MTR STACK, TRA710, CONTEXTUAL VIEW, CAMERA FACING SOUTH. PERIMETER SECURITY ...
MTR STACK, TRA-710, CONTEXTUAL VIEW, CAMERA FACING SOUTH. PERIMETER SECURITY FENCE AND SECURITY LIGHTING IN VIEW AT LEFT. INL NEGATIVE NO. HD52-1-1. Mike Crane, Photographer, 5/2005 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Is Your Center Burglar/Vandal Proofed? Guidelines for Protecting Your Center.
ERIC Educational Resources Information Center
Adams, Shawn
1998-01-01
Identifies specific steps that child care centers can take to reduce the chances of burglary and vandalism. Differentiates loss prevention, loss control, and risk financing. Includes discussion of layering defenses, perimeter protection, security lighting, building surface security, locks, and alarm systems. Discusses the importance of reducing…
Perimeter security for Minnesota correctional facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crist, D.; Spencer, D.D.
1996-12-31
For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned newmore » construction at other facilities.« less
Perimeter security alarm system based on fiber Bragg grating
NASA Astrophysics Data System (ADS)
Zhang, Cui; Wang, Lixin
2010-11-01
With the development of the society and economy and the improvement of living standards, people need more and more pressing security. Perimeter security alarm system is widely regarded as the first line of defense. A highly sensitive Fiber Bragg grating (FBG) vibration sensor based on the theory of the string vibration, combined with neural network adaptive dynamic programming algorithm for the perimeter security alarm system make the detection intelligently. Intelligent information processing unit identify the true cause of the vibration of the invasion or the natural environment by analyzing the frequency of vibration signals, energy, amplitude and duration. Compared with traditional perimeter security alarm systems, such as infrared perimeter security system and electric fence system, FBG perimeter security alarm system takes outdoor passive structures, free of electromagnetic interference, transmission distance through optical fiber can be as long as 20 km It is able to detect the location of event within short period of time (high-speed response, less than 3 second).This system can locate the fiber cable's breaking sites and alarm automatically if the cable were be cut. And the system can prevent effectively the false alarm from small animals, birds, strong wind, scattering things, snowfalls and vibration of sensor line itself. It can also be integrated into other security systems. This system can be widely used in variety fields such as military bases, nuclear sites, airports, warehouses, prisons, residence community etc. It will be a new force of perimeter security technology.
15. Front security entrance to the perimeter acquisition radar building, ...
15. Front security entrance to the perimeter acquisition radar building, showing rotogates 1 and 2 and entrance door to security operations control center (SOCC), room #108 - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Integrating visible light 3D scanning into the everyday world
NASA Astrophysics Data System (ADS)
Straub, Jeremy
2015-05-01
Visible light 3D scanning offers the potential to non-invasively and nearly non-perceptibly incorporate 3D imaging into the everyday world. This paper considers the various possible uses of visible light 3D scanning technology. It discusses multiple possible usage scenarios including in hospitals, security perimeter settings and retail environments. The paper presents a framework for assessing the efficacy of visible light 3D scanning for a given application (and compares this to other scanning approaches such as those using blue light or lasers). It also discusses ethical and legal considerations relevant to real-world use and concludes by presenting a decision making framework.
1. VIEW, LOOKING NORTH, OF THE SOUTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING NORTH, OF THE SOUTH ELEVATION OF BUILDING 901. BUILDING 901 IS ONE OF FOUR GUARD TOWERS INSTALLED AS PART OF THE PERIMETER SECURITY ZONE TO PROVIDE PROTECTIVE FORCE PERSONNEL WITH A CLEAR HIGH VIEW OF THE SURROUNDING AREAS. THE PERIMETER SECURITY ZONE CONSISTS OF A DOUBLE PERIMETER FENCE WITH CLOSED CIRCUIT TELEVISIONS, ALARMS, AND AN UNINTERRUPTED POWER SUPPLY. - Rocky Flats Plant, Guard Tower, Southeast corner of protected area, Golden, Jefferson County, CO
14. Inner double blast door entrance to perimeter acquisition radar ...
14. Inner double blast door entrance to perimeter acquisition radar building security area - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Meyer, J H; Funk, J
1994-04-01
In this study we compare the influence of blurring by diffusor foils (Bangerter) on visual acuity and on the thresholds of ring and light sense perimetry. Light sense perimetry was performed using the G1 program of the Octopus 1-2-3 perimeter [1], and ring perimetry with the "ring" test, version 2.20 (High-Tech-Vision) designed by Frisén [4]. Ten eyes of ten healthy persons with a visual acuity of 1.25 or better were examined at six different levels corresponding to visual acuities between 1.6 and hand movements. With both perimeters sensitivity decreased with decreasing visual acuity. At good visual acuities (1.2-1.6) no changes were found in either ring perimetry or light sense perimetry. At acuity levels of 0.8 and below a more pronounced decrease in sensitivity was found with the ring perimeter than with the light sense perimeter. At the level of hand movements there were only absolute scotomas in the ring perimeter, while the Octopus 1-2-3 still detected a baseline sensitivity. Sensitivity was correlated with the logarithm of the visual acuity with both perimeters (Octopus 1-2-3: r = 0.99, P < 0.001; ring perimeter: r = 0.98, P < 0.001). The decrease in sensitivity per log-unit of visual acuity was 9.43 dB (Octopus 1-2-3) or 5.19 dB (ring perimeter). The ring perimeter, at least in its currently available version giving an absolute scotoma at mean scores > 14 dB, is obviously more sensitive to media opacities than the Octopus 1-2-3. This may be of importance in the clinical evaluation of the test results.
Security Annex Concept of Operations for the Next Generation Air Transportation System, Version 2.0
2007-06-13
AOA/ SIDA ........................................................................................................ 21 4.3.2 Terminal Perimeter...place in the following areas within these facilities as appropriate: • Airside: Security identification display area ( SIDA )/AoA, terminal perimeter...validating hypersonic aircraft clearances as they reenter the atmosphere to land at that facility. 4.3 AIRSIDE 4.3.1 AOA/ SIDA NextGen Commercial
Environmental Assessment for Perimeter Security Lighting at Fort MacArthur, California
2007-07-01
transportation, visual resources, cultural resources, socioeconomics, environmental justice, hazardous materials and waste and safety . The environmental...Materials and Wastes 53 3.13 Safety 56 4.0 Environmental Consequences 57 4.1 Air Quality 57 4.2 Noise 58 4.3 Land Use 60 4.4 Geological Resources 61...Socioeconomics 70 4.11 Environmental Justice and Protection of Children 71 4.12 Hazardous Materials and Wastes 73 4.13 Safety 74 5.0 Cumulative
Dinwoodie, Thomas L.
2002-12-17
A stabilized PV system comprises an array of photovoltaic (PV) assemblies mounted to a support surface. Each PV assembly comprises a PV module and a support assembly securing the PV module to a position overlying the support surface. The array of modules is circumscribed by a continuous, belt-like perimeter assembly. Cross strapping, extending above, below or through the array, or some combination of above, below and through the array, secures a first position along the perimeter assembly to at least a second position along the perimeter assembly thereby stabilizing the array against wind uplift forces. The first and second positions may be on opposite sides on the array.
Fiber-optic perimeter security system based on WDM technology
NASA Astrophysics Data System (ADS)
Polyakov, Alexandre V.
2017-10-01
Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.
A note on stray light in the Tübingen perimeter.
Weale, R A; Wheeler, C
1977-01-01
Measurements were made of the relative intensity of light scattered in the neighbourhood of the large and small targets on the Tübingen perimeter. Two target intensities were studied. The scattered light fraction ranged from 0-1 to 25% and its effect was detected more readily by young than by older observers. PMID:843510
Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O.
2013-02-01
Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors,more » active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.« less
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO ...
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO EAST. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in Weapons Storage Area, Plattsburgh, Clinton County, NY
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO ...
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO NORTH. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in SAC Alert Area, Plattsburgh, Clinton County, NY
Concept of Operations for the Next Generation Air Transportation System. Version 3.2
2011-01-01
Airside. Security Identification Display Area/Airport ( SIDA ) operations area, terminal perimeter, terminal airspace (security) • Landside. Terminal...Definition RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM Separation Management
29. AERIAL VIEW OF THE ROCKY FLATS PLANT LOOKING SOUTH. ...
29. AERIAL VIEW OF THE ROCKY FLATS PLANT LOOKING SOUTH. IN 1983, THE PERIMETER SECURITY ZONE SURROUNDING THE PLUTONIUM OPERATIONS WAS COMPLETED. IT CONSISTED OF A DOUBLE PERIMETER FENCE, CLOSED CIRCUIT TELEVISIONS, ALARMS, AND AN UNINTERRUPTED POWER SUPPLY (7/29/83). - Rocky Flats Plant, Bounded by Indiana Street & Routes 93, 128 & 72, Golden, Jefferson County, CO
Intruder signature analysis from a phase-sensitive distributed fiber-optic perimeter sensor
NASA Astrophysics Data System (ADS)
Madsen, C. K.; Bae, T.; Snider, T.
2007-09-01
Using a phase-sensitive optical time-domain reflectometer developed at Texas A&M University, this paper reports on recent advances in intruder detection and classificatoin for long perimeters or borders. The system uses light pulses from a narrow linewidth CW laser with low frequency drift to interrogate an optical fiber. The backscattered light is detected, and real-time processing of the received signal is performed. Signatures from single and multiple humans on foot, nearby vehicle traffic on a road, construction-like vehicle activity, and animals have been obtained. Individual footsteps are clearly identified and the cadence readily observed. Time-frequency plots are used to compare the signatures. The detected signal contains information regarding the weight of the intruder as well. An adult weighing around 60kg may produce several π-radian shifts in the optical phase, which is detected by the system. While distances up to 20km have been monitored in previous remote field tests, we report measurements on a local test site with a total fiber length of 12km. A 3-mm diameter fiber cable is buried at a depth of 20-46 cm over a distance of 44m, with a 2km spool of fiber attached prior to the buried fiber and a 10km fiber spool connected in series after the buried section. Recent advances in data acquisition and signal processing allow us to avoid false alarms due to drifts in the laser center frequency and greatly improve the probability of detection. With these advancements, this technology is prime for low-cost perimeter monitoring of high-value and high-security installations such as nuclear power plants and military bases as well as national borders.
Distributed fiber optic intrusion sensor system for monitoring long perimeters
NASA Astrophysics Data System (ADS)
Juarez, Juan C.; Taylor, Henry F.
2005-05-01
The use of an optical fiber as a distributed sensor for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from seismic disturbances in the vicinity are sensed by a phase-sensitive optical time-domain reflectometer (Φ-OTDR). Light pulses from a cw laser operating in a single longitudinal mode and with low (MHz/min range) frequency drift are injected into one end of the single mode fiber, and the backscattered light is monitored with a photodetector. In laboratory tests with 12 km of fiber on reels, the effects of localized phase perturbations induced by a piezoelectric fiber stretcher on Φ-OTDR traces were characterized. In field tests in which the sensing element is a single mode fiber in a 3-mm diameter cable buried in a 20-46 cm deep, 10 cm wide trench in clay soil, detection of intruders on foot up to 4.6 m from the cable line was achieved. In desert terrain field tests in which the sensing fiber is in a 4.5-mm diameter cable buried in a 30 cm deep, 75 cm wide trench filled with loose sand, high sensitivity and consistent detection of intruders on foot and of vehicles traveling down a road near the cable line was realized over a cable length of 8.5 km and a total fiber path of 19 km. Based on these results, this technology may be regarded as a candidate for providing low-cost perimeter security for nuclear power plants, electrical power distribution centers, storage facilities for fuel and volatile chemicals, communication hubs, airports, government offices, military bases, embassies, and national borders.
Addressing the Tension Between Strong Perimeter Control an Usability
NASA Technical Reports Server (NTRS)
Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris
2006-01-01
This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.
HOW TO SELECT THE PROPER SECURITY AND EQUIPMENT SURVEILLANCE SYSTEMS TO PROTECT YOUR FACILITIES.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
IN PRESENTING A SURVEY OF MODERN SECURITY SYSTEMS, THIS BOOKLET DISCUSSES THE REQUIREMENTS FOR SURVEILLANCE AND PROTECTION OF AREAS, PERIMETER, AND OBJECTS. A VARIETY OF EQUIPMENT IS DESCRIBED WITH DISCUSSION OF OPERATING PROCEDURES, COSTS, AND RECENT DEVELOPMENTS IN SECURITY SYSTEMS. (JT)
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING 792A. BUILDING 792A, AT PORTAL 3, IS ONE OF THREE PEDESTRIAN ACCESS POINTS THROUGH THE PERIMETER SECURITY ZONE INTO THE PROTECTED AREA. - Rocky Flats Plant, Access Control Building, North of building 771, in parking area 71, just south of North Perimeter Road, Golden, Jefferson County, CO
Keeping the Care in Secure Care
ERIC Educational Resources Information Center
Cunningham, James; Hood, Terry
2011-01-01
A secure setting creates a physical perimeter that prevents youth from leaving, which can provide safety for certain troubled youth. But in this totally closed environment, staff bear major responsibility for meeting a youth's developmental needs, a role normally fulfilled by parents. Secure settings often compromise goals of care when safety…
Alstott, Jeff; Timberlake, William
2009-01-23
A typical open field consists of a square enclosure, bounded by four straight walls joined by identical corners. For decades behavioral researchers have used the open center and more sheltered perimeter of such fields to examine the effects of drugs, sex differences, and illumination on the behavioral expression of fear and anxiety. The present study "reversed" the relative security of the center and periphery of a circular field to re-examine the functional relation of open field behavior to experience, sex differences and lighting. Across six daily exposures, males in both the light and dark rapidly increased their preference for the center. Females in the light developed a similar pattern, though more slowly; females in the dark continued to spend the great majority of their time in the open periphery, including the edge of the field. The behavior of all groups, but especially the dark females, strongly supports the continued importance of environmental assessment in open field behavior.
The MANPAD Threat to Civilian Airliners
2006-03-03
PAGES: 19 KEY TERMS: Homeland Security; Non-Proliferation; Airport Security CLASSIFICATION: Unclassified This paper investigates strategic approaches...technological solutions and law enforcement operations to provide a competent airport security perimeter.”18 To combat this ominous threat of MANPADS...sites for phone and computer tips should be established with access for airport security , local and federal law enforcement, as well as intelligence
Security Considerations of Doing Business via the Internet: Cautions To Be Considered.
ERIC Educational Resources Information Center
Aldridge, Alicia; White, Michele; Forcht, Karen
1997-01-01
Lack of security is perceived as a major roadblock to doing business online. This article examines system, user, and commercial transaction privacy on the World Wide Web and discusses methods of protection: operating systems security, file and data protection, user education, access restrictions, data authentication, perimeter and transaction…
Fiber optic perimeter system for security in smart city
NASA Astrophysics Data System (ADS)
Cubik, Jakub; Kepak, Stanislav; Nedoma, Jan; Fajkus, Marcel; Zboril, Ondrej; Novak, Martin; Jargus, Jan; Vasinek, Vladimir
2017-10-01
Protection of persons and assets is the key challenge of Smart City safeguards technologies. Conventional security technologies are often outdated and easy to breach. Therefore, new technologies that could complement existing systems or replace them are developed. The use of optical fibers and their subsequent application in sensing is a trend of recent years. This article discusses the use of fiber-optic sensors in perimeter protection. The sensor consists of optical fibers and couplers only and being constructed without wires and metal parts bring many advantages. These include an absence of interference with electromagnetic waves, system presence can be difficult to detect as well as affect its operation. Testing installation of perimeter system was carried out under reinforced concrete structure. Subjects walked over the bridge at different speeds and over the different routes. The task for the system was an absolute detection of all subjects. The proposed system should find application mainly in areas with the presence of volatile substances, strong electromagnetic fields, or in explosive areas.
Concept of Operations for the Next Generation Air Transportation System, Version 2.0
2007-06-13
SIDA )/airport operations area (AOA), [R-110] terminal perimeter, terminal airspace (security) • Landside. Terminal public and commercial roadways and...Required Surveillance Performance RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM...impede airside operations? R-110 Research 6.4.2/C. 4.4.1 Airside: Security Identification Display Area ( SIDA )/AOA R&D needed to develop and
ERIC Educational Resources Information Center
Davis, Robert E.
2017-01-01
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…
19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...
19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Petersen, Joseph M.; Boyd, Paul A.; Dahowski, Robert T.
The purpose of this assessment was to undertake an assessment and analysis of cost-effective options for energy-efficiency improvements and the deployment of a micro-grid to increase the energy resilience at the U.S. Virgin Islands Industrial Development Park (IDP) and adjacent facilities in St. Croix, Virgin Islands. The Economic Development Authority sought assistance from the U.S. Department of Energy to undertake this assessment undertaken by Pacific Northwest National Laboratory. The assessment included 18 buildings plus the perimeter security lighting at the Virgin Islands Bureau of Correctional Facility, four buildings plus exterior lighting at the IDP, and five buildings (one of whichmore » is to be constructed) at the Virgin Islands Police Department for a total of 27 buildings with a total of nearly 323,000 square feet.« less
Lightning Simulation and Design Program (LSDP)
NASA Astrophysics Data System (ADS)
Smith, D. A.
This computer program simulates a user-defined lighting configuration. It has been developed as a tool to aid in the design of exterior lighting systems. Although this program is used primarily for perimeter security lighting design, it has potential use for any application where the light can be approximated by a point source. A data base of luminaire photometric information is maintained for use with this program. The user defines the surface area to be illuminated with a rectangular grid and specifies luminaire positions. Illumination values are calculated for regularly spaced points in that area and isolux contour plots are generated. The numerical and graphical output for a particular site mode are then available for analysis. The amount of time spent on point-to-point illumination computation with this progress is much less than that required for tedious hand calculations. The ease with which various parameters can be interactively modified with the progress also reduces the time and labor expended. Consequently, the feasibility of design ideas can be examined, modified, and retested more thoroughly, and overall design costs can be substantially lessened by using this progress as an adjunct to the design process.
HORIZONTAL HYBRID SOLAR LIGHT PIPE: AN INTEGRATED SYSTEM OF DAYLIGHT AND ELECTRIC LIGHT
This project will test the feasibility of an advanced energy efficient perimeter lighting system that integrates daylighting, electric lighting, and lighting controls to reduce electricity consumption. The system is designed to provide adequate illuminance levels in deep-floor...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
..., DHS. ACTION: Notice. SUMMARY: The United States and Canada are staunch allies, vital economic partners... in which the United States and Canada share responsibility for the security and resilience of our..., while working together to facilitate the flows of legitimate travel and trade. Beyond the Border...
Pervasive surveillance-agent system based on wireless sensor networks: design and deployment
NASA Astrophysics Data System (ADS)
Martínez, José F.; Bravo, Sury; García, Ana B.; Corredor, Iván; Familiar, Miguel S.; López, Lourdes; Hernández, Vicente; Da Silva, Antonio
2010-12-01
Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment.
Gross anatomy of network security
NASA Technical Reports Server (NTRS)
Siu, Thomas J.
2002-01-01
Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.
Distributed Fiber-Optic Sensors for Vibration Detection
Liu, Xin; Jin, Baoquan; Bai, Qing; Wang, Yu; Wang, Dong; Wang, Yuncai
2016-01-01
Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. Optical parameters such as light intensity, phase, polarization state, or light frequency will change when external vibration is applied on the sensing fiber. In this paper, various technologies of distributed fiber-optic vibration sensing are reviewed, from interferometric sensing technology, such as Sagnac, Mach–Zehnder, and Michelson, to backscattering-based sensing technology, such as phase-sensitive optical time domain reflectometer, polarization-optical time domain reflectometer, optical frequency domain reflectometer, as well as some combinations of interferometric and backscattering-based techniques. Their operation principles are presented and recent research efforts are also included. Finally, the applications of distributed fiber-optic vibration sensors are summarized, which mainly include structural health monitoring and perimeter security, etc. Overall, distributed fiber-optic vibration sensors possess the advantages of large-scale monitoring, good concealment, excellent flexibility, and immunity to electromagnetic interference, and thus show considerable potential for a variety of practical applications. PMID:27472334
Distributed Fiber-Optic Sensors for Vibration Detection.
Liu, Xin; Jin, Baoquan; Bai, Qing; Wang, Yu; Wang, Dong; Wang, Yuncai
2016-07-26
Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. Optical parameters such as light intensity, phase, polarization state, or light frequency will change when external vibration is applied on the sensing fiber. In this paper, various technologies of distributed fiber-optic vibration sensing are reviewed, from interferometric sensing technology, such as Sagnac, Mach-Zehnder, and Michelson, to backscattering-based sensing technology, such as phase-sensitive optical time domain reflectometer, polarization-optical time domain reflectometer, optical frequency domain reflectometer, as well as some combinations of interferometric and backscattering-based techniques. Their operation principles are presented and recent research efforts are also included. Finally, the applications of distributed fiber-optic vibration sensors are summarized, which mainly include structural health monitoring and perimeter security, etc. Overall, distributed fiber-optic vibration sensors possess the advantages of large-scale monitoring, good concealment, excellent flexibility, and immunity to electromagnetic interference, and thus show considerable potential for a variety of practical applications.
Microstructured optical fibers for gas sensing systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Challener, William Albert; Choudhury, Niloy; Palit, Sabarni
2017-10-17
Microstructured optical fiber (MOF) includes a cladding extending a length between first and second ends. The cladding includes an inner porous microstructure that at least partially surrounds a hollow core. A perimeter contour of the hollow core has a non-uniform radial distance from a center axis of the cladding such that first segments of the cladding along the perimeter contour have a shorter radial distance from the center axis relative to second segments of the cladding along the perimeter contour. The cladding receives and propagates light energy through the hollow core, and the inner porous microstructure substantially confines the lightmore » energy within the hollow core. The cladding defines at least one port hole that extends radially from an exterior surface of the cladding to the hollow core. Each port hole penetrates the perimeter contour of the hollow core through one of the second segments of the cladding.« less
[How to establish the hospital information system security policies].
Gong, Qing-Yue; Shi, Cheng
2008-03-01
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.
Joint Tactics, Techniques, and Procedures for Antiterrorism
1998-03-17
VI-5 VII-1 Fortification Materials...concealment and inability to create perimeter stand-off. Political restrictions may also limit the military’s ability to construct fortifications or... fortifications , sensors, obstacles, local-hire security forces (if applicable), unit guards, deception, and on-call support from reaction forces. Each
NASA Aviation Safety Reporting System
NASA Technical Reports Server (NTRS)
1980-01-01
A comprehensive study of near midair collisions in terminal airspace, derived from the ASRS database is presented. A selection of controller and pilot reports on airport perimeter security, unauthorized takeoffs and landings, and on winter operations is presented. A sampling of typical Alert Bulletins and their responses is presented.
2005-04-01
Mountain juniper (Juniperus scopulorum), laurel leaf willow (Salix pentandra), Japanese lilac tree (Syringa reticulata), Amur chokecherry (Prunus maackii...Western painted turtle (Chrysemys picta belli), Northern leopard frog (Rana pipiens), Western chorus frog (Pseudacris triseriata), American toad (Bufo
2016-02-01
system consists of a high-fidelity hardware simulation using field programmable gate arrays (FPGAs), with a set of runtime services (ConcreteWare...perimeter protection, patch, and pray” is not aligned with the threat. Programmers will not bail us out of this situation (by writing defect free code...hosted on a Field Programmable Gate Array (FPGA), with a set of runtime services (concreteware) running on the hardware. Secure applications can be
33 CFR 110.45a - Mattapoisett Harbor, Mattapoisett, Mass.
Code of Federal Regulations, 2013 CFR
2013-07-01
... SECURITY ANCHORAGES ANCHORAGE REGULATIONS Special Anchorage Areas § 110.45a Mattapoisett Harbor... Special Anchorage Area is exercised by the Harbormaster, Town of Mattapoisett pursuant to a local... perimeter of the anchorage area. [CGD 83-2R, 49 FR 25445, June 21, 1984; 49 FR 27320, July 3, 1984] ...
33 CFR 110.45a - Mattapoisett Harbor, Mattapoisett, Mass.
Code of Federal Regulations, 2014 CFR
2014-07-01
... SECURITY ANCHORAGES ANCHORAGE REGULATIONS Special Anchorage Areas § 110.45a Mattapoisett Harbor... Special Anchorage Area is exercised by the Harbormaster, Town of Mattapoisett pursuant to a local... perimeter of the anchorage area. [CGD 83-2R, 49 FR 25445, June 21, 1984; 49 FR 27320, July 3, 1984] ...
33 CFR 110.45a - Mattapoisett Harbor, Mattapoisett, Mass.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SECURITY ANCHORAGES ANCHORAGE REGULATIONS Special Anchorage Areas § 110.45a Mattapoisett Harbor... Special Anchorage Area is exercised by the Harbormaster, Town of Mattapoisett pursuant to a local... perimeter of the anchorage area. [CGD 83-2R, 49 FR 25445, June 21, 1984; 49 FR 27320, July 3, 1984] ...
33 CFR 110.45a - Mattapoisett Harbor, Mattapoisett, Mass.
Code of Federal Regulations, 2011 CFR
2011-07-01
... SECURITY ANCHORAGES ANCHORAGE REGULATIONS Special Anchorage Areas § 110.45a Mattapoisett Harbor... Special Anchorage Area is exercised by the Harbormaster, Town of Mattapoisett pursuant to a local... perimeter of the anchorage area. [CGD 83-2R, 49 FR 25445, June 21, 1984; 49 FR 27320, July 3, 1984] ...
33 CFR 110.45a - Mattapoisett Harbor, Mattapoisett, Mass.
Code of Federal Regulations, 2012 CFR
2012-07-01
... SECURITY ANCHORAGES ANCHORAGE REGULATIONS Special Anchorage Areas § 110.45a Mattapoisett Harbor... Special Anchorage Area is exercised by the Harbormaster, Town of Mattapoisett pursuant to a local... perimeter of the anchorage area. [CGD 83-2R, 49 FR 25445, June 21, 1984; 49 FR 27320, July 3, 1984] ...
76 FR 70809 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-15
.... Pavement condition index airfield inspection. Brief Description of Withdrawn Projects: Safety management... 1U19R and 7R/25L intersection repaving, construction. Perimeter road bridge over Howell Avenue, design. Inline baggage security, construction. Gate D56 improvements, design and construction. Snow removal...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
Design of an autonomous exterior security robot
NASA Technical Reports Server (NTRS)
Myers, Scott D.
1994-01-01
This paper discusses the requirements and preliminary design of robotic vehicle designed for performing autonomous exterior perimeter security patrols around warehouse areas, ammunition supply depots, and industrial parks for the U.S. Department of Defense. The preliminary design allows for the operation of up to eight vehicles in a six kilometer by six kilometer zone with autonomous navigation and obstacle avoidance. In addition to detection of crawling intruders at 100 meters, the system must perform real-time inventory checking and database comparisons using a microwave tags system.
Improving Smart Home Concept with the Internet of Things Concept Using RaspberryPi and NodeMCU
NASA Astrophysics Data System (ADS)
Amri, Yasirli; Andri Setiawan, Mukhammad
2018-03-01
The Internet of things (IoT) is getting more tractions in recent years. One of the usage scenario of IoT is smart home. Smart home basically provides home automation for installed devices at home such as thermostat, lighting, air conditioning, etc and allows devices connected to the Internet to be monitored and controlled remotely by user. However many studies on smart home concept focusing only on few main features. They still lack of important usage of IoT i.e. providing energy efficiency, energy monitoring, dealing with security, and managing privacy. This paper proposes a smart home system with RaspberryPi and NodeMCU as the backend that not only serves as home automation and merely a switch replacement, but to also record and report important things to the owner of the house e.g. when someone trespasses the house (security perimeter), or to report the calculation of how much money has been spent in consuming the electrical appliances. We successfully examine our proposed system in a real life working scenario. The communication between user and the system is done using Telegram Bot.
Feature-based alert correlation in security systems using self organizing maps
NASA Astrophysics Data System (ADS)
Kumar, Munesh; Siddique, Shoaib; Noor, Humera
2009-04-01
The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.
The Opening of the Arctic: Establishing a New Security Perimeter for the United States
2013-02-14
Eastern oil is projected to come to an end by 2032. British Petroleum, in its annual energy outlook, predicts growth in biofuel supplies and...Inclination angles for GPS and Galileo satellites are 55 and 56 degrees respectively while GLONASS inclination angles are marginally better at 65
Integrated multisensor perimeter detection systems
NASA Astrophysics Data System (ADS)
Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.
2007-10-01
The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.
Heidelberg edge perimeter employment in glaucoma diagnosis--preliminary report.
Mulak, Małgorzata; Szumny, Dorota; Sieja-Bujewska, Anna; Kubrak, Magdalena
2012-01-01
In recent years, the authors have seen huge progress in the diagnosis of eye diseases. One of the new diagnostic devices is HEP (Heidelberg Edge Perimeter) - for early diagnosis of glaucoma and its progression. It combines visual field test and HRT (Heidelberg Retina Tomograph), which allows authors to obtain the image of the mutual relation between the structure and the function of the sight organ. It could be also used to assess patients with impaired retina, optic nerve and neurological deficits. The SAP function is more suitable for the detection and monitoring of neurological deficits, moderately advanced and advanced glaucoma as well as other diseases associated with extensive or deep visual field deficits, such as ischemic optic neuropathy. FDF stimulus was designed specifically to detect early glaucoma-related changes in the visual field. For about a year, the Ophthalmology Clinic in Wrocław has owned a new, unique HEP perimeter. The authors present examples of patients diagnosed and treated at the Clinic, with respect to whom the perimeter results obtained using Octopus type perimeter and HEP contour perimeter have been compared. This method has its advantages: it is non-invasive, objective, provides the opportunity to repeat and compare results obtained from subsequent tests. The disadvantages are the difficulty in adapting to a new stimulus, which is not a circular light stimulus, but an outline that is hard to notice for some patients. Although according to the manufacturer the testing time should not exceed 4-5 minutes, it takes 14-15 minutes in many patients. The test is not suitable for patients showing lower manual skills and less attention and those who tire out easily. The HEP perimeter is an innovative method for diagnosing the earliest changes in ganglion cells, that is pre-perimetric glaucoma, or when changes in the visual field are undetectable in a standard test.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
..., if applicable; Date and time of entry and departure; Drivers license and other form of identification information; License plate number and state of issuance; Make and model of vehicle; Reports, files, records... name and phone number. Headquarters employees and contractors can also provide a drivers license as...
Simone Blair; Matt Campbell; Tom Lowe; Claire Campbell
2011-01-01
This paper explores the parallels that frequently exist in fire management organizations between operational approaches to fire and engagement approaches in the community. We observe that community issues are often treated in the same way as a fire incident—"controlled" and "contained" through education and "direct attack"...
Crystallography of rare galactic honeycomb structure near supernova 1987a
NASA Technical Reports Server (NTRS)
Noever, David A.
1994-01-01
Near supernova 1987a, the rare honeycomb structure of 20-30 galactic bubbles measures 30 x 90 light years. Its remarkable regularity in bubble size suggests a single-event origin which may correlate with the nearby supernova. To test the honeycomb's regularity in shape and size, the formalism of statistical crystallography is developed here for bubble sideness. The standard size-shape relations (Lewis's law, Desch's law, and Aboav-Weaire's law) govern area, perimeter and nearest neighbor shapes. Taken together, they predict a highly non-equilibrium structure for the galactic honeycomb which evolves as a bimodal shape distribution without dominant bubble perimeter energy.
[New visual field testing possibilities (a preliminary report)].
Erichev, V P; Ermolaev, A P; Antonov, A A; Grigoryan, G L; Kosova, D V
2018-01-01
There are currently no portable mobile perimeters that allow visual field testing outside ophthalmologist's examination rooms. To develop a mobile perimetry technique based on use of a virtual reality headset (VR). The study involved 26 patients (30 eyes) with II-III stage primary open-angle glaucoma (POAG) with compensated IOP. Perimetry was performed for each patient twice - on Humphrey analyzer (test 30-2, 76 points) and employing similar strategy on a perimeter integrated into VR headset (Total Vision, Russia). Visual field testing was performed with an interval from 1 hour to 3 days. The results were comparatively analyzed. Patients tolerated the examination well. Comparative analysis of preliminary perimetry results obtained with both methods showed high degree of identity, so the results were concluded to be comparable. By visually isolating the wearer, VR headset achieves elimination of distractions and stable light conditions for visual field testing. The headset-perimeter is compact, mobile, easily transportable, can be used in the work of visiting medical teams and for examination at home.
2012-11-01
the most common. Japanese honeysuckle and Chinese tallow are limited to are- as along the fence line, and mimosa was only found in two locations at the...HAWKINSVILLE AFSSS Scientific Name Common Name Albizia julibrissin* mimosa Ampelopsis arborea peppervine Andropogon virginicus broomsedge bluestem
14 CFR 151.95 - Fences; distance markers; navigational and landing aids; and offsite work.
Code of Federal Regulations, 2014 CFR
2014-01-01
... or perimeter fences for security purposes are eligible for inclusion in a project. (b) A blast fence is eligible for inclusion in a project whenever— (1) It is necessary for safety at a runway end or a... distance markers for inclusion in a project is decided on a case-by-case basis. (d) The relocation of...
14 CFR 151.95 - Fences; distance markers; navigational and landing aids; and offsite work.
Code of Federal Regulations, 2012 CFR
2012-01-01
... or perimeter fences for security purposes are eligible for inclusion in a project. (b) A blast fence is eligible for inclusion in a project whenever— (1) It is necessary for safety at a runway end or a... distance markers for inclusion in a project is decided on a case-by-case basis. (d) The relocation of...
14 CFR 151.95 - Fences; distance markers; navigational and landing aids; and offsite work.
Code of Federal Regulations, 2013 CFR
2013-01-01
... or perimeter fences for security purposes are eligible for inclusion in a project. (b) A blast fence is eligible for inclusion in a project whenever— (1) It is necessary for safety at a runway end or a... distance markers for inclusion in a project is decided on a case-by-case basis. (d) The relocation of...
14 CFR 151.95 - Fences; distance markers; navigational and landing aids; and offsite work.
Code of Federal Regulations, 2010 CFR
2010-01-01
... or perimeter fences for security purposes are eligible for inclusion in a project. (b) A blast fence is eligible for inclusion in a project whenever— (1) It is necessary for safety at a runway end or a... distance markers for inclusion in a project is decided on a case-by-case basis. (d) The relocation of...
2016-02-11
directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http
Leydhecker, W
1983-06-01
The possible applications of computer-assisted static perimetry are examined after five years of personal controlled studies of different types of computerized perimeters. The common advantage of all computer-assisted perimeters is the elimination of the influence of the perimetrist on the results. However, some perimeters are fully computer-assisted and some are only partially so. Even after complete elimination of the perimetrist's influence, some physiological and psychological influences remain due to the patient and will cause fluctuations of the results. In perimeters, the density of the grid and the adaptive strategy of exact threshold measurement are important in obtaining reproducible results. A compromise between duration of the test and exactness has to be found. The most acceptable compromise seems to be an uneven distribution of stimuli, which form a denser grid in areas of special interest and a wider grid in areas less likely to be involved, combined with exact threshold measurements only in suspicious areas. Multiple stimulus presentation is not adequate. High sensitivity of screening is not a great advantage, unless combined with a high specificity. We have shown that using the same stimulus luminosity for center and periphery (a nonadaptive strategy) produces nonspecific results. Only an adaptive strategy can result in high sensitivity and specificity. Adaptive strategy means that the luminosity of the stimulus is adapted to the individual threshold curve of the visual field. In addition, the exact individual thresholds are bracketed by small up and down steps of variation in luminosity. In some cases, scanning programs with two levels of adaptation can be sufficient. The user of modern perimeters must understand such terms as: asb, dB, presentation time, and diameter of stimuli. Projection of stimuli is preferred to light emitting diodes or glass fiber optics. The programs (software) of the modern instruments are of the greatest importance, because the clinical experience that the perimetrist had to acquire in previous manual perimetry is incorporated in these programs. In the Octopus perimeter a delta program is available that differentiates patient fluctuations that may be insignificant from directed significant alterations of the field which might require alteration of therapy. The programs are listed for different computer-assisted perimeters, and their choice is described. The costs of the perimeters are also given. Many controlled clinical studies are quoted briefly where they are useful for understanding the discussion. A brief chapter deals with the reliability of the perimetric test.(ABSTRACT TRUNCATED AT 400 WORDS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
Nuclear reactor alignment plate configuration
Altman, David A; Forsyth, David R; Smith, Richard E; Singleton, Norman R
2014-01-28
An alignment plate that is attached to a core barrel of a pressurized water reactor and fits within slots within a top plate of a lower core shroud and upper core plate to maintain lateral alignment of the reactor internals. The alignment plate is connected to the core barrel through two vertically-spaced dowel pins that extend from the outside surface of the core barrel through a reinforcement pad and into corresponding holes in the alignment plate. Additionally, threaded fasteners are inserted around the perimeter of the reinforcement pad and into the alignment plate to further secure the alignment plate to the core barrel. A fillet weld also is deposited around the perimeter of the reinforcement pad. To accomodate thermal growth between the alignment plate and the core barrel, a gap is left above, below and at both sides of one of the dowel pins in the alignment plate holes through with the dowel pins pass.
Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases
2015-12-01
however, additional sensors utilizing modern technology and a self -forming, as well as self - healing , network could further diminish attacks against...Space SSDF Ship’s Self -Defense Force UAV Unmanned Aerial Vehicle UGS Unattended Ground Sensor USB Universal Serial Bus USMC United States Marine...conditions may delay their reaction resulting in the attacking surface craft entering into a critically close position. The Ship’s Self -Defense
Laser Imaging Video Camera Sees Through Fire, Fog, Smoke
NASA Technical Reports Server (NTRS)
2015-01-01
Under a series of SBIR contracts with Langley Research Center, inventor Richard Billmers refined a prototype for a laser imaging camera capable of seeing through fire, fog, smoke, and other obscurants. Now, Canton, Ohio-based Laser Imaging through Obscurants (LITO) Technologies Inc. is demonstrating the technology as a perimeter security system at Glenn Research Center and planning its future use in aviation, shipping, emergency response, and other fields.
Perimeter Security and Intruder Detection Using Gravity Gradiometry: A Feasibility Study
2011-03-24
design, build, and operate, and it is usually not feasible to integrate new technology into an already existing system. So far, however, the...gravitational gradients is not a new concept and has been applied across a variety of industries. The first device for gravity gradient measurement was the...which generates a new simulated GGI reading. The program loops for a set number of iterations, and then ends by calculating algorithm performance
Starshade mechanical design for the Habitable Exoplanet imaging mission concept (HabEx)
NASA Astrophysics Data System (ADS)
Arya, Manan; Webb, David; McGown, James; Lisman, P. Douglas; Shaklan, Stuart; Bradford, S. Case; Steeves, John; Hilgemann, Evan; Trease, Brian; Thomson, Mark; Warwick, Steve; Freebury, Gregg; Gull, Jamie
2017-09-01
An external occulter for starlight suppression - a starshade - flying in formation with the Habitable Exoplanet Imaging Mission Concept (HabEx) space telescope could enable the direct imaging and spectrographic characterization of Earthlike exoplanets in the habitable zone. This starshade is flown between the telescope and the star, and suppresses stellar light sufficiently to allow the imaging of the faint reflected light of the planet. This paper presents a mechanical architecture for this occulter, which must stow in a 5 m-diameter launch fairing and then deploy to about a 80 m-diameter structure. The optical performance of the starshade requires that the edge profile is accurate and stable. The stowage and deployment of the starshade to meet these requirements present unique challenges that are addressed in this proposed architecture. The mechanical architecture consists of a number of petals attached to a deployable perimeter truss, which is connected to central hub using tensioned spokes. The petals are furled around the stowed perimeter truss for launch. Herein is described a mechanical design solution that supports an 80 m-class starshade for flight as part of HabEx.
A cost effective FBG-based security fence with fire alarm function
NASA Astrophysics Data System (ADS)
Wu, H. J.; Li, S. S.; Lu, X. L.; Wu, Y.; Rao, Y. J.
2012-02-01
Fiber Bragg Grating (FBG) is sensitive to the temperature as well when it is measuring the strain change, which is always avoided in most measurement applications. However, in this paper strain/temperature dual sensitivity is utilized to construct a special security fence with a second function of fire threat prediction. In an FBG-based fiber fence configuration, only by characteristics analysis and identification method, it can intelligently distinguish the different effects of personal threats and fires from their different trends of the wavelength drifts. Thus without any additional temperature sensing fittings or other fire alarm systems integrated, a normal perimeter security system can possess a second function of fire prediction, which can not only monitor the intrusion induced by personal actions but also predict fire threats in advance. The experimental results show the effectiveness of the method.
Nuclear Weapons and Coercive Escalation in Regional Conflicts: Lessons from North Korea and Pakistan
2014-11-01
brinkmanship relies on apparently suicidal and self-destructive tactics. Pakistan is often described as a country that “negotiates with a gun to its own...On 13 December 2001, five militants armed with plastic explosives, suicide vests, assault rifles, and grenades infiltrated the secure perimeter...is true, it is possible that the temptation to engage in coercive escalation will become tempered over time as relatively new nuclear powers come to
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
1985-07-01
appearing targets. Soldiers with keen sight and hearing can be used for perimeter security, especially at night. Can anyone think of other...you are go- ing to hear next. Not all suggestions for improvement will be valid, worthwhile suggestions. Sometimes, it seems like it’s basic human...want to hear what (designate a person or persons) thinks." 5. Draw out the reluctant participant by addressing some questions (perhaps a lead
2005-10-03
barbed wire boundary fence was built in 1957. The 1957 fence was considered adequate until1989, when it was replaced by new barbed wire on metal T ... inclusion on the NRHP; however~ it will not be affected by the Proposed Action and no further work is warranted. Four other sites in the project area...in significant effects, it is also reasonable to expect that the inclusion of smaller additional projects would result in no major change to the
Computer modelling of grain microstructure in three dimensions
NASA Astrophysics Data System (ADS)
Narayan, K. Lakshmi
We present a program that generates the two-dimensional micrographs of a three dimensional grain microstructure. The code utilizes a novel scanning, pixel mapping technique to secure statistical distributions of surface areas, grain sizes, aspect ratios, perimeters, number of nearest neighbors and volumes of the randomly nucleated particles. The program can be used for comparing the existing theories of grain growth, and interpretation of two-dimensional microstructure of three-dimensional samples. Special features have been included to minimize the computation time and resource requirements.
NASA Astrophysics Data System (ADS)
Bekele Fayisa, Gabisa; Lee, Jong Won; Kim, Jungsub; Kim, Yong-Il; Park, Youngsoo; Kim, Jong Kyu
2017-09-01
An effective approach to overcome inherently poor light extraction efficiency of AlGaN-based deep ultraviolet (DUV) light-emitting diodes (LEDs) is presented. We demonstrated the 5 × 5 array micro-ring DUV LED having an inclined sidewall at the outer perimeter and a p-GaN-removed inner circle of the micro-ring, together with MgF2/Al omnidirectional reflectors. The micro-ring array DUV LED shows remarkably higher light output power by 70% than the reference, consistent with the calculated result, as well as comparable turn-on and operational voltages, which are attributed to the effective extraction of strong transverse-magnetic polarized anisotropic emission and the reduction of the absorption loss by the p-GaN contact layer, simultaneously.
33. Perimeter acquisition radar building room #320, perimeter acquisition radar ...
33. Perimeter acquisition radar building room #320, perimeter acquisition radar operations center (PAROC), contains the tactical command and control group equipment required to control the par site. Showing spacetrack monitor console - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Analysis of DFW Perimeter Taxiway Operations
NASA Technical Reports Server (NTRS)
Engelland, Shawn A.; Ruszkowski, Louise Morgan
2010-01-01
This study examines operations of the perimeter taxiway system at Dallas/Fort Worth International Airport (DFW) to characterize and understand the impact of the perimeter taxiway system and to provide operational decision makers with guidance on use of this new airport resource. DFW s perimeter taxiway entered service in December 2008 and is representative of perimeter or end-around taxiways currently in use at several other airports worldwide. This perimeter taxiway analysis is a collaborative effort between NASA and various DFW stakeholders including the FAA, air carriers and the airport operator. The initial investigation has focused on quantifying perimeter taxiway usage and assessing effects on taxi times at both the local and global levels. Local-level results show taxi times via the perimeter taxiway to be about forty-five seconds longer on average, but with significantly less variability. Global-level results show average perimeter taxiway times to be a little more than one minute longer with variability that is comparable to that for other taxi paths.
Mo, Shelley; Krawitz, Brian; Efstathiadis, Eleni; Geyman, Lawrence; Weitz, Rishard; Chui, Toco Y P; Carroll, Joseph; Dubra, Alfredo; Rosen, Richard B
2016-07-01
To compare the use of optical coherence tomography angiography (OCTA) and adaptive optics scanning light ophthalmoscope fluorescein angiography (AOSLO FA) for characterizing the foveal microvasculature in healthy and vasculopathic eyes. Four healthy controls and 11 vasculopathic patients (4 diabetic retinopathy, 4 retinal vein occlusion, and 3 sickle cell retinopathy) were imaged with OCTA and AOSLO FA. Foveal perfusion maps were semiautomatically skeletonized for quantitative analysis, which included foveal avascular zone (FAZ) metrics (area, perimeter, acircularity index) and vessel density in three concentric annular regions of interest. On each set of OCTA and AOSLO FA images, matching vessel segments were used for lumen diameter measurement. Qualitative image comparisons were performed by visual identification of microaneurysms, vessel loops, leakage, and vessel segments. Adaptive optics scanning light ophthalmoscope FA and OCTA showed no statistically significant differences in FAZ perimeter, acircularity index, and vessel densities. Foveal avascular zone area, however, showed a small but statistically significant difference of 1.8% (P = 0.004). Lumen diameter was significantly larger on OCTA (mean difference 5.7 μm, P < 0.001). Microaneurysms, fine structure of vessel loops, leakage, and some vessel segments were visible on AOSLO FA but not OCTA, while blood vessels obscured by leakage were visible only on OCTA. Optical coherence tomography angiography is comparable to AOSLO FA at imaging the foveal microvasculature except for differences in FAZ area, lumen diameter, and some qualitative features. These results, together with its ease of use, short acquisition time, and avoidance of potentially phototoxic blue light, support OCTA as a tool for monitoring ocular pathology and detecting early disease.
Energy-efficient skylight structure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dame, J.V.
1988-03-29
This patent describes an energy-efficient skylight structure for attaching to a ceiling having a hole therein. The structure includes a roof membrane of light translucent material. The improvement comprises: a framework being larger in size than the hole in the ceiling, the framework adapted to receive a light-diffusing panel; means for attaching the framework over the hole in the ceiling to support beams for the ceiling; gasket means between the framework and the ceiling for sealing the framework to the ceiling around the hole; a light-diffusing panel held by the framework; sealing means between the light-diffusing panel and the frameworkmore » for sealing the perimeter of the light diffusing panel to the framework; and a light-channeling means attached at one end to the ceiling around the opening on the side opposite the framework and at the other end around the light translucent material of the roof membrane.« less
Morphological evolution of protective works by Genetic Algorithms: An application to Mt Etna
NASA Astrophysics Data System (ADS)
Marocco, Davide; Spataro, William; D'Ambrosio, Donato; Filippone, Giuseppe; Rongo, Rocco; Iovine, Giulio; Neri, Marco
2013-04-01
The hazard induced by dangerous flow-type phenomena - e.g. lava flows, earth flows, debris flows, and debris avalanches - has increased in recent years due to continuous urbanization. In many cases, the numerical simulation of hypothetical events can help to forecast the flow path in advance and therefore give indications about the areas that can be considered for the construction of protective works - e.g. earth barriers or channels. In this way, urbanized areas, as well as cultural heritage sites or even important infrastructures, can be protected by diverting the flow towards lower interest regions. Here, we have considered the numerical Cellular Automata model Sciara-fv2 for simulating lava flows at Mt Etna and Genetic Algorithms for optimizing the position, orientation and extension of an earth barrier built to protect the Rifugio Sapienza, a well-known touristic facility located near the summit of the volcano. The Rifugio Sapienza area was in fact interested by a lava flow in 2003, which destroyed a Service Center, a parking area and a Cafeteria. In this study, a perimeter was devised around the Rifugio (i.e., security perimeter), which delimitates the area that has to be protected by the flow. Furthermore, another perimeter was devised (i.e., work perimeter), specifying the area in which the earth barrier can be located. The barrier is specified by three parameters, namely the two geographic coordinates of the vertex and the height. In fact, in this preliminary analysis the barrier was modeled as a segment (in plant) having a constant height. Though preliminary, the study has produced extremely positive results. Among different alternatives generated by the genetic algorithm, an interesting scenario consists of a 35 meters barrier high solution, which completely deviates the flow avoiding that the lava reaches the inhabited area. The relative elevated height of the barrier is high due to the fact that the crater is located close to the area to be protected and, consequently, the lava rate is very high.
Defense AT And L Magazine. Vol. 47, No. 1, January February 2018
2018-01-01
available for em - ployees at all levels to engage with DoD personnel in a non- competitive, structured educational environment. Miscom- munication can...medical, fire, bomb , cyber attack, bio/ chem/rad) • Kidnap/ransom • Infrastructure • Power redundancy • Facilities hardening • Perimeter security...aly sis Th rea ts/ Ha za rd s Ris k i de nt ic ati on Mi tig ati on Em erg en cy op era tio ns Fu nc tio na l re sp on sib ilit ies Cr itic al fun
2012-11-01
miles east of Texarkana , Arkansas in Lafayette County (see Figure 1). The Installation is comprised of approximately 79 acres of government-owned land...34’ f ~ • c COifl’lty Cl 8 l ARKANSAS _ Texarkana T* "’ " , . TOt t.•f•)’•tl• tO Ad " . N ~ " ..,:;;. .. . ~ . ; f J " . 0...tainment for the criteria pollutant. Lafayette County is located in the Shreveport- Texarkana -Tyler Interstate Air Quality Control Region. Red
Roha, T A
1985-04-01
A federal appeals court recently ruled that a member of a Catholic religious institute assigned by her superiors to serve with a county hospital was subject to Social Security withholding on earnings from that service. Consequently, Catholic institute members will have Social Security taxes withheld whenever they serve with an entity not associated with the Church, that is, any entity not listed in the Official Catholic Directory. The ruling hinges on the contention that the sister could not have been "required" by her superiors to serve with the county hospital, since the hospital had final authority to determine who its employees would be, and that she thereby failed to qualify for the exception to Social Security withholding in Internal Revenue Code section 3121(b)(8)(A) for members of religious institutes performing service "'required" by their superiors. Because virtually all employers have this final authority, however, the appeals court's ruling leaves in doubt the perimeters of the exception to Social Security withholding in section 3121(b)(8)(A).
Smart sensing surveillance system
NASA Astrophysics Data System (ADS)
Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen
2010-04-01
Unattended ground sensor (UGS) networks have been widely used in remote battlefield and other tactical applications over the last few decades due to the advances of the digital signal processing. The UGS network can be applied in a variety of areas including border surveillance, special force operations, perimeter and building protection, target acquisition, situational awareness, and force protection. In this paper, a highly-distributed, fault-tolerant, and energyefficient Smart Sensing Surveillance System (S4) is presented to efficiently provide 24/7 and all weather security operation in a situation management environment. The S4 is composed of a number of distributed nodes to collect, process, and disseminate heterogeneous sensor data. Nearly all S4 nodes have passive sensors to provide rapid omnidirectional detection. In addition, Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR cameras are integrated to selected nodes to track the objects and capture associated imagery. These S4 camera-connected nodes will provide applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. In the S4, all the nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology, which can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The S4 utilizes a Service Oriented Architecture such that remote applications can interact with the S4 network and use the specific presentation methods. The S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments and near perimeters and borders. The S4 is compliant with Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE®) standards. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.
Vázquez-Martínez, José Luis; Gómez-Dantés, Héctor; Fernández-Cantón, Sonia
2006-01-01
To describe the prevalence and control of diabetes in the adult population served by the Instituto Mexicano del Seguro Social according to data from the National Health Survey 2000 (ENSA-2000). The data for adults from the National Health Survey 2000 was used to estimate and describe the prevalence of diabetes in the population that belongs to the social security system in Mexico. Criteria used to define diabetes mellitus were the medical diagnosis of the disease (MDDM) and the glucose measurement from capillary blood (>126 mg/dL fasting sample and 200 mg/dL in casual blood sample). If diabetes was confirmed only through blood sample, the diabetes case was define as survey finding (SF). Prevalences were estimated for both groups, while means and medians were estimated for the four possible combination groups (SF+, MDDM+, SF+, MDDM-, SF-, MDDM+, SF-, MDDM-). Sampling results were adjusted for population estimates according to the methods established in the ENSA-2000. Diabetes is described according to age, sex, education level, geographic region, background of diabetes in the family, body mass index (BMI), abdominal perimeter. A logistic regression method was used to estimate potential associations with different risk factors. Overall prevalence was 8.7%; for MDDM, it was 7.1%, and for SF, only 1.5%. Glycemia was highest in SF+ and MDDM-, median 292 mg/dL and in MDDM+ but SF-, median 289 mg/dL. Major risk factors were background of diabetes in both parents, abdominal obesity, low educational level age (coef. = 0.5943 per decade) and BMI (coef. = 0.0133). Diabetes in social security population is higher than in the rest of the population, while genetic background, age, educational level, high BMI and abdominal perimeter have important influences in diabetes prevalence in this population. Glucose control is suboptimal even in patients under medical supervision.
Application of infrared uncooled cameras in surveillance systems
NASA Astrophysics Data System (ADS)
Dulski, R.; Bareła, J.; Trzaskawka, P.; PiÄ tkowski, T.
2013-10-01
The recent necessity to protect military bases, convoys and patrols gave serious impact to the development of multisensor security systems for perimeter protection. One of the most important devices used in such systems are IR cameras. The paper discusses technical possibilities and limitations to use uncooled IR camera in a multi-sensor surveillance system for perimeter protection. Effective ranges of detection depend on the class of the sensor used and the observed scene itself. Application of IR camera increases the probability of intruder detection regardless of the time of day or weather conditions. It also simultaneously decreased the false alarm rate produced by the surveillance system. The role of IR cameras in the system was discussed as well as technical possibilities to detect human being. Comparison of commercially available IR cameras, capable to achieve desired ranges was done. The required spatial resolution for detection, recognition and identification was calculated. The simulation of detection ranges was done using a new model for predicting target acquisition performance which uses the Targeting Task Performance (TTP) metric. Like its predecessor, the Johnson criteria, the new model bounds the range performance with image quality. The scope of presented analysis is limited to the estimation of detection, recognition and identification ranges for typical thermal cameras with uncooled microbolometer focal plane arrays. This type of cameras is most widely used in security systems because of competitive price to performance ratio. Detection, recognition and identification range calculations were made, and the appropriate results for the devices with selected technical specifications were compared and discussed.
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
Golabek-Goldman, Michele
2016-01-01
Due to Israel's threat environment, Israeli hospitals have developed effective and innovative security preparations for responding to all-hazards incidents. Although Israeli hospital preparedness has been the subject of international praise and attention, there has been a dearth of research focused specifically on applying Israeli hospital security measures to the US hospital setting to augment emergency planning. This study examined practical and cost-effective lessons from the Israeli experience for improving US hospital security preparedness for a wide range of mass casualty incidents, both natural and man-made. Sixty semi-structured interviews were conducted with officials throughout Israel's and America's health, defense, and emergency response communities. Hospital preparedness was examined and disaster drills were evaluated in both countries, with San Francisco hospitals analyzed as a case study. Qualitative analysis was conducted and recommendations were made on the basis of an all-hazards approach to emergency preparedness. US hospitals examined in this study had not undertaken crucial preparations for managing the security consequences of a large-scale disaster. Recommendations from Israel included installing permanent emergency signage, improving security perimeter protocols and training, increasing defense against primary and secondary attacks, enhancing coordination with law enforcement, the National Guard, and other outside security agencies, and conducting more frequent and realistic lockdown exercises. A number of US hospitals have overlooked the important role of security in emergency preparedness. This study analyzed practical and cost-effective security recommendations from Israel to remedy this dangerous deficiency in some US hospitals' disaster planning.
An on-chip colloidal magneto-optical grating
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prikockis, M.; Wijesinghe, H.; Chen, A.
2016-04-18
Interacting nano- and micro-particles provide opportunities to create a wide range of useful colloidal and soft matter constructs. In this letter, we examine interacting superparamagnetic polymeric particles residing on designed permalloy (Ni{sub 0.8} Fe{sub 0.2}) shapes that are subject to weak time-orbiting magnetic fields. The precessing field and magnetic barriers that ensue along the outer perimeter of the shapes allow for containment concurrent with independent field-tunable ordering of the dipole-coupled particles. These remotely activated arrays with inter-particle spacing comparable to the wavelength of light yield microscopic on-chip surface gratings for beam steering and magnetically regulated light diffraction applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Eleanor S.; Thanachareonkit, Anothai; Touzani, Samir
The objective of this monitored field study was to identify near-term innovative façade technologies for solar control and daylighting with a goal of 20-40% energy use savings below Title 24 2013 in the 30-ft deep perimeter zone near vertical windows within cost and comfort constraints. The targeted market was new or existing commercial office buildings or buildings with similar patterns of use.
Stratul, S I; Didilescu, Andreea; Grigorie, Mihaela; Ianes, Emilia; Rusu, D; Nica, Luminiţa
2011-01-01
To evaluate the morphology of the root canal in its apical third and the capacity of the Thermafil System to reproduce the entire morphology of the cleaned and shaped root canal. Thirty-two roots of periodontally compromised teeth were prepared using the ProTaper System to an apical size 30 and filled with the Thermafil obturation technique and sealer. The roots were surgically amputated and prepared for metallographic evaluation by incremental reductions of 0.5 mm each, starting with the apical foramen. Photomicrographs of each section were taken at a magnification of 500x and 100x. The images were analyzed and processed. The position of the apical foramen with respect to the anatomical apex was identified and marked. Additional morphological details as lateral canals and recesses were also recorded. The cross-sectioned area of the canal and gutta-percha, the total perimeter, the shaped perimeter and the filled perimeter were recorded for each sample and the results were expressed as percentages. Multiple images of successive sections were used to create a 3D reconstruction of the apical anatomy of the tooth. The ANOVA test was performed to assess mean differences between evaluations of perimeters/areas at different levels. The anatomical apical foramen was found at the tip of the root in 50% of the evaluated samples. In the remaining samples, the foramen was located between 0.5 and 2.5 mm from the centre of the apex. Lateral canals, which opened in accessory foramens, were recorded in 25% of the evaluated samples. Statistical significant differences (p<0.05) were found between different levels of preparation and obturation. The complex morphology of the apical third of the root canal is satisfactory microstructurally replicated by the Thermafil System. Moreover, polarized light microscopy and the 3D reconstruction offered a discriminative vision of morphological details as lateral canals, recesses, the gutta-percha and debris.
21. Perimeter acquisition radar building room #200, electrical equipment room ...
21. Perimeter acquisition radar building room #200, electrical equipment room - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
35. Perimeter acquisition radar building room #325, showing hard disc ...
35. Perimeter acquisition radar building room #325, showing hard disc drive - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
NASA Astrophysics Data System (ADS)
Belanger, James Durham
Since the formation of the Transportation Security Administration (TSA) following the September 11, 2001 terrorist's attacks few studies involving commercial flight crewmember perceptions' of the organization's efficacy have been conducted, nor has there been any research into the effects on crewmember morale and professionalism resulting from their interactions with the TSA. This researcher surveyed 624 flight crewmembers, using a multiple-choice instrument to ascertain both their perceptions of TSA effectiveness involving an array of security issues, in addition to how crewmember interactions with the TSA may have affected their morale and professionalism. A 2-sample t-test measured the difference in the means of pilots and flight attendants regarding the study's scope, as did 2-way ANOVA and Tukey HSD comparisons, which factored in gender. The study found that crewmembers indicated some confidence in the areas of passenger and baggage screening and the Armed Pilot Program, with less confidence regarding ancillary personnel screening, airport perimeter security, and in both crewmember anti-terrorist training and human error issues. Statistical testing indicated varying differences in sample means concerning all study related issues. Finally, crewmembers indicated some effects on morale and professionalism, with a majority indicating a negative effect on both.
A decision framework for managing risk to airports from terrorist attack.
Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R
2015-02-01
This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.
Difference between manual and digital measurements of dental arches of orthodontic patients.
Jiménez-Gayosso, Sandra Isabel; Lara-Carrillo, Edith; López-González, Saraí; Medina-Solís, Carlo Eduardo; Scougall-Vilchis, Rogelio José; Hernández-Martínez, César Tadeo; Colomé-Ruiz, Gabriel Eduardo; Escoffié-Ramirez, Mauricio
2018-06-01
The objective of this study was to compare the differences between the measurements performed manually to those obtained using a digital model scanner of patients with orthodontic treatment.A cross-sectional study was performed in a sample of 30 study models from patients with permanent dentition who attended a university clinic between January 2010 and December 2015. For the digital measurement, a Maestro 3D Ortho Studio scanner (Italy) was used and Mitutoyo electronic Vernier calipers (Kawasaki, Japan) were used for manual measurement. The outcome variables were the measurements for maxillary intercanine width, mandibular intercanine width, maxillary intermolar width, mandibular intermolar width, overjet, overbite, maxillary arch perimeter, mandibular arch perimeter, and palate height. The independent variables, besides age and sex, were a series of arc characteristics. The Student t test, paired Student t test, and Pearson correlation in SPSS version 19 were used for the analysis.Of the models, 60% were from women. Two of nine measurements for pre-treatment and 6 of 9 measurements for post-treatment showed a difference. The variables that were different between the manual and digital measurements in the pre-treatment were maxillary intermolar width and palate height (P < .05). Post-treatment, differences were found in mandibular intercanine width, palate height, overjet, overbite, and maxillary and mandibular arch perimeter (P < .05).The models measured manually and digitally showed certain similarities for both vertical and transverse measurements. There are many advantages offered to the orthodontist, such as easy storage; savings in time and space; facilitating the reproducibility of information; and conferring the security of not deteriorating over time. Its main disadvantage is the cost.
5. View toward west, east face ("B" wall) of perimeter ...
5. View toward west, east face ("B" wall) of perimeter acquisition radar building - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
30. Perimeter acquisition radar building room #318, showing radar control. ...
30. Perimeter acquisition radar building room #318, showing radar control. Console and line printers - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Designing Security-Hardened Microkernels For Field Devices
NASA Astrophysics Data System (ADS)
Hieb, Jeffrey; Graham, James
Distributed control systems (DCSs) play an essential role in the operation of critical infrastructures. Perimeter field devices are important DCS components that measure physical process parameters and perform control actions. Modern field devices are vulnerable to cyber attacks due to their increased adoption of commodity technologies and that fact that control networks are no longer isolated. This paper describes an approach for creating security-hardened field devices using operating system microkernels that isolate vital field device operations from untrusted network-accessible applications. The approach, which is influenced by the MILS and Nizza architectures, is implemented in a prototype field device. Whereas, previous microkernel-based implementations have been plagued by poor inter-process communication (IPC) performance, the prototype exhibits an average IPC overhead for protected device calls of 64.59 μs. The overall performance of field devices is influenced by several factors; nevertheless, the observed IPC overhead is low enough to encourage the continued development of the prototype.
Geospatial Multi-Agency Coordination (GeoMAC) wildland fire perimeters, 2008
Walters, Sandra P.; Schneider, Norma J.; Guthrie, John D.
2011-01-01
The Geospatial Multi-Agency Coordination (GeoMAC) has been collecting and storing data on wildland fire perimeters since August 2000. The dataset presented via this U.S. Geological Survey Data Series product contains the GeoMAC wildland fire perimeter data for the calendar year 2008, which are based upon input from incident intelligence sources, Global Positioning System (GPS) data, and infrared (IR) imagery. Wildland fire perimeter data are obtained from the incidents, evaluated for completeness and accuracy, and processed to reflect consistent field names and attributes. After a quality check, the perimeters are loaded to GeoMAC databases, which support the GeoMAC Web application for access by wildland fire managers and the public. The wildland fire perimeters are viewed through the Web application. The data are subsequently archived according to year and state and are made available for downloading through the Internet in shapefile and Keyhole Markup Language (KML) format. These wildland fire perimeter data are also retained for historical, planning, and research purposes. The datasets that pertain to this report can be found on the Rocky Mountain Geographic Science Center HTTP site at http://rmgsc.cr.usgs.gov/outgoing/GeoMAC/historic_fire_data/. The links are also provided on the sidebar.
6. View toward southeast, northwest oblique of perimeter acquisition radar ...
6. View toward southeast, northwest oblique of perimeter acquisition radar building, with view of par power plant - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Thermacoustic piezoelectric generator
Keolian; Robert M. , Wuthrich; John W. , Bastyr; Kevin J.
2010-08-10
An electroactive transducer converts between acoustical power and electrical power. The transducer includes a diaphragm and a perimeter member. The perimeter member includes at least one electroactive element and is mechanically coupled to the perimeter of the diaphragm such that displacement of the diaphragm stresses the electroactive element.
Quadrilateral/hexahedral finite element mesh coarsening
Staten, Matthew L; Dewey, Mark W; Scott, Michael A; Benzley, Steven E
2012-10-16
A technique for coarsening a finite element mesh ("FEM") is described. This technique includes identifying a coarsening region within the FEM to be coarsened. Perimeter chords running along perimeter boundaries of the coarsening region are identified. The perimeter chords are redirected to create an adaptive chord separating the coarsening region from a remainder of the FEM. The adaptive chord runs through mesh elements residing along the perimeter boundaries of the coarsening region. The adaptive chord is then extracted to coarsen the FEM.
40. Perimeter acquisition radar building room #510B, chemical, biological, and ...
40. Perimeter acquisition radar building room #510B, chemical, biological, and radiological (CBR) air filter room no. 1 - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
20. Perimeter acquisition radar building room #105, shockisolated platform for ...
20. Perimeter acquisition radar building room #105, shock-isolated platform for chillers is easily seen on the right - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Design of LED fish lighting attractors using horizontal/vertical LIDC mapping method.
Shen, S C; Huang, H J
2012-11-19
This study employs a sub-module concept to develop high-brightness light-emitting diode (HB-LED) fishing light arrays to replace traditional fishing light attractors. The horizontal/vertical (H/V) plane light intensity distribution curve (LIDC) of a LED light source are mapped to assist in the design of a non-axisymmetric lens with a fish-attracting light pattern that illuminates sufficiently large areas and alternates between bright and dark. These LED fishing light attractors are capable of attracting schools of fish toward the perimeter of the luminous zone surrounding fishing boats. Three CT2 boats (10 to 20 ton capacity) were recruited to conduct a field test for 1 y on the sea off the southwestern coast of Taiwan. Field tests show that HB-LED fishing light array installed 5 m above the boat deck illuminated a sea surface of 5 × 12 m and achieved an illuminance of 2000 lx. The test results show that the HB-LED fishing light arrays increased the mean catch of the three boats by 5% to 27%. In addition, the experimental boats consumed 15% to 17% less fuel than their counterparts.
29. Perimeter acquisition radar building room #318, data processing system ...
29. Perimeter acquisition radar building room #318, data processing system area; data processor maintenance and operations center, showing data processing consoles - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
31. Perimeter acquisition radar building room #318, data storage "racks"; ...
31. Perimeter acquisition radar building room #318, data storage "racks"; sign read: M&D controller, logic control buffer, data transmission controller - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
3. Distant view toward east, west face of perimeter acquisition ...
3. Distant view toward east, west face of perimeter acquisition radar building with data link satellite dish on south side - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Comparison between Humphrey Field Analyzer and Micro Perimeter 1 in normal and glaucoma subjects.
Ratra, Vineet; Ratra, Dhanashree; Gupta, Muneeswar; Vaitheeswaran, K
2012-05-01
To determine the correlation between fundus perimetry with Micro Perimeter 1 (MP1) and conventional automated static threshold perimetry using the Humphrey Field Analyzer (HFA) in healthy individuals and in subjects with glaucoma. In this study, we enrolled 45 eyes with glaucoma and 21 eyes of age-matched, healthy individuals. All subjects underwent complete ophthalmic examination. Differential light sensitivity was measured at 21 corresponding points in a rectangular test grid in both MP1 and HFA. Similar examination settings were used with Goldmann III stimulus, stimulus presentation time of 200 ms, and white background illumination (1.27 cd/m(2)). Statistical analysis was done with the SPSS 14 using linear regression and independent t-test. The mean light thresholds of 21 matching points in control group with MP1 and HFA were 14.97 ± 2.64 dB and 30.90 ± 2.08 dB, respectively. In subjects with glaucoma, the mean values were MP1: 11.73 ± 4.36 dB and HFA: 27.96 ± 5.41 dB. Mean difference of light thresholds among the two instruments was 15.86 ± 3.25 dB in normal subjects (P < 0.001) and 16.22 ± 2.77 dB in glaucoma subjects (P < 0.001). Pearson correlation analysis of the HFA and MP1 results for each test point location in both cases and control subjects showed significant positive correlation (controls, r = 0.439, P = 0.047; glaucoma subjects, r = 0.812, P < 0.001). There was no difference between nasal and temporal points but a slight vertical asymmetry was observed with MP1. There are significant and reproducible differences in the differential light threshold in MP1 and HFA in both normal and glaucoma subjects. We found a correction factor of 17.271 for comparison of MP1 with HFA. MP1 appeared to be more sensitive in predicting loss in glaucoma.
39. Perimeter acquisition radar building room #504, techinal maintenance and ...
39. Perimeter acquisition radar building room #504, techinal maintenance and repair center (TMRC) and tactical support equipment (TSE) storage area; storage-travel wave tubes - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The 11.5-acre Summit National Liquid Disposal Service site is a former liquid waste disposal facility in rural Deerfield Township, Ohio. The site contains two ponds, an inactive incinerator, and several vacant buildings. Surrounding the site are several residences, two landfills, light industries, and farmland. From 1973 to 1978, Summit National operated a solvent recycling and waste disposal facility onsite. The Record of Decision (ROD) amends a 1988 ROD that provided for remediation of contaminated soil, sediment, debris, ground water, and surface water. In both the 1990 proposed remedy for the ROD amendment and the 1988 ROD, the remedy for themore » most highly contaminated soil and sediment is excavation and treatment. The amended remedial action for the site includes expanding site boundaries to include contaminated areas along the site perimeters; excavating and incinerating onsite 24,000 cubic yards of soil excavated to a depth of 2 feet, 4,000 cubic yards of sediment from the site perimeter, drainage ditches and offsite ponds, and 900 to 1,600 buried drums.« less
42. Perimeter acquisition radar building plaque, commemorating parransferral from U.S. ...
42. Perimeter acquisition radar building plaque, commemorating parransferral from U.S. Army ballistic missile defense organization to U.S. Air Force aerospace defense command (dated 1 October 1977) - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
ERIC Educational Resources Information Center
Carter, Chris
2010-01-01
Since teachers always teach area and perimeter together--and they are both introduced soon after the definition of a rectangle--it is not surprising that students mix up the notions of area and perimeter. Changing the investigation on maximising the area of a fixed perimeter from the traditional, but boring, "Sheep pens" to the much more…
19. Perimeter acquisition radar building room #105, sign reads: Three ...
19. Perimeter acquisition radar building room #105, sign reads: Three 660-ton trane chillers, each chiller can supply enough cooling for approximately 250 average air-conditioned homes - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
ERIC Educational Resources Information Center
Swanson, David
2011-01-01
We give elementary proofs of formulas for the area and perimeter of a planar convex body surrounded by a band of uniform thickness. The primary tool is a integral formula for the perimeter of a convex body which describes the perimeter in terms of the projections of the body onto lines in the plane.
Satgunam, PremNandhini; Datta, Sourav; Chillakala, Koteswararao; Bobbili, Karthik R; Joshi, Dhruv
2017-07-01
There are no commercially available devices to measure visual fields in infants. We developed a device, "Pediatric Perimeter," that quantifies visual field extent (VFE) for infants. We describe the construction, validation, and use of this device. A hemispherical dome with light emitting diodes (LEDs) was constructed. The LEDs were controlled using a computer program to measure reaction time (RT) to gross visual fields (GVF) and the VFE. Participants were tested in supine position in a dark room. Eye or head movement towards the stimuli was monitored with an infrared (IR) camera. Validation was done on 10 adults (mean age: 24.4 ± 5 years) with tunnel vision simulator. Perimetry was performed on 19 infants (age: 2.3-12 months), five infants with normal milestones. GVF and VFE were estimated in 17 and 7 infants, respectively. Median RT of infants with developmental delay was 663 ms and 380 ms for healthy infants. Also, 14 children (age: 14 months-6 years) with developmental delay and five patients with cognitive impairment were tested. Visual field isopter and RT can be examined with the Pediatric Perimeter device on infants and patients with special needs. Further testing on infants will need to assess the repeatability. A large-scale study will be needed to compare typically developing infants and infants with delayed milestones with this device. Quantifiable parameters obtained with this device can be used as outcome measures in clinical examination of infants and patients with special needs. This device can be used in pediatric, neurology, and ophthalmology clinics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schanfein, Mark J.; Mladineo, Stephen V.
2015-07-07
Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insidermore » who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.« less
Langemo, Diane; Spahn, James; Spahn, Thomas; Pinnamaneni, V. Chowdry
2015-01-01
ABSTRACT The study objective was to examine precision in wound measurement using a recently Food and Drug Administration-approved Scout (WoundVision, LLC, Indianapolis, Indiana) device to measure wound length (L) and width (W). Wound perimeter and a ruler measurement of L and W were also made. Images of 40 actual patient wounds were measured using the Scout device. All 3 techniques (length, width, perimeter) demonstrated acceptable within and between reader precision; however, the best precision was in wound perimeter measurement. PMID:25679463
Odor-baited trap trees: a novel management tool for plum curculio (Coleoptera: Curculionidae).
Leskey, Tracy C; Piñero, Jaime C; Prokopy, Ronald J
2008-08-01
The plum curculio, Conotrachelus nenuphar (Herbst) (Coleoptera: Curculionidae), one of the most important pests of apple (Malus spp.) in eastern and central North America, historically has been managed in New England apple orchards by three full block insecticide applications. Efforts to reduce insecticide inputs against plum curculio include perimeter row sprays, particularly after petal fall, to control immigrating adults. The odor-baited trap tree approach represents a new reduced input strategy for managing plum curculio based on the application of insecticides to a few perimeter-row trap trees rather than the entire perimeter row or full orchard block. Here, we compared the efficacy of a trap tree approach with perimeter row treatments to manage populations after petal fall in commercial apple orchards in 2005 and 2006. Injury was significantly greater in trap trees compared with unbaited perimeter row treated trees in both years of the study. In 2005, heavy rains prevented growers from applying insecticide applications at regular intervals resulting in high injury in nearly all blocks regardless of type of management strategy. In 2006, both the trap-tree and perimeter-row treatments prevented penetration by immigrating populations and resulted in economically acceptable levels of injury. The trap tree management strategy resulted in a reduction of approximately 70% total trees being treated with insecticide compared with perimeter row sprays and 93% compared with standard full block sprays.
NASA Astrophysics Data System (ADS)
Ciurapiński, Wieslaw; Dulski, Rafal; Kastek, Mariusz; Szustakowski, Mieczyslaw; Bieszczad, Grzegorz; Życzkowski, Marek; Trzaskawka, Piotr; Piszczek, Marek
2009-09-01
The paper presents the concept of multispectral protection system for perimeter protection for stationary and moving objects. The system consists of active ground radar, thermal and visible cameras. The radar allows the system to locate potential intruders and to control an observation area for system cameras. The multisensor construction of the system ensures significant improvement of detection probability of intruder and reduction of false alarms. A final decision from system is worked out using image data. The method of data fusion used in the system has been presented. The system is working under control of FLIR Nexus system. The Nexus offers complete technology and components to create network-based, high-end integrated systems for security and surveillance applications. Based on unique "plug and play" architecture, system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provides high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering.
ERIC Educational Resources Information Center
Babai, Reuven; Nattiv, Laura; Stavy, Ruth
2016-01-01
Students' difficulties in mathematics and science may stem from interference of irrelevant salient variables. We focus on the comparison of perimeters task, in which area is the irrelevant salient variable. A previous fMRI brain-imaging study related to the comparison of perimeters task suggested that increasing the level of salience of the…
17. Perimeter acquisition radar building room #105, mechanical equipment room ...
17. Perimeter acquisition radar building room #105, mechanical equipment room no. 1; sign reads: Heat exchangers (shell and tube type). Provide precise temperature control of water for cooling critical electronic equipment - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
... Reconfiguration and Base Perimeter Fence Relocation in area A Wright-Patterson AF Base, Ohio, Final Environmental..., 2012, the United States Air Force signed the ROD for the Entry Control Reconfiguration and Base Perimeter Fence Relocation in Area A Wright-Patterson Air Force Base (WPAFB), Ohio Final Environmental...
NASA Astrophysics Data System (ADS)
Sheremet, V.; Genç, M.; Gheshlaghi, N.; Elçi, M.; Sheremet, N.; Aydınlı, A.; Altuntaş, I.; Ding, K.; Avrutin, V.; Özgür, Ü.; Morkoç, H.
2018-01-01
Enhancement of InGaN/GaN based light emitting diode performance with step graded electron injectors through a two-step passivation is reported. Perimeter passivation of LED dies with SiO2 immediately following ICP mesa etch in addition to conventional Si3N4 dielectric surface passivation leads to decrease in the reverse bias leakage current by a factor of two as well as a decrease in the shunt current under forward bias by an order of magnitude. Mitigation of the leakage currents owing to the two-step passivation leads to significant increase in the radiant intensity of LEDs by more than a factor of two compared to the conventional single step surface passivation. Further, micro-dome patterned surface of Si3N4 passivation layer allow enhanced light extraction from LEDs.
Visual field examination method using virtual reality glasses compared with the Humphrey perimeter.
Tsapakis, Stylianos; Papaconstantinou, Dimitrios; Diagourtas, Andreas; Droutsas, Konstantinos; Andreanos, Konstantinos; Moschos, Marilita M; Brouzas, Dimitrios
2017-01-01
To present a visual field examination method using virtual reality glasses and evaluate the reliability of the method by comparing the results with those of the Humphrey perimeter. Virtual reality glasses, a smartphone with a 6 inch display, and software that implements a fast-threshold 3 dB step staircase algorithm for the central 24° of visual field (52 points) were used to test 20 eyes of 10 patients, who were tested in a random and consecutive order as they appeared in our glaucoma department. The results were compared with those obtained from the same patients using the Humphrey perimeter. High correlation coefficient ( r =0.808, P <0.0001) was found between the virtual reality visual field test and the Humphrey perimeter visual field. Visual field examination results using virtual reality glasses have a high correlation with the Humphrey perimeter allowing the method to be suitable for probable clinical use.
16. Perimeter acquisition radar building room #102, electrical equipment room; ...
16. Perimeter acquisition radar building room #102, electrical equipment room; the prime power distribution system. Excellent example of endulum-types shock isolation. The grey cabinet and barrel assemble is part of the polychlorinated biphenyl (PCB) retrofill project - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
18. Perimeter acquisition radar building room #105, deionizers (filter tanks) ...
18. Perimeter acquisition radar building room #105, deionizers (filter tanks) for data processor cooling and ice backup; sign reads: Deionizer units provide high-purity water by removal of oxygen, and organic and mineral content from water - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
NASA Technical Reports Server (NTRS)
Neudeck, Philip G.
1998-01-01
Minority carrier lifetimes in epitaxial 4H-SiC p(+)-n junction diodes were measured via an analysis of reverse recovery switching characteristics. Behavior of reverse recovery storage time (t(s)) as a function of initial ON-state forward current (I(F)) and OFF-state reverse current (I(R)) followed well-documented trends which have been observed for decades in silicon p-n rectifiers. Average minority carrier (hole) lifetimes (tau(p)) calculated from plots of t(s) vs I(R)/I(F) strongly decreased with decreasing device area. Bulk and perimeter components of average hole lifetimes were separated by plotting 1/tau(p) as a function of device perimeter-to- area ratio (P/A). This plot reveals that perimeter recombination is dominant in these devices, whose areas are all less than 1 sq mm. The bulk minority carrier (hole) lifetime extracted from the 1/tau(p) vs P/A plot is approximately 0.7 micro-s, well above the 60 ns to 300 ns average iit'eptimes obtained when perimeter recombination effects are ignored in the analysis. Given the fact that there has been little previous investigation of bipolar diode and transistor performance as a function of perimeter-to-area ratio, this work raises the possibility that perimeter recombination may be partly responsible for poor effective minority carrier lifetimes and limited performance obtained in many previous SiC bipolar junction devices.
NASA Technical Reports Server (NTRS)
Neudeck, Philip G.
1998-01-01
Minority carrier lifetimes in epitaxial 4H-SiC p-n junction diodes were measured via an analysis of reverse recovery switching characteristics. Behavior of reverse recovery storage time (t(sub s)) as a function of initial ON-state forward current (I(sub f)) and OFF-state reverse current (I(sub R)) followed well-documented trends which have been observed for decades in silicon p-n rectifiers. Average minority carrier (hole) lifetimes (tau(sub p)) calculated from plots of t(sub s) vs I(sub R)/I(sub F) strongly decreased with decreasing device area. Bulk and perimeter components of average hole lifetimes were separated by plotting tau(sub p) as a function of device perimeter-to-area ratio (P/A). This plot reveals that perimeter recombination is dominant in these devices, whose areas are all less than 1 square mm. The bulk minority carrier (hole) lifetime extracted from the 1/Tau(sub p) vs P/A plot is approximately 0.7 microns, well above the 60 ns to 300 ns average lifetimes obtained when perimeter recombination effects are ignored in the analysis. Given the fact that there has been little previous investigation of bipolar diode and transistor performance as a function of perimeter-to-area ratio, this work raises the possibility that perimeter recombination may be partly responsible for poor effective minority carrier lifetimes and limited performance obtained in many previous SiC bipolar junction devices.
9. View southeast corner of perimeter acquisition radar power plant ...
9. View southeast corner of perimeter acquisition radar power plant room #214, control room; showing central monitoring station console in foreground. Well and booster control panel in left background and electric power management panel on far right - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Power Plant, In Limited Access Area, Southwest of PARB at end of Service Road B, Nekoma, Cavalier County, ND
2. View toward east, west face ("D" wall) of perimeter ...
2. View toward east, west face ("D" wall) of perimeter acquisition radar building with subterranean power plants diesel engine intake (the smaller column) and exhaust seen in foreground. Behind the globe is the very low frequency (VLP) antenna - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
41. Perimeter acquisition radar building radar element and coaxial display, ...
41. Perimeter acquisition radar building radar element and coaxial display, with drawing of typical antenna section. Drawing, from left to right, shows element, aluminum ground plane, cable connectors and hardware, cable, and back-up ring. Grey area is the concrete wall - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
7. Perimeter acquisition radar power plant room #202, battery equipment ...
7. Perimeter acquisition radar power plant room #202, battery equipment room; showing battery room (in background) and multiple source power converter (in foreground). The picture offers another look at the shock-isolation system developed for each platform - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Power Plant, In Limited Access Area, Southwest of PARB at end of Service Road B, Nekoma, Cavalier County, ND
8. Perimeter acquisition radar power plant room #211, battery equipment ...
8. Perimeter acquisition radar power plant room #211, battery equipment room; showing battery racks. The dc power of these batteries is distributed to motor-control centers, the annunciator system, and fire alarm and tripping circuits - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Power Plant, In Limited Access Area, Southwest of PARB at end of Service Road B, Nekoma, Cavalier County, ND
Shape-based human detection for threat assessment
NASA Astrophysics Data System (ADS)
Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.
2004-07-01
Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.
A COTS-MQS shipborne EO/IR imaging system
NASA Astrophysics Data System (ADS)
Hutchinson, Mark A.; Miller, John L.; Weaver, James
2005-05-01
The Sea Star SAFIRE is a commercially developed, off the shelf, military qualified system (COTS-MQS) consisting of a 640 by 480 InSb infrared imager, laser rangefinder and visible imager in a gyro-stabilized platform designed for shipborne applications. These applications include search and rescue, surveillance, fire control, fisheries patrol, harbor security, and own-vessel perimeter security and self protection. Particularly challenging considerations unique to shipborne systems include the demanding environment conditions, man-machine interfaces, and effects of atmospheric conditions on sensor performance. Shipborne environmental conditions requiring special attention include electromagnetic fields, as well as resistance to rain, ice and snow, shock, vibration, and salt. Features have been implemented to withstand exposure to water and high humidity; anti-ice/de-ice capability for exposure to snow and ice; wash/wipe of external windows; corrosion resistance for exposure to water and salt spray. A variety of system controller configurations provide man-machine interfaces suitable for operation on ships. EO sensor developments that address areas of haze penetration, glint, and scintillation will be presented.
Leveraging brightness from transportation lighting systems through light source color.
DOT National Transportation Integrated Search
2013-11-01
Roadway transportation lighting is installed for multiple reasons including traffic safety and pedestrian : security. Judgments of pedestrian safety and security along roadways are not strictly correlated to : specified light levels, but the color of...
Tracking and imaging humans on heterogeneous infrared sensor arrays for law enforcement applications
NASA Astrophysics Data System (ADS)
Feller, Steven D.; Zheng, Y.; Cull, Evan; Brady, David J.
2002-08-01
We present a plan for the integration of geometric constraints in the source, sensor and analysis levels of sensor networks. The goal of geometric analysis is to reduce the dimensionality and complexity of distributed sensor data analysis so as to achieve real-time recognition and response to significant events. Application scenarios include biometric tracking of individuals, counting and analysis of individuals in groups of humans and distributed sentient environments. We are particularly interested in using this approach to provide networks of low cost point detectors, such as infrared motion detectors, with complex imaging capabilities. By extending the capabilities of simple sensors, we expect to reduce the cost of perimeter and site security applications.
Fuel cell repeater unit including frame and separator plate
Yamanis, Jean; Hawkes, Justin R; Chiapetta, Jr., Louis; Bird, Connie E; Sun, Ellen Y; Croteau, Paul F
2013-11-05
An example fuel cell repeater includes a separator plate and a frame establishing at least a portion of a flow path that is operative to communicate fuel to or from at least one fuel cell held by the frame relative to the separator plate. The flow path has a perimeter and any fuel within the perimeter flow across the at least one fuel cell in a first direction. The separator plate, the frame, or both establish at least one conduit positioned outside the flow path perimeter. The conduit is outside of the flow path perimeter and is configured to direct flow in a second, different direction. The conduit is fluidly coupled with the flow path.
Three dimensional, multi-chip module
Bernhardt, A.F.; Petersen, R.W.
1993-08-31
A plurality of multi-chip modules are stacked and bonded around the perimeter by sold-bump bonds to adjacent modules on, for instance, three sides of the perimeter. The fourth side can be used for coolant distribution, for more interconnect structures, or other features, depending on particular design considerations of the chip set. The multi-chip modules comprise a circuit board, having a planarized interconnect structure formed on a first major surface, and integrated circuit chips bonded to the planarized interconnect surface. Around the periphery of each circuit board, long, narrow dummy chips'' are bonded to the finished circuit board to form a perimeter wall. The wall is higher than any of the chips on the circuit board, so that the flat back surface of the board above will only touch the perimeter wall. Module-to-module interconnect is laser-patterned on the sides of the boards and over the perimeter wall in the same way and at the same time that chip to board interconnect may be laser-patterned.
Three dimensional, multi-chip module
Bernhardt, Anthony F.; Petersen, Robert W.
1993-01-01
A plurality of multi-chip modules are stacked and bonded around the perimeter by sold-bump bonds to adjacent modules on, for instance, three sides of the perimeter. The fourth side can be used for coolant distribution, for more interconnect structures, or other features, depending on particular design considerations of the chip set. The multi-chip modules comprise a circuit board, having a planarized interconnect structure formed on a first major surface, and integrated circuit chips bonded to the planarized interconnect surface. Around the periphery of each circuit board, long, narrow "dummy chips" are bonded to the finished circuit board to form a perimeter wall. The wall is higher than any of the chips on the circuit board, so that the flat back surface of the board above will only touch the perimeter wall. Module-to-module interconnect is laser-patterned o the sides of the boards and over the perimeter wall in the same way and at the same time that chip to board interconnect may be laser-patterned.
Calculation of Latitude and Longitude for Points on Perimeter of a Circle on a Sphere
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morris, Heidi E.
2015-08-14
This document describes the calculation of the Earth-Centered Earth Fixed (ECEF) coordinates for points lying on the perimeter of a circle. Here, the perimeter of the circle lies on the surface of the sphere and the center of the planar circle is below the surface. These coordinates are converted to latitude and longitude for mapping fields on the surface of the earth.
1. View from south to north of perimeter acquisition radar ...
1. View from south to north of perimeter acquisition radar power plant diesel engine exhaust and the small engine intake. On the right is the ventilating air intake/exhaust, distinguishable by its square shape, whereas the diesel columns are rectangular - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Power Plant, In Limited Access Area, Southwest of PARB at end of Service Road B, Nekoma, Cavalier County, ND
25. Perimeter acquisition radar building room #2M4, (mezzanine), power supply ...
25. Perimeter acquisition radar building room #2M4, (mezzanine), power supply room; computer power supply on left and water flow on right. This room is directly below data processing area (room #318). Sign on right reads: High purity water digital rack - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Shahid, Fazal; Alam, Mohammad Khursheed; Khamis, Mohd Fadhli
2015-01-01
Objective: To investigate the maxillary and mandibular anterior crown width/height ratio and its relation to various arch perimeters, arch length, and arch width (intercanine, interpremolar, and intermolar) groups. Materials and Methods: The calculated sample size was 128 subjects. The crown width/height, arch length, arch perimeter, and arch width of the maxilla and mandible were obtained via digital calliper (Mitutoyo, Japan). A total of 4325 variables were measured. The sex differences in the crown width and height were evaluated. Analysis of variance was applied to evaluate the differences between arch length, arch perimeter, and arch width groups. Results: Males had significantly larger mean values for crown width and height than females (P ≤ 0.05) for maxillary and mandibular arches, both. There were no significant differences observed for the crown width/height ratio in various arch length, arch perimeter, and arch width (intercanine, interpremolar, and intermolar) groups (P ≤ 0.05) in maxilla and mandible, both. Conclusions: Our results indicate sexual disparities in the crown width and height. Crown width and height has no significant relation to various arch length, arch perimeter, and arch width groups of maxilla and mandible. Thus, it may be helpful for orthodontic and prosthodontic case investigations and comprehensive management. PMID:26929686
Winslow, Luke A.; Read, Jordan S.; Hanson, Paul C.; Stanley, Emily H.
2013-01-01
1. Quantifying lake biogeochemical processing at broad spatial scales requires that we scale processes along with physical metrics. Past work has primarily scaled lentic processes using estimates of lake surface area. However, many processes important to lakes, such as material, energy and biological fluxes and biogeochemical cycling, scale with lake perimeter. 2. We estimate the total lake perimeter for the contiguous United States (U.S.) and examine the sensitivity of this estimate to measurement resolution. At the original mapping resolution, lakes in the contiguous U.S. have a total perimeter of over 1.8 million km. 3. The change in measured perimeter versus measurement resolution for the contiguous U.S. had a log-log slope (also known as the fractal dimension) of 0.21, generally less than previously reported estimates. With changing observation resolution, total measured perimeter was most sensitive to the inclusion or exclusion of small lakes, not shoreline complexity. 4. The total aquatic–terrestrial interface in lakes is less than one-tenth that of streams and rivers, which collectively account for over 21 million km of shoreline in the contiguous U.S. This study further describes the distribution of lake perimeter and proposes a technique that can contribute to understanding continental-scale processes.
Photonic sensor opportunities for distributed and wireless systems in security applications
NASA Astrophysics Data System (ADS)
Krohn, David
2006-10-01
There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.
NASA Technical Reports Server (NTRS)
Leventis, Nicholas; Yang, Jinua; Fabrizio,Even F.; Rawashdeh, Abdel-Monem M.; Oh, Woon Su; Sotiriou-Leventis, Chariklia
2004-01-01
Dendrimers are self-repeating globular branched star molecules, whose fractal structure continues to fascinate, challenge, and inspire. Functional dendrimers may incorporate redox centers, and potential applications include antennae molecules for light harvesting, sensors, mediators, and artificial biomolecules. We report the synthesis and redox properties of four star systems incorporating the 4-benzoyl-N-alkylpyridinium cation; the redox potential varies along the branches but remains constant at fixed radii. Bulk electrolysis shows that at a semi-infinite time scale all redox centers are electrochemically accessible. However, voltammetric analysis (cyclic voltammetry and differential pulse voltammetry) shows that on1y two of the three redox-active centers in the perimeter are electrochemically accessible during potential sweeps as slow as 20 mV/s and as fast as 10 V/s. On the contrary, both redox centers along branches are accessible electrochemically within the same time frame. These results are explained in terms of slow through-space charge transfer and the globular 3-D folding of the molecules and are discussed in terms of their implications on the design of efficient redox functional dendrimers.
2. Perimeter acquisition radar power plant accessway 101, showing equipment ...
2. Perimeter acquisition radar power plant accessway 101, showing equipment blast lock #102 entrance for fire trucks and equipment. An underground structure at its origin, the 177-foot long accessway is above ground at its south end, terminating in the parking lot of service road B - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Power Plant, In Limited Access Area, Southwest of PARB at end of Service Road B, Nekoma, Cavalier County, ND
Canadian institute honours Hawking
NASA Astrophysics Data System (ADS)
Durrani, Matin
2009-11-01
The Perimeter Institute for Theoretical Physics in Waterloo, Canada, has announced that a major new extension to its campus will be known as the Stephen Hawking Centre. The extension, which is currently being built, is due to open in 2011 and will double the size of the institute. It will also provide a home for the institute's Masters students, the first of whom joined the Perimeter Institute this autumn as part of its Perimeter Scholars international programme.
Fiber-optic hydrophone array for acoustic surveillance in the littoral
NASA Astrophysics Data System (ADS)
Hill, David; Nash, Phillip
2005-05-01
We describe a fibre-optic hydrophone array system architecture that can be tailored to meet the underwater acoustic surveillance requirements of the military, counter terrorist and customs authorities in protecting ports and harbours, offshore production facilities or coastal approaches. Physically the fibre-optic hydrophone array is in the form of a lightweight cable, enabling rapid deployment from a small vessel. Based upon an optical architecture of time and wavelength multiplexed interferometric hydrophones, the array is comprised of a series of hydrophone sub-arrays. Using multiple sub-arrays, extended perimeters many tens of kilometres in length can be monitored. Interrogated via a long (~50km) optical fibre data link, the acoustic date is processed using the latest open architecture sonar processing platform, ensuring that acoustic targets below, on and above the surface are detected, tracked and classified. Results obtained from an at sea trial of a 96-channel hydrophone array are given, showing the passive detection and tracking of a diver, small surface craft and big ocean going ships beyond the horizon. Furthermore, we describe how the OptaMarine fibre-optic hydrophone array fits into an integrated multi-layered approach to port and harbour security consisting of active sonar for diver detection and hull imaging, as well as thermal imaging and CCTV for surface monitoring. Finally, we briefly describe a complimentary land perimeter intruder detection system consisting of an array of fibre optic accelerometers.
Thermal infrared panoramic imaging sensor
NASA Astrophysics Data System (ADS)
Gutin, Mikhail; Tsui, Eddy K.; Gutin, Olga; Wang, Xu-Ming; Gutin, Alexey
2006-05-01
Panoramic cameras offer true real-time, 360-degree coverage of the surrounding area, valuable for a variety of defense and security applications, including force protection, asset protection, asset control, security including port security, perimeter security, video surveillance, border control, airport security, coastguard operations, search and rescue, intrusion detection, and many others. Automatic detection, location, and tracking of targets outside protected area ensures maximum protection and at the same time reduces the workload on personnel, increases reliability and confidence of target detection, and enables both man-in-the-loop and fully automated system operation. Thermal imaging provides the benefits of all-weather, 24-hour day/night operation with no downtime. In addition, thermal signatures of different target types facilitate better classification, beyond the limits set by camera's spatial resolution. The useful range of catadioptric panoramic cameras is affected by their limited resolution. In many existing systems the resolution is optics-limited. Reflectors customarily used in catadioptric imagers introduce aberrations that may become significant at large camera apertures, such as required in low-light and thermal imaging. Advantages of panoramic imagers with high image resolution include increased area coverage with fewer cameras, instantaneous full horizon detection, location and tracking of multiple targets simultaneously, extended range, and others. The Automatic Panoramic Thermal Integrated Sensor (APTIS), being jointly developed by Applied Science Innovative, Inc. (ASI) and the Armament Research, Development and Engineering Center (ARDEC) combines the strengths of improved, high-resolution panoramic optics with thermal imaging in the 8 - 14 micron spectral range, leveraged by intelligent video processing for automated detection, location, and tracking of moving targets. The work in progress supports the Future Combat Systems (FCS) and the Intelligent Munitions Systems (IMS). The APTIS is anticipated to operate as an intelligent node in a wireless network of multifunctional nodes that work together to serve in a wide range of applications of homeland security, as well as serve the Army in tasks of improved situational awareness (SA) in defense and offensive operations, and as a sensor node in tactical Intelligence Surveillance Reconnaissance (ISR). The novel ViperView TM high-resolution panoramic thermal imager is the heart of the APTIS system. It features an aberration-corrected omnidirectional imager with small optics designed to match the resolution of a 640x480 pixels IR camera with improved image quality for longer range target detection, classification, and tracking. The same approach is applicable to panoramic cameras working in the visible spectral range. Other components of the ATPIS system include network communications, advanced power management, and wakeup capability. Recent developments include image processing, optical design being expanded into the visible spectral range, and wireless communications design. This paper describes the development status of the APTIS system.
This dataset represents the historical fire perimeters within individual local NHDPlusV2 catchments and upstream, contributing watersheds riparian buffers based on the GeoMAC (Geospatial Multi-Agency Coordination) mapping tool (See Supplementary Info for Glossary of Terms). Fire perimeters contain data as they are submitted by field offices to GeoMAC (Geospatial Multi-Agency Coordination) in a polygon format. Fire perimeter data is based on input from incident intelligence sources, GPS data, infrared (IR) imagery from fixed wing and satellite platforms. Polygons are selected by year and then converted into a binary raster format where values of 1 represent fire perimeters of the given year and 0 describes the remaining areas across the CONUS, leaving No Data to be anything outside the CONUS border. The wildland fire characteristics (% forest loss to fire) were summarized by year to produce local catchment-level and watershed-level metrics as a continuous data type (see Data Structure and Attribute Information for a description).
This dataset represents the historical fire perimeters within individual local NHDPlusV2 catchments and upstream, contributing watersheds based on the GeoMAC (Geospatial Multi-Agency Coordination) mapping tool (See Supplementary Info for Glossary of Terms). Fire perimeters contain data as they are submitted by field offices to GeoMAC (Geospatial Multi-Agency Coordination) in a polygon format. Fire perimeter data is based on input from incident intelligence sources, GPS data, infrared (IR) imagery from fixed wing and satellite platforms. Polygons are selected by year and then converted into a binary raster format where values of 1 represent fire perimeters of the given year and 0 describes the remaining areas across the CONUS, leaving No Data to be anything outside the CONUS border. The wildland fire characteristics (% forest loss to fire) were summarized by year to produce local catchment-level and watershed-level metrics as a continuous data type (see Data Structure and Attribute Information for a description).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rubinstein, Francis M.
Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.
Digital image processing of bone - Problems and potentials
NASA Technical Reports Server (NTRS)
Morey, E. R.; Wronski, T. J.
1980-01-01
The development of a digital image processing system for bone histomorphometry and fluorescent marker monitoring is discussed. The system in question is capable of making measurements of UV or light microscope features on a video screen with either video or computer-generated images, and comprises a microscope, low-light-level video camera, video digitizer and display terminal, color monitor, and PDP 11/34 computer. Capabilities demonstrated in the analysis of an undecalcified rat tibia include the measurement of perimeter and total bone area, and the generation of microscope images, false color images, digitized images and contoured images for further analysis. Software development will be based on an existing software library, specifically the mini-VICAR system developed at JPL. It is noted that the potentials of the system in terms of speed and reliability far exceed any problems associated with hardware and software development.
24 CFR 3285.307 - Perimeter support piers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... support piers. (a) Piers required at mate-line supports, perimeter piers, and piers at exterior wall openings are permitted to be constructed of single open-cell or closed-cell concrete blocks, with nominal...
NASA Astrophysics Data System (ADS)
Rogotis, Savvas; Palaskas, Christos; Ioannidis, Dimosthenis; Tzovaras, Dimitrios; Likothanassis, Spiros
2015-11-01
This work aims to present an extended framework for automatically recognizing suspicious activities in outdoor perimeter surveilling systems based on infrared video processing. By combining size-, speed-, and appearance-based features, like the local phase quantization and the histograms of oriented gradients, actions of small duration are recognized and used as input, along with spatial information, for modeling target activities using the theory of hidden conditional random fields (HCRFs). HCRFs are used to classify an observation sequence into the most appropriate activity label class, thus discriminating high-risk activities like trespassing from zero risk activities, such as loitering outside the perimeter. The effectiveness of this approach is demonstrated with experimental results in various scenarios that represent suspicious activities in perimeter surveillance systems.
Pontes, Andrezza Graziella Veríssimo; Gadelha, Diego; Freitas, Bernadete Maria Coêlho; Rigotto, Raquel Maria; Ferreira, Marcelo José Monteiro
2013-11-01
An analysis was made of irrigated perimeters as a geopolitical strategy for expanding Brazilian agricultural frontiers and the "development" of the northeastern semi-arid region with respect to social determinants in health in rural communities. Research was conducted in the Chapada do Apodi in the states of Ceará and Rio Grande do Norte between 2007 and 2011. Various research techniques and tools were adopted, such as research-action, ethnographic studies, questionnaires and laboratory exams, water contamination analyses, social cartography and focal groups. In the context of agribusiness expansion, it was revealed that public policies of irrigation have had consequences for health, labor and the environment with the implementation of the Jaguaribe-Apodi Irrigated Perimeter in Ceará. The social and environmental conflict and resistance in the phase prior to the installation of the Santa Cruz do Apodi Irrigated Perimeter in Rio Grande do Norte was significant as it had consequences for the health-disease process on rural communities. It is important for the evaluation of public irrigation policies to consider the impacts of the perimeters on the lifestyle, labor, health and the environment of the affected territories.
Zuha, R M; Supriyani, M; Omar, B
2008-04-01
Analysis on fly artifacts produced by forensically important blowfly, Chrysomya megacephala (Fabricius) (Diptera:Calliphoridae), revealed several unique patterns. They can be divided into fecal spots, regurgitation spots and swiping stains. The characteristics of fecal spots are round with three distinct levels of pigmentation; creamy, brownish and darkly pigmented. Matrix of the spots appears cloudy. The round spots are symmetrical and non-symmetrical, delineated by irregular and darker perimeter which only visible in fairly colored fecal spots. Diameter of these artifacts ranged from 0.5 mm to 4 mm. Vomit or regurgitation spots are determined by the presence of craters due to sucking activity of blowflies and surrounded by thickly raised and darker colored perimeter. The size of these specks ranged from 1 mm to 2 mm. Matrix of the spots displays irregular surface and reflective under auxiliary microscope light. Swiping stains due to defecation by flies consists of two distinguishable segments, the body and tail. It can be seen as a tear drop-like, sperm-like, snake-like and irregular tadpole-like stain. The direction of body and tail is inconsistent and length ranged between 4.8 mm to 9.2 mm. A finding that should be highlighted in this observation is the presence of crater on tadpole-like swiping stain which is apparent by its raised border characteristic and reflective under auxiliary microscope light. The directionality of this darkly brown stain is random. This unique mix of regurgitation and swiping stain has never been reported before. Highlighting the features of artifacts produced by flies would hopefully add our understanding in differentiating them from blood spatters produced from victims at crime scenes.
Sayed, Ramy K A; de Leonardis, Erika Chacin; Guerrero-Martínez, José A; Rahim, Ibtissem; Mokhtar, Doaa M; Saleh, Abdelmohaimen M; Abdalla, Kamal E H; Pozo, María J; Escames, Germaine; López, Luis C; Acuña-Castroviejo, Darío
2016-10-01
The gastrocnemius muscle (GM) of young (3months) and aged (12months) female wild-type C57/BL6 mice was examined by light and electron microscopy, looking for the presence of structural changes at early stage of the aging process. Morphometrical parameters including body and gastrocnemius weights, number and type of muscle fibers, cross section area (CSA), perimeter, and Feret's diameter of single muscle fiber, were measured. Moreover, lengths of the sarcomere, A-band, I-band, H-zone, and number and CSA of intermyofibrillar mitochondria (IFM), were also determined. The results provide evidence that 12month-old mice had significant changes on skeletal muscle structure, beginning with the reduction of gastrocnemius weight to body weight ratio, compatible with an early loss of skeletal muscle function and strength. Moreover, light microscopy revealed increased muscle fibers size, with a significant increase on their CSA, perimeter, and diameter of both type I and type II muscle fibers, and a reduction in the percentage of muscle area occupied by type II fibers. Enhanced connective tissue infiltrations, and the presence of centrally nucleated muscle fibers, were also found in aged mice. These changes may underlie an attempt to compensate the loss of muscle mass and muscle fibers number. Furthermore, electron microscopy discovered a significant age-dependent increase in the length of sarcomeres, I and H bands, and reduction on the overlapped actin/myosin length, supporting contractile force loss with age. Electron microscopy also showed an increased number and CSA of IFM with age, which may reveal more endurance at 12months of age. Together, mice at early stage of aging already show significant changes in gastrocnemius muscle morphology and ultrastructure that are suggestive of the onset of sarcopenia. Copyright © 2016 Elsevier Inc. All rights reserved.
Beale Air Force Base, Perimeter Acquisition Vehicle Entry PhasedArray Warning ...
Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, Satellite Communications Terminal, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
Beale Air Force Base, Perimeter Acquisition Vehicle Entry PhasedArray Warning ...
Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, Electric Substation, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
Looking north Beale Air Force Base, Perimeter Acquisition Vehicle ...
Looking north - Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, Electric Substation, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
Beale Air Force Base, Perimeter Acquisition Vehicle Entry PhasedArray Warning ...
Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, Microwave Equipment Building, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 5 2013-10-01 2013-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 5 2012-10-01 2012-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 5 2014-10-01 2014-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 5 2011-10-01 2011-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
Chip connectivity verification program
NASA Technical Reports Server (NTRS)
Riley, Josh (Inventor); Patterson, George (Inventor)
1999-01-01
A method for testing electrical connectivity between conductive structures on a chip that is preferably layered with conductive and nonconductive layers. The method includes determining the layer on which each structure is located and defining the perimeter of each structure. Conductive layer connections between each of the layers are determined, and, for each structure, the points of intersection between the perimeter of that structure and the perimeter of each other structure on the chip are also determined. Finally, electrical connections between the structures are determined using the points of intersection and the conductive layer connections.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
This decision document presents the selected remedial actions for the Landfill OU Sites, at the inactive Mather AFB, Sacramento County, California. The Installation Restoration Program (IRP) sites which comprise the Landfill OU at the inactive Mather AFB include: Site 1 - Runway Overrun Landfill; Site 2 - `8150` Area Landfill; Site 3 - Northeast Perimeter Landfill No. 1; Site 4 - Northeast Perimeter Landfill No. 2; Site 5 - Northeast Perimeter Landfill No. 3; and Site 6 - Firing Range Landfill Sites.
75 FR 21048 - Northern Lights Fund Trust, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-22
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29208; 812-13651] Northern Lights Fund Trust, et al.; Notice of Application April 16, 2010. AGENCY: Securities and Exchange... shareholder approval and would grant relief from certain disclosure requirements. Applicants: Northern Lights...
Beale Air Force Base, Perimeter Acquisition Vehicle Entry PhasedArray Warning ...
Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, Civil Engineering Storage Building, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
Perimeter Barrier Selection Guide
DOT National Transportation Integrated Search
1989-05-01
This document provides a methodology to determine the magnitude of the threat from attack vehicles to the perimeter of a facility. The threat is determined by the penetration tolerance and the maximum speed attainable. After the threat is defined thi...
Interior, looking northeast Beale Air Force Base, Perimeter Acquisition ...
Interior, looking northeast - Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, Microwave Equipment Building, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
The Open Perimetry Interface: an enabling tool for clinical visual psychophysics.
Turpin, Andrew; Artes, Paul H; McKendrick, Allison M
2012-01-01
Perimeters are commercially available instruments for measuring various attributes of the visual field in a clinical setting. They have several advantages over traditional lab-based systems for conducting vision experiments, including built-in gaze tracking and calibration, polished appearance, and attributes to increase participant comfort. Prior to this work, there was no standard to control such instruments, making it difficult and time consuming to use them for novel psychophysical experiments. This paper introduces the Open Perimetry Interface (OPI), a standard set of functions that can be used to control perimeters. Currently the standard is partially implemented in the open-source programming language R on two commercially available instruments: the Octopus 900 (a projection-based bowl perimeter produced by Haag-Streit, Switzerland) and the Heidelberg Edge Perimeter (a CRT-based system produced by Heidelberg Engineering, Germany), allowing these instruments to be used as a platform for psychophysical experimentation.
Lattice Boltzmann Method of Different BGA Orientations on I-Type Dispensing Method
Gan, Z. L.; Ishak, M. H. H.; Abdullah, M. Z.; Khor, Soon Fuat
2016-01-01
This paper studies the three dimensional (3D) simulation of fluid flows through the ball grid array (BGA) to replicate the real underfill encapsulation process. The effect of different solder bump arrangements of BGA on the flow front, pressure and velocity of the fluid is investigated. The flow front, pressure and velocity for different time intervals are determined and analyzed for potential problems relating to solder bump damage. The simulation results from Lattice Boltzmann Method (LBM) code will be validated with experimental findings as well as the conventional Finite Volume Method (FVM) code to ensure highly accurate simulation setup. Based on the findings, good agreement can be seen between LBM and FVM simulations as well as the experimental observations. It was shown that only LBM is capable of capturing the micro-voids formation. This study also shows an increasing trend in fluid filling time for BGA with perimeter, middle empty and full orientations. The perimeter orientation has a higher pressure fluid at the middle region of BGA surface compared to middle empty and full orientation. This research would shed new light for a highly accurate simulation of encapsulation process using LBM and help to further increase the reliability of the package produced. PMID:27454872
DETAIL VIEW OF A VIDEO CAMERA POSITIONED ALONG THE PERIMETER ...
DETAIL VIEW OF A VIDEO CAMERA POSITIONED ALONG THE PERIMETER OF THE MLP - Cape Canaveral Air Force Station, Launch Complex 39, Mobile Launcher Platforms, Launcher Road, East of Kennedy Parkway North, Cape Canaveral, Brevard County, FL
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tucker, R.A.
This paper reports that properly applied, light sources and lighting systems not only enhance a building's attractiveness and usability, they also create a secure environment. An effectively lighted area can minimize pedestrian hazards and auto accidents. Good security lighting also eliminates the darkness that vandals, thieves, and felons thrive on. Unfortunately, lighting quality has sometimes been sacrificed for the sake of energy efficiency, and resulting savings offset by poor aesthetics and user dissatisfaction. However, trade-offs in quality and efficiency are not necessary, thanks to recent developments in light source technology.
76 FR 73748 - Genesis Capital, LLC and Northern Lights Fund Trust; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29867; 812-13935] Genesis Capital, LLC and Northern Lights Fund Trust; Notice of Application November 21, 2011. AGENCY: Securities...: Genesis Capital, LLC (``Genesis Capital'' or the ``Adviser'') and Northern Lights Fund Trust (the ``Trust...
Effect of photodynamic therapy on mouse platelets
NASA Astrophysics Data System (ADS)
Zhou, Chuannong; Chi, Shunji; Deng, Jinsheng; Zhang, Hua; Liang, Junlin; Ha, Xian-wen
1993-06-01
Normal mice received hematoporphyrin derivative (HpD) i.v. prior to red light irradiation and the platelet-rich plasma was prepared and irradiated by red light. The platelets were processed for EM examination and stereological analysis. It was shown the 16 hrs after irradiation almost all platelets were necrotized; 8 hours after irradiation about one fourth of the platelets were necrotized and the remaining were considerably damaged. Immediately after irradiation a small number of platelets became necrotic and most other platelets were swollen and deformated, showing significantly increased mean area, perimeter and short axis, and mean cell volume and cell surface area. The findings indicate that platelets are highly sensitive to PDT action and can be directly and rapidly damaged by PDT even in the absence of vascular endothelial cells. The early platelet photoactivation may play an important role in the initiation of early vascular damage and microcirculatory alterations induced by PDT in vivo.
NASA Astrophysics Data System (ADS)
Lachance, R. L.; Gordley, L. L.; Marshall, B. T.; Fisher, J.; Paxton, G.; Gubeli, J. F.
2015-12-01
Currently there is no efficient and affordable way to monitor gas releases over small to large areas. We have demonstrated the ability to accurately measure key greenhouse and pollutant gasses with low cost solar observations using the breakthrough sensor technology called the "Pupil Imaging Gas Correlation", PIGC™, which provides size and complexity reduction while providing exceptional resolution and coverage for various gas sensing applications. It is a practical implementation of the well-known Gas Filter Correlation Radiometry (GFCR) technique used for the HALOE and MOPITT satellite instruments that were flown on successful NASA missions in the early 2000s. This strong space heritage brings performance and reliability to the ground instrument design. A methane (CH4) abundance sensitivity of 0.5% or better of ambient column with uncooled microbolometers has been demonstrated with 1 second direct solar observations. These under $10 k sensors can be deployed in precisely balanced autonomous grids to monitor the flow of chosen gasses, and infer their source locations. Measureable gases include CH4, 13CO2, N2O, NO, NH3, CO, H2S, HCN, HCl, HF, HDO and others. A single instrument operates in a dual operation mode, at no additional cost, for continuous (real-time 24/7) local area perimeter monitoring for the detection of leaks for safety & security needs, looking at an artificial light source (for example a simple 60 W light bulb placed 100 m away), while simultaneously allowing solar observation for quasi-continuous wide area total atmospheric column scanning (3-D) for environmental monitoring (fixed and mobile configurations). The second mode of operation continuously quantifies the concentration and flux of specific gases over different ground locations, determined the amount of targeted gas being released from the area or getting into the area from outside locations, allowing better tracking of plumes and identification of sources. This paper reviews the measurement technique, performance demonstration and grid deployment strategy.
CONTEXT VIEW ALONG EXISTING PERIMETER TRACKS LOOKING OVER IRON ORE ...
CONTEXT VIEW ALONG EXISTING PERIMETER TRACKS LOOKING OVER IRON ORE CARS TOWARDS CLEVELAND BULK TERMINAL BUILDINGS. LOOKING SOUTH. - Pennsylvania Railway Ore Dock, Lake Erie at Whiskey Island, approximately 1.5 miles west of Public Square, Cleveland, Cuyahoga County, OH
Idle reduction programs and potential benefits to schools
DOT National Transportation Integrated Search
2010-11-01
School districts in Texas and many other states have, in recent years, increased the walk zones : surrounding schools to a 2-mile perimeter. Inside this perimeter, either no school bus service is : offered, or service is offered only with a fee...
An evaluation of rapid methods for monitoring vegetation characteristics of wetland bird habitat
Tavernia, Brian G.; Lyons, James E.; Loges, Brian W.; Wilson, Andrew; Collazo, Jaime A.; Runge, Michael C.
2016-01-01
Wetland managers benefit from monitoring data of sufficient precision and accuracy to assess wildlife habitat conditions and to evaluate and learn from past management decisions. For large-scale monitoring programs focused on waterbirds (waterfowl, wading birds, secretive marsh birds, and shorebirds), precision and accuracy of habitat measurements must be balanced with fiscal and logistic constraints. We evaluated a set of protocols for rapid, visual estimates of key waterbird habitat characteristics made from the wetland perimeter against estimates from (1) plots sampled within wetlands, and (2) cover maps made from aerial photographs. Estimated percent cover of annuals and perennials using a perimeter-based protocol fell within 10 percent of plot-based estimates, and percent cover estimates for seven vegetation height classes were within 20 % of plot-based estimates. Perimeter-based estimates of total emergent vegetation cover did not differ significantly from cover map estimates. Post-hoc analyses revealed evidence for observer effects in estimates of annual and perennial covers and vegetation height. Median time required to complete perimeter-based methods was less than 7 percent of the time needed for intensive plot-based methods. Our results show that rapid, perimeter-based assessments, which increase sample size and efficiency, provide vegetation estimates comparable to more intensive methods.
[Assessment of body adiposity in school students in Arequipa, Peru].
Cossio-Bolaños, Marco Antonio; Pablos Abella, Carlos; Arruda, Miguel
2012-01-01
To assess the relation between the percentage of body fat, the Body Mass Index and the abdominal perimeter in a population of school students who live at a moderate altitude. A cross-sectional study was conducted, for which 394 boys and 405 girls between 6 and 11 years of age were selected using a probabilistic method. All the school students chosen were middle class children who lived in the urban area of Arequipa, Peru, located at a moderate altitude (2320m above sea level). The percentage of fat, the Body Mass Index and the abdominal perimeter were assessed. There was a moderate correlation between the percentage of fat and the abdominal perimeter in boys (0.59) and girls (0.68). Lower figures were obtained between the percentage of fat and the Body Mass Index in boys (0.56) and girls (0.66). A connection among the categories of fat percentage (%F) and the abdominal perimeter (p<0.05) was observed; yet, there was no connection between the %F and the Body Mass Index (p>0.05). The abdominal perimeter has a moderate correlation with the percentage of body fat and can be used as an indicator of adiposity in the mid-section of the body of children who live in Arequipa (Peru) at a moderate altitude.
NASA Technical Reports Server (NTRS)
Vankiere, W. J.
1973-01-01
The use of ERTS imagery for water resources planning in the lower Mekong Basin relates to three major issues: (1) it complements data from areas, which have been inaccessible in the past because of security; this concerns mainly forest cover of the watersheds, and geological features, (2) it refines ground surveys; this concerns mainly land forms, and soils of existing and planned irrigation perimeters, and (3) it provides new information, which would be almost or entirely impossible to detect with ground surveys or conventional photography; this concerns the mechanism of flooding and drainage of the delta; siltation of the Great Lake and mapping of acidity, possibly also of salinity, in the lower delta; sedimentation and fisheries in the Mekong Delta estuarine areas.
Flutter Analysis of the Shuttle Tile Overlay Repair Concept
NASA Technical Reports Server (NTRS)
Bey, Kim S.; Scott, Robert C.; Bartels, Robert E.; Waters, William A.; Chen, Roger
2007-01-01
The Space Shuttle tile overlay repair concept, developed at the NASA Johnson Space Center, is designed for on-orbit installation over an area of damaged tile to permit safe re-entry. The thin flexible plate is placed over the damaged area and secured to tile at discreet points around its perimeter. A series of flutter analyses were performed to determine if the onset of flutter met the required safety margins. Normal vibration modes of the panel, obtained from a simplified structural analysis of the installed concept, were combined with a series of aerodynamic analyses of increasing levels of fidelity in terms of modeling the flow physics to determine the onset of flutter. Results from these analyses indicate that it is unlikely that the overlay installed at body point 1800 will flutter during re-entry.
77 FR 66609 - Twenty-Fifth Update of the Federal Agency Hazardous Waste Compliance Docket
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-06
.... Middle Island Light Station..... Middle Island...... Alpena Township.... MI 49707 Homeland Security... 48740 Homeland Security.. Other 17 Scenic Road. Thunder Bay Island Light Station Michigan Islands Alpena...
Northwest side view showing 3 windows and security light ...
Northwest side view showing 3 windows and security light - U.S. Naval Base, Pearl Harbor, Naval Hospital, Animal House, Near intersection of Hospital Way & Third Street, Pearl City, Honolulu County, HI
76 FR 33376 - Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29689; 812-13851] Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application June 1, 2011. AGENCY: Securities and... ``Adviser'') and Northern Lights Fund Trust (the ``Trust''). DATES: Filing Dates: The application was filed...
Mezey, Gillian; Durkin, Catherine; Dodge, Liam; White, Sarah
2015-12-01
Absconds and escapes by psychiatric patients from secure forensic psychiatric settings create public anxiety and are poorly understood. To describe secure hospital patients who escape from within the secure perimeter or abscond, and test for differences between these groups. Escapes and absconds between 2008 and 2012 from the medium and low secure forensic psychiatric inpatient units of two London National Health Service Trusts were identified through the Trusts' databases. Demographic, offending, mental health and incident data were extracted from records for each. Seventy-seven incidents, involving 54 patients, were identified over the five years. These were 13 escapes involving 12 patients, representing a rate of 0.04 per 1000 bed days, and 64 absconds involving 42 patients, a rate of 0.26 per 1000 bed days; 15 (28%) patients were absent without leave more than once. Over half of the patients came back voluntarily within 24 hours of leaving. Over 50% of them had drunk alcohol or taken drugs while away from the unit. Escapees were more likely to be transferred prisoners and to have planned their escape, less likely to return to the unit voluntarily and away longer than patients who absconded. Offending was rare during unauthorised leave--just three offences among the 77 incidents; self-harm was more likely. Motives for absconding included: wanting freedom or drink or drugs, family worries and/or dissatisfaction with aspects of treatment. Escapes or absconding from secure healthcare units have different characteristics, but may best be prevented by convergent strategies. Relational security is likely to be as important for foiling plans for the former as it is for reducing boredom, building strong family support and managing substance misuse in the latter. Copyright © 2015 John Wiley & Sons, Ltd.
Tooth angulation and dental arch perimeter-the effect of orthodontic bracket prescription.
Pontes, Luana F; Cecim, Rodolpho L; Machado, Sissy M; Normando, David
2015-08-01
The aim of this study was to evaluate the effects of upper incisors and canine angulations introduced by different bracket prescriptions on dental arch perimeter. Cone beam computerized tomography scans collected using I-Cat (Imaging Sciences International, Hatfield, PA, USA) were selected conveniently from a database of routine exams of a clinical radiology center. Crown and radicular measurements of upper incisors and canines were made and exported to the Autocad 2011 software to create a virtual dental model. The virtual teeth were positioned with an angulation of zero; thereafter, a reference value for the perimeter of the arch was measured. Furthermore, teeth angulations were applied according to the standards of the Edgewise bracket system and the Straight-wire systems: MBT, Capelozza, Andrews, and Roth. The largest linear distances for tooth crown (anterior arch perimeter) and root (radicular distance) were obtained for each bracket prescription. The anterior perimeter for well-aligned incisors and canines without angulation was used as reference (crown: 47.34mm; root: 39.13mm). An increase in the arch perimeter was obtained for all bracket prescriptions evaluated, which ranged from 0.28 and 3.19mm in the Edgewise technique, for the crown and root measurements, respectively, to 1.09 and 11.28mm for the Roth prescription. Bracket prescriptions with greater angulation led to an increased use of space within the dental arch, mainly in the radicular region. The consequence of this radicular angular displacement will need to be further investigated. © The Author 2014. Published by Oxford University Press on behalf of the European Orthodontic Society. All rights reserved. For permissions, please email: journals.permissions@oup.com.
Horehledova, Barbora; Mihl, Casper; Hendriks, Babs M F; Eijsvoogel, Nienke G; Vainer, Jindrich; Veenstra, Leo F; Wildberger, Joachim E; Das, Marco
2018-06-16
Incorrect prosthesis size has direct impact on patient outcome after transcatheter aortic valve implantation (TAVI) procedure. Currently, annular diameter, area or perimeter may be used for prosthesis size selection. The aim was to evaluate whether the use different annular dimensions would result in the selection of different prosthesis sizes, when assessed in the same TAVI-candidate during the same phase of a cardiac cycle. Fifty consecutive TAVI-candidates underwent retrospectively ECG-gated computed tomography angiography (CTA). Aortic root dimensions were assessed in the 20% phase of the R-R interval. Annular short diameter, perimeter and area were used to select the prosthesis size, based on the industry recommendations for a self-expandable (Medtronic CoreValve; MCV) and balloon-expandable (Edwards Sapien XT Valve; ESV) valve. Complete agreement on selected prosthesis size amongst all three annular dimensions was observed in 62% (31/50; ESV) and 30% (15/50; MCV). Short aortic annulus measurement resulted in a smaller prosthesis size in 20% (10/50; ESV) and in 60% of cases (30/50; MCV) compared to the size suggested by both annular perimeter and area. In 18% (9/50; ESV) and 10% of cases (5/50; MCV) a larger prosthesis would have been selected based on annular perimeter compared to annular diameter and area. Prosthesis size derived from area was always in agreement with at least one other parameter in all cases. Aortic annulus area appears to be the most robust parameter for TAVI-prosthesis size selection, regardless of the specific prosthesis size. Short aortic annulus diameter may underestimate the prosthesis size, while use of annular perimeter may lead to size overestimation in some cases.
Finite-key security analysis of quantum key distribution with imperfect light sources
Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...
2015-09-09
In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less
Optically initiated silicon carbide high voltage switch
Caporaso, George J [Livermore, CA; Sampayan, Stephen E [Manteca, CA; Sullivan, James S [Livermore, CA; Sanders,; David, M [Livermore, CA
2011-02-22
An improved photoconductive switch having a SiC or other wide band gap substrate material, such as GaAs and field-grading liners composed of preferably SiN formed on the substrate adjacent the electrode perimeters or adjacent the substrate perimeters for grading the electric fields.
A sampling strategy to estimate the area and perimeter of irregularly shaped planar regions
Timothy G. Gregoire; Harry T. Valentine
1995-01-01
The length of a randomly oriented ray emanating from an interior point of a planar region can be used to unbiasedly estimate the region's area and perimeter. Estimators and corresponding variance estimators under various selection strategies are presented.
78 FR 63475 - Ocean Transportation Intermediary License Applicants
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-24
... dba Fachel Shipping & Logistics (NVO & OFF), 6331 Belair Road, Baltimore, MD 21206, Officers: Chinyere... Type: QI Change. National Air Cargo, Inc. (NVO & OFF), 350 Windward Drive, Orchard Park, NY 14127... Change. Perimeter International dba Perimeter Logistics (NVO & OFF), 2700 Story Road, Suite 150, Irving...
13. VIEW SHOWING MOST OF THE PERIMETER FROM SPILLWAY BOX ...
13. VIEW SHOWING MOST OF THE PERIMETER FROM SPILLWAY BOX TO END OF EAST DAM. FOREGROUND VIEW SHOWS TRIPLE WALL CONSTRUCTION OF TONGUE AND GROOVE PLANKING USED IN CRIBBING - Three Bears Lake & Dams, North of Marias Pass, East Glacier Park, Glacier County, MT
Growth and assembly of cobalt oxide nanoparticle rings at liquid nanodroplets with solid junction.
Zhou, Yilong; Powers, Alexander S; Zhang, Xiaowei; Xu, Tao; Bustillo, Karen; Sun, Litao; Zheng, Haimei
2017-09-28
Using liquid cell TEM, we imaged the formation of CoO nanoparticle rings. Nanoparticles nucleated and grew tracing the perimeter of droplets sitting on the SiN x solid substrate, and finally formed necklace-like rings. By tracking single nanoparticle trajectories during the ring formation and an estimation of the forces between droplets and nanoparticles using a simplified model, we found the junction of liquid nanodroplets with a solid substrate is the attractive site for CoO nanoparticles. Coalescing droplets were capable of pushing nanoparticles to the perimeter of the new droplet and nanoparticles on top of the droplets rolled off toward the perimeter. We propose that the curved surface morphology of the droplets created a force gradient that contributed to the assembly of nanoparticles at the droplet perimeter. Revealing the dynamics of nanoparticle movements and the interactions of nanoparticles with the liquid nanodroplet provides insights on developing novel self-assembly strategies for building precisely defined nanostructures on solid substrates.
Simulation of a central scotoma using contact lenses with an opaque centre.
Almutleb, Essam S; Bradley, Arthur; Jedlicka, Jason; Hassan, Shirin E
2018-01-01
This study evaluated the feasibility of using soft contact lenses (CLs) with an opaque centre to induce absolute central scotomas that move with the eye. We examined the geometrical optics prediction that scotoma size will vary with the size of the CL's opaque centre and with ocular pupil size. We also tested the hypothesis that high environmental light levels will ensure that the ocular pupil will remain small enough, even with opaque centre CLs, to generate absolute scotomas representative of those experienced by patients with age-related macular disease. Using an Octopus 900 Perimeter ( www.Haag-Streit.com), kinetic visual fields (VFs) were measured in five normally-sighted subjects using a V4e Goldmann target with CLs that had central opaque areas with diameters of 2.8, 3.0, and 3.2 mm. To control pupil size, VFs were measured with background perimeter bowl luminances of 10, 585, and 1155 cd m -2 . Subjects attempted to (i) fixate the bowl centre; and (ii) place the scotoma edge at the bowl fixation target (eccentric viewing). As predicted, there was a direct relationship between scotoma size and both luminance level and diameter of the opacity. Mean scotoma diameters were 0°, 17.6° and 22°, for the low, medium and high bowl luminances, respectively. Scotoma size was determined primarily by the difference between the diameters of CL opacity and the entrance pupil of the eye and the axial separation between them, and between-subject differences in pupil diameters contributed most to the between-subject variability in scotoma diameter at each light level (SD: 6.01°). Scotoma displacement during eccentric fixation confirmed the gaze-contingent characteristics of this experimental model. It is possible to induce a gaze-contingent absolute scotoma and hence mimic central vision loss using centrally-opaque CLs provided that the CL opacity is larger than the entrance pupil of the eye. This simulation tool will, therefore, be ineffective at low environmental light levels (as shown previously) if the entrance pupil of the eye is larger than the CL opacity. © 2017 The Authors Ophthalmic & Physiological Optics © 2017 The College of Optometrists.
4. View toward north, south face ("C" wall) of perimeter ...
4. View toward north, south face ("C" wall) of perimeter acquisition radar building showing entry (former docking facility) on left, behind satellite dish. On the bottom right can be seen the knockout panel provided for a future tunnel that was never used. The two "holes" above are referred to as bird screens, the upper air intake, on the fifth level, incorporates a plenium chamber (#510e), as does the lower (#2M8A) air exhaust, located on the second level mezzanine - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Reliability Improvement in III-V Concentrator Solar Cells by Means of Perimeter Protection
NASA Astrophysics Data System (ADS)
González, José R.; Vázquez, Manuel; Núñez, Neftalí; Algora, Carlos; Espinet, Pilar
2010-10-01
This paper presents the evolution in the strategy to assess the reliability of III-V solar cells and a new thermal ageing test carried out over GaAs single junction solar cells at three different temperatures (130, 150 and 170° C). The perimeter of the solar cells has been protected with silicone, which seems to be an effective way of enhancing the reliability of the solar cells. A preliminary analysis of the results indicates a mean time to failure (MTTF) one order of magnitude larger than the one obtained in a previous thermal test with the perimeter uncoated.
Invisible Security Ink Based on Water-Soluble Graphitic Carbon Nitride Quantum Dots.
Song, Zhiping; Lin, Tianran; Lin, Lihua; Lin, Sen; Fu, Fengfu; Wang, Xinchen; Guo, Liangqia
2016-02-18
Stimuli-responsive photoluminescent (PL) materials have been widely used as fluorescent ink for data security applications. However, traditional fluorescent inks are limited in maintaining the secrecy of information because the inks are usually visible by naked eyes either under ambient light or UV-light illumination. Here, we introduced metal-free water-soluble graphitic carbon nitride quantum dots (g-CNQDs) as invisible security ink for information coding, encryption, and decryption. The information written by the g-CNQDs is invisible in ambient light and UV light, but it can be readable by a fluorescence microplate reader. Moreover, the information can be encrypted and decrypted by using oxalic acid and sodium bicarbonate as encryption reagent and decryption reagent, respectively. Our findings provide new opportunities for high-level information coding and protection by using water-soluble g-CNQDs as invisible security ink. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Segment of brick perimeter wall extending around the naval asylum ...
Segment of brick perimeter wall extending around the naval asylum grounds at twenty-fourth street with Gray's Ferry Avenue branching to the left and Bainbridge Street to the right, looking southwest. - U. S. Naval Asylum, Biddle Hall, Gray's Ferry Avenue, Philadelphia, Philadelphia County, PA
29 CFR 1926.760 - Fall protection.
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Steel Erection § 1926.760 Fall protection. (a... a steel erection activity who is on a walking/working surface with an unprotected side or edge more.... (2) Perimeter safety cables. On multi-story structures, perimeter safety cables shall be installed at...
29 CFR 1926.760 - Fall protection.
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Steel Erection § 1926.760 Fall protection. (a... a steel erection activity who is on a walking/working surface with an unprotected side or edge more.... (2) Perimeter safety cables. On multi-story structures, perimeter safety cables shall be installed at...
29 CFR 1926.760 - Fall protection.
Code of Federal Regulations, 2011 CFR
2011-07-01
... (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Steel Erection § 1926.760 Fall protection. (a... a steel erection activity who is on a walking/working surface with an unprotected side or edge more.... (2) Perimeter safety cables. On multi-story structures, perimeter safety cables shall be installed at...
29 CFR 1926.760 - Fall protection.
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Steel Erection § 1926.760 Fall protection. (a... a steel erection activity who is on a walking/working surface with an unprotected side or edge more.... (2) Perimeter safety cables. On multi-story structures, perimeter safety cables shall be installed at...
29 CFR 1926.760 - Fall protection.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Steel Erection § 1926.760 Fall protection. (a... a steel erection activity who is on a walking/working surface with an unprotected side or edge more.... (2) Perimeter safety cables. On multi-story structures, perimeter safety cables shall be installed at...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Perimeter. 886.1605 Section 886.1605 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES... or manual device intended to determine the extent of the peripheral visual field of a patient. The...
27 CFR 9.105 - Cumberland Valley.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Chesapeake & Ohio (C&O) Canal National Historical Park and the confluence of the Potomac River and... perimeter of the park on the northeastern bank of the Potomac River to the confluence of Antitam Creek and the Potomac River; (2) Then southeast of Limekiln Road which runs along the perimeter of the park from...
27 CFR 9.105 - Cumberland Valley.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Chesapeake & Ohio (C&O) Canal National Historical Park and the confluence of the Potomac River and... perimeter of the park on the northeastern bank of the Potomac River to the confluence of Antitam Creek and the Potomac River; (2) Then southeast of Limekiln Road which runs along the perimeter of the park from...
27 CFR 9.105 - Cumberland Valley.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Chesapeake & Ohio (C&O) Canal National Historical Park and the confluence of the Potomac River and... perimeter of the park on the northeastern bank of the Potomac River to the confluence of Antitam Creek and the Potomac River; (2) Then southeast of Limekiln Road which runs along the perimeter of the park from...
27 CFR 9.105 - Cumberland Valley.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Chesapeake & Ohio (C&O) Canal National Historical Park and the confluence of the Potomac River and... perimeter of the park on the northeastern bank of the Potomac River to the confluence of Antitam Creek and the Potomac River; (2) Then southeast of Limekiln Road which runs along the perimeter of the park from...
27 CFR 9.105 - Cumberland Valley.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Chesapeake & Ohio (C&O) Canal National Historical Park and the confluence of the Potomac River and... perimeter of the park on the northeastern bank of the Potomac River to the confluence of Antitam Creek and the Potomac River; (2) Then southeast of Limekiln Road which runs along the perimeter of the park from...
Thinking Deeply about Area and Perimeter
ERIC Educational Resources Information Center
Nirode, Wayne
2011-01-01
While contemplating ways to extend the author's ninth-grade honors geometry students' thinking and knowledge about area and perimeter, he discovered an interesting type of problem based on Erickson's (2001) rectangle problem, which he had been using for ten years. Erickson's original problem involves creating random rectangles with lengths and…
4. Inside perimeter fence, view towards east and launch closure, ...
4. Inside perimeter fence, view towards east and launch closure, sensor EMP antenna left center - Ellsworth Air Force Base, Delta Flight, Launch Facility D-6, 4 miles north of Badlands National Park Headquarters, 4.5 miles east of Jackson County line on county road, Interior, Jackson County, SD
Effect of infiltration modeling approach on operational solutions for furrow irrigation
USDA-ARS?s Scientific Manuscript database
Infiltration in irrigated furrows depends on the variation of depth of flow and, thus, wetted perimeter along the field and in time. However, the magnitude of the wetted perimeter effect has not been clearly established due to soil variability, erosion and deposition, macropore flow, and other proc...
Code of Federal Regulations, 2012 CFR
2012-07-01
... to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND... Steel Erection Pt. 1926, Subpt. R, App. F Appendix F to Subpart R of Part 1926—Perimeter Columns: Non...
Code of Federal Regulations, 2014 CFR
2014-07-01
... to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND... Steel Erection Pt. 1926, Subpt. R, App. F Appendix F to Subpart R of Part 1926—Perimeter Columns: Non...
Code of Federal Regulations, 2010 CFR
2010-07-01
... to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND... Steel Erection Pt. 1926, Subpt. R, App. F Appendix F to Subpart R of Part 1926—Perimeter Columns: Non...
Code of Federal Regulations, 2011 CFR
2011-07-01
... to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND... Steel Erection Pt. 1926, Subpt. R, App. F Appendix F to Subpart R of Part 1926—Perimeter Columns: Non...
Code of Federal Regulations, 2013 CFR
2013-07-01
... to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND... Steel Erection Pt. 1926, Subpt. R, App. F Appendix F to Subpart R of Part 1926—Perimeter Columns: Non...
Lunar Regolith Particle Shape Analysis
NASA Technical Reports Server (NTRS)
Kiekhaefer, Rebecca; Hardy, Sandra; Rickman, Douglas; Edmunson, Jennifer
2013-01-01
Future engineering of structures and equipment on the lunar surface requires significant understanding of particle characteristics of the lunar regolith. Nearly all sediment characteristics are influenced by particle shape; therefore a method of quantifying particle shape is useful both in lunar and terrestrial applications. We have created a method to quantify particle shape, specifically for lunar regolith, using image processing. Photomicrographs of thin sections of lunar core material were obtained under reflected light. Three photomicrographs were analyzed using ImageJ and MATLAB. From the image analysis measurements for area, perimeter, Feret diameter, orthogonal Feret diameter, Heywood factor, aspect ratio, sieve diameter, and sieve number were recorded. Probability distribution functions were created from the measurements of Heywood factor and aspect ratio.
Smart sensing surveillance video system
NASA Astrophysics Data System (ADS)
Hsu, Charles; Szu, Harold
2016-05-01
An intelligent video surveillance system is able to detect and identify abnormal and alarming situations by analyzing object movement. The Smart Sensing Surveillance Video (S3V) System is proposed to minimize video processing and transmission, thus allowing a fixed number of cameras to be connected on the system, and making it suitable for its applications in remote battlefield, tactical, and civilian applications including border surveillance, special force operations, airfield protection, perimeter and building protection, and etc. The S3V System would be more effective if equipped with visual understanding capabilities to detect, analyze, and recognize objects, track motions, and predict intentions. In addition, alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. The S3V System capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.
Security barriers with automated reconnaissance
McLaughlin, James O; Baird, Adam D; Tullis, Barclay J; Nolte, Roger Allen
2015-04-07
An intrusion delaying barrier includes primary and secondary physical structures and can be instrumented with multiple sensors incorporated into an electronic monitoring and alarm system. Such an instrumented intrusion delaying barrier may be used as a perimeter intrusion defense and assessment system (PIDAS). Problems with not providing effective delay to breaches by intentional intruders and/or terrorists who would otherwise evade detection are solved by attaching the secondary structures to the primary structure, and attaching at least some of the sensors to the secondary structures. By having multiple sensors of various types physically interconnected serves to enable sensors on different parts of the overall structure to respond to common disturbances and thereby provide effective corroboration that a disturbance is not merely a nuisance or false alarm. Use of a machine learning network such as a neural network exploits such corroboration.
Concealed hinge permits flush mounting of doors and hatches
NASA Technical Reports Server (NTRS)
Holman, E. V.
1966-01-01
Hinge assembly permits flush mounting of doors and hatches of considerable thickness so that the axis of instant rotation, produced by the hinge, lies outside the panel surface and beyond the perimeter adjacent to the hinge. In operation, motion of the assembly is initially parallel, changing to angular after clearing the panel perimeter.
5. Inside perimeter fence, view towards northeast, EMP antenna at ...
5. Inside perimeter fence, view towards northeast, EMP antenna at center, top of soft support building visible at left center - Ellsworth Air Force Base, Delta Flight, Launch Facility D-6, 4 miles north of Badlands National Park Headquarters, 4.5 miles east of Jackson County line on county road, Interior, Jackson County, SD
CONTEXT VIEW ALONG EXISTING PERIMETER TRACKS LOOKING OVER IRON ORE ...
CONTEXT VIEW ALONG EXISTING PERIMETER TRACKS LOOKING OVER IRON ORE CARS TOWARDS WESTERN SIDE OF CLEVELAND BULK TERMINAL BUILDINGS AND A SELF-UNLOADING IRON ORE SHIP AT DOCK. LOOKING SOUTHWEST. - Pennsylvania Railway Ore Dock, Lake Erie at Whiskey Island, approximately 1.5 miles west of Public Square, Cleveland, Cuyahoga County, OH
Sexual dimorphism of human vallate papillae: an in vivo study of normative morphology.
Zdilla, M J; Gibson, L N; Hunt, A J
2015-01-01
The perimeters of vallate papillae (VP) house approximately half of the taste buds on the human tongue. However, little information exists regarding perimeter measurements of VP. Likewise, great diversity exists among reports of the number of VP and diameter of VP, in general. The research presents an analysis of the perimeters, counts, and diameters of VP in vivo. Endoscopic examination was performed on 79 individuals (40 females, 39 males) between 18 and 26 years of age. A total of 583 VP were counted, 565 of which were able to be measured. Data revealed a statistically significant difference between male and female VP count (t(75.6) = 4.5; p = 0.00003). Females had, on average, 2.22 more VP than males. Males were found to have larger mean VP diameter per person and mean VP perimeter per person than females (t(58.9) = -2.4; p = 0.021 and t(59.3) = -2.4; p = 0.019, respectively). The report demonstrates that VP are sexually dimorphic at the gross anatomical level.
Real-time estimation of wildfire perimeters from curated crowdsourcing
NASA Astrophysics Data System (ADS)
Zhong, Xu; Duckham, Matt; Chong, Derek; Tolhurst, Kevin
2016-04-01
Real-time information about the spatial extents of evolving natural disasters, such as wildfire or flood perimeters, can assist both emergency responders and the general public during an emergency. However, authoritative information sources can suffer from bottlenecks and delays, while user-generated social media data usually lacks the necessary structure and trustworthiness for reliable automated processing. This paper describes and evaluates an automated technique for real-time tracking of wildfire perimeters based on publicly available “curated” crowdsourced data about telephone calls to the emergency services. Our technique is based on established data mining tools, and can be adjusted using a small number of intuitive parameters. Experiments using data from the devastating Black Saturday wildfires (2009) in Victoria, Australia, demonstrate the potential for the technique to detect and track wildfire perimeters automatically, in real time, and with moderate accuracy. Accuracy can be further increased through combination with other authoritative demographic and environmental information, such as population density and dynamic wind fields. These results are also independently validated against data from the more recent 2014 Mickleham-Dalrymple wildfires.
Real-time estimation of wildfire perimeters from curated crowdsourcing
Zhong, Xu; Duckham, Matt; Chong, Derek; Tolhurst, Kevin
2016-01-01
Real-time information about the spatial extents of evolving natural disasters, such as wildfire or flood perimeters, can assist both emergency responders and the general public during an emergency. However, authoritative information sources can suffer from bottlenecks and delays, while user-generated social media data usually lacks the necessary structure and trustworthiness for reliable automated processing. This paper describes and evaluates an automated technique for real-time tracking of wildfire perimeters based on publicly available “curated” crowdsourced data about telephone calls to the emergency services. Our technique is based on established data mining tools, and can be adjusted using a small number of intuitive parameters. Experiments using data from the devastating Black Saturday wildfires (2009) in Victoria, Australia, demonstrate the potential for the technique to detect and track wildfire perimeters automatically, in real time, and with moderate accuracy. Accuracy can be further increased through combination with other authoritative demographic and environmental information, such as population density and dynamic wind fields. These results are also independently validated against data from the more recent 2014 Mickleham-Dalrymple wildfires. PMID:27063569
Real-time estimation of wildfire perimeters from curated crowdsourcing.
Zhong, Xu; Duckham, Matt; Chong, Derek; Tolhurst, Kevin
2016-04-11
Real-time information about the spatial extents of evolving natural disasters, such as wildfire or flood perimeters, can assist both emergency responders and the general public during an emergency. However, authoritative information sources can suffer from bottlenecks and delays, while user-generated social media data usually lacks the necessary structure and trustworthiness for reliable automated processing. This paper describes and evaluates an automated technique for real-time tracking of wildfire perimeters based on publicly available "curated" crowdsourced data about telephone calls to the emergency services. Our technique is based on established data mining tools, and can be adjusted using a small number of intuitive parameters. Experiments using data from the devastating Black Saturday wildfires (2009) in Victoria, Australia, demonstrate the potential for the technique to detect and track wildfire perimeters automatically, in real time, and with moderate accuracy. Accuracy can be further increased through combination with other authoritative demographic and environmental information, such as population density and dynamic wind fields. These results are also independently validated against data from the more recent 2014 Mickleham-Dalrymple wildfires.
NASA Technical Reports Server (NTRS)
Galindo-Israel, V.; Imbriale, W.; Shogen, K.; Mittra, R.
1990-01-01
In obtaining solutions to the first-order nonlinear partial differential equations (PDEs) for synthesizing offset dual-shaped reflectors, it is found that previously observed computational problems can be avoided if the integration of the PDEs is started from an inner projected perimeter and integrated outward rather than starting from an outer projected perimeter and integrating inward. This procedure, however, introduces a new parameter, the main reflector inner perimeter radius p(o), when given a subreflector inner angle 0(o). Furthermore, a desired outer projected perimeter (e.g., a circle) is no longer guaranteed. Stability of the integration is maintained if some of the initial parameters are determined first from an approximate solution to the PDEs. A one-, two-, or three-parameter optimization algorithm can then be used to obtain a best set of parameters yielding a close fit to the desired projected outer rim. Good low cross-polarization mapping functions are also obtained. These methods are illustrated by synthesis of a high-gain offset-shaped Cassegrainian antenna and a low-noise offset-shaped Gregorian antenna.
Porto, C L Lascasas; Milhomens, A L M; Pires, C E; Xavier, S Salles; Sicuro, F; Bottino, D A; Bouskela, E
2009-06-01
To evaluate changes on venous diameter and perimeter of lower limbs in chronic venous disorder (CVD) patients after different clinical treatments for four weeks. Fifty-two female patients classified as C2,s or C2,3,s (CEAP classification) were allocated consecutively in three groups: Cirkan (40 mg of the root extract of Ruscus aculeatus + 100 mg of flavonoid hesperidine methylchalcone + 200 mg of vitamin C per pill); elastic compression stockings (ECS) and no treatment (NT). Diameters were determined by duplex ultrasound and perimeter with Leg-O-Meter. After treatment, Cirkan significantly decreased popliteal vein and great saphenous vein (GSV) diameters bilaterally and ECS decreased popliteal vein diameter bilaterally and GSV and varices only on the left limb. Perimeters changed only with ECS. Clinical scores changed between Cirkan x NT and ECS x Cirkan. Disability score varied for ECS x NT and Cirkan x NT. chi2 test detected different distribution frequency for C3 and C2 classes according to treatment: ECS (both limbs) and Cirkan (only left limb). Varices and anatomical scores did not change. ECS emerges as the most effective clinical treatment tested but improvements with Cirkan on vein diameter and CEAP class were also observed. Clinical scores improved due to pain relief and edema reduction (ECS). These findings point to a positive effect of Cirkan, suggesting that venotonic drugs should be taken into account in the treatment of CVD.
Eidlin-Levy, Hili; Rubinsten, Orly
2017-01-01
The relationship between numbers and other magnitudes has been extensively investigated in the scientific literature. Here, the objectives were to examine whether two continuous magnitudes, area and perimeter, are automatically processed and whether adults with developmental dyscalculia (DD) are deficient in their ability to automatically process one or both of these magnitudes. Fifty-seven students (30 with DD and 27 with typical development) performed a novel Stroop-like task requiring estimation of one aspect (area or perimeter) while ignoring the other. In order to track possible changes in automaticity due to practice, we measured performance after initial and continuous exposure to stimuli. Similar to previous findings, current results show a significant group × congruency interaction, evident beyond exposure level or magnitude type. That is, the DD group systematically showed larger Stroop effects. However, analysis of each exposure period showed that during initial exposure to stimuli the DD group showed larger Stroop effects in the perimeter and not in the area task. In contrast, during continuous exposure to stimuli no triple interaction was evident. It is concluded that both magnitudes are automatically processed. Nevertheless, individuals with DD are deficient in inhibiting irrelevant magnitude information in general and, specifically, struggle to inhibit salient area information after initial exposure to a perimeter comparison task. Accordingly, the findings support the assumption that DD involves a deficiency in multiple cognitive components, which include domain-specific and domain-general cognitive functions.
Eidlin-Levy, Hili; Rubinsten, Orly
2017-01-01
The relationship between numbers and other magnitudes has been extensively investigated in the scientific literature. Here, the objectives were to examine whether two continuous magnitudes, area and perimeter, are automatically processed and whether adults with developmental dyscalculia (DD) are deficient in their ability to automatically process one or both of these magnitudes. Fifty-seven students (30 with DD and 27 with typical development) performed a novel Stroop-like task requiring estimation of one aspect (area or perimeter) while ignoring the other. In order to track possible changes in automaticity due to practice, we measured performance after initial and continuous exposure to stimuli. Similar to previous findings, current results show a significant group × congruency interaction, evident beyond exposure level or magnitude type. That is, the DD group systematically showed larger Stroop effects. However, analysis of each exposure period showed that during initial exposure to stimuli the DD group showed larger Stroop effects in the perimeter and not in the area task. In contrast, during continuous exposure to stimuli no triple interaction was evident. It is concluded that both magnitudes are automatically processed. Nevertheless, individuals with DD are deficient in inhibiting irrelevant magnitude information in general and, specifically, struggle to inhibit salient area information after initial exposure to a perimeter comparison task. Accordingly, the findings support the assumption that DD involves a deficiency in multiple cognitive components, which include domain-specific and domain-general cognitive functions. PMID:29312066
Driver, Jeffrey H; Ross, John H; Pandian, Muhilan; Selim, Sami; Sharp, Janice K
2013-01-01
Surface deposition of insecticides applied as indoor residential foggers, baseboard or perimeter sprays, spot sprays, and crack-and-crevice (C&C) sprays represent pathways of unintentional, postapplication exposure for children and adults. Estimation of the magnitude of this exposure following an application event is associated with uncertainty due to many factors, including (1) surface residue deposition and distribution, (2) access to and the nature of contact with treated surfaces based on time-activity patterns of residents, and (3) the role of residue removal mechanisms such as cleaning treated surfaces, pesticide degradation or redistribution, and hand washing and bathing following contact. A comparative spatial deposition study was conducted involving broadcast, perimeter, and C&C application methods. Residues measured using a spatial grid of deposition dosimeters on floor surfaces demonstrated significantly lower residue concentrations in readily accessible areas following C&C and perimeter applications, versus broadcast treatment. Analyses of other monitoring studies support this finding. The implications of these findings are discussed for both screening-level and higher tier probabilistic postapplication, residential exposure assessment. The U.S. Environmental Protection Agency (EPA) current guidance on interpretation of deposition following C&C application is supported by data in this study and others that indicate a ratio of 10:1 for deposition for broadcast versus C&C application. However, the perimeter deposition data are quite similar to C&C deposition and do not support a 70/30 default relative to broadcast recommended by the U.S. EPA (2012).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marquis Childs
1999-09-01
Material Disposal Area G (Area G) is at Technical Area 54 at Los Alamos National Laboratory (LANL). Area G has been the principal facility for the disposal of low-level, solid-mixed, and transuranic waste since 1957. It is currently LANL's primary facility for radioactive solid waste burial and storage. As part of the annual environmental surveillance effort at Area G, surface soil samples are collected around the facility's perimeter to characterize possible radionuclide movement off the site through surface water runoff During 1998, 39 soil samples were collected and analyzed for percent moisture, tritium, plutonium-238 and 239, cesium-137 and americium-241. Tomore » assess radionuclide concentrations, the results from these samples are compared with baseline or background soil samples collected in an undisturbed area west of the active portion Area G. The 1998 results are also compared to the results from analogous samples collected during 1996 and 1997 to assess changes over this time in radionuclide activity concentrations in surface soils around the perimeter of Area G. The results indicate elevated levels of all the radionuclides assessed (except cesium-137) exist in Area G perimeter surface soils vs the baseline soils. The comparison of 1998 soil data to previous years (1996 and 1997) indicates no significant increase or decrease in radionuclide concentrations; an upward or downward trend in concentrations is not detectable at this time. These results are consistent with data comparisons done in previous years. Continued annual soil sampling will be necessary to realize a trend if one exists. The radionuclide levels found in the perimeter surface soils are above background but still considered relatively low. This perimeter surface soil data will be used for planning purposes at Area G, techniques to prevent sediment tm.nsport off-site are implemented in the areas where the highest radionuclide concentrations are indicated.« less
NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium
Thomas D'Agostino
2017-12-09
Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.
Photovoltaic generator with a spherical imaging lens for use with a paraboloidal solar reflector
Angel, Roger P
2013-01-08
The invention is a generator for photovoltaic conversion of concentrated sunlight into electricity. A generator according to the invention incorporates a plurality of photovoltaic cells and is intended for operation near the focus of a large paraboloidal reflector pointed at the sun. Within the generator, the entering concentrated light is relayed by secondary optics to the cells arranged in a compact, concave array. The light is delivered to the cells at high concentration, consistent with high photovoltaic conversion efficiency and low cell cost per unit power output. Light enters the generator, preferably first through a sealing window, and passes through a field lens, preferably in the form of a full sphere or ball lens centered on the paraboloid focus. This lens forms a concentric, concave and wide-angle image of the primary reflector, where the intensity of the concentrated light is stabilized against changes in the position of concentrated light entering the generator. Receiving the stabilized light are flat photovoltaic cells made in different shapes and sizes and configured in a concave array corresponding to the concave image of a given primary reflector. Photovoltaic cells in a generator are also sized and interconnected so as to provide a single electrical output that remains high and stable, despite aberrations in the light delivered to the generator caused by, for example, mispointing or bending of the primary reflector. In some embodiments, the cells are set back from the image formed by the ball lens, and part of the light is reflected onto each cell small secondary reflectors in the form of mirrors set around its perimeter.
Wildberger, H
1984-10-31
The contrast evoked potentials (VEPs) to different check sizes were recorded in about 200 cases of discrete optic neuropathies (ON) of different origin. Differential light threshold (DLT) was tested with the computer perimeter OCTOPUS. Saturated and desaturated tests were applied to evaluate the degree of acquired color vision deficiency. Delayed VEP responses are not confined to optic neuritis (RBN) alone and the different latency times obtained from other ON are confluent. The delay may be due to demyelination, to an increasing dominance of paramacular VEP subcomponents or to an increasing dominance of the upper half-field responses. Recording with smaller check sizes has the advantage that discrete dysfunctions in the visual field (VF) center are more easily detected: a correlation between amplitudes and visual acuity is best in strabismic amblyopias, is less expressed in maculopathies of the retina and weak in ON. The absence or reduction of amplitudes to smaller check sizes, however, is an important indication of a disorder in the VF center of ON in an early or recovered stage. Acquired color vision defects of the tritan-like type are more confined to discrete ON, whereas the red/green type is reserved to more severe ON. The DLT of the VF center is reduced in a different, significant and non significant extent in discrete optic neuropathies and the correlation between DLT and visual acuity is weak. A careful numerical analysis is needed in types of discrete ON where the central DLT lies within normal statistical limits: a side difference of the DLT between the affected and the normal fellow eye is always present. Evaluation of visual fatigue effects and of the relative sensitivity loss of VF center and VF periphery may provide further diagnostic information.
Developing the Concept of Perimeter and Area in Students with Learning Disabilities (LD)
ERIC Educational Resources Information Center
Kozulin, Alex; Kazaz, Sigalit
2017-01-01
The present research is aimed at developing an educational program effective for the development of the concepts of perimeter and area in students with LD and testing this program. The study combined action research with quasi-experimental design involving experimental (LD) and comparison (non-LD) groups. The intervention program consisted of 12…
44. ARAIII Fuel oil tank ARA710. Camera facing west. Perimeter ...
44. ARA-III Fuel oil tank ARA-710. Camera facing west. Perimeter fence at left side of view. Gable-roofed building beyond tank on right is ARA-622. Gable-roofed building beyond tank on left is ARA-610. Ineel photo no. 3-16. - Idaho National Engineering Laboratory, Army Reactors Experimental Area, Scoville, Butte County, ID
Home destruction within the Hayman Fire perimeter
Jack Cohen; Rick Stratton
2003-01-01
The Hayman Fire report on home destruction examines the following four questions: 1. How many homes were destroyed out of the total number of homes within the Hayman Fire perimeter? 2. What was the relative wildland fire intensity associated with the destroyed homes? 3. What was the categorical cause of home ignition suggested by the associated wildland fire intensity...
South Perimeter Road, view to the east. One and twocar ...
South Perimeter Road, view to the east. One- and two-car garages are visible at left; a row of citrus trees separate the road from a ball field at right; and a weather station is in the right foreground - Wellton-Mohawk Irrigation System, Building No. 1 (House), 30601 Wellton-Mohawk Drive, Wellton, Yuma County, AZ
ERIC Educational Resources Information Center
Sossi, Dino; Jamalian, Azadeh; Richardson, Shenetta
2011-01-01
This exploratory study compared a computer-based mathematics education intervention with two more traditional approaches with the purpose of improving instruction in perimeter and area. Kidspiration software, tile/stick manipulatives and pencil/paper-based copying/drawing of shapes were implemented in a 3rd Grade New York City public school…
High-security communication by coherence modulation at the photon-counting level.
Rhodes, William T; Boughanmi, Abdellatif; Moreno, Yezid Torres
2016-05-20
We show that key-specified interferometer path-length difference modulation (often referred to as coherence modulation), operating in the photon-counting regime with a broadband source, can provide a quantifiably high level of physics-guaranteed security for binary signal transmission. Each signal bit is associated with many photocounts, perhaps numbering in the thousands. Of great importance, the presence of an eavesdropper can be quickly detected. We first review the operation of key-specified coherence modulation at high light levels, illustrating by means of an example its lack of security against attack. We then show, using the same example, that, through the reduction of light intensities to photon-counting levels, a high level of security can be attained. A particular attack on the system is analyzed to demonstrate the quantifiability of the scheme's security, and various remaining research issues are discussed. A potential weakness of the scheme lies in a possible vulnerability to light amplification by an attacker.
7 CFR 3560.103 - Maintaining housing projects.
Code of Federal Regulations, 2011 CFR
2011-01-01
... common areas, must be free of trash, litter, and debris. Public walkways, walls of buildings and common... lighting and functional interior lighting in common areas which permits safe access and security. (ix... coverings that are intact, securely attached, and in good condition. Brick veneers must be free of missing...
Benchmarking Distance Control and Virtual Drilling for Lateral Skull Base Surgery.
Voormolen, Eduard H J; Diederen, Sander; van Stralen, Marijn; Woerdeman, Peter A; Noordmans, Herke Jan; Viergever, Max A; Regli, Luca; Robe, Pierre A; Berkelbach van der Sprenkel, Jan Willem
2018-01-01
Novel audiovisual feedback methods were developed to improve image guidance during skull base surgery by providing audiovisual warnings when the drill tip enters a protective perimeter set at a distance around anatomic structures ("distance control") and visualizing bone drilling ("virtual drilling"). To benchmark the drill damage risk reduction provided by distance control, to quantify the accuracy of virtual drilling, and to investigate whether the proposed feedback methods are clinically feasible. In a simulated surgical scenario using human cadavers, 12 unexperienced users (medical students) drilled 12 mastoidectomies. Users were divided into a control group using standard image guidance and 3 groups using distance control with protective perimeters of 1, 2, or 3 mm. Damage to critical structures (sigmoid sinus, semicircular canals, facial nerve) was assessed. Neurosurgeons performed another 6 mastoidectomy/trans-labyrinthine and retro-labyrinthine approaches. Virtual errors as compared with real postoperative drill cavities were calculated. In a clinical setting, 3 patients received lateral skull base surgery with the proposed feedback methods. Users drilling with distance control protective perimeters of 3 mm did not damage structures, whereas the groups using smaller protective perimeters and the control group injured structures. Virtual drilling maximum cavity underestimations and overestimations were 2.8 ± 0.1 and 3.3 ± 0.4 mm, respectively. Feedback methods functioned properly in the clinical setting. Distance control reduced the risks of drill damage proportional to the protective perimeter distance. Errors in virtual drilling reflect spatial errors of the image guidance system. These feedback methods are clinically feasible. Copyright © 2017 Elsevier Inc. All rights reserved.
Chen, Peii; Goedert, Kelly M.
2012-01-01
Clock drawings produced by right-brain-damaged (RBD) individuals with spatial neglect often contain an abundance of empty space on the left while numbers and hands are placed on the right. However, the clock perimeter is rarely compromised in neglect patients’ drawings. By analyzing clock drawings produced by 71 RBD and 40 healthy adults, this study investigated whether the geometric characteristics of the clock perimeter reveal novel insights to understanding spatial neglect. Neglect participants drew smaller clocks than either healthy or non-neglect RBD participants. While healthy participants’ clock perimeter was close to circular, RBD participants drew radially extended ellipses. The mechanisms for these phenomena were investigated by examining the relation between clock-drawing characteristics and performance on six subtests of the Behavioral Inattention Test (BIT). The findings indicated that the clock shape was independent of any BIT subtest or the drawing placement on the test sheet and that the clock size was significantly predicted by one BIT subtest: the poorer the figure and shape copying, the smaller the clock perimeter. Further analyses revealed that in all participants, clocks decreased in size as they were placed farther from the center of the paper. However, even when neglect participants placed their clocks towards the center of the page, they were smaller than those produced by healthy or non-neglect RBD participants. These results suggest a neglect-specific reduction in the subjectively available workspace for graphic production from memory, consistent with the hypothesis that neglect patients are impaired in the ability to enlarge the attentional aperture. PMID:22390278
Kwon, Junki; Choi, Jaewan; Shin, Joong Won; Lee, Jiyun; Kook, Michael S
2017-12-01
To assess the diagnostic ability of foveal avascular zone (FAZ) parameters to discriminate glaucomatous eyes with visual field defects (VFDs) in different locations (central vs. peripheral) from normal eyes. Totally, 125 participants were separated into 3 groups: normal (n=45), glaucoma with peripheral VFD (PVFD, n=45), and glaucoma with central VFD (CVFD, n=35). The FAZ area, perimeter, and circularity and parafoveal vessel density were calculated from optical coherence tomography angiography images. The diagnostic ability of the FAZ parameters and other structural parameters was determined according to glaucomatous VFD location. Associations between the FAZ parameters and central visual function were evaluated. A larger FAZ area and longer FAZ perimeter were observed in the CVFD group than in the PVFD and normal groups. The FAZ area, perimeter, and circularity were better in differentiating glaucomatous eyes with CVFDs from normal eyes [areas under the receiver operating characteristic curves (AUC), 0.78 to 0.88] than in differentiating PVFDs from normal eyes (AUC, 0.51 to 0.64). The FAZ perimeter had a similar AUC value to the circumpapillary retinal nerve fiber layer and macular ganglion cell-inner plexiform layer thickness for differentiating eyes with CVFDs from normal eyes (all P>0.05, the DeLong test). The FAZ area was significantly correlated with central visual function (β=-112.7, P=0.035, multivariate linear regression). The FAZ perimeter had good diagnostic capability in differentiating glaucomatous eyes with CVFDs from normal eyes, and may be a potential diagnostic biomarker for detecting glaucomatous patients with CVFDs.
NASA Astrophysics Data System (ADS)
Stamos, Zoi; Koutsias, Nikos
2017-04-01
The aim of this study is to assess spatial and temporalfire selectivity patterns in the region of Attica - Greece from 1984 to 2015. Our work is implemented in two distinct phases: the first consists of the accurate delineation of the fire perimeter using satellite remote sensing technology, and the second consists of the application of suitable GIS supported analyses to develop thematic layers that optimally summarised the spatial and temporal information of fire occurrence. Fire perimeters of wildland fires occurred within the time window 1984-2015 were delineated from freely available Landsat images from USGS and ESA sources.More than three thousands satellite images were processed in order to extract fire perimeters and create maps of fire frequency and fire return interval. In total one thousand and one hundred twenty fire perimeters were recorded during this thirty years' period. Fire perimeters within each year of fire occurrence were compared against the available to burn under complete random processes to identify selectivity patterns over (i) CORINE land use/land cover, (ii) fire frequency and (iii) time since last firemaps. For example, non- irrigated arable lands, complex cultivation patterns and discontinuous urban fabrics are negative related with fires, while coniferous forests, sclerophyllous vegetation and transitional woodlands seem to be preferable by the fires. Additionally, it seems that fires prefer their old burnings (two and three times burned) and also places with different patterns of time since last fire depending on the time needed by the type of vegetation to recover and thus to re-burn.
Electromagnetic pump stator core
Fanning, A.W.; Olich, E.E.; Dahl, L.R.
1995-01-17
A stator core for supporting an electrical coil includes a plurality of groups of circumferentially abutting flat laminations which collectively form a bore and perimeter. A plurality of wedges are interposed between the groups, with each wedge having an inner edge and a thicker outer edge. The wedge outer edges abut adjacent ones of the groups to provide a continuous path around the perimeter. 21 figures.
Electromagnetic pump stator core
Fanning, Alan W.; Olich, Eugene E.; Dahl, Leslie R.
1995-01-01
A stator core for supporting an electrical coil includes a plurality of groups of circumferentially abutting flat laminations which collectively form a bore and perimeter. A plurality of wedges are interposed between the groups, with each wedge having an inner edge and a thicker outer edge. The wedge outer edges abut adjacent ones of the groups to provide a continuous path around the perimeter.
Root-Crown Relations of Young Sugar Maple and Yellow Birch
Carl H. Tubbs
1977-01-01
Young forest-grown sugar maple and yellow birch (1 to 6 inches d.b.h.) crowns were mapped and roots excavated. Crown dimensions were compared. Sugar maple roots usually terminated within a few feet of the crown perimeter. Yellow birch roots frequently terminated well outside crown perimeters and roots of birch were more irregularly distributed than those of maple....
The Georgia Perimeter College MESA Program: Propelling STEM Students to Success
ERIC Educational Resources Information Center
Law, Kouok K.
2011-01-01
From 2006 to 2008, while taking courses at Georgia Perimeter College (GPC), Joel Toussaint worked two jobs, one was at night. Now, he has graduated from Georgia Institute of Technology majoring in mechanical engineering, and he has been admitted to graduate school in mechanical engineer there. His plan for the future is to get his Ph. D. in…
Perimeter intrusion alarm systems - May 1980 (Rev. 2)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1981-01-01
This guide describes six types of perimeter intrusion alarm systems and sets forth criteria for their performance and use as a means acceptable to the NRC staff for meeting specified portions of the Commission's regulations. It also references a document (SAND 76-0554) that provides additional information in this area, especially on the subject of combining sensors to yield a better overall performance.
Z.A Holden; P. Morgan; A.M.S. Smith; M Rollins; P.E. Gessler
2005-01-01
We evaluated the potential of two novel thermally enhanced Landsat Thematic Mapper (TM)-derived spectral indices for discriminating burned areas and for producing fire perimeter data (as a potential surrogate to digital fire atlas data) within two wildland fires (1985 and 1993) in ponderosa pine (Pinus ponderosa) forests of the Gila Wilderness, New...
Post-It Notes Art: Area and Perimeter
ERIC Educational Resources Information Center
Bittman, Erin; Moomaw, Sally
2017-01-01
Members of a third-grade class were involved in a heated discussion. They were using a fixed number of links to create fences for toy cows. The children could change the shape of the field produced by the links, but they could not add any links or take any away. Understanding the relationship between perimeter and area is a difficult concept for…
Hogsette, Jerome A; Ose, Gregory A
2017-12-01
Stable flies are noxious blood-feeding pests of exotic animals at zoological parks, inflicting painful bites, and causing discomfort to animals. Stable fly management is difficult because of the flies' tendency to remain on the host animals only when feeding. Non-toxic traps can be efficient but traps placed around exhibit perimeters captured fewer-than-expected numbers of flies. By surrounding traps with square electric fence enclosures, traps could be placed in the exhibits with the host animals and compared with an equal number of traps placed along perimeter fences. During a 21-week study, traps inside exhibits captured 5× more stable flies than traps placed along exhibit perimeters. Traps inside exhibits tended to show more fluctuations in fly populations than traps along perimeters. The increased numbers of flies captured using this technique should provide relief from this pestiferous fly and greatly improve animal health and welfare. We believe this to be the first study where traps were used to capture stable flies in exhibit yards at a zoological park. © 2017 The Authors. Zoo Biology Published by Wiley Periodicals, Inc.
Effect of Crown Angulation of Maxillary Incisor on Effective Arch Perimeter.
Jain, Megha; Vyas, Matrishva; Singh, Johar Rajvinder
2017-06-01
It has been postulated that crown angulation and inclination has potential space implication within the arch. With the insight of space implication of the axial relations of teeth, cases of genuine tooth size discrepancies can be dealt with improved stability. This in vitro study was designed to investigate and quantify the influence of angulation and inclination of maxillary incisors on the effective arch perimeter. Acrylic teeth were arranged over typhodont frame with spaced maxillary anterior segment. Known value of tip and torque in increments were incorporated to maxillary incisors through bracket positioning and corresponding consumption of the interdental spaces were measured using coordinate measuring machine. Study revealed that increase in maxillary incisor crown angulation by 1o results in consumption of approximately 0.012 mm of arch perimeter. Similarly, there is a consumption of 0.021 mm of arch perimeter with each degree increase in labial crown inclination. The knowledge of the space implication can be included in the space analysis during the orthodontic treatment planning. Depending upon the amount of space discrepancy, an accurate degree of required alteration in the axial relation of one or more teeth can be planned.
Effect of Crown Angulation of Maxillary Incisor on Effective Arch Perimeter
Vyas, Matrishva; Singh, Johar Rajvinder
2017-01-01
Introduction It has been postulated that crown angulation and inclination has potential space implication within the arch. With the insight of space implication of the axial relations of teeth, cases of genuine tooth size discrepancies can be dealt with improved stability. Aim This in vitro study was designed to investigate and quantify the influence of angulation and inclination of maxillary incisors on the effective arch perimeter. Materials and Methods Acrylic teeth were arranged over typhodont frame with spaced maxillary anterior segment. Known value of tip and torque in increments were incorporated to maxillary incisors through bracket positioning and corresponding consumption of the interdental spaces were measured using coordinate measuring machine. Results Study revealed that increase in maxillary incisor crown angulation by 1o results in consumption of approximately 0.012 mm of arch perimeter. Similarly, there is a consumption of 0.021 mm of arch perimeter with each degree increase in labial crown inclination. Conclusion The knowledge of the space implication can be included in the space analysis during the orthodontic treatment planning. Depending upon the amount of space discrepancy, an accurate degree of required alteration in the axial relation of one or more teeth can be planned. PMID:28764302
Secure positioning technique based on encrypted visible light map for smart indoor service
NASA Astrophysics Data System (ADS)
Lee, Yong Up; Jung, Gillyoung
2018-03-01
Indoor visible light (VL) positioning systems for smart indoor services are negatively affected by both cochannel interference from adjacent light sources and VL reception position irregularity in the three-dimensional (3-D) VL channel. A secure positioning methodology based on a two-dimensional (2-D) encrypted VL map is proposed, implemented in prototypes of the specific positioning system, and analyzed based on performance tests. The proposed positioning technique enhances the positioning performance by more than 21.7% compared to the conventional method in real VL positioning tests. Further, the pseudonoise code is found to be the optimal encryption key for secure VL positioning for this smart indoor service.
NASA Technical Reports Server (NTRS)
Parish, David W.; Grabbe, Robert D.; Marzwell, Neville I.
1994-01-01
A Modular Autonomous Robotic System (MARS), consisting of a modular autonomous vehicle control system that can be retrofit on to any vehicle to convert it to autonomous control and support a modular payload for multiple applications is being developed. The MARS design is scalable, reconfigurable, and cost effective due to the use of modern open system architecture design methodologies, including serial control bus technology to simplify system wiring and enhance scalability. The design is augmented with modular, object oriented (C++) software implementing a hierarchy of five levels of control including teleoperated, continuous guidepath following, periodic guidepath following, absolute position autonomous navigation, and relative position autonomous navigation. The present effort is focused on producing a system that is commercially viable for routine autonomous patrolling of known, semistructured environments, like environmental monitoring of chemical and petroleum refineries, exterior physical security and surveillance, perimeter patrolling, and intrafacility transport applications.
Convex lattice polygons of fixed area with perimeter-dependent weights.
Rajesh, R; Dhar, Deepak
2005-01-01
We study fully convex polygons with a given area, and variable perimeter length on square and hexagonal lattices. We attach a weight tm to a convex polygon of perimeter m and show that the sum of weights of all polygons with a fixed area s varies as s(-theta(conv))eK(t)square root(s) for large s and t less than a critical threshold tc, where K(t) is a t-dependent constant, and theta(conv) is a critical exponent which does not change with t. Using heuristic arguments, we find that theta(conv) is 1/4 for the square lattice, but -1/4 for the hexagonal lattice. The reason for this unexpected nonuniversality of theta(conv) is traced to existence of sharp corners in the asymptotic shape of these polygons.
Photovoltaic assemblies and methods for transporting
Almy, Charles; Campbell, Matt; Sandler, Reuben; Wares, Brian; Wayman, Elizabeth
2014-08-05
A PV assembly including framework, PV laminate(s), and a stiffening device. The framework includes a perimeter frame at least 10 feet in length and at least 5 feet in width. The PV laminate(s) are assembled to the perimeter frame to define a receiving zone having a depth of not more than 8 inches. The stiffening device is associated with the framework and is configured to provide a first state and a second state. In the first state, an entirety of the stiffening device is maintained within the receiving zone. In the second state, at least a portion of the stiffening device projects from the receiving zone. The stiffening device enhances a stiffness of the PV assembly in a plane of the perimeter frame, and can include rods defining truss structures.
NASA Astrophysics Data System (ADS)
Rogotis, Savvas; Ioannidis, Dimosthenis; Tzovaras, Dimitrios; Likothanassis, Spiros
2015-04-01
The aim of this work is to present a novel approach for automatic recognition of suspicious activities in outdoor perimeter surveillance systems based on infrared video processing. Through the combination of size, speed and appearance based features, like the Center-Symmetric Local Binary Patterns, short-term actions are identified and serve as input, along with user location, for modeling target activities using the theory of Hidden Conditional Random Fields. HCRFs are used to directly link a set of observations to the most appropriate activity label and as such to discriminate high risk activities (e.g. trespassing) from zero risk activities (e.g loitering outside the perimeter). Experimental results demonstrate the effectiveness of our approach in identifying suspicious activities for video surveillance systems.
Mobile robotic sensors for perimeter detection and tracking.
Clark, Justin; Fierro, Rafael
2007-02-01
Mobile robot/sensor networks have emerged as tools for environmental monitoring, search and rescue, exploration and mapping, evaluation of civil infrastructure, and military operations. These networks consist of many sensors each equipped with embedded processors, wireless communication, and motion capabilities. This paper describes a cooperative mobile robot network capable of detecting and tracking a perimeter defined by a certain substance (e.g., a chemical spill) in the environment. Specifically, the contributions of this paper are twofold: (i) a library of simple reactive motion control algorithms and (ii) a coordination mechanism for effectively carrying out perimeter-sensing missions. The decentralized nature of the methodology implemented could potentially allow the network to scale to many sensors and to reconfigure when adding/deleting sensors. Extensive simulation results and experiments verify the validity of the proposed cooperative control scheme.
Schramm-Loewner evolution and perimeter of percolation clusters of correlated random landscapes.
de Castro, C P; Luković, M; Pompanin, G; Andrade, R F S; Herrmann, H J
2018-03-27
Motivated by the fact that many physical landscapes are characterized by long-range height-height correlations that are quantified by the Hurst exponent H, we investigate the statistical properties of the iso-height lines of correlated surfaces in the framework of Schramm-Loewner evolution (SLE). We show numerically that in the continuum limit the external perimeter of a percolating cluster of correlated surfaces with H ∈ [-1, 0] is statistically equivalent to SLE curves. Our results suggest that the external perimeter also retains the Markovian properties, confirmed by the absence of time correlations in the driving function and the fact that the latter is Gaussian distributed for any specific time. We also confirm that for all H the variance of the winding angle grows logarithmically with size.
Photovoltaic assemblies and methods for transporting
Almy, Charles; Campbell, Matt; Sandler, Reuben; Wares, Brian; Wayman, Elizabeth
2013-09-17
A PV assembly including framework, PV laminate(s), and a stiffening device. The framework includes a perimeter frame at least 10 feet in length and at least 5 feet in width. The PV laminate(s) are assembled to the perimeter frame to define a receiving zone having a depth of not more than 8 inches. The stiffening device is associated with the framework and is configured to provide a first state and a second state. In the first state, an entirety of the stiffening device is maintained within the receiving zone. In the second state, at least a portion of the stiffening device projects from the receiving zone. The stiffening device enhances a stiffness of the PV assembly in a plane of the perimeter frame, and can include rods defining truss structures.
[Ecological security early-warning in Zhoushan Islands based on variable weight model].
Zhou, Bin; Zhong, Lin-sheng; Chen, Tian; Zhou, Rui
2015-06-01
Ecological security early warning, as an important content of ecological security research, is of indicating significance in maintaining regional ecological security. Based on driving force, pressure, state, impact and response (D-P-S-I-R) framework model, this paper took Zhoushan Islands in Zhejiang Province as an example to construct the ecological security early warning index system, test degrees of ecological security early warning of Zhoushan Islands from 2000 to 2012 by using the method of variable weight model, and forecast ecological security state of 2013-2018 by Markov prediction method. The results showed that the variable weight model could meet the study needs of ecological security early warning of Zhoushan Islands. There was a fluctuant rising ecological security early warning index from 0.286 to 0.484 in Zhoushan Islands between year 2000 and 2012, in which the security grade turned from "serious alert" into " medium alert" and the indicator light turned from "orange" to "yellow". The degree of ecological security warning was "medium alert" with the light of "yellow" for Zhoushan Islands from 2013 to 2018. These findings could provide a reference for ecological security maintenance of Zhoushan Islands.
NASA Astrophysics Data System (ADS)
Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng
2016-06-01
Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.
NASA Astrophysics Data System (ADS)
Haase, Felix; Kiefer, Fabian; Schäfer, Sören; Kruse, Christian; Krügener, Jan; Brendel, Rolf; Peibst, Robby
2017-08-01
We demonstrate an independently confirmed 25.0%-efficient interdigitated back contact silicon solar cell with passivating polycrystalline silicon (poly-Si) on oxide (POLO) contacts that enable a high open circuit voltage of 723 mV. We use n-type POLO contacts with a measured saturation current density of J 0n = 4 fA cm-2 and p-type POLO contacts with J 0p = 10 fA cm-2. The textured front side and the gaps between the POLO contacts on the rear are passivated by aluminum oxide (AlO x ) with J 0AlO x = 6 fA cm-2 as measured after deposition. We analyze the recombination characteristics of our solar cells at different process steps using spatially resolved injection-dependent carrier lifetimes measured by infrared lifetime mapping. The implied pseudo-efficiency of the unmasked cell, i.e., cell and perimeter region are illuminated during measurement, is 26.2% before contact opening, 26.0% after contact opening and 25.7% for the finished cell. This reduction is due to an increase in the saturation current density of the AlO x passivation during chemical etching of the contact openings and of the rear side metallization. The difference between the implied pseudo-efficiency and the actual efficiency of 25.0% as determined by designated-area light current-voltage (I-V) measurements is due to series resistance and diffusion of excess carriers into the non-illuminated perimeter region.
ERIC Educational Resources Information Center
Dissemination and Assessment Center for Bilingual Education, Austin, TX.
This is one of a series of student booklets designed for use in a bilingual mathematics program in grades 6-8. The general format is to present each page in both Spanish and English. The mathematical topics in this booklet include measurement, perimeter, and area. (MK)
Brian J. Palik; Darold P. Batzer; Richard Buech; Dale Nichols; Kory Cease; Leanne M. Egeland; Dwight E. Streblow
2001-01-01
Small seasonal ponds are abundant in many forest landscapes, yet they remain poorly understood in terms of their response to disturbance of the surrounding upland forest. The potential for such a response is large because of the small size and, hence, high perimeter-to-area ratios of most ponds. High perimeter-to-area ratio may increase the importance of functional...
Swivel arm perimeter for visual field testing in different body positions.
Flammer, J; Hendrickson, P; Lietz, A; Stümpfig, D
1993-01-01
To investigate the influence of body position on visual field results, a 'swivel arm perimeter' was built, based on a modified Octopus 1-2-3. Here, the measuring unit was detected from the control unit and mounted on a swivel arm, allowing its movement in all directions. The first results obtained with this device have indicated that its development was worthwhile.
33 CFR 106.265 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...
Pereira, Patrícia Feliciano; Faria, Franciane Rocha de; Faria, Eliane Rodrigues de; Hermsdorff, Helen Hermana Miranda; Peluzio, Maria do Carmo Gouveia; Franceschini, Sylvia do Carmo Castro; Priore, Silvia Eloiza
2015-01-01
To determine the prevalence of metabolic syndrome (MS) and the hypertriglyceridemic waist phenotype (HW) in a representative adolescent sample; as well as to establish which anthropometric indicator better identifies MS and HW, according to gender and adolescent age. This cross sectional study had the participation of 800 adolescents (414 girls) from 10-19 years old. Anthropometric indicators (body mass index, waist perimeter, waist/stature ratio, waist/hip ratio, and central/peripheral skinfolds) were determined by standard protocols. For diagnosis of MS, the criteria proposed by de Ferranti et al. (2004) were used. HW was defined by the simultaneous presence of increased waist perimeter (>75th percentile for age and sex) and high triglycerides (>100mg/dL). The ability of anthropometric indicators was evaluated by Receiver Operating Characteristic curve. The prevalence of MS was identical to HW (6.4%), without differences between genders and the adolescence phases. The waist perimeter showed higher area under the curve for the diagnosis of MS, except for boys with 17-19 years old, for whom the waist/stature ratio exhibited better performance. For diagnosing HW, waist perimeter also showed higher area under the curve, except for boys in initial and final phases, in which the waist/stature ratio obtained larger area under the curve. The central/peripheral skinfolds had the lowest area under the curve for the presence of both MS and HW phenotype. The waist perimeter and the waist/stature showed a better performance to identify MS and HW in both genders and in all three phases of adolescence. Copyright © 2015 Associação de Pediatria de São Paulo. Publicado por Elsevier Editora Ltda. All rights reserved.
Pereira, Patrícia Feliciano; de Faria, Franciane Rocha; de Faria, Eliane Rodrigues; Hermsdorff, Helen Hermana Miranda; Peluzio, Maria do Carmo Gouveia; Franceschini, Sylvia do Carmo Castro; Priore, Silvia Eloiza
2015-01-01
OBJECTIVE: To determine the prevalence of metabolic syndrome (MS) and the hypertriglyceridemic waist phenotype (HW) in a representative adolescent sample; as well as to establish which anthropometric indicator better identifies MS and HW, according to gender and adolescent age. METHODS: This cross sectional study had the participation of 800 adolescents (414 girls) from 10-19 years old. Anthropometric indicators (body mass index, waist perimeter, waist/stature ratio, waist/hip ratio, and central/peripheral skinfolds) were determined by standard protocols. For diagnosis of MS, the criteria proposed by de Ferranti et al. (2004) were used. HW was defined by the simultaneous presence of increased waist perimeter (>75th percentile for age and sex) and high triglycerides (>100 mg/dL). The ability of anthropometric indicators was evaluated by Receiver Operating Characteristic curve. RESULTS: The prevalence of MS was identical to HW (6.4%), without differences between genders and the adolescence phases. The waist perimeter showed higher area under the curve for the diagnosis of MS, except for boys with 17-19 years old, for whom the waist/stature ratio exhibited better performance. For diagnosing HW, waist perimeter also showed higher area under the curve, except for boys in initial and final phases, in which the waist/stature ratio obtained larger area under the curve. The central/peripheral skinfolds had the lowest area under the curve for the presence of both MS and HW phenotype. CONCLUSIONS: The waist perimeter and the waist/stature showed a better performance to identify MS and HW in both genders and in all three phases of adolescence. PMID:25913494
Influence of fire on black-tailed prairie dog colony expansion in shortgrass steppe
Augustine, D.J.; Cully, J.F.; Johnson, T.L.
2007-01-01
Factors influencing the distribution and abundance of black-tailed prairie dog (Cynomys ludovicianus) colonies are of interest to rangeland managers because of the significant influence prairie dogs can exert on both livestock and biodiversity. We examined the influence of 4 prescribed burns and one wildfire on the rate and direction of prairie dog colony expansion in shortgrass steppe of southeastern Colorado. Our study was conducted during 2 years with below-average precipitation, when prairie dog colonies were expanding throughout the study area. Under these dry conditions, the rate of black-tailed prairie dog colony expansion into burned grassland (X?? = 2.6 ha??100-m perimeter-1??y-1; range = 0.8-5.9 ha??100-m perimeter-1??y-1; N = 5 colonies) was marginally greater than the expansion rate into unburned grassland (X?? =1.3 ha??100-m perimeter-1??y-1; range = 0.2-4.9 ha??100-m perimeter-1??y-1; N = 23 colonies; P = 0.066). For 3 colonies that were burned on only a portion of their perimeter, we documented consistently high rates of expansion into the adjacent burned grassland (38%-42% of available burned habitat colonized) but variable expansion rates into the adjacent unburned grassland (2%-39% of available unburned habitat colonized). While our results provide evidence that burning can increase colony expansion rate even under conditions of low vegetative structure, this effect was minor at the scale of the overall colony complex because some unburned colonies were also able to expand at high rates. This result highlights the need to evaluate effects of fire on colony expansion during above-average rainfall years, when expansion into unburned grassland may be considerably lower.
Beam splitter and method for generating equal optical path length beams
Qian, Shinan; Takacs, Peter
2003-08-26
The present invention is a beam splitter for splitting an incident beam into first and second beams so that the first and second beams have a fixed separation and are parallel upon exiting. The beam splitter includes a first prism, a second prism, and a film located between the prisms. The first prism is defined by a first thickness and a first perimeter which has a first major base. The second prism is defined by a second thickness and a second perimeter which has a second major base. The film is located between the first major base and the second major base for splitting the incident beam into the first and second beams. The first and second perimeters are right angle trapezoidal shaped. The beam splitter is configured for generating equal optical path length beams.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Andrews, Robert
The Underground Test Area (UGTA) Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, in the northeast part of the Nevada National Security Site (NNSS) requires environmental corrective action activities to assess contamination resulting from underground nuclear testing. These activities are necessary to comply with the UGTA corrective action strategy (referred to as the UGTA strategy). The corrective action investigation phase of the UGTA strategy requires the development of groundwater flow and contaminant transport models whose purpose is to identify the lateral and vertical extent of contaminant migration over the next 1,000 years. In particular, the goal is to calculate themore » contaminant boundary, which is defined as a probabilistic model-forecast perimeter and a lower hydrostratigraphic unit (HSU) boundary that delineate the possible extent of radionuclide-contaminated groundwater from underground nuclear testing. Because of structural uncertainty in the contaminant boundary, a range of potential contaminant boundaries was forecast, resulting in an ensemble of contaminant boundaries. The contaminant boundary extent is determined by the volume of groundwater that has at least a 5 percent chance of exceeding the radiological standards of the Safe Drinking Water Act (SDWA) (CFR, 2012).« less
An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors
Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea
2014-01-01
We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology. PMID:25268920
46 CFR 112.43-9 - Signaling lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Signaling lights. 112.43-9 Section 112.43-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-9 Signaling lights. Each signaling light must be...
46 CFR 112.43-9 - Signaling lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Signaling lights. 112.43-9 Section 112.43-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-9 Signaling lights. Each signaling light must be...
46 CFR 112.43-9 - Signaling lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Signaling lights. 112.43-9 Section 112.43-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-9 Signaling lights. Each signaling light must be...
46 CFR 112.43-9 - Signaling lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Signaling lights. 112.43-9 Section 112.43-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-9 Signaling lights. Each signaling light must be...
46 CFR 112.43-9 - Signaling lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Signaling lights. 112.43-9 Section 112.43-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-9 Signaling lights. Each signaling light must be...
49 CFR 234.219 - Gate arm lights and light cable.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 4 2014-10-01 2014-10-01 false Gate arm lights and light cable. 234.219 Section....219 Gate arm lights and light cable. Each gate arm light shall be maintained in such condition to be properly visible to approaching highway users. Lights and light wire shall be secured to the gate arm. ...
49 CFR 234.219 - Gate arm lights and light cable.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 4 2013-10-01 2013-10-01 false Gate arm lights and light cable. 234.219 Section....219 Gate arm lights and light cable. Each gate arm light shall be maintained in such condition to be properly visible to approaching highway users. Lights and light wire shall be secured to the gate arm. ...
49 CFR 234.219 - Gate arm lights and light cable.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 4 2012-10-01 2012-10-01 false Gate arm lights and light cable. 234.219 Section....219 Gate arm lights and light cable. Each gate arm light shall be maintained in such condition to be properly visible to approaching highway users. Lights and light wire shall be secured to the gate arm. ...
Forest cover of Champaign County, Illinois in 1993
Jesus Danilo Chinea; Louis R. Iverson
1997-01-01
The forest cover of Champaign County, in east-central Illinois, was mapped from 1993 aerial photography and entered in a geographical information system database. One hundred and six forest patches cover 3,380 ha. These patches have a mean area of 32 ha, a mean perimeter of 4,851 m, a mean perimeter to area ratio of 237, a fractal dimension of 1.59, and a mean nearest...
45. Photographic copy of photograph, dated October 1970 (original print ...
45. Photographic copy of photograph, dated October 1970 (original print in possession of CSSD-HO, Huntsville, AL). Photographer unknown. Aerial mid-construction view (northeast to southwest) of perimeter acquisition radar building and par power plant. These buildings were approximately 33% complete at the time - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Jay Diffendorfer; Genie M. Fleming; Scott Tremor; Wayne Spencer; Jan L. Beyers
2012-01-01
Chaparral shrublands in southern California, US, exhibit significant biodiversity but are prone to large, intense wildfires. Debate exists regarding fuel reduction to prevent such fires in wildland areas, but the effects of these fires on fauna are not well understood. We studied whether fire severity and distance from unburned fire perimeter influenced recovery of the...
46. Photographic copy of photograph, dated 21 August 1972 (original ...
46. Photographic copy of photograph, dated 21 August 1972 (original print in possession of CSSD-HO, Huntsville, AL). Photographer unknown. View from below of the sloping perimeter acquisition radar building face or "radar eye", emphasizing a portion of the over 6,800 radar penetrations - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
Digital imaging of patterns of dental wear to diagnose bruxism in children.
Restrepo, C; Peláez, A; Alvarez, E; Paucar, C; Abad, P
2006-07-01
The aim of this study was to evaluate and compare the area, perimeter, and form (D factor and fractal dimension) of the dental wear among bruxist and nonbruxist children with mixed dentition in order to determine if the dental wear may be used as criteria to diagnose bruxism. The children were 8 to 11 years old and were classified as bruxist or nonbruxist, according to anxiety level and temporomandibular disorders. Dental casts of the upper arch were obtained for the bruxist (n = 24) and the control (n = 29) group. The dental wear was measured in digital format and processed automatically. The complete and pathological dental wear was compared between the two groups, using the Student's t-test and Mann-Whitney test. Statistically significant differences were observed between the two groups, with a higher area, perimeter, and more irregular form of the pathological dental wear among the bruxist group. Regarding complete dental wear, differences were only significant for the D factor (an un-dimensional quantitative parameter which produces a relation between the area and the perimeter of an object). Digital imaging of dental wear may be used as criteria to diagnose bruxism in children with mixed dentition after making an analysis of the area, perimeter, and irregularity of the form of pathological dental wear.
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.
2018-01-01
We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.
Invisible Security Printing on Photoresist Polymer Readable by Terahertz Spectroscopy.
Shin, Hee Jun; Lim, Min-Cheol; Park, Kisang; Kim, Sae-Hyung; Choi, Sung-Wook; Ok, Gyeongsik
2017-12-06
We experimentally modulate the refractive index and the absorption coefficient of an SU-8 dry film in the terahertz region by UV light (362 nm) exposure with time dependency. Consequently, the refractive index of SU-8 film is increased by approximately 6% after UV light exposure. Moreover, the absorption coefficient also changes significantly. Using the reflective terahertz imaging technique, in addition, we can read security information printed by UV treatment on an SU-8 film that is transparent in the visible spectrum. From these results, we successfully demonstrate security printing and reading by using photoresist materials and the terahertz technique. This investigation would provide a new insight into anti-counterfeiting applications in fields that need security.
Cyber Security for Lighting Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Fact sheet discusses cyber threats unique to lighting control systems in buildings and helps facility managers identify the types of lighting control systems that could introduce cybersecurity risks. Download the fact sheet.
14 CFR 1203.304 - Internal effect.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...
14 CFR 1203.304 - Internal effect.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...
ERIC Educational Resources Information Center
Mahaffey, Michael L.; McKillip, William D.
This manual is designed for teachers using the Career Oriented Mathematics units on owning an automobile and driving as a career, retail sales, measurement, and area-perimeter. The volume begins with a discussion of the philosophy and scheduling of the program which is designed to improve students' attitudes and ability in computation by…
Top scientists join Stephen Hawking at Perimeter Institute
NASA Astrophysics Data System (ADS)
Banks, Michael
2009-03-01
Nine leading researchers are to join Stephen Hawking as visiting fellows at the Perimeter Institute for Theoretical Physics in Ontario, Canada. The researchers, who include string theorists Leonard Susskind from Stanford University and Asoka Sen from the Harisch-Chandra Research Institute in India, will each spend a few months of the year at the institute as "distinguished research chairs". They will be joined by another 30 scientists to be announced at a later date.
Perimeter intrusion detection and assessment system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eaton, M.J.; Jacobs, J.; McGovern, D.E.
1977-11-01
To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.
ERIC Educational Resources Information Center
Kaplan, Defne Öcal
2016-01-01
In this study, it's aimed to evaluate the relation between dominant and non-dominant hand perimeters and handgrip strength of basketball, volleyball, badminton and handball athletes. Totally 101 active athletes (49 females, 52 male), of the average age in female 20±1.42 years, in male 21±1.99 years, joined to this study. Height, body weight, BMI…
NASA Astrophysics Data System (ADS)
Shi, Guohua; Wang, Fei; Li, Xiqi; Lu, Jing; Ding, Zhihua; Sun, Xinghuai; Jiang, Chunhui; Zhang, Yudong
2012-01-01
We have used anterior segment swept source optical coherence tomography to measure Schlemm's canal (SC) morphometric values in the living human eye. Fifty healthy volunteers with 100 normal eyes were measured in the nasal and temporal side. Comparison with the published SC morphometric values of histologic sections proves the reliability of our results. The statistical results show that there are no significant differences between nasal and temporal SC with respect to their diameter, perimeter, and area in our study (diameter: t=0.122, p=0.903; perimeter: t=-0.003, p=0.998; area: t=-1.169, p=0.244); further, no significant differences in SC morphometric values are found between oculus sinister and oculus dexter (diameter: t=0.943, p=0.35; perimeter: t=1.346, p=0.18; area: t=1.501, p=0.135).
2002-06-01
NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS WHAT PRACTICES IN AIRPORT SECURITY SHOULD THE UNITED STATES IMPLEMENT AT...COVERED Master’s Thesis 4. TITLE AND SUBTITLE What Practices in Airport Security Should the United States Implement at Commercial...complacency and conflicts of interest. 14. SUBJECT TERMS Airport Security , Aviation Security Systems, Terrorism, Hijacking
How the Energy Independence and Security Act of 2007 Affects Light Bulbs
Inefficient light bulbs are being phased out under the New Light Bulb Law. It does not sweepingly ban incandescent bulbs, just those not energy efficient (with some exemptions). It also includes many provisions not pertaining to lighting.
The Security Factor in School Renovations.
ERIC Educational Resources Information Center
Fickes, Michael
1998-01-01
Discusses how one Indiana high school used its renovation as an opportunity to reevaluate the school's security design. Security considerations in the building's external and internal environment include lighting, directional signage, parking, access control technology, and issues regarding the use of closed circuit television. (GR)
46 CFR 112.43-15 - Emergency lighting feeders.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Emergency lighting feeders. 112.43-15 Section 112.43-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-15 Emergency lighting feeders. For a vessel with...
46 CFR 112.43-13 - Navigation light indicator panel supply.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Navigation light indicator panel supply. 112.43-13 Section 112.43-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-13 Navigation light indicator panel...
46 CFR 112.43-15 - Emergency lighting feeders.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Emergency lighting feeders. 112.43-15 Section 112.43-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-15 Emergency lighting feeders. For a vessel with...
46 CFR 112.43-13 - Navigation light indicator panel supply.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Navigation light indicator panel supply. 112.43-13 Section 112.43-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-13 Navigation light indicator panel...
46 CFR 112.43-13 - Navigation light indicator panel supply.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Navigation light indicator panel supply. 112.43-13 Section 112.43-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-13 Navigation light indicator panel...
46 CFR 112.43-13 - Navigation light indicator panel supply.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Navigation light indicator panel supply. 112.43-13 Section 112.43-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-13 Navigation light indicator panel...
46 CFR 112.43-15 - Emergency lighting feeders.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Emergency lighting feeders. 112.43-15 Section 112.43-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-15 Emergency lighting feeders. For a vessel with...
46 CFR 112.43-15 - Emergency lighting feeders.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Emergency lighting feeders. 112.43-15 Section 112.43-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-15 Emergency lighting feeders. For a vessel with...
46 CFR 112.43-15 - Emergency lighting feeders.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Emergency lighting feeders. 112.43-15 Section 112.43-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-15 Emergency lighting feeders. For a vessel with...
46 CFR 112.43-13 - Navigation light indicator panel supply.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Navigation light indicator panel supply. 112.43-13 Section 112.43-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-13 Navigation light indicator panel...
46 CFR 169.738 - Emergency lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Emergency lights. 169.738 Section 169.738 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.738 Emergency lights. Each emergency light...
46 CFR 169.738 - Emergency lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Emergency lights. 169.738 Section 169.738 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.738 Emergency lights. Each emergency light...
46 CFR 169.738 - Emergency lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Emergency lights. 169.738 Section 169.738 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.738 Emergency lights. Each emergency light...
46 CFR 169.738 - Emergency lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Emergency lights. 169.738 Section 169.738 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.738 Emergency lights. Each emergency light...
46 CFR 169.738 - Emergency lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Emergency lights. 169.738 Section 169.738 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.738 Emergency lights. Each emergency light...
Parker, Gene W.; Armstrong, David S.; Richards, Todd A.
2004-01-01
Four methods used to determine streamflow requirements for habitat protection at nine critical riffle reaches in the Assabet River and Charles River Basins were compared. The methods include three standard setting techniques?R2Cross, Wetted Perimeter, and Tennant?and a diagnostic method, the Range of Variability Approach. One study reach is on the main stem of the Assabet River, four reaches are on tributaries to the Assabet River (Cold Harbor Brook, Danforth Brook, Fort Meadow Brook, and Elizabeth Brook), three are on the main stem of the Charles River, and one is on a tributary to the Charles River (Mine Brook). The strength of the R2Cross and Wetted-Perimeter methods is that they may be applied at ungaged locations whereas the Tennant method and the Range of Variability Approach require a period of streamflow record for analysis. Fish community assessments conducted at or near riffle sites in flowing reaches of the Assabet River and Charles River Basins were used to indicate ecological conditions. The fish communities in the main stem and tributary reaches of both the Assabet and Charles River Basins indicated degraded aquatic ecosystems. However, the degree of degradation differs between the two basins. The extreme predominance of tolerant, generalist species in the Charles River fish community demon-strates the cumulative impacts of flow, habitat, and water-chemistry degradation, combined with the effects of nearby impoundments and changing land use. The range of discharges for nine ungaged riffle reaches defined by the median R2Cross 3-of-3 criteria, R2Cross 2-of-3 criteria, and Wetted-Perimeter streamflow requirements, was 0.86 cubic foot per second per square mile, 0.18 cubic foot per second per square mile, and 0.23 cubic foot per second per square mile, respectively. Application of R2Cross and Wetted-Perimeter methods to sites with altered streamflows or at sites that are riffles only at low to moderate flows can result in a greater variability of streamflow requirements than would result if the methods were applied to riffles on natural channels with unaltered streamflows. The R2Cross 2-of-3 criteria and the Wetted-Perimeter streamflow requirements for the Assabet and Charles River sites show narrower interquartile ranges and lower median streamflow requirements than for 10 index streamflow-gaging stations in southern New England. This is especially evident for the R2Cross 2-of-3 criteria and Wetted-Perimeter results that were close to half of the flow requirements determined at the 10 southern New England stations. The R2Cross and Wetted-Perimeter methods were also compared to the Range of Variability Approach analysis and the Tennant Method. The median R2Cross 3-of-3 criteria streamflow requirement for the nine riffles is close to the 75th percentile of the monthly mean flows during the summer low-flow period from six streamflow-gaging stations near the Assabet and Charles River Basins having mostly unaltered flow. This streamflow requirement is close to the median Tennant 40-percent-flow requirement for good habitat condi-tion for the same six nearby stations. The R2Cross 2-of-3 criteria and Wetted-Perimeter results were less than the 25th-percentile of monthly mean flows during the summer months for the six stations. These streamflow requirements are in the poor habitat range as indicated by a Tennant analysis of the same six stations. These comparisons indicate that the R2Cross and Wetted-Perimeter methods underestimate streamflow requirements when applied to sites in smaller drainage areas and channels that are runs at higher flows.
Inflatable containment diaphragm for sealing and removing stacks
Meskanick, G.R.; Rosso, D.T.
1993-04-13
A diaphragm with an inflatable torus-shaped perimeter is used to seal at least one end of a stack so that debris that might be hazardous will not be released during removal of the stack. A diaphragm is inserted and inflated in the lower portion of a stack just above where the stack is to be cut such that the perimeter of the diaphragm expands and forms a seal against the interior surface of the stack.
Inflatable containment diaphragm for sealing and removing stacks
Meskanick, Gerald R.; Rosso, David T.
1993-01-01
A diaphragm with an inflatable torus-shaped perimeter is used to seal at least one end of a stack so that debris that might be hazardous will not be released during removal of the stack. A diaphragm is inserted and inflated in the lower portion of a stack just above where the stack is to be cut such that the perimeter of the diaphragm expands and forms a seal against the interior surface of the stack.
Environmental Assessment for Kirtland Air Force Base Perimeter Fencing
2004-07-01
Xylene, Styrene, Toluene, Methyl ethyl ketone, 1,3-Butadiene, Phenol, Propionaldehyde, n-Hexane, Chlorobenzene, Cumene, 1,1,2-Trichloroethane, 2,2,4...piñon-juniper community ranges in elevation from 6,300 to 7,700 feet. This dominant plant community is composed of Colorado piñon pine ( Pinus edulis...Kirtland AFB Perimeter Fencing EA 3-21 Final - July 2004 Ponderosa pine ( Pinus ponderosa) forests occur in the upper elevations, usually above 7,700 feet
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2013 CFR
2013-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2014 CFR
2014-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2012 CFR
2012-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
Simple Patchy-Based Simulators Used to Explore Pondscape Systematic Dynamics
Fang, Wei-Ta; Chou, Jui-Yu; Lu, Shiau-Yun
2014-01-01
Thousands of farm ponds disappeared on the tableland in Taoyuan County, Taiwan since 1920s. The number of farm ponds that have disappeared is 1,895 (37%), 2,667 ponds remain (52%), and only 537 (11%) new ponds were created within a 757 km2 area in Taoyuan, Taiwan between 1926 and 1960. In this study, a geographic information system (GIS) and logistic stepwise regression model were used to detect pond-loss rates and to understand the driving forces behind pondscape changes. The logistic stepwise regression model was used to develop a series of relationships between pondscapes affected by intrinsic driving forces (patch size, perimeter, and patch shape) and external driving forces (distance from the edge of the ponds to the edges of roads, rivers, and canals). The authors concluded that the loss of ponds was caused by pond intrinsic factors, such as pond perimeter; a large perimeter increases the chances of pond loss, but also increases the possibility of creating new ponds. However, a large perimeter is closely associated with circular shapes (lower value of the mean pond-patch fractal dimension [MPFD]), which characterize the majority of newly created ponds. The method used in this study might be helpful to those seeking to protect this unique landscape by enabling the monitoring of patch-loss problems by using simple patchy-based simulators. PMID:24466281
Design of complex bone internal structure using topology optimization with perimeter control.
Park, Jaejong; Sutradhar, Alok; Shah, Jami J; Paulino, Glaucio H
2018-03-01
Large facial bone loss usually requires patient-specific bone implants to restore the structural integrity and functionality that also affects the appearance of each patient. Titanium alloys (e.g., Ti-6Al-4V) are typically used in the interfacial porous coatings between the implant and the surrounding bone to promote stability. There exists a property mismatch between the two that in general leads to complications such as stress-shielding. This biomechanical discrepancy is a hurdle in the design of bone replacements. To alleviate the mismatch, the internal structure of the bone replacements should match that of the bone. Topology optimization has proven to be a good technique for designing bone replacements. However, the complex internal structure of the bone is difficult to mimic using conventional topology optimization methods without additional restrictions. In this work, the complex bone internal structure is recovered using a perimeter control based topology optimization approach. By restricting the solution space by means of the perimeter, the intricate design complexity of bones can be achieved. Three different bone regions with well-known physiological loadings are selected to illustrate the method. Additionally, we found that the target perimeter value and the pattern of the initial distribution play a vital role in obtaining the natural curvatures in the bone internal structures as well as avoiding excessive island patterns. Copyright © 2018 Elsevier Ltd. All rights reserved.
Luo, Lingying; Guo, Dandan; Zhou, Guanghong; Chen, Kunjie
2018-04-01
Researchers nowadays have paid much attention to the relationships between tenderness and marbling, or physiological age. While the marbling was mainly evaluated qualitatively with scores or grades, and rarely related with physiological age. Present study was carried out to analyze the marbling features of longissimus dorsi muscle between the 12th and 13th ribs from 18, 36, 54 and 72 months old Simmental steers were quantitatively described with area and perimeter using computer vision technique. Relationship between Warner-Bratzler Shear force (WBSF), physiological age and the marbling features were examined performing regression analysis. The results revealed that WBSF positively correlated with physiological age, but negatively with marbling area and perimeter. Regression analysis showed that the relationship between the shear force and the steers' age was more close to the quadratic curve (R 2 = 0.996) and exponential curve (R 2 = 0.957). It was observed during study that marbling grew with steers age. Marbling features were in linear correlation with the steers' age, with R 2 = 0.927 for marbling area and R 2 = 0.935 for marbling perimeter. The industries in future may speculate beef tenderness and physiological age based on the marbling features (area and perimeter), which can be determined through the online image acquisition system and image processing.
Carcass and meat quality traits in Nellore and F1 Nellore-Araguaia crosses.
Costa, N V; Aboujaoude, C; Vieira, G S; Paiva, V V; Moraes Neto, R A; Gondim, V S; Alves, L R; Torres, M C L; Antunes, R C
2015-05-22
We evaluated and compared carcass traits and meat quality in Nellore cattle and F1 crosses between Nellore and Araguaia, where 17 individuals were from the Nellore group and 19 were ½ Nellore and ½ Araguaia crosses. All animals belonged to the same birth season and were raised in pasture systems under the same nutritional, environmental, and management conditions. When the animals reached slaughter weight, they were taken to an industrial slaughterhouse where food was not provided for 24 h (free access to water); they were then stunned, bled, the leather was removed, and they were eviscerated. The carcasses were weighed (hot weight), kept in chilled storage for approximately 24 h at 4°C, and weighed again to obtain the chilled carcass weight. Carcass yield, carcass length, carcass width, leg length, thigh perimeter, loin eye area (LEA), retail cuts, cooling loss, pH, fat depth, marbling rate, intramuscular fat, color, and shear force were analyzed and sensory analysis of the meat was conducted. Significant differences (P < 0.05) were observed for the following variables: slaughter weight, hot and chilled carcass weights, carcass and leg lengths, thigh perimeter, LEA, retail cuts, and lightness (L*), where the ½ Nellore ½ Araguaia individuals showed higher means for all of these traits, except leg length and L*. Therefore, crossbreeding between Nellore and Araguaia did not affect the meat's sensory characteristics, but contributed to an improvement in carcass traits, providing an alternative for farmers that aim for good meat quality, with a higher meat percentage.
Morphometric Study of the Mare Oviductal Mucosa at Different Reproductive Stages.
Mouguelar, Horacio; Díaz, Tomás; Borghi, Damiana; Quinteros, Rolando; Bonino, Facundo; Apichela, Silvana Andrea; Aguilar, José Javier
2015-11-01
The objectives of this work were to describe some morphometric characteristics and to establish quantitative parameters of different regions of the equine oviductal mucosa from the isthmus, ampullary-isthmic junction (AIJ), and ampulla. Twenty-one mixed-bred mares were used for this study. Mares were selected in the following reproductive phases: anestrus, estrus, and diestrus. The left oviducts were examined with light microscopy, and rights ones were studied through the intraoviductal molds. The isthmus showed the smallest luminal area, mucosal area, epithelial perimeter, and luminal diameter. On the molds surfaces, some grooves extended as longitudinal canals, reducing their depth as they approached to the AIJ. Several small height projections, some obliquely positioned towards utero-tubal junction, were observed in all reproductive phases. These formations may represent pockets or cul-de-sacs in the basal areas of the epithelial folds. The AIJ mucosa gradually changed from the smooth isthmic region toward highly folded ampulla. The number and complexity of epithelial folds showed moderate increase in the same way that many of the morphometric parameters. Multiple curves were observed on the molds of the AIJ, creating a zigzag path in the oviductal lumen. In the ampulla, the high branched epithelial folds occupied most of the lumen, leaving a small luminal area free. A linear relationship between epithelial perimeter and mucosal area was found. The presence of glandular-like structures was observed in all the reproductive stages studied. The equine endosalpinx reveals a highly complex tridimensional arrangement where each region shows very particular and specific designs. © 2015 Wiley Periodicals, Inc.
46 CFR 120.410 - Lighting fixtures.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Each table lamp, desk lamp, floor lamp, or similar equipment must be secured in place so that it cannot... Fixtures,” UL 1571, “Incandescent Lighting Fixtures,” UL 1572, “High Intensity Discharge Lighting Fixtures...
75 FR 61786 - Northern Lights Fund Trust, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
...] Northern Lights Fund Trust, et al.; Notice of Application September 30, 2010. AGENCY: Securities and... certain financial instruments. Applicants: Northern Lights Fund Trust (``NLFT''), Arrow Investment Advisors, LLC (``AIA''), and Northern Lights Distributors, LLC (``NLD''). Filing Dates: The application was...
46 CFR 111.75-20 - Lighting fixtures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-20 Lighting fixtures. (a) The construction of each... connection box for a circuit other than the branch circuit supplying the fixture. (d) Lighting fixtures must...
46 CFR 129.410 - Lighting fixtures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS ELECTRICAL... electrical system operating at more than 50 volts must comply with UL 595, “Marine Type Electric Lighting... comply with UL 57, “Electric Lighting Fixtures,” UL 1570, “Fluorescent Lighting Fixtures,” UL 1571...
33 CFR 183.810 - Navigation light certification requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Navigation light certification... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Navigation Lights § 183.810 Navigation light certification requirements. (a) Except as provided by paragraph (b) of this section, each...
33 CFR 183.810 - Navigation light certification requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Navigation light certification... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Navigation Lights § 183.810 Navigation light certification requirements. (a) Except as provided by paragraph (b) of this section, each...
33 CFR 183.810 - Navigation light certification requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Navigation light certification... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Navigation Lights § 183.810 Navigation light certification requirements. (a) Except as provided by paragraph (b) of this section, each...
33 CFR 183.810 - Navigation light certification requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Navigation light certification... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Navigation Lights § 183.810 Navigation light certification requirements. (a) Except as provided by paragraph (b) of this section, each...
Whispering-Gallery-Mode Tunable Narrow-Band-Pass Filter
NASA Technical Reports Server (NTRS)
Savchenkov, Anatoliy; Iltchenko, Vladimir; Matsko, Andrey; Maleki, Lute
2004-01-01
An experimental tunable, narrow-band-pass electro-optical filter is based on a whispering-gallery resonator. This device is a prototype of tunable filters needed for the further development of reconfigurable networking wavelength-division multiplexers and communication systems that utilize radio-frequency (more specifically, microwave) subcarrier signals on optical carrier signals. The characteristics of whispering-gallery resonators that make them attractive for such applications include high tuning speed, compactness, wide tuning range, low power consumption, and compatibility with single-mode optical fibers. In addition, relative to Fabry-Perot resonators, these devices offer advantages of greater robustness and lower cost. As described in several prior NASA Tech Briefs articles, a whispering-gallery resonator is a spheroidal, disk-like, or toroidal body made of a highly transparent material. It is so named because it is designed to exploit whispering-gallery electromagnetic modes, which are waveguide modes that propagate circumferentially and are concentrated in a narrow toroidal region centered on the equatorial plane and located near the outermost edge. The experimental whispering-gallery tunable filter (see figure) is made from a disk of Z-cut LiNbO3 of 4.8-mm diameter and 0.17-mm thickness. The perimeter of the disk is rounded to a radius of curvature of 100 m. Metal coats on the flat faces of the disk serve as electrodes for exploiting the electro-optical effect in LiNbO3 for tuning. There is no metal coat on the rounded perimeter region, where the whispering-gallery modes propagate. Light is coupled from an input optical fiber into the whispering-gallery modes by means of a diamond prism. Another diamond prism is used to couple light from the whispering-gallery modes to an output optical fiber. This device is designed and operated to exploit transverse magnetic (TM) whispering- gallery modes, rather than transverse electric (TE) modes because the resonance quality factors (Q values) of the TM modes are higher. If Q values were not of major concern, it would be better to use the TE modes because the electro-optical shifts of the TE modes are 3 times those of the TM modes.
ERIC Educational Resources Information Center
Abdulfattah, Azza Khalil; Badawood, Asma Saeid
2017-01-01
The current study aims to verify the impact of children's secure attachment to their mothers on their mastery motivation in the light of the dependence on domestic workers' phenomenon in the Saudi society. To achieve the goals of the study, a random sample of Saudi children was selected from Riyadh city in Saudi Arabia, whose favorable economic…
Between security and military identities: The case of Israeli security experts.
Grassiani, Erella
2018-02-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.
Between security and military identities: The case of Israeli security experts
Grassiani, Erella
2018-01-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228
33 CFR 118.70 - Lights on swing bridges.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Lights on swing bridges. 118.70 Section 118.70 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.70 Lights on swing bridges. (a) Swing span lights on through bridges. Each...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-1 Purpose. The purpose of this subpart is to define types of emergency lighting and power systems. ...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-1 Purpose. The purpose of this subpart is to define types of emergency lighting and power systems. ...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-1 Purpose. The purpose of this subpart is to define types of emergency lighting and power systems. ...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-1 Purpose. The purpose of this subpart is to define types of emergency lighting and power systems. ...
46 CFR 111.75-1 - Lighting feeders.
Code of Federal Regulations, 2010 CFR
2010-10-01
... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-1 Lighting feeders. (a) Passenger vessels. On a... lighting, feeders, and branch circuits are in subpart 112.43 of this chapter. [CGD 74-125A, 47 FR 15236...
46 CFR 111.75-16 - Lighting of survival craft and rescue boats.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Section 111.75-16 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-16 Lighting of survival... be adequately illuminated by lighting supplied from the emergency power source. (b) The arrangement...
46 CFR 196.37-25 - Emergency lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Emergency lights. 196.37-25 Section 196.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-25 Emergency lights. (a) All emergency lights...
46 CFR 169.691 - Navigation lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Navigation lights. 169.691 Section 169.691 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS... lights. Navigation light systems must meet the requirements of § 111.75-17 of this chapter except the...
46 CFR 196.37-25 - Emergency lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Emergency lights. 196.37-25 Section 196.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-25 Emergency lights. (a) All emergency lights...
46 CFR 196.37-25 - Emergency lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Emergency lights. 196.37-25 Section 196.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-25 Emergency lights. (a) All emergency lights...
46 CFR 196.37-25 - Emergency lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Emergency lights. 196.37-25 Section 196.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-25 Emergency lights. (a) All emergency lights...
46 CFR 169.691 - Navigation lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Navigation lights. 169.691 Section 169.691 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS... lights. Navigation light systems must meet the requirements of § 111.75-17 of this chapter except the...
46 CFR 169.691 - Navigation lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Navigation lights. 169.691 Section 169.691 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS... lights. Navigation light systems must meet the requirements of § 111.75-17 of this chapter except the...
46 CFR 196.37-25 - Emergency lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Emergency lights. 196.37-25 Section 196.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-25 Emergency lights. (a) All emergency lights...
46 CFR 169.691 - Navigation lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Navigation lights. 169.691 Section 169.691 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS... lights. Navigation light systems must meet the requirements of § 111.75-17 of this chapter except the...
46 CFR 169.691 - Navigation lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Navigation lights. 169.691 Section 169.691 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS... lights. Navigation light systems must meet the requirements of § 111.75-17 of this chapter except the...
Jet engine nozzle exit configurations and associated systems and methods
NASA Technical Reports Server (NTRS)
Mengle, Vinod G. (Inventor)
2011-01-01
Nozzle exit configurations and associated systems and methods are disclosed. An aircraft system in accordance with one embodiment includes a jet engine exhaust nozzle having an internal flow surface and an exit aperture, with the exit aperture having a perimeter that includes multiple projections extending in an aft direction. Aft portions of individual neighboring projections are spaced apart from each other by a gap, and a geometric feature of the multiple can change in a monotonic manner along at least a portion of the perimeter.
Jet Engine Nozzle Exit Configurations and Associated Systems and Methods
NASA Technical Reports Server (NTRS)
Mengle, Vinod G. (Inventor)
2013-01-01
Nozzle exit configurations and associated systems and methods are disclosed. An aircraft system in accordance with one embodiment includes a jet engine exhaust nozzle having an internal flow surface and an exit aperture, with the exit aperture having a perimeter that includes multiple projections extending in an aft direction. Aft portions of individual neighboring projections are spaced apart from each other by a gap, and a geometric feature of the multiple can change in a monotonic manner along at least a portion of the perimeter.
1. View toward south, facade (north side or "A" wall) ...
1. View toward south, facade (north side or "A" wall) of perimeter acquisition radar building. The globe on the upper left is a shelter housing the Hercules tracker antenna. To the right is the utility tunnel leading to the par power plant. The antennae for the par are contained in the large lighter-toned shape covering most of the wall - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
ERIC Educational Resources Information Center
California State Dept. of Education, Sacramento.
This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…
Building Security and Personal Safety. SPEC Kit 150.
ERIC Educational Resources Information Center
Bingham, Karen Havill
This report on a survey of Association of Research Libraries (ARL) member libraries on building security and personal safety policies examines three areas in detail: (1) general building security (access to the building, key distribution, patrols or monitors, intrusion prevention, lighting, work environment after dark); (2) problem behavior…
Dental arch changes associated with rapid maxillary expansion: A retrospective model analysis study
D’Souza, Ivor M; Kumar, H. C. Kiran; Shetty, K. Sadashiva
2015-01-01
Introduction: Transverse deficiency of the maxilla is a common clinical problem in orthodontics and dentofacial orthopedics. Transverse maxillary deficiency, isolated or associated with other dentofacial deformities, results in esthetic and functional impairment giving rise to several clinical manifestations such as asymmetrical facial growth, positional and functional mandibular deviations, altered dentofacial esthetics, adverse periodontal responses, unstable dental tipping, and other functional problems. Orthopedic maxillary expansion is the preferred treatment approach to increase the maxillary transverse dimension in young patients by splitting of the mid palatal suture. This orthopedic procedure has lately been subject of renewed interest in orthodontic treatment mechanics because of its potential for increasing arch perimeter to alleviate crowding in the maxillary arch without adversely affecting facial profile. Hence, the present investigation was conducted to establish a correlation between transverse expansion and changes in the arch perimeter, arch width and arch length. Methods: For this purpose, 10 subjects (five males, five females) were selected who had been treated by rapid maxillary expansion (RME) using hyrax rapid palatal expander followed by fixed mechanotherapy (PEA). Pretreatment (T1), postexpansion (T2), and posttreatment (T3) dental models were compared for dental changes brought about by RME treatment and its stability at the end of fixed mechanotherapy. After model measurements were made, the changes between T1–T2, T2–T3 and T1–T3 were determined for each patient. The mean difference between T1–T2, T2–T3 and T1–T3 were compared to assess the effects of RME on dental arch measurements. Results are expressed as mean ± standard deviation and are compared by repeated measures analysis of variance followed by a post-hoc test. Arch perimeter changes are correlated with changes in arch widths at the canine, premolar and molar regions. Results: The intercanine arch width increased by 2.9 mm, inter first premolar width increased by 3.2 mm, inter second premolar width increased by 4.6 mm, intermolar width increased by 4.4 mm, arch perimeter increased by 3.2 mm, arch length decreased by 1.8 mm from pretreatment to posttreatment. There is a strong positive correlation of arch perimeter with intercanine width (r2 = 0.99), interpremolar width (r2 = 0.99) and intermolar width (r2 = 0.98), indicating that there is a significant increase in arch perimeter with increase in arch width at the canine, premolars and molar regions. Conclusion: Findings of this study demonstrate that there was a significant increase in the intercanine, inter first premolar, inter second premolar intermolar arch width and arch perimeter from pretreatment to postexpansion, which was stable at the end of fixed mechanotherapy (PEA). There was a nonsignificant decrease in arch length from pretreatment to postexpansion that further decreased nonsignificantly from postexpansion to posttreatment. PMID:25684912
33 CFR 118.110 - Daymarks and lateral lighting on bridges.
Code of Federal Regulations, 2011 CFR
2011-07-01
... bridges. 118.110 Section 118.110 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.110 Daymarks and lateral lighting on bridges. (a... through bridges with U.S. aids to navigation system lateral marks and lights installed on the...
46 CFR 111.75-5 - Lighting branch circuits.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Lighting branch circuits. 111.75-5 Section 111.75-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-5 Lighting branch circuits. (a) Loads. A...
33 CFR 118.110 - Daymarks and lateral lighting on bridges.
Code of Federal Regulations, 2010 CFR
2010-07-01
... bridges. 118.110 Section 118.110 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.110 Daymarks and lateral lighting on bridges. (a... through bridges with U.S. aids to navigation system lateral marks and lights installed on the...
46 CFR 111.75-18 - Signaling lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Signaling lights. 111.75-18 Section 111.75-18 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-18 Signaling lights. Each self-propelled vessel over 150...
46 CFR 108.639 - Emergency lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Emergency lights. 108.639 Section 108.639 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.639 Emergency lights. Each emergency light must be marked: “E”. ...
46 CFR 78.47-33 - Emergency lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 3 2010-10-01 2010-10-01 false Emergency lights. 78.47-33 Section 78.47-33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-33 Emergency lights. (a) All emergency lights shall be marked...
46 CFR 97.37-25 - Emergency lights.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Emergency lights. 97.37-25 Section 97.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-25 Emergency lights. (a) All emergency lights shall...
46 CFR 97.37-25 - Emergency lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Emergency lights. 97.37-25 Section 97.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-25 Emergency lights. (a) All emergency lights shall...
46 CFR 108.639 - Emergency lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Emergency lights. 108.639 Section 108.639 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.639 Emergency lights. Each emergency light must be marked: “E”. ...
46 CFR 111.75-18 - Signaling lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Signaling lights. 111.75-18 Section 111.75-18 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-18 Signaling lights. Each self-propelled vessel over 150...
46 CFR 97.37-25 - Emergency lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Emergency lights. 97.37-25 Section 97.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-25 Emergency lights. (a) All emergency lights shall...
46 CFR 111.75-18 - Signaling lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Signaling lights. 111.75-18 Section 111.75-18 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-18 Signaling lights. Each self-propelled vessel over 150...
46 CFR 78.47-33 - Emergency lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 3 2012-10-01 2012-10-01 false Emergency lights. 78.47-33 Section 78.47-33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-33 Emergency lights. (a) All emergency lights shall be marked...
46 CFR 97.37-25 - Emergency lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Emergency lights. 97.37-25 Section 97.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-25 Emergency lights. (a) All emergency lights shall...
46 CFR 78.47-33 - Emergency lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 3 2013-10-01 2013-10-01 false Emergency lights. 78.47-33 Section 78.47-33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-33 Emergency lights. (a) All emergency lights shall be marked...
46 CFR 78.47-33 - Emergency lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 3 2014-10-01 2014-10-01 false Emergency lights. 78.47-33 Section 78.47-33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-33 Emergency lights. (a) All emergency lights shall be marked...
46 CFR 111.75-18 - Signaling lights.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Signaling lights. 111.75-18 Section 111.75-18 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-18 Signaling lights. Each self-propelled vessel over 150...
46 CFR 111.75-18 - Signaling lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Signaling lights. 111.75-18 Section 111.75-18 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Lighting Circuits and Protection § 111.75-18 Signaling lights. Each self-propelled vessel over 150...
46 CFR 108.639 - Emergency lights.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Emergency lights. 108.639 Section 108.639 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.639 Emergency lights. Each emergency light must be marked: “E”. ...
46 CFR 97.37-25 - Emergency lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Emergency lights. 97.37-25 Section 97.37-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-25 Emergency lights. (a) All emergency lights shall...
46 CFR 108.639 - Emergency lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Emergency lights. 108.639 Section 108.639 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.639 Emergency lights. Each emergency light must be marked: “E”. ...
46 CFR 108.639 - Emergency lights.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Emergency lights. 108.639 Section 108.639 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.639 Emergency lights. Each emergency light must be marked: “E”. ...
46 CFR 78.47-33 - Emergency lights.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 3 2011-10-01 2011-10-01 false Emergency lights. 78.47-33 Section 78.47-33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-33 Emergency lights. (a) All emergency lights shall be marked...
Intelligent hand-portable proliferation sensing system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dieckman, S.L.; Bostrom, G.A.; Waterfield, L.G.
1997-08-01
Argonne National Laboratory, with support from DOE`s Office of Nonproliferation and National Security, is currently developing an intelligent hand-portable sensor system. This system is designed specifically to support the intelligence community with the task of in-field sensing of nuclear proliferation and related activities. Based upon pulsed laser photo-ionization time-of-flight mass spectrometry technology, this novel sensing system is capable of quickly providing a molecular or atomic analysis of specimens. The system is capable of analyzing virtually any gas phase molecule, or molecule that can be induced into the gas phase by (for example) sample heating. This system has the unique advantagesmore » of providing unprecedented portability, excellent sensitivity, tremendous fieldability, and a high performance/cost ratio. The system will be capable of operating in a highly automated manner for on-site inspections, and easily modified for other applications such as perimeter monitoring aboard a plane or drone. The paper describes the sensing system.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1999-09-28
Since the completion of remedial activities at the site, the Quincy landfill 2 and 3 site poses no apparent public health hazard. No one is currently exposed to contamination at the site. Any past exposure would not have been at levels of health concern. Based on current conditions, IDPH recommends that the Quincy Landfill 2 and 3 participating respondents group: Encourage the homeowner 1/2 mile west of the site to connect to Mill Creek Public Water supply and to seal the private well to eliminate possible exposure to site-related contaminants in groundwater; provide groundwater containment and treatment if groundwater cleanupmore » levels are not met and maintained; continue proper maintenance of the leachate collection system and tank; maintain the landfill cap, particularly to address any erosion that occurs; and maintain a 6-foot-high security fence around the perimeter of the site to prevent trespassing.« less
Thermodynamic aspects of an LNG tank in fire and experimental validation
NASA Astrophysics Data System (ADS)
Hulsbosch-Dam, Corina; Atli-Veltin, Bilim; Kamperveen, Jerry; Velthuis, Han; Reinders, Johan; Spruijt, Mark; Vredeveldt, Lex
Mechanical behaviour of a Liquefied Natural Gas (LNG) tank and the thermodynamic behaviour of its containment under extreme heat load - for instance when subjected to external fire source as might occur during an accident - are extremely important when addressing safety concerns. In a scenario where external fire is present and consequent release of LNG from pressure relief valves (PRV) has occurred, escalation of the fire might occur causing difficulty for the fire response teams to approach the tank or to secure the perimeter. If the duration of the tank exposure to fire is known, the PRV opening time can be estimated based on the thermodynamic calculations. In this paper, such an accidental scenario is considered, relevant thermodynamic equations are derived and presented. Moreover, an experiment is performed with liquid nitrogen and the results are compared to the analytical ones. The analytical results match very well with the experimental observations. The resulting analytical models are suitable to be applied to other cryogenic liquids.
Nacher, Víctor; Llombart, Cristina; Carretero, Ana; Navarro, Marc; Ysern, Pere; Calero, Sebastián; Fígols, Enric; Ruberte, Jesús
2007-01-01
Dissection is a very useful method of learning veterinary anatomy. However, formaldehyde, which is widely used to preserve cadavers, is an irritant, and it has recently been classified as a carcinogen. In 1997, the Instituto Nacional de Seguridad e Higiene en el Trabajo [National Institute of Workplace Security and Hygiene] found that the levels of formaldehyde in our dissection room were above the threshold limit values. Unfortunately, no optimal substitute for formaldehyde is currently available. Therefore, we designed a new ventilation system that combines slow propulsion of fresh air from above the dissection table and rapid aspiration of polluted air from the perimeter. Formaldehyde measurements performed in 2004, after the introduction of this new system into our dissection laboratory, showed a dramatic reduction (about tenfold, or 0.03 ppm). A suitable propelling/aspirating air system successfully reduces the concentration of formaldehyde in the dissection room, significantly improving safety conditions for students, instructors, and technical staff during gross anatomy learning.
Daylight operation of a free space, entanglement-based quantum key distribution system
NASA Astrophysics Data System (ADS)
Peloso, Matthew P.; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, Antía; Kurtsiefer, Christian
2009-04-01
Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.
Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism
NASA Astrophysics Data System (ADS)
Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu
2017-11-01
Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.
Solar granulation and statistical crystallography: A modeling approach using size-shape relations
NASA Technical Reports Server (NTRS)
Noever, D. A.
1994-01-01
The irregular polygonal pattern of solar granulation is analyzed for size-shape relations using statistical crystallography. In contrast to previous work which has assumed perfectly hexagonal patterns for granulation, more realistic accounting of cell (granule) shapes reveals a broader basis for quantitative analysis. Several features emerge as noteworthy: (1) a linear correlation between number of cell-sides and neighboring shapes (called Aboav-Weaire's law); (2) a linear correlation between both average cell area and perimeter and the number of cell-sides (called Lewis's law and a perimeter law, respectively) and (3) a linear correlation between cell area and squared perimeter (called convolution index). This statistical picture of granulation is consistent with a finding of no correlation in cell shapes beyond nearest neighbors. A comparative calculation between existing model predictions taken from luminosity data and the present analysis shows substantial agreements for cell-size distributions. A model for understanding grain lifetimes is proposed which links convective times to cell shape using crystallographic results.
Three perimeter effects in ferroelectric nanostructures
NASA Astrophysics Data System (ADS)
Ruediger, Andreas; Peter, Frank; Waser, Rainer
2006-03-01
As the lateral size of ferroelectric nanoislands is now well below 50 nm, the question of size effects becomes increasingly relevant. Three independent techniques provided data of pronounced ferroelectric features along the perimeter: impedance spectroscopy [1], piezoelectric force microscopy [2] and pyroelectric current sensing [3]. However, as we can show, all three observations are related to the measurement technique that interferes with the lateral confinement and still there is no direct evidence of a lateral size effect in ferroelectric nanostructures. We discuss some scenarios of further downscaling and possible consequences. [1]M.Dawber, D.J. Jung, J.F. Scott, “Perimeter effect in very small ferroelectrics“,Appl. Phys. Lett. 82, 436 (2003) [2 ]F. Peter, A. Ruediger, R. Dittmann, R. Waser, K. Szot, B. Reichenberg, K. Prume, “Analysis of shape effects on the piezoresponse in ferroelectric nanograins with and without adsorbates”, Applied Physics Letters, 87, 082901 (2005) [3] B.W. Peterson, S. Ducharme, V.M. Fridkin, “Mapping surface Polarization in thin films of the ferroelectric polymer P(VDF-TrFE)”,Ferroelectrics, 304, 51 (2004)
Identifying and tracking attacks on networks: C3I displays and related technologies
NASA Astrophysics Data System (ADS)
Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.
2003-09-01
Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
Anesthesiology and competitive strategy.
Gross, Wendy L; Gold, Barbara
2009-03-01
Whether we like it or not, medicine is big business. The argument is sometimes made that standard management strategies from the business world do not apply to medicine because the economics and practice of medicine are unique--driven by science and rapid rates of change. But an exploding knowledge base, light-speed technological development, and ever-changing reimbursement schemes are not exclusive to medicine and health care. Some fundamental principles of finance, business management, and strategic development have evolved to deal with problems of rapid change. These principles do apply to modern medicine. The business side of anesthesia practice is off-putting to many clinicians. However, knowledge of the market forces at play can help enhance patient care, improve service, expand opportunities, and extend the perimeter of the discipline. The mission and current market position of anesthesiology practice are considered here.
Strain Distribution in REBCO-Coated Conductors Bent With the Constant-Perimeter Geometry
Wang, Xiaorong; Arbelaez, Diego; Caspi, Shlomo; ...
2017-10-24
Here, cable and magnet applications require bending REBa 2Cu 3O 7-δ (REBCO, RE = rare earth) tapes around a former to carry high current or generate specific magnetic fields. With a high aspect ratio, REBCO tapes favor the bending along their broad surfaces (easy way) than their thin edges (hard way). The easy-way bending forms can be effectively determined by the constant-perimeter method that was developed in the 1970s to fabricate accelerator magnets with flat thin conductors. The method, however, does not consider the strain distribution in the REBCO layer that can result from bending. Therefore, the REBCO layer canmore » be overstrained and damaged even if it is bent in an easy way as determined by the constant-perimeter method. To address this issue, we developed a numerical approach to determine the strain in the REBCO layer using the local curvatures of the tape neutral plane. Two orthogonal strain components are determined: the axial component along the tape length and the transverse component along the tape width. These two components can be used to determine the conductor critical current after bending. The approach is demonstrated with four examples relevant for applications: a helical form for cables, forms for canted cos θ dipole and quadrupole magnets, and a form for the coil end design. The approach allows us to optimize the design of REBCO cables and magnets based on the constant-perimeter geometry and to reduce the strain-induced critical current degradation.« less
Strain Distribution in REBCO-Coated Conductors Bent With the Constant-Perimeter Geometry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Xiaorong; Arbelaez, Diego; Caspi, Shlomo
Here, cable and magnet applications require bending REBa 2Cu 3O 7-δ (REBCO, RE = rare earth) tapes around a former to carry high current or generate specific magnetic fields. With a high aspect ratio, REBCO tapes favor the bending along their broad surfaces (easy way) than their thin edges (hard way). The easy-way bending forms can be effectively determined by the constant-perimeter method that was developed in the 1970s to fabricate accelerator magnets with flat thin conductors. The method, however, does not consider the strain distribution in the REBCO layer that can result from bending. Therefore, the REBCO layer canmore » be overstrained and damaged even if it is bent in an easy way as determined by the constant-perimeter method. To address this issue, we developed a numerical approach to determine the strain in the REBCO layer using the local curvatures of the tape neutral plane. Two orthogonal strain components are determined: the axial component along the tape length and the transverse component along the tape width. These two components can be used to determine the conductor critical current after bending. The approach is demonstrated with four examples relevant for applications: a helical form for cables, forms for canted cos θ dipole and quadrupole magnets, and a form for the coil end design. The approach allows us to optimize the design of REBCO cables and magnets based on the constant-perimeter geometry and to reduce the strain-induced critical current degradation.« less
Stout, D M; Leidy, R B
2000-07-01
Methods have been developed to monitor the translocation of microencapsulated cyfluthrin following perimeter applications to residential dwellings. A pilot study was implemented to determine both the potential for application spray to drift away from dwellings and the intrusion of residues into homes following perimeter treatments. Residential monitoring included measuring spray drift using cellulose filter paper and the collection of soil samples from within the spray zone. In addition, interior air was monitored using fiberglass filter paper as a sorbent medium and cotton ball swabs were used to collect surface wipes. Fortification of matrixes resulted in recoveries of > 90%. Spray drift was highest at the point of application and declined to low but measurable levels 9.1 m from the foundations of dwellings. Soil residues declined to low, but measurable levels by 45 days post-application. No cyfluthrin was measured from indoor air; however, some interior surfaces had detectable levels of cyfluthrin until three days post-application. Findings indicate that spray drift resulting from perimeter applications might contaminate non-target surfaces outside the spray zone. Soil borne residues may serve as persistent sources for human exposure and potentially intrude into dwellings through the activities of occupants and pets. Residues do not appreciably translocate through air and consequently inhalation is not a likely route for human exposure. Surface residues detected indoors suggest that the physical movement of residues from the exterior to the interior might be a viable route of movement of residues following this type of application.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... Proposed Rule Change 1. Purpose (a) Background In light of well publicized securities frauds that resulted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64954; File No. SR-FINRA-2010-036] Self...-Case Referrals July 25, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... involves important physical modifications to the HNP, Unit 1 security system. There are several issues... in which some important security modifications are planned. A direct outside access route to the... implementation deadline, the licensee currently maintains a security system acceptable to the NRC and that will...
Towards Rural Land Use: Challenges for Oversizing Urban Perimeters in Shrinking Towns
NASA Astrophysics Data System (ADS)
Sá, João; Virtudes, Ana
2017-12-01
This article, based on the literature review, aims to study the challenges of the urban dispersion and oversizing of urban perimeters, in the cases where the towns are shrinking or spreading to the rural land-use. It is focused on the case of Portugal where during the last decades there was an escaping to the big cities alongside to the sea (Atlantic and Mediterranean) shore. In the Interior part of the country, which means near to the border with Spain, several towns are shrinking, despite their huge urban perimeters, proposed by the municipal master plans, since the middle of the nineties. Consequently, these urban perimeters are nowadays oversizing, with empty buildings and non-urbanized areas. At the same time, the social patterns of occupation of this territory have changed significantly, moving from a society with signs of rurality to an urban realm, understood not only in territorial terms but also regarding the current lifestyle. This deep changing has occurred not only in urbanistic terms but also in the economic, cultural and social organizations of the country, under a movement that corresponds to a decline of the small urban settlements in rural areas, far away from the cosmopolitan strip of land nearby the sea, in between the capital city, Lisbon and the second one Oporto. These transformations were not driven by any significant public policy for land-use actions. On the contrary, the production of urban areas, supporting the new model of economic and social development was largely left to the initiative of economic and social private agents and land owners. These agents were the leading responsible for the new urban developments and housing. In this sense, this research aims to present some strategies for the short time period regarding the devolution of urban areas to rural land use. In this sense, the next steps of spatial planning policies, under the role of local authorities (the 308 municipalities including Madeira and Azores islands, plus the continental part of the country), which are their main promoters, will be motivated by the need of advocating the swap of many urban areas towards the rural land use, shrinking many existent urban perimeters in depressed territories. How will the non-urbanized spaces, included in the urban perimeters, twenty years ago, by the pivotal instrument of spatial planning in Portugal, the Municipal Master Plans turn back to the rural land-use, losing their market value? This is the base of the challenges ahead, analysed in this article.
Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead
2017-03-28
connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in
46 CFR 112.01-5 - Manual emergency lighting and power system.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Manual emergency lighting and power system. 112.01-5 Section 112.01-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-5 Manual...
46 CFR 112.01-5 - Manual emergency lighting and power system.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Manual emergency lighting and power system. 112.01-5 Section 112.01-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-5 Manual...
46 CFR 112.01-5 - Manual emergency lighting and power system.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Manual emergency lighting and power system. 112.01-5 Section 112.01-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-5 Manual...
46 CFR 112.01-5 - Manual emergency lighting and power system.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Manual emergency lighting and power system. 112.01-5 Section 112.01-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-5 Manual...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-5 - Manual emergency lighting and power system.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Manual emergency lighting and power system. 112.01-5 Section 112.01-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-5 Manual...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
33 CFR 118.65 - Lights on fixed bridges.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Lights on fixed bridges. 118.65 Section 118.65 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.65 Lights on fixed bridges. (a) Each fixed bridge span over a navigable...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
Internal position and limit sensor for free piston machines
NASA Technical Reports Server (NTRS)
Holliday, Ezekiel S. (Inventor); Wood, James Gary (Inventor)
2012-01-01
A sensor for sensing the position of a reciprocating free piston in a free piston Stirling machine. The sensor has a disk mounted to an end face of the power piston coaxially with its cylinder and reciprocating with the piston The disk includes a rim around its outer perimeter formed of an electrically conductive material A coil is wound coaxially with the cylinder, spaced outwardly from the outer perimeter of the disk and mounted in fixed position relative to the pressure vessel, preferably on the exterior of the pressure vessel wall.
Integrated seal for high-temperature electrochemical device
Tucker, Michael C; Jacobson, Craig P
2013-07-16
The present invention provides electrochemical device structures having integrated seals, and methods of fabricating them. According to various embodiments the structures include a thin, supported electrolyte film with the electrolyte sealed to the support. The perimeter of the support is self-sealed during fabrication. The perimeter can then be independently sealed to a manifold or other device, e.g., via an external seal. According to various embodiments, the external seal does not contact the electrolyte, thereby eliminating the restrictions on the sealing method and materials imposed by sealing against the electrolyte.
46 CFR 112.43-11 - Illumination for launching operations.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 112.43-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-11 Illumination for launching operations. Branch circuits supplying power to lights for survival craft launching operations must supply no...
46 CFR 112.43-11 - Illumination for launching operations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 112.43-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-11 Illumination for launching operations. Branch circuits supplying power to lights for survival craft launching operations must supply no...
46 CFR 112.43-11 - Illumination for launching operations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 112.43-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-11 Illumination for launching operations. Branch circuits supplying power to lights for survival craft launching operations must supply no...
46 CFR 112.43-11 - Illumination for launching operations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 112.43-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-11 Illumination for launching operations. Branch circuits supplying power to lights for survival craft launching operations must supply no...
46 CFR 112.43-11 - Illumination for launching operations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 112.43-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Lighting Systems § 112.43-11 Illumination for launching operations. Branch circuits supplying power to lights for survival craft launching operations must supply no...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Lighting. 190.20-45 Section 190.20-45 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS CONSTRUCTION AND ARRANGEMENT Accomodations for Officers, Crew, and Scientific Personnel § 190.20-45 Lighting. Each berth must...
Wu, L C; D'Amelio, F; Fox, R A; Polyakov, I; Daunton, N G
1997-06-06
The present report describes a desktop computer-based method for the quantitative assessment of the area occupied by immunoreactive terminals in close apposition to nerve cells in relation to the perimeter of the cell soma. This method is based on Fast Fourier Transform (FFT) routines incorporated in NIH-Image public domain software. Pyramidal cells of layer V of the somatosensory cortex outlined by GABA immunolabeled terminals were chosen for our analysis. A Leitz Diaplan light microscope was employed for the visualization of the sections. A Sierra Scientific Model 4030 CCD camera was used to capture the images into a Macintosh Centris 650 computer. After preprocessing, filtering was performed on the power spectrum in the frequency domain produced by the FFT operation. An inverse FFT with filter procedure was employed to restore the images to the spatial domain. Pasting of the original image to the transformed one using a Boolean logic operation called 'AND'ing produced an image with the terminals enhanced. This procedure allowed the creation of a binary image using a well-defined threshold of 128. Thus, the terminal area appears in black against a white background. This methodology provides an objective means of measurement of area by counting the total number of pixels occupied by immunoreactive terminals in light microscopic sections in which the difficulties of labeling intensity, size, shape and numerical density of terminals are avoided.
NASA Technical Reports Server (NTRS)
Wu, L. C.; D'Amelio, F.; Fox, R. A.; Polyakov, I.; Daunton, N. G.
1997-01-01
The present report describes a desktop computer-based method for the quantitative assessment of the area occupied by immunoreactive terminals in close apposition to nerve cells in relation to the perimeter of the cell soma. This method is based on Fast Fourier Transform (FFT) routines incorporated in NIH-Image public domain software. Pyramidal cells of layer V of the somatosensory cortex outlined by GABA immunolabeled terminals were chosen for our analysis. A Leitz Diaplan light microscope was employed for the visualization of the sections. A Sierra Scientific Model 4030 CCD camera was used to capture the images into a Macintosh Centris 650 computer. After preprocessing, filtering was performed on the power spectrum in the frequency domain produced by the FFT operation. An inverse FFT with filter procedure was employed to restore the images to the spatial domain. Pasting of the original image to the transformed one using a Boolean logic operation called 'AND'ing produced an image with the terminals enhanced. This procedure allowed the creation of a binary image using a well-defined threshold of 128. Thus, the terminal area appears in black against a white background. This methodology provides an objective means of measurement of area by counting the total number of pixels occupied by immunoreactive terminals in light microscopic sections in which the difficulties of labeling intensity, size, shape and numerical density of terminals are avoided.
Restricted-Access Al-Mediated Material Transport in Al Contacting of PureGaB Ge-on-Si p + n Diodes
NASA Astrophysics Data System (ADS)
Sammak, Amir; Qi, Lin; Nanver, Lis K.
2015-12-01
The effectiveness of using nanometer-thin boron (PureB) layers as interdiffusion barrier to aluminum (Al) is studied for a contacting scheme specifically developed for fabricating germanium-on-silicon (Ge-on-Si) p + n photodiodes with an oxide-covered light entrance window. Contacting is achieved at the perimeter of the Ge-island anode directly to an Al interconnect metallization. The Ge is grown in oxide windows to the Si wafer and covered by a B and gallium (Ga) layer stack (PureGaB) composed of about a nanometer of Ga for forming the p + Ge region and 10 nm of B as an interdiffusion barrier to the Al. To form contact windows, the side-wall oxide is etched away, exposing a small tip of the Ge perimeter to Al that from this point travels about 5 μm into the bulk Ge crystal. In this process, Ge and Si materials are displaced, forming Ge-filled V-grooves at the Si surface. The Al coalesces in grains. This process is studied here by high-resolution cross-sectional transmission electron microscopy and energy dispersive x-ray spectroscopy that confirm the purities of the Ge and Al grains. Diodes are fabricated with different geometries and statistical current-voltage characterization reveals a spread that can be related to across-the-wafer variations in the contact processing. The I- V behavior is characterized by low dark current, low contact resistance, and breakdown voltages that are suitable for operation in avalanching modes. The restricted access to the Ge of the Al inducing the Ge and Si material transport does not destroy the very good electrical characteristics typical of PureGaB Ge-on-Si diodes.
Garcia-Pinto, Angélica B.; Santos-Filho, Sebastião D.; Carvalho, Jorge J.; Pereira, Mário J. S.; Fonseca, Adenilson S.; Bernardo-Filho, Mário
2013-01-01
Background: Natural products might alter the labeling of blood constituents with technetium-99m (99mTc) and these results may be correlated with modifications of the shape of the red blood cells (RBC). The biodistribution of radiopharmaceuticals can be also altered. Objective: This investigation aimed to determine biological effects of an aqueous extract of chamomile (CE). Materials and Methods: To study the effect of the CE on the labeling of blood constituents with 99mTc, in vitro and in vivo assays were performed. The effect of the CE on the morphology of RBC was observed under light microscope. The images were acquired, processed, and the perimeter/area ratio of the RBC determined. To analyze the effect of the CE on biodistribution of the sodium pertechnetate (Na99mTcO4) in Wistar rats, these animals were treated or not with a CE. Na99mTcO4 was injected, the rats were sacrificed, the organs were removed, weighted and percentage of radioactivity/gram calculated. Result: In the in vitro experiment, the radioactivity on blood cells compartment and on insoluble fractions of plasma was diminished. The shape and the perimeter/area ratio of the RBC were altered in in vitro assays. An increase of the percentage of radioactivity of Na99mTcO4 was observed in stomach after in vivo treatment. Conclusion: These results could be due to substances of the CE or by the products of the metabolism of this extract in the animal organism. These findings are examples of drug interaction with a radiopharmaceutical, which could lead to misdiagnosis in clinical practice with unexpected consequences. PMID:24143045
Satgunam, PremNandhini; Datta, Sourav; Chillakala, Koteswararao; Bobbili, Karthik R.; Joshi, Dhruv
2017-01-01
Purpose There are no commercially available devices to measure visual fields in infants. We developed a device, “Pediatric Perimeter,” that quantifies visual field extent (VFE) for infants. We describe the construction, validation, and use of this device. Methods A hemispherical dome with light emitting diodes (LEDs) was constructed. The LEDs were controlled using a computer program to measure reaction time (RT) to gross visual fields (GVF) and the VFE. Participants were tested in supine position in a dark room. Eye or head movement towards the stimuli was monitored with an infrared (IR) camera. Validation was done on 10 adults (mean age: 24.4 ± 5 years) with tunnel vision simulator. Results Perimetry was performed on 19 infants (age: 2.3–12 months), five infants with normal milestones. GVF and VFE were estimated in 17 and 7 infants, respectively. Median RT of infants with developmental delay was 663 ms and 380 ms for healthy infants. Also, 14 children (age: 14 months–6 years) with developmental delay and five patients with cognitive impairment were tested. Conclusion Visual field isopter and RT can be examined with the Pediatric Perimeter device on infants and patients with special needs. Further testing on infants will need to assess the repeatability. A large-scale study will be needed to compare typically developing infants and infants with delayed milestones with this device. Translational Relevance Quantifiable parameters obtained with this device can be used as outcome measures in clinical examination of infants and patients with special needs. This device can be used in pediatric, neurology, and ophthalmology clinics. PMID:28685105
Stormwater Pollution Prevention Plan (SWPPP) for Coal Storage Area Stabilization Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Project and Design Engineering
2011-03-01
The scope of this project is to stabilize the abandoned coal storage area and redirect the storm water runoff from sanitary sewer system to the storm drain system. Currently, the existing storm water runoff is directed to a perimeter concrete drainage swale and collected in a containment basin. The collected water is then pumped to a treatment facility and after treatment, is discharged to the Y-12 sanitary sewer system. The existing drainage swale and collection basin along with silt fencing will be used during aggregate placement and grading to provide erosion and sediment control. Inlet protection will also be installedmore » around existing structures during the storm water diversion construction. This project scope will include the installation of a non-woven geotextile fabric and compacted mineral aggregate base (paving optional) to stabilize the site. The geotextile specifications are provided on the vendor cut sheets in Appendix B. The installation of a storm water collection/retention area will also be installed on the southern side of the site in accordance with EPA Technical Guidance on Implementing the Stormwater Runoff Requirements for federal Projects under Section 438 of the Energy Independence and Security Act. The total area to be disturbed is approximately 2.5 acres. The order of activities for this Stormwater Pollution Prevention Plan (SWPPP) will be: (1) post notice of coverage (NOC) in a prominent display near entrance of the site; (2) install rain gauge on site or contact Y-12 Plant Shift Superintendent daily for Met tower rain gauge readings; (3) install stabilized construction exit on site; (4) install silt fencing along perimeter as indicated on the attached site plan; (5) regrade site; (6) install geotextile fabric and compacted mineral aggregate base; (7) install catch basin inlet protection where required; (8) excavate and lower existing catch basin tops, re-grade and asphalt to drain; and (9) when all disturbed areas are re-stabilized, remove silt fencing and any other temporary erosion control.« less
Experiments and simulation of a net closing mechanism for tether-net capture of space debris
NASA Astrophysics Data System (ADS)
Sharf, Inna; Thomsen, Benjamin; Botta, Eleonora M.; Misra, Arun K.
2017-10-01
This research addresses the design and testing of a debris containment system for use in a tether-net approach to space debris removal. The tether-net active debris removal involves the ejection of a net from a spacecraft by applying impulses to masses on the net, subsequent expansion of the net, the envelopment and capture of the debris target, and the de-orbiting of the debris via a tether to the chaser spacecraft. To ensure a debris removal mission's success, it is important that the debris be successfully captured and then, secured within the net. To this end, we present a concept for a net closing mechanism, which we believe will permit consistently successful debris capture via a simple and unobtrusive design. This net closing system functions by extending the main tether connecting the chaser spacecraft and the net vertex to the perimeter and around the perimeter of the net, allowing the tether to actuate closure of the net in a manner similar to a cinch cord. A particular embodiment of the design in a laboratory test-bed is described: the test-bed itself is comprised of a scaled-down tether-net, a supporting frame and a mock-up debris. Experiments conducted with the facility demonstrate the practicality of the net closing system. A model of the net closure concept has been integrated into the previously developed dynamics simulator of the chaser/tether-net/debris system. Simulations under tether tensioning conditions demonstrate the effectiveness of the closure concept for debris containment, in the gravity-free environment of space, for a realistic debris target. The on-ground experimental test-bed is also used to showcase its utility for validating the dynamics simulation of the net deployment, and a full-scale automated setup would make possible a range of validation studies of other aspects of a tether-net debris capture mission.
2009-06-12
OF MILITARY ART AND SCIENCE General Studies by KAREN J. DILL, MAJ, USA M.A.E.D., University of Phoenix , Hampton, Virginia, 2005 B.A...policy areas or gaps that require clarification or revision in light of the 21st century security environment and the changes in Army structure, doctrine...researcher identified policy gaps by determining how verbiage is understood in light of the modern OE and Army organization and tactics changes. The
2008-12-19
Undistributed ISFF-Funded Equipment 105 17. Iraqi Army Maintenance Program 107 18. Class IX Material Management 115 Part V – Medical Sustainability 123...database and are subsequently forwarded to the Army Material Command, Logistics Support Activity for inclusion in the DoD Small Arms and Light Weapons...be forwarded to the Army Material Command, Logistics Support Activity for inclusion in the DoD Small Arms and Light Weapons Serialization Program
76 FR 68313 - Amendment to the International Traffic in Arms Regulations: Libya and UNSCR 2009
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-04
... solely for security or disarmament assistance to the Libyan authorities, and small arms, light weapons... training, intended solely for security or disarmament assistance to the Libyan authorities and notified in...
33 CFR 118.95 - Lights on structures not part of a bridge or approach structure.
Code of Federal Regulations, 2011 CFR
2011-07-01
... a bridge or approach structure. 118.95 Section 118.95 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.95 Lights on structures not part of a bridge or approach structure. Lights on sheer booms, isolated piers, obstructions, and other...
46 CFR 167.65-5 - Flashing the rays of a searchlight or other blinding light.
Code of Federal Regulations, 2012 CFR
2012-10-01
... of a searchlight or other blinding light. Flashing the rays of a searchlight or other blinding light... 46 Shipping 7 2012-10-01 2012-10-01 false Flashing the rays of a searchlight or other blinding light. 167.65-5 Section 167.65-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
46 CFR 167.65-5 - Flashing the rays of a searchlight or other blinding light.
Code of Federal Regulations, 2011 CFR
2011-10-01
... of a searchlight or other blinding light. Flashing the rays of a searchlight or other blinding light... 46 Shipping 7 2011-10-01 2011-10-01 false Flashing the rays of a searchlight or other blinding light. 167.65-5 Section 167.65-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
46 CFR 167.65-5 - Flashing the rays of a searchlight or other blinding light.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of a searchlight or other blinding light. Flashing the rays of a searchlight or other blinding light... 46 Shipping 7 2013-10-01 2013-10-01 false Flashing the rays of a searchlight or other blinding light. 167.65-5 Section 167.65-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
46 CFR 167.65-5 - Flashing the rays of a searchlight or other blinding light.
Code of Federal Regulations, 2014 CFR
2014-10-01
... of a searchlight or other blinding light. Flashing the rays of a searchlight or other blinding light... 46 Shipping 7 2014-10-01 2014-10-01 false Flashing the rays of a searchlight or other blinding light. 167.65-5 Section 167.65-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
46 CFR 167.65-5 - Flashing the rays of a searchlight or other blinding light.
Code of Federal Regulations, 2010 CFR
2010-10-01
... of a searchlight or other blinding light. Flashing the rays of a searchlight or other blinding light... 46 Shipping 7 2010-10-01 2010-10-01 false Flashing the rays of a searchlight or other blinding light. 167.65-5 Section 167.65-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
33 CFR 150.715 - What are the requirements for lights used as aids to navigation?
Code of Federal Regulations, 2013 CFR
2013-07-01
... lights used as aids to navigation? 150.715 Section 150.715 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Aids to Navigation § 150.715 What are the requirements for lights used as aids to navigation? (a) Each light under part 149...
33 CFR 150.715 - What are the requirements for lights used as aids to navigation?
Code of Federal Regulations, 2014 CFR
2014-07-01
... lights used as aids to navigation? 150.715 Section 150.715 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Aids to Navigation § 150.715 What are the requirements for lights used as aids to navigation? (a) Each light under part 149...
33 CFR 150.715 - What are the requirements for lights used as aids to navigation?
Code of Federal Regulations, 2011 CFR
2011-07-01
... lights used as aids to navigation? 150.715 Section 150.715 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Aids to Navigation § 150.715 What are the requirements for lights used as aids to navigation? (a) Each light under part 149...
33 CFR 150.715 - What are the requirements for lights used as aids to navigation?
Code of Federal Regulations, 2012 CFR
2012-07-01
... lights used as aids to navigation? 150.715 Section 150.715 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Aids to Navigation § 150.715 What are the requirements for lights used as aids to navigation? (a) Each light under part 149...
33 CFR 150.715 - What are the requirements for lights used as aids to navigation?
Code of Federal Regulations, 2010 CFR
2010-07-01
... lights used as aids to navigation? 150.715 Section 150.715 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Aids to Navigation § 150.715 What are the requirements for lights used as aids to navigation? (a) Each light under part 149...
46 CFR 25.45-1 - Heating and lighting systems on vessels carrying passengers for hire.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Heating and lighting systems on vessels carrying passengers for hire. 25.45-1 Section 25.45-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Cooking, Heating, and Lighting Systems § 25.45-1 Heating and lighting systems...
33 CFR 118.95 - Lights on structures not part of a bridge or approach structure.
Code of Federal Regulations, 2010 CFR
2010-07-01
... a bridge or approach structure. 118.95 Section 118.95 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.95 Lights on structures not part of a bridge or approach structure. Lights on sheer booms, isolated piers, obstructions, and other...
2014-01-01
Background Biotechnological screening processes are performed since more than 8 decades in small scale shaken bioreactors like shake flasks or microtiter plates. One of the major issues of such reactors is the sufficient oxygen supply of suspended microorganisms. Oxygen transfer into the bulk liquid can in general be increased by introducing suitable baffles at the reactor wall. However, a comprehensive and systematic characterization of baffled shaken bioreactors has never been carried out so far. Baffles often differ in number, size and shape. The exact geometry of baffles in glass lab ware like shake flasks is very difficult to reproduce from piece to piece due to the hard to control flow behavior of molten glass during manufacturing. Thus, reproducibility of the maximum oxygen transfer capacity in such baffled shake flasks is hardly given. Results As a first step to systematically elucidate the general effect of different baffle geometries on shaken bioreactor performance, the maximum oxygen transfer capacity (OTRmax) in baffled 48-well microtiter plates as shaken model reactor was characterized. This type of bioreactor made of plastic material was chosen, as the exact geometry of the baffles can be fabricated by highly reproducible laser cutting. As a result, thirty different geometries were investigated regarding their maximum oxygen transfer capacity (OTRmax) and liquid distribution during shaking. The relative perimeter of the cross-section area as new fundamental geometric key parameter is introduced. An empirical correlation for the OTRmax as function of the relative perimeter, shaking frequency and filling volume is derived. For the first time, this correlation allows a systematic description of the maximum oxygen transfer capacity in baffled microtiter plates. Conclusions Calculated and experimentally determined OTRmax values agree within ± 30% accuracy. Furthermore, undesired out-of-phase operating conditions can be identified by using the relative perimeter as key parameter. Finally, an optimum well geometry characterized by an increased perimeter of 10% compared to the unbaffled round geometry is identified. This study may also assist to comprehensively describe and optimize the baffles of shake flasks in future. PMID:25093039
NASA Astrophysics Data System (ADS)
Allen, H. M.; Giardino, J. R.
2015-12-01
Each year people seek respite from their busy lifestyles by traveling to state or national parks, national forests or wilderness areas. The majority of these parks were established in order to help preserve our natural heritage, including wildlife, forests, and the beauty of landscapes formed from thousands of years of geologic/geomorphologic processes. Whilst being able to enjoy the tranquility of nature, tourists are being robbed of a more in-depth experience as a result of the lack of a geologic background. One such location that attracts a large number of summer tourists is the perimeter trail in Ouray, Colorado. Located in the Southwestern portion of Colorado, Ouray is situated in the beautiful San Juan Mountain range along the "Million Dollar Highway." The Perimeter trail is a six-mile trail loop that circles the city of Ouray. The city is a very popular place for summertime tourism because of its unparalleled scenery. Ouray is situated in an area that is riddled with textbook angular unconformities, metasedimentary, sedimentary, and volcanic rocks. In the study area, The San Juans have been beautifully sculpted by an array of major faulting events, glacial activity and volcanics. With the understanding that technology is ever expanding, we think there is no better way to experience the Perimeter Trail than to have an interactive application that will be both educational as well as interesting. This application is a non-technical way of looking at the geology and geomorphology of the perimeter trail. Additionally, a paper brochure shows the most noteworthy points of interest. The brochure contains a brief geologic history of the San Juan Mountains accompanied with annotated photographs to illustrate the complex geology/geomorphology encountered on the trail. The application is based on an interactive three-dimensional map, which can be zoomed to various scales. The app hosts a locational service that uses the phone's GPS to communicate location of the hiker on the trail. This project developed a simple, yet effective application that will not only guide hikers along the trail, but also aid in educating the thousands of tourists that visit the area yearly.
Method and device for feeding fuel in a fuel system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williamson, E.
1988-07-26
This patent describes a device for feeding fuel in a fuel system for a liquid fuel engine, with the fuel system having a fuel tank, fuel lines, multiple microscreen fuel filters, a fuel pump, and engine fuel injectors, with the fuel tank having a fill opening having a perimeter, comprising, in combination: a ball having a size for overfitting and abutting with the perimeter of the fill opening of differing sizes, shapes, and constructions; and means for introducing air pressure greater than atmospheric through the ball and through the fill opening and into the fuel tank, with the ball havingmore » a solid cross section and being generally impermeable to air passage, with the ball being deformable to conform to the perimeter of the fill opening for sealingly engaging the perimeter of the fill opening and having a firmness for transmitting a force applied to the ball in the direction of the fill opening into a sealing force applied by the ball to the fill opening to balance opposing forces created by the introduction of air pressure into the fuel tank and for increasing the air pressure in the fuel tank acting on the fuel to increase the rate of fuel flow from the fuel tank into the fuel line for assisting the fuel pump in moving the fuel from the fuel tank through the fuel lines and through the microscreen filters to the engine fuel injectors while allowing an excessive air pressure to escape from the fill opening around the ball.« less
Baswaraj; Hemanth, M; Jayasudha; Patil, Chandrashekhargouda; Sunilkumar, P; Raghuveer, H P; Chandralekha, B
2013-01-01
The objective of this study was to estimate the increase in arch perimeter associated with mandibular lateral expansion, To estimate the increase in intermolar width with mandibular lateral expansion and to find out the changes of tooth inclination with mandibular expansion. The mandibular bone with dentition of indian skeletal specimen was obtained. The computer tomogram (CT) slices of the mandible were taken. Finite element model (FEM): Numerical representation of the geometry was created by dividing the geometry into finite number of elements and the elements were connected together with nodes at the junction. The result of the study showed when 10° of lateral expansion was applied to the lower buccal segment at the center of rotation found at 4.3 mm below the root apex of first molar, a space of 1.3 mm between the canine and first premolar, and thus an increase in arch perimeter of 2.6 mm. The tip of the mesiolingual cusp of the first molar moved 4.2 mm laterally, resulting in a change in intermolar width by 8.4 mm. Three-dimensional simulation showed that 1 mm of intermolar expansion increased the arch perimeter by 0.30 mm. As the finite element method evolves and scientists are able to more clearly define physical properties of biological tissues, more accurate information can be generated at the level that other analytical methods cannot fully provide data.This result would be of value clinically for prediction of the effects of mandibular expansion.
Davidson, Zeke; Pratt, Laura; Mwololo, Mary; MacDonald, Suzanne E.
2016-01-01
The use of fences to segregate wildlife can change predator and prey behaviour. Predators can learn to incorporate fencing into their hunting strategies and prey can learn to avoid foraging near fences. A twelve-strand electric predator-proof fence surrounds our study site. There are also porous one-strand electric fences used to create exclosures where elephant (and giraffe) cannot enter in order to protect blocs of browse vegetation for two critically endangered species, the black rhinoceros (Diceros bicornis) and the Grevy’s zebra (Equus grevyi). The denser vegetation in these exclosures attracts both browsing prey and ambush predators. In this study we examined if lion predation patterns differed near the perimeter fencing and inside the elephant exclosures by mapping the location of kills. We used a spatial analysis to compare the predation patterns near the perimeter fencing and inside the exclosures to predation in the rest of the conservancy. Predation was not over-represented near the perimeter fence but the pattern of predation near the fence suggests that fences may be a contributing factor to predation success. Overall, we found that predation was over-represented inside and within 50 m of the exclosures. However, by examining individual exclosures in greater detail using a hot spot analysis, we found that only a few exclosures contained lion predation hot spots. Although some exclosures provide good hunting grounds for lions, we concluded that exclosures did not necessarily create prey-traps per se and that managers could continue to use this type of exclusionary fencing to protect stands of dense vegetation. PMID:26893967
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Lighting. 168.15-40 Section 168.15-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS Accommodations § 168.15-40 Lighting. All quarters, including washrooms, toilet rooms, and hospital spaces, must...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Lighting. 168.15-40 Section 168.15-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS Accommodations § 168.15-40 Lighting. All quarters, including washrooms, toilet rooms, and hospital spaces, must...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Lighting. 168.15-40 Section 168.15-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS Accommodations § 168.15-40 Lighting. All quarters, including washrooms, toilet rooms, and hospital spaces, must...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Lighting. 168.15-40 Section 168.15-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS Accommodations § 168.15-40 Lighting. All quarters, including washrooms, toilet rooms, and hospital spaces, must...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Lighting. 168.15-40 Section 168.15-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS Accommodations § 168.15-40 Lighting. All quarters, including washrooms, toilet rooms, and hospital spaces, must...
Exposure to TCDD from base perimeter application of Agent Orange in Vietnam.
Ross, John H; Hewitt, Andrew; Armitage, James; Solomon, Keith; Watkins, Deborah K; Ginevan, Michael E
2015-04-01
Using recognized methods routinely employed by pesticide regulatory agencies, the exposures of military personnel that were mixer/loader/applicators (M/L/A) of Agent Orange (AO) for perimeter foliage at bases during the Vietnam War were estimated. From the fraction of TCDD in AO, absorbed dosage of the manufacturing contaminant was estimated. Dermal exposure estimated from spray drift to residents of the bases was calculated using internationally recognized software that accounted for proximity, foliar density of application site, droplet size and wind speed among other factors, and produced estimates of deposition. Those that directly handled AO generally had much higher exposures than those further from the areas of use. The differences in exposure potential varied by M/L/A activity, but were typically orders of magnitude greater than bystanders. However, even the most-exposed M/L/A involved in perimeter application had lifetime exposures comparable to persons living in the U.S. at the time, i.e., ~1.3 to 5 pg TCDD/kg bodyweight. Copyright © 2014 Elsevier B.V. All rights reserved.
Electrochemical Evaluations of Fractal Microelectrodes for Energy Efficient Neurostimulation.
Park, Hyunsu; Takmakov, Pavel; Lee, Hyowon
2018-03-12
Advancements in microfabrication has enabled manufacturing of microscopic neurostimulation electrodes with smaller footprint than ever possible. The smaller electrodes can potentially reduce tissue damage and allow better spatial resolution for neural stimulation. Although electrodes of any shape can easily be fabricated, substantial effort have been focused on identification and characterization of new materials and surface morphology for efficient charge injection, while maintaining simple circular or rectangular Euclidean electrode geometries. In this work we provide a systematic electrochemical evaluation of charge injection capacities of serpentine and fractal-shaped platinum microelectrodes and compare their performance with traditional circular microelectrodes. Our findings indicate that the increase in electrode perimeter leads to an increase in maximum charge injection capacity. Furthermore, we found that the electrode geometry can have even more significant impact on electrode performance than having a larger perimeter for a given surface area. The fractal-shaped microelectrodes, despite having smaller perimeter than other designs, demonstrated superior charge injection capacity. Our results suggest that electrode design can significantly affect both Faradaic and non-Faradaic electrochemical processes, which may be optimized to enable a more energy efficient design for neurostimulation.
ERIC Educational Resources Information Center
Bernier, Annie; Beauchamp, Miriam H.; Carlson, Stephanie M.; Lalonde, Gabrielle
2015-01-01
In light of emerging evidence suggesting that the affective quality of parent-child relationships may relate to individual differences in young children's executive functioning (EF) skills, the aim of this study was to investigate the prospective associations between attachment security in toddlerhood and children's EF skills in kindergarten.…
Bedtime habits for infants and children
... stuffed animal or special blanket may give the child some security after the lights are turned out. Before you turn out the light, ask if the child needs anything else. Meeting a simple request is ...
2014-07-07
NASA Cassini spacecraft captures three magnificent sights at once: Saturn north polar vortex and hexagon along with its expansive rings. The hexagon, which is wider than two Earths, owes its appearance to the jet stream that forms its perimeter. The jet stream forms a six-lobed, stationary wave which wraps around the north polar regions at a latitude of roughly 77 degrees North. This view looks toward the sunlit side of the rings from about 37 degrees above the ringplane. The image was taken with the Cassini spacecraft wide-angle camera on April 2, 2014 using a spectral filter which preferentially admits wavelengths of near-infrared light centered at 752 nanometers. The view was obtained at a distance of approximately 1.4 million miles (2.2 million kilometers) from Saturn and at a Sun-Saturn-spacecraft, or phase, angle of 43 degrees. Image scale is 81 miles (131 kilometers) per pixel. http://photojournal.jpl.nasa.gov/catalog/PIA18274
76 FR 72462 - Bandon Capital Management, LLC and Northern Lights Fund Trust; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29864; 812-13936] Bandon Capital Management, LLC and Northern Lights Fund Trust; Notice of Application November 17, 2011. AGENCY... Capital Management, LLC (``Bandon Capital'' or the ``Adviser'') and Northern Lights Fund Trust (the...
46 CFR 154.1015 - Lighting in gas-dangerous space.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Lighting in gas-dangerous space. 154.1015 Section 154.1015 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES... Equipment Electrical § 154.1015 Lighting in gas-dangerous space. (a) Each gas-dangerous space that has...
46 CFR 154.1015 - Lighting in gas-dangerous space.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 5 2012-10-01 2012-10-01 false Lighting in gas-dangerous space. 154.1015 Section 154.1015 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES... Equipment Electrical § 154.1015 Lighting in gas-dangerous space. (a) Each gas-dangerous space that has...