to investigate indirect processes, as well as methods for contrasting two or more mediators within a single model. We present an illustrative example, assessing and contrasting potential mediators of the relationship between the helpfulness of socialization agents and job satisfaction. We also provide SAS and SPSS macros, as well as Mplus and LISREL syntax, to facilitate the use of these methods in applications.
Hunter, Kendall S.; Feinstein, Jeffrey A.; Ivy, D. Dunbar; Shandas, Robin
2010-01-01
The hemodynamic state of the pulmonary arteries is challenging to routinely measure in children due to the vascular circuit's position in the lungs. The resulting relative scarcity of quantitative clinical diagnostic and prognostic information impairs management of diseases such as pulmonary hypertension, or high blood pressure of the pulmonary circuit, and invites new techniques of measurement. Here we examine recent applications of macro-scale computational mechanics methods for fluids and solids – traditionally used by engineers in the design and virtual testing of complex metal and composite structures – applied to study the pulmonary vasculature, both in healthy and diseased states. In four subject areas, we briefly outline advances in computational methodology and provide examples of clinical relevance. PMID:21499523
Bowleg, Lisa
2012-07-01
Intersectionality is a theoretical framework that posits that multiple social categories (e.g., race, ethnicity, gender, sexual orientation, socioeconomic status) intersect at the micro level of individual experience to reflect multiple interlocking systems of privilege and oppression at the macro, social-structural level (e.g., racism, sexism, heterosexism). Public health's commitment to social justice makes it a natural fit with intersectionality's focus on multiple historically oppressed populations. Yet despite a plethora of research focused on these populations, public health studies that reflect intersectionality in their theoretical frameworks, designs, analyses, or interpretations are rare. Accordingly, I describe the history and central tenets of intersectionality, address some theoretical and methodological challenges, and highlight the benefits of intersectionality for public health theory, research, and policy.
2012-01-01
Intersectionality is a theoretical framework that posits that multiple social categories (e.g., race, ethnicity, gender, sexual orientation, socioeconomic status) intersect at the micro level of individual experience to reflect multiple interlocking systems of privilege and oppression at the macro, social-structural level (e.g., racism, sexism, heterosexism). Public health’s commitment to social justice makes it a natural fit with intersectionality’s focus on multiple historically oppressed populations. Yet despite a plethora of research focused on these populations, public health studies that reflect intersectionality in their theoretical frameworks, designs, analyses, or interpretations are rare. Accordingly, I describe the history and central tenets of intersectionality, address some theoretical and methodological challenges, and highlight the benefits of intersectionality for public health theory, research, and policy. PMID:22594719
Semantic computing and language knowledge bases
NASA Astrophysics Data System (ADS)
Wang, Lei; Wang, Houfeng; Yu, Shiwen
2017-09-01
As the proposition of the next-generation Web - semantic Web, semantic computing has been drawing more and more attention within the circle and the industries. A lot of research has been conducted on the theory and methodology of the subject, and potential applications have also been investigated and proposed in many fields. The progress of semantic computing made so far cannot be detached from its supporting pivot - language resources, for instance, language knowledge bases. This paper proposes three perspectives of semantic computing from a macro view and describes the current status of affairs about the construction of language knowledge bases and the related research and applications that have been carried out on the basis of these resources via a case study in the Institute of Computational Linguistics at Peking University.
Hermoso, Maria; Tabacchi, Garden; Iglesia-Altaba, Iris; Bel-Serrat, Silvia; Moreno-Aznar, Luis A; García-Santos, Yurena; García-Luzardo, Ma del Rosario; Santana-Salguero, Beatriz; Peña-Quintana, Luis; Serra-Majem, Lluis; Moran, Victoria Hall; Dykes, Fiona; Decsi, Tamás; Benetou, Vassiliki; Plada, Maria; Trichopoulou, Antonia; Raats, Monique M; Doets, Esmée L; Berti, Cristiana; Cetin, Irene; Koletzko, Berthold
2010-10-01
This paper presents a review of the current knowledge regarding the macro- and micronutrient requirements of infants and discusses issues related to these requirements during the first year of life. The paper also reviews the current reference values used in European countries and the methodological approaches used to derive them by a sample of seven European and international authoritative committees from which background scientific reports are available. Throughout the paper, the main issues contributing to disparities in micronutrient reference values for infants are highlighted. The identification of these issues in relation to the specific physiological aspects of infants is important for informing future initiatives aimed at providing standardized approaches to overcome variability of micronutrient reference values across Europe for this age group. © 2010 Blackwell Publishing Ltd.
The science of human security: a response from political science.
Roberts, David
2008-01-01
The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality.
Secure positioning technique based on encrypted visible light map for smart indoor service
NASA Astrophysics Data System (ADS)
Lee, Yong Up; Jung, Gillyoung
2018-03-01
Indoor visible light (VL) positioning systems for smart indoor services are negatively affected by both cochannel interference from adjacent light sources and VL reception position irregularity in the three-dimensional (3-D) VL channel. A secure positioning methodology based on a two-dimensional (2-D) encrypted VL map is proposed, implemented in prototypes of the specific positioning system, and analyzed based on performance tests. The proposed positioning technique enhances the positioning performance by more than 21.7% compared to the conventional method in real VL positioning tests. Further, the pseudonoise code is found to be the optimal encryption key for secure VL positioning for this smart indoor service.
2008-06-01
PESTEL Analysis PESTEL Analysis examines the general environment surrounding the defense industry in a macro perspective. Its focus is on six main...legislation (p. 575). C. STRATEGIC ANALYSIS OF THE MACRO ENVIRONMENT 1. Porter’s Five-Forces Model Analysis Porter’s Five-Forces Model is used to analyze...B. PREVIOUS ANALYSES.................................................................................9 C. STRATEGIC ANALYSIS OF THE MACRO
A Force-Controllable Macro-Micro Manipulator and its Application to Medical Robotics
NASA Technical Reports Server (NTRS)
Marzwell, Neville I.; Uecker, Darrin R.; Wang, Yulun
1993-01-01
This paper describes an 8-degrees-of-freedom macro-micro robot. This robot is capable of performing tasks that require accurate force control, such as polishing, finishing, grinding, deburring, and cleaning. The design of the macro-micro mechanism, the control algorithms, and the hardware/sofware implemtation of the algotithms are described in this paper. Initial experimental results are reported.
ERIC Educational Resources Information Center
Lee, Jeongwoo
2017-01-01
The objectives of this dissertation include describing and analyzing the patterns of inequality in ALE participation at both the micro and macro levels. Special attention is paid to social origins of individual adults and their association with two groups of macro-level factors, social inequality (income, education, and skill inequality) and…
Why Are Macros Not Used? A Brief Review and an Approach for Improving Training
ERIC Educational Resources Information Center
Yechiam, Eldad
2006-01-01
Macros are programming scripts that can be generated by recording users' actions. It appears that despite their potential for reducing monotonous work, they are under-used by non-programmers. The present paper reviews the literature on the use of macros. Included is an original study that examines the effect of adding the "search and replace"…
The Micro and Macro Analysis of English and Arabic Religious Texts
ERIC Educational Resources Information Center
Al-Araji, Baida Faisal; Al-Azzawi, Sarab Khalil
2016-01-01
Religious discourse has been treated differently in various types of studies. In the present study, the English Biblical and Arabic Prophetic Hadiths will be tackled on two bases namely the micro and macro levels. In other words, the data will be analyzed at both micro and macro levels to maintain the organizational status of the religious texts.…
Modeling air concentration over macro roughness conditions by Artificial Intelligence techniques
NASA Astrophysics Data System (ADS)
Roshni, T.; Pagliara, S.
2018-05-01
Aeration is improved in rivers by the turbulence created in the flow over macro and intermediate roughness conditions. Macro and intermediate roughness flow conditions are generated by flows over block ramps or rock chutes. The measurements are taken in uniform flow region. Efficacy of soft computing methods in modeling hydraulic parameters are not common so far. In this study, modeling efficiencies of MPMR model and FFNN model are found for estimating the air concentration over block ramps under macro roughness conditions. The experimental data are used for training and testing phases. Potential capability of MPMR and FFNN model in estimating air concentration are proved through this study.
Azadeh, A; Motevali Haghighi, S; Gaeini, Z; Shabanpour, N
2016-07-01
This study presents an integrated approach for analyzing the impact of macro-ergonomics factors in healthcare supply chain (HCSC) by data envelopment analysis (DEA). The case of this study is the supply chain (SC) of a real hospital. Thus, healthcare standards and macro-ergonomics factors are considered to be modeled by the mathematical programming approach. Over 28 subsidiary SC divisions with parallel missions and objectives are evaluated by analyzing inputs and outputs through DEA. Each division in this HCSC is considered as decision making unit (DMU). This approach can analyze the impact of macro-ergonomics factors on supply chain management (SCM) in healthcare sector. Also, this method ranks the relevant performance efficiencies of each HCSC. In this study by using proposed method, the most effective macro-ergonomics factor on HCSC is identified as "teamwork" issue. Also, this study would help managers to identify the areas of weaknesses in their SCM system and set improvement target plan for the related SCM system in healthcare industry. To the best of our knowledge, this is the first study for macro-ergonomics optimization of HCSC. Copyright © 2016 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Ji, Lei; Lu, Jiping; Tang, Shuiyuan; Wu, Qianru; Wang, Jiachen; Ma, Shuyuan; Fan, Hongli; Liu, Changmeng
2018-06-28
Wire feeding additive manufacturing (WFAM) has broad application prospects because of its advantages of low cost and high efficiency. However, with the mode of lateral wire feeding, including wire and laser additive manufacturing, gas tungsten arc additive manufacturing etc., it is easy to generate macro defects on the surface of the components because of the anisotropy of melted wire, which limits the promotion and application of WFAM. In this work, gas tungsten arc additive manufacturing with lateral wire feeding is proposed to investigate the mechanisms of macro defects. The results illustrate that the defect forms mainly include side spatters, collapse, poor flatness, and unmelted wire. It was found that the heat input, layer thickness, tool path, and wire curvature can have an impact on the macro defects. Side spatters are the most serious defects, mainly because the droplets cannot be transferred to the center of the molten pool in the lateral wire feeding mode. This research indicates that the macro defects can be controlled by optimizing the process parameters. Finally, block parts without macro defects were fabricated, which is meaningful for the further application of WFAM.
Bialas, Andrzej
2010-01-01
The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, Wayne; Borders, Tammie
INL successfully developed a proof of concept for "Software Defined Anything" by emulating the laboratory's business applications that run on Virtual Machines. The work INL conducted demonstrates to industry on how this methodology can be used to improve security, automate and repeat processes, and improve consistency.
Micro and Macro Segregation in Alloys Solidifying with Equiaxed Morphology
NASA Technical Reports Server (NTRS)
Stefanescu, Doru M.; Curreri, Peter A.; Leon-Torres, Jose; Sen, Subhayu
1996-01-01
To understand macro segregation formation in Al-Cu alloys, experiments were run under terrestrial gravity (1g) and under low gravity during parabolic flights (10(exp -2) g). Alloys of two different compositions (2% and 5% Cu) were solidified at two different cooling rates. Systematic microscopic and SEM observations produced microstructural and segregation maps for all samples. These maps may be used as benchmark experiments for validation of microstructure evolution and segregation models. As expected, the macro segregation maps are very complex. When segregation was measured along the central axis of the sample, the highest macro segregation for samples solidified at 1g was obtained for the lowest cooling rate. This behavior is attributed to the longer time available for natural convection and shrinkage flow to affect solute redistribution. In samples solidified under low-g, the highest macro-segregation was obtained at the highest cooling rate. In general, low-gravity solidification resulted in less segregation. To explain the experimental findings, an analytical (Flemings-Nereo) and a numerical model were used. For the numerical model, the continuum formulation was employed to describe the macroscopic transports of mass, energy, and momentum, associated with the microscopic transport phenomena, for a two-phase system. The model proposed considers that liquid flow is driven by thermal and solutal buoyancy, and by solidification shrinkage. The Flemings-Nereo model explains well macro segregation in the initial stages of low-gravity segregation. The numerical model can describe the complex macro segregation pattern and the differences between low- and high-gravity solidification.
Multidisciplinary acute care research organization (MACRO): if you build it, they will come.
Early, Barbara J; Huang, David T; Callaway, Clifton W; Zenati, Mazen; Angus, Derek C; Gunn, Scott R; Yealy, Donald M; Unikel, Daniel; Billiar, Timothy R; Peitzman, Andrew B; Sperry, Jason L
2013-07-01
Clinical research will increasingly play a core role in the evolution and growth of acute care surgery program development across the country. What constitutes an efficient and effective clinical research infrastructure in the current fiscal and academic environment remains obscure. We sought to characterize the effects of implementation of a multidisciplinary acute care research organization (MACRO) at a busy tertiary referral university setting. In 2008, to minimize redundancy and cost as well as to maximize existing resources promoting acute care research, MACRO was created, unifying clinical research infrastructure among the Departments of Critical Care Medicine, Emergency Medicine, and Surgery. During the periods 2008 to 2012, we performed a retrospective analysis and determined volume of clinical studies, patient enrollment for both observational and interventional trials, and staff growth since MACRO's origination and characterized changes over time. From 2008 to 2011, the volume of patients enrolled in clinical studies, which MACRO facilitates has significantly increased more than 300%. The percentage of interventional/observational trials has remained stable during the same period (50-60%). Staff has increased from 6 coordinators to 10, with an additional 15 research associates allowing 24/7 service. With this significant growth, MACRO has become financially self-sufficient, and additional outside departments now seek MACRO's services. Appropriate organization of acute care clinical research infrastructure minimizes redundancy and can promote sustainable, efficient growth in the current academic environment. Further studies are required to determine if similar models can be successful at other acute care surgery programs.
Analysis of Alternatives for Risk Assessment Methodologies and Tools
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nachtigal, Noel M.; Fruetel, Julia A.; Gleason, Nathaniel J.
The purpose of this document is to provide a basic overview and understanding of risk assessment methodologies and tools from the literature and to assess the suitability of these methodologies and tools for cyber risk assessment. Sandia National Laboratories (SNL) performed this review in support of risk modeling activities performed for the Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division of the Department of Homeland Security (DHS) Office of Cybersecurity and Communications (CS&C). The set of methodologies and tools covered in this document is not intended to be exhaustive; instead, it focuses on those that are commonly used in themore » risk assessment community. The classification of methodologies and tools was performed by a group of analysts with experience in risk analysis and cybersecurity, and the resulting analysis of alternatives has been tailored to address the needs of a cyber risk assessment.« less
The 12th International Conference on Computer Safety, Reliability and Security
1993-10-29
then used [10]. The adequacy of the proposed methodology is shown through the design and the validation of a simple control system: a train set example...satisfying the safety condition. 4 Conclusions In this paper we have presented a methodology which can be used for the design of safety-critical systems...has a Burner but no Detector (or the Detector is permanently non -active). The PA: G1 for this design is shown in Fig 3a. The probability matrices are
Quantin, C; Fassa, M; Coatrieux, G; Riandey, B; Trouessin, G; Allaert, F A
2009-02-01
Compiling individual records which come from different sources remains very important for multicenter epidemiological studies, but at the same time European directives or other national legislation concerning nominal data processing have to be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, such an anonymization procedure is in contradiction with the common requirement in public health and biomedical research as it becomes almost impossible to link records from separate data collections where the same entity is not referenced in the same way. Solving this paradox by using methodology based on the combination of hashing and enciphering techniques is the main aim of this article. The method relies on one of the best known hashing functions (the secure hash algorithm) to ensure the anonymity of personal information while providing greater resistance to dictionary attacks, combined with encryption techniques. The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity. The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme. This methodology makes the stored data available for use in the field of public health for the benefit of patients, while respecting legal security requirements.
Enabling private and public sector organizations as agents of homeland security
NASA Astrophysics Data System (ADS)
Glassco, David H. J.; Glassco, Jordan C.
2006-05-01
Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.
Implementation and adaptation of a macro-scale methodology to calculate direct economic losses
NASA Astrophysics Data System (ADS)
Natho, Stephanie; Thieken, Annegret
2017-04-01
As one of the 195 member countries of the United Nations, Germany signed the Sendai Framework for Disaster Risk Reduction 2015-2030 (SFDRR). With this, though voluntary and non-binding, Germany agreed to report on achievements to reduce disaster impacts. Among other targets, the SFDRR aims at reducing direct economic losses in relation to the global gross domestic product by 2030 - but how to measure this without a standardized approach? The United Nations Office for Disaster Risk Reduction (UNISDR) has hence proposed a methodology to estimate direct economic losses per event and country on the basis of the number of damaged or destroyed items in different sectors. The method bases on experiences from developing countries. However, its applicability in industrial countries has not been investigated so far. Therefore, this study presents the first implementation of this approach in Germany to test its applicability for the costliest natural hazards and suggests adaptations. The approach proposed by UNISDR considers assets in the sectors agriculture, industry, commerce, housing, and infrastructure by considering roads, medical and educational facilities. The asset values are estimated on the basis of sector and event specific number of affected items, sector specific mean sizes per item, their standardized construction costs per square meter and a loss ratio of 25%. The methodology was tested for the three costliest natural hazard types in Germany, i.e. floods, storms and hail storms, considering 13 case studies on the federal or state scale between 1984 and 2016. Not any complete calculation of all sectors necessary to describe the total direct economic loss was possible due to incomplete documentation. Therefore, the method was tested sector-wise. Three new modules were developed to better adapt this methodology to German conditions covering private transport (cars), forestry and paved roads. Unpaved roads in contrast were integrated into the agricultural and forestry sector. Furthermore overheads are proposed to include costs of housing content as well as the overall costs of public infrastructure, one of the most important damage sectors. All constants considering sector specific mean sizes or construction costs were adapted. Loss ratios were adapted for each event. Whereas the original UNISDR method over- und underestimates the losses of the tested events, the adapted method is able to calculate losses in good accordance for river floods, hail storms and storms. For example, for the 2013-flood economic losses of EUR 6.3 billion were calculated (UNISDR EUR 0.85 billion, documentation EUR 11 billion). For the hail storms in 2013 the calculated EUR 3.6 billion overestimate the documented losses of EUR 2.7 billion less than the original UNISDR approach with EUR 5.2 billion. Only for flash floods, where public infrastructure can account for more than 90% of total losses, the method is absolutely not applicable. The adapted methodology serves as a good starting point for macro-scale loss estimations by accounting for the most important damage sectors. By implementing this approach into damage and event documentation and reporting standards, a consistent monitoring according to the SFDRR could be achieved.
Method of Fabricating NASA-Standard Macro-Fiber Composite Piezoelectric Actuators
NASA Technical Reports Server (NTRS)
High, James W.; Wilkie, W. Keats
2003-01-01
The NASA Macro-Fiber Composite actuator is a flexible piezoelectric composite device designed for controlling vibrations and shape deformations in high performance aerospace structures. A complete method for fabricating the standard NASA Macro-Fiber Composite actuator is presented in this document. When followed precisely, these procedures will yield devices with electromechanical properties identical to the standard actuator manufactured by NASA Langley Research Center.
Public Health in Serbia through the Lens of Security: A Review Article
ROKVIĆ, Vanja; JEFTIĆ, Zoran; AJZENHAMER, Vladimir
2016-01-01
Background: In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. Methods: The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. Results: The 20th and the 21st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people’s lives, capability for work, the entire economy and the capacities of the army and overall national security. Conclusion: The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy. PMID:27957458
Public Health in Serbia through the Lens of Security: A Review Article.
Rokvić, Vanja; Jeftić, Zoran; Ajzenhamer, Vladimir
2016-09-01
In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. The 20 th and the 21 st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people's lives, capability for work, the entire economy and the capacities of the army and overall national security. The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy.
Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo
2006-01-01
The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less
Exogenous determinants of early-life conditions, and mortality later in life.
van den Berg, Gerard J; Doblhammer, Gabriele; Christensen, Kaare
2009-05-01
We analyze causal effects of conditions early in life on the individual mortality rate later in life. Conditions early in life are captured by transitory features of the macro-environment around birth, notably the state of the business cycle around birth, but also food price deviations, weather indicators, and demographic indicators. We argue that these features can only affect high-age mortality by way of the individual early-life conditions. Moreover, they are exogenous from the individual point of view, which is a methodological advantage compared to the use of unique characteristics of the newborn individual or his or her family or household as early-life indicators. We collected national annual time-series data on the above-mentioned indicators, and we combine these to the individual data records from the Danish Twin Registry covering births in 1873-1906. The empirical analyses (mostly based on the estimation of duration models) indicate a significant negative causal effect of economic conditions early in life on individual mortality rates at higher ages. If the national economic performance in the year of birth exceeds its trend value (i.e., if the business cycle is favorable) then the mortality rate later in life is lower. The implied effect on the median lifetime of those who survive until age 35 is about 10 months. A systematic empirical exploration of all macro-indicators reveals that economic conditions in the first years after birth also affect mortality rates later in life.
Sacchini, Dario; Craxì, Lucia; Refolo, Pietro; Minacori, Roberta; Cicchetti, Americo; Gasbarrini, Antonio; Cammà, Calogero; Spagnolo, Antonio G
2015-05-01
Since chronic hepatitis C has mostly become curable, issues concerning choice and allocation of treatment are of major concern. We assessed the foremost ethical issues in hepatitis C virus therapy with 1st generation protease inhibitors using the personalist ethical framework within the health technology assessment methodology. Our aim was to identify values at stake/in conflict and to support both the physicians' choices in hepatitis C therapy and social (macro-) allocation decision-making. The ethical assessment indicates that: (1) safety/effectiveness profile of treatment is guaranteed if its use is restricted to the patients subgroups who may benefit from it; (2) patients should be carefully informed, particularly on treatment deferral, and widespread information on these therapies should be implemented; (3) since treatment was proven to be cost-effective, its use is acceptable respecting resource macro-allocation. Concerning individual (micro-) location criteria: (a) criteria for eligibility to treatment should be clearly identified and updated periodically; (b) information on criteria for eligibility/deferral to treatment for specific patients' subgroups should be made widely known. Interferon-based regimens will disappear from use within the next year, with the introduction of highly effective/tolerable combination regimens of direct-acting antivirals, thus profoundly changing social choices. Nonetheless, our model could support future ethical assessment since the evaluation pertaining ethical domains remains generally applicable. Copyright © 2014 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Kossobokov, V. G.; Nekrasova, A.
2017-12-01
We continue applying the general concept of seismic risk analysis in a number of seismic regions worldwide by constructing regional seismic hazard maps based on morphostructural analysis, pattern recognition, and the Unified Scaling Law for Earthquakes, USLE, which generalizes the Gutenberg-Richter relationship making use of naturally fractal distribution of earthquake sources of different size in a seismic region. The USLE stands for an empirical relationship log10N(M, L) = A + B·(5 - M) + C·log10L, where N(M, L) is the expected annual number of earthquakes of a certain magnitude M within an seismically prone area of linear dimension L. We use parameters A, B, and C of USLE to estimate, first, the expected maximum credible magnitude in a time interval at seismically prone nodes of the morphostructural scheme of the region under study, then map the corresponding expected ground shaking parameters (e.g. peak ground acceleration, PGA, or macro-seismic intensity etc.). After a rigorous testing against the available seismic evidences in the past (usually, the observed instrumental PGA or the historically reported macro-seismic intensity), such a seismic hazard map is used to generate maps of specific earthquake risks for population, cities, and infrastructures (e.g., those based on census of population, buildings inventory, etc.). This, USLE based, methodology of seismic hazard and risks assessment is applied to the territory of Altai-Sayan Region, of Russia. The study supported by the Russian Science Foundation Grant No. 15-17-30020.
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
Addressing the Need for Independence in the CSE Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T
2011-01-01
Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computationalmore » infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.« less
SecureMA: protecting participant privacy in genetic association meta-analysis.
Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A
2014-12-01
Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations.
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is “frankencerts,” synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired—a low-risk, often ignored error—but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations. PMID:25404868
Lechtig, Aarón; Gross, Rainer; Vivanco, Oscar Aquino; Gross, Ursula; López de Romaña, Daniel
2006-01-01
Weekly multimicronutrient supplementation was initiated as an appropriate intervention to protect poor urban populations from anemia. To identify the lessons learned from the Integrated Food Security Program (Programa Integrado de Seguridad Alimentaria [PISA]) weekly multimicronutrient supplementation program implemented in poor urban populations of Chiclayo, Peru. Data were collected from a 12-week program in which multimicronutrient supplements were provided weekly to women and adolescent girls 12 through 44 years of age and children under 5 years of age. A baseline survey was first conducted. Within the weekly multimicronutrient supplementation program, information was collected on supplement distribution, compliance, biological effectiveness, and cost. Supplementation, fortification, and dietary strategies can be integrated synergistically within a micronutrient intervention program. To ensure high cost-effectiveness of a weekly multimicronutrient supplementation program, the following conditions need to be met: the program should be implemented twice a year for 4 months; the program should be simultaneously implemented at the household (micro), community (meso), and national (macro) levels; there should be governmental participation from health and other sectors; and there should be community and private sector participation. Weekly multimicronutrient supplementation programs are cost effective options in urban areas with populations at low risk of energy deficiency and high risk of micronutrient deficiencies.
Code of Federal Regulations, 2014 CFR
2014-01-01
... security for the credit or collateral). The creditor shall exercise reasonable diligence in obtaining such... creditor utilizing the system (including, but not limited to, minimizing bad debt losses and operating... statistical principles and methodology and adjusted as necessary to maintain predictive ability. (2) A...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-04
... calculates the CBOE Gold ETF Volatility Index (``GVZ''), which is based on the VIX methodology applied to options on the SPDR Gold Trust (``GLD''). The current filing would permit $0.50 strike price intervals for...
Standardized Analytical Methods for Environmental Restoration Following Homeland Security Events
USDA-ARS?s Scientific Manuscript database
Methodology was formulated for use in the event of a terrorist attack using a variety of chemical, radioactive, biological, and toxic agents. Standardized analysis procedures were determined for use should these events occur. This publication is annually updated....
ERIC Educational Resources Information Center
Glenn, E. S.; And Others
1977-01-01
Offers an alternative methodology for studying persuasive strategies by examining the persuasive strategies selected by professional persuaders representing those cultures being studied. Analyzes the persuasive styles of United States, Soviet Union and Arab diplomats involved in international negotiations in the Security Council of the United…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
...'' and ``Study Abroad Administrators Security Overseas Seminar''. Methodology: This information will be... business abroad who is eligible, on a space available basis, for either of two courses offered annually or...
Limited protection of macro-aggregate-occluded organic carbon in Siberian steppe soils
NASA Astrophysics Data System (ADS)
Bischoff, Norbert; Mikutta, Robert; Shibistova, Olga; Puzanov, Alexander; Silanteva, Marina; Grebennikova, Anna; Fuß, Roland; Guggenberger, Georg
2017-05-01
Macro-aggregates especially in agricultural steppe soils are supposed to play a vital role for soil organic carbon (OC) stabilization at a decadal timescale. While most research on soil OC stabilization in steppes focused on North American prairie soils of the Great Plains with information mainly provided by short-term incubation experiments, little is known about the agricultural steppes in southwestern Siberia, though they belong to the greatest conversion areas in the world and occupy an area larger than that in the Great Plains. To quantify the proportion of macro-aggregate-protected OC under different land use as function of land use intensity and time since land use change (LUC) from pasture to arable land in Siberian steppe soils, we determined OC mineralization rates of intact (250-2000 µm) and crushed (< 250 µm) macro-aggregates in long-term incubations over 401 days (20 °C; 60 % water holding capacity) along two agricultural chronosequences in the Siberian Kulunda steppe. Additionally, we incubated bulk soil (< 2000 µm) to determine the effect of LUC and subsequent agricultural use on a fast and a slow soil OC pool (labile vs. more stable OC), as derived from fitting exponential-decay models to incubation data. We hypothesized that (i) macro-aggregate crushing leads to increased OC mineralization due to an increasing microbial accessibility of a previously occluded labile macro-aggregate OC fraction, and (ii) bulk soil OC mineralization rates and the size of the fast OC pool are higher in pasture than in arable soils with decreasing bulk soil OC mineralization rates and size of the fast OC pool as land use intensity and time since LUC increase. Against our hypothesis, OC mineralization rates of crushed macro-aggregates were similar to those of intact macro-aggregates under all land use regimes. Macro-aggregate-protected OC was almost absent and accounted for < 1 % of the total macro-aggregate OC content and to a maximum of 8 ± 4 % of mineralized OC. In accordance to our second hypothesis, highest bulk soil OC mineralization rates and sizes of the fast OC pool were determined under pasture, but mineralization rates and pool sizes were unaffected by land use intensity and time since LUC. However, at one chronosequence mean residence times of the fast and slow OC pool tended to decrease with increasing time since establishment of arable use. We conclude that the tillage-induced breakdown of macro-aggregates has not reduced the OC contents in the soils under study. The decline of OC after LUC is probably attributed to the faster soil OC turnover under arable land as compared to pasture at a reduced plant residue input.
A novel approach to quantify cybersecurity for electric power systems
NASA Astrophysics Data System (ADS)
Kaster, Paul R., Jr.
Electric Power grid cybersecurity is a topic gaining increased attention in academia, industry, and government circles, yet a method of quantifying and evaluating a system's security is not yet commonly accepted. In order to be useful, a quantification scheme must be able to accurately reflect the degree to which a system is secure, simply determine the level of security in a system using real-world values, model a wide variety of attacker capabilities, be useful for planning and evaluation, allow a system owner to publish information without compromising the security of the system, and compare relative levels of security between systems. Published attempts at quantifying cybersecurity fail at one or more of these criteria. This document proposes a new method of quantifying cybersecurity that meets those objectives. This dissertation evaluates the current state of cybersecurity research, discusses the criteria mentioned previously, proposes a new quantification scheme, presents an innovative method of modeling cyber attacks, demonstrates that the proposed quantification methodology meets the evaluation criteria, and proposes a line of research for future efforts.
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Multiscale integral analysis of a HT leakage in a fusion nuclear power plant
NASA Astrophysics Data System (ADS)
Velarde, M.; Fradera, J.; Perlado, J. M.; Zamora, I.; Martínez-Saban, E.; Colomer, C.; Briani, P.
2016-05-01
The present work presents an example of the application of an integral methodology based on a multiscale analysis that covers the whole tritium cycle within a nuclear fusion power plant, from a micro scale, analyzing key components where tritium is leaked through permeation, to a macro scale, considering its atmospheric transport. A leakage from the Nuclear Power Plants, (NPP) primary to the secondary side of a heat exchanger (HEX) is considered for the present example. Both primary and secondary loop coolants are assumed to be He. Leakage is placed inside the HEX, leaking tritium in elementary tritium (HT) form to the secondary loop where it permeates through the piping structural material to the exterior. The Heating Ventilation and Air Conditioning (HVAC) system removes the leaked tritium towards the NPP exhaust. The HEX is modelled with system codes and coupled to Computational Fluid Dynamic (CFD) to account for tritium dispersion inside the nuclear power plants buildings and in site environment. Finally, tritium dispersion is calculated with an atmospheric transport code and a dosimetry analysis is carried out. Results show how the implemented methodology is capable of assessing the impact of tritium from the microscale to the atmospheric scale including the dosimetric aspect.
Universal Stochastic Multiscale Image Fusion: An Example Application for Shale Rock.
Gerke, Kirill M; Karsanina, Marina V; Mallants, Dirk
2015-11-02
Spatial data captured with sensors of different resolution would provide a maximum degree of information if the data were to be merged into a single image representing all scales. We develop a general solution for merging multiscale categorical spatial data into a single dataset using stochastic reconstructions with rescaled correlation functions. The versatility of the method is demonstrated by merging three images of shale rock representing macro, micro and nanoscale spatial information on mineral, organic matter and porosity distribution. Merging multiscale images of shale rock is pivotal to quantify more reliably petrophysical properties needed for production optimization and environmental impacts minimization. Images obtained by X-ray microtomography and scanning electron microscopy were fused into a single image with predefined resolution. The methodology is sufficiently generic for implementation of other stochastic reconstruction techniques, any number of scales, any number of material phases, and any number of images for a given scale. The methodology can be further used to assess effective properties of fused porous media images or to compress voluminous spatial datasets for efficient data storage. Practical applications are not limited to petroleum engineering or more broadly geosciences, but will also find their way in material sciences, climatology, and remote sensing.
A Design Pattern for Decentralised Decision Making
Valentini, Gabriele; Fernández-Oto, Cristian; Dorigo, Marco
2015-01-01
The engineering of large-scale decentralised systems requires sound methodologies to guarantee the attainment of the desired macroscopic system-level behaviour given the microscopic individual-level implementation. While a general-purpose methodology is currently out of reach, specific solutions can be given to broad classes of problems by means of well-conceived design patterns. We propose a design pattern for collective decision making grounded on experimental/theoretical studies of the nest-site selection behaviour observed in honeybee swarms (Apis mellifera). The way in which honeybee swarms arrive at consensus is fairly well-understood at the macroscopic level. We provide formal guidelines for the microscopic implementation of collective decisions to quantitatively match the macroscopic predictions. We discuss implementation strategies based on both homogeneous and heterogeneous multiagent systems, and we provide means to deal with spatial and topological factors that have a bearing on the micro-macro link. Finally, we exploit the design pattern in two case studies that showcase the viability of the approach. Besides engineering, such a design pattern can prove useful for a deeper understanding of decision making in natural systems thanks to the inclusion of individual heterogeneities and spatial factors, which are often disregarded in theoretical modelling. PMID:26496359
Universal Stochastic Multiscale Image Fusion: An Example Application for Shale Rock
Gerke, Kirill M.; Karsanina, Marina V.; Mallants, Dirk
2015-01-01
Spatial data captured with sensors of different resolution would provide a maximum degree of information if the data were to be merged into a single image representing all scales. We develop a general solution for merging multiscale categorical spatial data into a single dataset using stochastic reconstructions with rescaled correlation functions. The versatility of the method is demonstrated by merging three images of shale rock representing macro, micro and nanoscale spatial information on mineral, organic matter and porosity distribution. Merging multiscale images of shale rock is pivotal to quantify more reliably petrophysical properties needed for production optimization and environmental impacts minimization. Images obtained by X-ray microtomography and scanning electron microscopy were fused into a single image with predefined resolution. The methodology is sufficiently generic for implementation of other stochastic reconstruction techniques, any number of scales, any number of material phases, and any number of images for a given scale. The methodology can be further used to assess effective properties of fused porous media images or to compress voluminous spatial datasets for efficient data storage. Practical applications are not limited to petroleum engineering or more broadly geosciences, but will also find their way in material sciences, climatology, and remote sensing. PMID:26522938
Finite Macro-Element Mesh Deformation in a Structured Multi-Block Navier-Stokes Code
NASA Technical Reports Server (NTRS)
Bartels, Robert E.
2005-01-01
A mesh deformation scheme is developed for a structured multi-block Navier-Stokes code consisting of two steps. The first step is a finite element solution of either user defined or automatically generated macro-elements. Macro-elements are hexagonal finite elements created from a subset of points from the full mesh. When assembled, the finite element system spans the complete flow domain. Macro-element moduli vary according to the distance to the nearest surface, resulting in extremely stiff elements near a moving surface and very pliable elements away from boundaries. Solution of the finite element system for the imposed boundary deflections generally produces smoothly varying nodal deflections. The manner in which distance to the nearest surface has been found to critically influence the quality of the element deformation. The second step is a transfinite interpolation which distributes the macro-element nodal deflections to the remaining fluid mesh points. The scheme is demonstrated for several two-dimensional applications.
van Baal, Pieter H; Wong, Albert
2012-12-01
Although the effect of time to death (TTD) on health care expenditures (HCE) has been investigated using individual level data, the most profound implications of TTD have been for the forecasting of macro-level HCE. Here we estimate the TTD model using macro-level data from the Netherlands consisting of mortality rates and age- and gender-specific per capita health expenditures for the years 1981-2007. Forecasts for the years 2008-2020 of this macro-level TTD model were compared to forecasts that excluded TTD. Results revealed that the effect of TTD on HCE in our macro model was similar to those found in micro-econometric studies. As the inclusion of TTD pushed growth rate estimates from unidentified causes upwards, however, the two models' forecasts of HCE for the 2008-2020 were similar. We argue that including TTD, if modeled correctly, does not lower forecasts of HCE. Copyright © 2012 Elsevier B.V. All rights reserved.
Blanco, S; Bécares, E
2010-03-01
Biotic indices based on macro-invertebrates and diatoms are frequently used to diagnose ecological quality in watercourses, but few published works have assessed their effectiveness as biomonitors of the concentration of micropollutants. A biological survey performed at 188 sites in the basin of the River Duero in north-western Spain. Nineteen diatom and six macro-invertebrate indices were calculated and compared with the concentrations of 37 different toxicants by means of a correlation analysis. Several chemical variables analysed correlated significantly with at least one biotic index. Sládecek's diatom index and the number of macro-invertebrate families exhibited particularly high correlation coefficients. Methods based on macro-invertebrates performed better in detecting biocides, while diatom indices showed stronger correlations with potentially toxic elements such as heavy metals. All biotic indices, and particularly diatom indices, were especially sensitive to the concentration of fats and oils and trichloroethene. Copyright 2010 Elsevier Ltd. All rights reserved.
Macro-Level Approaches to HIV Prevention Among Ethnic Minority Youth
Prado, Guillermo; Lightfoot, Marguerita; Brown, C. Hendricks
2013-01-01
The HIV epidemic continues to disproportionately affect ethnic minority youth. These disconcerting health disparities indicate that although existing HIV preventive strategies for ethnic minority youth have been efficacious, they have not significantly reduced the impact of the epidemic in this population. Macro-level interventions, such as structural or policy interventions, have the potential to impact the HIV epidemic at a population level, and thus reduce the HIV health disparities that exist among ethnic minority youth and other segments of the U.S. population. This article calls for a paradigm shift to develop, evaluate, and disseminate interventions that target upstream/macro-level factors or that, at a minimum, integrate both a macro and individual level perspective. The article also discusses the challenges in developing and evaluating such interventions. Psychologists and other behavioral scientists can play a critical role in reducing the impact of HIV on ethnic minority youth by integrating macro-level approaches to future HIV prevention strategies. PMID:23688095
Intelligent Learning System using cognitive science theory and artificial intelligence methods
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cristensen, D.L.
1986-01-01
This dissertation is a presentation of a theoretical model of an intelligent Learning System (ILS). The approach view intelligent computer-based instruction on a curricular-level and educational-theory base, instead of the conventional instructional-only level. The ILS is divided into two components: (1) macro-level, curricular; and (2) micro-level (MAIS), instructional. The primary purpose of the ILS macro level is to establish the initial conditions of learning by considering individual difference variables within specification of the curriculum content domain. Second, the ILS macro-level will iteratively update the conditions of learning as the individual student progresses through the given curriculum. The term dynamic ismore » used to describe the expert tutor that establishes and monitors the conditions of instruction between the ILS macro level and the micro level. As the student progresses through the instruction, appropriate information is sent back continuously to the macro level to constantly improve decision making for succeeding conditions of instruction.« less
Beeharry, Yashna Devi; Bekaroo, Girish; Bokhoree, Chandradeo; Phillips, Michael Robert; Jory, Neelakshi
2017-06-30
Being regarded as a problem of global dimensions, marine litter has been a growing concern that affects human beings, wildlife and the economic health of coastal communities to varying degrees. Due to its involvement with human behavior, marine littering has been regarded as a cultural matter encompassing macro and micro level aspects. At the micro or individual level, behavior and behavioral motivation of an individual are driven by perception of that person while at the macro or societal level, aspects including policies and legislations influence behavior. This paper investigates marine littering through the macro-micro level lenses in order to analyze and recommend how anti-littering behavior can be improved and sustained. Using Coleman's model of micro-macro relations, research questions are formulated and investigated through a social survey. Results showed important differences in perceptions among participating groups and to address key issues, potential actions are proposed along with a framework to sustain anti-littering behavior. Copyright © 2017 Elsevier Ltd. All rights reserved.
Effects of changes in micro- and macro-environmental factors on the supply of hospitals services.
Kassaye, W W; Tseng, K C
1990-01-01
The failures, marketing difficulties and financial hardships hospitals have experienced raises a question as to whether they have been responsive to the changes in the micro and macro-environmental factors. To determine how responsive hospitals have been to these changes, we investigate the impact of a number of selected factors on the supply of hospital services during 1972 through 1978. The findings indicate that despite the fact that the economy went through recessionary periods, and the demographic distribution exhibited both a shift and a change in the aging and birth rates of the nation, the changes in hospitals' responsiveness have been less than satisfactory. It appears that hospitals readily respond to the changes in the micro-environment than to the changes in macro-environment. Their response to the changes in the macro-environment. Their response to the changes in the macro-environment may be characterized as an effort to create a higher level of production whose goal is to create a still higher level of needs and wants.
ERIC Educational Resources Information Center
Louis, Andrea; And Others
1997-01-01
An Australian study of 110 mother-infant dyads and 85 mother-toddler dyads in which the mothers were mentally ill evaluated the effectiveness of the Mother and Child Risk Observation (MACRO). Results found that MACRO offers a convenient framework for assessing risk and interpreting the impact of maternal mental illness upon children. (Author/CR)
[A global view of population health in Colombia: role of social macro-determinants].
Idrovo, Alvaro J; Ruiz-Rodríguez, Myriam
2007-09-01
The social environment is an important determinant of population and individual health. However, its impact is often not considered in national health policies and generally its attributes are considered as constants. For this reason, contemporary health policies place greater emphasis on individual risk factors. Colombias position in the world ranking is described with respect to several social macro-determinants of health, previously characterized as components of class/welfare regime model. The exploratory study included all countries with comparable data including the following: (1) economic development [gross domestic product per capita adjusted for purchasing power parity], (2) income inequality [Gini coefficient], (3) social capital corruption perceptions index and generalized trust, and (4) political regime index of freedom. First, correlations between these macro-determinants were estimated, and second, the relationship between them and life expectancy at birth was explored. Finally, the position of Colombia in global context was determined. Important correlations occurred among the macro-determinants. Colombia tended to have intermediate to low positions in the global context in all macro-determinants, with the exception of gross domestic product per capita adjusted for purchasing power parity. The macro-determinant of population health with the highest potential of effecting improvement in health conditions is to modify income inequality.
Macro- and micro-level predictors of age categorization: results from the European Social Survey.
Ayalon, Liat; Doron, Israel; Bodner, Ehud; Inbar, Noit
2014-03-01
This study evaluated macro- and micro-level variables associated with individuals' perception of the ending of youth, the beginning of old age, and the length of the middle age period. The European Social Survey is a biennial multi-country, cross-sectional survey. Our analysis is based on the fourth wave, which included a rotating module on ageism. The source sample consisted of 28 countries and a total of 54,988 respondents. Whereas macro-level variability accounted for 14 % of the variance associated with the perception of the ending of youth, only 5.7 % of the variance associated with the perception of the beginning of old age was accounted for by macro-level variability. Almost 10 % of the variance associated with the perception of the middle age period was associated with macro-level variability. Different patterns of macro- and micro-level correlates emerged for the ending of youth, beginning of old age, and the period of middle age. Overall, results demonstrate that individual differences in the perception of the ending of youth, the beginning of old age, and the length of the middle age period are more pronounced than contextual differences. Results also suggest that individuals' mental maps regarding the timing of these events are not necessarily concordant.
Lee, Young Han
2012-01-01
The objectives are (1) to introduce an easy open-source macro program as connection software and (2) to illustrate the practical usages in radiologic reading environment by simulating the radiologic reading process. The simulation is a set of radiologic reading process to do a practical task in the radiologic reading room. The principal processes are: (1) to view radiologic images on the Picture Archiving and Communicating System (PACS), (2) to connect the HIS/EMR (Hospital Information System/Electronic Medical Record) system, (3) to make an automatic radiologic reporting system, and (4) to record and recall information of interesting cases. This simulation environment was designed by using open-source macro program as connection software. The simulation performed well on the Window-based PACS workstation. Radiologists practiced the steps of the simulation comfortably by utilizing the macro-powered radiologic environment. This macro program could automate several manual cumbersome steps in the radiologic reading process. This program successfully acts as connection software for the PACS software, EMR/HIS, spreadsheet, and other various input devices in the radiologic reading environment. A user-friendly efficient radiologic reading environment could be established by utilizing open-source macro program as connection software. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Prevention of mental and behavioural disorders: implications for policy and practice.
Saxena, Shekhar; Jané-Llopis, Eva; Hosman, Clemens
2006-02-01
There is sufficient evidence indicating the efficacy of interventions in reducing risk factors, increasing protective factors, preventing psychiatric symptoms and new cases of mental disorders. Macro-policy interventions to improve nutrition, housing and education or to reduce economic insecurity have proven to reduce mental health problems. Specific interventions to increase resilience in children and adolescents through parenting and early interventions, and programmes for children at risk for mental disorders such as those who have a mentally ill parent or have suffered parental loss or family disruption, have also shown to increase mental well-being and decrease depressive symptoms and the onset of depressive disorders. Interventions for the adult population, from macro-policy strategies, such as taxation of alcohol products or workplace legislation, to individual support for those with signs of a mental disorder, can reduce mental health problems and associated social and economic burdens. Exercise, social support or community participation have also shown to improve mental health of older populations. Public mental health will benefit from continuing building the evidence base through combining different evaluation methods across low, middle and high income countries. The translation of evidence into policy and practice calls for action at the international, national and local level, including building capacity, advocacy, mainstreaming mental health into public health and other policies and securing infrastructures and sustainability. Mental health professionals have an important role to play in improving the evidence on prevention and promotion in mental health, in engaging relevant stakeholders for developing programmes, and as professional care providers in their practice.
Prevention of mental and behavioural disorders: implications for policy and practice
SAXENA, SHEKHAR; JANÉ-LLOPIS, EVA; HOSMAN, CLEMENS
2006-01-01
There is sufficient evidence indicating the efficacy of interventions in reducing risk factors, increasing protective factors, preventing psychiatric symptoms and new cases of mental disorders. Macro-policy interventions to improve nutrition, housing and education or to reduce economic insecurity have proven to reduce mental health problems. Specific interventions to increase resilience in children and adolescents through parenting and early interventions, and programmes for children at risk for mental disorders such as those who have a mentally ill parent or have suffered parental loss or family disruption, have also shown to increase mental well-being and decrease depressive symptoms and the onset of depressive disorders. Interventions for the adult population, from macro-policy strategies, such as taxation of alcohol products or workplace legislation, to individual support for those with signs of a mental disorder, can reduce mental health problems and associated social and economic burdens. Exercise, social support or community participation have also shown to improve mental health of older populations. Public mental health will benefit from continuing building the evidence base through combining different evaluation methods across low, middle and high income countries. The translation of evidence into policy and practice calls for action at the international, national and local level, including building capacity, advocacy, mainstreaming mental health into public health and other policies and securing infrastructures and sustainability. Mental health professionals have an important role to play in improving the evidence on prevention and promotion in mental health, in engaging relevant stakeholders for developing programmes, and as professional care providers in their practice. PMID:16757984
Patoine, Guillaume; Thakur, Madhav P; Friese, Julia; Nock, Charles; Hönig, Lydia; Haase, Josephine; Scherer-Lorenzen, Michael; Eisenhauer, Nico
2017-11-01
A better understanding of the mechanisms driving litter diversity effects on decomposition is needed to predict how biodiversity losses affect this crucial ecosystem process. In a microcosm study, we investigated the effects of litter functional diversity and two major groups of soil macro-detritivores on the mass loss of tree leaf litter mixtures. Furthermore, we tested the effects of litter trait community means and dissimilarity on litter mass loss for seven traits relevant to decomposition. We expected macro-detritivore effects on litter mass loss to be most pronounced in litter mixtures of high functional diversity. We used 24 leaf mixtures differing in functional diversity, which were composed of litter from four species from a pool of 16 common European tree species. Earthworms, isopods, or a combination of both were added to each litter combination for two months. Litter mass loss was significantly higher in the presence of earthworms than in that of isopods, whereas no synergistic effects of macro-detritivore mixtures were found. The effect of functional diversity of the litter material was highest in the presence of both macro-detritivore groups, supporting the notion that litter diversity effects are most pronounced in the presence of different detritivore species. Species-specific litter mass loss was explained by nutrient content, secondary compound concentration, and structural components. Moreover, dissimilarity in N concentrations increased litter mass loss, probably because detritivores having access to nutritionally diverse food sources. Furthermore, strong competition between the two macro-detritivores for soil surface litter resulted in a decrease of survival of both macro-detritivores. These results show that the effects of litter functional diversity on decomposition are contingent upon the macro-detritivore community and composition. We conclude that the temporal dynamics of litter trait diversity effects and their interaction with detritivore diversity are key to advancing our understanding of litter mass loss in nature.
Patoine, Guillaume; Thakur, Madhav P.; Friese, Julia; Nock, Charles; Hönig, Lydia; Haase, Josephine; Scherer-Lorenzen, Michael; Eisenhauer, Nico
2017-01-01
A better understanding of the mechanisms driving litter diversity effects on decomposition is needed to predict how biodiversity losses affect this crucial ecosystem process. In a microcosm study, we investigated the effects of litter functional diversity and two major groups of soil macro-detritivores on the mass loss of tree leaf litter mixtures. Furthermore, we tested the effects of litter trait community means and dissimilarity on litter mass loss for seven traits relevant to decomposition. We expected macro-detritivore effects on litter mass loss to be most pronounced in litter mixtures of high functional diversity. We used 24 leaf mixtures differing in functional diversity, which were composed of litter from four species from a pool of 16 common European tree species. Earthworms, isopods, or a combination of both were added to each litter combination for two months. Litter mass loss was significantly higher in the presence of earthworms than in that of isopods, whereas no synergistic effects of macro-detritivore mixtures were found. The effect of functional diversity of the litter material was highest in the presence of both macro-detritivore groups, supporting the notion that litter diversity effects are most pronounced in the presence of different detritivore species. Species-specific litter mass loss was explained by nutrient content, secondary compound concentration, and structural components. Moreover, dissimilarity in N concentrations increased litter mass loss, probably because detritivores having access to nutritionally diverse food sources. Furthermore, strong competition between the two macro-detritivores for soil surface litter resulted in a decrease of survival of both macro-detritivores. These results show that the effects of litter functional diversity on decomposition are contingent upon the macro-detritivore community and composition. We conclude that the temporal dynamics of litter trait diversity effects and their interaction with detritivore diversity are key to advancing our understanding of litter mass loss in nature. PMID:29180828
A structuration framework for bridging the macro-micro divide in health-care governance.
Bodolica, Virginia; Spraggon, Martin; Tofan, Gabriela
2016-08-01
Extant studies demonstrate that macro (hierarchical) and micro (relational) governance initiatives in health-care settings continue to be developed in isolation rather than interactively. Government-driven hierarchical governance endeavours that guide health-care reforms and medical practice are disconnected from micro-level physician-patient interactions being unable to account for patient preferences in the macro-level policymaking. We undertake a review of the recent literature to couch our argument for a unified governance framework for bridging the macro-micro divide in medical contexts. Adopting an interdisciplinary approach to health-care delivery, we maintain that the (strong) structuration theory provides a fruitful opportunity for narrowing the gap between hierarchical and relational governance. Emphasizing the coexistence of institutional structures and human agency, the (strong) structuration theory elucidates how macro and micro governance devices shape each other's structure via mutually reinforcing cycles of influence. Micro-level encounters between patients and physicians give rise to social structures that constitute the constraining and enabling forces through which macro-level health-care infrastructures are altered and reproduced over time. Permitting to illustrate how patients' agency can effectively emerge from complex networks of clinical trajectories, the advanced structuration framework for macro-micro governance integration avoids the extremes of paternalism and autonomy through a balanced consideration of professional judgement and patient preferences. The macro-micro integration of governance efforts is a critical issue in both high-income states, where medical institutions attempt to deploy substantial realignment efforts, and developing nations, which are lagging behind due to leadership weaknesses and lower levels of governmental investment. A key priority for regulators is the identification of relevant systems to support this holistic governance by providing clinicians with needed resources for focusing on patient advocacy and installing enabling mechanisms for incorporating patients' inputs in health-care reforms and policymaking. © 2015 John Wiley & Sons Ltd.
Risk assessment of integrated electronic health records.
Bjornsson, Bjarni Thor; Sigurdardottir, Gudlaug; Stefansson, Stefan Orri
2010-01-01
The paper describes the security concerns related to Electronic Health Records (EHR) both in registration of data and integration of systems. A description of the current state of EHR systems in Iceland is provided, along with the Ministry of Health's future vision and plans. New legislation provides the opportunity for increased integration of EHRs and further collaboration between institutions. Integration of systems, along with greater availability and access to EHR data, requires increased security awareness since additional risks are introduced. The paper describes the core principles of information security as it applies to EHR systems and data. The concepts of confidentiality, integrity, availability, accountability and traceability are introduced and described. The paper discusses the legal requirements and importance of performing risk assessment for EHR data. Risk assessment methodology according to the ISO/IEC 27001 information security standard is described with examples on how it is applied to EHR systems.
Bialas, Andrzej
2010-01-01
The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method. PMID:22399888
MEMS reliability: coming of age
NASA Astrophysics Data System (ADS)
Douglass, Michael R.
2008-02-01
In today's high-volume semiconductor world, one could easily take reliability for granted. As the MOEMS/MEMS industry continues to establish itself as a viable alternative to conventional manufacturing in the macro world, reliability can be of high concern. Currently, there are several emerging market opportunities in which MOEMS/MEMS is gaining a foothold. Markets such as mobile media, consumer electronics, biomedical devices, and homeland security are all showing great interest in microfabricated products. At the same time, these markets are among the most demanding when it comes to reliability assurance. To be successful, each company developing a MOEMS/MEMS device must consider reliability on an equal footing with cost, performance and manufacturability. What can this maturing industry learn from the successful development of DLP technology, air bag accelerometers and inkjet printheads? This paper discusses some basic reliability principles which any MOEMS/MEMS device development must use. Examples from the commercially successful and highly reliable Digital Micromirror Device complement the discussion.
Pre-Capture Privacy for Small Vision Sensors.
Pittaluga, Francesco; Koppal, Sanjeev Jagannatha
2017-11-01
The next wave of micro and nano devices will create a world with trillions of small networked cameras. This will lead to increased concerns about privacy and security. Most privacy preserving algorithms for computer vision are applied after image/video data has been captured. We propose to use privacy preserving optics that filter or block sensitive information directly from the incident light-field before sensor measurements are made, adding a new layer of privacy. In addition to balancing the privacy and utility of the captured data, we address trade-offs unique to miniature vision sensors, such as achieving high-quality field-of-view and resolution within the constraints of mass and volume. Our privacy preserving optics enable applications such as depth sensing, full-body motion tracking, people counting, blob detection and privacy preserving face recognition. While we demonstrate applications on macro-scale devices (smartphones, webcams, etc.) our theory has impact for smaller devices.
Winterton, Rachel
2016-01-01
This qualitative study critically explores the barriers experienced by diverse rural community stakeholders in facilitating environments that enable age-friendly social participation. Twenty-six semi-structured interviews were conducted across two rural Australian communities with stakeholders from local government, health, social care, and community organizations. Findings identify that rural community stakeholders face significant difficulties in securing resources for groups and activities catering to older adults, which subsequently impacts their capacity to undertake outreach to older adults. However, in discussing these issues, questions were raised in relation to whose responsibility it is to provide resources for community groups and organizations providing social initiatives and whose responsibility it is to engage isolated seniors. These findings provide a much-needed critical perspective on current age-friendly research by acknowledging the responsibilities of various macro-level social structures-different community-level organizations, local government, and policy in fostering environments to enable participation of diverse rural older adults.
NASA Astrophysics Data System (ADS)
Kaiser, Michael; Grunwald, Dennis; Koch, Heinz-Josef; Rauber, Rolf; Ludwig, Bernard
2017-04-01
The formation of aggregates is of large importance for the structure and the storage of organic matter (OM) in soil. Although positive effects of organic soil additives on the formation of macro-aggregates (> 250 µm) have been reported, the influence of biochar especially applied in combination with other organic amendments remains unclear. Furthermore, studies on the effect of varying soil moisture conditions in form of drying-rewetting cycles on soil aggregate dynamics in the presence of biochar are almost missing. The objectives of this study were to analyze the effects of biochar and slurry applied to the soil individually or in combination on the formation of macro-aggregates under constant and under varying moisture conditions. We sampled four silty loam soils, carefully crushed the soil macro-aggregates, and incubated the soil at 15 °C for 60 days with the following additions: (i) none (control), (ii) biochar (12 % of dry soil mass), (iii) slurry (150 kg N ha-1), (iv) biochar (6 %) + slurry (75 kg N ha-1), (v) biochar (12 %) + slurry (75 kg N ha-1), (vi) biochar (6 %) + slurry (150 kg N ha-1) and (vii) biochar (12 %) + slurry (150 kg N ha-1). The samples were further subdivided into two groups that were incubated under conditions of constant soil moisture and of three drying-rewetting cycles. The CO2 fluxes were continuously measured during the incubation period and the samples were analyzed for microbial biomass C, macro-aggregate yields and macro-aggregate-associated C after finishing the experiment. We found the application of biochar to result in lower macro-aggregate yields with or without slurry compared to the control or the individual slurry application. In contrast, similar or higher C contents in the macro-aggregate fraction of the biochar treatments as compared to the control or slurry treatments were found indicating an occlusion of biochar in macro-aggregates. Due to the sorption characteristics of biochar, we assume the aggregate formation to be partially abiotic with direct interactions between biochar, (adsorbed) slurry, and the mineral phase of the soil. Therefore, in the presence of slurry, a prolonged period of microbial processing does not seem to be necessary to render the biochar suitable to form aggregates. Drying and rewetting of the samples resulted in significantly lower aggregate yields especially for the biochar/slurry mixtures. The drying of slurry as thought to be the most important macro-aggregate binding agent in these treatments might irreversibly disrupt large amounts of the macro-aggregates formed. Additionally, the general lower microbial biomass C and CO2 emissions for the samples experiencing drying-rewetting cycles compared to the constantly moist soils point toward less microbial activity under varying moisture conditions. This might have led to less microbial derived aggregate binding agents contributing to the lower aggregate yields found for the samples from the drying-rewetting treatments. Beside the amount and type of binding agents derived from organic soil additives, the formation and stability of soil macro-aggregate seem also to be controlled by climatically controlled soil moisture conditions.
2016-07-01
Common Risk Model for Dams ( CRM -D) Methodology,” for the Director, Cost Assessment and Program Evaluation, Office of Secretary of Defense and the...for Dams ( CRM -D), developed by the U.S. Army Corps of Engineers (USACE) in collaboration with the Institute for Defense Analyses (IDA) and the U.S...and cyber security risks across a portfolio of dams, and informing decisions on how to mitigate those risks. The CRM -D can effectively quantify the
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
2010-03-01
information /etc/group, passwd ,gshadow,shadow,/security/opasswd 16 User A attempts to access User B directory 17 User A attempts to access User B file w/o...configuration Handled by audit rules for root actions Audit user write attempts to system files -w /etc/group –p wxa -w /etc/ passwd –p wxa -w /etc/gshadow –p...information (/etc/group, /etc/ passwd , /etc/gshadow, /etc/shadow, /etc/sudoers, /etc/security/opasswd) Procedure: 1. User2 logs into the system
Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security
NASA Astrophysics Data System (ADS)
Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver
This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.
Individualized Human CAD Models: Anthropmetric Morphing and Body Tissue Layering
2014-07-31
Part Flow Chart of the Interaction among VBA Macros, Excel® Spreadsheet, and SolidWorks Front View of the Male and Female Soldier CAD Model...yellow highlighting. The spreadsheet is linked to the CAD model by macros created with the Visual Basic for Application ( VBA ) editor in Microsoft Excel...basically three working parts to the anthropometric morphing that are all interconnected ( VBA macros, Excel spreadsheet, and SolidWorks). The flow
Learning to Solve Problems by Searching for Macro-Operators
1983-07-01
executing generalized robot plans. Aritificial Intelligence 3:25 1-288, 1972. [Frey 821 Frey, Alexander Ii. Jr., and David Singmaster. Handbook of Cubik...and that searching for macros may be a useful general learning paradigm. 1.1. Introduction One view of die die field of artificial intelligence is that... intelligence literature [Schofield 67, Gaschnig 79, Ericsson 761 and provides one of the simplest examples of the operation of the Macro Problem Solver. It
Schneider, Barbara St Pierre; Nicholas, Jennifer; Kurrus, Jeffrey E
2013-01-01
To compare the methodologic quality and study/report characteristics between quantitative clinical nursing and nursing education research articles. The methodologic quality of quantitative nursing education research needs to advance to a higher level. Clinical research can provide guidance for nursing education to reach this level. One hundred quantitative clinical research articles from-high impact journals published in 2007 and 37 education research articles from high impact journals published in 2006 to 2007 were chosen for analysis. Clinical articles had significantly higher quality scores than education articles in three domains: number of institutions studied, type of data, and outcomes. The findings indicate three ways in which nursing education researchers can strengthen the methodologic quality of their quantitative research. With this approach, greater funding may be secured for advancing the science of nursing education.
Dunlap, Eloise; Johnson, Bruce D; Kotarba, Joseph A; Fackler, Jennifer L
2010-01-01
This article is an empirical examination of the ways in which macro-level social forces have had micro-level consequences in the New Orleans drug market. The article illustrates a clear connection between poverty and entrance into the drug market, as mitigated by race, lack of societal opportunity, lack of social capital, distressed families, and closed neighborhoods. Specifically, the research illustrates the mechanisms by which macro-level social forces intersect to legitimize drug dealing as a viable alternative method of acquiring money and social capital. These intersecting macro-level social forces, such as poverty, race, family structure, and neighborhood characteristics, ultimately constrain the life chances of those living in the inner city irrespective of personal traits, individual motivations, or private achievements.
PETRO.CALC.PLOT, Microsoft Excel macros to aid petrologic interpretation
Sidder, G.B.
1994-01-01
PETRO.CALC.PLOT is a package of macros which normalizes whole-rock oxide data to 100%, calculates the cation percentages and molecular proportions used for normative mineral calculations, computes the apices for ternary diagrams, determines sums and ratios of specific elements of petrologic interest, and plots 33 X-Y graphs and five ternary diagrams. PETRO.CALC.PLOT also may be used to create other diagrams as desired by the user. The macros run in Microsoft Excel 3.0 and 4.0 for Macintosh computers and in Microsoft Excel 3.0 and 4.0 for Windows. Macros provided in PETRO.CALC.PLOT minimize repetition and time required to recalculate and plot whole-rock oxide data for petrologic analysis. ?? 1994.
Zarei, Javad; Sadoughi, Farahnaz
2016-01-01
In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.
NASA Astrophysics Data System (ADS)
Pierce, S. A.; Wagner, K.; Schwartz, S.; Gentle, J. N., Jr.
2016-12-01
Critical water resources face the effects of historic drought, increased demand, and potential contamination, the need has never been greater to develop resources to effectively communicate conservation and protection across a broad audience and geographical area. The Watermark application and macro-analysis methodology merges topical analysis of context rich corpus from policy texts with multi-attributed solution sets from integrated models of water resource and other subsystems, such as mineral, food, energy, or environmental systems to construct a scalable, robust, and reproducible approach for identifying links between policy and science knowledge bases. The Watermark application is an open-source, interactive workspace to support science-based visualization and decision making. Designed with generalization in mind, Watermark is a flexible platform that allows for data analysis and inclusion of large datasets with an interactive front-end capable of connecting with other applications as well as advanced computing resources. In addition, the Watermark analysis methodology offers functionality that streamlines communication with non-technical users for policy, education, or engagement with groups around scientific topics of societal relevance. The technology stack for Watermark was selected with the goal of creating a robust and dynamic modular codebase that can be adjusted to fit many use cases and scale to support usage loads that range between simple data display to complex scientific simulation-based modelling and analytics. The methodology uses to topical analysis and simulation-optimization to systematically analyze the policy and management realities of resource systems and explicitly connect the social and problem contexts with science-based and engineering knowledge from models. A case example demonstrates use in a complex groundwater resources management study highlighting multi-criteria spatial decision making and uncertainty comparisons.
Outevsky, David; Martin, Blake Cw
2015-12-01
Dancesport, the competitive branch of ballroom dancing, places high physiological and psychological demands on its practitioners, but pedagogical resources in these areas for this dance form are limited. Dancesport competitors could benefit from strategies used in other aesthetic sports. In this review, we identify conditioning methodologies from gymnastics, figure skating, and contemporary, modern, and ballet dance forms that could have relevance and suitability for dancesport training, and propose several strategies for inclusion in the current dancesport curriculum. We reviewed articles derived from Google Scholar, PubMed, ScienceDirect, Taylor & Francis Online, and Web of Science search engines and databases, with publication dates from 1979 to 2013. The keywords included MeSH terms: dancing, gymnastics, physiology, energy metabolism, physical endurance, and range of motion. Out of 47 papers examined, 41 papers met the inclusion criteria (validity of scientific methods, topic relevance, transferability to dancesport, publication date). Quality and validity of the data were assessed by examining the methodologies in each study and comparing studies on similar populations as well as across time using the PRISMA 2009 checklist and flowchart. The relevant research suggests that macro-cycle periodization planning, aerobic and anaerobic conditioning, range of motion and muscular endurance training, and performance psychology methods have potential for adaptation for dancesport training. Dancesport coaches may help their students fulfill their ambitions as competitive athletes and dance artists by adapting the relevant performance enhancement strategies from gymnastics, figure skating, and concert dance forms presented in this paper.
Current trends in protein crystallization.
Gavira, José A
2016-07-15
Proteins belong to the most complex colloidal system in terms of their physicochemical properties, size and conformational-flexibility. This complexity contributes to their great sensitivity to any external change and dictate the uncertainty of crystallization. The need of 3D models to understand their functionality and interaction mechanisms with other neighbouring (macro)molecules has driven the tremendous effort put into the field of crystallography that has also permeated other fields trying to shed some light into reluctant-to-crystallize proteins. This review is aimed at revising protein crystallization from a regular-laboratory point of view. It is also devoted to highlight the latest developments and achievements to produce, identify and deliver high-quality protein crystals for XFEL, Micro-ED or neutron diffraction. The low likelihood of protein crystallization is rationalized by considering the intrinsic polypeptide nature (folded state, surface charge, etc) followed by a description of the standard crystallization methods (batch, vapour diffusion and counter-diffusion), including high throughput advances. Other methodologies aimed at determining protein features in solution (NMR, SAS, DLS) or to gather structural information from single particles such as Cryo-EM are also discussed. Finally, current approaches showing the convergence of different structural biology techniques and the cross-methodologies adaptation to tackle the most difficult problems, are presented. Current advances in biomacromolecules crystallization, from nano crystals for XFEL and Micro-ED to large crystals for neutron diffraction, are covered with special emphasis in methodologies applicable at laboratory scale. Copyright © 2015 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Tangen, Steven Anthony
Due to the complexities of modern military operations and the technologies employed on today's military systems, acquisition costs and development times are becoming increasingly large. Meanwhile, the transformation of the global security environment is driving the U.S. military's own transformation. In order to meet the required capabilities of the next generation without buying prohibitively costly new systems, it is necessary for the military to evolve across the spectrum of doctrine, organization, training, materiel, leadership and education, personnel, and facilities (DOTMLPF). However, the methods for analyzing DOTMLPF approaches within the early acquisition phase of a capability-based assessment (CBA) are not as well established as the traditional technology design techniques. This makes it difficult for decision makers to decide if investments should be made in materiel or non-materiel solutions. This research develops an agent-based constructive simulation to quantitatively assess doctrine alongside materiel approaches. Additionally, life-cycle cost techniques are provided to enable a cost-effectiveness trade. These techniques are wrapped together in a decision-making environment that brings crucial information forward so informed and appropriate acquisition choices can be made. The methodology is tested on a future unmanned aerial vehicle design problem. Through the implementation of this quantitative methodology on the proof-of-concept study, it is shown that doctrinal changes including fleet composition, asset allocation, and patrol pattern were capable of dramatic improvements in system effectiveness at a much lower cost than the incorporation of candidate technologies. Additionally, this methodology was able to quantify the precise nature of strong doctrine-doctrine and doctrine-technology interactions which have been observed only qualitatively throughout military history. This dissertation outlines the methodology and demonstrates how potential approaches to capability-gaps can be identified with respect to effectiveness, cost, and time. When implemented, this methodology offers the opportunity to achieve system capabilities in a new way, improve the design of acquisition programs, and field the right combination of ways and means to address future challenges to national security.
[Bibliometric analysis of publications by the Mexican Social Security Institute staff].
Valdez-Martínez, E; Garduño-Espinosa, J; Gómez-Delgado, A; Dante Amato-Martínez, J; Morales-Mori, L; Blanco-Favela, F; Muñoz-Hernández, O
2000-01-01
To describe and analyze the general characteristics and methodology of indexed publications by the health staff of the Mexican Social Security Institute in 1997. Original articles were evaluated. The primary sources included Index Medicus, Current Contents and the Mexican National Council of Science and Technology (CONACYT) index. The following information was gathered for each article: affiliation and chief activity of the first author; impact factor of the journal; research type; field of study; topic of study, and methodological conduction. This latter point included congruence between design and objective, reproducibility of methods, applicability of the analysis, and pertinence of the conclusions. A total of 300 original articles was published of which 212 (71%) were available for the present study: full-time investigators (FTI) generated 109 articles and investigators with clinical activities (CAI) wrote 103 articles. The median impact factor of the journals in which FTI published was 1.337 (0.341 to 37.297) and for CAI publications, 0.707 (0.400 to 4.237). Biomedical research predominated in the first group (41%) and clinical investigation in the second (66%). Statistically significant differences were identified for the methodological conduction between groups of investigators. Descriptive studies and publications in journals without impact factor predominated. The FTI group had the highest bibliographic production of original articles in indexed journals with an impact factor.
Barriers to and facilitators of the acceptance process for individuals with serious mental illness.
Mizock, Lauren; Russinova, Zlatka; Millner, Uma Chandrika
2014-09-01
The process of acceptance of mental illness is a central component of recovery and has been linked to functioning, illness management, and quality of life. A number of barriers and facilitators have been theorized as impacting this process. This study was conducted with 30 participants with serious mental illness (a major psychiatric disorder with impairment in multiple areas of functioning) to elicit the barriers to and facilitators of the acceptance of mental illness. Grounded theory methodology was utilized to analyze the 30 semistructured interviews. Results revealed barriers to and facilitators of acceptance of mental illness at the micro level (cognitive, emotional, behavioral, identity-related), meso level (relational), and macro level (cultural, systemic). Clinical and research implications are discussed with regard to facilitating acceptance of mental illness. © The Author(s) 2014.
A dynamic social systems model for considering structural factors in HIV prevention and detection
Latkin, Carl; Weeks, Margaret; Glasman, Laura; Galletly, Carol; Albarracin, Dolores
2010-01-01
We present a model for HIV-related behaviors that emphasizes the dynamic and social nature of the structural factors that influence HIV prevention and detection. Key structural dimensions of the model include resources, science and technology, formal social control, informal social influences and control, social interconnectedness, and settings. These six dimensions can be conceptualized on macro, meso, and micro levels. Given the inherent complexity of structural factors and their interrelatedness, HIV prevention interventions may focus on different levels and dimensions. We employ a systems perspective to describe the interconnected and dynamic processes of change among social systems and their components. The topics of HIV testing and safer injection facilities are analyzed using this structural framework. Finally, we discuss methodological issues in the development and evaluation of structural interventions for HIV prevention and detection. PMID:20838871
The problem is education not ``special education''
NASA Astrophysics Data System (ADS)
Fellner, Gene
2015-12-01
In his article, Urban special education policy and the lived experience of stigma in a high school science classroom, Chris Hale persuasively argues that the Individuals with Disabilities Education Act and subsequent special education policies have largely failed to serve special education students who are stigmatized by their deficit classification. Though classified students may be doubly stigmatized, research suggests that students of color who live in economically stressed communities are also subject to systemic educational policies that produce stigma; special education should be understood within the larger context of educational policy in the inner city. Though we cannot immediately dismantle the macro level structures that nurture stigma, I suggest pedagogies based on facilitating phenomenological awareness enacted through individual-collectively based methodologies to challenge the stigma that classified as well as non-classified students in the inner city often carry with them.
Reusable Space Vehicle Ground Operations Baseline Conceptual Model
2004-03-01
Micro .........................................................................129 Figure B-91. Lower Forward Fuselage Macro...129 Figure B-92. Lower Forward Fuselage Micro ...Fuselage Micro ................................................................130 Figure B-95. Lower Wing Macro
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-26
... Introductions. 2. Member Discussion Methodology Options for Identifying Emerging Technologies. 3. Public... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC...
Cultural Identity and Regional Security in the Western Balkans
2013-06-13
possible. Case Study as Qualitative Approach Creswell and other experts of the social research methodology suggest at least five forms of...descriptive research approach, and the main method is case study of the Western Balkans. This thesis utilizes the analytical frameworks of securitization
TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks
NASA Astrophysics Data System (ADS)
Wang, Zhiliang; Yin, Xia; Xiang, Yang; Zhu, Ruiping; Gao, Shirui; Wu, Xin; Liu, Shijian; Gao, Song; Zhou, Li; Li, Peng
Mobile broadcast service is one of the emerging most important new services in 3G networks. To better operate and manage mobile broadcast services, mobile broadcast business management system (MBBMS) should be designed and developed. Such a system, with its distributed nature, complicated XML data and security mechanism, faces many challenges in testing technology. In this paper, we study the conformance testing methodology of MBBMS, and design and implement a MBBMS protocol conformance testing tool based on TTCN-3, a standardized test description language that can be used in black-box testing of reactive and distributed system. In this methodology and testing tool, we present a semi-automatic XML test data generation method of TTCN-3 test suite and use HMSC model to help the design of test suite. In addition, we also propose an integrated testing method for hierarchical MBBMS security architecture. This testing tool has been used in industrial level’s testing.
NASA Astrophysics Data System (ADS)
Hussein, Rafid M.; Chandrashekhara, K.
2017-11-01
A multi-scale modeling approach is presented to simulate and validate thermo-oxidation shrinkage and cracking damage of a high temperature polymer composite. The multi-scale approach investigates coupled transient diffusion-reaction and static structural at macro- to micro-scale. The micro-scale shrinkage deformation and cracking damage are simulated and validated using 2D and 3D simulations. Localized shrinkage displacement boundary conditions for the micro-scale simulations are determined from the respective meso- and macro-scale simulations, conducted for a cross-ply laminate. The meso-scale geometrical domain and the micro-scale geometry and mesh are developed using the object oriented finite element (OOF). The macro-scale shrinkage and weight loss are measured using unidirectional coupons and used to build the macro-shrinkage model. The cross-ply coupons are used to validate the macro-shrinkage model by the shrinkage profiles acquired using scanning electron images at the cracked surface. The macro-shrinkage model deformation shows a discrepancy when the micro-scale image-based cracking is computed. The local maximum shrinkage strain is assumed to be 13 times the maximum macro-shrinkage strain of 2.5 × 10-5, upon which the discrepancy is minimized. The microcrack damage of the composite is modeled using a static elastic analysis with extended finite element and cohesive surfaces by considering the modulus spatial evolution. The 3D shrinkage displacements are fed to the model using node-wise boundary/domain conditions of the respective oxidized region. Microcrack simulation results: length, meander, and opening are closely matched to the crack in the area of interest for the scanning electron images.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Siranosian, Antranik Antonio; Schembri, Philip Edward; Luscher, Darby Jon
The Los Alamos National Laboratory's Weapon Systems Engineering division's Advanced Engineering Analysis group employs material constitutive models of composites for use in simulations of components and assemblies of interest. Experimental characterization, modeling and prediction of the macro-scale (i.e. continuum) behaviors of these composite materials is generally difficult because they exhibit nonlinear behaviors on the meso- (e.g. micro-) and macro-scales. Furthermore, it can be difficult to measure and model the mechanical responses of the individual constituents and constituent interactions in the composites of interest. Current efforts to model such composite materials rely on semi-empirical models in which meso-scale properties are inferredmore » from continuum level testing and modeling. The proposed approach involves removing the difficulties of interrogating and characterizing micro-scale behaviors by scaling-up the problem to work with macro-scale composites, with the intention of developing testing and modeling capabilities that will be applicable to the mesoscale. This approach assumes that the physical mechanisms governing the responses of the composites on the meso-scale are reproducible on the macro-scale. Working on the macro-scale simplifies the quantification of composite constituents and constituent interactions so that efforts can be focused on developing material models and the testing techniques needed for calibration and validation. Other benefits to working with macro-scale composites include the ability to engineer and manufacture—potentially using additive manufacturing techniques—composites that will support the application of advanced measurement techniques such as digital volume correlation and three-dimensional computed tomography imaging, which would aid in observing and quantifying complex behaviors that are exhibited in the macro-scale composites of interest. Ultimately, the goal of this new approach is to develop a meso-scale composite modeling framework, applicable to many composite materials, and the corresponding macroscale testing and test data interrogation techniques to support model calibration.« less
The BBN Knowledge Acquisition Project
1988-09-01
Optation 17 S . Large-Scale Revisions of Knowledge Bases 19 5.1 The Macro and Structure Editor 19 5.2 Developing Macro Editing Procedre 20 5.2.1 Macro...consistency checking foreach style of representaton easier and mote efficient, so that knowledge engineers and subject matter expert s can work together to... s ~Ta OIM-iJC ~Va Coetnin: MILECSXCT 8.1.3.1 Local Comumand Menus Anytime ICREM ais~laying a view of a particular kind of knowledge , the State Winsdow
MacroH2A1 associates with nuclear lamina and maintains chromatin architecture in mouse liver cells.
Fu, Yuhua; Lv, Pin; Yan, Guoquan; Fan, Hui; Cheng, Lu; Zhang, Feng; Dang, Yongjun; Wu, Hao; Wen, Bo
2015-11-25
In the interphase nucleus, chromatin is organized into three-dimensional conformation to coordinate genome functions. The lamina-chromatin association is important to facilitate higher-order chromatin in mammalian cells, but its biological significances and molecular mechanisms remain poorly understood. One obstacle is that the list of lamina-associated proteins remains limited, presumably due to the inherent insolubility of lamina proteins. In this report, we identified 182 proteins associated with lamin B1 (a constitutive component of lamina) in mouse hepatocytes, by adopting virus-based proximity-dependent biotin identification. These proteins are functionally related to biological processes such as chromatin organization. As an example, we validated the association between lamin B1 and core histone macroH2A1, a histone associated with repressive chromatin. Furthermore, we mapped Lamina-associated domains (LADs) in mouse liver cells and found that boundaries of LADs are enriched for macroH2A. More interestingly, knocking-down of macroH2A1 resulted in the release of heterochromatin foci marked by histone lysine 9 trimethylation (H3K9me3) and the decondensation of global chromatin structure. However, down-regulation of lamin B1 led to redistribution of macroH2A1. Taken together, our data indicated that macroH2A1 is associated with lamina and is required to maintain chromatin architecture in mouse liver cells.
Sugimoto-Matsuda, Jeanelle J; Braun, Kathryn L
2014-04-01
Youth violence remains a serious public health issue nationally and internationally. The social ecological model has been recommended as a framework to design youth violence prevention initiatives, requiring interventions at the micro-, meso-, exo-, and macro-levels. However, documentation of interventions at the macro-level, particularly those that address policy issues, is limited. This study examines a recommendation in the literature that formalized collaborations play a vital role in stimulating macro-level policy change. The purpose of this systematic literature review is to examine existing youth violence prevention collaborations and evaluate their policy-related outcomes. The search found 23 unique collaborations focused on youth violence prevention. These were organized into three groups based on the "catalyst" for action for the collaboration-internal (momentum began within the community), external (sparked by an external agency), or policy (mandated by law). Findings suggest that internally catalyzed collaborations were most successful at changing laws to address youth violence, while both internally and externally catalyzed collaborations successfully attained policy change at the organizational level. A conceptual model is proposed, describing a potential pathway for achieving macro-level change via collaboration. Recommendations for future research and practice are suggested, including expansion of this study to capture additional collaborations, investigation of macro-level changes with a primary prevention focus, and improvement of evaluation, dissemination, and translation of macro-level initiatives.
Braun, Kathryn L.
2015-01-01
Youth violence remains a serious public health issue nationally and internationally. The social ecological model has been recommended as a framework to design youth violence prevention initiatives, requiring interventions at the micro-, meso-, exo-, and macro-levels. However, documentation of interventions at the macro-level, particularly those that address policy issues, is limited. This study examines a recommendation in the literature that formalized collaborations play a vital role in stimulating macro-level policy change. The purpose of this systematic literature review is to examine existing youth violence prevention collaborations and evaluate their policy-related outcomes. The search found 23 unique collaborations focused on youth violence prevention. These were organized into three groups based on the “catalyst” for action for the collaboration—internal (momentum began with-in the community), external (sparked by an external agency), or policy (mandated by law). Findings suggest that internally catalyzed collaborations were most successful at changing laws to address youth violence, while both internally and externally catalyzed collaborations successfully attained policy change at the organizational level. A conceptual model is proposed, describing a potential pathway for achieving macro-level change via collaboration. Recommendations for future research and practice are suggested, including expansion of this study to capture additional collaborations, investigation of macro-level changes with a primary prevention focus, and improvement of evaluation, dissemination, and translation of macro-level initiatives. PMID:23430580
International perspectives on sexual harassment of college students: the sounds of silence.
Paludi, Michele; Nydegger, Rudy; Desouza, Eros; Nydegger, Liesl; Dicker, Kelsey Allen
2006-11-01
The incidence, psychological dimensions, reporting, and impact of sexual harassment of college students throughout the world are reviewed. Special attention is paid to methodological constraints in conducting cross-cultural research in sexual harassment, including difficulty in securing research participants, different methodologies to collect incidence data, use of retrospective data, and varying, definitions of sexual harassment. Recommendations for implementing intervention programs are offered. The strategies suggested deal with the social causes that maintain the harassment, including renegotiating the balance of power between men and women.
Sen. Levin, Carl [D-MI
2011-04-14
Senate - 04/14/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
National assessment of geologic carbon dioxide storage resources: methodology implementation
Blondes, Madalyn S.; Brennan, Sean T.; Merrill, Matthew D.; Buursink, Marc L.; Warwick, Peter D.; Cahan, Steven M.; Corum, Margo D.; Cook, Troy A.; Craddock, William H.; DeVera, Christina A.; Drake II, Ronald M.; Drew, Lawrence J.; Freeman, P.A.; Lohr, Celeste D.; Olea, Ricardo A.; Roberts-Ashby, Tina L.; Slucher, Ernie R.; Varela, Brian A.
2013-01-01
In response to the 2007 Energy Independence and Security Act, the U.S. Geological Survey (USGS) conducted a national assessment of potential geologic storage resources for carbon dioxide (CO2). Storage of CO2 in subsurface saline formations is one important method to reduce greenhouse gas emissions and curb global climate change. This report provides updates and implementation details of the assessment methodology of Brennan and others (2010, http://pubs.usgs.gov/of/2010/1127/) and describes the probabilistic model used to calculate potential storage resources in subsurface saline formations.
Can Regulatory Bodies Expect Efficient Help from Formal Methods?
NASA Technical Reports Server (NTRS)
Lopez Ruiz, Eduardo R.; Lemoine, Michel
2010-01-01
In the context of EDEMOI - a French national project that proposed the use of semiformal and formal methods to infer the consistency and robustness of aeronautical regulations through the analysis of faithfully representative models- a methodology had been suggested (and applied) to different (safety and security-related) aeronautical regulations. This paper summarizes the preliminary results of this experience by stating which were the methodology s expected benefits, from a scientific point of view, and which are its useful benefits, from a regulatory body s point of view.
76 FR 3451 - Wage Methodology for the Temporary Non-agricultural Employment H-2B Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
...The Department of Labor (the Department or DOL) is amending its regulations governing the certification for the employment of nonimmigrant workers in temporary or seasonal non-agricultural employment. This Final Rule revises the methodology by which the Department calculates the prevailing wages to be paid to H-2B workers and United States (U.S.) workers recruited in connection with a temporary labor certification for use in petitioning the Department of Homeland Security (DHS) to employ a nonimmigrant worker in H-2B status.
Permeability of Granite Including Macro-Fracture Naturally Filled with Fine-Grained Minerals
NASA Astrophysics Data System (ADS)
Nara, Yoshitaka; Kato, Masaji; Niri, Ryuhei; Kohno, Masanori; Sato, Toshinori; Fukuda, Daisuke; Sato, Tsutomu; Takahashi, Manabu
2018-03-01
Information on the permeability of rock is essential for various geoengineering projects, such as geological disposal of radioactive wastes, hydrocarbon extraction, and natural hazard risk mitigation. It is especially important to investigate how fractures and pores influence the physical and transport properties of rock. Infiltration of groundwater through the damage zone fills fractures in granite with fine-grained minerals. However, the permeability of rock possessing a fracture naturally filled with fine-grained mineral grains has yet to be investigated. In this study, the permeabilities of granite samples, including a macro-fracture filled with clay and a mineral vein, are investigated. The permeability of granite with a fine-grained mineral vein agrees well with that of the intact sample, whereas the permeability of granite possessing a macro-fracture filled with clay is lower than that of the macro-fractured sample. The decrease in the permeability is due to the filling of fine-grained minerals and clay in the macro-fracture. It is concluded that the permeability of granite increases due to the existence of the fractures, but decreases upon filling them with fine-grained minerals.
NASA Astrophysics Data System (ADS)
Co, Noelle Easter C.; Brown, Donald E.; Burns, James T.
2018-05-01
This study applies data science approaches (random forest and logistic regression) to determine the extent to which macro-scale corrosion damage features govern the crack formation behavior in AA7050-T7451. Each corrosion morphology has a set of corresponding predictor variables (pit depth, volume, area, diameter, pit density, total fissure length, surface roughness metrics, etc.) describing the shape of the corrosion damage. The values of the predictor variables are obtained from white light interferometry, x-ray tomography, and scanning electron microscope imaging of the corrosion damage. A permutation test is employed to assess the significance of the logistic and random forest model predictions. Results indicate minimal relationship between the macro-scale corrosion feature predictor variables and fatigue crack initiation. These findings suggest that the macro-scale corrosion features and their interactions do not solely govern the crack formation behavior. While these results do not imply that the macro-features have no impact, they do suggest that additional parameters must be considered to rigorously inform the crack formation location.
An new MHD/kinetic model for exploring energetic particle production in macro-scale systems
NASA Astrophysics Data System (ADS)
Drake, J. F.; Swisdak, M.; Dahlin, J. T.
2017-12-01
A novel MHD/kinetic model is being developed to explore magneticreconnection and particle energization in macro-scale systems such asthe solar corona and the outer heliosphere. The model blends the MHDdescription with a macro-particle description. The rationale for thismodel is based on the recent discovery that energetic particleproduction during magnetic reconnection is controlled by Fermireflection and Betatron acceleration and not parallel electricfields. Since the former mechanisms are not dependent on kineticscales such as the Debye length and the electron and ion inertialscales, a model that sheds these scales is sufficient for describingparticle acceleration in macro-systems. Our MHD/kinetic model includesmacroparticles laid out on an MHD grid that are evolved with the MHDfields. Crucially, the feedback of the energetic component on the MHDfluid is included in the dynamics. Thus, energy of the total system,the MHD fluid plus the energetic component, is conserved. The systemhas no kinetic scales and therefore can be implemented to modelenergetic particle production in macro-systems with none of theconstraints associated with a PIC model. Tests of the new model insimple geometries will be presented and potential applications will bediscussed.
Chen, Vivian Yi-Ju; Yang, Tse-Chuan
2012-08-01
An increasing interest in exploring spatial non-stationarity has generated several specialized analytic software programs; however, few of these programs can be integrated natively into a well-developed statistical environment such as SAS. We not only developed a set of SAS macro programs to fill this gap, but also expanded the geographically weighted generalized linear modeling (GWGLM) by integrating the strengths of SAS into the GWGLM framework. Three features distinguish our work. First, the macro programs of this study provide more kernel weighting functions than the existing programs. Second, with our codes the users are able to better specify the bandwidth selection process compared to the capabilities of existing programs. Third, the development of the macro programs is fully embedded in the SAS environment, providing great potential for future exploration of complicated spatially varying coefficient models in other disciplines. We provided three empirical examples to illustrate the use of the SAS macro programs and demonstrated the advantages explained above. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Sulfonated macro-RAFT agents for the surfactant-free synthesis of cerium oxide-based hybrid latexes.
Garnier, Jérôme; Warnant, Jérôme; Lacroix-Desmazes, Patrick; Dufils, Pierre-Emmanuel; Vinas, Jérôme; van Herk, Alex
2013-10-01
Three types of amphiphatic macro-RAFT agents were employed as compatibilizers to promote the polymerization reaction at the surface of nanoceria for the synthesis of CeO2-based hybrid latexes. Macro-RAFT copolymers and terpolymers were first synthesized employing various combinations of butyl acrylate as a hydrophobic monomer and acrylic acid (AA) and/or 2-acrylamido-2-methylpropane sulfonic acid (AMPS) as hydrophilic monomers. After characterizing the adsorption of these macro-RAFT agents at the cerium oxide surface by UV-visible spectrometry, emulsion copolymerization reactions of styrene and methyl acrylate were then carried out in the presence of the surface-modified nanoceria. Dynamic Light Scattering and cryo-Transmission Electron Microscopy were employed to confirm the hybrid structure of the final CeO2/polymer latexes, and proved that the presence of acrylic acid units in amphiphatic macro-RAFT agents enabled an efficient formation of hybrid structures, while the presence of AMPS units, when combined with AA units, resulted in a better distribution of cerium oxide nanoclusters between latex particles. Copyright © 2013 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Mertz, Sharon A.; Groothuis, Adam; Fellman, Philip Vos
The subject of technology succession and new technology adoption in a generalized sense has been addressed by numerous authors for over one hundred years. Models which accommodate macro-level events as well as micro-level actions are needed to gain insight to future market outcomes. In the ICT industry, macro-level factors affecting technology adoption include global events and shocks, economic factors, and global regulatory trends. Micro-level elements involve individual agent actions and interactions, such as the behaviors of buyers and suppliers in reaction to each other, and to macro events. Projecting technology adoption and software market composition and growth requires evaluating a special set of technology characteristics, buyer behaviors, and supplier issues and responses which make this effort particularly challenging.
Falabella, S.; Sanders, D.M.
1994-01-18
A continuous, cathodic arc ion source coupled to a macro-particle filter capable of separation or elimination of macro-particles from the ion flux produced by cathodic arc discharge is described. The ion source employs an axial magnetic field on a cathode (target) having tapered sides to confine the arc, thereby providing high target material utilization. A bent magnetic field is used to guide the metal ions from the target to the part to be coated. The macro-particle filter consists of two straight solenoids, end to end, but placed at 45[degree] to one another, which prevents line-of-sight from the arc spot on the target to the parts to be coated, yet provides a path for ions and electrons to flow, and includes a series of baffles for trapping the macro-particles. 3 figures.
Falabella, Steven; Sanders, David M.
1994-01-01
A continuous, cathodic arc ion source coupled to a macro-particle filter capable of separation or elimination of macro-particles from the ion flux produced by cathodic arc discharge. The ion source employs an axial magnetic field on a cathode (target) having tapered sides to confine the arc, thereby providing high target material utilization. A bent magnetic field is used to guide the metal ions from the target to the part to be coated. The macro-particle filter consists of two straight solenoids, end to end, but placed at 45.degree. to one another, which prevents line-of-sight from the arc spot on the target to the parts to be coated, yet provides a path for ions and electrons to flow, and includes a series of baffles for trapping the macro-particles.
Teaching Multimedia Data Protection through an International Online Competition
ERIC Educational Resources Information Center
Battisti, F.; Boato, G.; Carli, M.; Neri, A.
2011-01-01
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
A Gentle Approach for Young Infants.
ERIC Educational Resources Information Center
Suskind, Diana; Kozma, Marta
The Gentle Approach is a method for lifting infants younger than 6 months that promotes security and reassurance during adult-imposed changes in position. Developed at the Emmi Pilker National Methodological Institute for Residential Nurseries in Budapest, Hungary, the approach provides continual support and less opportunity for unprotected…
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-07-11
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-01-01
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs. PMID:28696390
U.S. Geological Survey Methodology Development for Ecological Carbon Assessment and Monitoring
Zhu, Zhi-Liang; Stackpoole, S.M.
2009-01-01
Ecological carbon sequestration refers to transfer and storage of atmospheric carbon in vegetation, soils, and aquatic environments to help offset the net increase from carbon emissions. Understanding capacities, associated opportunities, and risks of vegetated ecosystems to sequester carbon provides science information to support formulation of policies governing climate change mitigation, adaptation, and land-management strategies. Section 712 of the Energy Independence and Security Act (EISA) of 2007 mandates the Department of the Interior to develop a methodology and assess the capacity of our nation's ecosystems for ecological carbon sequestration and greenhouse gas (GHG) flux mitigation. The U.S. Geological Survey (USGS) LandCarbon Project is responding to the Department of Interior's request to develop a methodology that meets specific EISA requirements.
Effect of Irregularity in Shape and Boundary of a Macro-Texture Region in Titanium (Postprint)
2015-10-15
AFRL-RX-WP-JA-2016-0328 EFFECT OF IRREGULARITY IN SHAPE AND BOUNDARY OF A MACRO-TEXTURE REGION IN TITANIUM (POSTPRINT) James L...2 October 2014 – 15 September 2015 4. TITLE AND SUBTITLE EFFECT OF IRREGULARITY IN SHAPE AND BOUNDARY OF A MACRO-TEXTURE REGION IN TITANIUM ...aerospace grade titanium alloy material are measured to be about the same level as corner trapped shear wave signals. In addition to the abnormally high
Immobilization of enzymes by bioaffinity layering.
Singh, Veena; Sardar, Meryam; Gupta, Munishwar Nath
2013-01-01
Bioaffinity immobilization exploits the affinity of the enzyme to a macro-(affinity ligand). Such a macro-(affinity ligand) could be a lectin, a water-soluble polymer, or a bioconjugate of a water-soluble polymer and the appropriate affinity ligand. Successive layering of the enzyme and the macro-(affinity ligand) on a matrix allows deposition of a large amount of enzyme activity on a small surface. Illustrative protocols show affinity layering of a pectinase and horseradish peroxidase on Concanavalin A-agarose and Concanavalin A-Sephadex matrices, respectively.
Liu, Jie; Gao, Mie Xiang; Wu, Dong Hui
2017-12-01
Agro-ecosystem is an important component of terrestrial ecosystems and it is one of the key areas of global ecological and environmental studies. A 16 hm 2 permanent plot in black soil cropland was built to study the community structure of soil biodiversity in typical black soil region in Northeast China. Pitfall trap was used to investigate the ground-dwelling soil macro-arthropods from August to October 2015 in accordance with the three crop growth stages: whirling stage, silking stage, and milk stage. A total of 5284 ground-dwelling soil macro-arthropods belonging to 47 species were captured sorted into 3 classes, 12 orders, 32 families. 3 dominant groups and 11 common groups were found. Phytophages and Omnivores were dominant groups. The individuals and species numbers of ground-dwelling soil macro-arthropods had significant changes with the vegetative growth period. The maximum values of the Shannon index, Margalef index, Pielou index of soil macro-arthropods all appeared in September, but the maximum dominant index appeared in August. From the variation coefficient (CV) and spatial interpolation of different species, it could be seen that there was heterogeneity in the horizontal direction of the ground-dwelling soil macro-arthropod communities. Regarding the relationships between the ground-dwelling soil macro-arthropod communities and soil environmental factors including soil pH, soil organic matter, total nitrogen and soil water content, the bivariate correlation analysis showed there was no significant correlation between them. Results of canonical correspondence analysis (CCA) further indicated that the dominant and common groups were adaptable to environmental factors and widely distributed in the study area. The results showed that the species richness of ground-dwelling soil macro-arthropods was very high in cropland, and the dynamic of soil arthropod's composition and spatial distribution pattern in diffe-rent crop growth stages were significantly changed. It was indicated that biodiversity plot monitoring of black soil cropland had become important means to solve the formation and maintenance mechanism of soil fauna community through large-scale and long-term investigation.
Mulder, Han A; Rönnegård, Lars; Fikse, W Freddy; Veerkamp, Roel F; Strandberg, Erling
2013-07-04
Genetic variation for environmental sensitivity indicates that animals are genetically different in their response to environmental factors. Environmental factors are either identifiable (e.g. temperature) and called macro-environmental or unknown and called micro-environmental. The objectives of this study were to develop a statistical method to estimate genetic parameters for macro- and micro-environmental sensitivities simultaneously, to investigate bias and precision of resulting estimates of genetic parameters and to develop and evaluate use of Akaike's information criterion using h-likelihood to select the best fitting model. We assumed that genetic variation in macro- and micro-environmental sensitivities is expressed as genetic variance in the slope of a linear reaction norm and environmental variance, respectively. A reaction norm model to estimate genetic variance for macro-environmental sensitivity was combined with a structural model for residual variance to estimate genetic variance for micro-environmental sensitivity using a double hierarchical generalized linear model in ASReml. Akaike's information criterion was constructed as model selection criterion using approximated h-likelihood. Populations of sires with large half-sib offspring groups were simulated to investigate bias and precision of estimated genetic parameters. Designs with 100 sires, each with at least 100 offspring, are required to have standard deviations of estimated variances lower than 50% of the true value. When the number of offspring increased, standard deviations of estimates across replicates decreased substantially, especially for genetic variances of macro- and micro-environmental sensitivities. Standard deviations of estimated genetic correlations across replicates were quite large (between 0.1 and 0.4), especially when sires had few offspring. Practically, no bias was observed for estimates of any of the parameters. Using Akaike's information criterion the true genetic model was selected as the best statistical model in at least 90% of 100 replicates when the number of offspring per sire was 100. Application of the model to lactation milk yield in dairy cattle showed that genetic variance for micro- and macro-environmental sensitivities existed. The algorithm and model selection criterion presented here can contribute to better understand genetic control of macro- and micro-environmental sensitivities. Designs or datasets should have at least 100 sires each with 100 offspring.
Passive and semi-active heave compensator: Project design methodology and control strategies.
Cuellar Sanchez, William Humberto; Linhares, Tássio Melo; Neto, André Benine; Fortaleza, Eugênio Libório Feitosa
2017-01-01
Heave compensator is a system that mitigates transmission of heave movement from vessels to the equipment in the vessel. In drilling industry, a heave compensator enables drilling in offshore environments. Heave compensator attenuates movement transmitted from the vessel to the drill string and drill bit ensuring security and efficiency of the offshore drilling process. Common types of heave compensators are passive, active and semi-active compensators. This article presents 4 main points. First, a bulk modulus analysis obtains a simple condition to determine if the bulk modulus can be neglected in the design of hydropneumatic passive heave compensator. Second, the methodology to design passive heave compensators with the desired frequency response. Third, four control methodologies for semi-active heave compensator are tested and compared numerically. Lastly, we show experimental results obtained from a prototype with the methodology developed to design passive heave compensator.