Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of certain investment grade debt or investment grade preferred... Statements § 239.39 Form F-9, for registration under the Securities Act of 1933 of certain investment grade debt or investment grade preferred securities of certain Canadian issuers. (a) Form F-9 may be used for...
[Landscape ecological security pattern during urban expansion of Nanchong City].
Li, Sui; Shi, Tie-mao; Fu, Shi-lei; Zhou, Le; Liu, Miao; Wang, Wei
2011-03-01
Based on the theory of landscape ecological security pattern and the RS and GIS techniques, this paper analyzed the distribution of ecological security grades in Nanchong City, taking six elements including terrain condition, flood hazard, soil erosion, vegetation cover, geological disaster, and biological protection as the ecological constraints (or determinants) of urban expansion. According to the minimum cumulative resistance model, the ecological corridors and ecological nodes were built to strengthen the space contact of ecological network, and, on the basis of the protection of ecological safety, the reasonable trend of urban expansion and the optimization of space layout were investigated. The results showed that the ecological security of Nanchong City was quite good, with the regions of low ecological security mainly distributed in the west suburban mountains and the downstream region of Jialing River in the south of the City. Ecological elements were the most important constraints for the future expansion of urban space. There were more spaces for the urban expansion in the southern and northern parts of Nanchong City. To develop satellite towns would be the best selection to guarantee the ecological security of the city.
Association between kindergarten and first-grade food insecurity and weight status in U.S. children.
Lee, Arthur M; Scharf, Rebecca J; DeBoer, Mark D
The aim of this study was to determine if food insecurity is an independent risk factor for obesity in U.S. children. We analyzed data from a nationally representative sample of children participating in the Early Childhood Longitudinal Study-Kindergarten Cohort 2011. Statistical analyses were performed to evaluate longitudinal associations between food security and body mass index (BMI) z-score. All regression models included race/ethnicity, household income, and parental education. Survey and anthropometric data was collected from teachers and parents of 8167 U.S. children entering kindergarten in fall 2010 with regular follow-up through third grade. Complete data regarding food security, socioeconomic assessment, and BMI z-score data were included for statistical analyses. All analyses were weighted to be nationally representative. Children with household food insecurity had increased obesity prevalence from kindergarten through grade 3; for example, at kindergarten, with food insecurity 16.4% (95% confidence interval [CI], 13.7-19) versus food secure 12.4% (95% CI, 11.3-13.6). Adjusted means analysis showed first-grade food insecurity was significantly correlated with increased BMI z-score in first through third grades; for example, at first grade, with food insecurity 0.6 (95% CI, 0.5-0.7) versus food secure 0.4 (95% CI, 0.4-0.5). Logistic regression showed first-grade food insecurity was correlated with increased risk for obesity in that grade (odds ratio 1.4; 95% CI, 1.1-2). Obesity is more prevalent among food-insecure children. First-grade food insecurity is an independent risk factor for longitudinal increases in BMI z-score. There are differences in the association between food insecurity and weight status between kindergarten and first grade. Copyright © 2018 Elsevier Inc. All rights reserved.
76 FR 26714 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... with ``Course and training data to include name, grade/rank/series, Social Security Number (SSN... in the system: Course and training data to include name, grade/rank/series, Social Security Number... amended. Purpose(s): The Army Career Tracker will receive training, education, experiential learning...
76 FR 43286 - National Assessment Governing Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... levels for each grade and subject tested, developing standards and procedures for interstate and national... in closed session to review secure test items for the 2012 Economics assessment at grade 12 and the... meeting the ADC will complete their review of secure NAEP test items for the 2012 Economics assessment at...
Job Grading Standard for Blocker and Bracer WG-4602.
ERIC Educational Resources Information Center
Civil Service Commission, Washington, DC. Bureau of Policies and Standards.
The standard is used to grade nonsupervisor's work involved in blocking, bracing, staying, and securing cargo for shipment by land, sea, or air. It requires skill in constructing, placing, and installing wooden blocks, wedges, bracing structures and other staying devices, as well as skill in securing items using wires, ropes, chains, cables,…
Infant-Mother Attachment Security and Children's Anxiety and Aggression at First Grade
ERIC Educational Resources Information Center
Dallaire, Danielle H.; Weinraub, Marsha
2007-01-01
With a large and diverse sample of children from the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development, the role of infant-mother attachment security as a protective factor against the development of children's anxious and aggressive behaviors at first grade was examined. When child's sex,…
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 4 2011-10-01 2011-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry. ...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry. ...
Microbend fiber-optic temperature sensor
Weiss, J.D.
1995-05-30
A temperature sensor is made of optical fiber into which quasi-sinusoidal microbends have been permanently introduced. In particular, the present invention includes a graded-index optical fiber directing steady light through a section of the optical fiber containing a plurality of permanent microbends. The microbend section of the optical fiber is contained in a thermally expansive sheath, attached to a thermally expansive structure, or attached to a bimetallic element undergoing temperature changes and being monitored. The microbend section is secured to the thermally expansive sheath which allows the amplitude of the microbends to decrease with temperature. The resultant increase in the optical fiber`s transmission thus allows temperature to be measured. The plural microbend section of the optical fiber is secured to the thermally expansive structure only at its ends and the microbends themselves are completely unconstrained laterally by any bonding agent to obtain maximum longitudinal temperature sensitivity. Although the permanent microbends reduce the transmission capabilities of fiber optics, the present invention utilizes this phenomenon as a transduction mechanism which is optimized to measure temperature. 5 figs.
Microbend fiber-optic temperature sensor
Weiss, Jonathan D.
1995-01-01
A temperature sensor is made of optical fiber into which quasi-sinusoidal microbends have been permanently introduced. In particular, the present invention includes a graded-index optical fiber directing steady light through a section of the optical fiber containing a plurality of permanent microbends. The microbend section of the optical fiber is contained in a thermally expansive sheath, attached to a thermally expansive structure, or attached to a bimetallic element undergoing temperature changes and being monitored. The microbend section is secured to the thermally expansive sheath which allows the amplitude of the microbends to decrease with temperature. The resultant increase in the optical fiber's transmission thus allows temperature to be measured. The plural microbend section of the optical fiber is secured to the thermally expansive structure only at its ends and the microbends themselves are completely unconstrained laterally by any bonding agent to obtain maximum longitudinal temperature sensitivity. Although the permanent microbends reduce the transmission capabilities of fiber optics, the present invention utilizes this phenomenon as a transduction mechanism which is optimized to measure temperature.
49 CFR 80.11 - Investment-grade ratings.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 1 2010-10-01 2010-10-01 false Investment-grade ratings. 80.11 Section 80.11... § 80.11 Investment-grade ratings. (a) At the time a project sponsor submits an application, the DOT... investment-grade rating. (b) The full funding of a secured (direct) loan, loan guarantee, or line of credit...
49 CFR 80.11 - Investment-grade ratings.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 1 2011-10-01 2011-10-01 false Investment-grade ratings. 80.11 Section 80.11... § 80.11 Investment-grade ratings. (a) At the time a project sponsor submits an application, the DOT... investment-grade rating. (b) The full funding of a secured (direct) loan, loan guarantee, or line of credit...
Enosawa, Shin
2017-01-01
For the purpose of clinical research of hepatocyte transplantation, procedures for isolation, cryopreservation, thawing, and functional assessment of hepatocytes are described. Although demands for human hepatocytes are increasing in not only cell therapy but also drug development, it is highly difficult to obtain good lots of hepatocytes from human liver tissue. This chapter describes essential issues such as alleviation of warm ischemia, prevention of shear stress, optimization of cryopreservation, and functional assessment, along with securement of quality. All procedures described here are compliant with good manufacturing procedure (GMP) in cell processing facility, approved by the act on measures to ensure safety of regenerative medicine and ethical regulations in Japan.
Desktop Security ... Now More than Ever
ERIC Educational Resources Information Center
Huber, Joe
2005-01-01
Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.
77 FR 39346 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
...; social security number (SSN); taxpayer identification number (TIN); date of birth; grade; race; employing... delivery of salary payments to VA employees. 3. Transfer payroll information to the Social Security Administration in order to credit quarterly posting for social security. [[Page 39349
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 4 2014-10-01 2014-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 4 2013-10-01 2013-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 4 2012-10-01 2012-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...
The Application of materials attractiveness in a graded approach to nuclear materials security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ebbinghaus, B.; Bathke, C.; Dalton, D.
2013-07-01
The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that ismore » necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED.« less
19 CFR 151.76 - Grading of wool.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 2 2014-04-01 2014-04-01 false Grading of wool. 151.76 Section 151.76 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Wool and Hair § 151.76 Grading of wool. (a...
19 CFR 151.76 - Grading of wool.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 2 2012-04-01 2012-04-01 false Grading of wool. 151.76 Section 151.76 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Wool and Hair § 151.76 Grading of wool. (a...
19 CFR 151.76 - Grading of wool.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Grading of wool. 151.76 Section 151.76 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Wool and Hair § 151.76 Grading of wool. (a...
19 CFR 151.76 - Grading of wool.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 2 2013-04-01 2013-04-01 false Grading of wool. 151.76 Section 151.76 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Wool and Hair § 151.76 Grading of wool. (a...
19 CFR 151.76 - Grading of wool.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 2 2011-04-01 2011-04-01 false Grading of wool. 151.76 Section 151.76 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Wool and Hair § 151.76 Grading of wool. (a...
49 CFR 80.11 - Investment-grade ratings.
Code of Federal Regulations, 2013 CFR
2013-10-01
... investment-grade rating. (b) The full funding of a secured (direct) loan, loan guarantee, or line of credit... rating should reflect the effect of bond insurance, unless that insurance provides credit enhancement...
Aggregate assesment and durability evaluation of optimized graded concrete in the state of Oklahoma
NASA Astrophysics Data System (ADS)
Ghaeezadeh, Ashkan
This research is a part of a larger project that emphasizes on creating a more scientific approach to designing concrete mixtures for concrete pavements that use less cement and more aggregate which is called optimized graded concrete. The most challenging obstacle in optimized mixtures is reaching enough workability so that one doesn't have to add more cement or super-plasticizer to reach the desired level of flowability. Aggregate gradation and characteristics have found to be very important when it comes to the workabaility of optimized graded concrete. In this research a new automated method of aggregate assessment was used to compare the shape and the surface of different aggregates as well as their influence on the concrete flowability. At the end, the performance of optimized graded concrete against drying shrinkage and freezing and thawing condition were investigated.
Grading of Chinese Cantonese Sausage Using Hyperspectral Imaging Combined with Chemometric Methods
Gong, Aiping; Zhu, Susu; He, Yong; Zhang, Chu
2017-01-01
Fast and accurate grading of Chinese Cantonese sausage is an important concern for customers, organizations, and the industry. Hyperspectral imaging in the spectral range of 874–1734 nm, combined with chemometric methods, was applied to grade Chinese Cantonese sausage. Three grades of intact and sliced Cantonese sausages were studied, including the top, first, and second grades. Support vector machine (SVM) and random forests (RF) techniques were used to build two different models. Second derivative spectra and RF were applied to select optimal wavelengths. The optimal wavelengths were the same for intact and sliced sausages when selected from second derivative spectra, while the optimal wavelengths for intact and sliced sausages selected using RF were quite similar. The SVM and RF models, using full spectra and the optimal wavelengths, obtained acceptable results for intact and sliced sausages. Both models for intact sausages performed better than those for sliced sausages, with a classification accuracy of the calibration and prediction set of over 90%. The overall results indicated that hyperspectral imaging combined with chemometric methods could be used to grade Chinese Cantonese sausages, with intact sausages being better suited for grading. This study will help to develop fast and accurate online grading of Cantonese sausages, as well as other sausages. PMID:28757578
40 CFR 86.523-78 - Oxides of nitrogen analyzer calibration.
Code of Federal Regulations, 2014 CFR
2014-07-01
... analyzer to optimize performance. (2) Zero the oxides of nitrogen analyzer with zero grade air or zero... samples. Proceed as follows: (1) Adjust analyzer to optimize performance. (2) Zero the oxides of nitrogen analyzer with zero grade air or zero grade nitrogen. (3) Calibrate on each normally used operating range...
Best Practices and Lessons Learned In LANL Approaches to Transportation Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drypolcher, Katherine Carr
Presentation includes slides on Physical Protection of Material in Transit; Graded Approach for Implementation Controls; Security Requirements; LANL Lessons Learned; Shipping Violation; Unmonitored Shipment; Foreign shipment; and the Conclusion.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
..., Secretary, Commission, from: Dorothy Donohue, Deputy General Counsel--Securities Regulation, Investment... Investment Grade corporate bonds and $1 million (``$1MM'') for Non-Investment Grade corporate bonds \\16... result, the size of a Rule 144A Investment Grade corporate bond transaction in excess of $5MM would be...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form F-3, for registration... CFR 230.405); or (v) Discloses in the registration statement that it has a reasonable belief that it... offering of non-convertible investment grade securities, discloses the basis for such belief, and files a...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Form F-3, for registration... CFR 230.405); or (v) Discloses in the registration statement that it has a reasonable belief that it... offering of non-convertible investment grade securities, discloses the basis for such belief, and files a...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Form F-3, for registration... CFR 230.405); or (v) Discloses in the registration statement that it has a reasonable belief that it... offering of non-convertible investment grade securities, discloses the basis for such belief, and files a...
Finite grade pheromone ant colony optimization for image segmentation
NASA Astrophysics Data System (ADS)
Yuanjing, F.; Li, Y.; Liangjun, K.
2008-06-01
By combining the decision process of ant colony optimization (ACO) with the multistage decision process of image segmentation based on active contour model (ACM), an algorithm called finite grade ACO (FACO) for image segmentation is proposed. This algorithm classifies pheromone into finite grades and updating of the pheromone is achieved by changing the grades and the updated quantity of pheromone is independent from the objective function. The algorithm that provides a new approach to obtain precise contour is proved to converge to the global optimal solutions linearly by means of finite Markov chains. The segmentation experiments with ultrasound heart image show the effectiveness of the algorithm. Comparing the results for segmentation of left ventricle images shows that the ACO for image segmentation is more effective than the GA approach and the new pheromone updating strategy appears good time performance in optimization process.
46 CFR 32.60-15 - Segregation of cargo; Grade E-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Segregation of cargo; Grade E-TB/ALL. 32.60-15 Section 32.60-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT... § 32.60-15 Segregation of cargo; Grade E—TB/ALL. (a) General. The galleys, living quarters, navigation...
46 CFR 32.60-15 - Segregation of cargo; Grade E-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Segregation of cargo; Grade E-TB/ALL. 32.60-15 Section 32.60-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT... § 32.60-15 Segregation of cargo; Grade E—TB/ALL. (a) General. The galleys, living quarters, navigation...
NASA Technical Reports Server (NTRS)
2004-01-01
KENNEDY SPACE CENTER, FLA. At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASAs Federal Law Enforcement Training Academys firing range has been upgraded to include a rifle-grade shoot house, a portable, tactical shoot-back trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, pistol-grade shoot house, obstacle course and rappel tower. NASAs Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Kwan, M K; Chan, C Y W
2016-10-01
To investigate whether an optimal upper instrumented vertebra (UIV) tilt angle would prevent 'lateral' shoulder imbalance or neck tilt (with 'medial' shoulder imbalance) post-operatively. The mean follow-up for 60 AIS (Lenke 1 and Lenke 2) patients was 49.3 ± 8.4 months. Optimal UIV tilt angle was calculated from the cervical supine side bending radiographs. Lateral shoulder imbalance was graded using the clinical shoulder grading. The clinical neck tilt grading was as follows: Grade 0: no neck tilt, Grade 1: actively correctable neck tilt, Grade 2: neck tilt that cannot be corrected by active contraction and Grade 3: severe neck tilt with trapezial asymmetry >1 cm. T1 tilt, clavicle angle and cervical axis were measured. UIVDiff (difference between post-operative UIV tilt and pre-operative Optimal UIV tilt) and the reserve motion of the UIV were correlated with the outcome measures. Patients were assessed at 6 weeks and at final follow-up with a minimum follow-up duration of 24 months. Among patients with grade 0 neck tilt, 88.2 % of patients had the UIV tilt angle within the reserve motion range. This percentage dropped to 75.0 % in patients with grade 1 neck tilt whereas in patients with grade 2 and grade 3 neck tilt, the percentage dropped further to 22.2 and 20.0 % (p = 0.000). The occurrence of grade 2 and 3 neck tilt when UIVDiff was <5°, 5-10° and >10° was 9.5, 50.0 and 100.0 %, respectively (p = 0.005). UIVDiff and T1 tilt had a positive and strong correlation (r 2 = 0.618). However, UIVDiff had poor correlation with clavicle angle and the lateral shoulder imbalance. An optimal UIV tilt might prevent neck tilt with 'medial' shoulder imbalance due to trapezial prominence and but not 'lateral' shoulder imbalance.
On the Water-Food Nexus: an Optimization Approach for Water and Food Security
NASA Astrophysics Data System (ADS)
Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem
2016-04-01
Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.
ERIC Educational Resources Information Center
Sarouni, Ali Sedigh; Jenaabadi, Hossein; Pourghaz, Abdulwahab
2016-01-01
The present study aimed to examine the relationship of mental pressure with optimism and academic achievement motivation among second grade second period male high school students. This study followed a descriptive-correlational method. The sample included 200 second grade second period male high school students in Sooran. Data collection tools in…
Patterns of Work Values Held by Secondary School Girls.
ERIC Educational Resources Information Center
Wearne, T. David; And Others
1980-01-01
The work values of 541 high school girls did not vary significantly from grade to grade. The girls valued security, achievement, and the "good life" the most and valued management, intellectual stimulation, and esthetics the least. (SB)
1990-08-01
differential validity 612 ASVAB test constru~tion, 16 .PRIC’E CODE bias 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION jig. SECURITY CLAS...15 Juniors 1985-86 .............................. 15 Seniors 1984-85 .............................. 16 Algebra... 16 Freshmen 1984-85 ............................. 16 Freshmen 1 85-86 ............................. 16 Sophomores 1984-85
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-29
... Underlying Index measures the performance of investment-grade taxable debt securities of the U.S. municipal... of ICUs based on certain fixed income indexes. See, e.g., Securities Exchange Act Release No. 48662... Investment Company Units based on a fixed income index in Securities Exchange Act Release No. 55783 (May 17...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-23
... investment grade by at least one NRSRO and securities issued by registered open-end investment companies that... Investment Company Act will also limit a BIDCO's investments in registered open-end funds to those funds that... 3235-AL02 Purchase of Certain Debt Securities by Business and Industrial Development Companies Relying...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... common stocks; preferred securities; warrants to purchase common stocks or preferred securities... rated below investment grade at the time of purchase, or unrated securities deemed by the Fund's Adviser... contracts. The Fund may invest in such loans by purchasing assignments of all or a portion of loans or loan...
Optimizing Security of Cloud Computing within the DoD
2010-12-01
information security governance and risk management; application security; cryptography; security architecture and design; operations security; business ...governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity...20 7. Operational Security (OPSEC).........................................................20 8. Business Continuity Planning (BCP) and Disaster
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
17 CFR 242.101 - Activities by distribution participants.
Code of Federal Regulations, 2013 CFR
2013-04-01
... section: (1) Research. The publication or dissemination of any information, opinion, or recommendation, if... distribution participant or an affiliate of the distribution participant; or (2) Investment grade... that signifies investment grade; or (3) Exempted securities. “Exempted securities” as defined in...
17 CFR 242.101 - Activities by distribution participants.
Code of Federal Regulations, 2012 CFR
2012-04-01
... section: (1) Research. The publication or dissemination of any information, opinion, or recommendation, if... distribution participant or an affiliate of the distribution participant; or (2) Investment grade... that signifies investment grade; or (3) Exempted securities. “Exempted securities” as defined in...
Water-Energy-Food Nexus in Asia-Pacific Ring of Fire
NASA Astrophysics Data System (ADS)
Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.
2013-12-01
Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.
Using the Method of Water Poverty Index (WPI) to Evaluate the Region Water Security
NASA Astrophysics Data System (ADS)
Fu, Q.; Kachanoski, G.
2008-12-01
Water security is a widely concerned issue in the world nowadays. A new method, water poverty index (WPI), has been used to evaluate the regional water security. Twelve state farms in Heilongjiang Province, Northeastern China were selected to evaluate water security status based on the data of 2006 by using WPI and mean deviation grading method. The method of WPI includes five key indexes, such as resources(R), access (A), capacity(C), utilization (U) and environment (E). Each key index includes several sub-indexes. According to the results of WPI, the grade of each farm has been calculated by using the method of mean deviation grading. Thus, the radar images can be protracted of each farm. From the radar images, the conclusions can be drawn that the WPI values of Farms 853 and Hongqiling were in very safe status, while that of Farm Raohe was in safe status, those of Farms Youyi, 597, 852, 291 and Jiangchuan were in moderate safe status, that of Farm Beixing was in low safe status and those of Farms Shuangyashan, Shuguang and Baoshan were in unsafe status. The results from this study can provide basic information for decision making on rational use of water resources and regulations for regional water safety guarantee system.
Finasteride Reduces the Risk of Low-Grade Prostate Cancer in Men 55 and Older
... the researchers gathered using data from the Social Security Death Index (SSDI) from the time the trial ... Websites POLICIES Accessibility Comment Policy Disclaimer FOIA Privacy & Security Reuse & Copyright Syndication Services Website Linking U.S. Department ...
ERIC Educational Resources Information Center
Archer, Chalmers, Jr.; Archer, A. J. Finch
1986-01-01
Examines the susceptibility of computerized institutional records to security violations by "hackers," wishing to change grades/records or merely demonstrate their ability to access the systems. Points to practices that encourage security abuses and risk confidentiality. Outlines procedures used by Northern Virginia Community College to…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... 65% of the weight of the Fund. The Fund intends to invest in Money Market Securities \\11\\ in order to... derivative instruments. All Money Market Securities acquired by the Fund will be rated investment grade. The Fund does not intend to invest in any unrated Money Market Securities. \\11\\ For these purposes, Money...
Development of a 3D log sawing optimization system for small sawmills in central Appalachia, US
Wenshu Lin; Jingxin Wang; Edward Thomas
2011-01-01
A 3D log sawing optimization system was developed to perform log generation, opening face determination, sawing simulation, and lumber grading using 3D modeling techniques. Heuristic and dynamic programming algorithms were used to determine opening face and grade sawing optimization. Positions and shapes of internal log defects were predicted using a model developed by...
Monte Carlo study of holding forces for tank cars on grades
DOT National Transportation Integrated Search
2013-04-15
This paper describes a numerical procedure to examine the holding forces needed to secure a cut of railroad tank cars staged on a grade during loading and unloading operations. Holding forces are created by applying emergency brake systems and blocki...
The Prevalence of Food Security and Insecurity Among Illinois University Students.
Morris, Loran Mary; Smith, Sylvia; Davis, Jeremy; Null, Dawn Bloyd
2016-06-01
This study aims to define the food security status of Illinois university students and whether sociodemographic characteristics are related to that status. A cross-sectional research design was used to analyze the food security status of undergraduate Illinois university students, employing a survey containing the Household Food Security Survey Module that was distributed via e-mail to student participants. Four public Illinois universities were highlighted, including Eastern Illinois University, Northern Illinois University, Southern Illinois University, and Western Illinois University. A total of 1,882 undergraduate students participated in the research study in April, 2013. Variables include food security status and sociodemographic characteristics such as age, sex, race, and academic standing. Statistical analysis included frequencies and chi-square tests. The percentage of student respondents in the total sample who were considered food insecure was 35.0%. There were significant relationships between food security status and sociodemographic variables including race, grade point average, loan use, and living location. This study suggests that 35% of respondents were food insecure based on quantitative assessment. Understanding the significant relationship between food security status and race, grade point average, loan use, and living location may be useful in developing services for those in need. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Teaching Aids in Consumer Economics, 1970-71.
ERIC Educational Resources Information Center
New York State Council on Economic Education, Albany.
The document consists of 12 consumer education units for grade 12: Consumer Purchasing; Purchasing Food, Clothing, Furniture, and Appliances; Purchasing and Maintaining an Automobile; Housing; Consumer Credit; Money Management; Fraud, Quackery, and Deception; Banking and Savings; Investments; Life Insurance; Security Programs (Social Security,…
Investigation of optimize graded concrete for Oklahoma : phase 1 : final report.
DOT National Transportation Integrated Search
2013-10-01
Optimized Graded Concrete has been a subject widely discussed through the history of concrete. Since aggregates make up over 70% of the volume in a mixture, gradation is critical to the strength, workability, and durability of concrete. In practice o...
Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari
2002-01-01
The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.
32 CFR 701.101 - Privacy program terms and definitions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...
32 CFR 701.101 - Privacy program terms and definitions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...
32 CFR 701.101 - Privacy program terms and definitions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...
17 CFR 242.101 - Activities by distribution participants.
Code of Federal Regulations, 2014 CFR
2014-04-01
... section: (1) Research. The publication or dissemination of any information, opinion, or recommendation, if... the distribution participant; or (2) Investment grade nonconvertible and asset-backed securities....15c3-1 of this chapter, in one of its generic rating categories that signifies investment grade; or (3...
Vissers, Gino; Soar, Jasmeet; Monsieurs, Koenraad G
2017-10-01
The optimal ventilation rate during cardiopulmonary resuscitation (CPR) with a tracheal tube is unknown. We evaluated whether in adults with cardiac arrest and a secure airway (tracheal tube), a ventilation rate of 10min -1 , compared to any other rate during CPR, improves outcomes. A systematic review up to 14 July 2016. We included both adult human and animal studies. A GRADE (Grades of Recommendation, Assessment, Development and Evaluation) approach was used to evaluate the quality of evidence for each outcome. We identified one human observational study with 67 patients and ten animal studies (234 pigs and 30 dogs). All studies carried a high risk of bias. All studies evaluated for return of spontaneous circulation (ROSC). Studies showed no improvement in ROSC with a ventilation rate of 10 min-1 compared to any other rate. The evidence for longer-term outcomes such as survival to discharge and survival with favourable neurological outcome was very limited. A ventilation rate recommendation of 10 min-1 during adult CPR with a tracheal tube and no pauses for chest compression is a very weak recommendation based on very low quality evidence. Copyright © 2017 Elsevier B.V. All rights reserved.
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio
2015-08-28
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
Quantum cryptography: Security criteria reexamined
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kaszlikowski, Dagomir; Liang, Y.C.; Englert, Berthold-Georg
2004-09-01
We find that the generally accepted security criteria are flawed for a whole class of protocols for quantum cryptography. This is so because a standard assumption of the security analysis, namely that the so-called square-root measurement is optimal for eavesdropping purposes, is not true in general. There are rather large parameter regimes in which the optimal measurement extracts substantially more information than the square-root measurement.
Code of Federal Regulations, 2012 CFR
2012-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
Code of Federal Regulations, 2011 CFR
2011-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
Code of Federal Regulations, 2014 CFR
2014-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
Code of Federal Regulations, 2010 CFR
2010-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
32 CFR 701.101 - Privacy program terms and definitions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a...
Topology optimized design of functionally graded piezoelectric ultrasonic transducers
NASA Astrophysics Data System (ADS)
Rubio, Wilfredo Montealegre; Buiochi, Flávio; Adamowski, Julio Cezar; Silva, Emílio C. N.
2010-01-01
This work presents a new approach to systematically design piezoelectric ultrasonic transducers based on Topology Optimization Method (TOM) and Functionally Graded Material (FGM) concepts. The main goal is to find the optimal material distribution of Functionally Graded Piezoelectric Ultrasonic Transducers, to achieve the following requirements: (i) the transducer must be designed to have a multi-modal or uni-modal frequency response, which defines the kind of generated acoustic wave, either short pulse or continuous wave, respectively; (ii) the transducer is required to oscillate in a thickness extensional mode or piston-like mode, aiming at acoustic wave generation applications. Two kinds of piezoelectric materials are mixed for producing the FGM transducer. Material type 1 represents a PZT-5A piezoelectric ceramic and material type 2 represents a PZT-5H piezoelectric ceramic. To illustrate the proposed method, two Functionally Graded Piezoelectric Ultrasonic Transducers are designed. The TOM has shown to be a useful tool for designing Functionally Graded Piezoelectric Ultrasonic Transducers with uni-modal or multi-modal dynamic behavior.
Bell, L C; Does, M D; Stokes, A M; Baxter, L C; Schmainda, K M; Dueck, A C; Quarles, C C
2017-09-01
The optimal TE must be calculated to minimize the variance in CBV measurements made with DSC MR imaging. Simulations can be used to determine the influence of the TE on CBV, but they may not adequately recapitulate the in vivo heterogeneity of precontrast T2*, contrast agent kinetics, and the biophysical basis of contrast agent-induced T2* changes. The purpose of this study was to combine quantitative multiecho DSC MRI T2* time curves with error analysis in order to compute the optimal TE for a traditional single-echo acquisition. Eleven subjects with high-grade gliomas were scanned at 3T with a dual-echo DSC MR imaging sequence to quantify contrast agent-induced T2* changes in this retrospective study. Optimized TEs were calculated with propagation of error analysis for high-grade glial tumors, normal-appearing white matter, and arterial input function estimation. The optimal TE is a weighted average of the T2* values that occur as a contrast agent bolus transverses a voxel. The mean optimal TEs were 30.0 ± 7.4 ms for high-grade glial tumors, 36.3 ± 4.6 ms for normal-appearing white matter, and 11.8 ± 1.4 ms for arterial input function estimation (repeated-measures ANOVA, P < .001). Greater heterogeneity was observed in the optimal TE values for high-grade gliomas, and mean values of all 3 ROIs were statistically significant. The optimal TE for the arterial input function estimation is much shorter; this finding implies that quantitative DSC MR imaging acquisitions would benefit from multiecho acquisitions. In the case of a single-echo acquisition, the optimal TE prescribed should be 30-35 ms (without a preload) and 20-30 ms (with a standard full-dose preload). © 2017 by American Journal of Neuroradiology.
Development of optimized, graded-permeability axial groove heat pipes
NASA Technical Reports Server (NTRS)
Kapolnek, Michael R.; Holmes, H. Rolland
1988-01-01
Heat pipe performance can usually be improved by uniformly varying or grading wick permeability from end to end. A unique and cost effective method for grading the permeability of an axial groove heat pipe is described - selective chemical etching of the pipe casing. This method was developed and demonstrated on a proof-of-concept test article. The process improved the test article's performance by 50 percent. Further improvement is possible through the use of optimally etched grooves.
SAFETY GUIDES FOR YOU--IN THE PRIMARY GRADES.
ERIC Educational Resources Information Center
WALKER, LUVERNE CRABTREE
THIS SAFETY INSTRUCTIONAL GUIDE FOR PRIMARY-GRADE TEACHERS PRESENTS NINE DIFFERENT SAFETY UNITS, INCLUDING TRAFFIC SAFETY, PLAYTIME SAFETY, SAFE EATING AND DRINKING HABITS, SAFE CLOTHING, HOME SAFETY, ANIMAL SAFETY, CIVIL DEFENSE SECURITY, AND TESTING SAFETY PRACTICES. EACH UNIT STRESSES THE REASONS FOR ACCENTING SAFETY, WHAT TO KNOW AND DO, AND…
Optimal resource allocation for defense of targets based on differing measures of attractiveness.
Bier, Vicki M; Haphuriwat, Naraphorn; Menoyo, Jaime; Zimmerman, Rae; Culpen, Alison M
2008-06-01
This article describes the results of applying a rigorous computational model to the problem of the optimal defensive resource allocation among potential terrorist targets. In particular, our study explores how the optimal budget allocation depends on the cost effectiveness of security investments, the defender's valuations of the various targets, and the extent of the defender's uncertainty about the attacker's target valuations. We use expected property damage, expected fatalities, and two metrics of critical infrastructure (airports and bridges) as our measures of target attractiveness. Our results show that the cost effectiveness of security investment has a large impact on the optimal budget allocation. Also, different measures of target attractiveness yield different optimal budget allocations, emphasizing the importance of developing more realistic terrorist objective functions for use in budget allocation decisions for homeland security.
Optimization of airport security process
NASA Astrophysics Data System (ADS)
Wei, Jianan
2017-05-01
In order to facilitate passenger travel, on the basis of ensuring public safety, the airport security process and scheduling to optimize. The stochastic Petri net is used to simulate the single channel security process, draw the reachable graph, construct the homogeneous Markov chain to realize the performance analysis of the security process network, and find the bottleneck to limit the passenger throughput. Curve changes in the flow of passengers to open a security channel for the initial state. When the passenger arrives at a rate that exceeds the processing capacity of the security channel, it is queued. The passenger reaches the acceptable threshold of the queuing time as the time to open or close the next channel, simulate the number of dynamic security channel scheduling to reduce the passenger queuing time.
On Consistency Test Method of Expert Opinion in Ecological Security Assessment
Wang, Lihong
2017-01-01
To reflect the initiative design and initiative of human security management and safety warning, ecological safety assessment is of great value. In the comprehensive evaluation of regional ecological security with the participation of experts, the expert’s individual judgment level, ability and the consistency of the expert’s overall opinion will have a very important influence on the evaluation result. This paper studies the consistency measure and consensus measure based on the multiplicative and additive consistency property of fuzzy preference relation (FPR). We firstly propose the optimization methods to obtain the optimal multiplicative consistent and additively consistent FPRs of individual and group judgments, respectively. Then, we put forward a consistency measure by computing the distance between the original individual judgment and the optimal individual estimation, along with a consensus measure by computing the distance between the original collective judgment and the optimal collective estimation. In the end, we make a case study on ecological security for five cities. Result shows that the optimal FPRs are helpful in measuring the consistency degree of individual judgment and the consensus degree of collective judgment. PMID:28869570
On Consistency Test Method of Expert Opinion in Ecological Security Assessment.
Gong, Zaiwu; Wang, Lihong
2017-09-04
To reflect the initiative design and initiative of human security management and safety warning, ecological safety assessment is of great value. In the comprehensive evaluation of regional ecological security with the participation of experts, the expert's individual judgment level, ability and the consistency of the expert's overall opinion will have a very important influence on the evaluation result. This paper studies the consistency measure and consensus measure based on the multiplicative and additive consistency property of fuzzy preference relation (FPR). We firstly propose the optimization methods to obtain the optimal multiplicative consistent and additively consistent FPRs of individual and group judgments, respectively. Then, we put forward a consistency measure by computing the distance between the original individual judgment and the optimal individual estimation, along with a consensus measure by computing the distance between the original collective judgment and the optimal collective estimation. In the end, we make a case study on ecological security for five cities. Result shows that the optimal FPRs are helpful in measuring the consistency degree of individual judgment and the consensus degree of collective judgment.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
Code of Federal Regulations, 2012 CFR
2012-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
76 FR 18738 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... Records in the System: First, middle and last name, nickname, last four digits of Social Security Number..., Accessing, Retaining, and Disposing of Records: Storage: Records are stored on electronic storage media... characteristics (such as name, last four digits of Social Security Number (SSN), series, grade, dates of service...
75 FR 10474 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... storage media. RETRIEVABILITY: Retrieved by last name and Social Security Number (SSN). SAFEGUARDS... proposed action will be effective without further notice on April 7, 2010 unless comments are received... RECORDS IN THE SYSTEM: Delete entry and replace with ``The files contain full name, grade, Social Security...
78 FR 25723 - National Assessment Governing Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-02
..., assistive listening devices, materials in alternative format) should notify Munira Mwalimu at 202- 357-6938.... to review secure NAEP test materials for Science Interactive Computer Tasks (ICTs) at grades 4, 8... provided with secure items and materials which are not yet available for release to the general public...
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices
Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio
2015-01-01
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
NASA Astrophysics Data System (ADS)
Danilova, Olga; Semenova, Zinaida
2018-04-01
The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.
Freeze Tape Casting of Functionally Graded Porous Ceramics
NASA Technical Reports Server (NTRS)
Sofie, Stephen W.
2007-01-01
Freeze tape casting is a means of making preforms of ceramic sheets that, upon subsequent completion of fabrication processing, can have anisotropic and/or functionally graded properties that notably include aligned and graded porosity. Freeze tape casting was developed to enable optimization of the microstructures of porous ceramic components for use as solid oxide electrodes in fuel cells: Through alignment and grading of pores, one can tailor surface areas and diffusion channels for flows of gas and liquid species involved in fuel-cell reactions. Freeze tape casting offers similar benefits for fabrication of optimally porous ceramics for use as catalysts, gas sensors, and filters.
The State of Leadership in DHS - Is There a Model for Leading?
2008-12-01
Security Directors Reports Findings (2008) https://www.nisp.us/ logistica /public/news.cfm?category=SPB&article_id=5544&sidebar=archive (accessed...Prosperous (Washington, D.C.: The Heritage Foundation, 2008), 18. 20 Veronica de Rugy, “Facts and Figures About Seven Years of Homeland Security...banding scale in the case of the Transportation Security Administration or equivalent pay grade/rank with respect to the U.S. Coast Guard). The
ERIC Educational Resources Information Center
Maroto, Maya E.; Snelling, Anastasia; Linck, Henry
2015-01-01
This study investigated the prevalence of food insecurity among community college students (N = 301) and the relationship between food insecurity and student grade point average (GPA). It employed a cross-sectional intercept survey, utilizing the U.S. Department of Agriculture's Household Food Security Survey Module, student self-reported GPA, and…
32 CFR 575.3 - Appointments; sources of nominations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... include the name, grade, social security number/service number, and branch of service of the parent as a... Forces); the name, grade, and branch of service of the parent; and a brief statement of the date and... Military Science or Senior Army Instructor at the school. (6) Regular Army: This category is for enlisted...
32 CFR 575.3 - Appointments; sources of nominations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... include the name, grade, social security number/service number, and branch of service of the parent as a... Forces); the name, grade, and branch of service of the parent; and a brief statement of the date and... Military Science or Senior Army Instructor at the school. (6) Regular Army: This category is for enlisted...
32 CFR 575.3 - Appointments; sources of nominations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... include the name, grade, social security number/service number, and branch of service of the parent as a... Forces); the name, grade, and branch of service of the parent; and a brief statement of the date and... Military Science or Senior Army Instructor at the school. (6) Regular Army: This category is for enlisted...
32 CFR 575.3 - Appointments; sources of nominations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... include the name, grade, social security number/service number, and branch of service of the parent as a... Forces); the name, grade, and branch of service of the parent; and a brief statement of the date and... Military Science or Senior Army Instructor at the school. (6) Regular Army: This category is for enlisted...
32 CFR 575.3 - Appointments; sources of nominations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... include the name, grade, social security number/service number, and branch of service of the parent as a... Forces); the name, grade, and branch of service of the parent; and a brief statement of the date and... Military Science or Senior Army Instructor at the school. (6) Regular Army: This category is for enlisted...
Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron.
1987-06-01
Security Classification) Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron 12. PERSONAL AUTHOR(S) Thomas J. Kopf...Because of the great number of possible scheduling alternatives, it is difficult to find an optimal solution to-the scheduling problem. Additionally...changes to the original schedule make it even more difficult to find an optimal solution. The emergence of capable microcompu- ters, decision support
McKenney, Jesse K; Wei, Wei; Hawley, Sarah; Auman, Heidi; Newcomb, Lisa F; Boyer, Hilary D; Fazli, Ladan; Simko, Jeff; Hurtado-Coll, Antonio; Troyer, Dean A; Tretiakova, Maria S; Vakar-Lopez, Funda; Carroll, Peter R; Cooperberg, Matthew R; Gleave, Martin E; Lance, Raymond S; Lin, Dan W; Nelson, Peter S; Thompson, Ian M; True, Lawrence D; Feng, Ziding; Brooks, James D
2016-11-01
Histologic grading remains the gold standard for prognosis in prostate cancer, and assessment of Gleason score plays a critical role in active surveillance management. We sought to optimize the prognostic stratification of grading and developed a method of recording and studying individual architectural patterns by light microscopic evaluation that is independent of standard Gleason grade. Some of the evaluated patterns are not assessed by current Gleason grading (eg, reactive stromal response). Individual histologic patterns were correlated with recurrence-free survival in a retrospective postradical prostatectomy cohort of 1275 patients represented by the highest-grade foci of carcinoma in tissue microarrays. In univariable analysis, fibromucinous rupture with varied epithelial complexity had a significantly lower relative risk of recurrence-free survival in cases graded as 3+4=7. Cases having focal "poorly formed glands," which could be designated as pattern 3+4=7, had lower risk than cribriform patterns with either small cribriform glands or expansile cribriform growth. In separate multivariable Cox proportional hazard analyses of both Gleason score 3+3=6 and 3+4=7 carcinomas, reactive stromal patterns were associated with worse recurrence-free survival. Decision tree models demonstrate potential regrouping of architectural patterns into categories with similar risk. In summary, we argue that Gleason score assignment by current consensus guidelines are not entirely optimized for clinical use, including active surveillance. Our data suggest that focal poorly formed gland and cribriform patterns, currently classified as Gleason pattern 4, should be in separate prognostic groups, as the latter is associated with worse outcome. Patterns with extravasated mucin are likely overgraded in a subset of cases with more complex epithelial bridges, whereas stromogenic cancers have a worse outcome than conveyed by Gleason grade alone. These findings serve as a foundation to facilitate optimization of histologic grading and strongly support incorporating reactive stroma into routine assessment.
Improving Information Security Risk Management
ERIC Educational Resources Information Center
Singh, Anand
2009-01-01
manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…
77 FR 35253 - Alternatives to the Use of External Credit Ratings in the Regulations of the OCC
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
... are investment grade; or (2) The obligations are approved by the OCC. The aggregate outstanding direct...-Frank Act) contains two directives to Federal agencies including the OCC. First, section 939A directs...), seeking comment on a proposal to revise its regulations pertaining to investment securities, securities...
ERIC Educational Resources Information Center
Diener, Marissa L.; Isabella, Russell A.; Behunin, Melissa G.; Wong, Maria S.
2008-01-01
Attachment relationships of first, third, and fifth graders with their mothers and fathers, and their associations with self-perceived and teacher-rated competence, were investigated. Children rated their attachment security with mothers and fathers using the Kerns security scale. Children's perceptions of academic and peer competence were…
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2011 CFR
2011-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2011-10-01 2011-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2013 CFR
2013-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2013-10-01 2013-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2014 CFR
2014-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2014-10-01 2014-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2012 CFR
2012-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2012-10-01 2012-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
46 CFR Appendix A to Part 404 - Ratemaking Analyses and Methodology
Code of Federal Regulations, 2010 CFR
2010-10-01
... preceding year's average annual rate of return for new issues of high grade corporate securities. (3) Assets... 46 Shipping 8 2010-10-01 2010-10-01 false Ratemaking Analyses and Methodology A Appendix A to Part 404 Shipping COAST GUARD (GREAT LAKES PILOTAGE), DEPARTMENT OF HOMELAND SECURITY GREAT LAKES PILOTAGE...
Multiobjective optimization of urban water resources: Moving toward more practical solutions
NASA Astrophysics Data System (ADS)
Mortazavi, Mohammad; Kuczera, George; Cui, Lijie
2012-03-01
The issue of drought security is of paramount importance for cities located in regions subject to severe prolonged droughts. The prospect of "running out of water" for an extended period would threaten the very existence of the city. Managing drought security for an urban water supply is a complex task involving trade-offs between conflicting objectives. In this paper a multiobjective optimization approach for urban water resource planning and operation is developed to overcome practically significant shortcomings identified in previous work. A case study based on the headworks system for Sydney (Australia) demonstrates the approach and highlights the potentially serious shortcomings of Pareto optimal solutions conditioned on short climate records, incomplete decision spaces, and constraints to which system response is sensitive. Where high levels of drought security are required, optimal solutions conditioned on short climate records are flawed. Our approach addresses drought security explicitly by identifying approximate optimal solutions in which the system does not "run dry" in severe droughts with expected return periods up to a nominated (typically large) value. In addition, it is shown that failure to optimize the full mix of interacting operational and infrastructure decisions and to explore the trade-offs associated with sensitive constraints can lead to significantly more costly solutions.
Open pit mining profit maximization considering selling stage and waste rehabilitation cost
NASA Astrophysics Data System (ADS)
Muttaqin, B. I. A.; Rosyidi, C. N.
2017-11-01
In open pit mining activities, determination of the cut-off grade becomes crucial for the company since the cut-off grade affects how much profit will be earned for the mining company. In this study, we developed a cut-off grade determination mode for the open pit mining industry considering the cost of mining, waste removal (rehabilitation) cost, processing cost, fixed cost, and selling stage cost. The main goal of this study is to develop a model of cut-off grade determination to get the maximum total profit. Secondly, this study is also developed to observe the model of sensitivity based on changes in the cost components. The optimization results show that the models can help mining company managers to determine the optimal cut-off grade and also estimate how much profit that can be earned by the mining company. To illustrate the application of the models, a numerical example and a set of sensitivity analysis are presented. From the results of sensitivity analysis, we conclude that the changes in the sales price greatly affects the optimal cut-off value and the total profit.
Design and validation of inert homemade explosive simulants for X-ray-based inspection systems
NASA Astrophysics Data System (ADS)
Faust, Anthony A.; Nacson, Sabatino; Koffler, Bruce; Bourbeau, Éric; Gagne, Louis; Laing, Robin; Anderson, C. J.
2014-05-01
Transport Canada (TC), the Canadian Armed Forces, and other public security agencies have an interest in the assessment of the potential utility of advanced explosives detection technologies to aid in the detection and interdiction of commercial grade, military grade, and homemade or improvised explosives (HME or IE). The availability of suitable, non-hazardous, non-toxic, explosive simulants is of concern when assessing the potential utility of such detection systems. Lack of simulants limits the training opportunities, and ultimately the detection probability, of security personnel using these systems. While simulants for commercial and military grade explosives are available for a wide variety of detection technologies, the design and production of materials to simulate improvised explosives has not kept pace with this emerging threat. Funded by TC and the Canadian Safety and Security Program, Defence Research and Development Canada (DRDC), Visiontec Systems, and Optosecurity engaged in an effort to develop inert, non-toxic Xray interrogation simulants for IE materials such as ammonium nitrate, potassium chlorate, and triacetone triperoxide. These simulants were designed to mimic key X-ray interrogation-relevant material properties of real improvised explosives, principally their bulk density and effective atomic number. Different forms of the simulants were produced and tested, simulating the different explosive threat formulations that could be encountered by front line security workers. These simulants comply with safety and stability requirements, and as best as possible match form and homogeneity. This paper outlines the research program, simulant design, and validation.
NASA Astrophysics Data System (ADS)
Amigo, R. C. R.; Vatanabe, S. L.; Silva, E. C. N.
2013-03-01
Previous works have been shown several advantages in using Functionally Graded Materials (FGMs) for the performance of flextensional devices, such as reduction of stress concentrations and gains in reliability. In this work, the FGM concept is explored in the design of graded devices by using the Topology Optimization Method (TOM), in order to determine optimal topologies and gradations of the coupled structures of piezoactuators. The graded pieces are manufactured by using the Spark Plasma Sintering (SPS) technique and are bonded to piezoelectric ceramics. The graded actuators are then tested by using a modular vibrometer system for measuring output displacements, in order to validate the numerical simulations. The technological path developed here represents the initial step toward the manufacturing of an integral piezoelectric device, constituted by piezoelectric and non-piezoelectric materials without bonding layers.
Koa-Wing, Michael; Nakagawa, Hiroshi; Luther, Vishal; Jamil-Copley, Shahnaz; Linton, Nick; Sandler, Belinda; Qureshi, Norman; Peters, Nicholas S; Davies, D Wyn; Francis, Darrel P; Jackman, Warren; Kanagaratnam, Prapa
2015-11-15
Ripple Mapping (RM) is designed to overcome the limitations of existing isochronal 3D mapping systems by representing the intracardiac electrogram as a dynamic bar on a surface bipolar voltage map that changes in height according to the electrogram voltage-time relationship, relative to a fiduciary point. We tested the hypothesis that standard approaches to atrial tachycardia CARTO™ activation maps were inadequate for RM creation and interpretation. From the results, we aimed to develop an algorithm to optimize RMs for future prospective testing on a clinical RM platform. CARTO-XP™ activation maps from atrial tachycardia ablations were reviewed by two blinded assessors on an off-line RM workstation. Ripple Maps were graded according to a diagnostic confidence scale (Grade I - high confidence with clear pattern of activation through to Grade IV - non-diagnostic). The RM-based diagnoses were corroborated against the clinical diagnoses. 43 RMs from 14 patients were classified as Grade I (5 [11.5%]); Grade II (17 [39.5%]); Grade III (9 [21%]) and Grade IV (12 [28%]). Causes of low gradings/errors included the following: insufficient chamber point density; window-of-interest<100% of cycle length (CL); <95% tachycardia CL mapped; variability of CL and/or unstable fiducial reference marker; and suboptimal bar height and scar settings. A data collection and map interpretation algorithm has been developed to optimize Ripple Maps in atrial tachycardias. This algorithm requires prospective testing on a real-time clinical platform. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Code of Federal Regulations, 2011 CFR
2011-01-01
... accordance with 5 U.S.C. 3321(b); (2) The reduction in grade or removal of an employee in the competitive... grade or removal of an employee in the competitive service serving in an appointment that requires no... administrative law judge; (7) An action taken under 5 U.S.C. 7532 in the interest of national security; (8) An...
ERIC Educational Resources Information Center
Bloxham, Sue; Boyd, Pete
2012-01-01
This article, using a student outcomes definition of academic standards, reports on academics' sense of standards as enacted through marking practices. Twelve lecturers from two UK universities were asked to "think aloud" as they graded written assignments followed by a semi-structured interview. The interview data were used to…
46 CFR 35.30-35 - Spark producing devices-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... water; (iv) Contain Grade E liquid and are closed and secured; or (v) Are spaces in which flammable... § 35.30-35 Spark producing devices—TB/ALL. (a) Where Grades A, B, C, and D liquid cargoes are involved... oil tanks, cargo pumprooms, or enclosed spaces immediately above or adjacent to bulk cargo tanks...
46 CFR 35.30-35 - Spark producing devices-TB/ALL.
Code of Federal Regulations, 2014 CFR
2014-10-01
... water; (iv) Contain Grade E liquid and are closed and secured; or (v) Are spaces in which flammable... § 35.30-35 Spark producing devices—TB/ALL. (a) Where Grades A, B, C, and D liquid cargoes are involved... oil tanks, cargo pumprooms, or enclosed spaces immediately above or adjacent to bulk cargo tanks...
46 CFR 35.30-35 - Spark producing devices-TB/ALL.
Code of Federal Regulations, 2013 CFR
2013-10-01
... water; (iv) Contain Grade E liquid and are closed and secured; or (v) Are spaces in which flammable... § 35.30-35 Spark producing devices—TB/ALL. (a) Where Grades A, B, C, and D liquid cargoes are involved... oil tanks, cargo pumprooms, or enclosed spaces immediately above or adjacent to bulk cargo tanks...
46 CFR 35.30-35 - Spark producing devices-TB/ALL.
Code of Federal Regulations, 2012 CFR
2012-10-01
... water; (iv) Contain Grade E liquid and are closed and secured; or (v) Are spaces in which flammable... § 35.30-35 Spark producing devices—TB/ALL. (a) Where Grades A, B, C, and D liquid cargoes are involved... oil tanks, cargo pumprooms, or enclosed spaces immediately above or adjacent to bulk cargo tanks...
46 CFR 35.30-35 - Spark producing devices-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
... water; (iv) Contain Grade E liquid and are closed and secured; or (v) Are spaces in which flammable... § 35.30-35 Spark producing devices—TB/ALL. (a) Where Grades A, B, C, and D liquid cargoes are involved... oil tanks, cargo pumprooms, or enclosed spaces immediately above or adjacent to bulk cargo tanks...
2014-09-01
component, which provides an important check against unfairness and the taint of undue influence. These officials stated that having decision makers...removals, suspensions of more than 14 days, reductions in grade or pay , furloughs of 30 days or less, performance-based removals or reductions in grade...denials of within-grade salary increases, reduction-in-force actions, and OPM suitability determinations. 70See Department of Navy v. Egan, 484 U.S
Food Insecurity and Rural Adolescent Personal Health, Home, and Academic Environments.
Shanafelt, Amy; Hearst, Mary O; Wang, Qi; Nanney, Marilyn S
2016-06-01
Food-insecure (FIS) adolescents struggle in school and with health and mental health more often than food-secure (FS) adolescents. Rural communities experience important disparities in health, but little is known about rural FIS adolescents. This study aims to describe select characteristics of rural adolescents by food-security status. Baseline analysis using data from a randomized trial to increase school breakfast participation (SBP) in rural Minnesota high schools. Students completed a survey regarding food security, characteristics, and home and school environments. Schools provided academic data and staff measured height and weight. Food security was dichotomized as FS vs FIS. Bivariate analysis, multivariate linear/logistic regression, and testing for interaction of food security and sex were performed. Food-insecure adolescents reported poorer health, less exercise, had lower grades, and higher SBP (p < .01). Food-insecure adolescents reported marginally fewer barriers (p = .06) and more benefits of breakfast (p = .05). All associations except reported benefits remained significant after adjustment. Interactions were identified with girls' grade point average and with boys' caloric and added sugar intake. Negative associations among food insecurity and positive youth development are identified in our sample. Policy and environmental strategies should address the complexities of these associations, including exploration of the role of school meals. © 2016, American School Health Association.
ERIC Educational Resources Information Center
Bauminger, Nirit; Kimhi-Kind, Ilanit
2008-01-01
This study examined the contribution of attachment security and emotion regulation (ER) to the explanation of social information processing (SIP) in middle childhood boys with learning disabilities (LD) and without LD matched on age and grade level. Children analyzed four social vignettes using Dodge's SIP model and completed the Kerns security…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-05
... principal and interest paid on the mortgage-backed securities. The Fund will earn or lose money on a... and repurchase, the Fund also earns money on the interest earned on the cash proceeds of the initial.... government securities, high-grade commercial paper, bank obligations, repurchase agreements, money market...
Measuring the Level of Security in the K-12 IT Environment in Southern California
ERIC Educational Resources Information Center
Brown, Brandon R.
2016-01-01
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Preliminary Impacts of SECURe PreK on Child- and Classroom-Level Outcomes
ERIC Educational Resources Information Center
Jones, Stephanie M.; Kargman, Marie; Kargman, Max; Bailey, Rebecca
2014-01-01
This paper presents initial results from a pilot evaluation of the pre-K component of a new school-based intervention strategy (Social, Emotional, and Cognitive Understanding and Regulation in education, SECURe) for pre-kindergarten through 3rd grade that is designed to build skills in social-emotional learning (focusing on executive function and…
SPOT: Optimization Tool for Network Adaptable Security
NASA Astrophysics Data System (ADS)
Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.
Column Network Study for a Planar Array Used with an Unattended Radar
1980-06-01
This will assist us In maintaining a current mailing list. Do not return this copy. Retain or destroy. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS...0.nt from Controlling Office) IS. SECURITY CLASS. (o1 this report) SaetVŕ ’UDNCLASSIFIED IS.. DECL ASSI FIC ATI ON,’OWN GRADING t, / -/ ./N N...installation costs are being studied. "(Coni’d) DD I1JANp73 1473k EDITION OF I NOV 65 IS OBSOLETE UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When
Security Police Officer Utilization Field, AFSCs 8111, 8116, 8121, and 8124.
1981-06-01
STATEMENT A M C Approved for public release 82 0 4 26Distribution Unlimited C=DCC=D= APS 8 1 X CECI I CODING INSTRUCTIONS -- -- -" Print the booklet copy...m == NAME (Last, First, Middle Initial) DATE OF BIRTH SEX YR NO DAY (MALE -"(11-34) (3s-5- rayo (41) PRESENT GRADE: SOCIAL SECURITY ACCOUNT NUMBER...Branch - 11. OIC Missile Support Branch - __m 12. OIC Weapons Systems Security , 4 8 CODE 99 X ~.t ! AFS 81XX -mmm -C - . .’ .9 - =, BACKGROUND
The Relation between DIBELS, Reading Comprehension, and Vocabulary in Urban First-Grade Students
ERIC Educational Resources Information Center
Riedel, Brant W.
2007-01-01
The relation between Dynamic Indicators of Basic Early Literacy Skills (DIBELS) and reading comprehension at the end of first grade and second grade was examined in a sample of 1,518 first-grade students from a large urban school district. Receiver Operating Characteristic (ROC) analyses were used to determine optimal DIBELS cut scores for…
Finite-Time Performance of Local Search Algorithms: Theory and Application
2010-06-10
security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official
Aydin, Omer; Buyukkaya, Ramazan; Hakyemez, Bahattin
2017-01-01
Susceptibility weighted imaging (SWI) is a velocity compensated, high-resolution three-dimensional (3D) spoiled gradient-echo sequence that uses magnitude and filtered-phase data. SWI seems to be a valuable tool for non-invasive evaluation of central nervous system gliomas. Relative cerebral blood volume (rCBV) ratio is one of the best noninvasive methods for glioma grading. Degree of intratumoral susceptibility signal (ITSS) on SWI correlates with rCBV ratio and histopathological grade. This study investigated the effectiveness of ITSS grading and rCBV ratio in preoperative assessment. Thirty-one patients (17 males and 14 females) with histopathogical diagnosis of glial tumor undergoing routine cranial MRI, SWI, and perfusion MRI examinations between October 2011 and July 2013 were retrospectively enrolled. All examinations were performed using 3T apparatus with 32-channel head coil. We used ITSS number for SWI grading. Correlations between SWI grade, rCBV ratio, and pathological grading were evaluated. ROC analysis was performed to determine the optimal rCBV ratio to distinguish between high-grade and low-grade glial tumors. There was a strong positive correlation between both pathological and SWI grading. We determined the optimal rCBV ratio to discriminate between high-grade and low-grade tumors to be 2.21. In conclusion, perfusion MRI and SWI using 3T MR and 32-channel head coil may provide useful information for preoperative glial tumor grading. SWI can be used as an accessory to perfusion MR technique in preoperative tumor grading.
Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J; Peña, Paola P; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J; Monteiro, Ligia; Lay, Keng-Ling
2013-01-01
The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the organization of children's behavior in naturalistic settings. Children (N = 547) were 10-72 months old. Child development experts (N = 81) from all countries provided definitions of optimal child secure base use. Findings indicate that children from all countries use their mother as a secure base. Children's organization of secure base behavior was modestly related to each other both within and across countries. Experts' descriptions of the optimally attached child were highly similar across cultures. © 2013 The Authors. Child Development © 2013 Society for Research in Child Development, Inc.
ERIC Educational Resources Information Center
Peker, Adem
2015-01-01
The purpose of this study is to analyze the perceptions of the psychological counselors about their roles and responsibilities related to school security. The study group of the study is formed of 12 psychological counselors working in different school grades in Erzurum city center. The study is formed in qualitative design. Three themes as…
2011-01-01
Background Food insecurity not only affects physical growth and health of children but also their intellectual development, school attendance and academic performance. However, most evidences are based on studies in high income countries. Although food insecurity is common in Ethiopia, to what extent it affects school attendance and educational attainment of adolescents is not explored. We hypothesized that food insecure adolescents would be more likely to be absent from school and have lower grades attained after 1 year compared to their food secure peers. Methods We used data from 2009 adolescents in the age group of 13-17 years from two consecutive surveys of a five year longitudinal family study in Southwest Ethiopia. A stratified random sampling was used to select participants. Regression analyses were used to compare school absenteeism and the highest grade attained after 1 year of follow-up in food secure and insecure adolescents. The analysis was adjusted for demographic factors, reported illness and workload. Results Significantly more (33.0%) food insecure adolescents were absent from school compared with their food secure peers (17.8%, P < 0.001). Multivariable logistic regression analyses showed that after adjusting for gender, place of residence and gender of the household head, adolescent food insecurity [OR 1.77 (1.34-2.33)], severe household food insecurity [OR 1.62 (1.27-2.06)], illness during the past one month before the survey [OR 2.26 (1.68-3.06)], the highest grade aspired to be completed by the adolescent [OR 0.92 (0.88-0.96)], and the number of days that the adolescent had to work per week [OR 1.16 (1.07-1.26)] were independent predictors of school absenteeism. Similarly after controlling for household income and gender of the household head, adolescent food insecurity(P < 0.001), severe household food insecurity(P < 0.001), illness during the last month(P < 0.001) and rural residence(P < 0.001) were inversely associated with highest grade attained, while age of the adolescent(P < 0.001), the highest grade intended to be completed(P < 0.001) and residence in semi urban area(P < 0.001) were positively associated with the highest grade attained. Conclusions Adolescent and household food insecurity are positively associated with school absenteeism and a lower educational attainment. Programs aiming to achieve universal access to primary education in food insecure environments should integrate interventions to ensure food security of adolescents. PMID:21477343
Belachew, Tefera; Hadley, Craig; Lindstrom, David; Gebremariam, Abebe; Lachat, Carl; Kolsteren, Patrick
2011-04-10
Food insecurity not only affects physical growth and health of children but also their intellectual development, school attendance and academic performance. However, most evidences are based on studies in high income countries. Although food insecurity is common in Ethiopia, to what extent it affects school attendance and educational attainment of adolescents is not explored. We hypothesized that food insecure adolescents would be more likely to be absent from school and have lower grades attained after 1 year compared to their food secure peers. We used data from 2009 adolescents in the age group of 13-17 years from two consecutive surveys of a five year longitudinal family study in Southwest Ethiopia. A stratified random sampling was used to select participants. Regression analyses were used to compare school absenteeism and the highest grade attained after 1 year of follow-up in food secure and insecure adolescents. The analysis was adjusted for demographic factors, reported illness and workload. Significantly more (33.0%) food insecure adolescents were absent from school compared with their food secure peers (17.8%, P < 0.001). Multivariable logistic regression analyses showed that after adjusting for gender, place of residence and gender of the household head, adolescent food insecurity [OR 1.77 (1.34-2.33)], severe household food insecurity [OR 1.62 (1.27-2.06)], illness during the past one month before the survey [OR 2.26 (1.68-3.06)], the highest grade aspired to be completed by the adolescent [OR 0.92 (0.88-0.96)], and the number of days that the adolescent had to work per week [OR 1.16 (1.07-1.26)] were independent predictors of school absenteeism. Similarly after controlling for household income and gender of the household head, adolescent food insecurity(P < 0.001), severe household food insecurity(P < 0.001), illness during the last month(P < 0.001) and rural residence(P < 0.001) were inversely associated with highest grade attained, while age of the adolescent(P < 0.001), the highest grade intended to be completed(P < 0.001) and residence in semi urban area(P < 0.001) were positively associated with the highest grade attained. Adolescent and household food insecurity are positively associated with school absenteeism and a lower educational attainment. Programs aiming to achieve universal access to primary education in food insecure environments should integrate interventions to ensure food security of adolescents.
Electronic Warfare Test and Evaluation (Essai et evaluation en matiere de guerre electronique)
2012-12-01
Largest known chamber is 80 x 76 x 21 m. Shielding and quiet zones Usually ≥100 dB over at least 0.5 – 18 GHz. TEMPEST grade. Quiet zones: one or...accommodated as an afterthought. The highest level of RF/EO/IR/UV security control is offered by TEMPEST -grade aircraft-sized anechoic chambers. 6.9.7 SUT...aircraft-sized, RF- and laser-shielded anechoic chamber, shielded rooms, and an EW Sub-System Test Laboratory, all TEMPEST grade. It is co-located with the
Channual, Stephanie; Tan, Nelly; Siripongsakun, Surachate; Lassman, Charles; Lu, David S; Raman, Steven S
2015-09-01
The objective of our study was to determine quantitative differences to differentiate low-grade from high-grade dysplastic nodules (DNs) and low-grade from high-grade hepatocellular carcinomas (HCCs) using gadoxetate disodium-enhanced MRI. A retrospective study of 149 hepatic nodules in 127 consecutive patients who underwent gadoxetic acid-enhanced MRI was performed. MRI signal intensities (SIs) of the representative lesion ROI and of ROIs in liver parenchyma adjacent to the lesion were measured on unenhanced T1-weighted imaging and on dynamic contrast-enhanced MRI in the arterial, portal venous, delayed, and hepatobiliary phases. The relative SI of the lesion was calculated for each phase as the relative intensity ratio as follows: [mass SI / liver SI]. Of the 149 liver lesions, nine (6.0%) were low-grade DNs, 21 (14.1%) were high-grade DNs, 83 (55.7%) were low-grade HCCs, and 36 (24.2%) were high-grade HCCs. The optimal cutoffs for differentiating low-grade DNs from high-grade DNs and HCCs were an unenhanced to arterial SI of ≥ 0 or a relative SI on T2-weighted imaging of ≤ 1.5, with a positive predictive value (PPV) of 99.2% and accuracy of 88.6%. The optimal cutoffs for differentiating low-grade HCCs from high-grade HCCs were a relative hepatobiliary SI of ≤ 0.5 or a relative T2 SI of ≥ 1.5, with a PPV of 81.0% and an accuracy of 60.5%. Gadoxetate disodium-enhanced MRI allows quantitative differentiation of low-grade DNs from high-grade DNs and HCCs, but significant overlap was seen between low-grade HCCs and high-grade HCCs.
NASA Astrophysics Data System (ADS)
Montealegre Rubio, Wilfredo; Paulino, Glaucio H.; Nelli Silva, Emilio Carlos
2011-02-01
Tailoring specified vibration modes is a requirement for designing piezoelectric devices aimed at dynamic-type applications. A technique for designing the shape of specified vibration modes is the topology optimization method (TOM) which finds an optimum material distribution inside a design domain to obtain a structure that vibrates according to specified eigenfrequencies and eigenmodes. Nevertheless, when the TOM is applied to dynamic problems, the well-known grayscale or intermediate material problem arises which can invalidate the post-processing of the optimal result. Thus, a more natural way for solving dynamic problems using TOM is to allow intermediate material values. This idea leads to the functionally graded material (FGM) concept. In fact, FGMs are materials whose properties and microstructure continuously change along a specific direction. Therefore, in this paper, an approach is presented for tailoring user-defined vibration modes, by applying the TOM and FGM concepts to design functionally graded piezoelectric transducers (FGPT) and non-piezoelectric structures (functionally graded structures—FGS) in order to achieve maximum and/or minimum vibration amplitudes at certain points of the structure, by simultaneously finding the topology and material gradation function. The optimization problem is solved by using sequential linear programming. Two-dimensional results are presented to illustrate the method.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65326; File No. SR-CME-2011-06] Self-Regulatory... termination) CDX North America Investment 10 20 Jun 2013, 20 Jun Grade (CDX.NA.IG). 2015, 20 Jun 2018. CDX North America Investment 11 20 Dec 2011, 20 Dec Grade (CDX.NA.IG). 2013, 20 Dec 2015, 20 Dec 2018. CDX...
2011-06-01
aerospace grade carbon fibre reinforced plastic (CFRP) prepreg . RELEASE LIMITATION Approved for public release UNCLASSIFIED Report...arrays manufactured from aerospace grade carbon fibre reinforced plastic (CFRP) prepreg . 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...CFRP) prepreg tape and fabric. This report details Version 1.0 of a Standard Operating Procedure for this manufacture. UNCLASSIFIED
Family Life and Human Development: Sample Units, K-6. Revised.
ERIC Educational Resources Information Center
Prince George's County Public Schools, Upper Marlboro, MD.
Sample unit outlines, designed for kindergarten through grade six, define the content, activities, and assessment tasks appropriate to specific grade levels. The units have been extracted from the Board-approved curriculum, Health Education: The Curricular Approach to Optimal Health. The instructional guidelines for grade one are: describing a…
[East Syracuse-Minoa Schools Environmental Education Materials, Elementary Package, Grade 1-Grade 5.
ERIC Educational Resources Information Center
East Syracuse - Minoa Central Schools, East Syracuse, NY.
This series of five environmental education units is designed for use in grades 1-5. The units are designed around the concepts of survival, interdependence, scarcity, recyclement, rights vs. responsibility, planning, valuing, social forces, and optimism. Each unit is further developed around environmental generalizations (subconcepts),…
Co-Optimization of Fuels & Engines: Misfueling Mitigation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sluder, C. Scott; Moriarty, Kristi; Jehlik, Forrest
This report examines diesel/gasoline misfueling, leaded/unleaded gasoline misfueling, E85/E15/E10 misfueling, and consumer selection of regular grade fuel over premium grade fuel in an effort to evaluate misfueling technologies that may be needed to support the introduction of vehicles optimized for a new fuel in the marketplace. This is one of a series of reports produced as a result of the Co-Optimization of Fuels & Engines (Co-Optima) project, a Department of Energy-sponsored multi-agency project to accelerate the introduction of affordable, scalable, and sustainable biofuels and high-efficiency, low-emission vehicle engines.
Tyser, Jason; Scott, Walter D; Readdy, Tucker; McCrea, Sean M
2014-03-01
American Indian researchers and scholars have emphasized the importance of identifying variables that promote resilience and protect against the development of psychopathology in American Indian youth. The present study examined the role of self-regulation, specifically goal characteristics (i.e., goal self-efficacy, goal specificity, intrinsic vs. extrinsic motivation, and goal conflict) and dispositional optimism, as well as cultural identity and self-reported academic grades in the depressive experiences of American Indian youth from a North American plains tribe. One hundred and sixty-four participants (53% female) completed measures of goal representations, cultural identity, dispositional optimism, academic performance, and depressive symptoms. Results supported a model in which higher goal self-efficacy, American Indian cultural identity, grade point average, and dispositional optimism each significantly predicted fewer depressive symptoms. Moreover, grade point average and goal self-efficacy had both direct and indirect (through dispositional optimism) relationships with depressive symptoms. Our findings underscore the importance of cognitive self-regulatory processes and cultural identity in the depressive experiences for these American Indian youth and may have implications for youth interventions attempting to increase resiliency and decrease risk for depressive symptoms.
Zhang, Lin; Yin, Na; Fu, Xiong; Lin, Qiaomin; Wang, Ruchuan
2017-01-01
With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR). This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service. PMID:28282894
Pakvasa, Mitali Atul; Saroha, Vivek; Patel, Ravi Mangal
2018-06-01
Caffeine reduces the risk of bronchopulmonary dysplasia (BPD). Optimizing caffeine use could increase therapeutic benefit. We performed a systematic-review and random-effects meta-analysis of studies comparing different timing of initiation and dose of caffeine on the risk of BPD. Earlier initiation, compared to later, was associated with a decreased risk of BPD (5 observational studies; n = 63,049, adjusted OR 0.69; 95% CI 0.64-0.75, GRADE: low quality). High-dose caffeine, compared to standard-dose, was associated with a decreased risk of BPD (3 randomized trials, n = 432, OR 0.65; 95% CI 0.43-0.97; GRADE: low quality). Higher quality evidence is needed to guide optimal caffeine use. Copyright © 2018 Elsevier Inc. All rights reserved.
Analysis of Photothermal Characterization of Layered Materials: Design of Optimal Experiments
NASA Technical Reports Server (NTRS)
Cole, Kevin D.
2003-01-01
In this paper numerical calculations are presented for the steady-periodic temperature in layered materials and functionally-graded materials to simulate photothermal methods for the measurement of thermal properties. No laboratory experiments were performed. The temperature is found from a new Green s function formulation which is particularly well-suited to machine calculation. The simulation method is verified by comparison with literature data for a layered material. The method is applied to a class of two-component functionally-graded materials and results for temperature and sensitivity coefficients are presented. An optimality criterion, based on the sensitivity coefficients, is used for choosing what experimental conditions will be needed for photothermal measurements to determine the spatial distribution of thermal properties. This method for optimal experiment design is completely general and may be applied to any photothermal technique and to any functionally-graded material.
Yau, Her-Terng; Hung, Tzu-Hsiang; Hsieh, Chia-Chun
2012-01-01
This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.
Making the Grade: How Learner Engagement Changes after Passing a Course
ERIC Educational Resources Information Center
Lang, David; Kindel, Alex; Domingue, Ben; Paepcke, Andreas
2017-01-01
Understanding how individuals interact with a course after receiving a passing grade could have important implications for course design. If individuals become disengaged after passing a class, then this may raise questions about optimal ordering of content, course difficulty, and grade transparency. Using a person fixed effects model, we analyze…
[Toronto clinical scoring system in diabetic peripheral neuropathy].
Liu, Feng; Mao, Ji-Ping; Yan, Xiang
2008-12-01
To evaluate the application value of Toronto clinical scoring system (TCSS) and its grading of neuropathy for diabetic peripheral neuropathy (DPN), and to explore the relationship between TCSS grading of neuropathy and the grading of diabetic nephropathy and diabetic retinopathy. A total of 209 patients of Type 2 diabtes (T2DM) underwent TCSS. Taking electrophysiological examination as a gold standard for diagnosing DPN, We compared the results of TCSS score > or = 6 with electrophysiological examination, and tried to select the optimal cut-off points of TCSS. The corresponding accuracy, sensitivity, and specificity of TCSS score > or = 6 were 76.6%, 77.2%, and 75.6%, respectively.The Youden index and Kappa were 0.53 and 0.52, which implied TCSS score > or = 6 had a moderate consistency with electrophysiological examination. There was a linear positive correlation between TCSS grading of neuropathy and the grading of diabetic nephropathy and diabetic retinopathy (P<0.05). The optimal cut-off point was 5 or 6 among these patients. TCSS is reliable in diagnosing DPN and its grading of neuropathy has clinical value.
Optical Enhancement in Optoelectronic Devices Using Refractive Index Grading Layers.
Lee, Illhwan; Park, Jae Yong; Gim, Seungo; Kim, Kisoo; Cho, Sang-Hwan; Choi, Chung Sock; Song, Seung-Yong; Lee, Jong-Lam
2016-02-10
We enhanced the optical transmittance of a multilayer barrier film by inserting a refractive index grading layer (RIGL). The result indicates that the Fresnel reflection, induced by the difference of refractive indices between Si(x)N(y) and SiO2, is reduced by the RIGL. To eliminate the Fresnel reflection while maintaining high transmittance, the optimized design of grading structures with the RIGL was conducted using an optical simulator. With the RIGL, we achieved averaged transmittance in the visible wavelength region by 89.6%. It is found that the optimized grading structure inserting the multilayer barrier film has a higher optical transmittance (89.6%) in the visible region than that of a no grading sample (82.6%). Furthermore, luminance is enhanced by 14.5% (from 10,190 to 11,670 cd m(-2) at 30 mA cm(-2)) when the grading structure is applied to organic light-emitting diodes. Finally, the results offer new opportunities in development of multilayer barrier films, which assist industrialization of very cost-effective flexible organic electronic devices.
Boccaccio, Antonio; Uva, Antonio Emmanuele; Fiorentino, Michele; Mori, Giorgio; Monno, Giuseppe
2016-01-01
Functionally Graded Scaffolds (FGSs) are porous biomaterials where porosity changes in space with a specific gradient. In spite of their wide use in bone tissue engineering, possible models that relate the scaffold gradient to the mechanical and biological requirements for the regeneration of the bony tissue are currently missing. In this study we attempt to bridge the gap by developing a mechanobiology-based optimization algorithm aimed to determine the optimal graded porosity distribution in FGSs. The algorithm combines the parametric finite element model of a FGS, a computational mechano-regulation model and a numerical optimization routine. For assigned boundary and loading conditions, the algorithm builds iteratively different scaffold geometry configurations with different porosity distributions until the best microstructure geometry is reached, i.e. the geometry that allows the amount of bone formation to be maximized. We tested different porosity distribution laws, loading conditions and scaffold Young's modulus values. For each combination of these variables, the explicit equation of the porosity distribution law-i.e the law that describes the pore dimensions in function of the spatial coordinates-was determined that allows the highest amounts of bone to be generated. The results show that the loading conditions affect significantly the optimal porosity distribution. For a pure compression loading, it was found that the pore dimensions are almost constant throughout the entire scaffold and using a FGS allows the formation of amounts of bone slightly larger than those obtainable with a homogeneous porosity scaffold. For a pure shear loading, instead, FGSs allow to significantly increase the bone formation compared to a homogeneous porosity scaffolds. Although experimental data is still necessary to properly relate the mechanical/biological environment to the scaffold microstructure, this model represents an important step towards optimizing geometry of functionally graded scaffolds based on mechanobiological criteria.
Philip A. Araman; Janice K. Wiedenbeck
1995-01-01
Automated lumber grading and yield optimization using computer controlled saws will be plausible for hardwoods if and when lumber scanning systems can reliably identify all defects by type. Existing computer programs could then be used to grade the lumber, identify the best cut-up solution, and control the sawing machines. The potential value of a scanning grading...
40 CFR 86.524-78 - Carbon dioxide analyzer calibration.
Code of Federal Regulations, 2012 CFR
2012-07-01
... operation. Adjust the analyzer to optimize performance. (2) Zero the carbon dioxide analyzer with either zero grade air or zero grade nitrogen. (3) Calibrate on each normally used operating range with carbon...
40 CFR 86.524-78 - Carbon dioxide analyzer calibration.
Code of Federal Regulations, 2013 CFR
2013-07-01
... operation. Adjust the analyzer to optimize performance. (2) Zero the carbon dioxide analyzer with either zero grade air or zero grade nitrogen. (3) Calibrate on each normally used operating range with carbon...
40 CFR 86.524-78 - Carbon dioxide analyzer calibration.
Code of Federal Regulations, 2014 CFR
2014-07-01
... operation. Adjust the analyzer to optimize performance. (2) Zero the carbon dioxide analyzer with either zero grade air or zero grade nitrogen. (3) Calibrate on each normally used operating range with carbon...
32 CFR 728.77 - Secretarial designees.
Code of Federal Regulations, 2014 CFR
2014-07-01
... depdendents must include: (i) Full name, social security number, grade or rate, branch or service, and date... members of the Uniformed Services University of Health Sciences (USUHS). They have been provided...
PET AND SPECT STUDIES IN CHILDREN WITH HEMISPHERIC LOW-GRADE GLIOMAS
Juhász, Csaba; Bosnyák, Edit
2016-01-01
Molecular imaging is playing an increasing role in the pre-treatment evaluation of low-grade gliomas. While glucose positron emission tomography (PET) can be helpful to differentiate low-grade from high-grade tumors, PET imaging with amino acid radiotracers has several advantages, such as better differentiation between tumors and non-tumorous lesions, optimized biopsy targeting and improved detection of tumor recurrence. This review provides a brief overview of single photon emission computed tomography (SPECT) studies followed by a more detailed review of clinical applications of glucose and amino acid PET imaging in low-grade hemispheric gliomas. We discuss key differences in the performance of the most commonly utilized PET radiotracers and highlight the advantage of PET/MRI fusion to obtain optimal information about tumor extent, heterogeneity and metabolism. Recent data also suggest that simultaneous acquisition of PET/MR images and the combination of advanced MRI techniques with quantitative PET can further improve the pre- and post-treatment evaluation of pediatric brain tumors. PMID:27659825
PET and SPECT studies in children with hemispheric low-grade gliomas.
Juhász, Csaba; Bosnyák, Edit
2016-10-01
Molecular imaging is playing an increasing role in the pretreatment evaluation of low-grade gliomas. While glucose positron emission tomography (PET) can be helpful to differentiate low-grade from high-grade tumors, PET imaging with amino acid radiotracers has several advantages, such as better differentiation between tumors and non-tumorous lesions, optimized biopsy targeting, and improved detection of tumor recurrence. This review provides a brief overview of single-photon emission computed tomography (SPECT) studies followed by a more detailed review of the clinical applications of glucose and amino acid PET imaging in low-grade hemispheric gliomas. We discuss key differences in the performance of the most commonly utilized PET radiotracers and highlight the advantage of PET/MRI fusion to obtain optimal information about tumor extent, heterogeneity, and metabolism. Recent data also suggest that simultaneous acquisition of PET/MR images and the combination of advanced MRI techniques with quantitative PET can further improve the pretreatment and post-treatment evaluation of pediatric brain tumors.
2016-07-27
disclosed here will benefit the area of explosives trace detection for counterterrorism and forensics . INTRODUCTION The military-grade...plasticizer formulation.[4] As a result, methods to detect MHN, SHN, and XPN should be pursued for the same security and forensics applications as...with ion mobility mass spectrometry (IMS) provide direct detection of molecular ions,[8] and thus are preferred for most security and forensic
DoD Personnel Security Program
1987-01-01
Baltimore, Maryland 21203 Message Address: DIS PIC BALTIMORE MD/ /D0640 The request will include subject’s name, grade, social security number, date and...requests for initial investigations will be submitted to PIC regardless of their urgency. If, however, there is an urgent need for a postadjudication...investigation, or the mailing of a request to PIC for initia- tion of a postadjudication case would prejudice timely pursuit of investigative action, the
ERIC Educational Resources Information Center
Al-Edwan, Zaid Suleiman
2016-01-01
The present study aimed at exploring the concepts of the security education in the textbooks of the national and civic education of the higher primary stage in Jordan. It adopted the descriptive analytical method. The study sample consisted of the textbooks of the national and civic education for the basic eighth, ninth and tenth grades. To…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.
1997-11-01
This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSImore » addressed some of these issues to create a more manageable public key infrastructure.« less
Nuclear Security: Target Analysis-rev
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Surinder Paul; Gibbs, Philip W.; Bultz, Garl A.
2014-03-01
The objectives of this presentation are to understand target identification, including roll-up and protracted theft; evaluate target identification in the SNRI; recognize the target characteristics and consequence levels; and understand graded safeguards.
A particle swarm-based algorithm for optimization of multi-layered and graded dental ceramics.
Askari, Ehsan; Flores, Paulo; Silva, Filipe
2018-01-01
The thermal residual stresses (TRSs) generated owing to the cooling down from the processing temperature in layered ceramic systems can lead to crack formation as well as influence the bending stress distribution and the strength of the structure. The purpose of this study is to minimize the thermal residual and bending stresses in dental ceramics to enhance their strength as well as to prevent the structure failure. Analytical parametric models are developed to evaluate thermal residual stresses in zirconia-porcelain multi-layered and graded discs and to simulate the piston-on-ring test. To identify optimal designs of zirconia-based dental restorations, a particle swarm optimizer is also developed. The thickness of each interlayer and compositional distribution are referred to as design variables. The effect of layers number constituting the interlayer between two based materials on the performance of graded prosthetic systems is also investigated. The developed methodology is validated against results available in literature and a finite element model constructed in the present study. Three different cases are considered to determine the optimal design of graded prosthesis based on minimizing (a) TRSs; (b) bending stresses; and (c) both TRS and bending stresses. It is demonstrated that each layer thickness and composition profile have important contributions into the resulting stress field and magnitude. Copyright © 2017 Elsevier Ltd. All rights reserved.
The influence of lumber grade on machine productivity in the rough mill
Philip H. Steele; Jan Wiedenbeck; Rubin Shmulsky; Anura Perera; Anura Perera
1999-01-01
Lumber grade effect on hardwood-part processing time was investigated with a digitally described lumber database in conjunction with a crosscut-first rough mill yield optimization simulator. In this study, the digital lumber sample was subdivided into five hardwood lumber grades. Three cutting bills with varying degrees of difficulty were Cut." The three cutting...
[Ecological security early-warning in Zhoushan Islands based on variable weight model].
Zhou, Bin; Zhong, Lin-sheng; Chen, Tian; Zhou, Rui
2015-06-01
Ecological security early warning, as an important content of ecological security research, is of indicating significance in maintaining regional ecological security. Based on driving force, pressure, state, impact and response (D-P-S-I-R) framework model, this paper took Zhoushan Islands in Zhejiang Province as an example to construct the ecological security early warning index system, test degrees of ecological security early warning of Zhoushan Islands from 2000 to 2012 by using the method of variable weight model, and forecast ecological security state of 2013-2018 by Markov prediction method. The results showed that the variable weight model could meet the study needs of ecological security early warning of Zhoushan Islands. There was a fluctuant rising ecological security early warning index from 0.286 to 0.484 in Zhoushan Islands between year 2000 and 2012, in which the security grade turned from "serious alert" into " medium alert" and the indicator light turned from "orange" to "yellow". The degree of ecological security warning was "medium alert" with the light of "yellow" for Zhoushan Islands from 2013 to 2018. These findings could provide a reference for ecological security maintenance of Zhoushan Islands.
Hyperpolarized 13C MR Markers of Renal Tumor Aggressiveness
2013-10-01
slice cultures , bioreactor 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON...tumors from RCCs, and low grade from high grade RCCs using human TSCs cultured in a bioreactor . Aim 2:Identify HP 13C metabolic markers that...and cells over 48 hours using fluorescent dyes incubated with TSCs 1 Aim 1: Ex vivo bioreactor experiments We first acquired phosphorous-31 (31P
How Family Status and Social Security Claiming Options Shape Optimal Life Cycle Portfolios
Hubener, Andreas; Maurer, Raimond; Mitchell, Olivia S.
2017-01-01
We show how optimal household decisions regarding work, retirement, saving, portfolio allocations, and life insurance are shaped by the complex financial options embedded in U.S. Social Security rules and uncertain family transitions. Our life cycle model predicts sharp consumption drops on retirement, an age-62 peak in claiming rates, and earlier claiming by wives versus husbands and single women. Moreover, life insurance is mainly purchased on men’s lives. Our model, which takes Social Security rules seriously, generates wealth and retirement outcomes that are more consistent with the data, in contrast to earlier and less realistic models. PMID:28659659
Wang, Jie-Sheng; Han, Shuang
2015-01-01
For predicting the key technology indicators (concentrate grade and tailings recovery rate) of flotation process, a feed-forward neural network (FNN) based soft-sensor model optimized by the hybrid algorithm combining particle swarm optimization (PSO) algorithm and gravitational search algorithm (GSA) is proposed. Although GSA has better optimization capability, it has slow convergence velocity and is easy to fall into local optimum. So in this paper, the velocity vector and position vector of GSA are adjusted by PSO algorithm in order to improve its convergence speed and prediction accuracy. Finally, the proposed hybrid algorithm is adopted to optimize the parameters of FNN soft-sensor model. Simulation results show that the model has better generalization and prediction accuracy for the concentrate grade and tailings recovery rate to meet the online soft-sensor requirements of the real-time control in the flotation process. PMID:26583034
2015-06-01
words) Attempting different approaches to explore the best practice of optimizing mobile security and productivity is necessary to improve the...INTENTIONALLY LEFT BLANK iv ABSTRACT Attempting different approaches to explore the best practice of optimizing mobile security and productivity is...incredible kindness and unfathomable generosity. I am grateful to have watched Super Bowl XLIX in your living room, washed dirty clothes in your laundry room
Optimized decoy state QKD for underwater free space communication
NASA Astrophysics Data System (ADS)
Lopes, Minal; Sarwade, Nisha
Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with underwater free space communication model. The attenuation of photons, quantum bit error rate and the sifted key generation rate of underwater quantum communication is obtained with vector radiative transfer theory and Monte Carlo method. It is observed from the simulations that optimized decoy state QKD evidently enhances the underwater secret key transmission distance as well as secret key rates.
Realization and optimization of AES algorithm on the TMS320DM6446 based on DaVinci technology
NASA Astrophysics Data System (ADS)
Jia, Wen-bin; Xiao, Fu-hai
2013-03-01
The application of AES algorithm in the digital cinema system avoids video data to be illegal theft or malicious tampering, and solves its security problems. At the same time, in order to meet the requirements of the real-time, scene and transparent encryption of high-speed data streams of audio and video in the information security field, through the in-depth analysis of AES algorithm principle, based on the hardware platform of TMS320DM6446, with the software framework structure of DaVinci, this paper proposes the specific realization methods of AES algorithm in digital video system and its optimization solutions. The test results show digital movies encrypted by AES128 can not play normally, which ensures the security of digital movies. Through the comparison of the performance of AES128 algorithm before optimization and after, the correctness and validity of improved algorithm is verified.
Preliminary Full-Scale Tests of the Center for Automated Processing of Hardwoods' Auto-Image
Philip A. Araman; Janice K. Wiedenbeck
1995-01-01
Automated lumber grading and yield optimization using computer controlled saws will be plausible for hardwoods if and when lumber scanning systems can reliably identify all defects by type. Existing computer programs could then be used to grade the lumber, identify the best cut-up solution, and control the sawing machines. The potential value of a scanning grading...
Automated grading, upgrading, and cuttings prediction of surfaced dry hardwood lumber
Sang-Mook Lee; Phil Araman; A.Lynn Abbott; Matthew F. Winn
2010-01-01
This paper concerns the scanning, sawing, and grading of kiln-dried hardwood lumber. A prototype system is described that uses laser sources and a video camera to scan boards. The system automatically detects defects and wane, searches for optimal sawing solutions, and then estimates the grades of the boards that would result. The goal is to derive maximum commercial...
75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... recommended laboratory critical infrastructure security standards in these areas; and 5. other emerging policy... legitimate activities. (c) Understanding that research and laboratory work on BSAT is essential to both... of the SAR that would establish security standards specific to Tier 1 agents and toxins. (b) The...
Sriram, Vinay K; Montgomery, Doug
2017-07-01
The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.
7 CFR 54.18 - Custody of identification devices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...
7 CFR 54.18 - Custody of identification devices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...
7 CFR 54.18 - Custody of identification devices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...
7 CFR 54.18 - Custody of identification devices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...
7 CFR 54.18 - Custody of identification devices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...
NASA Astrophysics Data System (ADS)
Zhang, Yanjiao; Lai, Xiaoping; Zeng, Qiuyao; Li, Linfang; Lin, Lin; Li, Shaoxin; Liu, Zhiming; Su, Chengkang; Qi, Minni; Guo, Zhouyi
2018-03-01
This study aims to classify low-grade and high-grade bladder cancer (BC) patients using serum surface-enhanced Raman scattering (SERS) spectra and support vector machine (SVM) algorithms. Serum SERS spectra are acquired from 88 serum samples with silver nanoparticles as the SERS-active substrate. Diagnostic accuracies of 96.4% and 95.4% are obtained when differentiating the serum SERS spectra of all BC patients versus normal subjects and low-grade versus high-grade BC patients, respectively, with optimal SVM classifier models. This study demonstrates that the serum SERS technique combined with SVM has great potential to noninvasively detect and classify high-grade and low-grade BC patients.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.
Zhang, Guomei; Sun, Hao
2016-12-16
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks
Zhang, Guomei; Sun, Hao
2016-01-01
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282
Cyber Security Audit and Attack Detection Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, Dale
2012-05-31
This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.
Airport security inspection process model and optimization based on GSPN
NASA Astrophysics Data System (ADS)
Mao, Shuainan
2018-04-01
Aiming at the efficiency of airport security inspection process, Generalized Stochastic Petri Net is used to establish the security inspection process model. The model is used to analyze the bottleneck problem of airport security inspection process. The solution to the bottleneck is given, which can significantly improve the efficiency and reduce the waiting time by adding the place for people to remove their clothes and the X-ray detector.
Kudo, Kohsuke; Uwano, Ikuko; Hirai, Toshinori; Murakami, Ryuji; Nakamura, Hideo; Fujima, Noriyuki; Yamashita, Fumio; Goodwin, Jonathan; Higuchi, Satomi; Sasaki, Makoto
2017-04-10
The purpose of the present study was to compare different software algorithms for processing DSC perfusion images of cerebral tumors with respect to i) the relative CBV (rCBV) calculated, ii) the cutoff value for discriminating low- and high-grade gliomas, and iii) the diagnostic performance for differentiating these tumors. Following approval of institutional review board, informed consent was obtained from all patients. Thirty-five patients with primary glioma (grade II, 9; grade III, 8; and grade IV, 18 patients) were included. DSC perfusion imaging was performed with 3-Tesla MRI scanner. CBV maps were generated by using 11 different algorithms of four commercially available software and one academic program. rCBV of each tumor compared to normal white matter was calculated by ROI measurements. Differences in rCBV value were compared between algorithms for each tumor grade. Receiver operator characteristics analysis was conducted for the evaluation of diagnostic performance of different algorithms for differentiating between different grades. Several algorithms showed significant differences in rCBV, especially for grade IV tumors. When differentiating between low- (II) and high-grade (III/IV) tumors, the area under the ROC curve (Az) was similar (range 0.85-0.87), and there were no significant differences in Az between any pair of algorithms. In contrast, the optimal cutoff values varied between algorithms (range 4.18-6.53). rCBV values of tumor and cutoff values for discriminating low- and high-grade gliomas differed between software packages, suggesting that optimal software-specific cutoff values should be used for diagnosis of high-grade gliomas.
2016-11-01
importance of myeloid derived ID2/VEGFR2 signaling in low-grade to high-grade glioma transformation . 15. SUBJECT TERMS Glioma, Pediatric, bone-marrow...derived-cells, endothelial, mesenchymal, myeloid, hematopoietic, differentiation, malignant, transformation , VEGFR2, ID2. 16. SECURITY CLASSIFICATION OF...subsequent recruitment, in order to suppress the malignant transformation of gliomas. In this project, we have initiated the study of BMDCs with RCAS and
NASA Astrophysics Data System (ADS)
Mohammadi, Hadi
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that MOT optimizes the process of implementing SCPMP in academic workstations.
An IPSO-SVM algorithm for security state prediction of mine production logistics system
NASA Astrophysics Data System (ADS)
Zhang, Yanliang; Lei, Junhui; Ma, Qiuli; Chen, Xin; Bi, Runfang
2017-06-01
A theoretical basis for the regulation of corporate security warning and resources was provided in order to reveal the laws behind the security state in mine production logistics. Considering complex mine production logistics system and the variable is difficult to acquire, a superior security status predicting model of mine production logistics system based on the improved particle swarm optimization and support vector machine (IPSO-SVM) is proposed in this paper. Firstly, through the linear adjustments of inertia weight and learning weights, the convergence speed and search accuracy are enhanced with the aim to deal with situations associated with the changeable complexity and the data acquisition difficulty. The improved particle swarm optimization (IPSO) is then introduced to resolve the problem of parameter settings in traditional support vector machines (SVM). At the same time, security status index system is built to determine the classification standards of safety status. The feasibility and effectiveness of this method is finally verified using the experimental results.
Optimizing Flight Schedules by an Automated Decision Support System
2014-03-01
18 Figure 5-Equation-1 of Grading Pilot-Mission Matches ( Yavuz , 2010) .......................... 22 Figure 6-Equation...2 of Grading Pilot-Mission Matches ( Yavuz , 2010) .......................... 22 Figure 7-Implementation of GRASP ( Yavuz , 2010...23 Figure 8-Overall Process ( Yavuz , 2010
Minor Corrections to Physics for Optimizing Homeland Security by Our Pal Asija
NASA Astrophysics Data System (ADS)
Asija, Pal
2008-04-01
To optimize Homeland security it must be based on correct physics. There is But ONE Reality of Physics and finding that rugged reality requires identifying and expunging erroneous knowledge. Six examples are included. *Lighter Bodies Travel Faster. (Aristotle got it backwards) *Faster Objects Become Lighter. (Einstein got it backwards) *Two Minor Corrections to Newton's First Law of Motion. *Three D or No D (Any theory based on other than 3 D is fantastic) *Gravity is A Local and Physical Contact Force *Light is never Waves and Photons at the Same Instant. These corrections are then further delineated by several examples for leading and driving innovations in homeland security.
Food security and anthropometric failure among tribal children in Bankura, West Bengal.
Mukhopadhyay, D K; Biswas, A B
2011-04-01
We conducted a cross-sectional study among 188 tribal children aged 6-59 months using two-stage sampling in Bankura-I Block of Bankura district, West Bengal, India, to assess their nutritional status and its relation with household food security. Weight and height/length were measured and analyzed as per new WHO Growth Standards. Mothers of the study children were interviewed to obtain relevant information. Prevalence of Composite Index of Anthropometric Failure was 69.1%; and multiple anthropometric failures were more likely among tribal children aged 24-59 months with irregular utilization of supplementary nutrition and from households with severe grades of food security.
Boccaccio, Antonio; Uva, Antonio Emmanuele; Fiorentino, Michele; Mori, Giorgio; Monno, Giuseppe
2016-01-01
Functionally Graded Scaffolds (FGSs) are porous biomaterials where porosity changes in space with a specific gradient. In spite of their wide use in bone tissue engineering, possible models that relate the scaffold gradient to the mechanical and biological requirements for the regeneration of the bony tissue are currently missing. In this study we attempt to bridge the gap by developing a mechanobiology-based optimization algorithm aimed to determine the optimal graded porosity distribution in FGSs. The algorithm combines the parametric finite element model of a FGS, a computational mechano-regulation model and a numerical optimization routine. For assigned boundary and loading conditions, the algorithm builds iteratively different scaffold geometry configurations with different porosity distributions until the best microstructure geometry is reached, i.e. the geometry that allows the amount of bone formation to be maximized. We tested different porosity distribution laws, loading conditions and scaffold Young’s modulus values. For each combination of these variables, the explicit equation of the porosity distribution law–i.e the law that describes the pore dimensions in function of the spatial coordinates–was determined that allows the highest amounts of bone to be generated. The results show that the loading conditions affect significantly the optimal porosity distribution. For a pure compression loading, it was found that the pore dimensions are almost constant throughout the entire scaffold and using a FGS allows the formation of amounts of bone slightly larger than those obtainable with a homogeneous porosity scaffold. For a pure shear loading, instead, FGSs allow to significantly increase the bone formation compared to a homogeneous porosity scaffolds. Although experimental data is still necessary to properly relate the mechanical/biological environment to the scaffold microstructure, this model represents an important step towards optimizing geometry of functionally graded scaffolds based on mechanobiological criteria. PMID:26771746
2017-12-01
poses a threat to regional security and economic stability—major U.S. national interests. Distributed maritime capability is demonstrated by applying...regional security, economic stability, fisheries enforcement 15. NUMBER OF PAGES 95 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...a dominant aggressor in the South China Sea that poses a threat to regional security and economic stability—major U.S. national interests
S.A. Bowe; R.L. Smith; D. Earl Kline; Philip A. Araman
2002-01-01
A nationwide survey of advanced scanning and optimizing technology in the hardwood sawmill industry was conducted in the fall of 1999. Three specific hardwood sawmill technologies were examined that included current edger-optimizer systems, future edger-optimizer systems, and future automated grading systems. The objectives of the research were to determine differences...
Grading smart sensors: Performance assessment and ranking using familiar scores like A+ to D-
NASA Astrophysics Data System (ADS)
Kessel, Ronald T.
2005-03-01
Starting with the supposition that the product of smart sensors - whether autonomous, networked, or fused - is in all cases information, it is shown here using information theory how a metric Q, ranging between 0 and 100%, can be derived to assess the quality of the information provided. The analogy with student grades is immediately evident and elaborated. As with student grades, numerical percentages suggest more precision than can be justified, so a conversion to letter grades A+ to D- is desirable. Owing to the close analogy with familiar academic grades, moreover, the new grade is a measure of effectiveness (MOE) that commanders and decision makers should immediately appreciate and find quite natural, even if they do not care to follow the methodology behind the performance test, as they focus on higher-level strategic matters of sensor deployment or procurement. The metric is illustrated by translating three specialist performance tests - the Receiver Operating Characteristic (ROC) curve, the Constant False Alarm Rate (CFAR) approach, and confusion matrices - into letter grades for use then by strategists. Actual military and security systems are included among the examples.
Optimal service distribution in WSN service system subject to data security constraints.
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-08-04
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm.
Optimal Service Distribution in WSN Service System Subject to Data Security Constraints
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-01-01
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346
A DHS Skunkworks Project: Defining and Addressing Homeland Security Grand Challenges
2016-12-01
Peter Diamandis, Ansari XPRIZE, market failure, technology, stealth technologies, Pasteur’s quadrant, Heilmeier Catechism, Homeland Security Advanced...Judging and Scoring ....................................................................27 D. OPTIMIZING FOR AN EMERGING MARKET ...37 Figure 3. Market /Technology Chart
None
2017-12-09
In 1999, the National Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2010-05-21
In 1999, the National Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-07-29
In 1999, the Nuclear Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
None
2018-01-16
In 1999, the Nuclear Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Hu, Yu-Chuan; Li, Gang; Yang, Yang; Han, Yu; Sun, Ying-Zhi; Liu, Zhi-Cheng; Tian, Qiang; Han, Zi-Yang; Liu, Le-De; Hu, Bin-Quan; Qiu, Zi-Yu; Wang, Wen; Cui, Guang-Bin
2017-01-01
Current machine learning techniques provide the opportunity to develop noninvasive and automated glioma grading tools, by utilizing quantitative parameters derived from multi-modal magnetic resonance imaging (MRI) data. However, the efficacies of different machine learning methods in glioma grading have not been investigated.A comprehensive comparison of varied machine learning methods in differentiating low-grade gliomas (LGGs) and high-grade gliomas (HGGs) as well as WHO grade II, III and IV gliomas based on multi-parametric MRI images was proposed in the current study. The parametric histogram and image texture attributes of 120 glioma patients were extracted from the perfusion, diffusion and permeability parametric maps of preoperative MRI. Then, 25 commonly used machine learning classifiers combined with 8 independent attribute selection methods were applied and evaluated using leave-one-out cross validation (LOOCV) strategy. Besides, the influences of parameter selection on the classifying performances were investigated. We found that support vector machine (SVM) exhibited superior performance to other classifiers. By combining all tumor attributes with synthetic minority over-sampling technique (SMOTE), the highest classifying accuracy of 0.945 or 0.961 for LGG and HGG or grade II, III and IV gliomas was achieved. Application of Recursive Feature Elimination (RFE) attribute selection strategy further improved the classifying accuracies. Besides, the performances of LibSVM, SMO, IBk classifiers were influenced by some key parameters such as kernel type, c, gama, K, etc. SVM is a promising tool in developing automated preoperative glioma grading system, especially when being combined with RFE strategy. Model parameters should be considered in glioma grading model optimization. PMID:28599282
Zhang, Xin; Yan, Lin-Feng; Hu, Yu-Chuan; Li, Gang; Yang, Yang; Han, Yu; Sun, Ying-Zhi; Liu, Zhi-Cheng; Tian, Qiang; Han, Zi-Yang; Liu, Le-De; Hu, Bin-Quan; Qiu, Zi-Yu; Wang, Wen; Cui, Guang-Bin
2017-07-18
Current machine learning techniques provide the opportunity to develop noninvasive and automated glioma grading tools, by utilizing quantitative parameters derived from multi-modal magnetic resonance imaging (MRI) data. However, the efficacies of different machine learning methods in glioma grading have not been investigated.A comprehensive comparison of varied machine learning methods in differentiating low-grade gliomas (LGGs) and high-grade gliomas (HGGs) as well as WHO grade II, III and IV gliomas based on multi-parametric MRI images was proposed in the current study. The parametric histogram and image texture attributes of 120 glioma patients were extracted from the perfusion, diffusion and permeability parametric maps of preoperative MRI. Then, 25 commonly used machine learning classifiers combined with 8 independent attribute selection methods were applied and evaluated using leave-one-out cross validation (LOOCV) strategy. Besides, the influences of parameter selection on the classifying performances were investigated. We found that support vector machine (SVM) exhibited superior performance to other classifiers. By combining all tumor attributes with synthetic minority over-sampling technique (SMOTE), the highest classifying accuracy of 0.945 or 0.961 for LGG and HGG or grade II, III and IV gliomas was achieved. Application of Recursive Feature Elimination (RFE) attribute selection strategy further improved the classifying accuracies. Besides, the performances of LibSVM, SMO, IBk classifiers were influenced by some key parameters such as kernel type, c, gama, K, etc. SVM is a promising tool in developing automated preoperative glioma grading system, especially when being combined with RFE strategy. Model parameters should be considered in glioma grading model optimization.
Optimization of Grade 100 High-Performance Steel Butt Welds [Tech Brief
DOT National Transportation Integrated Search
2013-11-01
In the development of the high performance steels (HPS) grades, three advisory groups were formed to oversee and guide the development of the steels in terms of their design, welding, and corrosion aspects. One of the aspects considered by the Weldin...
DOT National Transportation Integrated Search
2013-09-01
Decreasing the number of accidents at highway-railway grade crossings (HRGCs) is an important goal in the transportation field. The preemption of traffic signal operations at HRGCs is widely used to prevent accidents by clearing vehicles off the trac...
Technologies to counter aviation security threats
NASA Astrophysics Data System (ADS)
Karoly, Steve
2017-11-01
The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.
1983-12-01
Initializes the data tables shared by both the Local and Netowrk Operating Systems. 3. Invint: Written in Assembly Language. Initializes the Input/Output...connection with an appropriate type and grade of transport service and appropriate security authentication (Ref 6:38). Data Transfer within a session...V.; Kent, S. Security in oihr Level Protocolst Anorgaches. Alternatives and Recommendations, Draft Report ICST/HLNP-81-19, Wash ingt on,,D.C.: Dept
Constraint Optimization Literature Review
2015-11-01
COPs. 15. SUBJECT TERMS high-performance computing, mobile ad hoc network, optimization, constraint, satisfaction 16. SECURITY CLASSIFICATION OF: 17...Optimization Problems 1 2.1 Constraint Satisfaction Problems 1 2.2 Constraint Optimization Problems 3 3. Constraint Optimization Algorithms 9 3.1...Constraint Satisfaction Algorithms 9 3.1.1 Brute-Force search 9 3.1.2 Constraint Propagation 10 3.1.3 Depth-First Search 13 3.1.4 Local Search 18
Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang
2017-04-06
Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.
1984-12-01
52242 Prepared for the AIR FORCE OFFICE OF SCIENTIFIC RESEARCH Under Grant No. AFOSR 82-0322 December 1984 ~ " ’w Unclassified SECURITY CLASSIFICATION4...OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS Unclassified None 20 SECURITY CLASSIFICATION...designer .and computer- are 20 DIiRIBUTION/AVAILABI LIT Y 0P ABSTR4ACT 21 ABSTRACT SECURITY CLASSIFICA1ONr UNCLASSIFIED/UNLIMITED SAME AS APT OTIC USERS
Approximation in Optimal Control and Identification of Large Space Structures.
1985-01-01
I ease I Cr ’. ’. -4 . r*_...1- UN(D aSIFIED SECURITY CLAS.’ICATION OF fHIS P^.GE REPORT DOCUMENTATION PAGE 1 REPORT SECURITY CLASSIFICATION 1...RESTRICTIVE MARKINGS UNCLASSIFIED 2 SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; distribution 2b...NOS. PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. NO Bolling AFB DC 20332-6448 61102F 2304 Al 11. TITLE IlnRCiude Security Claas.ifcation
ERIC Educational Resources Information Center
Mahasneh, Ahmad M.; Al-Zoubi, Zohair H.; Batayeneh, Omar T.
2013-01-01
This study aimed to examine the correlation between optimism-pessimism and personality traits (extraversion, introversion, emotional stability and neuroticism), also aimed to identify the prevalence of optimism and pessimism in the study sample according to the variable sex, academic specialization, level of study, and grade point average. The…
Optimal eavesdropping in cryptography with three-dimensional quantum states.
Bruss, D; Macchiavello, C
2002-03-25
We study optimal eavesdropping in quantum cryptography with three-dimensional systems, and show that this scheme is more secure against symmetric attacks than protocols using two-dimensional states. We generalize the according eavesdropping transformation to arbitrary dimensions, and discuss the connection with optimal quantum cloning.
An enhanced performance through agent-based secure approach for mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Bisen, Dhananjay; Sharma, Sanjeev
2018-01-01
This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.
40 CFR 89.319 - Hydrocarbon analyzer calibration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... start-up and basic operating adjustment using the appropriate fuel (see § 89.312(e)) and zero-grade air... flow. Heated Flame Ionization Detectors (HFIDs) must be at their specified operating temperature. One.... (1) Adjust analyzer to optimize performance. (2) Zero the hydrocarbon analyzer with zero-grade air...
Arabnejad Khanoki, Sajad; Pasini, Damiano
2012-03-01
Revision surgeries of total hip arthroplasty are often caused by a deficient structural compatibility of the implant. Two main culprits, among others, are bone-implant interface instability and bone resorption. To address these issues, in this paper we propose a novel type of implant, which, in contrast to current hip replacement implants made of either a fully solid or a foam material, consists of a lattice microstructure with nonhomogeneous distribution of material properties. A methodology based on multiscale mechanics and design optimization is introduced to synthesize a graded cellular implant that can minimize concurrently bone resorption and implant interface failure. The procedure is applied to the design of a 2D left implanted femur with optimized gradients of relative density. To assess the manufacturability of the graded cellular microstructure, a proof-of-concept is fabricated by using rapid prototyping. The results from the analysis are used to compare the optimized cellular implant with a fully dense titanium implant and a homogeneous foam implant with a relative density of 50%. The bone resorption and the maximum value of interface stress of the cellular implant are found to be over 70% and 50% less than the titanium implant while being 53% and 65% less than the foam implant.
NASA Astrophysics Data System (ADS)
Grujicic, M.; Snipes, J. S.; Ramaswami, S.
2016-01-01
An alternative to the traditional trial-and-error empirical approach for the development of new materials is the so-called materials-by-design approach. Within the latter approach, a material is treated as a complex system and its design and optimization is carried out by employing computer-aided engineering analyses, predictive tools, and available material databases. In the present work, the materials-by-design approach is utilized to redesign a grade of high-strength low-alloy (HSLA) class of steels with improved mechanical properties (primarily strength and fracture toughness), processability (e.g., castability, hot formability, and weldability), and corrosion resistance. Toward that end, a number of material thermodynamics, kinetics of phase transformations, and physics of deformation and fracture computational models and databases have been developed/assembled and utilized within a multi-disciplinary, two-level material-by-design optimization scheme. To validate the models, their prediction is compared against the experimental results for the related steel HSLA100. Then the optimization procedure is employed to determine the optimal chemical composition and the tempering schedule for a newly designed grade of the HSLA class of steels with enhanced mechanical properties, processability, and corrosion resistance.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., except bona fide emergency situations which might threaten the life or health of an individual. Generally... patient is an ITO authorized dependent), grade or rate, country of origin, diagnosis, type of elective...
ERIC Educational Resources Information Center
Brown, Joan Marie
1997-01-01
Describes four open-ended activities for students in grades 4-12 designed to encourage thought, discussion, and decision making in classes dealing with issues in ethics and technology. Provides teacher directions, describes activities, and outlines debriefing sessions for lessons in copyright infringement, network security, artificial…
Secure distributed genome analysis for GWAS and sequence comparison computation.
Zhang, Yihua; Blanton, Marina; Almashaqbeh, Ghada
2015-01-01
The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice.
Secure distributed genome analysis for GWAS and sequence comparison computation
2015-01-01
Background The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. Methods In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. Results We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. Conclusions This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice. PMID:26733307
A cooperative model for IS security risk management in distributed environment.
Feng, Nan; Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.
40 CFR 86.1322-84 - Carbon monoxide analyzer calibration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... be used. (2) Zero the carbon monoxide analyzer with either zero-grade air or zero-grade nitrogen. (3... columns is one form of corrective action which may be taken.) (b) Initial and periodic calibration. Prior... calibrated. (1) Adjust the analyzer to optimize performance. (2) Zero the carbon monoxide analyzer with...
DOT National Transportation Integrated Search
2016-06-01
Highway-rail grade crossings (HRGCs) and the intersections in their proximity are areas where potential problems in terms of safety and efficiency often arise if only simple or outdated treatments, such as normal signal timing or passive railroad war...
40 CFR 86.521-90 - Hydrocarbon analyzer calibration.
Code of Federal Regulations, 2011 CFR
2011-07-01
... apparatus. The methanol is vaporized and swept into the sample bag with a known volume of zero grade air....521-90 Section 86.521-90 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... and basic operating adjustment using the appropriate FID fuel and zero-grade air. (2) Optimize on the...
40 CFR 86.1221-90 - Hydrocarbon analyzer calibration.
Code of Federal Regulations, 2011 CFR
2011-07-01
... apparatus. The methanol is vaporized and swept into the sample bag with a known volume of zero grade air....1221-90 Section 86.1221-90 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... appropriate FID fuel and zero-grade air. (2) Optimize on the most common operating range. Introduce into the...
40 CFR 86.521-90 - Hydrocarbon analyzer calibration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... apparatus. The methanol is vaporized and swept into the sample bag with a known volume of zero grade air....521-90 Section 86.521-90 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... and basic operating adjustment using the appropriate FID fuel and zero-grade air. (2) Optimize on the...
40 CFR 86.121-90 - Hydrocarbon analyzer calibration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... sample bag with a known volume of zero grade air measured by a gas flow meter meeting the performance....121-90 Section 86.121-90 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... operating adjustment using the appropriate FID fuel and zero-grade air. (2) Optimize on the most common...
40 CFR 86.121-90 - Hydrocarbon analyzer calibration.
Code of Federal Regulations, 2011 CFR
2011-07-01
... sample bag with a known volume of zero grade air measured by a gas flow meter meeting the performance....121-90 Section 86.121-90 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... operating adjustment using the appropriate FID fuel and zero-grade air. (2) Optimize on the most common...
40 CFR 86.1221-90 - Hydrocarbon analyzer calibration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... apparatus. The methanol is vaporized and swept into the sample bag with a known volume of zero grade air....1221-90 Section 86.1221-90 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... appropriate FID fuel and zero-grade air. (2) Optimize on the most common operating range. Introduce into the...
Stelter, Rebecca L.; Halberstadt, Amy G.
2010-01-01
This study investigated how parental beliefs about children’s emotions and parental stress relate to children’s feelings of security in the parent-child relationship. Models predicting direct effects of parental beliefs and parental stress, and moderating effects of parental stress on the relationship between parental beliefs and children’s feelings of security were tested. Participants were 85 African American, European American, and Lumbee American Indian 4th and 5th grade children and one of their parents. Children reported their feelings of security in the parent-child relationship; parents independently reported on their beliefs and their stress. Parental stress moderated relationships between three of the four parental beliefs about the value of children’s emotions and children’s attachment security. When parent stress was low, parental beliefs accepting and valuing children’s emotions were not related to children’s feelings of security; when parent stress was high, however, parental beliefs accepting and valuing children’s emotions were related to children’s feelings of security. These findings highlight the importance of examining parental beliefs and stress together for children’s attachment security. PMID:21731472
Optimizing photophoresis and asymmetric force fields for grading of Brownian particles.
Neild, Adrian; Ng, Tuck Wah; Woods, Timothy
2009-12-10
We discuss a scheme that incorporates restricted spatial input location, orthogonal sort, and movement direction features, with particle sorting achieved by using an asymmetric potential cycled on and off, while movement is accomplished by photophoresis. Careful investigation has uncovered the odds of sorting between certain pairs of particle sizes to be solely dependent on radii in each phase of the process. This means that the most effective overall sorting can be achieved by maximizing the number of phases. This optimized approach is demonstrated using numerical simulation to permit grading of a range of nanometer-scale particle sizes.
Danis, Ronald P; Domalpally, Amitha; Chew, Emily Y; Clemons, Traci E; Armstrong, Jane; SanGiovanni, John Paul; Ferris, Frederick L
2013-07-08
To establish continuity with the grading procedures and outcomes from the historical data of the Age-Related Eye Disease Study (AREDS), color photographic imaging and evaluation procedures for the assessment of age-related macular degeneration (AMD) were modified for digital imaging in the AREDS2. The reproducibility of the grading of index AMD lesion components and for the AREDS severity scale was tested at the AREDS2 reading center. Digital color stereoscopic fundus photographs from 4203 AREDS2 subjects collected at baseline and annual follow-up visits were optimized for tonal balance and graded according to a standard protocol slightly modified from AREDS. The reproducibility of digital grading of AREDS2 images was assessed by reproducibility exercises, temporal drift (regrading a subset of baseline annually, n = 88), and contemporaneous masked regrading (ongoing, monthly regrade on 5% of submissions, n = 1335 eyes). In AREDS2, 91% and 96% of images received replicate grades within two steps of the baseline value on the AREDS severity scale for temporal drift and contemporaneous assessment, respectively (weighted Kappa of 0.73 and 0.76). Historical data for temporal drift in replicate gradings on the AREDS film-based images were 88% within two steps (weighted Kappa = 0.88). There was no difference in AREDS2-AREDS concordance for temporal drift (exact P = 0.57). Digital color grading has nearly the same reproducibility as historical film grading. There is substantial agreement for testing the predictive utility of the AREDS severity scale in AREDS2 as a clinical trial outcome. (ClinicalTrials.gov number, NCT00345176.)
Dynamic, stochastic models for congestion pricing and congestion securities.
DOT National Transportation Integrated Search
2010-12-01
This research considers congestion pricing under demand uncertainty. In particular, a robust optimization (RO) approach is applied to optimal congestion pricing problems under user equilibrium. A mathematical model is developed and an analysis perfor...
Fuzzy Random λ-Mean SAD Portfolio Selection Problem: An Ant Colony Optimization Approach
NASA Astrophysics Data System (ADS)
Thakur, Gour Sundar Mitra; Bhattacharyya, Rupak; Mitra, Swapan Kumar
2010-10-01
To reach the investment goal, one has to select a combination of securities among different portfolios containing large number of securities. Only the past records of each security do not guarantee the future return. As there are many uncertain factors which directly or indirectly influence the stock market and there are also some newer stock markets which do not have enough historical data, experts' expectation and experience must be combined with the past records to generate an effective portfolio selection model. In this paper the return of security is assumed to be Fuzzy Random Variable Set (FRVS), where returns are set of random numbers which are in turn fuzzy numbers. A new λ-Mean Semi Absolute Deviation (λ-MSAD) portfolio selection model is developed. The subjective opinions of the investors to the rate of returns of each security are taken into consideration by introducing a pessimistic-optimistic parameter vector λ. λ-Mean Semi Absolute Deviation (λ-MSAD) model is preferred as it follows absolute deviation of the rate of returns of a portfolio instead of the variance as the measure of the risk. As this model can be reduced to Linear Programming Problem (LPP) it can be solved much faster than quadratic programming problems. Ant Colony Optimization (ACO) is used for solving the portfolio selection problem. ACO is a paradigm for designing meta-heuristic algorithms for combinatorial optimization problem. Data from BSE is used for illustration.
2013-01-01
Background Subarachnoid hemorrhage is a common and dangerous disease with an unfavorable prognosis. Patients with poor-grade subarachnoid hemorrhage (Hunt & Hess Grades 4–5) are unconscious on admission. Because of the high mortality and disability rate associated with poor-grade subarachnoid hemorrhage, it is often treated conservatively. Timing of surgery for poor-grade aneurysmal subarachnoid hemorrhage is still controversial, therefore this study aims to identify the optimal time to operate on patients admitted in poor clinical condition. Methods/design Ninety-nine patients meeting the inclusion criteria were randomly assigned into three treatment groups. The early surgery group received operation within 3 days after onset of subarachnoid hemorrhage (day of SAH = day 1); the intermediate surgery group received operation from days 4 to 7, and surgery was performed on the late surgery group after day 7. Follow-up was performed 1, 3, and 6 months after aneurysm clipping. Primary indicators of outcome included the Extended Glasgow Outcome Scale and the Modified Rankin Scale, while secondary indicators of outcome were assessed using the Barthel Index and mortality. Discussion This is the first prospective, single-center, observer-blinded, randomized controlled trial to elucidate optimal timing for surgery in poor-grade subarachnoid hemorrhage patients. The results of this study will be used to direct decisions of surgical intervention in poor-grade subarachnoid hemorrhage, thus improving clinical outcomes for patients. Trial registration Chinese Clinical Trial Registry: ChiCTR-TRC-12002917 PMID:23957458
NASA Astrophysics Data System (ADS)
Liu, Weiqi; Huang, Peng; Peng, Jinye; Fan, Jianping; Zeng, Guihua
2018-02-01
For supporting practical quantum key distribution (QKD), it is critical to stabilize the physical parameters of signals, e.g., the intensity, phase, and polarization of the laser signals, so that such QKD systems can achieve better performance and practical security. In this paper, an approach is developed by integrating a support vector regression (SVR) model to optimize the performance and practical security of the QKD system. First, a SVR model is learned to precisely predict the time-along evolutions of the physical parameters of signals. Second, such predicted time-along evolutions are employed as feedback to control the QKD system for achieving the optimal performance and practical security. Finally, our proposed approach is exemplified by using the intensity evolution of laser light and a local oscillator pulse in the Gaussian modulated coherent state QKD system. Our experimental results have demonstrated three significant benefits of our SVR-based approach: (1) it can allow the QKD system to achieve optimal performance and practical security, (2) it does not require any additional resources and any real-time monitoring module to support automatic prediction of the time-along evolutions of the physical parameters of signals, and (3) it is applicable to any measurable physical parameter of signals in the practical QKD system.
7 CFR 56.52 - Charges for continuous grading performed on a resident basis.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) REGULATIONS AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG PRODUCTS... Social Security System, retirement benefits, group life insurance, severance pay, sick leave, annual...
Prevention of VTE in Orthopedic Surgery Patients
Francis, Charles W.; Johanson, Norman A.; Curley, Catherine; Dahl, Ola E.; Schulman, Sam; Ortel, Thomas L.; Pauker, Stephen G.; Colwell, Clifford W.
2012-01-01
Background: VTE is a serious, but decreasing complication following major orthopedic surgery. This guideline focuses on optimal prophylaxis to reduce postoperative pulmonary embolism and DVT. Methods: The methods of this guideline follow those described in Methodology for the Development of Antithrombotic Therapy and Prevention of Thrombosis Guidelines: Antithrombotic Therapy and Prevention of Thrombosis, 9th ed: American College of Chest Physicians Evidence-Based Clinical Practice Guidelines in this supplement. Results: In patients undergoing major orthopedic surgery, we recommend the use of one of the following rather than no antithrombotic prophylaxis: low-molecular-weight heparin; fondaparinux; dabigatran, apixaban, rivaroxaban (total hip arthroplasty or total knee arthroplasty but not hip fracture surgery); low-dose unfractionated heparin; adjusted-dose vitamin K antagonist; aspirin (all Grade 1B); or an intermittent pneumatic compression device (IPCD) (Grade 1C) for a minimum of 10 to 14 days. We suggest the use of low-molecular-weight heparin in preference to the other agents we have recommended as alternatives (Grade 2C/2B), and in patients receiving pharmacologic prophylaxis, we suggest adding an IPCD during the hospital stay (Grade 2C). We suggest extending thromboprophylaxis for up to 35 days (Grade 2B). In patients at increased bleeding risk, we suggest an IPCD or no prophylaxis (Grade 2C). In patients who decline injections, we recommend using apixaban or dabigatran (all Grade 1B). We suggest against using inferior vena cava filter placement for primary prevention in patients with contraindications to both pharmacologic and mechanical thromboprophylaxis (Grade 2C). We recommend against Doppler (or duplex) ultrasonography screening before hospital discharge (Grade 1B). For patients with isolated lower-extremity injuries requiring leg immobilization, we suggest no thromboprophylaxis (Grade 2B). For patients undergoing knee arthroscopy without a history of VTE, we suggest no thromboprophylaxis (Grade 2B). Conclusions: Optimal strategies for thromboprophylaxis after major orthopedic surgery include pharmacologic and mechanical approaches. PMID:22315265
A Cooperative Model for IS Security Risk Management in Distributed Environment
Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626
Security in Wireless Sensor Networks Employing MACGSP6
ERIC Educational Resources Information Center
Nitipaichit, Yuttasart
2010-01-01
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Ultimate open pit stochastic optimization
NASA Astrophysics Data System (ADS)
Marcotte, Denis; Caron, Josiane
2013-02-01
Classical open pit optimization (maximum closure problem) is made on block estimates, without directly considering the block grades uncertainty. We propose an alternative approach of stochastic optimization. The stochastic optimization is taken as the optimal pit computed on the block expected profits, rather than expected grades, computed from a series of conditional simulations. The stochastic optimization generates, by construction, larger ore and waste tonnages than the classical optimization. Contrary to the classical approach, the stochastic optimization is conditionally unbiased for the realized profit given the predicted profit. A series of simulated deposits with different variograms are used to compare the stochastic approach, the classical approach and the simulated approach that maximizes expected profit among simulated designs. Profits obtained with the stochastic optimization are generally larger than the classical or simulated pit. The main factor controlling the relative gain of stochastic optimization compared to classical approach and simulated pit is shown to be the information level as measured by the boreholes spacing/range ratio. The relative gains of the stochastic approach over the classical approach increase with the treatment costs but decrease with mining costs. The relative gains of the stochastic approach over the simulated pit approach increase both with the treatment and mining costs. At early stages of an open pit project, when uncertainty is large, the stochastic optimization approach appears preferable to the classical approach or the simulated pit approach for fair comparison of the values of alternative projects and for the initial design and planning of the open pit.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brigantic, Robert T.; Betzsold, Nick J.; Bakker, Craig KR
In this presentation we overview a methodology for dynamic security risk quantification and optimal resource allocation of security assets for high profile venues. This methodology is especially applicable to venues that require security screening operations such as mass transit (e.g., train or airport terminals), critical infrastructure protection (e.g., government buildings), and largescale public events (e.g., concerts or professional sports). The method starts by decomposing the three core components of risk -- threat, vulnerability, and consequence -- into their various subcomponents. For instance, vulnerability can be decomposed into availability, accessibility, organic security, and target hardness and each of these can bemore » evaluated against the potential threats of interest for the given venue. Once evaluated, these subcomponents are rolled back up to compute the specific value for the vulnerability core risk component. Likewise, the same is done for consequence and threat, and then risk is computed as the product of these three components. A key aspect of our methodology is dynamically quantifying risk. That is, we incorporate the ability to uniquely allow the subcomponents and core components, and in turn, risk, to be quantified as a continuous function of time throughout the day, week, month, or year as appropriate.« less
Self-Study Guide for Implementing Early Literacy Interventions. REL 2016-129
ERIC Educational Resources Information Center
Dombek, Jennifer L.; Foorman, Barbara R.; Garcia, Mishel; Smith, Kevin G.
2016-01-01
While literacy interventions can be implemented in any grade, focusing on prevention and intervention in kindergarten through grade 2 is optimal because reading difficulties become expensive and challenging to remediate as students become older. The Individuals with Disabilities Act of 2004 allows districts to do just this, with 15 percent of…
40 CFR 86.122-78 - Carbon monoxide analyzer calibration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... sensitive range to be used. (2) Zero the carbon monoxide analyzer with either zero-grade air or zero-grade... conditioning columns is one form of corrective action which may be taken.) (b) Initial and periodic calibration... calibrated. (1) Adjust the analyzer to optimize performance. (2) Zero the carbon monoxide analyzer with...
NASA Technical Reports Server (NTRS)
Pindera, Marek-Jerzy; Aboudi, Jacob
1998-01-01
The objective of this three-year project was to develop and deliver to NASA Lewis one-dimensional and two-dimensional higher-order theories, and related computer codes, for the analysis, optimization and design of cylindrical functionally graded materials/structural components for use in advanced aircraft engines (e.g., combustor linings, rotor disks, heat shields, blisk blades). To satisfy this objective, a quasi one-dimensional version of the higher-order theory, HOTCFGM-1D, and four computer codes based on this theory, for the analysis, design and optimization of cylindrical structural components functionally graded in the radial direction were developed. The theory is applicable to thin multi-phased composite shell/cylinders subjected to macroscopically axisymmetric thermomechanical and inertial loading applied uniformly along the axial direction such that the overall deformation is characterized by a constant average axial strain. The reinforcement phases are uniformly distributed in the axial and circumferential directions, and arbitrarily distributed in the radial direction, thereby allowing functional grading of the internal reinforcement in this direction.
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
75 FR 19622 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-15
... organization, office symbol/code, job title, job function, grade/rank, job series, military specialty, start... the locks, security personnel and administrative procedures.'' Retention and disposal: Delete entry... approves the retention and disposal schedule, records will be treated as permanent.'' System manager(s) and...
7 CFR 70.76 - Charges for continuous poultry grading performed on a nonresident basis.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) REGULATIONS AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG PRODUCTS... under the Social Security System, retirement benefits, group life insurance, severance pay, sick leave...
5 CFR 9901.231 - Conversion of positions and employees to NSPS classification system.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HUMAN RESOURCES MANAGEMENT AND LABOR RELATIONS SYSTEMS (DEPARTMENT OF DEFENSE-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF DEFENSE NATIONAL SECURITY PERSONNEL SYSTEM (NSPS) Classification Transitional... employee's career group, pay schedule, and band upon conversion. (d) Grade retention prior to conversion...
Family Processes in Child Anxiety: the Long-Term Impact of Fathers and Mothers.
Stuart Parrigon, Kaela L; Kerns, Kathryn A
2016-10-01
The current study investigated links between parent and child anxiety, and family process factors, over a 9 year period. Specifically, we examined the role of partner conflict, attachment security and parental autonomy granting in explaining changes in child, father, and mother anxiety symptoms. We utilized data from the NICHD Study of Early Child Care and Youth Development (N = 661), from when target children were in first grade (6 years), fifth grade (10 years), and 15 years of age. We tested a longitudinal path model including both fathers and mothers, and found that the model was a good fit for the data. We also found that lower attachment security to fathers and a restriction of maternal autonomy granting predicted which children maintained anxiety into adolescence. Partner conflict explained the association between earlier and later parental anxiety, which is a novel finding in the literature. Together, these findings suggest that fathers play an important long-term role in child anxiety, alongside the role of mothers.
Collection of low-grade waste heat for enhanced energy harvesting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dede, Ercan M., E-mail: eric.dede@tema.toyota.com; Schmalenberg, Paul; Wang, Chi-Ming
Enhanced energy harvesting through the collection of low-grade waste heat is experimentally demonstrated. A structural optimization technique is exploited in the design of a thermal-composite substrate to guide and gather the heat emanating from multiple sources to a predetermined location. A thermoelectric generator is then applied at the selected focusing region to convert the resulting low-grade waste heat to electrical power. The thermal characteristics of the device are experimentally verified by direct temperature measurements of the system and numerically validated via heat conduction simulations. Electrical performance under natural and forced convection is measured, and in both cases, the device withmore » optimized heat flow control plus energy harvesting demonstrates increased power generation when compared with a baseline waste heat recovery system. Electronics applications include energy scavenging for autonomously powered sensor networks or self-actuated devices.« less
NASA Astrophysics Data System (ADS)
Damgård, Ivan; Keller, Marcel
We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + {{400}over{255}} expected elementary operations in expected 70 + {{20}over{255}} rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive security against at most one corrupted player) in a local network showed that one block can be encrypted in 2 seconds. We also argue that this result could be improved by an optimized implementation.
Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.
2007-01-01
The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930
Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P
2007-10-11
The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-06-26
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-01-01
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669
Cyr, Maeve; Pasalich, Dave S; McMahon, Robert J; Spieker, Susan J
2014-10-01
This study examined whether infant attachment security moderates the association between parenting in preschool and later aggressive behavior among a sample of children at high risk for developing conduct problems. Participants were 82 adolescent mother-child dyads recruited from the community. Infant attachment status at age 1 year was measured using the Strange Situation. When children were aged 4.5 years, mothers reported on their self-efficacy in regards to parenting, and mothers' positive parenting and criticism were coded from direct observations of parent-child interactions. In grade 1, mothers reported on their children's aggressive behavior. Infant secure attachment significantly moderated the association between observed maternal criticism and child aggression. That is, among insecurely attached children, higher levels of maternal criticism were associated with more severe aggression. This longitudinal finding suggests that a secure attachment may buffer the deleterious effects of harsh parenting on child aggression.
Enhanced bioremediation of oil contaminated soil by graded modified Fenton oxidation.
Xu, Jinlan; Xin, Lei; Huang, Tinglin; Chang, Kun
2011-01-01
Graded modified Fenton's (MF) oxidation is a strategy in which H2O2 is added intermittently to prevent a sharp temperature increase and undesired soil sterilization at soil circumneutral pH versus adding the same amount of H2O2 continuously. The primary objective of the present study was to investigate whether a mild MF pre-oxidation such as a stepwise addition of H2O2 can prevent sterilization and achieve a maximum degradation of tank oil in soil. Optimization experiments of graded MF oxidation were conducted using citric acid, oxalic acid and SOLV-X as iron chelators under different frequencies of H2O2 addition. The results indicated that the activity order of iron chelates decreased as: citric acid (51%) > SOLV-X (44%) > oxalic acid (9%), and citric acid was found to be an optimized iron chelating agent of graded MF oxidation. Three-time addition of H2O2 was found to be favorable and economical due to decreasing total petroleum hydrocarbon removal from three time addition (51%) to five time addition (59%). Biological experiments were conducted after graded MF oxidation of tank oil completed under optimum conditions mentioned above. After graded oxidation, substantially higher increase (31%) in microbial activity was observed with excessive H2O2 (1470 mmol/L, the mol ratio of H2O2:Fe2+ was 210:1) than that of non-oxidized soil. Removal efficiency of tank oil was up to 93% after four weeks. Especially, the oil fraction (C10-C40) became more biodagradable after graded MF oxidation than its absence. Therefore, graded MF oxidation is a mild pretreatment to achieve an effective bioremediation of oil contaminated soil.
Multiwavelet grading of prostate pathological images
NASA Astrophysics Data System (ADS)
Soltanian-Zadeh, Hamid; Jafari-Khouzani, Kourosh
2002-05-01
We have developed image analysis methods to automatically grade pathological images of prostate. The proposed method generates Gleason grades to images, where each image is assigned a grade between 1 and 5. This is done using features extracted from multiwavelet transformations. We extract energy and entropy features from submatrices obtained in the decomposition. Next, we apply a k-NN classifier to grade the image. To find optimal multiwavelet basis, preprocessing, and classifier, we use features extracted by different multiwavelets with either critically sampled preprocessing or repeated row preprocessing and different k-NN classifiers and compare their performances, evaluated by total misclassification rate (TMR). To evaluate sensitivity to noise, we add white Gaussian noise to images and compare the results (TMR's). We applied proposed methods to 100 images. We evaluated the first and second levels of decomposition using Geronimo, Hardin, and Massopust (GHM), Chui and Lian (CL), and Shen (SA4) multiwavelets. We also evaluated k-NN classifier for k=1,2,3,4,5. Experimental results illustrate that first level of decomposition is quite noisy. They also show that critically sampled preprocessing outperforms repeated row preprocessing and has less sensitivity to noise. Finally, comparison studies indicate that SA4 multiwavelet and k-NN classifier (k=1) generates optimal results (with smallest TMR of 3%).
ERIC Educational Resources Information Center
Nikelshpur, Dmitry O.
2014-01-01
Similar to mammalian brains, Artificial Neural Networks (ANN) are universal approximators, capable of yielding near-optimal solutions to a wide assortment of problems. ANNs are used in many fields including medicine, internet security, engineering, retail, robotics, warfare, intelligence control, and finance. "ANNs have a tendency to get…
[Ecological security of wastewater treatment processes: a review].
Yang, Sai; Hua, Tao
2013-05-01
Though the regular indicators of wastewater after treatment can meet the discharge requirements and reuse standards, it doesn't mean the effluent is harmless. From the sustainable point of view, to ensure the ecological and human security, comprehensive toxicity should be considered when discharge standards are set up. In order to improve the ecological security of wastewater treatment processes, toxicity reduction should be considered when selecting and optimizing the treatment processes. This paper reviewed the researches on the ecological security of wastewater treatment processes, with the focus on the purposes of various treatment processes, including the processes for special wastewater treatment, wastewater reuse, and for the safety of receiving waters. Conventional biological treatment combined with advanced oxidation technologies can enhance the toxicity reduction on the base of pollutants removal, which is worthy of further study. For the process aimed at wastewater reuse, the integration of different process units can complement the advantages of both conventional pollutants removal and toxicity reduction. For the process aimed at ecological security of receiving waters, the emphasis should be put on the toxicity reduction optimization of process parameters and process unit selection. Some suggestions for the problems in the current research and future research directions were put forward.
Using Optimization to Improve Test Planning
2017-09-01
friendly and to display the output differently, the test and evaluation test schedule optimization model would be a good tool for the test and... evaluation schedulers. 14. SUBJECT TERMS schedule optimization, test planning 15. NUMBER OF PAGES 223 16. PRICE CODE 17. SECURITY CLASSIFICATION OF...make the input more user-friendly and to display the output differently, the test and evaluation test schedule optimization model would be a good tool
NASA Astrophysics Data System (ADS)
Cai, X.; Zhang, X.; Zhu, T.
2014-12-01
Global food security is constrained by local and regional land and water availability, as well as other agricultural input limitations and inappropriate national and global regulations. In a theoretical context, this study assumes that optimal water and land uses in local food production to maximize food security and social welfare at the global level can be driven by global trade. It follows the context of "virtual resources trade", i.e., utilizing international trade of agricultural commodities to reduce dependency on local resources, and achieves land and water savings in the world. An optimization model based on the partial equilibrium of agriculture is developed for the analysis, including local commodity production and land and water resources constraints, demand by country, and global food market. Through the model, the marginal values (MVs) of social welfare for water and land at the level of so-called food production units (i.e., sub-basins with similar agricultural production conditions) are derived and mapped in the world. In this personation, we will introduce the model structure, explain the meaning of MVs at the local level and their distribution around the world, and discuss the policy implications for global communities to enhance global food security. In particular, we will examine the economic values of water and land under different world targets of food security (e.g., number of malnourished population or children in a future year). In addition, we will also discuss the opportunities on data to improve such global modeling exercises.
A game-theoretical approach to multimedia social networks security.
Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong
2014-01-01
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.
A Game-Theoretical Approach to Multimedia Social Networks Security
Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong
2014-01-01
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226
Nadeau, Christopher P.; Conway, Courtney J.
2015-01-01
Securing water for wetland restoration efforts will be increasingly difficult as human populations demand more water and climate change alters the hydrologic cycle. Minimizing water use at a restoration site could help justify water use to competing users, thereby increasing future water security. Moreover, optimizing water depth for focal species will increase habitat quality and the probability that the restoration is successful. We developed and validated spatial habitat models to optimize water depth within wetland restoration projects along the lower Colorado River intended to benefit California black rails (Laterallus jamaicensis coturniculus). We observed a 358% increase in the number of black rails detected in the year after manipulating water depth to maximize the amount of predicted black rail habitat in two wetlands. The number of black rail detections in our restoration sites was similar to those at our reference site. Implementing the optimal water depth in each wetland decreased water use while simultaneously increasing habitat suitability for the focal species. Our results also provide experimental confirmation of past descriptive accounts of black rail habitat preferences and provide explicit water depth recommendations for future wetland restoration efforts for this species of conservation concern; maintain surface water depths between saturated soil and 100 mm. Efforts to optimize water depth in restored wetlands around the world would likely increase the success of wetland restorations for the focal species while simultaneously minimizing and justifying water use.
Code of Federal Regulations, 2014 CFR
2014-07-01
... describes him or her, e.g., a social security number; age; military rank; civilian grade; marital status...., information which can be used to distinguish or trace an individual's identity, such as their name, social..., collection, or grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an...
Code of Federal Regulations, 2012 CFR
2012-07-01
... describes him or her, e.g., a social security number; age; military rank; civilian grade; marital status...., information which can be used to distinguish or trace an individual's identity, such as their name, social..., collection, or grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an...
Code of Federal Regulations, 2013 CFR
2013-07-01
... describes him or her, e.g., a social security number; age; military rank; civilian grade; marital status...., information which can be used to distinguish or trace an individual's identity, such as their name, social..., collection, or grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an...
Code of Federal Regulations, 2011 CFR
2011-07-01
... describes him or her, e.g., a social security number; age; military rank; civilian grade; marital status...., information which can be used to distinguish or trace an individual's identity, such as their name, social..., collection, or grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an...
Code of Federal Regulations, 2010 CFR
2010-07-01
... describes him or her, e.g., a social security number; age; military rank; civilian grade; marital status...., information which can be used to distinguish or trace an individual's identity, such as their name, social..., collection, or grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an...
75 FR 6005 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-05
... proposed action will be effective on March 8, 2010 unless comments are received that would result in a...: Name, Social Security Numbers (SSN), rank/grade, service number, marital status, the number of..., retaining and disposing of records in the system: Storage: Electronic storage media. Retrievability...
78 FR 73509 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-06
... entering into CENTCOM's theater of operation. DATES: This proposed action will be effective on January 7... files and Manpower Authorization files, including name; grade/rank; Social Security Number (SSN); DoD ID..., retaining, and disposing of records in the system: Storage: Electronic storage media. Retrievability...
7 CFR 70.77 - Charges for continuous poultry or rabbit grading performed on a resident basis.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) REGULATIONS AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG... Social Security System, retirement benefits, group life insurance, severance pay, sick leave, annual...
Advocating for Grade-Based Acceleration
ERIC Educational Resources Information Center
Guilbault, Keri M.
2014-01-01
Parents often struggle with the decision to accelerate their child and may worry about social and emotional issues, although research indicates positive effects on the social and emotional adjustment of carefully selected accelerants. As children's advocates, parents can work effectively with a school system to secure an appropriate academic…
46 CFR 36.01-5 - Certificate of inspection-TB/ALL.
Code of Federal Regulations, 2012 CFR
2012-10-01
...-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES... for the carriage of elevated temperature cargoes as follows: “Inspected and approved for the carriage of Grade E combustible liquids when transported in molten form at elevated temperatures.” (b...
46 CFR 36.01-5 - Certificate of inspection-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
...-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES... for the carriage of elevated temperature cargoes as follows: “Inspected and approved for the carriage of Grade E combustible liquids when transported in molten form at elevated temperatures.” (b...
46 CFR 36.01-5 - Certificate of inspection-TB/ALL.
Code of Federal Regulations, 2014 CFR
2014-10-01
...-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES... for the carriage of elevated temperature cargoes as follows: “Inspected and approved for the carriage of Grade E combustible liquids when transported in molten form at elevated temperatures.” (b...
46 CFR 36.01-5 - Certificate of inspection-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
...-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES... for the carriage of elevated temperature cargoes as follows: “Inspected and approved for the carriage of Grade E combustible liquids when transported in molten form at elevated temperatures.” (b...
Effects of Shift Work on Air Force Security Police Personnel.
1986-01-01
Naitoh, Paul. " Chronobiologic Approach for Optimizing Human Performance ." In Rhythmic Aspects of Behavior. eds. Frederick M. Brown and R. Curtis...Effects of Shift Work on Air Force THESIS/DISSERTATION Security Police Personnel 6. PERFORMING O1G. REPORT NUMBER 7. AUTHOR(.) 8. CONTRACT OR GRANT...shift work has a significant effect on those who perform it, this study examines the perceived effects of shift work on a population of security
Eaton, Danice K; McKnight-Eily, Lela R; Lowry, Richard; Perry, Geraldine S; Presley-Cantrell, Letitia; Croft, Janet B
2010-04-01
We describe the prevalence of insufficient, borderline, and optimal sleep hours among U.S. high school students on an average school night. Most students (68.9%) reported insufficient sleep, whereas few (7.6%) reported optimal sleep. The prevalence of insufficient sleep was highest among female and black students, and students in grades 11 and 12. Published by Elsevier Inc.
Impact of the Tactical Picture Quality on the Fire Control Radar Search-Lock-On Time
2006-09-01
theory terminology). It is required to grade the benefits from the different possible actions so that an optimal solution can be chosen. For instance, in...the fire control radar search-lock-on time (U) 4. AUTEURS (Nom de famille, prénom et initiales. Indiquer les grades militaires, ex.: Bleau, Maj
ERIC Educational Resources Information Center
Dade County Public Schools, Miami, FL.
GRADES OR AGES: Grade twlve. SUBJECT MATTER: The physical development and needs, as well as the psychological development and needs of the individual from infancy to old age. The health of the community is studied in terms of communicable diseases, immunology, resources available for the optimal health of any community (including health services…
Penny S. Lawson; R. Edward Thomas; Elizabeth S Walker
1996-01-01
OPTIGRAMI V2 is a computer program available for IBM persaonl computer with 80286 and higher processors. OPTIGRAMI V2 determines the least-cost lumber grade mix required to produce a given cutting order for clear parts from rough lumber of known grades in a crosscut-first rough mill operation. It is a user-friendly integrated application that includes optimization...
Network Security Risk Assessment System Based on Attack Graph and Markov Chain
NASA Astrophysics Data System (ADS)
Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian
2017-10-01
Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.
76 FR 66917 - Privacy Act of 1974; Notice To Amend an Existing System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... methodologies. DATES: The proposed amendment to this existing system of records will become effective without... that this amendment should not become effective on that date. Comments regarding this amendment must be...: Name, date and place of birth, social security number, citizenship status, grade, organization...
75 FR 13090 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-18
... proposed action will be effective without further notice on April 19, 2010 unless comments are received... activities. Categories of records in the system: Individual's name, duty title, grade, Social Security Number... the system: Storage: Electronic storage media. Retrievability: By name, last 8 digits of the Common...
Code of Federal Regulations, 2010 CFR
2010-10-01
... equivalent fire-resistant material; and (2) Fitted with a commercial garden-hose nozzle of high-grade bronze..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS FIRE-PROTECTION EQUIPMENT Fire Main § 132... equipped with a fire main that complies with this subpart. (b) Each vessel of less than 100 gross tons and...
77 FR 56632 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
...) through Chief Master Sergeant (E-9). Air National Guard and Air Force Reserve personnel grades Staff Sergeant (E-5) through Chief Master Sergeant (E- 9).'' * * * * * Retrievability: Delete entry and replace.... Electronic files are only accessed by authorized personnel with a Secure Common Access Card (CAC) and need...
Students "Hacking" School Computer Systems
ERIC Educational Resources Information Center
Stover, Del
2005-01-01
This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…
Nuclear Security: Target Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Surinder Paul; Gibbs, Philip W.; Bultz, Garl A.
2014-03-01
This objectives of this session were to understand the basic steps of target identification; describe the SNRI targets in detail; characterize specific targets with more detail; prioritize targets based on guidance documents; understand the graded safeguards concept; identify roll up and understand why it is a concern; and recognize the category for different materials.
78 FR 64031 - Privacy Act of 1974: Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... Retirement Income Security Act (``ERISA'') to be shared with parties outside of PBGC that elect to pay a... accommodation would assist the employee in the performance of his/her job; relevant medical documentation and... system may include an employee's name, position title, grade, job series, and department name; official...
76 FR 28757 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-18
... Elementary and Secondary Schools; 20 U.S.C. 921-932, Overseas Defense Dependents Education; DoD Directive.... Categories of records in the system: Records consist of first name, last name, Social Security Number (SSN... school or organization, identification numbers assigned to each school and office facility, grade level...
Social-Emotional Learning Is Essential to Classroom Management
ERIC Educational Resources Information Center
Jones, Stephanie M.; Bailey, Rebecca; Jacob, Robin
2014-01-01
Research tells us that children's social-emotional development can propel learning. A new program, SECURe, embeds that research into classroom management strategies that improve teaching and learning. Across all classrooms and grade levels, four principles of effective management are constant: Effective classroom management is based in…
7 CFR 56.54 - Charges for continuous grading performed on a nonresident basis.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) REGULATIONS AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG PRODUCTS.... Internal Revenue Code (26 U.S.C.) for Old Age and Survivor's Benefits under the Social Security System...
Role for Federal Government in Safeguarding Student Data Privacy
ERIC Educational Resources Information Center
Barnes, Khaliah; Kowalski, Paige
2016-01-01
Unsurprisingly, schools, companies, and others that have amassed student information have been unable to adequately safeguard it. They simply cannot keep up with all the data they have collected and have routinely experienced data breaches. These breaches have compromised grades, student financial information, Social Security numbers, and even…
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and... or equivalent of not over 11/2 inch diameter or garden hose of not less than 5/8 inch nominal inside diameter. If garden hose is used, it must be of a good commercial grade constructed of an inner rubber tube...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and... or equivalent of not over 11/2 inch diameter or garden hose of not less than 5/8 inch nominal inside diameter. If garden hose is used, it must be of a good commercial grade constructed of an inner rubber tube...
ERIC Educational Resources Information Center
Passmore, Cheryl
2002-01-01
Describes the use of plastic identity badges with photographs and barcodes issued to all administrators, teachers, staff members, and students in grades 6-12 at the Cleveland Hill Union Free School District in Cheektowaga, New York. (PKP)
49 CFR 238.429 - Safety appliances.
Code of Federal Regulations, 2013 CFR
2013-10-01
...-inch diameter steel pipe, 5/8-inch thickness steel, or a material of equal or greater mechanical strength. (2) All safety appliances shall be securely fastened to the car body structure with mechanical fasteners that have mechanical strength greater than or equal to that of a 1/2-inch diameter SAE grade steel...
49 CFR 238.429 - Safety appliances.
Code of Federal Regulations, 2014 CFR
2014-10-01
...-inch diameter steel pipe, 5/8-inch thickness steel, or a material of equal or greater mechanical strength. (2) All safety appliances shall be securely fastened to the car body structure with mechanical fasteners that have mechanical strength greater than or equal to that of a 1/2-inch diameter SAE grade steel...
A Course in Natural Science and National Security in the Nuclear Age.
ERIC Educational Resources Information Center
Blumberg, Avrom A.
1983-01-01
Topics and instructional strategies for an upper-level, problem-oriented science and society course at De Paul University are described. Objectives and grading procedures for "Problems in Modern Warfare, Arms Control, and Disarmament" are also described. Course syllabus, bibliography, and sample quizzes/examinations are available from…
The Effects of Academic Optimism on Elementary Reading Achievement
ERIC Educational Resources Information Center
Bevel, Raymona K.; Mitchell, Roxanne M.
2012-01-01
Purpose: The purpose of this paper is to explore the relationship between academic optimism (AO) and elementary reading achievement (RA). Design/methodology/approach: Using correlation and hierarchical linear regression, the authors examined school-level effects of AO on fifth grade reading achievement in 29 elementary schools in Alabama.…
Optimizing Your K-5 Engineering Design Challenge
ERIC Educational Resources Information Center
Coppola, Matthew Perkins; Merz, Alice H.
2017-01-01
Today, elementary school teachers continue to revisit old lessons and seek out new ones, especially in engineering. Optimization is the process by which an existing product or procedure is revised and refined. Drawn from the authors' experiences working directly with students in grades K-5 and their teachers and preservice teachers, the…
Oğüt, Hulisi; Raghunathan, Srinivasan; Menon, Nirup
2011-03-01
The correlated nature of security breach risks, the imperfect ability to prove loss from a breach to an insurer, and the inability of insurers and external agents to observe firms' self-protection efforts have posed significant challenges to cyber security risk management. Our analysis finds that a firm invests less than the social optimal levels in self-protection and in insurance when risks are correlated and the ability to prove loss is imperfect. We find that the appropriate social intervention policy to induce a firm to invest at socially optimal levels depends on whether insurers can verify a firm's self-protection levels. If self-protection of a firm is observable to an insurer so that it can design a contract that is contingent on the self-protection level, then self-protection and insurance behave as complements. In this case, a social planner can induce a firm to choose the socially optimal self-protection and insurance levels by offering a subsidy on self-protection. We also find that providing a subsidy on insurance does not provide a similar inducement to a firm. If self-protection of a firm is not observable to an insurer, then self-protection and insurance behave as substitutes. In this case, a social planner should tax the insurance premium to achieve socially optimal results. The results of our analysis hold regardless of whether the insurance market is perfectly competitive or not, implying that solely reforming the currently imperfect insurance market is insufficient to achieve the efficient outcome in cyber security risk management. © 2010 Society for Risk Analysis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wood, E.; Burton, E.; Duran, A.
Understanding the real-world power demand of modern automobiles is of critical importance to engineers using modeling and simulation to inform the intelligent design of increasingly efficient powertrains. Increased use of global positioning system (GPS) devices has made large scale data collection of vehicle speed (and associated power demand) a reality. While the availability of real-world GPS data has improved the industry's understanding of in-use vehicle power demand, relatively little attention has been paid to the incremental power requirements imposed by road grade. This analysis quantifies the incremental efficiency impacts of real-world road grade by appending high fidelity elevation profiles tomore » GPS speed traces and performing a large simulation study. Employing a large real-world dataset from the National Renewable Energy Laboratory's Transportation Secure Data Center, vehicle powertrain simulations are performed with and without road grade under five vehicle models. Aggregate results of this study suggest that road grade could be responsible for 1% to 3% of fuel use in light-duty automobiles.« less
Perumal, Madhumathy; Dhandapani, Sivakumar
2015-01-01
Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols.
Endogenous fertility, altruistic behavior across generations, and social security systems.
Prinz, A
1990-01-01
This study examines the possible link between the existence of a pay-as-you-go social security program and individual procreative behavior. When a public old-age income support system takes the place of within-family support, the theoretical literature preducts that fertility rates will decline since children are no longer perceived as important to the old age security of the parents. The author takes up this theoretical problem and examines it through three different but related issues: optimal capital accumulation, optimal population growth and the role of social institutions affecting efficient intergenerational allocations. Econometric analysis employing a steady state growth model is used. Altruism between generations is studied for effect on the standard model. The model shows that for social optimum the per capita pension is related to the growth rate of the population, therefore, for society as a whole, children are investment goods. However, given the existence of a social security system, it is in each household's best interest to have no children at all. Only a government transfer, a child allowance to parents, changes the model and fertility rates. When modified to account for "caring" the model demonstrates that altruistic behavior between generations is not symmetrical. The study concludes that a pay-as-you-go funded social security system should be supplemented by a system of child allowances or replaced by a fully funded social security system.
Characterization and optimization for detector systems of IGRINS
NASA Astrophysics Data System (ADS)
Jeong, Ueejeong; Chun, Moo-Young; Oh, Jae Sok; Park, Chan; Yuk, In-Soo; Oh, Heeyoung; Kim, Kang-Min; Ko, Kyeong Yeon; Pavel, Michael D.; Yu, Young Sam; Jaffe, Daniel T.
2014-07-01
IGRINS (Immersion GRating INfrared Spectrometer) is a high resolution wide-band infrared spectrograph developed by the Korea Astronomy and Space Science Institute (KASI) and the University of Texas at Austin (UT). This spectrograph has H-band and K-band science cameras and a slit viewing camera, all three of which use Teledyne's λc~2.5μm 2k×2k HgCdTe HAWAII-2RG CMOS detectors. The two spectrograph cameras employ science grade detectors, while the slit viewing camera includes an engineering grade detector. Teledyne's cryogenic SIDECAR ASIC boards and JADE2 USB interface cards were installed to control those detectors. We performed experiments to characterize and optimize the detector systems in the IGRINS cryostat. We present measurements and optimization of noise, dark current, and referencelevel stability obtained under dark conditions. We also discuss well depth, linearity and conversion gain measurements obtained using an external light source.
Kirk, Sara F L; Kuhle, Stefan; McIsaac, Jessie-Lee D; Williams, Patty L; Rossiter, Melissa; Ohinmaa, Arto; Veugelers, Paul J
2015-11-01
Food security (FS) exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their needs. The present research sought to determine whether students from households experiencing moderate or severe food insecurity (FI) had poorer diet quality, higher body weights and poorer psychosocial outcomes than students from households classed as having high FS or marginal FI status. Population-based survey conducted in schools. Multiple regression analysis was used to explore associations between FS status (high FS; marginal, moderate, severe FI), dietary behaviours and intake, and health-related outcomes (body weight, quality of life, mood, peer relationships, externalizing problems). Nova Scotia, Canada. Grade 5 students (n 5853), aged 10-11 years, with complete information on FS status and student outcomes. In this sample, rates of household FS were 73·5% (high FS), 8·3% (marginal FI) 10·2% (moderate FI) and 7·1% (severe FI status). Students living in households experiencing moderate or severe FI had poorer diet quality, higher BMI and poorer psychosocial outcomes than students classed as having high FS or marginal FI. These findings provide important evidence for policy makers on the prevalence of FI among families in Nova Scotia with grade 5 children and its relationship with childhood nutrition, psychosocial and quality of life factors, and weight status.
Ruhl, Holly; Dolan, Elaine A.; Buhrmester, Duane
2014-01-01
This longitudinal study investigated how attachment with mothers and fathers changes during adolescence, and how gender and parent-child relationship experiences are associated with attachment trajectories. The relative importance of specific positive and negative relationship experiences on attachment trajectories was also examined. An initial sample of 223 adolescents reported on relationship experiences and attachment avoidance and anxiety with mothers and fathers in grades 6, 8, 10, and 12 (final N=110; Mage=11.90 years at onset, SD=.43). Mothers and fathers reported on relationship experiences with adolescents. Hierarchical linear modeling showed that security with parents increased during adolescence. Positive relationship experiences (companionship, satisfaction, approval, support) predicted increases in security and negative experiences (pressure, criticism) predicted decreases in security. Females reported less avoidance than males. PMID:26347590
Optimization of power systems with voltage security constraints
NASA Astrophysics Data System (ADS)
Rosehart, William Daniel
As open access market principles are applied to power systems, significant changes in their operation and control are occurring. In the new marketplace, power systems are operating under higher loading conditions as market influences demand greater attention to operating cost versus stability margins. Since stability continues to be a basic requirement in the operation of any power system, new tools are being considered to analyze the effect of stability on the operating cost of the system, so that system stability can be incorporated into the costs of operating the system. In this thesis, new optimal power flow (OPF) formulations are proposed based on multi-objective methodologies to optimize active and reactive power dispatch while maximizing voltage security in power systems. The effects of minimizing operating costs, minimizing reactive power generation and/or maximizing voltage stability margins are analyzed. Results obtained using the proposed Voltage Stability Constrained OPF formulations are compared and analyzed to suggest possible ways of costing voltage security in power systems. When considering voltage stability margins the importance of system modeling becomes critical, since it has been demonstrated, based on bifurcation analysis, that modeling can have a significant effect of the behavior of power systems, especially at high loading levels. Therefore, this thesis also examines the effects of detailed generator models and several exponential load models. Furthermore, because of its influence on voltage stability, a Static Var Compensator model is also incorporated into the optimization problems.
Optimal security investments and extreme risk.
Mohtadi, Hamid; Agiwal, Swati
2012-08-01
In the aftermath of 9/11, concern over security increased dramatically in both the public and the private sector. Yet, no clear algorithm exists to inform firms on the amount and the timing of security investments to mitigate the impact of catastrophic risks. The goal of this article is to devise an optimum investment strategy for firms to mitigate exposure to catastrophic risks, focusing on how much to invest and when to invest. The latter question addresses the issue of whether postponing a risk mitigating decision is an optimal strategy or not. Accordingly, we develop and estimate both a one-period model and a multiperiod model within the framework of extreme value theory (EVT). We calibrate these models using probability measures for catastrophic terrorism risks associated with attacks on the food sector. We then compare our findings with the purchase of catastrophic risk insurance. © 2012 Society for Risk Analysis.
Computer Based Porosity Design by Multi Phase Topology Optimization
NASA Astrophysics Data System (ADS)
Burblies, Andreas; Busse, Matthias
2008-02-01
A numerical simulation technique called Multi Phase Topology Optimization (MPTO) based on finite element method has been developed and refined by Fraunhofer IFAM during the last five years. MPTO is able to determine the optimum distribution of two or more different materials in components under thermal and mechanical loads. The objective of optimization is to minimize the component's elastic energy. Conventional topology optimization methods which simulate adaptive bone mineralization have got the disadvantage that there is a continuous change of mass by growth processes. MPTO keeps all initial material concentrations and uses methods adapted from molecular dynamics to find energy minimum. Applying MPTO to mechanically loaded components with a high number of different material densities, the optimization results show graded and sometimes anisotropic porosity distributions which are very similar to natural bone structures. Now it is possible to design the macro- and microstructure of a mechanical component in one step. Computer based porosity design structures can be manufactured by new Rapid Prototyping technologies. Fraunhofer IFAM has applied successfully 3D-Printing and Selective Laser Sintering methods in order to produce very stiff light weight components with graded porosities calculated by MPTO.
A computerized bucking trainer for optimally bucking hardwoods
Scott Noble; Blair Orr; Philip A. Araman; John Baumgras; James B. Pickens
2000-01-01
The bucking of hardwood stems constitutes the initial manufacturing decision for hardwood lumber production. Each bucking cut creates a log of fixed grade and scale. The grade and scale of each log created by the bucker determines the quantity and quality of potential lumber, which determines the value of the log within a given market. As a result, bucking decisions...
Design and fabrication of planar structures with graded electromagnetic properties
NASA Astrophysics Data System (ADS)
Good, Brandon Lowell
Successfully integrating electromagnetic properties in planar structures offers numerous benefits to the microwave and optical communities. This work aims at formulating new analytic and optimized design methods, creating new fabrication techniques for achieving those methods, and matching appropriate implementation of methods to fabrication techniques. The analytic method consists of modifying an approach that realizes perfect antireflective properties from graded profiles. This method is shown for all-dielectric and magneto-dielectric grading profiles. The optimized design methods are applied to transformer (discrete) or taper (continuous) designs. From these methods, a subtractive and an additive manufacturing technique were established and are described. The additive method, dry powder dot deposition, enables three dimensional varying electromagnetic properties in a structural composite. Combining the methods and fabrication is shown in two applied methodologies. The first uses dry powder dot deposition to design one dimensionally graded electromagnetic profiles in a planar fiberglass composite. The second method simultaneously applies antireflective properties and adjusts directivity through a slab through the use of subwavelength structures to achieve a flat antireflective lens. The end result of this work is a complete set of methods, formulations, and fabrication techniques to achieve integrated electromagnetic properties in planar structures.
Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan
2013-06-01
Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.
Refining of metallurgical-grade silicon
NASA Technical Reports Server (NTRS)
Dietl, J.
1986-01-01
A basic requirement of large scale solar cell fabrication is to provide low cost base material. Unconventional refining of metallurical grade silicon represents one of the most promising ways of silicon meltstock processing. The refining concept is based on an optimized combination of metallurgical treatments. Commercially available crude silicon, in this sequence, requires a first pyrometallurgical step by slagging, or, alternatively, solvent extraction by aluminum. After grinding and leaching, high purity qualtiy is gained as an advanced stage of refinement. To reach solar grade quality a final pyrometallurgical step is needed: liquid-gas extraction.
Derivative Free Optimization of Complex Systems with the Use of Statistical Machine Learning Models
2015-09-12
AFRL-AFOSR-VA-TR-2015-0278 DERIVATIVE FREE OPTIMIZATION OF COMPLEX SYSTEMS WITH THE USE OF STATISTICAL MACHINE LEARNING MODELS Katya Scheinberg...COMPLEX SYSTEMS WITH THE USE OF STATISTICAL MACHINE LEARNING MODELS 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-11-1-0239 5c. PROGRAM ELEMENT...developed, which has been the focus of our research. 15. SUBJECT TERMS optimization, Derivative-Free Optimization, Statistical Machine Learning 16. SECURITY
Alexander, Paul E; Gionfriddo, Michael R; Li, Shelly-Anne; Bero, Lisa; Stoltzfus, Rebecca J; Neumann, Ignacio; Brito, Juan P; Djulbegovic, Benjamin; Montori, Victor M; Norris, Susan L; Schünemann, Holger J; Thabane, Lehana; Guyatt, Gordon H
2016-02-01
Many strong recommendations issued by the World Health Organization (WHO) are based on low- or very low-quality (low certainty) evidence (discordant recommendations). Many such discordant recommendations are inconsistent with the Grading of Recommendations Assessment, Development and Evaluation (GRADE) guidance. We sought to understand why WHO makes discordant recommendations inconsistent with GRADE guidance. We interviewed panel members involved in guidelines approved by WHO (2007-2012) that included discordant recommendations. Interviews, recorded and transcribed, focused on use of GRADE including the reasoning underlying, and factors contributing to, discordant recommendations. Four themes emerged: strengths of GRADE, challenges and barriers to GRADE, strategies to improve GRADE application, and explanations for discordant recommendations. Reasons for discordant recommendations included skepticism about the value of making conditional recommendations; political considerations; high certainty in benefits (sometimes warranted, sometimes not) despite assessing evidence as low certainty; and concerns that conditional recommendations will be ignored. WHO panelists make discordant recommendations inconsistent with GRADE guidance for reasons that include limitations in their understanding of GRADE. Ensuring optimal application of GRADE at WHO and elsewhere likely requires selecting panelists who have a commitment to GRADE principles, additional training of panelists, and formal processes to maximize adherence to GRADE principles. Copyright © 2016 Elsevier Inc. All rights reserved.
Application of simulation models for the optimization of business processes
NASA Astrophysics Data System (ADS)
Jašek, Roman; Sedláček, Michal; Chramcov, Bronislav; Dvořák, Jiří
2016-06-01
The paper deals with the applications of modeling and simulation tools in the optimization of business processes, especially in solving an optimization of signal flow in security company. As a modeling tool was selected Simul8 software that is used to process modeling based on discrete event simulation and which enables the creation of a visual model of production and distribution processes.
Theoretical Foundations of Wireless Networks
2015-07-22
Optimal transmission over a fading channel with imperfect channel state information,” in Global Telecommun. Conf., pp. 1–5, Houston TX , December 5-9...SECURITY CLASSIFICATION OF: The goal of this project is to develop a formal theory of wireless networks providing a scientific basis to understand...randomness and optimality. Randomness, in the form of fading, is a defining characteristic of wireless networks. Optimality is a suitable design
Situated Usability Testing for Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.
2011-03-02
While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused onmore » matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.« less
The Popcorn Box Activity and Reasoning about Optimization
ERIC Educational Resources Information Center
Whiteley, Walter J.; Mamolo, Ami
2012-01-01
A well-known optimization problem is the Popcorn Box investigation, which involves a movie theater snack container. The problem has been tailored for classroom investigations by the Ontario Association for Mathematics Education. The exploration was designed for students in grades 9 through 12. A common strategy proposed for algebra students is to…
ERIC Educational Resources Information Center
Lee, Seong-Soo
1982-01-01
Tenth-grade students (n=144) received training on one of three processing methods: coding-mapping (simultaneous), coding only, or decision tree (sequential). The induced simultaneous processing strategy worked optimally under rule learning, while the sequential strategy was difficult to induce and/or not optimal for rule-learning operations.…
Impact of a Flexible Evaluation System on Effort and Timing of Study
ERIC Educational Resources Information Center
Pacharn, Parunchana; Bay, Darlene; Felton, Sandra
2012-01-01
This paper examines results of a flexible grading system that allows each student to influence the weight allocated to each performance measure. We construct a stylized model to determine students' optimal responses. Our analytical model predicts different optimal strategies for students with varying academic abilities: a frontloading strategy for…
Episodic and Individual Effects of Elementary Students' Optimal Experience: An HLM Study
ERIC Educational Resources Information Center
Cheng, Chao-Yang; Chen, Sherry Y.; Lin, Sunny S. J.
2017-01-01
The authors defined optimal experience as a functional state of a relatively high level of concentration, time distortion, satisfaction, and enjoyment (Csikszentmihalyi, 1992) and collected data through the Day Reconstruction Method. In three random days, 147 fifth-grade students answered questionnaires for each school event in the previous day…
An overview of polyurethane foams in higher specification foam mattresses.
Soppi, Esa; Lehtiö, Juha; Saarinen, Hannu
2015-02-01
Soft polyurethane foams exist in thousands of grades and constitute essential components of hospital mattresses. For pressure ulcer prevention, the ability of foams to control the immersion and envelopment of patients is essential. Higher specification foam mattresses (i.e., foam mattresses that relieve pressure via optimum patient immersion and envelopment while enabling patient position changes) are claimed to be more effective for preventing pressure ulcers than standard mattresses. Foam grade evaluations should include resiliency, density, hardness, indentation force/load deflection, progressive hardness, tensile strength, and elongation along with essential criteria for higher specification foam mattresses. Patient-specific requirements may include optimal control of patient immersion and envelopment. Mattress cover characteristics should include breathability, impermeability to fluids, and fire safety and not affect mattress function. Additional determinations such as hardness are assessed according to the guidelines of the American Society for Testing and Materials and the International Organization for Standardization. At this time, no single foam grade provides an optimal combination of the above key requirements, but the literature suggests a combination of at least 2 foams may create an optimal higher specification foam mattress for pressure ulcer prevention. Future research and the development of product specification accuracy standards are needed to help clinicians make evidence-based decisions about mattress use.
Zakrzewska-Koltuniewicz, Grażyna; Herdzik-Koniecko, Irena; Cojocaru, Corneliu; Chajduk, Ewelina
2014-06-30
The paper deals with experimental design and optimization of leaching process of uranium and associated metals from low-grade, Polish ores. The chemical elements of interest for extraction from the ore were U, La, V, Mo, Yb and Th. Sulphuric acid has been used as leaching reagent. Based on the design of experiments the second-order regression models have been constructed to approximate the leaching efficiency of elements. The graphical illustrations using 3-D surface plots have been employed in order to identify the main, quadratic and interaction effects of the factors. The multi-objective optimization method based on desirability approach has been applied in this study. The optimum condition have been determined as P=5 bar, T=120 °C and t=90 min. Under these optimal conditions, the overall extraction performance is 81.43% (for U), 64.24% (for La), 98.38% (for V), 43.69% (for Yb) and 76.89% (for Mo) and 97.00% (for Th). Copyright © 2014 Elsevier B.V. All rights reserved.
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan
2013-02-01
The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p < 0.0001). The TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.
Bartfeld, Judith S; Ahn, Hong-Min
2011-03-01
The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.
Challenge and Opportunity: Educating Liberia's War Affected Children in Primary Grades
ERIC Educational Resources Information Center
Weah, Wokie
2004-01-01
Liberia's emergence from 15 years of tremendous upheaval has left it with an unsettled domestic security situation, a disrupted formal economy and a virtually destroyed national infrastructure. Faced with a burgeoning school-age population and the growing demand for education, Liberia's new National Transitional Government--composed of rebel,…
46 CFR 193.10-10 - Fire hydrants and hose.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Fire hydrants and hose. 193.10-10 Section 193.10-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... hose and couplings shall be of good commercial grade. (4) Each section of fire hose used after January...
46 CFR 193.10-10 - Fire hydrants and hose.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Fire hydrants and hose. 193.10-10 Section 193.10-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... hose and couplings shall be of good commercial grade. (4) Each section of fire hose used after January...
46 CFR 193.10-10 - Fire hydrants and hose.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Fire hydrants and hose. 193.10-10 Section 193.10-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... hose and couplings shall be of good commercial grade. (4) Each section of fire hose used after January...
Jobs and Engines: Political Issues. Comparing Political Experiences, Experimental Edition.
ERIC Educational Resources Information Center
Gillespie, Judith A.; Lazarus, Stuart
This is the fourth unit to the 12th-grade second-semester "Comparing Political Experiences" course which focuses on specific controversial political issues. The unit analyzes the concept of political development by examining the Cummins Engine Company and employee job security during the company's growth into a multinational corporation.…
Alabama Kids Count 2002 Data Book.
ERIC Educational Resources Information Center
Curtis, Apreill; Bogie, Don
This Kids Count data book examines statewide trends in well-being of Alabamas children. The statistical portrait is based on 18 indicators in the areas of child health, education, safety, and security: (1) infant mortality rate; (2) low weight births; (3) child health index; (4) births to unmarried teens; (5) first grade retention; (6) school…
Alabama Kids Count 2001 Data Book.
ERIC Educational Resources Information Center
Curtis, Apreill; Bogie, Don
This Kids Count data book examines statewide trends in well-being for Alabama's children. The statistical portrait is based on 17 indicators in the areas of health, education, safety, and security. The indicators are: (1) infant mortality rate; (2) low weight births; (3) child health index; (4) births to unmarried teens; (5) first grade retention;…
Code of Federal Regulations, 2011 CFR
2011-07-01
... Register Liaison Officer, Department of Defense. DODDS 27 System name: DoD Domestic and Elementary School..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Register Liaison Officer, Department of Defense. DODDS 27 System name: DoD Domestic and Elementary School..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability...
September 11: An Elementary School at Ground Zero.
ERIC Educational Resources Information Center
Lehmuller, Pierre; Switzer, Anna
2002-01-01
Describes what happened at New York City's Public School 234 after the terrorist attack on the World Trade Center on September 11. The prekindergarten through grade 5 elementary school of 655 students was located near ground zero. Emphasizes efforts to ensure students' immediate safety and security, provide rapid evacuation, and move to another…
Family Factors and NEET Status: An Estonian Case Study
ERIC Educational Resources Information Center
Leino, Mare; Hintsanen, Mirka; Hintsa, Taina; Merjonen, Paivi; Keltikangas-Jarvinen, Liisa
2013-01-01
For young people, not being in education, employment or training (NEET) may be detrimental to self-esteem and limit possibilities for achieving financial security and a respectable position in society. One major educational problem in Estonia is low academic achievement at the upper level of basic education (Grades 7-9), reflected in a large…
Production of fuel-grade ethanol from renewable resources, such as biomass, is gaining attention due to the phase out of methyl t-butyl ether (MTBE) as a fuel oxygenate, national security issues related to non-domestic sources of fuels, and the effect of fossil fuel combustion on...
The production of fuel-grade ethanol from renewable resources, such as biomass, is gaining attention due to the phase out of methyl t-butyl ether (MTBE) as a fuel oxygenate, national security issues related to non-domestic sources of fuels, and the effect of fossil fuel combustio...
46 CFR 32.70-10 - Cofferdams-TB/ALL.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Cofferdams-TB/ALL. 32.70-10 Section 32.70-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Cofferdams—TB/ALL. Tank vessels carrying Grade A, B, or C liquids shall be required to conform to the...
46 CFR 32.70-15 - Pumprooms-TB/ALL.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Pumprooms-TB/ALL. 32.70-15 Section 32.70-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Pumprooms—TB/ALL. Tank vessels handling Grade A, B, C or D liquid cargo shall meet the requirements for tank...
46 CFR 32.70-15 - Pumprooms-TB/ALL.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Pumprooms-TB/ALL. 32.70-15 Section 32.70-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Pumprooms—TB/ALL. Tank vessels handling Grade A, B, C or D liquid cargo shall meet the requirements for tank...
46 CFR 32.70-15 - Pumprooms-TB/ALL.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Pumprooms-TB/ALL. 32.70-15 Section 32.70-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Pumprooms—TB/ALL. Tank vessels handling Grade A, B, C or D liquid cargo shall meet the requirements for tank...
46 CFR 32.70-10 - Cofferdams-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Cofferdams-TB/ALL. 32.70-10 Section 32.70-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Cofferdams—TB/ALL. Tank vessels carrying Grade A, B, or C liquids shall be required to conform to the...
46 CFR 32.70-10 - Cofferdams-TB/ALL.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Cofferdams-TB/ALL. 32.70-10 Section 32.70-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Cofferdams—TB/ALL. Tank vessels carrying Grade A, B, or C liquids shall be required to conform to the...
46 CFR 32.70-15 - Pumprooms-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Pumprooms-TB/ALL. 32.70-15 Section 32.70-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Pumprooms—TB/ALL. Tank vessels handling Grade A, B, C or D liquid cargo shall meet the requirements for tank...
46 CFR 32.70-10 - Cofferdams-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Cofferdams-TB/ALL. 32.70-10 Section 32.70-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Cofferdams—TB/ALL. Tank vessels carrying Grade A, B, or C liquids shall be required to conform to the...
46 CFR 32.70-15 - Pumprooms-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Pumprooms-TB/ALL. 32.70-15 Section 32.70-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Pumprooms—TB/ALL. Tank vessels handling Grade A, B, C or D liquid cargo shall meet the requirements for tank...
46 CFR 32.70-10 - Cofferdams-TB/ALL.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Cofferdams-TB/ALL. 32.70-10 Section 32.70-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL... Cofferdams—TB/ALL. Tank vessels carrying Grade A, B, or C liquids shall be required to conform to the...
ERIC Educational Resources Information Center
US Department of Homeland Security, 2005
2005-01-01
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
NASA Astrophysics Data System (ADS)
Thiébaut, E.; Goupil, C.; Pesty, F.; D'Angelo, Y.; Guegan, G.; Lecoeur, P.
2017-12-01
Increasing the maximum cooling effect of a Peltier cooler can be achieved through material and device design. The use of inhomogeneous, functionally graded materials may be adopted in order to increase maximum cooling without improvement of the Z T (figure of merit); however, these systems are usually based on the assumption that the local optimization of the Z T is the suitable criterion to increase thermoelectric performance. We solve the heat equation in a graded material and perform both analytical and numerical analysis of a graded Peltier cooler. We find a local criterion that we use to assess the possible improvement of graded materials for thermoelectric cooling. A fair improvement of the cooling effect (up to 36%) is predicted for semiconductor materials, and the best graded system for cooling is described. The influence of the equation of state of the electronic gas of the material is discussed, and the difference in term of entropy production between the graded and the classical system is also described.
A Defender-Attacker Optimization of Port Radar Surveillance
2011-01-01
security; optimization; attacker-defender “And thence discover how with most advantage They may vex us with shot, or with assault.” Shakespeare , KingHenryVI...ed., McGraw-Hill, New York, 1990. [23] H. von Stackelberg, The theory of the market economy, William Hodge, London, UK, 1952. [24] J. Benders
Collective attacks and unconditional security in continuous variable quantum key distribution.
Grosshans, Frédéric
2005-01-21
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Etén-Bergqvist, Christina; Persson, Jan
2011-07-01
The aim of this prospective randomized multicenter study was to compare TVT (tension-free vaginal tape) with TVT-Secur in terms of efficacy and safety. We set out to enrol 280 stress incontinent women with a half time interim analysis of short-term cure and a continuous registration of adverse events. Of 133 randomized women, 126 were operated and 123 (TVT n = 62, TVT-Secur n = 61) available for 2 months follow-up. No significant differences were found between groups regarding demographics or grade of incontinence. At 2 months follow-up, subjective cure rate following TVT-Secur was significantly lower than for TVT (72% and 92%, respectively, p = 0.01). Three major complications occurred in the TVT-Secur group: tape erosion into the urethra, a tape inadvertently placed inside the bladder, and an immediate postoperative bleeding from the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding perioperative bleeding, hospital stay, urge symptoms, or postoperative urinary tract infections. Median time for surgery was 13 and 22 min for TVT-Secur and TVT, respectively (p < 0.0001). In a prospective randomized controlled study, the TVT-Secur procedure had a significantly lower subjective cure rate than the retropubic TVT procedure. Due to this, in addition to three serious complications in the TVT-Secur group, we decided to stop further enrolment after the interim analysis. We discourage from further use of the TVT-Secur.
Tuffaha, Haitham W; Reynolds, Heather; Gordon, Louisa G; Rickard, Claire M; Scuffham, Paul A
2014-12-01
Value of information analysis has been proposed as an alternative to the standard hypothesis testing approach, which is based on type I and type II errors, in determining sample sizes for randomized clinical trials. However, in addition to sample size calculation, value of information analysis can optimize other aspects of research design such as possible comparator arms and alternative follow-up times, by considering trial designs that maximize the expected net benefit of research, which is the difference between the expected cost of the trial and the expected value of additional information. To apply value of information methods to the results of a pilot study on catheter securement devices to determine the optimal design of a future larger clinical trial. An economic evaluation was performed using data from a multi-arm randomized controlled pilot study comparing the efficacy of four types of catheter securement devices: standard polyurethane, tissue adhesive, bordered polyurethane and sutureless securement device. Probabilistic Monte Carlo simulation was used to characterize uncertainty surrounding the study results and to calculate the expected value of additional information. To guide the optimal future trial design, the expected costs and benefits of the alternative trial designs were estimated and compared. Analysis of the value of further information indicated that a randomized controlled trial on catheter securement devices is potentially worthwhile. Among the possible designs for the future trial, a four-arm study with 220 patients/arm would provide the highest expected net benefit corresponding to 130% return-on-investment. The initially considered design of 388 patients/arm, based on hypothesis testing calculations, would provide lower net benefit with return-on-investment of 79%. Cost-effectiveness and value of information analyses were based on the data from a single pilot trial which might affect the accuracy of our uncertainty estimation. Another limitation was that different follow-up durations for the larger trial were not evaluated. The value of information approach allows efficient trial design by maximizing the expected net benefit of additional research. This approach should be considered early in the design of randomized clinical trials. © The Author(s) 2014.
Lala, Anuradha; McNulty, Steven E; Mentz, Robert J; Dunlay, Shannon M; Vader, Justin M; AbouEzzeddine, Omar F; DeVore, Adam D; Khazanie, Prateeti; Redfield, Margaret M; Goldsmith, Steven R; Bart, Bradley A; Anstrom, Kevin J; Felker, G Michael; Hernandez, Adrian F; Stevenson, Lynne W
2015-07-01
Congestion is the most frequent cause for hospitalization in acute decompensated heart failure. Although decongestion is a major goal of acute therapy, it is unclear how the clinical components of congestion (eg, peripheral edema, orthopnea) contribute to outcomes after discharge or how well decongestion is maintained. A post hoc analysis was performed of 496 patients enrolled in the Diuretic Optimization Strategy Evaluation in Acute Decompensated Heart Failure (DOSE-AHF) and Cardiorenal Rescue Study in Acute Decompensated Heart Failure (CARRESS-HF) trials during hospitalization with acute decompensated heart failure and clinical congestion. A simple orthodema congestion score was generated based on symptoms of orthopnea (≥2 pillows=2 points, <2 pillows=0 points) and peripheral edema (trace=0 points, moderate=1 point, severe=2 points) at baseline, discharge, and 60-day follow-up. Orthodema scores were classified as absent (score of 0), low-grade (score of 1-2), and high-grade (score of 3-4), and the association with death, rehospitalization, or unscheduled medical visits through 60 days was assessed. At baseline, 65% of patients had high-grade orthodema and 35% had low-grade orthodema. At discharge, 52% patients were free from orthodema at discharge (score=0) and these patients had lower 60-day rates of death, rehospitalization, or unscheduled visits (50%) compared with those with low-grade or high-grade orthodema (52% and 68%, respectively; P=0.038). Of the patients without orthodema at discharge, 27% relapsed to low-grade orthodema and 38% to high-grade orthodema at 60-day follow-up. Increased severity of congestion by a simple orthodema assessment is associated with increased morbidity and mortality. Despite intent to relieve congestion, current therapy often fails to relieve orthodema during hospitalization or to prevent recurrence after discharge. URL: http://www.clinicaltrials.gov. Unique identifiers: NCT00608491, NCT00577135. © 2015 American Heart Association, Inc.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-09-28
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-01-01
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042
A three-dimensional optimal sawing system for small sawmills in central Appalachia
Wenshu Lin; Jingxin Wang; R. Edward. Thomas
2011-01-01
A three-dimensional (3D) log sawing optimization system was developed to perform 3D log generation, opening face determination, sawing simulation, and lumber grading. Superficial characteristics of logs such as length, large-end and small-end diameters, and external defects were collected from local sawmills. Internal log defect positions and shapes were predicted...
Kierkels, Roel G J; Wopken, Kim; Visser, Ruurd; Korevaar, Erik W; van der Schaaf, Arjen; Bijl, Hendrik P; Langendijk, Johannes A
2016-12-01
Radiotherapy of the head and neck is challenged by the relatively large number of organs-at-risk close to the tumor. Biologically-oriented objective functions (OF) could optimally distribute the dose among the organs-at-risk. We aimed to explore OFs based on multivariable normal tissue complication probability (NTCP) models for grade 2-4 dysphagia (DYS) and tube feeding dependence (TFD). One hundred head and neck cancer patients were studied. Additional to the clinical plan, two more plans (an OF DYS and OF TFD -plan) were optimized per patient. The NTCP models included up to four dose-volume parameters and other non-dosimetric factors. A fully automatic plan optimization framework was used to optimize the OF NTCP -based plans. All OF NTCP -based plans were reviewed and classified as clinically acceptable. On average, the Δdose and ΔNTCP were small comparing the OF DYS -plan, OF TFD -plan, and clinical plan. For 5% of patients NTCP TFD reduced >5% using OF TFD -based planning compared to the OF DYS -plans. Plan optimization using NTCP DYS - and NTCP TFD -based objective functions resulted in clinically acceptable plans. For patients with considerable risk factors of TFD, the OF TFD steered the optimizer to dose distributions which directly led to slightly lower predicted NTCP TFD values as compared to the other studied plans. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Vatanabe, Sandro L.; Silva, Emílio C. N.
2011-04-01
One of the properties of composite materials is the possibility of having phononic band gaps, within which sound and vibrations at certain frequencies do not propagate. These materials are called Phononic Crystals (PCs). PCs with large band gaps are of great interest for many applications, such as transducers, elastic/ acoustic filters, noise control, and vibration shields. Most of previous works concentrates on PCs made of elastic isotropic materials; however, band gaps can be enlarged by using non-isotropic materials, such as piezoelectric materials. Since the main property of PCs is the presence of band gaps, one possible way to design structures which have a desired band gap is through Topology Optimization Method (TOM). TOM is a computational technique that determines the layout of a material such that a prescribed objective is maximized. Functionally Graded Materials (FGM) are composite materials whose properties vary gradually and continuously along a specific direction within the domain of the material. One of the advantages of applying the FGM concept to TOM is that it is not necessary a discrete 0-1 result, once the material gradation is part of the solution. Therefore, the interpretation step becomes easier and the dispersion diagram obtained from the optimization is not significantly modified. In this work, the main objective is to optimize the position and width of piezocomposite materials band gaps. Finite element analysis is implemented with Bloch-Floquet theory to solve the dynamic behavior of two-dimensional functionally graded unit cells. The results demonstrate that phononic band gaps can be designed by using this methodology.
SURVIVABILITY THROUGH OPTIMIZING RESILIENT MECHANISMS (STORM)
2017-04-01
STATEMENT Approved for Public Release; Distribution Unlimited. PA# 88ABW-2017-0894 Date Cleared: 07 Mar 2017 13. SUPPLEMENTARY NOTES 14. ABSTRACT Game ...quantitatively about cyber-attacks. Game theory is the branch of applied mathematics that formalizes strategic interaction among intelligent rational agents...mechanism based on game theory. This work has applied game theory to numerous cyber security problems: cloud security, cyber threat information sharing
Microgrid Study: Energy Security for DoD Installations
2012-06-18
security, efficiency, and the incorporation of renewable and distributed energy resources into microgrids, as well as the factors that might facilitate...better understand how different environmental factors affected the choice of optimal microgrid architecture. Environmental factors in this context...lower costs—Networking generation assets allow for load sharing, allowing fewer generators to run at higher load factors and therefore with greater
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs
Wang, Lingling; Liu, Guozhu; Sun, Lijun
2017-01-01
Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.
Wang, Lingling; Liu, Guozhu; Sun, Lijun
2017-03-24
Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.
NASA Astrophysics Data System (ADS)
Winkel, D.; Bol, G. H.; van Asselen, B.; Hes, J.; Scholten, V.; Kerkmeijer, L. G. W.; Raaymakers, B. W.
2016-12-01
To develop an automated radiotherapy treatment planning and optimization workflow to efficiently create patient specifically optimized clinical grade treatment plans for prostate cancer and to implement it in clinical practice. A two-phased planning and optimization workflow was developed to automatically generate 77Gy 5-field simultaneously integrated boost intensity modulated radiation therapy (SIB-IMRT) plans for prostate cancer treatment. A retrospective planning study (n = 100) was performed in which automatically and manually generated treatment plans were compared. A clinical pilot (n = 21) was performed to investigate the usability of our method. Operator time for the planning process was reduced to <5 min. The retrospective planning study showed that 98 plans met all clinical constraints. Significant improvements were made in the volume receiving 72Gy (V72Gy) for the bladder and rectum and the mean dose of the bladder and the body. A reduced plan variance was observed. During the clinical pilot 20 automatically generated plans met all constraints and 17 plans were selected for treatment. The automated radiotherapy treatment planning and optimization workflow is capable of efficiently generating patient specifically optimized and improved clinical grade plans. It has now been adopted as the current standard workflow in our clinic to generate treatment plans for prostate cancer.
The Management and Security Expert (MASE)
NASA Technical Reports Server (NTRS)
Miller, Mark D.; Barr, Stanley J.; Gryphon, Coranth D.; Keegan, Jeff; Kniker, Catherine A.; Krolak, Patrick D.
1991-01-01
The Management and Security Expert (MASE) is a distributed expert system that monitors the operating systems and applications of a network. It is capable of gleaning the information provided by the different operating systems in order to optimize hardware and software performance; recognize potential hardware and/or software failure, and either repair the problem before it becomes an emergency, or notify the systems manager of the problem; and monitor applications and known security holes for indications of an intruder or virus. MASE can eradicate much of the guess work of system management.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hilton, Harry H.
Protocols are developed for formulating optimal viscoelastic designer functionally graded materials tailored to best respond to prescribed loading and boundary conditions. In essence, an inverse approach is adopted where material properties instead of structures per se are designed and then distributed throughout structural elements. The final measure of viscoelastic material efficacy is expressed in terms of failure probabilities vs. survival time000.
NASA Astrophysics Data System (ADS)
El-Sabbagh, A.; Baz, A.
2006-03-01
Conventionally, the viscoelastic cores of Constrained Layer Damping (CLD) treatments are made of materials that have uniform shear modulus. Under such conditions, it is well-recognized that these treatments are only effective near their edges where the shear strains attain their highest values. In order to enhance the damping characteristics of the CLD treatments, we propose to manufacture the cores from Functionally Graded ViscoElastic Materials (FGVEM) that have optimally selected gradient of the shear modulus over the length of the treatments. With such optimized distribution of the shear modulus, the shear strain can be enhanced, and the energy dissipation can be maximized. The theory governing the vibration of beams treated with CLD, that has functionally graded viscoelastic cores, is presented using the finite element method (FEM). The predictions of the FEM are validated experimentally for plain beams, beams treated conventional CLD, and beams with CLD/FGVEM of different configurations. The obtained results indicate a close agreement between theory and experiments. Furthermore, the obtained results demonstrate the effectiveness of the new class of CLD with functionally graded cores in enhancing the energy dissipation over the conventional CLD over a broad frequency band. Extension of the proposed one-dimensional beam/CLD/FGVEM system to more complex structures is a natural extension to the present study.
NASA Technical Reports Server (NTRS)
Atwell, William; Rojdev, Kristina; Aghara, Sukesh; Sriprisan, Sirikul
2013-01-01
In this paper we present a novel space radiation shielding approach using various material lay-ups, called "Graded-Z" shielding, which could optimize cost, weight, and safety while mitigating the radiation exposures from the trapped radiation and solar proton environments, as well as the galactic cosmic radiation (GCR) environment, to humans and electronics. In addition, a validation and verification (V&V) was performed using two different high energy particle transport/dose codes (MCNPX & HZETRN). Inherently, we know that materials having high-hydrogen content are very good space radiation shielding materials. Graded-Z material lay-ups are very good trapped electron mitigators for medium earth orbit (MEO) and geostationary earth orbit (GEO). In addition, secondary particles, namely neutrons, are produced as the primary particles penetrate a spacecraft, which can have deleterious effects to both humans and electronics. The use of "dopants," such as beryllium, boron, and lithium, impregnated in other shielding materials provides a means of absorbing the secondary neutrons. Several examples of optimized Graded-Z shielding layups that include the use of composite materials are presented and discussed in detail. This parametric shielding study is an extension of some earlier pioneering work we (William Atwell and Kristina Rojdev) performed in 20041 and 20092.
46 CFR 193.10-5 - Fire main system, details.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Fire main system, details. 193.10-5 Section 193.10-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... 21/2 2 7/8 2 50 1 On vessels of 65 feet in length or less, 3/4-inch hose of good commercial grade...
46 CFR 193.10-5 - Fire main system, details.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Fire main system, details. 193.10-5 Section 193.10-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... 21/2 2 7/8 2 50 1 On vessels of 65 feet in length or less, 3/4-inch hose of good commercial grade...
46 CFR 193.10-5 - Fire main system, details.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Fire main system, details. 193.10-5 Section 193.10-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... 21/2 2 7/8 2 50 1 On vessels of 65 feet in length or less, 3/4-inch hose of good commercial grade...
ERIC Educational Resources Information Center
Watertown Independent School District 1, SD.
Divided into four phases, this project in career education includes the following aspects: planning of project policies and activities and securing resource materials; orientation of the school district staff to the project; integration of occupational information, exploration, and career education concepts into the curriculum, identification of…
Self-Representations of Social and Academic Competence: Contextual Correlates in Middle Childhood
ERIC Educational Resources Information Center
Isabella, Russell A.; Diener, Marissa L.
2010-01-01
Self-representations of 1st-, 3rd-, and 5th-graders' social and academic competence were examined in relation to children's personal (grade/age); family (attachment to parents, marital conflict, anxiety related to conflict); and school (teacher appraisals) contexts. Children who reported higher levels of security of attachment to parents and lower…
Super p53 for Treatment of Ovarian Cancer
2016-07-01
WSLP ( polymer ) has been successfully synthesized, and a subset of adenoviral constructs have been cloned (p53, p53-CC, EGFP control). Major results...therapy, carboplatin, paclitaxel, polymeric drug delivery, polymer -adenovirus hybrid 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...modified p53, tumor suppressor, high grade serous carcinoma, combination therapy, carboplatin, paclitaxel, polymeric drug delivery, polymer
49 CFR 214.525 - Towing with on-track roadway maintenance machines or hi-rail vehicles.
Code of Federal Regulations, 2014 CFR
2014-10-01
... other coupling device that provides a safe and secure attachment. (b) An on-track roadway maintenance... towing would cause the machine or hi-rail vehicle to exceed the capabilities of its braking system. In determining the limit of the braking system, the employer must consider the track grade (slope), as well as...
49 CFR 214.525 - Towing with on-track roadway maintenance machines or hi-rail vehicles.
Code of Federal Regulations, 2013 CFR
2013-10-01
... other coupling device that provides a safe and secure attachment. (b) An on-track roadway maintenance... towing would cause the machine or hi-rail vehicle to exceed the capabilities of its braking system. In determining the limit of the braking system, the employer must consider the track grade (slope), as well as...
ERIC Educational Resources Information Center
Borja, Rhea R.
2006-01-01
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
Optimality of Gaussian attacks in continuous-variable quantum cryptography.
Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio
2006-11-10
We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.
Robust allocation of a defensive budget considering an attacker's private information.
Nikoofal, Mohammad E; Zhuang, Jun
2012-05-01
Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.
New optimization model for routing and spectrum assignment with nodes insecurity
NASA Astrophysics Data System (ADS)
Xuan, Hejun; Wang, Yuping; Xu, Zhanqi; Hao, Shanshan; Wang, Xiaoli
2017-04-01
By adopting the orthogonal frequency division multiplexing technology, elastic optical networks can provide the flexible and variable bandwidth allocation to each connection request and get higher spectrum utilization. The routing and spectrum assignment problem in elastic optical network is a well-known NP-hard problem. In addition, information security has received worldwide attention. We combine these two problems to investigate the routing and spectrum assignment problem with the guaranteed security in elastic optical network, and establish a new optimization model to minimize the maximum index of the used frequency slots, which is used to determine an optimal routing and spectrum assignment schemes. To solve the model effectively, a hybrid genetic algorithm framework integrating a heuristic algorithm into a genetic algorithm is proposed. The heuristic algorithm is first used to sort the connection requests and then the genetic algorithm is designed to look for an optimal routing and spectrum assignment scheme. In the genetic algorithm, tailor-made crossover, mutation and local search operators are designed. Moreover, simulation experiments are conducted with three heuristic strategies, and the experimental results indicate that the effectiveness of the proposed model and algorithm framework.
Optimization of steam generators of NPP with WWER in operation with variable load
NASA Astrophysics Data System (ADS)
Parchevskii, V. M.; Shchederkina, T. E.; Gur'yanova, V. V.
2017-11-01
The report addresses the issue of the optimal water level in the horizontal steam generators of NPP with WWER. On the one hand, the level needs to be kept at the lower limit of the allowable range, as gravity separation, steam will have the least humidity and the turbine will operate with higher efficiency. On the other hand, the higher the level, the greater the supply of water in the steam generator, and therefore the higher the security level of the unit, because when accidents involving loss of cooling of the reactor core, the water in the steam generators, can be used for cooling. To quantitatively compare the damage from higher level to the benefit of improving the safety was assessed of the cost of one cubic meter of water in the steam generators, the formulated objective function of optimal levels control. This was used two-dimensional separation characteristics of steam generators. It is demonstrated that the security significantly shifts the optimal values of the levels toward the higher values, and this bias is greater the lower the load unit.
Fundamental Limits of Delay and Security in Device-to-Device Communication
2013-01-01
systematic MDS (maximum distance separable) codes and random binning strategies that achieve a Pareto optimal delayreconstruction tradeoff. The erasure MD...file, and a coding scheme based on erasure compression and Slepian-Wolf binning is presented. The coding scheme is shown to provide a Pareto optimal...ble) codes and random binning strategies that achieve a Pareto optimal delay- reconstruction tradeoff. The erasure MD setup is then used to propose a
Advanced Computational Methods for Security Constrained Financial Transmission Rights
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kalsi, Karanjit; Elbert, Stephen T.; Vlachopoulou, Maria
Financial Transmission Rights (FTRs) are financial insurance tools to help power market participants reduce price risks associated with transmission congestion. FTRs are issued based on a process of solving a constrained optimization problem with the objective to maximize the FTR social welfare under power flow security constraints. Security constraints for different FTR categories (monthly, seasonal or annual) are usually coupled and the number of constraints increases exponentially with the number of categories. Commercial software for FTR calculation can only provide limited categories of FTRs due to the inherent computational challenges mentioned above. In this paper, first an innovative mathematical reformulationmore » of the FTR problem is presented which dramatically improves the computational efficiency of optimization problem. After having re-formulated the problem, a novel non-linear dynamic system (NDS) approach is proposed to solve the optimization problem. The new formulation and performance of the NDS solver is benchmarked against widely used linear programming (LP) solvers like CPLEX™ and tested on both standard IEEE test systems and large-scale systems using data from the Western Electricity Coordinating Council (WECC). The performance of the NDS is demonstrated to be comparable and in some cases is shown to outperform the widely used CPLEX algorithms. The proposed formulation and NDS based solver is also easily parallelizable enabling further computational improvement.« less
Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid
2016-01-01
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques. PMID:27384239
Abdulhamid, Shafi'i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid
2016-01-01
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
Nyantakyi-Frimpong, Hanson; Kangmennaang, Joseph; Bezner Kerr, Rachel; Luginaah, Isaac; Dakishoni, Laifolo; Lupafya, Esther; Shumba, Lizzie; Katundu, Mangani
2017-11-01
This paper assesses the relationship between agroecology, food security, and human health. Specifically, we ask if agroecology can lead to improved food security and human health among vulnerable smallholder farmers in semi-humid tropical Africa. The empirical evidence comes from a cross-sectional household survey (n=1000) in two districts in Malawi, a small country in semi-humid, tropical Africa. The survey consisted of 571 agroecology-adoption and 429 non-agroecology-adoption households. Ordered logistics regression and average treatment effects models were used to determine the effect of agroecology adoption on self-reported health. Our results show that agroecology-adoption households (OR=1.37, p=0.05) were more likely to report optimal health status, and the average treatment effect shows that adopters were 12% more likely to be in optimal health. Furthermore, being moderately food insecure (OR=0.59, p=0.05) and severely food insecure (OR=0.89, p=0.10) were associated with less likelihood of reporting optimal health status. The paper concludes that with the adoption of agroecology in the semi-humid tropics, it is possible for households to diversify their crops and diets, a condition that has strong implications for improved food security, good nutrition and human health. Copyright © 2016 Elsevier B.V. All rights reserved.
Bio-mimic optimization strategies in wireless sensor networks: a survey.
Adnan, Md Akhtaruzzaman; Abdur Razzaque, Mohammd; Ahmed, Ishtiaque; Isnin, Ismail Fauzi
2013-12-24
For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted.
JPARSS: A Java Parallel Network Package for Grid Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Jie; Akers, Walter; Chen, Ying
2002-03-01
The emergence of high speed wide area networks makes grid computinga reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve bandwidth and to reduce latency on a high speed wide area network. This paper presents a Java package called JPARSS (Java Parallel Secure Stream (Socket)) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a grid environment without the necessity of tuning TCP window size.more » This package enables single sign-on, certificate delegation and secure or plain-text data transfer using several security components based on X.509 certificate and SSL. Several experiments will be presented to show that using Java parallelstreams is more effective than tuning TCP window size. In addition a simple architecture using Web services« less
Ponzanelli, Anna; Vigo, Viviana; Marcenaro, Michela; Bacigalupo, Almalina; Gatteschi, Beatrice; Ravetti, Jean-Luis; Corvò, Renzo; Benasso, Marco
2008-08-01
Concomitant chemo-radiotherapy is the standard treatment for advanced nasopharyngeal carcinoma (NPC). Induction chemotherapy may improve the results further by enhancing both loco-regional and distant control. Fifty patients with untreated, stage IV (UICC 1992) undifferentiated NPC were initially treated with three courses of epidoxorubicin, 90 mg/m(2), day 1 and cisplatin, 40 mg/m(2), days 1 and 2, every three weeks and then underwent three courses of cisplatin, 20 mg/m(2)/day, days 1-4 and fluorouracil, 200mg/m(2)/day, days 1-4 (weeks 1, 4, 7), alternated to three splits of radiation (week 2-3, 5-6, 8-9-10) up to 70 Gy. All patients but one received 3 cycles of induction chemotherapy. Toxicities from induction chemotherapy were grade III or IV mucositis (2%), grade III or IV nausea/vomiting (22%), grade III or IV hematological toxicity (6%). At the end of induction phase 12% of CRs, 84% of PRs were recorded. Toxicities from alternating chemo-radiotherapy were grade III or IV mucositis (30%), grade III or IV nausea/vomiting (8%), grade III or IV hematological toxicity (24%). Overall, 86% of CRs and 14% of PRs were observed. Four-year progression free survival and overall survival rates are 71% and 81%, respectively. In a small number of patients studied, no correlation between the level of EGFR overexpression and outcomes was detected. In locally advanced UNPC our combined program including induction chemotherapy followed by alternating chemo-radiotherapy is active and gives promising long-term outcomes with acceptable toxicity and optimal patients' compliance. This program merits to be tested in a phase III trial.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Wu, Wei; West, Stephen G.; Hughes, Jan N.
2008-01-01
We investigated the effects of grade retention in first grade on the growth of the Woodcock-Johnson broad mathematics and reading scores over three years using linear growth curve modeling on an academically at-risk sample. A large sample (n = 784) of first grade children who were at risk for retention were initially identified based on low literacy scores. Scores representing propensity for retention were constructed based on 72 variables collected in comprehensive baseline testing in first grade. We closely matched 97 pairs of retained and promoted children based on their propensity scores using optimal matching procedures. This procedure adjusted for baseline differences between the retained and promoted children. We found that grade retention decreased the growth rate of mathematical skills but had no significant effect on reading skills. In addition, several potential moderators of the effect of retention on growth of mathematical and reading skills were identified including limited English language proficiency and children's conduct problems. PMID:19083352
Wu, Wei; West, Stephen G; Hughes, Jan N
2008-02-01
We investigated the effects of grade retention in first grade on the growth of the Woodcock-Johnson broad mathematics and reading scores over three years using linear growth curve modeling on an academically at-risk sample. A large sample (n=784) of first grade children who were at risk for retention was initially identified based on low literacy scores. Scores representing propensity for retention were constructed based on 72 variables collected in comprehensive baseline testing in first grade. We closely matched 97 pairs of retained and promoted children based on their propensity scores using optimal matching procedures. This procedure adjusted for baseline differences between the retained and promoted children. We found that grade retention decreased the growth rate of mathematical skills but had no significant effect on reading skills. In addition, several potential moderators of the effect of retention on growth of mathematical and reading skills were identified including limited English language proficiency and children's conduct problems.
An integrated 3D log processing optimization system for small sawmills in central Appalachia
Wenshu Lin; Jingxin Wang
2013-01-01
An integrated 3D log processing optimization system was developed to perform 3D log generation, opening face determination, headrig log sawing simulation, fl itch edging and trimming simulation, cant resawing, and lumber grading. A circular cross-section model, together with 3D modeling techniques, was used to reconstruct 3D virtual logs. Internal log defects (knots)...
A three-dimensional bucking system for optimal bucking of Central Appalachian hardwoods
Jingxin Wang; Jingang Liu; Chris B. LeDoux
2009-01-01
An optimal tree stembucking systemwas developed for central Appalachian hardwood species using three-dimensional (3D) modeling techniques. ActiveX Data Objects were implemented via MS Visual C++/OpenGL to manipulate tree data which were supported by a backend relational data model with five data entity types for stems, grades and prices, logs, defects, and stem shapes...
Derek K. Alkire; Andrew W. Ezell; Andrew B. Self
2011-01-01
Bottomland hardwoods can provide both wildlife habitat and timber. However, past high-grading practices limit future income potential and have resulted in undesirable species composition in many areas. Thus, prevalence of desirable oak species should be increased. Our study will attempt to determine the proper harvest level for bottomland hardwoods which will optimize...
An Exploratory Study of Value-Added and Academic Optimism of Urban Reading Teachers
ERIC Educational Resources Information Center
Huff-Franklin, Clairie L.
2017-01-01
The purpose of this study is to explore the correlation between state-recorded value- added (VA) scores and academic optimism (AO) scores, which measure teacher self-efficacy, trust, and academic emphasis. The sample for this study is 87 third through eighth grade Reading teachers, from fifty-five schools, in an urban school district in Ohio who…
Composition gradient optimization and electrical characterization of (Pb, Ca)TiO3 thin films
NASA Astrophysics Data System (ADS)
Bao, Dinghua; Mizutani, Nobuyasu; Zhang, Liangying; Yao, Xi
2001-01-01
Compositionally graded (Pb, Ca)TiO3 thin films were prepared by a monoethanolamine-modified sol-gel technique on platinum-coated silicon substrates at the annealing temperature of 600 °C. The composition gradient of the films was greatly improved by a modified annealing method. The dielectric constants, for up-graded and down-graded films annealed at 600 °C for 60 min, were found to be 469 and 355, respectively. Both were larger than those reported for conventional (Pb, Ca)TiO3 thin films. The compositionally graded films had large polarization offsets in hysteresis loops when excited by an alternating electric field. The more smooth the composition gradient of the graded film, the larger the polarization offset. This was consistent with a theoretical model reported previously by Mantese and coworkers [Appl. Phys. Lett. 71, 2047 (1997)]. The magnitude of polarization offset displayed a power-law dependence on the electric field, and the direction of the offset depended on the direction of the composition gradient with respect to the substrate. Both up-graded and down-graded films had good leakage current characteristics.
2010-12-01
recommend [13]. 2.2 Commercial content scanning technology In [16], a companion piece to this paper, Magar completed a thorough review of commercially...defense Canada Chef de file au Canada en matiere de science et de technologie pour la defense et la securite nationale DEFENCE ~~EFENSE (_.,./ www.drdc-rddc.gc.ca
Research of thread rolling on difficult-to-cut material workpieces
NASA Astrophysics Data System (ADS)
Popov, A. Yu; Bugay, I. A.; Nazarov, P. V.; Evdokimova, O. P.; Popov, P. E.; Vasilyev, E. V.
2018-01-01
In medicine production Ti-6Al-4V Grade 5 alloys are used. One of the most important tasks is to increase the strength of the products and decrease in value. The possibility to roll special thread on Ti-6Al-4V Grade 5 alloy workpiece on 2-roller thread rolling machine has been studied. This is wrought alloy, treatment of which in cold condition causes difficulties due to low plasticity. To obtain Ti-6Al-4V Grade 5 alloy product with thread by rolling is rather difficult. This is due to large axial workpiece displacements resulting from large alloy resistance to cold plastic deformation. The provision of adequate kinematics requires experimental researches and the selection of modes - speed of rolling and pressure on the movable roller. The purpose of the work is to determine the optimal modes for rolling thread on titanium alloy workpiece. It has been stated that, after rolling, the product strength has increased up to 30%. As a result of the work, the unit has been made and recommendations to choose the optimal rolling process modes have been offered.
Electron Beam Freeform Fabrication of Titanium Alloy Gradient Structures
NASA Technical Reports Server (NTRS)
Brice, Craig A.; Newman, John A.; Bird, Richard Keith; Shenoy, Ravi N.; Baughman, James M.; Gupta, Vipul K.
2014-01-01
Historically, the structural optimization of aerospace components has been done through geometric methods. A monolithic material is chosen based on the best compromise between the competing design limiting criteria. Then the structure is geometrically optimized to give the best overall performance using the single material chosen. Functionally graded materials offer the potential to further improve structural efficiency by allowing the material composition and/or microstructural features to spatially vary within a single structure. Thus, local properties could be tailored to the local design limiting criteria. Additive manufacturing techniques enable the fabrication of such graded materials and structures. This paper presents the results of a graded material study using two titanium alloys processed using electron beam freeform fabrication, an additive manufacturing process. The results show that the two alloys uniformly mix at various ratios and the resultant static tensile properties of the mixed alloys behave according to rule-of-mixtures. Additionally, the crack growth behavior across an abrupt change from one alloy to the other shows no discontinuity and the crack smoothly transitions from one crack growth regime into another.
NASA Astrophysics Data System (ADS)
Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.
2008-02-01
Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.
Real-time value optimization of edging and trimming operations for rough, green hardwood lumber
Daniel L. Schmoldt; Hang Song; Philip A. Araman
2001-01-01
For edging/trimming operations in hardwood sawmills, an operator examines both sidesâor just the waney-edged sideâof each board, and makes a quick assessment of grade potential. The operator then decides where to edge and/or trim the board to achieve the intended grade and, presumably, maximum value. However, human operators can only achieve lumber values that are 62-...
Scardigno, Domenico; Fanelli, Emanuele; Viggiano, Annarita; Braccio, Giacobbe; Magi, Vinicio
2016-06-01
This article provides the dataset of operating conditions of a hybrid organic Rankine plant generated by the optimization procedure employed in the research article "A genetic optimization of a hybrid organic Rankine plant for solar and low-grade energy sources" (Scardigno et al., 2015) [1]. The methodology used to obtain the data is described. The operating conditions are subdivided into two separate groups: feasible and unfeasible solutions. In both groups, the values of the design variables are given. Besides, the subset of feasible solutions is described in details, by providing the thermodynamic and economic performances, the temperatures at some characteristic sections of the thermodynamic cycle, the net power, the absorbed powers and the area of the heat exchange surfaces.
Xia, Qineng; Xia, Yinjiang; Xi, Jinxu; Liu, Xiaohui; Zhang, Yongguang; Guo, Yong; Wang, Yanqin
2017-02-22
A one-pot method for the selective production of high-grade diesel-range alkanes from biomass-derived furfural and 2-methylfuran (2-MF) was developed by combining the hydroxyalkylation/alkylation (HAA) condensation of furfural with 2-MF and the subsequent hydrodeoxygenation (HDO) over a multifunctional Pd/NbOPO 4 catalyst. The effects of various reaction conditions as well as a variety of solid-acid catalysts and metal-loaded NbOPO 4 catalysts were systematically investigated to optimize the reaction conditions for both reactions. Under the optimal reaction conditions up to 89.1 % total yield of diesel-range alkanes was obtained from furfural and 2-MF by this one-pot method. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
Thermal rectification in mass-graded next-nearest-neighbor Fermi-Pasta-Ulam lattices
NASA Astrophysics Data System (ADS)
Romero-Bastida, M.; Miranda-Peña, Jorge-Orlando; López, Juan M.
2017-03-01
We study the thermal rectification efficiency, i.e., quantification of asymmetric heat flow, of a one-dimensional mass-graded anharmonic oscillator Fermi-Pasta-Ulam lattice both with nearest-neighbor (NN) and next-nearest-neighbor (NNN) interactions. The system presents a maximum rectification efficiency for a very precise value of the parameter that controls the coupling strength of the NNN interactions, which also optimizes the rectification figure when its dependence on mass asymmetry and temperature differences is considered. The origin of the enhanced rectification is the asymmetric local heat flow response as the heat reservoirs are swapped when a finely tuned NNN contribution is taken into account. A simple theoretical analysis gives an estimate of the optimal NNN coupling in excellent agreement with our simulation results.
Frank, Steven J; Cox, James D; Gillin, Michael; Mohan, Radhe; Garden, Adam S; Rosenthal, David I; Gunn, G Brandon; Weber, Randal S; Kies, Merrill S; Lewin, Jan S; Munsell, Mark F; Palmer, Matthew B; Sahoo, Narayan; Zhang, Xiaodong; Liu, Wei; Zhu, X Ronald
2014-07-15
We report the first clinical experience and toxicity of multifield optimization (MFO) intensity modulated proton therapy (IMPT) for patients with head and neck tumors. Fifteen consecutive patients with head and neck cancer underwent MFO-IMPT with active scanning beam proton therapy. Patients with squamous cell carcinoma (SCC) had comprehensive treatment extending from the base of the skull to the clavicle. The doses for chemoradiation therapy and radiation therapy alone were 70 Gy and 66 Gy, respectively. The robustness of each treatment plan was also analyzed to evaluate sensitivity to uncertainties associated with variations in patient setup and the effect of uncertainties with proton beam range in patients. Proton beam energies during treatment ranged from 72.5 to 221.8 MeV. Spot sizes varied depending on the beam energy and depth of the target, and the scanning nozzle delivered the spot scanning treatment "spot by spot" and "layer by layer." Ten patients presented with SCC and 5 with adenoid cystic carcinoma. All 15 patients were able to complete treatment with MFO-IMPT, with no need for treatment breaks and no hospitalizations. There were no treatment-related deaths, and with a median follow-up time of 28 months (range, 20-35 months), the overall clinical complete response rate was 93.3% (95% confidence interval, 68.1%-99.8%). Xerostomia occurred in all 15 patients as follows: grade 1 in 10 patients, grade 2 in 4 patients, and grade 3 in 1 patient. Mucositis within the planning target volumes was seen during the treatment of all patients: grade 1 in 1 patient, grade 2 in 8 patients, and grade 3 in 6 patients. No patient experienced grade 2 or higher anterior oral mucositis. To our knowledge, this is the first clinical report of MFO-IMPT for head and neck tumors. Early clinical outcomes are encouraging and warrant further investigation of proton therapy in prospective clinical trials. Copyright © 2014 Elsevier Inc. All rights reserved.
Naito, Masahito; Yamamoto, Tomoya; Shimamoto, Chikao; Miwa, Yoshihiro
2017-01-01
Previous Japanese trials of the docetaxel, cisplatin, and 5-fluorouracil regimen for oesophageal cancer have demonstrated that a large proportion of patients also develop grade IV neutropenia. Our aim was to examine the risk factors for neutropenia in patients treated with this regimen. We retrospectively analysed the risk factors for developing grade IV neutropenia in 66 patients with oesophageal cancer using a multivariate analysis. After administering the docetaxel, cisplatin, and 5-fluorouracil regimen, 49 patients (74.2%) developed grade IV neutropenia. Grade IV neutropenia was significantly associated with platelet count (p < 0.01), alanine transaminase level (p = 0.05), and proton-pump inhibitor administration (p < 0.05). Receiver operating characteristic curve analysis confirmed a platelet count of 290 × 103/μL as the optimal diagnostic cut-off value for grade IV neutropenia. The receiver operating characteristic area for grade IV neutropenia was increased by including patients that were administered a proton-pump inhibitor and alanine transaminase level (updated model; sensitivity and specificity, 75.5 and 88.2%, respectively). Our findings suggest that a platelet count is the most significant predictor of grade IV neutropenia. © 2017 S. Karger AG, Basel.
NASA Astrophysics Data System (ADS)
Malekian, Atefe; Hayati, Dariush; Aarts, Noelle
2017-01-01
Conceptions of agricultural water security are conditioned by larger understandings of being and reality. It is still unclear what such understandings mean for perspectives on water security in general and on causes and solutions related to perceived water security risks and problems in agricultural sector in particular. Based on a systematic literature review, three conceptualizations of water security, related to different paradigms, are presented. Also the consequences of such conceptualizations for determining research objectives, research activities, and research outcomes on agricultural water security are discussed. The results showed that agricultural water security from a positivist paradigm referred to tangible and measurable water-related hazards and threats, such as floods and droughts, pollution, and so forth. A constructivist approach to agricultural water security, constituted by a process of interaction and negotiation, pointed at perceptions of water security of farmers and other stakeholders involved in agricultural sector. A critical approach to agricultural water security focused on the processes of securing vulnerable farmers and others from wider political, social, and natural impediments to sufficient water supplies. The conclusions of the study suggest that paradigms, underlying approaches should be expressed, clarified, and related to one another in order to find optimal and complementary ways to study water security issues in agricultural sector.
Value Driven Information Processing and Fusion
2016-03-01
consensus approach allows a decentralized approach to achieve the optimal error exponent of the centralized counterpart, a conclusion that is signifi...SECURITY CLASSIFICATION OF: The objective of the project is to develop a general framework for value driven decentralized information processing...including: optimal data reduction in a network setting for decentralized inference with quantization constraint; interactive fusion that allows queries and
Improving Environmental Model Calibration and Prediction
2011-01-18
REPORT Final Report - Improving Environmental Model Calibration and Prediction 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: First, we have continued to...develop tools for efficient global optimization of environmental models. Our algorithms are hybrid algorithms that combine evolutionary strategies...toward practical hybrid optimization tools for environmental models. 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 18-01-2011 13
Wireless Cooperative Networks: Self-Configuration and Optimization
2011-09-09
TERMS wireless sensor networks , wireless cooperative networks, resource optimization, ultra-wideband, localization, ranging 16. SECURITY...Communications We consider two prevalent relay protocols for wireless sensor networks : decode-and-forward (DF) and amplify-and-forward (AF). To... sensor networks where each node may have its own sensing data to transmit, since they can maximally conserve energy while helping others as relays
NASA Astrophysics Data System (ADS)
Bowen, James M.
The goal of this research was to investigate the physicochemical properties of weapons grade plutonium particles originating from the 1960 BOMARC incident for the purpose of predicting their fate in the environment and to address radiation protection and nuclear security concerns. Methods were developed to locate and isolate the particles in order to characterize them. Physical, chemical, and radiological characterization was performed using a variety of techniques. And finally, the particles were subjected to a sequential extraction procedure, a series of increasingly aggressive reagents, to simulate an accelerated environmental exposure. A link between the morphology of the particles and their partitioning amongst environmental mechanisms was established.
Advances in Additive Manufacturing
2016-07-14
of 3D - printed structures. Analysis examples will include quantification of tolerance differences between the designed and manufactured parts, void...15. SUBJECT TERMS 3-D printing , validation and verification, nondestructive inspection, print -on-the-move, prototyping 16. SECURITY CLASSIFICATION...researching the formation of AM-grade metal powder from battlefield scrap and operating base waste, 2) potential of 3-D printing with sand to make
2014-05-01
identify modulators of this important disease. 15. SUBJECT TERMS Neurofibromatosis ; learning and memory; glioma; MPNST 16. SECURITY CLASSIFICATION...12-13 Page 3 INTRODUCTION Neurofibromatosis type 1...result indicates that sox10 is highly expressed in high-grade gliomas and MPNSTs in our zebrafish model of type I neurofibromatosis . Figure 4. Sox10
ERIC Educational Resources Information Center
Chen, Fu Mei; Lin, Hsiao Shih; Li, Chun Hao
2012-01-01
This study was intended to examine the relationship among children's emotionality, parental meta-emotion, and parent-child attachment. The sample consisted of 546 5th and 6th grade children and their mothers. The test instruments used in this study were the Emotionality subscale of the EAS Temperament Survey (mothers' ratings only), the Parental…
ERIC Educational Resources Information Center
Gross, Judith Schefkind
This practicum study devised and evaluated a program designed to reduce overt incidents of stereotyping among diverse fourth through sixth graders in a large urban K-8 school. The 8-month intervention was comprised of six elements: (1) establishing a safe secure classroom atmosphere governed by consistent authoritative discipline; (2) building…
ERIC Educational Resources Information Center
Borba, Michele
A curriculum for enhancing student self-esteem in grades kindergarten through 12 is presented in this guide. An introduction discusses the background and research-based data as to why esteem building is essential for today's students. Chapter 1 explains the building blocks of self-esteem: security, self-hood, affiliation, mission, and competence.…
ERIC Educational Resources Information Center
Childers, Sherry Baker
2009-01-01
Much has been written about peer-to-peer maltreatment, but very little research has been conducted on the topic of teacher-to-student maltreatment. Numerous empirical studies have documented the importance of school climate upon academic achievement. The role a teacher plays in providing this nurturing and secure environment is vital. The purpose…
It Doesn't Take a Rocket Scientist. It Just Takes You! Kansas Children's Report Card, 2001.
ERIC Educational Resources Information Center
Kansas Action for Children, Inc., Topeka.
This document uses a school report card format to present information on the current well-being of Kansas' children. "Grades" are based on 17 indicators of well-being in five areas: (1) safety and security (violent crime, child abuse and neglect, and childhood poverty); (2) health (early prenatal care, low birthweight, infant mortality,…
Optimal response to attacks on the open science grids.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Altunay, M.; Leyffer, S.; Linderoth, J. T.
2011-01-01
Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona
2003-01-01
The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.
Application of multi response optimization with grey relational analysis and fuzzy logic method
NASA Astrophysics Data System (ADS)
Winarni, Sri; Wahyu Indratno, Sapto
2018-01-01
Multi-response optimization is an optimization process by considering multiple responses simultaneously. The purpose of this research is to get the optimum point on multi-response optimization process using grey relational analysis and fuzzy logic method. The optimum point is determined from the Fuzzy-GRG (Grey Relational Grade) variable which is the conversion of the Signal to Noise Ratio of the responses involved. The case study used in this research are case optimization of electrical process parameters in electrical disharge machining. It was found that the combination of treatments resulting to optimum MRR and SR was a 70 V gap voltage factor, peak current 9 A and duty factor 0.8.
NASA Astrophysics Data System (ADS)
Taha, Ahmad Fayez
Transportation networks, wearable devices, energy systems, and the book you are reading now are all ubiquitous cyber-physical systems (CPS). These inherently uncertain systems combine physical phenomena with communication, data processing, control and optimization. Many CPSs are controlled and monitored by real-time control systems that use communication networks to transmit and receive data from systems modeled by physical processes. Existing studies have addressed a breadth of challenges related to the design of CPSs. However, there is a lack of studies on uncertain CPSs subject to dynamic unknown inputs and cyber-attacks---an artifact of the insertion of communication networks and the growing complexity of CPSs. The objective of this dissertation is to create secure, computational foundations for uncertain CPSs by establishing a framework to control, estimate and optimize the operation of these systems. With major emphasis on power networks, the dissertation deals with the design of secure computational methods for uncertain CPSs, focusing on three crucial issues---(1) cyber-security and risk-mitigation, (2) network-induced time-delays and perturbations and (3) the encompassed extreme time-scales. The dissertation consists of four parts. In the first part, we investigate dynamic state estimation (DSE) methods and rigorously examine the strengths and weaknesses of the proposed routines under dynamic attack-vectors and unknown inputs. In the second part, and utilizing high-frequency measurements in smart grids and the developed DSE methods in the first part, we present a risk mitigation strategy that minimizes the encountered threat levels, while ensuring the continual observability of the system through available, safe measurements. The developed methods in the first two parts rely on the assumption that the uncertain CPS is not experiencing time-delays, an assumption that might fail under certain conditions. To overcome this challenge, networked unknown input observers---observers/estimators for uncertain CPSs---are designed such that the effect of time-delays and cyber-induced perturbations are minimized, enabling secure DSE and risk mitigation in the first two parts. The final part deals with the extreme time-scales encompassed in CPSs, generally, and smart grids, specifically. Operational decisions for long time-scales can adversely affect the security of CPSs for faster time-scales. We present a model that jointly describes steady-state operation and transient stability by combining convex optimal power flow with semidefinite programming formulations of an optimal control problem. This approach can be jointly utilized with the aforementioned parts of the dissertation work, considering time-delays and DSE. The research contributions of this dissertation furnish CPS stakeholders with insights on the design and operation of uncertain CPSs, whilst guaranteeing the system's real-time safety. Finally, although many of the results of this dissertation are tailored to power systems, the results are general enough to be applied for a variety of uncertain CPSs.
NASA Astrophysics Data System (ADS)
Birman, Victor; Byrd, Larry W.
2008-02-01
The interest to functionally graded materials (FGM) and structures has been generated by their potential advantages, including enhanced thermal properties, reduced or eliminated delamination concerns, a potential for an improved stress distribution, etc. Various aspects of the processing, design, micromechanics and analysis of FGM have been outlined in a number of reviews, mentioned here are [1-3]. In particular, functionally graded panels may be advantageous compared to their conventional counterparts in numerous applications. However, a typical FGM panel is asymmetric about its middle plane resulting in lower buckling loads and fundamental frequencies as well as higher stresses and deformations than the counterpart with a symmetric distribution of the same constituents. The reduced stiffness of FGM panels can be compensated by reinforcing them with stringers. For example, metallic stringers at the metal-rich surface of a FGM ceramic-metal panel may provide an efficient solution enabling a designer to increase both buckling loads as well as natural frequencies. The list of studies on optimization of FGM is extensive as could be anticipated for such tailored structural elements. For example, recent papers by Batra and his collaborators present optimization of the natural frequencies of a FGM plate through material grading [4] and through the graded fiber orientation [5]. The present paper is concerned with an optimum design of the system of stringers for a specified FGM panel. The task is to design the lightest system of stringers enabling the panel to achieve prescribed buckling loads or fundamental frequency.
FOREX - an expert system for managing even-aged upland oak forests on steep terrain
Chris B. LeDoux; B. Gopalakrishnan; K. Lankalapalli
1995-01-01
An expert system, FOREX, was developed to access the data from the database management provided by MANAGE. For a specific site index, the user of FOREX can obtain information on present net worth, optimal thinning entry timing, optimal stand rotation age, diameter at breast height, volume by grade and value of the trees harvested, and based on the cable yarder used,...
NASA Astrophysics Data System (ADS)
Prada, Jose Fernando
Keeping a contingency reserve in power systems is necessary to preserve the security of real-time operations. This work studies two different approaches to the optimal allocation of energy and reserves in the day-ahead generation scheduling process. Part I presents a stochastic security-constrained unit commitment model to co-optimize energy and the locational reserves required to respond to a set of uncertain generation contingencies, using a novel state-based formulation. The model is applied in an offer-based electricity market to allocate contingency reserves throughout the power grid, in order to comply with the N-1 security criterion under transmission congestion. The objective is to minimize expected dispatch and reserve costs, together with post contingency corrective redispatch costs, modeling the probability of generation failure and associated post contingency states. The characteristics of the scheduling problem are exploited to formulate a computationally efficient method, consistent with established operational practices. We simulated the distribution of locational contingency reserves on the IEEE RTS96 system and compared the results with the conventional deterministic method. We found that assigning locational spinning reserves can guarantee an N-1 secure dispatch accounting for transmission congestion at a reasonable extra cost. The simulations also showed little value of allocating downward reserves but sizable operating savings from co-optimizing locational nonspinning reserves. Overall, the results indicate the computational tractability of the proposed method. Part II presents a distributed generation scheduling model to optimally allocate energy and spinning reserves among competing generators in a day-ahead market. The model is based on the coordination between individual generators and a market entity. The proposed method uses forecasting, augmented pricing and locational signals to induce efficient commitment of generators based on firm posted prices. It is price-based but does not rely on multiple iterations, minimizes information exchange and simplifies the market clearing process. Simulations of the distributed method performed on a six-bus test system showed that, using an appropriate set of prices, it is possible to emulate the results of a conventional centralized solution, without need of providing make-whole payments to generators. Likewise, they showed that the distributed method can accommodate transactions with different products and complex security constraints.
Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey
Adnan, Md. Akhtaruzzaman; Razzaque, Mohammd Abdur; Ahmed, Ishtiaque; Isnin, Ismail Fauzi
2014-01-01
For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted. PMID:24368702
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tang, Chad; Gomez, Daniel R.; Wang, Hongmei
Purpose: Radiation pneumonitis (RP) is an inflammatory response to radiation therapy (RT). We assessed the association between RP and white blood cell (WBC) count, an established metric of systemic inflammation, after RT for non-small cell lung cancer. Methods and Materials: We retrospectively analyzed 366 patients with non-small cell lung cancer who received ≥60 Gy as definitive therapy. The primary endpoint was whether WBC count after RT (defined as 2 weeks through 3 months after RT completion) was associated with grade ≥3 or grade ≥2 RP. Median lung volume receiving ≥20 Gy (V{sub 20}) was 31%, and post-RT WBC counts rangedmore » from 1.7 to 21.2 × 10{sup 3} WBCs/μL. Odds ratios (ORs) associating clinical variables and post-RT WBC counts with RP were calculated via logistic regression. A recursive-partitioning algorithm was used to define optimal post-RT WBC count cut points. Results: Post-RT WBC counts were significantly higher in patients with grade ≥3 RP than without (P<.05). Optimal cut points for post-RT WBC count were found to be 7.4 and 8.0 × 10{sup 3}/μL for grade ≥3 and ≥2 RP, respectively. Univariate analysis revealed significant associations between post-RT WBC count and grade ≥3 (n=46, OR=2.6, 95% confidence interval [CI] 1.4‒4.9, P=.003) and grade ≥2 RP (n=164, OR=2.0, 95% CI 1.2‒3.4, P=.01). This association held in a stepwise multivariate regression. Of note, V{sub 20} was found to be significantly associated with grade ≥2 RP (OR=2.2, 95% CI 1.2‒3.4, P=.01) and trended toward significance for grade ≥3 RP (OR=1.9, 95% CI 1.0-3.5, P=.06). Conclusions: Post-RT WBC counts were significantly and independently associated with RP and have potential utility as a diagnostic or predictive marker for this toxicity.« less
Composable security proof for continuous-variable quantum key distribution with coherent States.
Leverrier, Anthony
2015-02-20
We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
System and method for suppressing sublimation using opacified aerogel
NASA Technical Reports Server (NTRS)
Sakamoto, Jeff S. (Inventor); Snyder, G. Jeffrey (Inventor); Calliat, Thierry (Inventor); Fleurial, Jean-Pierre (Inventor); Jones, Steven M. (Inventor); Palk, Jong-Ah (Inventor)
2008-01-01
The present invention relates to a castable, aerogel-based, ultra-low thermal conductivity opacified insulation to suppress sublimation. More specifically, the present invention relates to an aerogel opacified with various opacifying or reflecting constituents to suppress sublimation and provide thermal insulation in thermoelectric modules. The opacifying constituent can be graded within the aerogel for increased sublimation suppression, and the density of the aerogel can similarly be graded to achieve optimal thermal insulation and sublimation suppression.
Optical materials for use with excimer lasers
NASA Astrophysics Data System (ADS)
Sedlacek, Jan H. C.; Rothschild, Mordechai
1993-04-01
Synthetic UV-grade fused silica, crystalline fluorides, and dielectric coatings have been evaluated for transparency and durability at 193 nm. Most bulk materials eventually develop color centers, and fused silica also changes its density and index of refraction. However, the rate at which these changes occur and their magnitude vary strongly with material, grade, and other more subtle details. Careful selection and possibly pretesting are recommended, in order to ensure optimal matching between the intended application and the material properties.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mezhov, E.A.; Samatov, A.V.; Troyanovskii, L.V.
Kinematic viscosities have been measured for solutions of yttrium and gadolinium carboxylates in grade VIK mixed carboxylic acids (MCA). It has been established that the optimal fluidity of these metal carboxylate solutions for application to articles is reached at 333 K. A regression model has been developed to describe the concentration and temperature dependences of the viscosity of yttrium- and gadolinium-containing MCA solutions. 2 refs., 3 tabs.
Security and Privacy in Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.
As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less
Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less
Using Differential Evolution to Optimize Learning from Signals and Enhance Network Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harmer, Paul K; Temple, Michael A; Buckner, Mark A
2011-01-01
Computer and communication network attacks are commonly orchestrated through Wireless Access Points (WAPs). This paper summarizes proof-of-concept research activity aimed at developing a physical layer Radio Frequency (RF) air monitoring capability to limit unauthorizedWAP access and mprove network security. This is done using Differential Evolution (DE) to optimize the performance of a Learning from Signals (LFS) classifier implemented with RF Distinct Native Attribute (RF-DNA) fingerprints. Performance of the resultant DE-optimized LFS classifier is demonstrated using 802.11a WiFi devices under the most challenging conditions of intra-manufacturer classification, i.e., using emissions of like-model devices that only differ in serial number. Using identicalmore » classifier input features, performance of the DE-optimized LFS classifier is assessed relative to a Multiple Discriminant Analysis / Maximum Likelihood (MDA/ML) classifier that has been used for previous demonstrations. The comparative assessment is made using both Time Domain (TD) and Spectral Domain (SD) fingerprint features. For all combinations of classifier type, feature type, and signal-to-noise ratio considered, results show that the DEoptimized LFS classifier with TD features is uperior and provides up to 20% improvement in classification accuracy with proper selection of DE parameters.« less
Optimal reactive planning with security constraints
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, W.R.; Cheng, D.T.Y.; Dixon, A.M.
1995-12-31
The National Grid Company (NGC) of England and Wales has developed a computer program, SCORPION, to help system planners optimize the location and size of new reactive compensation plant on the transmission system. The reactive power requirements of the NGC system have risen as a result of increased power flows and the shorter timescale on which power stations are commissioned and withdrawn from service. In view of the high costs involved, it is important that reactive compensation be installed as economically as possible, without compromising security. Traditional methods based on iterative use of a load flow program are labor intensivemore » and subjective. SCORPION determines a near-optimal pattern of new reactive sources which are required to satisfy voltage constraints for normal and contingent states of operation of the transmission system. The algorithm processes the system states sequentially, instead of optimizing all of them simultaneously. This allows a large number of system states to be considered with an acceptable run time and computer memory requirement. Installed reactive sources are treated as continuous, rather than discrete, variables. However, the program has a restart facility which enables the user to add realistically sized reactive sources explicitly and thereby work towards a realizable solution to the planning problem.« less
Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs.
Liu, Lianggui; Chen, Li; Jia, Huiling
2016-02-19
In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT) constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA) uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC) simulations, a QA-based optimal social trust path (QA_OSTP) selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.
NHF-McMaster Guideline on Care Models for Haemophilia Management.
Pai, M; Key, N S; Skinner, M; Curtis, R; Feinstein, M; Kessler, C; Lane, S J; Makris, M; Riker, E; Santesso, N; Soucie, J M; Yeung, C H T; Iorio, A; Schünemann, H J
2016-07-01
This guideline was developed to identify evidence-based best practices in haemophilia care delivery, and discuss the range of care providers and services that are most important to optimize outcomes for persons with haemophilia (PWH) across the United States. The guideline was developed following specific methods described in detail in this supplement and based on the GRADE (Grading of Recommendations, Assessment, Development and Evaluation approach). Direct evidence from published literature and the haemophilia community, as well as indirect evidence from other chronic diseases, were reviewed, synthesized and applied to create evidence-based recommendations. The Guideline panel suggests that the integrated care model be used over non-integrated care models for PWH (conditional recommendation, moderate certainty in the evidence). For PWH with inhibitors and those at high risk for inhibitor development, the same recommendation was graded as strong, with moderate certainty in the evidence. The panel suggests that a haematologist, a specialized haemophilia nurse, a physical therapist, a social worker and round-the-clock access to a specialized coagulation laboratory be part of the integrated care team, over an integrated care team that does not include all of these components (conditional recommendation, very low certainty in the evidence). Based on available evidence, the integrated model of care in its current structure, is suggested for optimal care of PWH. There is a need for further appropriately designed studies that address unanswered questions about specific outcomes and the optimal structure of the integrated care delivery model in haemophilia. © 2016 John Wiley & Sons Ltd.
Environmental statistics and optimal regulation.
Sivak, David A; Thomson, Matt
2014-09-01
Any organism is embedded in an environment that changes over time. The timescale for and statistics of environmental change, the precision with which the organism can detect its environment, and the costs and benefits of particular protein expression levels all will affect the suitability of different strategies--such as constitutive expression or graded response--for regulating protein levels in response to environmental inputs. We propose a general framework-here specifically applied to the enzymatic regulation of metabolism in response to changing concentrations of a basic nutrient-to predict the optimal regulatory strategy given the statistics of fluctuations in the environment and measurement apparatus, respectively, and the costs associated with enzyme production. We use this framework to address three fundamental questions: (i) when a cell should prefer thresholding to a graded response; (ii) when there is a fitness advantage to implementing a Bayesian decision rule; and (iii) when retaining memory of the past provides a selective advantage. We specifically find that: (i) relative convexity of enzyme expression cost and benefit influences the fitness of thresholding or graded responses; (ii) intermediate levels of measurement uncertainty call for a sophisticated Bayesian decision rule; and (iii) in dynamic contexts, intermediate levels of uncertainty call for retaining memory of the past. Statistical properties of the environment, such as variability and correlation times, set optimal biochemical parameters, such as thresholds and decay rates in signaling pathways. Our framework provides a theoretical basis for interpreting molecular signal processing algorithms and a classification scheme that organizes known regulatory strategies and may help conceptualize heretofore unknown ones.
NASA Astrophysics Data System (ADS)
Kang, Chao; Shi, Yaoyao; He, Xiaodong; Yu, Tao; Deng, Bo; Zhang, Hongji; Sun, Pengcheng; Zhang, Wenbin
2017-09-01
This study investigates the multi-objective optimization of quality characteristics for a T300/epoxy prepreg tape-wound cylinder. The method integrates the Taguchi method, grey relational analysis (GRA) and response surface methodology, and is adopted to improve tensile strength and reduce residual stress. In the winding process, the main process parameters involving winding tension, pressure, temperature and speed are selected to evaluate the parametric influences on tensile strength and residual stress. Experiments are conducted using the Box-Behnken design. Based on principal component analysis, the grey relational grades are properly established to convert multi-responses into an individual objective problem. Then the response surface method is used to build a second-order model of grey relational grade and predict the optimum parameters. The predictive accuracy of the developed model is proved by two test experiments with a low prediction error of less than 7%. The following process parameters, namely winding tension 124.29 N, pressure 2000 N, temperature 40 °C and speed 10.65 rpm, have the highest grey relational grade and give better quality characteristics in terms of tensile strength and residual stress. The confirmation experiment shows that better results are obtained with GRA improved by the proposed method than with ordinary GRA. The proposed method is proved to be feasible and can be applied to optimize the multi-objective problem in the filament winding process.
NASA Astrophysics Data System (ADS)
Soni, Sourabh Kumar; Thomas, Benedict
2018-04-01
The term "weldability" has been used to describe a wide variety of characteristics when a material is subjected to welding. In our analysis we perform experimental investigation to estimate the tensile strength of welded joint strength and then optimization of welding process parameters by using taguchi method and Artificial Neural Network (ANN) tool in MINITAB and MATLAB software respectively. The study reveals the influence on weldability of steel by varying composition of steel by mechanical characterization. At first we prepare the samples of different grades of steel (EN8, EN 19, EN 24). The samples were welded together by metal inert gas welding process and then tensile testing on Universal testing machine (UTM) was conducted for the same to evaluate the tensile strength of the welded steel specimens. Further comparative study was performed to find the effects of welding parameter on quality of weld strength by employing Taguchi method and Neural Network tool. Finally we concluded that taguchi method and Neural Network Tool is much efficient technique for optimization.
Optimization of Micro Metal Injection Molding By Using Grey Relational Grade
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, M. H. I.; Precision Process Research Group, Dept. of Mechanical and Materials Engineering, Faculty of Engineering, Universiti Kebangsaan Malaysia; Muhamad, N.
2011-01-17
Micro metal injection molding ({mu}MIM) which is a variant of MIM process is a promising method towards near net-shape of metallic micro components of complex geometry. In this paper, {mu}MIM is applied to produce 316L stainless steel micro components. Due to highly stringent characteristic of {mu}MIM properties, the study has been emphasized on optimization of process parameter where Taguchi method associated with Grey Relational Analysis (GRA) will be implemented as it represents novel approach towards investigation of multiple performance characteristics. Basic idea of GRA is to find a grey relational grade (GRG) which can be used for the optimization conversionmore » from multi objectives case which are density and strength to a single objective case. After considering the form 'the larger the better', results show that the injection time(D) is the most significant followed by injection pressure(A), holding time(E), mold temperature(C) and injection temperature(B). Analysis of variance (ANOVA) is also employed to strengthen the significant of each parameter involved in this study.« less
Correlation between grade of pearlite spheroidization and laser induced spectra
NASA Astrophysics Data System (ADS)
Yao, Shunchun; Dong, Meirong; Lu, Jidong; Li, Jun; Dong, Xuan
2013-12-01
Laser induced breakdown spectroscopy (LIBS) which is used traditionally as a spectrochemical analytical technique was employed to analyze the grade of pearlite spheroidization. Three 12Cr1MoV steel specimens with different grades of pearlite spheroidization were ablated to produce plasma by pulse laser at 266 nm. In order to determine the optimal temporal condition and plasma parameters for correlating the grade of pearlite spheroidization and laser induced spectra, a set of spectra at different delays were analyzed by the principal component analysis method. Then, the relationship between plasma temperature, intensity ratios of ionic to atomic lines and grade of pearlite spheroidization was studied. The analysis results show that the laser induced spectra of different grades of pearlite spheroidization can be readily identifiable by principal component analysis in the range of 271.941-289.672 nm with 1000 ns delay time. It is also found that a good agreement exists between the Fe ionic to atomic line ratios and the tensile strength, whereas there is no obvious difference in the plasma temperature. Therefore, LIBS may be applied not only as a spectrochemical analytical technique but also as a new way to estimate the grade of pearlite spheroidization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Elbert, Stephen T.; Kalsi, Karanjit; Vlachopoulou, Maria
Financial Transmission Rights (FTRs) help power market participants reduce price risks associated with transmission congestion. FTRs are issued based on a process of solving a constrained optimization problem with the objective to maximize the FTR social welfare under power flow security constraints. Security constraints for different FTR categories (monthly, seasonal or annual) are usually coupled and the number of constraints increases exponentially with the number of categories. Commercial software for FTR calculation can only provide limited categories of FTRs due to the inherent computational challenges mentioned above. In this paper, a novel non-linear dynamical system (NDS) approach is proposed tomore » solve the optimization problem. The new formulation and performance of the NDS solver is benchmarked against widely used linear programming (LP) solvers like CPLEX™ and tested on large-scale systems using data from the Western Electricity Coordinating Council (WECC). The NDS is demonstrated to outperform the widely used CPLEX algorithms while exhibiting superior scalability. Furthermore, the NDS based solver can be easily parallelized which results in significant computational improvement.« less
[Regional ecological construction and mission of landscape ecology].
Xiao, Duning; Xie, Fuju; Wei, Jianbing
2004-10-01
The eco-construction on regional and landscape scale is the one which can be used to specific landscape and intercrossing ecosystem in specific region including performing scientific administration of ecosystem and optimizing environmental function. Recently, the government has taken a series of significant projects into action, such as national forest protection item, partly forest restoration, and adjustment of water, etc. Enforcing regional eco-construction and maintaining the ecology security of the nation have become the strategic requisition. In various regions, different eco-construction should be applied, for example, performing ecological safeguard measure in ecological sensitive zone, accommodating the ecological load in ecological fragile zone, etc., which can control the activities of human being, so that, sustainable development can be reached. Facing opportunity and challenge in the development of landscape ecology, we have some key topics: landscape pattern of ecological security, land use and ecological process, landscape changes under human activity stress, quantitative evaluation of the influence on human being activities, evaluation of zonal ecological security and advance warning of ecological risk, and planning and optimizing of model in landscape eco-construction.
NASA Astrophysics Data System (ADS)
Zhou, W.; Qiu, G. Y.; Oodo, S. O.; He, H.
2013-03-01
An increasing interest in wind energy and the advance of related technologies have increased the connection of wind power generation into electrical grids. This paper proposes an optimization model for determining the maximum capacity of wind farms in a power system. In this model, generator power output limits, voltage limits and thermal limits of branches in the grid system were considered in order to limit the steady-state security influence of wind generators on the power system. The optimization model was solved by a nonlinear primal-dual interior-point method. An IEEE-30 bus system with two wind farms was tested through simulation studies, plus an analysis conducted to verify the effectiveness of the proposed model. The results indicated that the model is efficient and reasonable.
Hurricane risk mitigation - Emergency Operations Center
2008-07-29
Construction work on a new Emergency Operations Center at Stennis Space Center is nearing completion. Construction is expected to be complete by February 2009, with actual occupancy of the building planned for later that year. The new building will house fire, medical and security teams and will provide a top-grade facility to support storm emergency responder teams and emergency management operations for the south Mississippi facility.
The MICROBE Project, A Report from the Interagency Working Group on Microbial Genomics
2001-01-01
including targeting of genes related to pathogenesis, possibilities for acquired pathogen resistance, industrial and food -grade enzymes, and probiotics ...safety, food security, biotechnology, value-added products , human nutrition and functional foods , plant and animal protection and furthering fundamental...supports a number of microbial studies, which are integral components of the USDA national programs in animal health, food animal production , food
1981-01-01
THIS PAGZ(Whan Doee Es tMord) Item 20 (Cont’d) ------ work in the area of artificial intelligence and those used in general program development into a...Controlling Gfile) IS. SECURITY CLASS. (of tis report) Same .,/ UNCLASSIFIED 13d. DECLASSIFICATION/ DOWN GRADING ..- ". .--- /A!CHEDULEI t I IS...logic programming with LISP for implementing intelligent data base query systems. Continued developments will allow for enhancements to be made to the
ERIC Educational Resources Information Center
Scharf, Miri; Kerns, Kathryn A.; Rousseau, Sofie; Kivenson-Baron, Inbal
2016-01-01
The goal of the study was to examine the joint and distinct contribution of attachment security and social anxiety to Arab children's peer competence in middle childhood. We focused on Arab children as very little research has examined close relationships for this group. A sample of 404 third-, fourth- and fifth-grade Arabic students (203 boys and…
Lui, T H
2015-01-01
Eckert and Davis grade 3 superior peroneal retinaculum injury is rare and the optimal treatment is not yet determined. A 57 year-old lady sprained her left ankle resulting in grade 3 injury of the superior peroneal retinaculum and was treated by endoscopic retinaculum reconstruction. The fracture healed and the peroneal tendons were stabilized. However, it was complicated by protusion of the suture anchors into the posterolateral ankle gutter. The implants were successfully removed endoscopically. Proper selection of the size and dimension of the suture anchor and preoperative planning with computed tomogram is important for usage of suture anchors in the lateral malleolus.
Device-independent security of quantum cryptography against collective attacks.
Acín, Antonio; Brunner, Nicolas; Gisin, Nicolas; Massar, Serge; Pironio, Stefano; Scarani, Valerio
2007-06-08
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
2012-09-28
population of misbehaving nodes or evolving hostility or social relations such that an application (e.g., secure routing) built on top of trust...optimization in DTNs in response to dynamically changing conditions such as increasing population of misbehaving nodes. The design part addresses the...The rest of the paper is organized as follows. In Section 2, we survey existing trust management protocols and approaches to deal with misbehaved
Chow, Chong Man; Ruhl, Holly; Buhrmester, Duane
2015-11-01
The formation of romantic relationships and friendships in adolescence is a defining milestone in the progression toward social maturity. Thus, examining adolescents' friendship and romantic experiences serves a vital role in understanding their psychological adjustment. The main purposes of the current study were to examine (a) whether romantic involvement, romantic security, and friendship closeness were independently predictive of late adolescents' depression and loneliness, and (b) whether friendship closeness would moderate the negative effects of adolescents' lower degrees of romantic involvement and romantic security on depression and loneliness. Data came from 12th grade adolescents (N = 110, 53 females) as well as their parents and a same-sex best friend. Adolescents reported on their romantic involvement, romantic security, and psychological distress. Parent reports of adolescents' depressive symptoms and friend reports of friendship closeness were also included. Higher degrees of romantic involvement and friendship closeness were related to lower degrees of loneliness. Higher degrees of romantic security were related to lower degrees of depression and loneliness. The effect of romantic involvement on depression and loneliness was moderated by friendship closeness. Also, the effect of romantic security on loneliness was moderated by friendship closeness. Future research should focus on the interactive roles that friendships and romantic relationships play in the emergence of psychopathology during adolescence. © The Author(s) 2015.
Kindergarten predictors of second versus eighth grade reading comprehension impairments.
Adlof, Suzanne M; Catts, Hugh W; Lee, Jaehoon
2010-01-01
Multiple studies have shown that kindergarten measures of phonological awareness and alphabet knowledge are good predictors of reading achievement in the primary grades. However, less attention has been given to the early predictors of later reading achievement. This study used a modified best-subsets variable-selection technique to examine kindergarten predictors of early versus later reading comprehension impairments. Participants included 433 children involved in a longitudinal study of language and reading development. The kindergarten test battery assessed various language skills in addition to phonological awareness, alphabet knowledge, naming speed, and nonverbal cognitive ability. Reading comprehension was assessed in second and eighth grades. Results indicated that different combinations of variables were required to optimally predict second versus eighth grade reading impairments. Although some variables effectively predicted reading impairments in both grades, their relative contributions shifted over time. These results are discussed in light of the changing nature of reading comprehension over time. Further research will help to improve the early identification of later reading disabilities.
Fujino, Shiki; Miyoshi, Norikatsu; Noura, Shingo; Shingai, Tatsushi; Tomita, Yasuhiko; Ohue, Masayuki; Yano, Masahiko
2014-01-01
In this case report, we discuss single-incision laparoscopic cecectomy for low-grade appendiceal neoplasm after laparoscopic anterior resection for rectal cancer. The optimal surgical therapy for low-grade appendiceal neoplasm is controversial; currently, the options include appendectomy, cecectomy, right hemicolectomy, and open or laparoscopic surgery. Due to the risk of pseudomyxoma peritonei, complete resection without rupture is necessary. We have encountered 5 cases of low-grade appendiceal neoplasm and all 5 patients had no lymph node metastasis. We chose the appendectomy or cecectomy without lymph node dissection if preoperative imaging studies did not suspect malignancy. In the present case, we performed cecectomy without lymph node dissection by single-incision laparoscopic surgery (SILS), which is reported to be a reduced port surgery associated with decreased invasiveness and patient stress compared with conventional laparoscopic surgery. We are confident that SILS is a feasible alternative to traditional surgical procedures for borderline tumors, such as low-grade appendiceal neoplasms. PMID:24868331
100 mm diameter rod laser amplifiers made of different Nd:glasses
NASA Astrophysics Data System (ADS)
Shaykin, A. A.; Kuzmin, A. A.; Shaikin, I. A.; Potemkin, A. K.; Arbuzov, V. I.; Hu, Lili; Wen, Lei; Khazanov, Е A.
2018-03-01
We measured the dependence of the weak signal gain of 100 mm diameter rod amplifiers on pump energy and transverse coordinates for four neodymium glass grades. The highest gain was obtained in N31-05 (China), and the highest radial gain uniformity in KGSS-0180 glass (Russia). The data obtained enable the optimal glass grade to be chosen for each specific problem by finding a compromise between maximum output energy and minimum distortion of beam profile.
De-Inventory Plan for Transuranic Waste Stored at Area G
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hargis, Kenneth Marshall; Christensen, Davis V.; Shepard, Mark D.
This report describes the strategy and detailed work plan developed by Los Alamos National Laboratory (LANL) to disposition transuranic (TRU) waste stored at its Area G radioactive waste storage site. The focus at this time is on disposition of 3,706 m 3 of TRU waste stored above grade by June 30, 2014, which is one of the commitments within the Framework Agreement: Realignment of Environmental Priorities between the Department of Energy (DOE) National Nuclear Security Administration (NNSA) and the State of New Mexico Environment Department (NMED), Reference 1. A detailed project management schedule has been developed to manage this workmore » and better ensure that all required activities are aligned and integrated. The schedule was developed in conjunction with personnel from the NNSA Los Alamos Site Office (LASO), the DOE Carlsbad Field Office (CBFO), the Central Characterization Project (CCP), and Los Alamos National Security, LLC (LANS). A detailed project management schedule for the remainder of the above grade inventory and the below grade inventory will be developed and incorporated into the De-Inventory Plan by December 31, 2012. This schedule will also include all newly-generated TRU waste received at Area G in FYs 2012 and 2013, which must be removed by no later than December 31, 2014, under the Framework Agreement. The TRU waste stored above grade at Area G is considered to be one of the highest nuclear safety risks at LANL, and the Defense Nuclear Facility Safety Board has expressed concern for the radioactive material at risk (MAR) contained within the above grade TRU waste inventory and has formally requested that DOE reduce the MAR. A large wildfire called the Las Conchas Fire burned extensive areas west of LANL in late June and July 2011. Although there was minimal to no impact by the fire to LANL, the fire heightened public concern and news media attention on TRU waste storage at Area G. After the fire, New Mexico Governor Susana Martinez also requested that LANL accelerate disposition of TRU waste stored above grade at Area G. The 3,706 m 3 volume of TRU waste stored above grade consists of 4,495 containers that include all above grade non-cemented waste as well as above grade cemented waste that was ready for characterization on October 1, 2011. This volume includes all newly-generated TRU waste currently stored at Area G as of October 1, 2011. This volume does not include the Bolas Grandes spheres, mixed low level waste (MLLW) containers, empty containers, cemented waste that requires remediation, projected newly generated TRU waste from FY 2012 and later, or TRU waste stored below grade. The 3,706 m 3 volume represents about 86 per cent of the total volume of TRU waste stored above grade on October 1, 2011. The De-Inventory Plan supports the DOE Office of Environmental Management (EM) goal to disposition 90% of the Legacy TRU waste within the DOE complex by the end of 2015 as stated in its Roadmap for EM’s Journey to Excellence (Reference 2). The plan also addresses precursor actions for disposition of TRU waste that are necessary for compliance with the Compliance Order on Consent issued by the NMED in 2005 (Reference 3).« less
Fractal analysis for assessing tumour grade in microscopic images of breast tissue
NASA Astrophysics Data System (ADS)
Tambasco, Mauro; Costello, Meghan; Newcomb, Chris; Magliocco, Anthony M.
2007-03-01
In 2006, breast cancer is expected to continue as the leading form of cancer diagnosed in women, and the second leading cause of cancer mortality in this group. A method that has proven useful for guiding the choice of treatment strategy is the assessment of histological tumor grade. The grading is based upon the mitosis count, nuclear pleomorphism, and tubular formation, and is known to be subject to inter-observer variability. Since cancer grade is one of the most significant predictors of prognosis, errors in grading can affect patient management and outcome. Hence, there is a need to develop a breast cancer-grading tool that is minimally operator dependent to reduce variability associated with the current grading system, and thereby reduce uncertainty that may impact patient outcome. In this work, we explored the potential of a computer-based approach using fractal analysis as a quantitative measure of cancer grade for breast specimens. More specifically, we developed and optimized computational tools to compute the fractal dimension of low- versus high-grade breast sections and found them to be significantly different, 1.3+/-0.10 versus 1.49+/-0.10, respectively (Kolmogorov-Smirnov test, p<0.001). These results indicate that fractal dimension (a measure of morphologic complexity) may be a useful tool for demarcating low- versus high-grade cancer specimens, and has potential as an objective measure of breast cancer grade. Such prognostic value could provide more sensitive and specific information that would reduce inter-observer variability by aiding the pathologist in grading cancers.
Tyfield, David
2011-07-01
There is a growing consensus that we are facing epochal challenges in global food security. Moreover, these challenges are multiple and complex. Meeting these challenges will involve nothing less than a wholesale socio-technical transition of the agri-food system. Optimizing the efficacy of the contribution of research to such a food security agenda will probably also need new institutional mechanisms and career structures to facilitate new kinds of collaborations and ongoing, longer-term projects. In short, the multiple challenges of food security demand a different political economy of research for effective intervention by science. In making this argument, the paper summarizes the major findings of a recent report regarding the potential impact of so-called 'disruptive' low-carbon innovations in China.
Security bound of cheat sensitive quantum bit commitment.
He, Guang Ping
2015-03-23
Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.
Lai, Chi-Chih; Friedman, Michael; Lin, Hsin-Ching; Wang, Pa-Chun; Hwang, Michelle S; Hsu, Cheng-Ming; Lin, Meng-Chih; Chin, Chien-Hung
2015-08-01
To identify standard clinical parameters that may predict the optimal level of continuous positive airway pressure (CPAP) in adult patients with obstructive sleep apnea/hypopnea syndrome (OSAHS). This is a retrospective study in a tertiary academic medical center that included 129 adult patients (117 males and 12 females) with OSAHS confirmed by diagnostic polysomnography (PSG). All OSAHS patients underwent successful full-night manual titration to determine the optimal CPAP pressure level for OSAHS treatment. The PSG parameters and completed physical examination, including body mass index, tonsil size grading, modified Mallampati grade (also known as updated Friedman's tongue position [uFTP]), uvular length, neck circumference, waist circumference, hip circumference, thyroid-mental distance, and hyoid-mental distance (HMD) were recorded. When the physical examination variables and OSAHS disease were correlated singly with the optimal CPAP pressure, we found that uFTP, HMD, and apnea/hypopnea index (AHI) were reliable predictors of CPAP pressures (P = .013, P = .002, and P < .001, respectively, by multiple regression). When all important factors were considered in a stepwise multiple linear regression analysis, a significant correlation with optimal CPAP pressure was formulated by factoring the uFTP, HMD, and AHI (optimal CPAP pressure = 1.01 uFTP + 0.74 HMD + 0.059 AHI - 1.603). This study distinguished the correlation between uFTP, HMD, and AHI with the optimal CPAP pressure. The structure of the upper airway (especially tongue base obstruction) and disease severity may predict the effective level of CPAP pressure. 4. © 2015 The American Laryngological, Rhinological and Otological Society, Inc.
Secure provision of reactive power ancillary services in competitive electricity markets
NASA Astrophysics Data System (ADS)
El-Samahy, Ismael
The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is decoupled and assumed to be fixed during the reactive power dispatch procedures; however, the effect of reactive power on real power is considered in the model by calculating the required reduction in real power output of a generator due to an increase in its reactive power supply. In this case, real power generation is allowed to be rescheduled, within given limits, from the already dispatched levels obtained from the energy market clearing process. The proposed dispatch model achieves the main objective of an ISO in a competitive electricity market, which is to provide the required reactive power support from generators at least cost while ensuring a secure operation of the power system. The proposed reactive power procurement and dispatch models capture both the technical and economic aspects of power system operation in competitive electricity markets; however, from an optimization point of view, these models represent non-convex mixed integer non-linear programming (MINLP) problems due to the presence of binary variables associated with the different regions of reactive power operation in a synchronous generator. Such MINLP optimization problems are difficult to solve, especially for an actual power system. A novel Generator Reactive Power Classification (GRPC) algorithm is proposed in this thesis to address this issue, with the advantage of iteratively solving the optimization models as a series of non-linear programming (NLP) sub-problems. The proposed reactive power procurement and dispatch models are implemented and tested on the CIGRE 32-bus system, with several case studies that represent different practical operating scenarios. The developed models are also compared with other approaches for reactive power provision, and the results demonstrate the robustness and effectiveness of the proposed model. The results clearly reveal the main features of the proposed models for optimal provision of reactive power ancillary service, in order to suit the requirements of an ISO under today's stressed system conditions in a competitive market environment.
Possibilities for specific utilization of material properties for an optimal part design
NASA Astrophysics Data System (ADS)
Beier, T.; Gerlach, J.; Roettger, R.; Kuhn, P.
2017-09-01
High-strength, cold-formable steels offer great potential for meeting cost and safety requirements in the automotive industry. In view of strengths of up to 1200 MPa now attainable, certain aspects need to be analysed and evaluated in advance in the development process using these materials. In addition to early assessment of crash properties, it is also highly important to adapt the forming process to match the material potential. The steel making companies have widened their portfolios of cold-rolled dual-phase steels well beyond the conventional high-strength steels. There are added new grades which offer a customized selection of high energy absorption, deformation resistance or enhanced cold-forming properties. In this article the necessary components for material modelling for finite element simulation are discussed. Additionally the required tests for material model calibration are presented and the potentials of the thyssenkrupp Steel material data base are introduced. Besides classical tensile tests at different angles to rolling direction and the forming limit curve, the hydraulic bulge test is now available for a wide range of modern steel grades. Using the conventional DP-K®60/98 and the DP-K®700Y980T with higher yield strength the method for calibrating yield locus, hardening and formability is given. With reference to the examples of an A-pillar reinforcement and different crash tests the procedure is shown how the customer can evaluate an optimal steel grade for specific requirements. Although the investigated materials have different yield strengths, no large differences in the forming process between the two steel grades can be found. However some advantages of the high-yield grade can be detected in crash performance depending on the specific boundary and loading conditions.
The use of feed-grade amino acids in lactating sow diets.
Greiner, Laura; Srichana, Pairat; Usry, James L; Neill, Casey; Allee, Gary L; Connor, Joseph; Touchette, Kevin J; Knight, Christopher D
2018-01-01
The use of feed grade amino acids can reduce the cost of lactation feed. With changing genetics, increasing feed costs, and higher number of pigs weaned with heavier wean weights further evaluation of higher inclusion levels of feed-grade amino acid in lactation diets than previously published is warranted. Two experiments (Exp.) were conducted to determine the optimal inclusion level of L -lysine HCl to be included in swine lactation diets while digestible lysine levels remain constant across dietary treatments and allowing feed grade amino acids to be added to the diet to maintain dietary ratios relative to lysine to maximize litter growth rate and sow reproductive performance. Furthermore, the studies were to evaluate minimal amino acid ratios relative to lysine that allows for optimal litter growth rate and sow reproductive performance. Exp. 1: Increasing L -lysine HCl resulted in similar gilt feed intake, litter, and reproductive performance. Average litter gain from birth to weaning was 2.51, 2.49, 2.59, 2.43, and 2.65 kg/d when gilts were fed 0.00, 0.075, 0.150, 0.225, and 0.30% L -lysine HCl, respectively. Exp. 2: The average litter gain from birth to weaning was 2.68, 2.73, 2.67, 2.70, and 2.64 kg/d ( P < 0.70) when sows were fed 0.1, 0.2, 0.3, 0.4, and 0.4% L -lysine HCl plus valine, respectively. No other differences among dietary treatments were observed. Collectively, these studies demonstrate corn-soybean meal based lactation diets formulated with a constant SID lysine content for all parities containing up to 0.40% L -lysine HCl with only supplemental feed grade threonine and a methionine source have no detrimental effect on litter growth rate and subsequent total born.
A hybrid neural networks-fuzzy logic-genetic algorithm for grade estimation
NASA Astrophysics Data System (ADS)
Tahmasebi, Pejman; Hezarkhani, Ardeshir
2012-05-01
The grade estimation is a quite important and money/time-consuming stage in a mine project, which is considered as a challenge for the geologists and mining engineers due to the structural complexities in mineral ore deposits. To overcome this problem, several artificial intelligence techniques such as Artificial Neural Networks (ANN) and Fuzzy Logic (FL) have recently been employed with various architectures and properties. However, due to the constraints of both methods, they yield the desired results only under the specific circumstances. As an example, one major problem in FL is the difficulty of constructing the membership functions (MFs).Other problems such as architecture and local minima could also be located in ANN designing. Therefore, a new methodology is presented in this paper for grade estimation. This method which is based on ANN and FL is called "Coactive Neuro-Fuzzy Inference System" (CANFIS) which combines two approaches, ANN and FL. The combination of these two artificial intelligence approaches is achieved via the verbal and numerical power of intelligent systems. To improve the performance of this system, a Genetic Algorithm (GA) - as a well-known technique to solve the complex optimization problems - is also employed to optimize the network parameters including learning rate, momentum of the network and the number of MFs for each input. A comparison of these techniques (ANN, Adaptive Neuro-Fuzzy Inference System or ANFIS) with this new method (CANFIS-GA) is also carried out through a case study in Sungun copper deposit, located in East-Azerbaijan, Iran. The results show that CANFIS-GA could be a faster and more accurate alternative to the existing time-consuming methodologies for ore grade estimation and that is, therefore, suggested to be applied for grade estimation in similar problems.
Optimized cartilage visualization using 7-T sodium ((23)Na) imaging after patella dislocation.
Widhalm, Harald K; Apprich, Sebastian; Welsch, Goetz H; Zbyn, Stefan; Sadoghi, Patrick; Vekszler, György; Hamböck, Martina; Weber, Michael; Hajdu, Stefan; Trattnig, Siegfried
2016-05-01
Retropatellar cartilage lesions often occur in the course of recurrent patella dislocation. Aim of this study was to develop a more detailed method for examining cartilage tissue, in order to reduce patient discomfort and time of care. For detailed diagnosing, a 7-T MRI of the knee joint and patella was performed in nine patients, with mean age of 26.4 years, after patella dislocation to measure the cartilage content in three different regions of interest of the patella. Axial sodium ((23)Na) images were derived from an optimized 3D GRE sequence on a 7-T MR scanner. Morphological cartilage grading was performed, and sodium signal-to-noise ratio (SNR) values were calculated. Mean global sodium values and SNR were compared between patients and volunteers. Two out of nine patients showed a maximum cartilage defect of International Cartilage Repair Society (ICRS) grade 3, three of grade 2, three of grade 1, and one patient showed no cartilage defect. The mean SNR in sodium images for cartilage was 13.4 ± 2.5 in patients and 14.6 ± 3.7 in volunteers (n.s.). A significant negative correlation between age and global sodium SNR for cartilage was found in the medial facet (R = -0.512; R (2) = 0.26; p = 0.030). Mixed-model ANOVA yielded a marked decrease of the sodium SNR, with increasing grade of cartilage lesions (p < 0.001). Utilization of the (23)Na MR imaging will make earlier detection of alterations to the patella cartilage after dislocation possible and will help prevent subsequent disease due to start adequate therapy earlier in the rehabilitation process. II.
A hybrid neural networks-fuzzy logic-genetic algorithm for grade estimation
Tahmasebi, Pejman; Hezarkhani, Ardeshir
2012-01-01
The grade estimation is a quite important and money/time-consuming stage in a mine project, which is considered as a challenge for the geologists and mining engineers due to the structural complexities in mineral ore deposits. To overcome this problem, several artificial intelligence techniques such as Artificial Neural Networks (ANN) and Fuzzy Logic (FL) have recently been employed with various architectures and properties. However, due to the constraints of both methods, they yield the desired results only under the specific circumstances. As an example, one major problem in FL is the difficulty of constructing the membership functions (MFs).Other problems such as architecture and local minima could also be located in ANN designing. Therefore, a new methodology is presented in this paper for grade estimation. This method which is based on ANN and FL is called “Coactive Neuro-Fuzzy Inference System” (CANFIS) which combines two approaches, ANN and FL. The combination of these two artificial intelligence approaches is achieved via the verbal and numerical power of intelligent systems. To improve the performance of this system, a Genetic Algorithm (GA) – as a well-known technique to solve the complex optimization problems – is also employed to optimize the network parameters including learning rate, momentum of the network and the number of MFs for each input. A comparison of these techniques (ANN, Adaptive Neuro-Fuzzy Inference System or ANFIS) with this new method (CANFIS–GA) is also carried out through a case study in Sungun copper deposit, located in East-Azerbaijan, Iran. The results show that CANFIS–GA could be a faster and more accurate alternative to the existing time-consuming methodologies for ore grade estimation and that is, therefore, suggested to be applied for grade estimation in similar problems. PMID:25540468
Yamazaki, Naoya; Kiyohara, Yoshio; Kudoh, Shoji; Seki, Akihiro; Fukuoka, Masahiro
2016-04-01
Skin toxicities, such as rash, are the most common adverse reactions associated with erlotinib. Steroids are a key treatment option for rash management; however, optimal timing of administration and selection of steroid strength have not been fully established. In this surveillance study of Japanese non-small-cell lung cancer (NSCLC) patients treated with erlotinib, rash management using topical steroids was analyzed in routine clinical practice. From December 2007 to October 2009, all recurrent/advanced NSCLC patients in Japan treated with erlotinib were enrolled into this study (POst-Launch All-patient Registration Surveillance in TARceva). The observation period was 12 months, and data for all adverse events were collected. Erlotinib-related rash, interventions for the symptoms, and outcomes of the interventions were analyzed. A total of 9909 patients were evaluated. Rash occurred in 67.4 % of patients; grade 1, 2, and 3 rash were observed in 26.8 %, 32.4 %, and 7.2 % of patients, respectively. The most common management strategy was topical steroids in 75.0 % of patients with rash. Regardless of rash grade, earlier initiation of steroids resulted in quicker recovery. In those for whom topical steroids were initiated more than 21 days after rash onset, median recovery time was more than 100 days regardless of rash grade, compared with those treated before rash onset, whose median time to recovery was 35-51 days, depending on rash grade. Median time to recovery of rash in the group initiated on medium-rank steroids then changed to strong-rank steroids was 47, 98, and 103 days for those with grade 1, 2, and 3 rash, respectively, compared with 39, 53, and 73 days median recovery for grade 1, 2, and 3 rash, respectively, in patients initiated on strong-rank steroids. Earlier initiation of topical steroids for the management of rash with strong or higher-rank steroids could achieve faster improvement.
Delamination Analysis of a Multilayered Two-Dimensional Functionally Graded Cantilever Beam
NASA Astrophysics Data System (ADS)
Rizov, V.
2017-11-01
Delamination fracture behaviour of a multilayered two-dimensional functionally graded cantilever beam is analyzed in terms of the strain energy release rate. The beam is made of an arbitrary number of layers. Perfect adhesion is assumed between layers. Each layer has individual thickness and material properties. Besides, the material is two-dimensional functionally graded in the cross-section of each layer. There is a delamination crack located arbitrary between layers. The beam is loaded by a bending moment applied at the free end of the lower crack arm. The upper crack arm is free of stresses. The solution to strain energy release rate derived is applied to investigate the influence of the crack location and the material gradient on the delamination fracture. The results obtained can be used to optimize the multilayered two-dimensional functionally graded beam structure with respect to the delamination fracture behaviour.
DOE Office of Scientific and Technical Information (OSTI.GOV)
T. Schirber; Goldberg, L.; Mosiman, G.
A more accurate assessment of SOG foundation insulation energy savings than traditionally possible is now feasible. This has been enabled by advances in whole building energy simulation with 3-dimensional foundation modelling integration at each time step together with an experimental measurement of the site energy savings of SOG foundation insulation. Ten SOG insulation strategies were evaluated on a test building to identify an optimum retrofit insulation strategy in a zone 6 climate (Minneapolis, MN). The optimum insulation strategy in terms of energy savings and cost effectiveness consisted of two components: (a) R-20 XPS insulation above grade, and, (b) R-20 insulationmore » at grade (comprising an outer layer of R-10 insulation and an interior layer of R-12 poured polyurethane insulation) tapering to R-10 XPS insulation at half the below-grade wall height (the lower half of the stem wall was uninsulated).« less
Statistical evaluation of manual segmentation of a diffuse low-grade glioma MRI dataset.
Ben Abdallah, Meriem; Blonski, Marie; Wantz-Mezieres, Sophie; Gaudeau, Yann; Taillandier, Luc; Moureaux, Jean-Marie
2016-08-01
Software-based manual segmentation is critical to the supervision of diffuse low-grade glioma patients and to the optimal treatment's choice. However, manual segmentation being time-consuming, it is difficult to include it in the clinical routine. An alternative to circumvent the time cost of manual segmentation could be to share the task among different practitioners, providing it can be reproduced. The goal of our work is to assess diffuse low-grade gliomas' manual segmentation's reproducibility on MRI scans, with regard to practitioners, their experience and field of expertise. A panel of 13 experts manually segmented 12 diffuse low-grade glioma clinical MRI datasets using the OSIRIX software. A statistical analysis gave promising results, as the practitioner factor, the medical specialty and the years of experience seem to have no significant impact on the average values of the tumor volume variable.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Frank, Steven J., E-mail: sjfrank@mdanderson.org; Cox, James D.; Gillin, Michael
2014-07-15
Background: We report the first clinical experience and toxicity of multifield optimization (MFO) intensity modulated proton therapy (IMPT) for patients with head and neck tumors. Methods and Materials: Fifteen consecutive patients with head and neck cancer underwent MFO-IMPT with active scanning beam proton therapy. Patients with squamous cell carcinoma (SCC) had comprehensive treatment extending from the base of the skull to the clavicle. The doses for chemoradiation therapy and radiation therapy alone were 70 Gy and 66 Gy, respectively. The robustness of each treatment plan was also analyzed to evaluate sensitivity to uncertainties associated with variations in patient setup and the effectmore » of uncertainties with proton beam range in patients. Proton beam energies during treatment ranged from 72.5 to 221.8 MeV. Spot sizes varied depending on the beam energy and depth of the target, and the scanning nozzle delivered the spot scanning treatment “spot by spot” and “layer by layer.” Results: Ten patients presented with SCC and 5 with adenoid cystic carcinoma. All 15 patients were able to complete treatment with MFO-IMPT, with no need for treatment breaks and no hospitalizations. There were no treatment-related deaths, and with a median follow-up time of 28 months (range, 20-35 months), the overall clinical complete response rate was 93.3% (95% confidence interval, 68.1%-99.8%). Xerostomia occurred in all 15 patients as follows: grade 1 in 10 patients, grade 2 in 4 patients, and grade 3 in 1 patient. Mucositis within the planning target volumes was seen during the treatment of all patients: grade 1 in 1 patient, grade 2 in 8 patients, and grade 3 in 6 patients. No patient experienced grade 2 or higher anterior oral mucositis. Conclusions: To our knowledge, this is the first clinical report of MFO-IMPT for head and neck tumors. Early clinical outcomes are encouraging and warrant further investigation of proton therapy in prospective clinical trials.« less
ERIC Educational Resources Information Center
Riddle, Robin; And Others
This four-day unit is designed for use in social studies and/or literature classes at secondary (7-12) and community college levels as a general introduction to conflict on personal, group, and world levels. The unit introduces students to and familiarizes them with the characteristics and mechanisms of conflicts at all levels and with basic…
ERIC Educational Resources Information Center
Korkmaz, Murat; Esen, Binnaz Kiran
2013-01-01
The aim of this study is to design and evaluate a peer-training program about changing students' internet use habits. This study was conducted with students from two different elementary schools in Mersin, Turkey, who were enrolled in 7th or 8th grade in the 2009-2010 academic year. A total of 24 students participated in the program, 12 of whom…
Pre-Engineering Program: Science, Technology, Engineering and Mathematics (STEM)
2013-08-29
educators in the Urbana-Champaign area. 15. SUBJECT TERMS STEM: science, technology , engineering, mathematics 16. SECURITY CLASSIFICATION OF: 19a. NAME...9132T-13-1-0002 4. TITLE AND SUBTITLE Pre-Engineering Program: Science, Technology , Engineering and Mathematics (STEM) 5c. PROGRAM ELEMENT NUMBER N...project was focused on underserved children in grades 1-6 who need, but have limited access to, out-of-school time STEM (science, technology
2013-10-01
average 1 hour per response , including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed...dermal remodeling 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a...evaluations made prior to each biopsy. The initial grading system took into account vascularity , pliability, color, contour, texture, and
Under the Threat of Mount Saint Helens: A Study of Chronic Family Stress.
1982-02-01
families plus 10 control families from Minneapolis, Minnesota). Husband, wife and one teenager were inter- viewed separately but simultaneously, then the...Study Center, 1014 Social Sciences Building, University of Minnesota, Minneapolis, 2234F Minnesota 55455 II. CONTROLLING OFFICE NAME AND ADDRESS 12...from Controlling Office) I. SECURITY CLASS. (of this report) unclassified 1a. DECL ASSI FICATION/ DOWN GRADING SCHEDULE IS. DISTRIBUTION STATEMENT
Vajapeyam, S; Stamoulis, C; Ricci, K; Kieran, M; Poussaint, T Young
2017-01-01
Pharmacokinetic parameters from dynamic contrast-enhanced MR imaging have proved useful for differentiating brain tumor grades in adults. In this study, we retrospectively reviewed dynamic contrast-enhanced perfusion data from children with newly diagnosed brain tumors and analyzed the pharmacokinetic parameters correlating with tumor grade. Dynamic contrast-enhanced MR imaging data from 38 patients were analyzed by using commercially available software. Subjects were categorized into 2 groups based on pathologic analyses consisting of low-grade (World Health Organization I and II) and high-grade (World Health Organization III and IV) tumors. Pharmacokinetic parameters were compared between the 2 groups by using linear regression models. For parameters that were statistically distinct between the 2 groups, sensitivity and specificity were also estimated. Eighteen tumors were classified as low-grade, and 20, as high-grade. Transfer constant from the blood plasma into the extracellular extravascular space (K trans ), rate constant from extracellular extravascular space back into blood plasma (K ep ), and extracellular extravascular volume fraction (V e ) were all significantly correlated with tumor grade; high-grade tumors showed higher K trans , higher K ep , and lower V e . Although all 3 parameters had high specificity (range, 82%-100%), K ep had the highest specificity for both grades. Optimal sensitivity was achieved for V e , with a combined sensitivity of 76% (compared with 71% for K trans and K ep ). Pharmacokinetic parameters derived from dynamic contrast-enhanced MR imaging can effectively discriminate low- and high-grade pediatric brain tumors. © 2017 by American Journal of Neuroradiology.
Xie, Rong-Rong; Pang, Yong; Zhang, Qian; Chen, Ke; Sun, Ming-Yuan
2012-07-01
For the safety of the water environment in Jiashan county in Zhejiang Province, one-dimensional hydrodynamic and water quality models are established based on three large-scale monitoring of hydrology and water quality in Jiashan county, three water environmental sensitive spots including Hongqitang dam Chijia hydrological station and Luxie pond are selected to investigate weight parameters of water quality impact and risk grade determination. Results indicate as follows (1) Internal pollution impact in Jiashan areas was greater than the external, the average weight parameters of internal chemical oxygen demand (COD) pollution is 55.3%, internal ammonia nitrogen (NH(4+)-N) is 67.4%, internal total phosphor (TP) is 63.1%. Non-point pollution impact in Jiashan areas was greater than point pollution impact, the average weight parameters of non-point COD pollutions is 53.7%, non-point NH(4+)-N is 65.9%, non-point TP is 57.8%. (2) The risk of Hongqitang dam and Chijia hydrological station are in the middle risk. The risk of Luxie pond is also in the middle risk in August, and in April and December the risk of Luxie pond is low. The strategic decision will be suggested to guarantee water environment security and social and economic security in the study.
The influence of optimism and pessimism on student achievement in mathematics
NASA Astrophysics Data System (ADS)
Yates, Shirley M.
2002-11-01
Students' causal attributions are not only fundamental motivational variables but are also critical motivators of their persistence in learning. Optimism, pessimism, and achievement in mathematics were measured in a sample of primary and lower secondary students on two occasions. Although achievement in mathematics was most strongly related to prior achievement and grade level, optimism and pessimism were significant factors. In particular, students with a more generally pessimistic outlook on life had a lower level of achievement in mathematics over time. Gender was not a significant factor in achievement. The implications of these findings are discussed.
Microgrid Analysis Tools Summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jimenez, Antonio; Haase, Scott G; Mathur, Shivani
2018-03-05
The over-arching goal of the Alaska Microgrid Partnership is to reduce the use of total imported fuel into communities to secure all energy services by at least 50% in Alaska's remote microgrids without increasing system life cycle costs while also improving overall system reliability, security, and resilience. One goal of the Alaska Microgrid Partnership is to investigate whether a combination of energy efficiency and high-contribution (from renewable energy) power systems can reduce total imported energy usage by 50% while reducing life cycle costs and improving reliability and resiliency. This presentation provides an overview of the following four renewable energy optimizationmore » tools. Information is from respective tool websites, tool developers, and author experience. Distributed Energy Resources Customer Adoption Model (DER-CAM) Microgrid Design Toolkit (MDT) Renewable Energy Optimization (REopt) Tool Hybrid Optimization Model for Electric Renewables (HOMER).« less