Omen: identifying potential spear-phishing targets before the email is sent.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wendt, Jeremy Daniel.
2013-07-01
We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attackermore » must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.« less
China’s Near Seas Combat Capabilities (China Maritime Study, Number 11)
2014-02-01
Chinese writings stress preemptive attacks on key U.S. power-projection capabili- ties—including aircraft carriers—prior to or quickly following formal...attack craft consistently stress covert, long-range attacks taking advantage of stealth, surprise, and standoff ranges. A final factor that supports...craft tenders, but this is speculative.56 The 2010 Chinese defense white paper does stress , however, that sea-based china’s near seas combat
Precision controllability of the F-15 airplane
NASA Technical Reports Server (NTRS)
Sisk, T. R.; Matheny, N. W.
1979-01-01
A flying qualities evaluation conducted on a preproduction F-15 airplane permitted an assessment to be made of its precision controllability in the high subsonic and low transonic flight regime over the allowable angle of attack range. Precision controllability, or gunsight tracking, studies were conducted in windup turn maneuvers with the gunsight in the caged pipper mode and depressed 70 mils. This evaluation showed the F-15 airplane to experience severe buffet and mild-to-moderate wing rock at the higher angles of attack. It showed the F-15 airplane radial tracking precision to vary from approximately 6 to 20 mils over the load factor range tested. Tracking in the presence of wing rock essentially doubled the radial tracking error generated at the lower angles of attack. The stability augmentation system affected the tracking precision of the F-15 airplane more than it did that of previous aircraft studied.
NASA Technical Reports Server (NTRS)
Pastor, P. Rick; Bishop, Robert H.; Striepe, Scott A.
2000-01-01
A first order simulation analysis of the navigation accuracy expected from various Navigation Quick-Look data sets is performed. Here quick-look navigation data are observations obtained by hypothetical telemetried data transmitted on the fly during a Mars probe's atmospheric entry. In this simulation study, navigation data consists of 3-axis accelerometer sensor and attitude information data. Three entry vehicle guidance types are studied: I. a Maneuvering entry vehicle (as with Mars 01 guidance where angle of attack and bank angle are controlled); II. Zero angle-of-attack controlled entry vehicle (as with Mars 98); and III. Ballistic, or spin stabilized entry vehicle (as with Mars Pathfinder);. For each type, sensitivity to progressively under sampled navigation data and inclusion of sensor errors are characterized. Attempts to mitigate the reconstructed trajectory errors, including smoothing, interpolation and changing integrator characteristics are also studied.
Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness
2016-06-01
within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need
September 11: What Our Children Need to Know
ERIC Educational Resources Information Center
Thomas B. Fordham Foundation, 2002
2002-01-01
The attacks on New York City and Washington on September 11, 2001, as well as the aborted attack that led to the Pennsylvania crash of United Airlines flight 93 comprised an event too traumatic to quickly set aside. All the things that a nation and its people do to digest, understand and in some sense recover from a cataclysm have been and are…
Bugs that eat bugs: biological control research offers hope for southern pine bark beetle management
John C. Moser; Susan J. Branham
1988-01-01
The black turpentine beetle (BTB) is a native pest of pines in the southeastern United States. It is particularly injurious to trees in areas of Georgia and Florida where gum naval stores operations are an important industry. Here, slash pine and longloeaf pine are routinely attacked and killed during tupentine operations. Additionally, the BTB quickly attacks trees...
The contribution of collective attack tactics in differentiating handball score efficiency.
Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka
2004-12-01
The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.
Precision controllability of the YF-17 airplane
NASA Technical Reports Server (NTRS)
Sisk, T. R.; Mataeny, N. W.
1980-01-01
A flying qualities evaluation conducted on the YF-17 airplane permitted assessment of its precision controllability in the transonic flight regime over the allowable angle of attack range. The precision controllability (tailchase tracking) study was conducted in constant-g and windup turn tracking maneuvers with the command augmentation system (CAS) on, automatic maneuver flaps, and the caged pipper gunsight depressed 70 mils. This study showed that the YF-17 airplane tracks essentially as well at 7 g's to 8 g's as earlier fighters did at 4 g's to 5 g's before they encountered wing rock. The pilots considered the YF-17 airplane one of the best tracking airplanes they had flown. Wing rock at the higher angles of attack degraded tracking precision, and lack of control harmony made precision controllability more difficult. The revised automatic maneuver flap schedule incorporated in the airplane at the time of the tests did not appear to be optimum. The largest tracking errors and greatest pilot workload occurred at high normal load factors at low angles of attack. The pilots reported that the high-g maneuvers caused some tunnel vision and that they found it difficult to think clearly after repeated maneuvers.
Lesaffre, Xavier; Tourtier, Jean-Pierre; Violin, Yann; Frattini, Benoit; Rivet, Catherine; Stibbe, Olivier; Faure, Florian; Godefroy, Anne; Gallet, Jean-Claude; Ausset, Sylvain
2017-06-01
On November 13, 2015, in 40 minutes, Paris suffered four suicide bombers attacks; shootings at three different restaurant terraces; and an attack on the Bataclan concert hall, resulting in 130 dead and 495 wounded. How did the Parisian rescue system respond and how did it evolve since?We proved we could deploy quickly wide prehospital and hospital resources and teams' equipment and preparedness is being further developed. To secure a swifter initial response, we need a better integration of the operators of the rescue chain with a simpler and more robust organization as well as improved communications channels. We must continue to anticipate and prepare for possible future attacks.
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 2
2012-04-01
attacks is expanding to engulf the compact world of smartphones . by Aditya K. Sood and Richard J. Enbody A Practical Approach to Securing and Managing...provide a vulnerable entry point to our mobile device informa- tion systems. As a result, hackers are able to quickly exploit software on smartphones ...MOBILE WORLD 4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones . This paper
Realistic computer network simulation for network intrusion detection dataset generation
NASA Astrophysics Data System (ADS)
Payer, Garrett
2015-05-01
The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.
Evaluation of the precision of contrast sensitivity function assessment on a tablet device
Dorr, Michael; Lesmes, Luis A.; Elze, Tobias; Wang, Hui; Lu, Zhong-Lin; Bex, Peter J.
2017-01-01
The contrast sensitivity function (CSF) relates the visibility of a spatial pattern to both its size and contrast, and is therefore a more comprehensive assessment of visual function than acuity, which only determines the smallest resolvable pattern size. Because of the additional dimension of contrast, estimating the CSF can be more time-consuming. Here, we compare two methods for rapid assessment of the CSF that were implemented on a tablet device. For a single-trial assessment, we asked 63 myopes and 38 emmetropes to tap the peak of a “sweep grating” on the tablet’s touch screen. For a more precise assessment, subjects performed 50 trials of the quick CSF method in a 10-AFC letter recognition task. Tests were performed with and without optical correction, and in monocular and binocular conditions; one condition was measured twice to assess repeatability. Results show that both methods are highly correlated; using both common and novel measures for test-retest repeatability, however, the quick CSF delivers more precision with testing times of under three minutes. Further analyses show how a population prior can improve convergence rate of the quick CSF, and how the multi-dimensional output of the quick CSF can provide greater precision than scalar outcome measures. PMID:28429773
Analysis of Special Operations Forces in Decision Aids: Recommendations,
1994-01-01
Soviet-made armored scout cars operated by Malaysian troops. By that time, the United States had lost 102 men-18 killed and 84 wounded. Somali leaders...designation of targets; attack by F-15E and F-16C using CBU-87, -89 Execution and GBU; attack by A-10 using Maverick and 30-mm cannon; attack by B-52 using...patrolling designated areas of the battlefield and attacking individual armored vehicles with precision-guided weapons such as Maverick . Discontinuity
Develop a solution for protecting and securing enterprise networks from malicious attacks
NASA Astrophysics Data System (ADS)
Kamuru, Harshitha; Nijim, Mais
2014-05-01
In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, Craig; Larmouth, Robert
The project was conceived and executed with the overarching objective to provide cost effective tools to cooperative utilities that enabled them to quickly detect, characterize and take remediative action against cyber attacks.
Skills Associated with Line Breaks in Elite Rugby Union
den Hollander, Steve; Brown, James; Lambert, Michael; Treu, Paul; Hendricks, Sharief
2016-01-01
The ability of the attacking team to break through the defensive line is a key indicator of success as it creates opportunities to score tries. The aim of this study was to analyse line breaks and identify the associated skills and playing characteristics. The 2013 Super Rugby season (125 games) was analysed, in which 362 line breaks were identified and coded using variables that assessed team patterns and non-contact attacking skills in the phases preceding the line break. There was an average of 3 line breaks per game, with 39% of line breaks resulting in a try. Line breaks occurred when the ball-carrier was running fast [61%, x2(4) = 25.784, p = 0.000, Cramer’s v = 0.1922, weak]. At a moderate distance, short lateral passes (19%) and skip passes (15%) attributed to the highest percentage of line breaks [x2(26) = 50.899, p = 0.036, Cramer’s v = 0.2484, moderate]. Faster defensive line speeds resulted in more line breaks [x2(12) = 61.703, p < 0.001, Cramer’s v = 0.3026, moderate]. Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities. During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. Key points Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. PMID:27803629
Sine-Bar Attachment For Machine Tools
NASA Technical Reports Server (NTRS)
Mann, Franklin D.
1988-01-01
Sine-bar attachment for collets, spindles, and chucks helps machinists set up quickly for precise angular cuts that require greater precision than provided by graduations of machine tools. Machinist uses attachment to index head, carriage of milling machine or lathe relative to table or turning axis of tool. Attachment accurate to 1 minute or arc depending on length of sine bar and precision of gauge blocks in setup. Attachment installs quickly and easily on almost any type of lathe or mill. Requires no special clamps or fixtures, and eliminates many trial-and-error measurements. More stable than improvised setups and not jarred out of position readily.
2016-12-01
theory, passenger rail bombing , attacker-defender methodology 15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...bombers carried out a successful coordinated attack against the London mass transit system in July 2005. Three suicide bombings occurred on trains and...iron rods to make shrapnel. The precise timing indicates the terrorists themselves detonated their own devices. In March 2016, a suicide bomb
Anemia Due to Excessive Bleeding
... the blood vessels is insufficient. The body’s oxygen supply is drastically reduced because the number of oxygen-carrying red blood cells has decreased so quickly. Either problem may lead to a heart attack , stroke , or death. Chronic blood loss Far more common than a sudden loss of ...
Tool simplifies machining of pipe ends for precision welding
NASA Technical Reports Server (NTRS)
Matus, S. T.
1969-01-01
Single tool prepares a pipe end for precision welding by simultaneously performing internal machining, end facing, and bevel cutting to specification standards. The machining operation requires only one milling adjustment, can be performed quickly, and produces the high quality pipe-end configurations required to ensure precision-welded joints.
The Eliminator: A design of a close air support aircraft
NASA Technical Reports Server (NTRS)
Hendrix, Mandy; Hoang, TY; Kokolios, Alex; Selyem, Sharon; Wardell, Mark; Winterrowd, David
1991-01-01
The Eliminator is the answer to the need for an affordable, maintainable, survivable, high performance close air support aircraft primarily for the United States, but with possible export sales to foreign customers. The Eliminator is twin turbofan, fixed wing aircraft with high mounted canards and low mounted wings. It is designed for high subsonic cruise and an attack radius of 250 nautical miles. Primarily it would carry 20 500 pound bombs as its main ordnance , but is versatile enough to carry a variety of weapons configurations to perform several different types of missions. It carries state of the art navigation and targeting systems to deliver its payload with pinpoint precision and is designed for maximum survivability of the crew and aircraft for a safe return and quick turnaround. It can operate from fields as short as 1800 ft. with easy maintenance for dispersed operation during hostile situations. It is designed for exceptional maneuverability and could be used in a variety of roles from air-to-air operations to anti-submarine warfare and maritime patrol duties.
French Ministry of Health's response to Paris attacks of 13 November 2015.
Philippe, Jean-Marc; Brahic, Olivier; Carli, Pierre; Tourtier, Jean-Pierre; Riou, Bruno; Vallet, Benoit
2016-04-01
On Friday November 13th at 9:20 pm, three kamikaze bombs went off around the Stade de France a stadium in Saint-Denis just outside Paris, 4 different shootings took place and bombings in Paris and hundreds of people were held hostage in a theater.This multi-site terrorist attack was the first of this magnitude in France. Drawing the lessons of these attacks and those which occurred in other countries from a health perspective is essential to continuously adapt and improve the French response to possible future attacks. Several issues would need to be further explored: Management of uncertainties: When to trigger the plans: after the 1st attack, the 2nd? When do attacks end and when to release mobilized resources? Management of victims: How to ensure that all victims are secured or taken care of? How to provide assistance when attacks are ongoing? Management of teams: Proper follow-up of persons involved in the response: health professionals, police and firemen, emergency call centers but also civil servants within administration that contributed to the response. Communication: Reactivity of all is a key element to secure appropriate resource is mobilized for the response. All actors have to be able to communicate quickly in a secured way.
Miller, Brian; Biggins, Dean; Wemmer, Chris; Powell, Roger; Calvo, Lorena; Hanebury, Lou; Wharton, Tracy
1990-01-01
We exposed naive Siberain polecats (Mustela eversmanni) (aged 2, 3, and 4 months) to a swooping stuffed great horned owl (Buho virginianus) and a stuffed badger (Taxidae taxus) mounted on a remote control toy automobile frame. The first introduction to each was harmless, the second was accompanied by a mild aversive stimulus, the third (1 day after attack) was harmless, and the fourth (30 days after attack) was harmless. Alert behavior increased after a single attack by either predator model. Escape responses of naive polecats did not differ between ages when exposed to the badger, but 4 month old polecats reduced their escape times after a single badger attack. When exposed to the swooping owl, naive 4 month old polecats redponded more quickly than the other two age groups, and 3 and 4 month old polecats reduced escape times after a single owl attack. This indicates an innate escape response to the owl model at 4 months of age, and a short-tert ability to remember a single mild aversive encounter with the badger and owl models at 3 or 4 months of age.
Detection of complex cyber attacks
NASA Astrophysics Data System (ADS)
Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug
2006-05-01
One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.
World of intelligence defense object detection-machine learning (artificial intelligence)
NASA Astrophysics Data System (ADS)
Gupta, Anitya; Kumar, Akhilesh; Bhushan, Vinayak
2018-04-01
This paper proposes a Quick Locale based Convolutional System strategy (Quick R-CNN) for question recognition. Quick R-CNN expands on past work to effectively characterize ob-ject recommendations utilizing profound convolutional systems. Com-pared to past work, Quick R-CNN utilizes a few in-novations to enhance preparing and testing speed while likewise expanding identification precision. Quick R-CNN trains the profound VGG16 arrange 9 quicker than R-CNN, is 213 speedier at test-time, and accomplishes a higher Guide on PASCAL VOC 2012. Contrasted with SPPnet, Quick R-CNN trains VGG16 3 quicker, tests 10 speedier, and is more exact. Quick R-CNN is actualized in Python and C++ (utilizing Caffe) and is accessible under the open-source MIT Permit.
USDA-ARS?s Scientific Manuscript database
Bactrocera dorsalis(Hendel)(Diptera: Tephritidae) is arguably the most important tephritid attacking fruits after Ceratitis capitata(Wiedemann)(Diptera: Tephritidae). In 2003, it was found in Africa and quickly spread to most of the sub-Saharan part of the continent destroying fruits and creating re...
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
NASA Technical Reports Server (NTRS)
Horvath, Thomas J.; OConnell, Tod F.; Cheatwood, F. McNeil; Prabhu, Ramadas K.; Alter, Stephen J.
2002-01-01
Aerodynamic wind-tunnel screening tests were conducted on a 0.029 scale model of a proposed Mars Surveyor 2001 Precision Lander (70 deg half angle spherically blunted cone with a conical afterbody). The primary experimental objective was to determine the effectiveness of a single flap to trim the vehicle at incidence during a lifting hypersonic planetary entry. The laminar force and moment data, presented in the form of coefficients, and shock patterns from schlieren photography were obtained in the NASA Langley Aerothermodynamic Laboratory for post-normal shock Reynolds numbers (based on forebody diameter) ranging from 2,637 to 92,350, angles of attack ranging from 0 tip to 23 degrees at 0 and 2 degree sideslip, and normal-shock density ratios of 5 and 12. Based upon the proposed entry trajectory of the 2001 Lander, the blunt body heavy gas tests in CF, simulate a Mach number of approximately 12 based upon a normal shock density ratio of 12 in flight at Mars. The results from this experimental study suggest that when traditional means of providing aerodynamic trim for this class of planetary entry vehicle are not possible (e.g. offset c.g.), a single flap can provide similar aerodynamic performance. An assessment of blunt body aerodynamic effects attributed to a real gas were obtained by synergistic testing in Mach 6 ideal-air at a comparable Reynolds number. From an aerodynamic perspective, an appropriately sized flap was found to provide sufficient trim capability at the desired L/D for precision landing. Inviscid hypersonic flow computations using an unstructured grid were made to provide a quick assessment of the Lander aerodynamics. Navier-Stokes computational predictions were found to be in very good agreement with experimental measurement.
M. A. Wulder; J. C. White; B. J. Bentz
2005-01-01
Estimates of the location and extent of the red attack stage of mountain pine beetle (Dentroctonus ponderosae Hopkins) infestations are critical for forest management. The degree of spatial and temporal precision required for these estimates varies according to the management objectives and the nature of the infestation. This paper outlines a hierarchy of information...
M. A. Wulder; J. C. White; B. J. Bentz; T. Ebata
2006-01-01
Estimates of the location and extent of the red-attack stage of mountain pine beetle (Dendroctonus ponderosae Hopkins) infestations are critical for forest management. The degree of spatial and temporal precision required for these estimates varies according to the management objectives and the nature of the infestation. This paper outlines the range...
Combating Memory Corruption Attacks On Scada Devices
NASA Astrophysics Data System (ADS)
Bellettini, Carlo; Rrushi, Julian
Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
A guide for salvaging white pine injured by forest fires
Thomas W. McConkey; Donald R. Gedney
1951-01-01
White pine forests are severely damaged by forest fires. Generally a fire kills all trees less than 20 feet high immediately. Larger trees may die later, depending on the degree of injury. Salvage operations must be started soon after a fire, because insects and fungi quickly attack trees that are killed.
Dynamic Attack Tree Tool for Risk Assessments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Black, Karl
2012-03-13
DATT enables interactive visualization, qualitative analysis and recording of cyber and other forms of risk. It facilitates dynamic risk-based approaches (as opposed to static compliance-based) to security and risk management in general. DATT allows decision makers to consistently prioritize risk mitigation strategies and quickly see where attention is most needed across the enterprise.
Battle Analysis: Rapido River Crossing, Offensive, Deliberate Attack, River Crossing, January 1944
1984-05-01
Even the few employed were difficult to use due to the slippery surface and the lack of handrails. Direct and indirect fire chewed them up. The...were placed in the water and went down quickly, sometimes carrying men loaded with heavy combat equipment. 42 mmmimm^^mtm—mm^ elm ^tmmMMM
Smart Grid Integrity Attacks: Characterizations and Countermeasures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Eilyan Bitar; Miles McQueen
2011-10-01
Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner. PMID:24252988
Talent: Implications for a U.S. Army Officer Corps Strategy
2009-11-01
successful water landing by Captain Chesney Sullenberger saved the lives of all 155 passengers and crew and was quickly dubbed the miracle on the Hudson...recently saved by his veterinarian, Dr. Ed Bulman, after suffering a heart attack while the two of them tended to a flock of alpacas on a remote farm.8
Wildfire, research, and a climate station
Ward McCaughey
2008-01-01
In August, the human-caused Tin Cup Fire took off a few miles to the north of where the Fire Sciences Laboratory crew was busy collecting fuels data on the Trapper Bunkhouse study site west of Darby. The fire demonstrated how quickly wildfire can escape initial attack in untreated stands, especially under extremely dry conditions, and how treated areas helped moderate...
Polio, Disability, and American Public Schooling: A Historiographical Exploration
ERIC Educational Resources Information Center
Altenbaugh, Richard J.
2004-01-01
Poliomyelitis, a virus that quickly attacks the central nervous system, struck the United States in 1916 with devastating results. Twenty-six states reported some 27,000 cases, claiming 6,000 deaths. The morbidity rate continued to climb during the next four decades until 1955 with the introduction of the Salk vaccine. It proved to be especially…
2007 Precision Strike Annual Programs Review
2007-04-25
Adapting our methods • Remaining a flexible combined-arms force • Enabling a generation of combat- experienced decision-makers by distributing...Sustain Propulsion Network RadioMEMS IMU Flexible Engagement Options Requirements Capabilities Precision Attack Missile (PAM) 67” (with Canister...Aimpoint 6 PAM Seeker Modes PAM’s Multiple Targeting Modes Increase Flexibility , Improve Lethality PAM’s Multiple Targeting Modes Increase Flexibility
SCA security verification on wireless sensor network node
NASA Astrophysics Data System (ADS)
He, Wei; Pizarro, Carlos; de la Torre, Eduardo; Portilla, Jorge; Riesgo, Teresa
2011-05-01
Side Channel Attack (SCA) differs from traditional mathematic attacks. It gets around of the exhaustive mathematic calculation and precisely pin to certain points in the cryptographic algorithm to reveal confidential information from the running crypto-devices. Since the introduction of SCA by Paul Kocher et al [1], it has been considered to be one of the most critical threats to the resource restricted but security demanding applications, such as wireless sensor networks. In this paper, we focus our work on the SCA-concerned security verification on WSN (wireless sensor network). A detailed setup of the platform and an analysis of the results of DPA (power attack) and EMA (electromagnetic attack) is presented. The setup follows the way of low-cost setup to make effective SCAs. Meanwhile, surveying the weaknesses of WSNs in resisting SCA attacks, especially for the EM attack. Finally, SCA-Prevention suggestions based on Differential Security Strategy for the FPGA hardware implementation in WSN will be given, helping to get an improved compromise between security and cost.
Testing simple deceptive honeypot tools
NASA Astrophysics Data System (ADS)
Yahyaoui, Aymen; Rowe, Neil C.
2015-05-01
Deception can be a useful defensive technique against cyber-attacks; it has the advantage of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for deception. They act as decoy computers to confuse attackers and exhaust their time and resources. This work tested the effectiveness of two free honeypot tools in real networks by varying their location and virtualization, and the effects of adding more deception to them. We tested a Web honeypot tool, Glastopf and an SSH honeypot tool Kippo. We deployed the Web honeypot in both a residential network and our organization's network and as both real and virtual machines; the organization honeypot attracted more attackers starting in the third week. Results also showed that the virtual honeypots received attacks from more unique IP addresses. They also showed that adding deception to the Web honeypot, in the form of additional linked Web pages and interactive features, generated more interest by attackers. For the purpose of comparison, we used examined log files of a legitimate Web-site www.cmand.org. The traffic distributions for the Web honeypot and the legitimate Web site showed similarities (with much malicious traffic from Brazil), but the SSH honeypot was different (with much malicious traffic from China). Contrary to previous experiments where traffic to static honeypots decreased quickly, our honeypots received increasing traffic over a period of three months. It appears that both honeypot tools are useful for providing intelligence about cyber-attack methods, and that additional deception is helpful.
Clinical features of 27 shark attack cases on La Réunion Island.
Ballas, Richard; Saetta, Ghislain; Peuchot, Charline; Elkienbaum, Philippe; Poinsot, Emmanuelle
2017-05-01
Between January 2000 and September 2016, there have been 27 documented shark attacks on La Réunion Island. The insular nature of La Réunion has allowed us to perform an extensive survey of these attacks. The objective was to describe the clinical features of these shark attacks, as only case reports have been published up to now. This was a retrospective observational study of the 27 cases of nonprovoked shark attacks that have occurred between January 2000 and September 2016. Post-humate predation, provoked attacks, and isolated attack on devices were excluded. All bone and vascular injuries were documented in the 21 remaining cases. Prehospital tourniquet use was specifically recorded. Among the 21 victims, eight died (38%) despite rapid use of resuscitation techniques in five cases when it was feasible; these techniques were not needed in the survivors. Thirteen patients were immediately treated in the operating room. Amputation or disarticulation occurred 13 times in 10 victims, five of whom died. Twelve injuries to major vascular structures were found in 11 victims, six of which died. A prehospital tourniquet was applied in four of the five surviving victims who had injuries to major vascular structures (including one victim with major humeral and femoral artery damage) and in one victim who died (the very proximal wound was not controlled). Our study found that quickly applying a tourniquet to the injured limb(s) contributes to the victim's survival. Disarticulation is a particular feature of shark attacks. The number and severity of shark attacks at La Réunion Island are worse than in the rest of the world. Epidemiological, level V.
FLEET Velocimetry Measurements on a Transonic Airfoil
NASA Technical Reports Server (NTRS)
Burns, Ross A.; Danehy, Paul M.
2017-01-01
Femtosecond laser electronic excitation tagging (FLEET) velocimetry was used to study the flowfield around a symmetric, transonic airfoil in the NASA Langley 0.3-m TCT facility. A nominal Mach number of 0.85 was investigated with a total pressure of 125 kPa and total temperature of 280 K. Two-components of velocity were measured along vertical profiles at different locations above, below, and aft of the airfoil at angles of attack of 0 deg, 3.5 deg, and 7deg. Measurements were assessed for their accuracy, precision, dynamic range, spatial resolution, and overall measurement uncertainty in the context of the applied flowfield. Measurement precisions as low as 1 m/s were observed, while overall uncertainties ranged from 4 to 5 percent. Velocity profiles within the wake showed sufficient accuracy, precision, and sensitivity to resolve both the mean and fluctuating velocities and general flow physics such as shear layer growth. Evidence of flow separation is found at high angles of attack.
The Plus or Minus Game--Teaching Estimation, Precision, and Accuracy
ERIC Educational Resources Information Center
Forringer, Edward R.; Forringer, Richard S.; Forringer, Daniel S.
2016-01-01
A quick survey of physics textbooks shows that many (Knight, Young, and Serway for example) cover estimation, significant digits, precision versus accuracy, and uncertainty in the first chapter. Estimation "Fermi" questions are so useful that there has been a column dedicated to them in "TPT" (Larry Weinstein's "Fermi…
Study on application of adaptive fuzzy control and neural network in the automatic leveling system
NASA Astrophysics Data System (ADS)
Xu, Xiping; Zhao, Zizhao; Lan, Weiyong; Sha, Lei; Qian, Cheng
2015-04-01
This paper discusses the adaptive fuzzy control and neural network BP algorithm in large flat automatic leveling control system application. The purpose is to develop a measurement system with a flat quick leveling, Make the installation on the leveling system of measurement with tablet, to be able to achieve a level in precision measurement work quickly, improve the efficiency of the precision measurement. This paper focuses on the automatic leveling system analysis based on fuzzy controller, Use of the method of combining fuzzy controller and BP neural network, using BP algorithm improve the experience rules .Construct an adaptive fuzzy control system. Meanwhile the learning rate of the BP algorithm has also been run-rate adjusted to accelerate convergence. The simulation results show that the proposed control method can effectively improve the leveling precision of automatic leveling system and shorten the time of leveling.
Declining Foreign Enrollment at Higher Education Institutions in the United States: A Research Note
ERIC Educational Resources Information Center
Naidoo, Vik
2007-01-01
When the Institute of International Education reported a drop of 2.4% in international student enrollment in the United States in 2003/2004, the first absolute decline in foreign enrollments since 1971/1972 (Open Doors, 2004), many were quick to point fingers at visa policies instituted after the September 11, 2001 attacks. The "Visas…
William W. Hargrove; Joseph P. Spruce; Gerald E. Gasser; Forrest M. Hoffman
2009-01-01
Imagine a national system with the ability to quickly identify forested areas under attack from insects or disease. Such an early warning system might minimize surprises such as the explosion of caterpillars referred to in the quotation above. Moderate resolution (ca. 500m) remote sensing repeated at frequent (ca. weekly) intervals could power such a monitoring system...
Message from the Director | Galaxy of Images
Search! Enter a search term and hit the search button to quickly find an image Go The above "Quick Search" box will find ANY words you type in. Use "*" to truncate a word (dog* will get more precise search, try the "Advanced Search" option below. More search options, including
Zeng, Lizhang; Zhou, Jun; Li, Bo; Xing, Da
2015-01-01
Biotic stressors, especially pathogenic microorganisms, are rather difficult to detect. In plants, one of the earliest cellular responses following pathogen infection is the production of reactive oxygen species (ROS). In this study, a novel optical device for the early monitoring of Pseudomonas attack was developed; this device measures the ROS level via oxidation-sensitive 2′, 7′-dichlorodihydrofluorescein diacetate (H2DCFDA)-mediated fluorescence, which could provide early monitoring of attacks by a range of plant pathogen; ROS bursts were detected in vivo in Arabidopsis thaliana with higher sensitivity and accuracy than those of a commercial luminescence spectrophotometer. Additionally, the DCF fluorescence truly reflected early changes in the ROS level, as indicated by an evaluation of the H2O2 content and the tight association between the ROS and Pseudomonas concentration. Moreover, compared with traditional methods for detecting plant pathogen attacks based on physiological and biochemical measurements, our proposed technique also offers significant advantages, such as low cost, simplicity, convenient operation and quick turnaround. These results therefore suggest that the proposed optical device could be useful for the rapid monitoring of attacks by plant pathogen and yield results considerably earlier than the appearance of visual changes in plant morphology or growth. PMID:25767474
2016-09-01
between U.S. bases and the theater of operations. • Cyber Attack capabilities designed to disrupt U.S. command and control systems and critical...operational area. Key area-denial capabilities include: • Air forces and air defense systems, both fixed and mobile, designed to deny local U.S. air...Precision-guided rockets, artillery, missiles, and mortars (G-RAMM) designed to attack surface targets, including landing forces, with much greater accuracy
High precision tide spectroscopy. [using the superconducting gravimeter
NASA Technical Reports Server (NTRS)
Goodkind, J. M.
1978-01-01
Diurnal and long period earth tides were measured to high accuracy and precision with the superconducting gravimeter. The results provide new evidence on the geophysical questions which have been attacked through earth tide measurements in the past. In addition, they raise new questions of potential interest. Slow fluctuations in gravity of order 10 micron gal over periods of 3 to 5 months were observed and are discussed.
Emergency Support Function 15 Standard Operating Procedures
2013-08-01
learned from numerous incidents to include the BP oil spill, the Fukushima nuclear incident, Hurricane Sandy and the Boston Marathon attack. Guidance is...Staffing Operations Activation Incident Operations Case Study - 2013 Boston Marathon Bombing Case Study - 2011 Fukushima Nuclear Crisis...Quick Summary Radiological Dispersal Device (RDD) Improvised Nuclear Device (IND) Federal Response Case Studies – 2011 Fukushima Nuclear
ATTACK WARNING: Better Management Required to Resolve NORAD Integration Deficiencies
1989-07-01
protocols, Cumbersome Integration different manufacturers’ computer systems can communicate with eachother . The warning and assessment subsystems...by treating TW/AA system as a single system subject to program review and oversight by the Defense Acquisition Board. Within this management...restore the unit to operation quickly enough after a power loss to meet NORAD mis- sion requirements. The Air Force intends to have the contractor
Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment
NASA Astrophysics Data System (ADS)
Montminy, David P.
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.
Automatic analysis of attack data from distributed honeypot network
NASA Astrophysics Data System (ADS)
Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel
2013-05-01
There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.
High-security communication by coherence modulation at the photon-counting level.
Rhodes, William T; Boughanmi, Abdellatif; Moreno, Yezid Torres
2016-05-20
We show that key-specified interferometer path-length difference modulation (often referred to as coherence modulation), operating in the photon-counting regime with a broadband source, can provide a quantifiably high level of physics-guaranteed security for binary signal transmission. Each signal bit is associated with many photocounts, perhaps numbering in the thousands. Of great importance, the presence of an eavesdropper can be quickly detected. We first review the operation of key-specified coherence modulation at high light levels, illustrating by means of an example its lack of security against attack. We then show, using the same example, that, through the reduction of light intensities to photon-counting levels, a high level of security can be attained. A particular attack on the system is analyzed to demonstrate the quantifiability of the scheme's security, and various remaining research issues are discussed. A potential weakness of the scheme lies in a possible vulnerability to light amplification by an attacker.
Drill Down Tool Evaluation Brief
ERIC Educational Resources Information Center
Eliason, Bert; Morris, Kelsey
2015-01-01
Data-based decision making is enhanced by identifying a precise problem statement or question to explore. When looking at a problem, the nearer we get to the precise problem (e.g., where and when it is occurring, who is involved, and why the problem is continuing in context and location) the more quickly we can build an action plan to effectively…
NASA Technical Reports Server (NTRS)
Coker, Bill E.
1988-01-01
Fixture delimits peened area precisely while boosting productivity. New fixture ensures small tolerances essential for turbine blades. Opens and closes quickly so finished part removed and new part inserted.
Defense Acquisitions: Assessments of Selected Weapon Programs
2017-03-01
PAC-3 MSE) 81 Warfighter Information Network-Tactical (WIN-T) Increment 2 83 Improved Turbine Engine Program (ITEP) 85 Long Range Precision Fires...Unmanned Air System 05/2018 —- O Joint Surveillance Target Attack Radar System Recapitalization 10/2017 —- O Improved Turbine Engine Program TBD...Network-Tactical (WIN-T) Increment 2 83 1-page assessments Improved Turbine Engine Program (ITEP) 85 Long Range Precision Fires (LRPF) 86
Dalby, Miles; Whitbread, Mark
2013-08-22
Early ambulance services often confined their activities to a "scoop and run" approach, conveying sick patients quickly to the nearest emergency department. With the advent of modern ST-elevation myocardial infarction (STEMI) management and primary percutaneous coronary intervention (PPCI), the role of the emergency medical service (EMS) has expanded significantly. This review discusses the critical and evolving collaboration between the EMS and the heart attack centre. Speed of reperfusion is a major determinant of outcome in STEMI and, whilst the patient delay (symptom to call time) has a central role in this, system delay (first medical contact to balloon time) is linked to mortality and is used to measure the response of a PPCI programme and is a key element of contemporary guidelines. In addition to rapid diagnosis and transfer to the heart attack centre, the EMS has to deliver a growing number of established treatments including resuscitation and drug therapy. EMS also continually needs to develop expertise in new techniques such as advanced management of cardiac arrest patients, including automated cardiopulmonary resuscitation, and will need to deliver newer therapies if trials support their use, including cooling and preconditioning. Ultimately, the EMS has a central role in the management of STEMI patients which needs to be fully aligned with the heart attack centres. This integration of services is perhaps best regarded as the Heart Attack Team.
Quantum Secure Group Communication.
Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M
2018-03-01
We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.
Training and Advising Foreign Militaries: We’ve Done This Before
2010-05-10
by Mao Tse -tung, Chinese Nationalist forces needed arms, equipment and training. Following the attack on Pearl Harbor, Roosevelt moved quickly to...Nationalist forces against the Japanese invaders. Simultaneously, Chaing was involved in a civil war with Mao Tse -tung’s Communist Army. Although...1931, the Communist established a 54 Ibid., 8-10. 16 Government with Mao Tse -tung as its Chairman. This began the internal struggles between
Military Alliances and Coalitions: Going to War without France
2008-03-26
to drive Saddam Hussein’s army from Kuwait, the formal alliance language simply did not exist. The 9/11 attacks highlighted the limitations of static... language does not exist. They have been credited with quickly building purposeful and capable military forces beyond traditional structured alliance... labeled unilateralist for the mostly-American strike against the Taliban in Afghanistan in 2001 and the 2003 regime change in Iraq. 10 The United
On Cybersecurity, Crowdsourcing, and Social Cyber-Attack
2013-01-01
gahran_1_android- app - android -phone-apple-s- app - store?_s=PM:TECH. Accessed January 9, 2013. DR. REBECCA GOOLSBY is a Program Officer with the Office of Naval...legitimate messages, and understand how quickly mobile apps and text services can disseminate false information. Authorities and volunteers must develop...inflammatory information and disinfor- mation. Like the conflicts sparked by Guttenberg’s invention, significant real-world impacts of a more troubled
Factors governing risk of cougar attacks on humans
Mattson, David; Logan, Kenneth; Sweanor, Linda
2011-01-01
Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the United States were rare (currently 4 to 6/year) compared to attacks by large felids and wolves (Canis lupus) in Africa and Asia (hundreds to thousands/year).
Design of a small molecule against an oncogenic noncoding RNA.
Velagapudi, Sai Pradeep; Cameron, Michael D; Haga, Christopher L; Rosenberg, Laura H; Lafitte, Marie; Duckett, Derek R; Phinney, Donald G; Disney, Matthew D
2016-05-24
The design of precision, preclinical therapeutics from sequence is difficult, but advances in this area, particularly those focused on rational design, could quickly transform the sequence of disease-causing gene products into lead modalities. Herein, we describe the use of Inforna, a computational approach that enables the rational design of small molecules targeting RNA to quickly provide a potent modulator of oncogenic microRNA-96 (miR-96). We mined the secondary structure of primary microRNA-96 (pri-miR-96) hairpin precursor against a database of RNA motif-small molecule interactions, which identified modules that bound RNA motifs nearby and in the Drosha processing site. Precise linking of these modules together provided Targaprimir-96 (3), which selectively modulates miR-96 production in cancer cells and triggers apoptosis. Importantly, the compound is ineffective on healthy breast cells, and exogenous overexpression of pri-miR-96 reduced compound potency in breast cancer cells. Chemical Cross-Linking and Isolation by Pull-Down (Chem-CLIP), a small-molecule RNA target validation approach, shows that 3 directly engages pri-miR-96 in breast cancer cells. In vivo, 3 has a favorable pharmacokinetic profile and decreases tumor burden in a mouse model of triple-negative breast cancer. Thus, rational design can quickly produce precision, in vivo bioactive lead small molecules against hard-to-treat cancers by targeting oncogenic noncoding RNAs, advancing a disease-to-gene-to-drug paradigm.
ERIC Educational Resources Information Center
Bush, Don
1994-01-01
Discusses ways an editor can cut out words to help the reader understand quickly. Discusses dead wood, redundancy, redundancy in thought, smothered verbs, false precision, editing and academia, and making copy smoother. (SR)
Ahrens, Brandon R [Albuquerque, NM; Todd, Steven N [Rio Rancho, NM
2009-04-28
A precision laser aiming system comprises a disrupter tool, a reflector, and a laser fixture. The disrupter tool, the reflector and the laser fixture are configurable for iterative alignment and aiming toward an explosive device threat. The invention enables a disrupter to be quickly and accurately set up, aligned, and aimed in order to render safe or to disrupt a target from a standoff position.
Pilot Human Factors in Stall/Spin Accidents of Supersonic Fighter Aircraft
NASA Technical Reports Server (NTRS)
Anderson, S. B.; Enevoldson, E. K.; Nguyen, L. T.
1983-01-01
A study has been made of pilot human factors related to stall/spin accidents of supersonic fighter aircraft. The military specifications for flight at high angles of attack are examined. Several pilot human factors problems related to stall/spin are discussed. These problems include (1) unsatisfactory nonvisual warning cues; (2) the inability of the pilot to quickly determine if the aircraft is spinning out of control, or to recognize the type of spin; (3) the inability of the pilot to decide on and implement the correct spin recovery technique; (4) the inability of the pilot to move, caused by high angular rotation; and (5) the tendency of pilots to wait too long in deciding to abandon the irrecoverable aircraft. Psycho-physiological phenomena influencing pilot's behavior in stall/spin situations include (1) channelization of sensory inputs, (2) limitations in precisely controlling several muscular inputs, (3) inaccurate judgment of elapsed time, and (4) disorientation of vestibulo-ocular inputs. Results are given of pilot responses to all these problems in the F14A, F16/AB, and F/A-18A aircraft. The use of departure spin resistance and automatic spin prevention systems incorporated on recent supersonic fighters are discussed. These systems should help to improve the stall/spin accident record with some compromise in maneuverability.
Geographic Wormhole Detection in Wireless Sensor Networks
Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin
2015-01-01
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. PMID:25602616
Auricular Chromotherapy in the Treatment of Psychologic Trauma, Phobias, and Panic Disorder
Asis, Daniel Guillermo; Luz, Fabiola Andrade
2018-01-01
Abstract Auricular chromotherapy has shown promising results in the treatment of psychologic trauma and anxiety disorders, such as phobias and panic attacks. With its relatively easy and quick technical application, this procedure could be an indispensable tool for physicians. However, its mechanism of action is not yet understood completely. Objective: To treat patients suffering from trauma, phobia, and panic attack with auricular chromotherapy. Materials and Methods: The protocol was applied in 160 patients (135 who experienced traumas; 15 patients with specific phobias and 10 patients with panic disorder). They are 134 women, 26 men, ages 20–60. Results: The treatment showed 93% of positive response. Conclusion: This procedure shows the possibility of drawing a path from the external ear to traumatic memories, anxiety disorders and phobias.
Quantum key distribution with hacking countermeasures and long term field trial.
Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J
2017-05-16
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
Zhao, Yinzhi; Zhang, Peng; Guo, Jiming; Li, Xin; Wang, Jinling; Yang, Fei; Wang, Xinzhe
2018-06-20
Due to the great influence of multipath effect, noise, clock and error on pseudorange, the carrier phase double difference equation is widely used in high-precision indoor pseudolite positioning. The initial position is determined mostly by the known point initialization (KPI) method, and then the ambiguities can be fixed with the LAMBDA method. In this paper, a new method without using the KPI to achieve high-precision indoor pseudolite positioning is proposed. The initial coordinates can be quickly obtained to meet the accuracy requirement of the indoor LAMBDA method. The detailed processes of the method follows: Aiming at the low-cost single-frequency pseudolite system, the static differential pseudolite system (DPL) method is used to obtain the low-accuracy positioning coordinates of the rover station quickly. Then, the ambiguity function method (AFM) is used to search for the coordinates in the corresponding epoch. The real coordinates obtained by AFM can meet the initial accuracy requirement of the LAMBDA method, so that the double difference carrier phase ambiguities can be correctly fixed. Following the above steps, high-precision indoor pseudolite positioning can be realized. Several experiments, including static and dynamic tests, are conducted to verify the feasibility of the new method. According to the results of the experiments, the initial coordinates with the accuracy of decimeter level through the DPL can be obtained. For the AFM part, both a one-meter search scope and two-centimeter or four-centimeter search steps are used to ensure the precision at the centimeter level and high search efficiency. After dealing with the problem of multiple peaks caused by the ambiguity cosine function, the coordinate information of the maximum ambiguity function value (AFV) is taken as the initial value of the LAMBDA, and the ambiguities can be fixed quickly. The new method provides accuracies at the centimeter level for dynamic experiments and at the millimeter level for static ones.
Doing Business with the Naval Air Systems Command
2014-08-13
Small Businesses (WOSB) — Economically Disadvantaged Women-Owned Small Business (EDWOSB) — Small Disadvantaged Businesses ( SDB ) — Service-Disabled...PRECISION STRIKE WEAPONS SDB II JDAM JSOW SLAM-ER HARPOON DIRECT ATTACK WEAPONS AAE/FC CAD/PAD ADVANCED DEVELOPMENT
Translations on USSR Military Affairs, Number 1292
1977-08-12
commanded by student V. Bagapov quickly and furtively occupied the assigned position. Student E. Khaydarov , the Joader, detected a column of tanks...in the direction of Ulitka grove. Sabirov did not get rattled and gave the command to open fire. Khaydarov , the gunner, reported the initial firing...marker to designate an "enemy" attack in armored personnel carriers. The target appeared in the gunner’s zone of observation. Khaydarov detected it in
Redesign of Medical Stretcher for Special Operation Pararescue Jumpers
2014-06-30
development. 2. Introduction 2.1. Operational Use Modern combat rescue relies on a rescuer’s ability to brave enemy fire and stabilize injured...horizontal or vertical postion if needed. The rescuer is often under threat of enemy attack throughout the rescue operation. When under fire , the...dangerous because they prevent the rescuer from reaching the site quickly and put them at risk of taking fire themselves. After the injured person is
Post-Attack Economic Stabilization Issues for Federal, State, and Local Governments
1985-02-01
workers being transfered from large urban areas to production facilities in areas of lower risk . In another case, rent control staff should be quickly...food supermarkets , which do not universally accept bank cards. 3 0 A requirement will still exist for a large number of credit cards. While there is some...separate system is required for rationing. For example, the increasingly popular automatic teller machine ( ATM ) debit card routinely accesses both a
The Battle of Attu and the Aleutian Island Campaign
2014-05-22
minutes. The Americans, however, had quickly relocated to high ground above Holtz Bay. Colonel Hartl called for a barrage of naval gunfire from the...destroyer Phelps followed by close air support from the aircraft carrier Nassau. Hartl pushed Northern Force uphill through heavy gunfire attacking the...Northern Force was able to drive the enemy back. Hartl sent a message to General Brown stating, “Have captured last high ground before West Arm of
Military Operations Research. Winter 1996. Volume 1, Number 4
1996-01-01
ANALYSIS DISTURBANCE INPUT OUTPUT PLANT SEMANTIC CONTROL SYSTEM CONTROL DESIGNER CONTROL I i LAW SYSTEM GOAL CONTROL IIDENTIFIER SELECTOR ADAPTER CONTRO...analysts for many years. It is designed to provide a quick reference for models that represent the effects of a conventional attack against ground...satellites offer this capability. This poses the additional challenge as to how many highways one can "see" per unit time. He did, however, design a
High precision NC lathe feeding system rigid-flexible coupling model reduction technology
NASA Astrophysics Data System (ADS)
Xuan, He; Hua, Qingsong; Cheng, Lianjun; Zhang, Hongxin; Zhao, Qinghai; Mao, Xinkai
2017-08-01
This paper proposes the use of dynamic substructure method of reduction of order to achieve effective reduction of feed system for high precision NC lathe feeding system rigid-flexible coupling model, namely the use of ADAMS to establish the rigid flexible coupling simulation model of high precision NC lathe, and then the vibration simulation of the period by using the FD 3D damper is very effective for feed system of bolt connection reduction of multi degree of freedom model. The vibration simulation calculation is more accurate, more quickly.
A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.
Sittig, Dean F; Singh, Hardeep
2016-01-01
Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.
A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks
Singh, Hardeep
2016-01-01
Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066
Ball-and-Socket Mount for Instruments
NASA Technical Reports Server (NTRS)
Kaelber, E.
1986-01-01
Jaws engage instrument precisely but release it readily. Mounting mechanism holds scientific instrument securely, allows instrument to be oriented, and minimizes conduction of heat to and from instrument. Mechanism also allows quick replacement of instrument.
Precise Restraightening of Bent Studs
NASA Technical Reports Server (NTRS)
Boardman, R. E.
1982-01-01
Special tool quickly bends studs back into shape accurately and safely by force applied by hydraulic ram, with deflection being measured by dial indicator. Ram and indicator can be interchanged for straightening in reverse direction.
Tips for Improving Seed Planting Efficiency
R. Kasten Dumroese; David L. Wenny; Susan J. Morrison
2002-01-01
The efficiency of a precision seeder was improved by adding a mirror so employees could monitor seed levels and by marking seeds with brightly colored talc to quickly verify the accuracy of the machine.
Design of a small molecule against an oncogenic noncoding RNA
Velagapudi, Sai Pradeep; Cameron, Michael D.; Haga, Christopher L.; Rosenberg, Laura H.; Lafitte, Marie; Duckett, Derek R.; Phinney, Donald G.; Disney, Matthew D.
2016-01-01
The design of precision, preclinical therapeutics from sequence is difficult, but advances in this area, particularly those focused on rational design, could quickly transform the sequence of disease-causing gene products into lead modalities. Herein, we describe the use of Inforna, a computational approach that enables the rational design of small molecules targeting RNA to quickly provide a potent modulator of oncogenic microRNA-96 (miR-96). We mined the secondary structure of primary microRNA-96 (pri-miR-96) hairpin precursor against a database of RNA motif–small molecule interactions, which identified modules that bound RNA motifs nearby and in the Drosha processing site. Precise linking of these modules together provided Targaprimir-96 (3), which selectively modulates miR-96 production in cancer cells and triggers apoptosis. Importantly, the compound is ineffective on healthy breast cells, and exogenous overexpression of pri-miR-96 reduced compound potency in breast cancer cells. Chemical Cross-Linking and Isolation by Pull-Down (Chem-CLIP), a small-molecule RNA target validation approach, shows that 3 directly engages pri-miR-96 in breast cancer cells. In vivo, 3 has a favorable pharmacokinetic profile and decreases tumor burden in a mouse model of triple-negative breast cancer. Thus, rational design can quickly produce precision, in vivo bioactive lead small molecules against hard-to-treat cancers by targeting oncogenic noncoding RNAs, advancing a disease-to-gene-to-drug paradigm. PMID:27170187
Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gallagher, Brian; Eliassi-Rad, Tina
2009-07-08
As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to executemore » arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.« less
Cybersecurity Awareness in the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scholtz, Jean; Franklin, Lyndsey; Le Blanc, Katya L.
2016-07-10
We report on a series of interviews and observations conducted with control room dispatchers in a bulk electrical system. These dispatchers must react quickly to incidents as they happen in order to ensure the reliability and safe operation of the power grid. They do not have the time to evaluate incidents for signs of cyber-attack as part of their initial response. Cyber-attack detection involves multiple personnel from a variety of roles at both local and regional levels. Smart grid technology will improve detection and defense capabilities of the future grid, however, the current infrastructure remains a mixture of old andmore » new equipment which will continue to operate for some time. Thus, research still needs to focus on strategies for the detection of malicious activity on current infrastructure as well as protection and remediation.« less
Cluster headache: present and future therapy.
Leone, Massimo; Giustiniani, Alessandro; Cecchini, Alberto Proietti
2017-05-01
Cluster headache is characterized by severe, unilateral headache attacks of orbital, supraorbital or temporal pain lasting 15-180 min accompanied by ipsilateral lacrimation, rhinorrhea and other cranial autonomic manifestations. Cluster headache attacks need fast-acting abortive agents because the pain peaks very quickly; sumatriptan injection is the gold standard acute treatment. First-line preventative drugs include verapamil and carbolithium. Other drugs demonstrated effective in open trials include topiramate, valproic acid, gabapentin and others. Steroids are very effective; local injection in the occipital area is also effective but its prolonged use needs caution. Monoclonal antibodies against calcitonin gene-related peptide are under investigation as prophylactic agents in both episodic and chronic cluster headache. A number of neurostimulation procedures including occipital nerve stimulation, vagus nerve stimulation, sphenopalatine ganglion stimulation and the more invasive hypothalamic stimulation are employed in chronic intractable cluster headache.
Remediating Third-Party Software Vulnerabilities on U.S. Army Information Systems
2012-06-01
tended to result in the defacement of websites. Attacks coming from Eastern Europe and Russia were directed primarily at Point of Sale (PoS) systems.55...interrupt the user to ask their permission to install a security update. This method is used by Sun Java, Apple QuickTime/Safari/ iTunes , Adobe Flash...only be obtained by contacting its sales department. Several vendors offered a wide range of useful videos, including Microsoft, LANDesk, CFEngine
Political Change in Morocco: Its Effect on the Traditional Monarchy.
1984-06-01
been subjected to eight principal foriegn influences: the Phoenicians, Carthaginians, Romans, Vandals , Byzantines, Arabs, Turks, and French have all...percent are Jew. After the Romans, a quick succession of would-be conquerors and rulers entered the confines of Morocco’s borders. The Baltic Vandals , who...palace at Akhirat, fif- teen miles southwest of Rabat, to celebrate Hassan’s birthday. 117 At about 2:00 P.M. the garden party came under attack by troops
ERIC Educational Resources Information Center
Budden, Michael Craig; Budden, Connie Browning
2007-01-01
University administrators can take a cue from pilots. Pilots regularly face decision situations where much lies in the balance. So it is with university administrators. The department, college or university itself can be compared to an aircraft. In flight, there are times when the sun shines and winds are favorable: a comfortable flight results…
Professional Irregular Defense Forces: The Other Side of COIN
2012-06-01
and Small Powers, 26. 70 Wight, Power Politics, 160. 24 attacked.71 During the Second World War, Nazi Germany, based on its temporary interests...Rise and Fall of the Third Reich: A History of Nazi Germany (New York: Simon and Schuster, 1990), 721–723. 73 Karsh, Neutrality and Small States, 26...93 VI. THE YUGOSLAV PARTISANS A. BACKGROUND On 1 September 1939, Nazi Germany invaded Poland and the Second World War began. Following a quick
Recovery of human remains after shark attack.
Byard, Roger W; James, Ross A; Heath, Karen J
2006-09-01
Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.
How Do Statistical Detection Methods Compare to Entropy Measures
2012-08-28
October 2001. It is known as RS attack or “Reliable Detection of LSB Steganography in Grayscale and color images ”. The algorithm they use is very...precise for the detection of pseudo-aleatory LSB steganography . Its precision varies with the image but, its referential value is a 0.005 bits by...Jessica Fridrich, Miroslav Goljan, Rui Du, "Detecting LSB Steganography in Color and Gray-Scale Images ," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Air Operations in Israel’s War Against Hezbollah: Learning from Lebanon and Getting It Right in Gaza
2011-01-01
alongside the 113 Steven Erlanger, “As Israel Begins to Pull Troops Out, Lebanon and the UN Prepare to Replace Them,” New York Times, August 16...engagement. Then, just before pulling abreast of the Ababil, he fired a Python 4 infrared missile using his helmet-mounted sight for high off-boresight...shock for two weeks after the Wehrmacht’s surprise attack on the Soviet Union in 1941, Nasrallah pulled himself back together fairly quickly. Shortly
Strategic Policy for Pandemic Vaccine Distribution
2010-09-01
Act (PREP Act) was passed as part of the “Department of Defense, Emergency Supplemental Appropriations to address hurricanes in the Gulf of Mexico ...few respondents stated, “It caught us by surprise!” The next pandemic was to have come over from Asia. H1N1 came up quickly through Mexico . It was...discussion. The severity of H1N1 in Mexico was extremely high initially, in addition to the attack rate. The case fatality rate exceeded 65 percent.9 A
Preparing for the Future, Looking to the Past: History, Theory, and Doctrine in the U.S. Army
2013-05-23
science, a complete rewrite of the science’s textbook . However, the textbook will only change if the scientific community of interest accepts the new...warfare not being the exception. 37 If Wass de Czege was correct and, in the case of the U.S. Army operations doctrine, the textbook of the art and...the attack and elasticity in the defense. Agility denoted to the organizations flexibility for action derived from “quick minded, flexible leaders
MagPy: A Python toolbox for controlling Magstim transcranial magnetic stimulators.
McNair, Nicolas A
2017-01-30
To date, transcranial magnetic stimulation (TMS) studies manipulating stimulation parameters have largely used blocked paradigms. However, altering these parameters on a trial-by-trial basis in Magstim stimulators is complicated by the need to send regular (1Hz) commands to the stimulator. Additionally, effecting such control interferes with the ability to send TMS pulses or simultaneously present stimuli with high-temporal precision. This manuscript presents the MagPy toolbox, a Python software package that provides full control over Magstim stimulators via the serial port. It is able to maintain this control with no impact on concurrent processing, such as stimulus delivery. In addition, a specially-designed "QuickFire" serial cable is specified that allows MagPy to trigger TMS pulses with very low-latency. In a series of experimental simulations, MagPy was able to maintain uninterrupted remote control over the connected Magstim stimulator across all testing sessions. In addition, having MagPy enabled had no effect on stimulus timing - all stimuli were presented for precisely the duration specified. Finally, using the QuickFire cable, MagPy was able to elicit TMS pulses with sub-millisecond latencies. The MagPy toolbox allows for experiments that require manipulating stimulation parameters from trial to trial. Furthermore, it can achieve this in contexts that require tight control over timing, such as those seeking to combine TMS with fMRI or EEG. Together, the MagPy toolbox and QuickFire serial cable provide an effective means for controlling Magstim stimulators during experiments while ensuring high-precision timing. Copyright © 2016 Elsevier B.V. All rights reserved.
78 FR 70540 - Meeting of the National Commission on the Structure of the Air Force
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-26
... information. Agenda: The updated agenda items were: --The role of airpower in the post-Afghanistan national... Superiority, Air Mobility, Global Precision Attack, Nuclear Deterrence Operations, Command and Control... such as modernization readiness, procurement, manpower, research development test and evaluation...
Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering
NASA Technical Reports Server (NTRS)
Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan
2015-01-01
The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-07-24
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-01-01
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085
The intelligence community and the war on terror: the role of behavioral science.
Busch, Kenneth G; Weissman, Sidney H
2005-01-01
The United States intelligence community has been under intense scrutiny from both inside and outside in the aftermath of September 11. Post mortem assessments of intelligence breakdowns may judge the events as more predictable than was in fact the actual reality. In a troubled world, when threats to national security can materialize very quickly, the intelligence community must be able to effectively and swiftly develop and implement plans to prevent further terrorist attacks on the homeland. Numerous scenarios need to be considered for the management of crisis situations. Intelligence actions must make it more difficult for terrorists to strike at their targets. The war on terror must confront a new generation of enemies who threaten to attack the United States with weapons of mass destruction. This essay will focus on the role of behavioral science and how related reforms within the intelligence community could improve its capability to respond to a huge challenge.
A Framework for RFID Survivability Requirement Analysis and Specification
NASA Astrophysics Data System (ADS)
Zuo, Yanjun; Pimple, Malvika; Lande, Suhas
Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.
Chest pain, panic disorder and coronary artery disease: a systematic review.
Soares-Filho, Gastão L F; Arias-Carrión, Oscar; Santulli, Gaetano; Silva, Adriana C; Machado, Sergio; Valenca, Alexandre M; Nardi, Antonio E
2014-01-01
Chest pain may be due benign diseases but often suggests an association with coronary artery disease, which justifies a quick search for medical care. However, some people have anxiety disorder with symptoms that resemble clearly an acute coronary syndrome. More specifically, during a panic attack an abrupt feeling of fear accompanied by symptoms such as breathlessness, palpitations and chest pain, makes patients believe they have a heart attack and confuse physicians about the diagnosis. The association between panic disorder and coronary artery disease has been extensively studied in recent years and, although some studies have shown anxiety disorders coexisting or increasing the risk of heart disease, one causal hypothesis is still missing. The aim of this systematic review is to present the various ways in which the scientific community has been investigating the relation between chest pain, panic disorder and coronary artery disease.
Coombes, Stephen A; Cauraugh, James H; Janelle, Christopher M
2007-11-01
We aimed to clarify the relation between affective valence and motivational direction by specifying how central and peripheral components of extension movements are altered according to specific unpleasant affective states. As predicted, premotor reaction time was quicker for extension movements initiated during exposure to attack than for extension movements initiated during exposure to all other valence categories (mutilation, erotic couples, opposite-sex nudes, neutral humans, household objects, blank). Exposure to erotic couples and mutilations yielded greater peak force than exposure to images of attack, neutral humans, and household objects. Finally, motor reaction time and peak electromyographic amplitude were not altered by valence. These findings indicate that unpleasant states do not unilaterally prime withdrawal movements, and that the quick execution of extension movements during exposure to threatening images is due to rapid premotor, rather than motor, reaction time. Collectively, our findings support the call for dissociating motivational direction and affective valence.
Quick mixing of epoxy components
NASA Technical Reports Server (NTRS)
Dunlap, D. E., Jr.
1981-01-01
Two materials are mixed quickly, thoroughly, and in precise proportion by disposable cartridge. Cartridge mixes components of fast-curing epoxy resins, with no mess, just before they are used. It could also be used in industry and home for caulking, sealing, and patching. Materials to be mixed are initially isolated by cylinder wall within cartridge. Cylinder has vanes, with holes in them, at one end and handle at opposite end. When handle is pulled, grooves on shaft rotate cylinder so that vanes rotate to extrude material A uniformly into material B.
NASA Astrophysics Data System (ADS)
Kumar, Ravi; Bhaduri, Basanta; Nishchal, Naveen K.
2018-01-01
In this study, we propose a quick response (QR) code based nonlinear optical image encryption technique using spiral phase transform (SPT), equal modulus decomposition (EMD) and singular value decomposition (SVD). First, the primary image is converted into a QR code and then multiplied with a spiral phase mask (SPM). Next, the product is spiral phase transformed with particular spiral phase function, and further, the EMD is performed on the output of SPT, which results into two complex images, Z 1 and Z 2. Among these, Z 1 is further Fresnel propagated with distance d, and Z 2 is reserved as a decryption key. Afterwards, SVD is performed on Fresnel propagated output to get three decomposed matrices i.e. one diagonal matrix and two unitary matrices. The two unitary matrices are modulated with two different SPMs and then, the inverse SVD is performed using the diagonal matrix and modulated unitary matrices to get the final encrypted image. Numerical simulation results confirm the validity and effectiveness of the proposed technique. The proposed technique is robust against noise attack, specific attack, and brutal force attack. Simulation results are presented in support of the proposed idea.
Fothergill, Rachael T; Watson, Lynne R; Virdi, Gurkamal K; Moore, Fionna P; Whitbread, Mark
2014-01-01
This study reports survival outcomes for patients resuscitated from out-of-hospital cardiac arrest (OHCA) subsequent to ST-elevation myocardial infarction (STEMI), and who were conveyed directly by ambulance clinicians to a specialist Heart Attack Centre for expert cardiology assessment, angiography and possible percutaneous coronary intervention (PCI). This is a retrospective descriptive review of data sourced from the London Ambulance Service's OHCA registry over a one-year period. We observed excellent survival rates for our cohort of patients with 66% of patients surviving to be discharged from hospital, the majority of whom were still alive after one year. Those who survived tended to be younger, to have had a witnessed arrest in a public place with an initial cardiac rhythm of VF/VT, and to have been transported to the specialist centre more quickly than those who did not. A system allowing ambulance clinicians to autonomously convey OHCA STEMI patients who achieve a return of spontaneous circulation directly to a Heart Attack Centre is highly effective and yields excellent survival outcomes. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Green Leaf Volatiles: A Plant’s Multifunctional Weapon against Herbivores and Pathogens
Scala, Alessandra; Allmann, Silke; Mirabella, Rossana; Haring, Michel A.; Schuurink, Robert C.
2013-01-01
Plants cannot avoid being attacked by an almost infinite number of microorganisms and insects. Consequently, they arm themselves with molecular weapons against their attackers. Plant defense responses are the result of a complex signaling network, in which the hormones jasmonic acid (JA), salicylic acid (SA) and ethylene (ET) are the usual suspects under the magnifying glass when researchers investigate host-pest interactions. However, Green Leaf Volatiles (GLVs), C6 molecules, which are very quickly produced and/or emitted upon herbivory or pathogen infection by almost every green plant, also play an important role in plant defenses. GLVs are semiochemicals used by insects to find their food or their conspecifics. They have also been reported to be fundamental in indirect defenses and to have a direct effect on pests, but these are not the only roles of GLVs. These volatiles, being probably one of the fastest weapons exploited, are also able to directly elicit or prime plant defense responses. Moreover, GLVs, via crosstalk with phytohormones, mostly JA, can influence the outcome of the plant’s defense response against pathogens. For all these reasons GLVs should be considered as co-protagonists in the play between plants and their attackers. PMID:23999587
Managing fermentation with baled silage
USDA-ARS?s Scientific Manuscript database
Baled silage is an attractive management option for many forage and livestock producers. Many principles for making well-preserved baled silage are similar to those required for traditional precision-chopped silages. Generally, the overall goal is to quickly create an anaerobic environment in which ...
Representing the Earth's shape: the polemics surrounding Maupertuis's expedition to Lapland.
NASA Astrophysics Data System (ADS)
Terrall, M.
1992-06-01
Historical accounts of quantification in the physical sciences in the eighteenth century have often been described as a straightforward series of steps in a process of maturation, as instruments and standards advanced in precision. This paper calls into question the self-evidence nature of precision by investigating the production and uses of measurements. In the case of the dispute over the shape of the Earth, centered in Paris in the 1730s, the precision of measurements was a matter to be interpreted, attacked, defended, and represented. The whole messy business, undertaken by the participants to win consensus from their contemporaries, took place in the context of academic politics and the intellectual fashions of the salons and the court. All parties to the dispute claimed to be drawing on precision measurements; evaluating precision turned out to require the use of a range of intellectual, mathematical, instrumental, political, and textual resources. The alleged precision was then used to construct and defend rival scientific programs and practices.
Thurnheer, R; Henz, S; Knoblauch, A
1997-09-01
The term "sleep-related laryngospasm" refers to episodic, abrupt interruption of sleep accompanied by feelings of acute suffocation followed by stridor. The condition is included in the diagnostic and coding manual of the American Sleep Disorders Association (ASDA), but there are few references in the peer-reviewed literature. Our description of the distinct clinical picture associated with this condition is based on an analysis of the histories of a series of 10 patients. The patients and their families gave precise, uniform accounts of the dramatic attacks. Diagnostic work-up included pulmonary and gastroenterological assessment. All patients reported sudden awakening from sleep due to feelings of acute suffocation, accompanied by intense fear. Apnoea lasting 5-45 s was followed by stridor. Breathing returned to normal within minutes. Patients were left exhausted by the attacks. Nine of our 10 patients had evidence of gastro-oesophageal reflux and six responded to antireflux therapy. We conclude that the nocturnal choking attacks (and the occasional daytime attacks experienced by some of the patients) are caused by laryngospasm. The pathogenesis of the apparent underlying laryngeal irritability is unknown. The condition may be related to a gastro-oesophageal reflux.
Laser velocimeter survey about a NACA 0012 wing at low angles of attack
NASA Technical Reports Server (NTRS)
Hoad, D. R.; Meyers, J. F.; Young, W. H., Jr.; Hepner, T. E.
1978-01-01
An investigation was conducted in the Langley V/STOL tunnel with a laser velocimeter to obtain measurements of airflow velocities about a wing at low angles of attack. The applicability of the laser velocimeter technique for this purpose in the V/STOL tunnel was demonstrated in this investigation with measurement precision bias calculated at -1.33 percent to 0.91 percent and a random uncertainty calculated at + or - 0.47 percent. Free stream measurements were obtained with this device and compared with velocity calculations from pitot static probe data taken near the laser velocimeter measurement location. The two measurements were in agreement to within 1 percent. Velocity measurement results about the centerline at 0.6 degrees angle of attack were typically those expected. At 4.75 degrees, the velocity measurements indicated that a short laminar separation bubble existed near the leading edge with an oscillating shear layer.
The influence of male takeovers on female dispersal in Colobus vellerosus.
Sicotte, Pascale; Teichroeb, Julie A; Vayro, Josie V; Fox, Stephanie A; Bădescu, Iulia; Wikberg, Eva C
2017-07-01
Male takeovers affect male tenure, female mate choice and ultimately, individual reproductive success in group-living primates. In social systems with female philopatry and high male reproductive skew, male takeovers largely determine female mate choice, whereas in species with female dispersal, females have the option of deserting a new male. We focused on a species with facultative female dispersal to investigate which factors promote female desertion of males after takeover, using 15 cases (12 for which we have complete data on the takeover process and the female dispersal outcome). These cases took place in nine groups of Colobus vellerosus between 2001 and 2013 at the Boabeng-Fiema Monkey Sanctuary, Ghana. Quick takeovers were usually achieved by single adult males and were never followed by female dispersal. Slow takeovers involved several males, and these takeovers were regularly accompanied by female emigration. Infant attacks and infanticide by males occurred during both kinds of takeovers, but females with dependent offspring never dispersed, regardless of whether their infant was attacked or killed by the new male(s). Subadult females, who were not constrained by the presence of infants, dispersed more often after slow takeovers than after quick takeovers. Whether female dispersal post-takeover is an expression of female mate choice, or occurs to avoid the social upheaval surrounding slow takeovers, remains to be investigated. Am. J. Primatol. 79:e22436, 2017. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.
Modeling Cyber Conflicts Using an Extended Petri Net Formalism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zakrzewska, Anita N; Ferragut, Erik M
2011-01-01
When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less
Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing
NASA Astrophysics Data System (ADS)
Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim
2015-03-01
The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.
Airborne LiDAR : a new source of traffic flow data : executive summary.
DOT National Transportation Integrated Search
2005-10-01
LiDAR (or airborne laser scanning) systems became a : dominant player in high-precision spatial data : acquisition in the late 90s. This new technology : quickly established itself as the main source of surface : information in commercial mapping,...
Airborne LiDAR : a new source of traffic flow data, executive summary report.
DOT National Transportation Integrated Search
2005-10-01
LiDAR (or airborne laser scanning) systems became a : dominant player in high-precision spatial data : acquisition in the late 90s. This new technology : quickly established itself as the main source of surface : information in commercial mapping,...
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
THERMOSTAT FOR LOWER TEMPERATURES
Stier, T. J. B.; Crozier, W. J.
1933-01-01
Details are given concerning the construction and operation of relatively simple thermostats which permit maintaining precise temperatures down to 0°C. (with water), or temperatures above that of the ordinary room, and in which the temperature may be quickly altered at short intervals to new levels. PMID:19872736
Airborne LiDAR : a new source of traffic flow data, research implementation plan.
DOT National Transportation Integrated Search
2005-10-01
LiDAR (or airborne laser scanning) systems became a dominant player in high-precision spatial data acquisition in the late 90's. This new technology quickly established itself as the main source of surface information in commercial mapping, deliverin...
NASA Astrophysics Data System (ADS)
Sivanpillai, R.; Ewers, B. E.; Speckman, H. N.; Miller, S. N.
2015-12-01
In the Western United States, more than 3 million hectares of lodgepole pine forests have been impacted by the Mountain pine beetle outbreak, while another 166,000 hectares of spruce-fir forests have been attacked by Spruce beetle. Following the beetle attack, the trees lose their hydraulic conductivity thus altering their carbon and water fluxes. These trees go through various stages of stress until mortality, described by color changes in their needles prior to losing them. Modeling the impact of these vegetation types require thematically precise land cover data that distinguishes lodgepole pine and spruce-fir forests along with the stage of impact since the ecosystem fluxes are different for these two systems. However, the national and regional-scale land cover datasets derived from remotely sensed data do not have this required thematic precision. We evaluated the feasibility of multispectral data collected by Landsat 8 to distinguish lodgepole pine and spruce fir, and subsequently model the different stages of attack using field data collected in Medicine Bow National Forest (Wyoming, USA). Operational Land Imager, onboard Landsat 8 has more spectral bands and higher radiometric resolution (12 bit) in comparison to sensors onboard earlier Landsat missions which could improve the ability to distinguish these vegetation types and their stress conditions. In addition to these characteristics, its repeat coverage, rigorous radiometric calibration, wide swath width, and no-cost data provide unique advantages to Landsat data for mapping large geographic areas. Initial results from this study highlight the importance of SWIR bands for distinguishing different levels of stress, and the need for ancillary data for distinguishing species types. Insights gained from this study could lead to the generation of land cover maps with higher thematic precision, and improve the ability to model various ecosystem processes as a result of these infestations.
Slater, Jim; Shields, Laura; Racette, Ray J; Juzwishin, Donald; Coppes, Max
2015-11-01
In the era of personalized and precision medicine, the approach to healthcare is quickly changing. Genetic and other molecular information are being increasingly demanded by clinicians and expected by patients for prevention, screening, diagnosis, prognosis, health promotion, and treatment of an increasing number of conditions. As a result of these developments, Canadian health leaders must understand and be prepared to lead the necessary changes associated with these disruptive technologies. This article focuses on precision therapeutics but also provides background on the concepts and terminology related to personalized and precision medicine and explores Canadian health leadership and system issues that may pose barriers to their implementation. The article is intended to inspire, educate, and mobilize Canadian health leaders to initiate dialogue around the transformative changes necessary to ready the healthcare system to realize the benefits of precision therapeutics. © 2015 Collège canadien des leaders en santé
High precision locating control system based on VCM for Talbot lithography
NASA Astrophysics Data System (ADS)
Yao, Jingwei; Zhao, Lixin; Deng, Qian; Hu, Song
2016-10-01
Aiming at the high precision and efficiency requirements of Z-direction locating in Talbot lithography, a control system based on Voice Coil Motor (VCM) was designed. In this paper, we built a math model of VCM and its moving characteristic was analyzed. A double-closed loop control strategy including position loop and current loop were accomplished. The current loop was implemented by driver, in order to achieve the rapid follow of the system current. The position loop was completed by the digital signal processor (DSP) and the position feedback was achieved by high precision linear scales. Feed forward control and position feedback Proportion Integration Differentiation (PID) control were applied in order to compensate for dynamic lag and improve the response speed of the system. And the high precision and efficiency of the system were verified by simulation and experiments. The results demonstrated that the performance of Z-direction gantry was obviously improved, having high precision, quick responses, strong real-time and easily to expend for higher precision.
Precision Spectrophotometric Calibration System for Dark Energy Instruments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schubnell, Michael S.
2015-06-30
For this research we build a precision calibration system and carried out measurements to demonstrate the precision that can be achieved with a high precision spectrometric calibration system. It was shown that the system is capable of providing a complete spectrophotometric calibration at the sub-pixel level. The calibration system uses a fast, high precision monochromator that can quickly and efficiently scan over an instrument’s entire spectral range with a spectral line width of less than 0.01 nm corresponding to a fraction of a pixel on the CCD. The system was extensively evaluated in the laboratory. Our research showed that amore » complete spectrophotometric calibration standard for spectroscopic survey instruments such as DESI is possible. The monochromator precision and repeatability to a small fraction of the DESI spectrograph LSF was demonstrated with re-initialization on every scan and thermal drift compensation by locking to multiple external line sources. A projector system that mimics telescope aperture for point source at infinity was demonstrated.« less
Integrated situational awareness for cyber attack detection, analysis, and mitigation
NASA Astrophysics Data System (ADS)
Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng
2012-06-01
Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.
General immunity and superadditivity of two-way Gaussian quantum cryptography.
Ottaviani, Carlo; Pirandola, Stefano
2016-03-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.
General immunity and superadditivity of two-way Gaussian quantum cryptography
Ottaviani, Carlo; Pirandola, Stefano
2016-01-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks. PMID:26928053
Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.
NASA Technical Reports Server (NTRS)
Whitmore, Stephen A.; Moes, Timothy R.; Larson, Terry J.
1990-01-01
A nonintrusive high angle-of-attack flush airdata sensing (HI-FADS) system was installed and flight-tested on the F-18 high alpha research flight vehicle. The system is a matrix of 25 pressure orifices in concentric circles on the nose of the vehicle. The orifices determine angles of attack and sideslip, Mach number, and pressure altitude. Pressure was transmitted from the orifices to an electronically scanned pressure module by lines of pneumatic tubing. The HI-FADS system was calibrated and demonstrated using dutch roll flight maneuvers covering large Mach, angle-of-attack, and sideslip ranges. Reference airdata for system calibration were generated by a minimum variance estimation technique blending measurements from two wingtip airdata booms with inertial velocities, aircraft angular rates and attitudes, precision radar tracking, and meteorological analyses. The pressure orifice calibration was based on identifying empirical adjustments to modified Newtonian flow on a hemisphere. Calibration results are presented. Flight test results used all 25 orifices or used a subset of 9 orifices. Under moderate maneuvering conditions, the HI-FADS system gave excellent results over the entire subsonic Mach number range up to 55 deg angle of attack. The internal pneumatic frequency response of the system is accurate to beyond 10 Hz. Aerodynamic lags in the aircraft flow field caused some performance degradation during heavy maneuvering.
The Speech multi features fusion perceptual hash algorithm based on tensor decomposition
NASA Astrophysics Data System (ADS)
Huang, Y. B.; Fan, M. H.; Zhang, Q. Y.
2018-03-01
With constant progress in modern speech communication technologies, the speech data is prone to be attacked by the noise or maliciously tampered. In order to make the speech perception hash algorithm has strong robustness and high efficiency, this paper put forward a speech perception hash algorithm based on the tensor decomposition and multi features is proposed. This algorithm analyses the speech perception feature acquires each speech component wavelet packet decomposition. LPCC, LSP and ISP feature of each speech component are extracted to constitute the speech feature tensor. Speech authentication is done by generating the hash values through feature matrix quantification which use mid-value. Experimental results showing that the proposed algorithm is robust for content to maintain operations compared with similar algorithms. It is able to resist the attack of the common background noise. Also, the algorithm is highly efficiency in terms of arithmetic, and is able to meet the real-time requirements of speech communication and complete the speech authentication quickly.
QR code-based non-linear image encryption using Shearlet transform and spiral phase transform
NASA Astrophysics Data System (ADS)
Kumar, Ravi; Bhaduri, Basanta; Hennelly, Bryan
2018-02-01
In this paper, we propose a new quick response (QR) code-based non-linear technique for image encryption using Shearlet transform (ST) and spiral phase transform. The input image is first converted into a QR code and then scrambled using the Arnold transform. The scrambled image is then decomposed into five coefficients using the ST and the first Shearlet coefficient, C1 is interchanged with a security key before performing the inverse ST. The output after inverse ST is then modulated with a random phase mask and further spiral phase transformed to get the final encrypted image. The first coefficient, C1 is used as a private key for decryption. The sensitivity of the security keys is analysed in terms of correlation coefficient and peak signal-to noise ratio. The robustness of the scheme is also checked against various attacks such as noise, occlusion and special attacks. Numerical simulation results are shown in support of the proposed technique and an optoelectronic set-up for encryption is also proposed.
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
Air & Space Power Journal. Volume 21, Number 4, Winter 2007
2007-01-01
all very well laid out, with buildings dotted neatly with trees and flowers . The people we met, whether the commandant, a sergeant, or a student...quick, precise employment; and solid as sessment of the enemy and population will produce positive, tangible results. Since the “ banana wars” of
Bio-ALIRT biosurveillance detection algorithm evaluation.
Siegrist, David; Pavlin, J
2004-09-24
Early detection of disease outbreaks by a medical biosurveillance system relies on two major components: 1) the contribution of early and reliable data sources and 2) the sensitivity, specificity, and timeliness of biosurveillance detection algorithms. This paper describes an effort to assess leading detection algorithms by arranging a common challenge problem and providing a common data set. The objectives of this study were to determine whether automated detection algorithms can reliably and quickly identify the onset of natural disease outbreaks that are surrogates for possible terrorist pathogen releases, and do so at acceptable false-alert rates (e.g., once every 2-6 weeks). Historic de-identified data were obtained from five metropolitan areas over 23 months; these data included International Classification of Diseases, Ninth Revision (ICD-9) codes related to respiratory and gastrointestinal illness syndromes. An outbreak detection group identified and labeled two natural disease outbreaks in these data and provided them to analysts for training of detection algorithms. All outbreaks in the remaining test data were identified but not revealed to the detection groups until after their analyses. The algorithms established a probability of outbreak for each day's counts. The probability of outbreak was assessed as an "actual" alert for different false-alert rates. The best algorithms were able to detect all of the outbreaks at false-alert rates of one every 2-6 weeks. They were often able to detect for the same day human investigators had identified as the true start of the outbreak. Because minimal data exists for an actual biologic attack, determining how quickly an algorithm might detect such an attack is difficult. However, application of these algorithms in combination with other data-analysis methods to historic outbreak data indicates that biosurveillance techniques for analyzing syndrome counts can rapidly detect seasonal respiratory and gastrointestinal illness outbreaks. Further research is needed to assess the value of electronic data sources for predictive detection. In addition, simulations need to be developed and implemented to better characterize the size and type of biologic attack that can be detected by current methods by challenging them under different projected operational conditions.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA
Al-ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302
The San Bernardino, California, Terror Attack: Two Emergency Departments' Response.
Lee, Carol; Walters, Elizabeth; Borger, Rodney; Clem, Kathleen; Fenati, Gregory; Kiemeney, Michael; Seng, Sakona; Yuen, Ho-Wang; Neeki, Michael; Smith, Dustin
2016-01-01
On December 2, 2015, a terror attack in the city of San Bernardino, California killed 14 Americans and injured 22 in the deadliest attack on U.S. soil since September 11, 2001. Although emergency personnel and law enforcement officials frequently deal with multi-casualty incidents (MCIs), what occurred that day required an unprecedented response. Most of the severely injured victims were transported to either Loma Linda University Medical Center (LLUMC) or Arrowhead Regional Medical Center (ARMC). These two hospitals operate two designated trauma centers in the region and played crucial roles during the massive response that followed this attack. In an effort to shed a light on our response to others, we provide an account of how these two teaching hospitals prepared for and coordinated the medical care of these victims. In general, both centers were able to quickly mobilize large number of staff and resources. Prior disaster drills proved to be invaluable. Both centers witnessed excellent teamwork and coordination involving first responders, law enforcement, administration, and medical personnel from multiple specialty services. Those of us working that day felt safe and protected. Although we did identify areas we could have improved upon, including patchy communication and crowd-control, they were minor in nature and did not affect patient care. MCIs pose major challenges to emergency departments and trauma centers across the country. Responding to such incidents requires an ever-evolving approach as no two incidents will present exactly alike. It is our hope that this article will foster discussion and lead to improvements in management of future MCIs.
Multivariable control of a forward swept wing aircraft. M.S. Thesis
NASA Technical Reports Server (NTRS)
Quinn, W. W.
1986-01-01
The impact of independent canard and flaperon control of the longitudinal axis of a generic forward swept wing aircraft is examined. The Linear Quadratic Gaussian (LQG)/Loop Transfer Recovery (LTR) method is used to design three compensators: two single-input-single-output (SISO) systems, one with angle of attack as output and canard as control, the other with pitch attitude as output and canard as control, and a two-input-two-output system with both canard and flaperon controlling both the pitch attitude and angle of attack. The performances of the three systems are compared showing the addition of flaperon control allows the aircraft to perform in the precision control modes with very little loss of command following accuracy.
State-of-the-art research on electromagnetic information security
NASA Astrophysics Data System (ADS)
Hayashi, Yu-ichi
2016-07-01
As information security is becoming increasingly significant, security at the hardware level is as important as in networks and applications. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and capacities have increased. With these advancements, the threat of advanced attacks that were considerably difficult to carry out previously has increased not only in military and diplomatic fields but also in general-purpose manufactured devices. This paper focuses on the problem of the security limitations concerning electromagnetic waves (electromagnetic information security) that has rendered attack detection particularly difficult at the hardware level. In addition to reviewing the mechanisms of these information leaks and countermeasures, this paper also presents the latest research trends and standards.
Lv, Fu-Yan; Dong, Rui-Hua; Li, Zhao-Jian; Qin, Chong-Chong; Yan, Xu; He, Xiao-Xiao; Zhou, Yu; Yan, Shi-Ying; Long, Yun-Ze
In this work, we propose an in situ precise electrospinning of medical glue fibers onto dural wound for improving sealing capability, avoiding tissue adhesion, and saving time in dural repair. N-octyl-2-cyanoacrylate, a commercial tissue adhesive (medical glue), can be electrospun into ultrathin fibrous film with precise and homogeneous deposition by a gas-assisted electrospinning device. The self-assembled N-octyl-2-cyanoacrylate film shows high compactness and flexibility owing to its fibrous structure. Simulation experiments on egg membranes and goat meninges demonstrated that this technology can repair small membrane defects quickly and efficiently. This method may have potential application in dural repair, for example, working as an effective supplementary technique for conventional dura suture.
Jose F. Negron; Willis C. Schaupp; Erik Johnson
2000-01-01
The Douglas-fir beetle, Dendroctonus pseudotsugae Hopkins, attacks Douglas-fir, Pseudotsuga menziesii (Mirb.) Franco (Pinaceae), throughout western North America. Periodic outbreaks cause increased mortality of its host. Land managers and forest health specialists often need to determine population trends of this insect. Bark samples were obtained from 326 trees...
Operational Exercise Integration Recommendations for DoD Cyber Ranges
2015-08-05
be the precision and recall of a security information and event management (SIEM) system ’s notifications of unauthorized access to that directory...network traffic, port scanning Deplete Resources TCP flooding, memory leak exploitation Injection Cross-site scripting attacks, SQL injection Deceptive...requirements for personnel development; tactics, techniques, and procedures (TTPs) devel- opment; and mission rehearsals . While unique in their own
Staff Judge Advocate Deskbook. Revised
1994-01-01
precision in defiming and interpreting the rules of customary law has been a principal motivation behind efforts to codify LOAC through treaties and...by state vessels or attacks without a profit motivation . Despite its romantic legends piracy is not a thing of the past, but an ongoing and very...common criminal activity. 0903 DEFINING TERRORISM International terrorism is the premeditated, politically motivated violence perpetrated against
A flight test method for pilot/aircraft analysis
NASA Technical Reports Server (NTRS)
Koehler, R.; Buchacker, E.
1986-01-01
In high precision flight maneuvres a pilot is a part of a closed loop pilot/aircraft system. The assessment of the flying qualities is highly dependent on the closed loop characteristics related to precision maneuvres like approach, landing, air-to-air tracking, air-to-ground tracking, close formation flying and air-to air refueling of the receiver. The object of a research program at DFVLR is the final flight phase of an air to ground mission. In this flight phase the pilot has to align the aircraft with the target, correct small deviations from the target direction and keep the target in his sights for a specific time period. To investigate the dynamic behavior of the pilot-aircraft system a special ground attack flight test technique with a prolonged tracking maneuvres was developed. By changing the targets during the attack the pilot is forced to react continously on aiming errors in his sights. Thus the closed loop pilot/aircraft system is excited over a wide frequency range of interest, the pilot gets more information about mission oriented aircraft dynamics and suitable flight test data for a pilot/aircraft analysis can be generated.
The Effect of 9/11 on the Heritability of Political Trust.
Ojeda, Christopher
2016-02-01
Following the attacks of September 11, 2001, a rally effect led to a precipitous rise in political trust. However, the increase in political trust concealed a simultaneous decline among a smaller portion of the population. This paper examines the psychological mechanisms underlying these heterogeneous attitudes towards government and shows that a biosocial model best explains the observed patterns of response. The interplay of genetic and environmental factors of political trust reveals the stable but dynamic nature of heritability: genetic influences of political trust increased immediately following 9/11 but quickly decayed to pre-9/11 levels.
The Effect of 9/11 on the Heritability of Political Trust1
Ojeda, Christopher
2014-01-01
Following the attacks of September 11, 2001, a rally effect led to a precipitous rise in political trust. However, the increase in political trust concealed a simultaneous decline among a smaller portion of the population. This paper examines the psychological mechanisms underlying these heterogeneous attitudes towards government and shows that a biosocial model best explains the observed patterns of response. The interplay of genetic and environmental factors of political trust reveals the stable but dynamic nature of heritability: genetic influences of political trust increased immediately following 9/11 but quickly decayed to pre-9/11 levels. PMID:26843705
Pope, Daniel J.
2011-01-01
In the aftermath of the London ‘7/7’ attacks in 2005, UK government agencies required the development of a quick-running tool to predict the weapon and injury effects caused by the initiation of a person borne improvised explosive device (PBIED) within crowded metropolitan environments. This prediction tool, termed the HIP (human injury predictor) code, was intended to: — assist the security services to encourage favourable crowd distributions and densities within scenarios of ‘sensitivity’;— provide guidance to security engineers concerning the most effective location for protection systems;— inform rescue services as to where, in the case of such an event, individuals with particular injuries will be located;— assist in training medical personnel concerning the scope and types of injuries that would be sustained as a consequence of a particular attack;— assist response planners in determining the types of medical specialists (burns, traumatic amputations, lungs, etc.) required and thus identify the appropriate hospitals to receive the various casualty types.This document describes the algorithms used in the development of this tool, together with the pertinent underpinning physical processes. From its rudimentary beginnings as a simple spreadsheet, the HIP code now has a graphical user interface (GUI) that allows three-dimensional visualization of results and intuitive scenario set-up. The code is underpinned by algorithms that predict the pressure and momentum outputs produced by PBIEDs within open and confined environments, as well as the trajectories of shrapnel deliberately placed within the device to increase injurious effects. Further logic has been implemented to transpose these weapon effects into forms of human injury depending on where individuals are located relative to the PBIED. Each crowd member is subdivided into representative body parts, each of which is assigned an abbreviated injury score after a particular calculation cycle. The injury levels of each affected body part are then summated and a triage state assigned for each individual crowd member based on the criteria specified within the ‘injury scoring system’. To attain a comprehensive picture of a particular event, it is important that a number of simulations, using what is substantively the same scenario, are undertaken with natural variation being applied to the crowd distributions and the PBIED output. Accurate mathematical representation of such complex phenomena is challenging, particularly as the code must be quick-running to be of use to the stakeholder community. In addition to discussing the background and motivation for the algorithm and GUI development, this document also discusses the steps taken to validate the tool and the plans for further functionality implementation. PMID:21149351
Pope, Daniel J
2011-01-27
In the aftermath of the London '7/7' attacks in 2005, UK government agencies required the development of a quick-running tool to predict the weapon and injury effects caused by the initiation of a person borne improvised explosive device (PBIED) within crowded metropolitan environments. This prediction tool, termed the HIP (human injury predictor) code, was intended to:--assist the security services to encourage favourable crowd distributions and densities within scenarios of 'sensitivity'; --provide guidance to security engineers concerning the most effective location for protection systems; --inform rescue services as to where, in the case of such an event, individuals with particular injuries will be located; --assist in training medical personnel concerning the scope and types of injuries that would be sustained as a consequence of a particular attack; --assist response planners in determining the types of medical specialists (burns, traumatic amputations, lungs, etc.) required and thus identify the appropriate hospitals to receive the various casualty types. This document describes the algorithms used in the development of this tool, together with the pertinent underpinning physical processes. From its rudimentary beginnings as a simple spreadsheet, the HIP code now has a graphical user interface (GUI) that allows three-dimensional visualization of results and intuitive scenario set-up. The code is underpinned by algorithms that predict the pressure and momentum outputs produced by PBIEDs within open and confined environments, as well as the trajectories of shrapnel deliberately placed within the device to increase injurious effects. Further logic has been implemented to transpose these weapon effects into forms of human injury depending on where individuals are located relative to the PBIED. Each crowd member is subdivided into representative body parts, each of which is assigned an abbreviated injury score after a particular calculation cycle. The injury levels of each affected body part are then summated and a triage state assigned for each individual crowd member based on the criteria specified within the 'injury scoring system'. To attain a comprehensive picture of a particular event, it is important that a number of simulations, using what is substantively the same scenario, are undertaken with natural variation being applied to the crowd distributions and the PBIED output. Accurate mathematical representation of such complex phenomena is challenging, particularly as the code must be quick-running to be of use to the stakeholder community. In addition to discussing the background and motivation for the algorithm and GUI development, this document also discusses the steps taken to validate the tool and the plans for further functionality implementation.
NASA Technical Reports Server (NTRS)
Wightman, William D.; Gernhardt, Michael
1993-01-01
Quick-connect/disconnect mechanism consists of two mating assemblies put together easily, even when initially misaligned by fairly large amounts. Used as electrical- or fluid-connection interface. Operated by humans or robots when fast connections must be made without precise positioning, -- for example, on offshore oil rigs, ship-to-dock links, nuclear facilities, and aircraft at loading gates.
NASA Astrophysics Data System (ADS)
Shimura, Kazuo; Nakajima, Nobuyoshi; Tanaka, Hiroshi; Ishida, Masamitsu; Kato, Hisatoyo
1993-09-01
Dual-energy X-ray absorptiometry (DXA) is one of the bone densitometry techniques to diagnose osteoporosis, and has been gradually getting popular due to its high degree of precision. However, DXA involves a time-consuming examination because of its pencil-beam scan, and the equipment is expensive. In this study, we examined a new bone densitometry technique (CR-DXA) utilizing an X-ray imaging system and Computed Radiography (CR) used for medical X-ray image diagnosis. High level of measurement precision and accuracy could be achieved by X-ray rube voltage/filter optimization and various nonuniformity corrections based on simulation and experiment. The phantom study using a bone mineral block showed precision of 0.83% c.v. (coefficient of variation), and accuracy of 0.01 g/cm2, suggesting that a practically equivalent degree of measurement precision and accuracy to that of the DXA approach is achieved. CR-DXA is considered to provide bone mineral densitometry to facilitate simple, quick and precise bone mineral density measurement.
High-precision radius automatic measurement using laser differential confocal technology
NASA Astrophysics Data System (ADS)
Jiang, Hongwei; Zhao, Weiqian; Yang, Jiamiao; Guo, Yongkui; Xiao, Yang
2015-02-01
A high precision radius automatic measurement method using laser differential confocal technology is proposed. Based on the property of an axial intensity curve that the null point precisely corresponds to the focus of the objective and the bipolar property, the method uses the composite PID (proportional-integral-derivative) control to ensure the steady movement of the motor for process of quick-trigger scanning, and uses least-squares linear fitting to obtain the position of the cat-eye and confocal positions, then calculates the radius of curvature of lens. By setting the number of measure times, precision auto-repeat measurement of the radius of curvature is achieved. The experiment indicates that the method has the measurement accuracy of better than 2 ppm, and the measuring repeatability is better than 0.05 μm. In comparison with the existing manual-single measurement, this method has a high measurement precision, a strong environment anti-interference capability, a better measuring repeatability which is only tenth of former's.
Montpetit, Kathleen; Haley, Stephen; Bilodeau, Nathalie; Ni, Pengsheng; Tian, Feng; Gorton, George; Mulcahey, M J
2011-02-01
This article reports on the content range and measurement precision of an upper extremity (UE) computer adaptive testing (CAT) platform of physical function in children with cerebral palsy. Upper extremity items representing skills of all abilities were administered to 305 parents. These responses were compared with two traditional standardized measures: Pediatric Outcomes Data Collection Instrument and Functional Independence Measure for Children. The UE CAT correlated strongly with the upper extremity component of these measures and had greater precision when describing individual functional ability. The UE item bank has wider range with items populating the lower end of the ability spectrum. This new UE item bank and CAT have the capability to quickly assess children of all ages and abilities with good precision and, most importantly, with items that are meaningful and appropriate for their age and level of physical function.
Joelsson, Daniel; Moravec, Phil; Troutman, Matthew; Pigeon, Joseph; DePhillips, Pete
2008-08-20
Transferring manual ELISAs to automated platforms requires optimizing the assays for each particular robotic platform. These optimization experiments are often time consuming and difficult to perform using a traditional one-factor-at-a-time strategy. In this manuscript we describe the development of an automated process using statistical design of experiments (DOE) to quickly optimize immunoassays for precision and robustness on the Tecan EVO liquid handler. By using fractional factorials and a split-plot design, five incubation time variables and four reagent concentration variables can be optimized in a short period of time.
Axelsen, M B; Stoltenberg, M; Poggenborg, R P; Kubassova, O; Boesen, M; Bliddal, H; Hørslev-Petersen, K; Hanson, L G; Østergaard, M
2012-03-01
To determine whether dynamic contrast-enhanced magnetic resonance imaging (DCE-MRI) evaluated using semi-automatic image processing software can accurately assess synovial inflammation in rheumatoid arthritis (RA) knee joints. In 17 RA patients undergoing knee surgery, the average grade of histological synovial inflammation was determined from four biopsies obtained during surgery. A preoperative series of T(1)-weighted dynamic fast low-angle shot (FLASH) MR images was obtained. Parameters characterizing contrast uptake dynamics, including the initial rate of enhancement (IRE), were generated by the software in three different areas: (I) the entire slice (Whole slice); (II) a manually outlined region of interest (ROI) drawn quickly around the joint, omitting large artefacts such as blood vessels (Quick ROI); and (III) a manually outlined ROI following the synovial capsule of the knee joint (Precise ROI). Intra- and inter-reader agreement was assessed using the intra-class correlation coefficient (ICC). The IRE from the Quick ROI and the Precise ROI revealed high correlations to the grade of histological inflammation (Spearman's correlation coefficient (rho) = 0.70, p = 0.001 and rho = 0.74, p = 0.001, respectively). Intra- and inter-reader ICCs were very high (0.93-1.00). No Whole slice parameters were correlated to histology. DCE-MRI provides fast and accurate assessment of synovial inflammation in RA patients. Manual outlining of the joint to omit large artefacts is necessary.
Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661
Ghasemi, Mojtaba; Nabipour, Iraj; Omrani, Abdolmajid; Alipour, Zeinab; Assadi, Majid
2016-01-01
This paper presents a review of the importance and role of precision medicine and molecular imaging technologies in cancer diagnosis with therapeutics and diagnostics purposes. Precision medicine is progressively becoming a hot topic in all disciplines related to biomedical investigation and has the capacity to become the paradigm for clinical practice. The future of medicine lies in early diagnosis and individually appropriate treatments, a concept that has been named precision medicine, i.e. delivering the right treatment to the right patient at the right time. Molecular imaging is quickly being recognized as a tool with the potential to ameliorate every aspect of cancer treatment. On the other hand, emerging high-throughput technologies such as omics techniques and systems approaches have generated a paradigm shift for biological systems in advanced life science research. In this review, we describe the precision medicine, difference between precision medicine and personalized medicine, precision medicine initiative, systems biology/medicine approaches (such as genomics, radiogenomics, transcriptomics, proteomics, and metabolomics), P4 medicine, relationship between systems biology/medicine approaches and precision medicine, and molecular imaging modalities and their utility in cancer treatment and diagnosis. Accordingly, the precision medicine and molecular imaging will enable us to accelerate and improve cancer management in future medicine.
Ghasemi, Mojtaba; Nabipour, Iraj; Omrani, Abdolmajid; Alipour, Zeinab; Assadi, Majid
2016-01-01
This paper presents a review of the importance and role of precision medicine and molecular imaging technologies in cancer diagnosis with therapeutics and diagnostics purposes. Precision medicine is progressively becoming a hot topic in all disciplines related to biomedical investigation and has the capacity to become the paradigm for clinical practice. The future of medicine lies in early diagnosis and individually appropriate treatments, a concept that has been named precision medicine, i.e. delivering the right treatment to the right patient at the right time. Molecular imaging is quickly being recognized as a tool with the potential to ameliorate every aspect of cancer treatment. On the other hand, emerging high-throughput technologies such as omics techniques and systems approaches have generated a paradigm shift for biological systems in advanced life science research. In this review, we describe the precision medicine, difference between precision medicine and personalized medicine, precision medicine initiative, systems biology/medicine approaches (such as genomics, radiogenomics, transcriptomics, proteomics, and metabolomics), P4 medicine, relationship between systems biology/medicine approaches and precision medicine, and molecular imaging modalities and their utility in cancer treatment and diagnosis. Accordingly, the precision medicine and molecular imaging will enable us to accelerate and improve cancer management in future medicine. PMID:28078184
Inviscid/Boundary-Layer Aeroheating Approach for Integrated Vehicle Design
NASA Technical Reports Server (NTRS)
Lee, Esther; Wurster, Kathryn E.
2017-01-01
A typical entry vehicle design depends on the synthesis of many essential subsystems, including thermal protection system (TPS), structures, payload, avionics, and propulsion, among others. The ability to incorporate aerothermodynamic considerations and TPS design into the early design phase is crucial, as both are closely coupled to the vehicle's aerodynamics, shape and mass. In the preliminary design stage, reasonably accurate results with rapid turn-representative entry envelope was explored. Initial results suggest that for Mach numbers ranging from 9-20, a few inviscid solutions could reasonably sup- port surface heating predictions at Mach numbers variation of +/-2, altitudes variation of +/-10 to 20 kft, and angle-of-attack variation of +/- 5. Agreement with Navier-Stokes solutions was generally found to be within 10-15% for Mach number and altitude, and 20% for angle of attack. A smaller angle-of-attack increment than the 5 deg around times for parametric studies and quickly evolving configurations are necessary to steer design decisions. This investigation considers the use of an unstructured 3D inviscid code in conjunction with an integral boundary-layer method; the former providing the flow field solution and the latter the surface heating. Sensitivity studies for Mach number, angle of attack, and altitude, examine the feasibility of using this approach to populate a representative entry flight envelope based on a limited set of inviscid solutions. Each inviscid solution is used to generate surface heating over the nearby trajectory space. A subset of a considered in this study is recommended. Results of the angle-of-attack sensitivity studies show that smaller increments may be needed for better heating predictions. The approach is well suited for application to conceptual multidisciplinary design and analysis studies where transient aeroheating environments are critical for vehicle TPS and thermal design. Concurrent prediction of aeroheating environments, coupled with the use of unstructured methods, is considered enabling for TPS material selection and design in conceptual studies where vehicle mission, shape, and entry strategies evolve rapidly.
Personality factors and posttraumatic stress: associations in civilians one year after air attacks.
Lecic-Tosevski, Dusica; Gavrilovic, Jelena; Knezevic, Goran; Priebe, Stefan
2003-12-01
There is an ongoing debate on which risk factors for developing posttraumatic stress symptoms are more important--personality traits reflecting vulnerability, previous stressful experiences or characteristics of the traumatic event. In this study, posttraumatic stress symptoms and their relationship with personality traits, previous stressful experiences and exposure to stressful events during air attacks in Yugoslavia were investigated. The Millon Clinical Multiaxial Inventory (MCMI; Millon, 1983), Impact of Events Scale (IES; Horowitz, Wilner, & Alvarez, 1979), Life Stressor Checklist Revised (LSCL-R; Wolfe & Kimerling, 1997), and List of Stressors were administered to a homogeneous group of medical students 1 year after the attacks. In multiple regression analyses, compulsive and passive-aggressive personality traits and a higher level of exposure to stressors during air attacks independently predicted the degree of intrusion symptoms. Avoidance symptoms were predicted by avoidant personality traits and a higher exposure to stressors both previously in life and during the attacks. In the next step, we tested in analyses of variance whether personality traits, previous stressful experiences, and stressful events during attacks as independent variables interact in predicting intrusion and avoidance symptoms. For this, students were clustered into three groups depending on their predominant personality traits. In addition to direct predictive effects, there were significant interaction effects in predicting both intrusion and avoidance. The findings suggest that each of the tested factors, i.e., personality traits, previous stressful experiences, and exposure to traumatic events may have an independent and direct influence on developing posttraumatic stress. However, the effect of these factors cannot just be added up. Rather, the factors interact in their impact on posttraumatic stress symptoms. Bigger samples and longitudinal designs will be required to understand precisely how different personality traits influence response to stressful events.
Automatic, Rapid Replanning of Satellite Operations for Space Situational Awareness (SSA)
NASA Astrophysics Data System (ADS)
Stottler, D.; Mahan, K.
An important component of Space Situational Awareness (SSA) is knowledge of the status and tasking of blue forces (e.g. satellites and ground stations) and the rapid determination of the impacts of real or hypothetical changes and the ability to quickly replan based on those changes. For example, if an antenna goes down (either for benign reasons or from purposeful interference) determining which missions will be impacted is important. It is not simply the set of missions that were scheduled to utilize that antenna, because highly expert human schedulers will respond to the outage by intelligently replanning the real-time schedule. We have developed an automatic scheduling and deconfliction engine, called MIDAS (for Managed Intelligent Deconfliction And Scheduling) that interfaces to the current legacy system (ESD 2.7) which can perform this replanning function automatically. In addition to determining the impact of failed resources, MIDAS can also replan in response to a satellite under attack. In this situation, additional supports must be quickly scheduled and executed (while minimizing impacts to other missions). Because MIDAS is a fully automatic system, replacing a current human labor-intensive process, and provides very rapid turnaround (seconds) it can also be used by commanders to consider what-if questions and focus limited protection resources on the most critical resources. For example, the commander can determine the impact of a successful attack on one of two ground stations and place heavier emphasis on protecting the station whose loss would create the most severe impacts. The system is currently transitioning to operational use. The MIDAS system and its interface to the legacy ESD 2.7 system will be described along with the ConOps for different types of detailed operational scenarios.
Evaluating Modern Defenses Against Control Flow Hijacking
2015-09-01
unsound and could introduce false negatives (opening up another possible set of attacks). CFG Construction using DSA We next evaluate the precision of CFG...Evaluating Modern Defenses Against Control Flow Hijacking by Ulziibayar Otgonbaatar Submitted to the Department of Electrical Engineering and...Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering at the MASSACHUSETTS
2013-02-28
needed to detect and isolate the compromised component • Prevent a cyber attack exploit from reading enough information to form a coherent data set...Analysis Signal Copy Selected Sub-Bands • Gimbaled, Stabilized EO/IR Camera Ball • High Precision GPS & INS (eventual swarm capable inter-UAV coherent ... LIDAR , HSI, Chem-Bio • Multi-Platform Distributed Sensor Experiments (eg, MIMO) • Autonomous & Collaborative Multi-Platform Control • Space for
ERIC Educational Resources Information Center
King, Steven Gray
2012-01-01
Geographic information systems (GIS) reveal relationships and patterns from large quantities of diverse data in the form of maps and reports. The United States spends billions of dollars to use GIS to improve decisions made during responses to natural disasters and terrorist attacks, but precisely how GIS improves or impairs decision making is not…
Shi, C; Gao, S; Gun, S
1997-06-01
The sample is digested with 6% NaOH solution and an amount of 50 microl is used for protein content analysis by the method of Comassie Brilliant Blue G250, the residual is diluted with equal 0.4% Lathanurm-EDTA solution. Its Calcium magensium and potassium content are determined by AAS. With quick-pulsed nebulization technique. When a self-made micro-sampling device is used, 20microl of sample volume is needed and it is only the 1/10 approximately 1/20 of the sample volume required for conventional determination. Sensitivity, precision and rate of recovery agree well with those using regular wet ashing method.
Application of backpack Lidar to geological cross-section measurement
NASA Astrophysics Data System (ADS)
Lin, Jingyu; Wang, Ran; Xiao, Zhouxuan; Li, Lu; Yao, Weihua; Han, Wei; Zhao, Baolin
2017-11-01
As the traditional geological cross section measurement, the artificial traverse method was recently substituted by using point coordinates data. However, it is still the crux of the matter that how to acquire the high-precision point coordinates data quickly and economically. Thereby, the backpack Lidar is presented on the premise of the principle of using point coordinates in this issue. Undoubtedly, Lidar technique, one of booming and international active remote sensing techniques, is a powerful tool in obtaining precise topographic information, high-precision 3-D coordinates and building a real 3-D model. With field practice and date processing indoors, it is essentially accomplished that geological sections maps could be generated simply, accurately and automatically in the support of relevant software such as ArcGIS and LiDAR360.
Testing a simple field method for assessing nitrate removal in riparian zones
Philippe Vidon; Michael G. Dosskey
2008-01-01
Being able to identify riparian sites that function better for nitrate removal from groundwater is critical to using efficiently the riparian zones for water quality management. For this purpose, managers need a method that is quick, inexpensive, and accurate enough to enable effective management decisions. This study assesses the precision and accuracy of a simple...
a Method for the Measurements of Children's Feet
NASA Astrophysics Data System (ADS)
Bernard, , M.; Buffevant, B.; Querio, R.; Rigal, R.
1980-07-01
The Centre Technique du Cuir (Leather Technical Center) has been entrusted with the task of measuring children's feet. A new equipement has been devised which makes the precision measures sure and which is quick to give informations. The paper will present : 1 - the existing engineerings, 2 - the research's and analysis's methodology, 3 - the CTC apparatus actually used in schools.
Fettig, Christopher J; Munson, A Steven; McKelvey, Stephen R; Bush, Parshall B; Borys, Robert R
2008-01-01
Bark beetles (Coleoptera: Curculionidae, Scolytinae) are recognized as the most important tree mortality agent in western coniferous forests. A common method of protecting trees from bark beetle attack is to saturate the tree bole with carbaryl (1-naphthyl methylcarbamate) using a hydraulic sprayer. In this study, we evaluate the amount of carbaryl drift (ground deposition) occurring at four distances from the tree bole (7.6, 15.2, 22.9, and 38.1 m) during conventional spray applications for protecting individual lodgepole pine (Pinus contorta Dougl. ex Loud.) from mountain pine beetle (Dendroctonus ponderosae Hopkins) attack and Engelmann spruce (Picea engelmannii Parry ex Engelm.) from spruce beetle (D. rufipennis [Kirby]) attack. Mean deposition (carbaryl + alpha-naphthol) did not differ significantly among treatments (nozzle orifices) at any distance from the tree bole. Values ranged from 0.04 +/- 0.02 mg carbaryl m(-2) at 38.1 m to 13.30 +/- 2.54 mg carbaryl m(-2) at 7.6 m. Overall, distance from the tree bole significantly affected the amount of deposition. Deposition was greatest 7.6 m from the tree bole and quickly declined as distance from the tree bole increased. Approximately 97% of total spray deposition occurred within 15.2 m of the tree bole. Application efficiency (i.e., percentage of insecticide applied that is retained on trees) ranged from 80.9 to 87.2%. Based on review of the literature, this amount of drift poses little threat to adjacent aquatic environments. No-spray buffers of 7.6 m should be sufficient to protect freshwater fish, amphibians, crustaceans, bivalves, and most aquatic insects. Buffers >22.9 m appear sufficient to protect the most sensitive aquatic insects (Plecoptera).
Lead exposure potentiates predatory attack behavior in the cat.
Li, Wenjie; Han, Shenggao; Gregg, Thomas R; Kemp, Francis W; Davidow, Amy L; Louria, Donald B; Siegel, Allan; Bogden, John D
2003-07-01
Epidemiologic studies have demonstrated that environmental lead exposure is associated with aggressive behavior in children; however, numerous confounding variables limit the ability of these studies to establish a causal relationship. The study of aggressive behavior using a validated animal model was used to test the hypothesis that there is a causal relationship between lead exposure and aggression in the absence of confounding variables. We studied the effects of lead exposure on a feline model of aggression: predatory (quiet biting) attack of an anesthetized rat. Five cats were stimulated with a precisely controlled electrical current via electrodes inserted into the lateral hypothalamus. The response measure was the predatory attack threshold current (i.e., the current required to elicit an attack response on 50% of the trials). Blocks of trials were administered in which predatory attack threshold currents were measured three times a week for a total of 6-10 weeks, including before, during, and after lead exposure. Lead was incorporated into cat food "treats" at doses of 50-150 mg/kg/day. Two of the five cats received a second period of lead exposure. Blood lead concentrations were measured twice a week and were <1, 21-77, and <20 micro g/dL prior to, during, and after lead exposure, respectively. The predatory attack threshold decreased significantly during initial lead exposure in three of five cats and increased after the cessation of lead exposure in four of the five cats (P<0.01). The predatory attack thresholds and blood lead concentrations for each cat were inversely correlated (r=-0.35 to -0.74). A random-effects mixed model demonstrated a significant (P=0.0019) negative association between threshold current and blood lead concentration. The data of this study demonstrate that lead exposure enhances predatory aggression in the cat and provide experimental support for a causal relationship between lead exposure and aggressive behavior in humans.
Control integration concept for hypersonic cruise-turn maneuvers
NASA Technical Reports Server (NTRS)
Raney, David L.; Lallman, Frederick J.
1992-01-01
Piloting difficulties associated with conducting aircraft maneuvers in hypersonic flight are caused in part by the nonintuitive nature of the aircraft response and the stringent constraints anticipated on allowable angle of attack and dynamic pressure variations. An approach is documented that provides precise, coordinated maneuver control during excursions from a hypersonic cruise flight path and the necessary flight condition constraints. The approach is to achieve specified guidance commands by resolving altitude and cross range errors into a load factor and bank angle command by using a coordinate transformation that acts as an interface between outer and inner loop flight controls. This interface, referred to as a 'resolver', applies constraints on angle of attack and dynamic pressure perturbations while prioritizing altitude regulation over cross range. An unpiloted test simulation, in which the resolver was used to drive inner loop flight controls, produced time histories of responses to guidance commands and atmospheric disturbances at Mach numbers of 6, 10, 15, and 20. Angle of attack and throttle perturbation constraints, combined with high speed flight effects and the desire to maintain constant dynamic pressure, significantly impact the maneuver envelope for a hypersonic vehicle.
Kinematic properties of the helicopter in coordinated turns
NASA Technical Reports Server (NTRS)
Chen, R. T. N.; Jeske, J. A.
1981-01-01
A study on the kinematic relationship of the variables of helicopter motion in steady, coordinated turns involving inherent sideslip is described. A set of exact kinematic equations which govern a steady coordinated helical turn about an Earth referenced vertical axis is developed. A precise definition for the load factor parameter that best characterizes a coordinated turn is proposed. Formulas are developed which relate the aircraft angular rates and pitch and roll attitudes to the turn parameters, angle of attack, and inherent sideslip. A steep, coordinated helical turn at extreme angles of attack with inherent sideslip is of primary interest. The bank angle of the aircraft can differ markedly from the tilt angle of the normal load factor. The normal load factor can also differ substantially from the accelerometer reading along the vertical body axis of the aircraft. Sideslip has a strong influence on the pitch attitude and roll rate of the helicopter. Pitch rate is independent of angle of attack in a coordinated turn and in the absence of sideslip, angular rates about the stability axes are independent of the aerodynamic characteristics of the aircraft.
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
Coping with divided attention: the advantage of familiarity.
Griffiths, S W; Brockmark, S; Höjesjö, J; Johnsson, J I
2004-04-07
The ability of an animal to perform a task successfully is limited by the amount of attention being simultaneously focused on other activities. One way in which individuals might reduce the cost of divided attention is by preferentially focusing on the most beneficial tasks. In territorial animals where aggression is lower among familiar individuals, the decision to associate preferentially with familiar conspecifics may therefore confer advantages by allowing attention to be switched from aggression to predator vigilance and feeding. Wild juvenile brown trout were used to test the prediction that familiar fishes respond more quickly than unfamiliar fishes to a simulated predator attack. Our results confirm this prediction by demonstrating that familiar trout respond 14% faster than unfamiliar individuals to a predator attack. The results also show that familiar fishes consume a greater number of food items, foraging at more than twice the rate of unfamiliar conspecifics. To the best of our knowledge, these results provide the first evidence that familiarity-biased association confers advantages through the immediate fitness benefits afforded by faster predator-evasion responses and the long-term benefits provided by increased feeding opportunities.
Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems
NASA Astrophysics Data System (ADS)
Anceaume, Emmanuelle; Brasileiro, Francisco; Ludinard, Romaric; Sericola, Bruno; Tronel, Frederic
Awerbuch and Scheideler [2] have shown that peer-to-peer overlays networks can only survive Byzantine attacks if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. A prerequisite for this condition to hold is to guarantee that nodes identifiers randomness is continuously preserved. However targeted join/leave attacks may quickly endanger the relevance of such an assumption. Inducing churn has been shown to be the other fundamental ingredient to preserve randomness. Several strategies based on these principles have been proposed. Most of them are based on locally induced churn. However either they have been proven incorrect or they involve a too high level of complexity to be practically acceptable [2]. The other ones, based on globally induced churn, enforce limited lifetime for each node in the system. However, these solutions keep the system in an unnecessary hyper-activity, and thus need to impose strict restrictions on nodes joining rate which clearly limit their applicability to open systems.
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.
Water walking - an evolution of water surface skipping
NASA Astrophysics Data System (ADS)
Hurd, Randy; Belden, Jesse; Jandron, Michael; Bower, Allan; Holekamp, Sean; Truscott, Tadd
2017-11-01
Previous work has shown that elastomeric spheres skip more easily than disk-shaped stones. This is due to increased lift stemming from sphere deformation, which provides an increased cross-sectional area and favorable attack angle upon impact. We extend lift models developed for individual impacts to long-range multiple impact events and compare the estimates to experimental results, which show good agreement. Additionally, a surprising new mode of skipping is observed that resembles water-walking, wherein a quickly rotating sphere produces small successive impacts allowing it to move parallel to the water surface. The dynamics of this new multiple skip behavior are rationalized analytically and tested experimentally.
CTC Sentinel. Volume 5, Issue 10, October 2012
2012-10-01
of the tactical precision that helped establish the organization’s criminal brand: one that connotes fury, force, and fear.7 Trevino’s Limits Today ...formidable and secretive support network in the country since 2007.26 Pumwani Riyadha Mosque Today , there are a number of extremist support...research, he could not identify a single terrorist attack using the diluted fertilizer type available on European markets today . The trial also shed
Precision Guided Munitions: Constructing a Bomb More Potent Than the A-Bomb
2002-06-01
prototypes, cannibalization for spare parts throughout testing made it increasingly difficult to assemble an entire set of working hardware by the...individual American city finds itself under sporadic attack by a lone urban guerilla. Indeed, such an individual might well feel invulnerable as a...sniper in a crowded urban environment. In fact, law enforcement officers, using advanced technologies such as Lawrence Livermore’s Lifeguard system
Kuppahally, Suman S; Paloma, Allan; Craig Miller, D; Schnittger, Ingela; Liang, David
2008-01-01
A novel multiplanar reformatting (MPR) technique in three-dimensional transthoracic echocardiography (3D TTE) was used to precisely localize the prolapsed lateral segment of posterior mitral valve leaflet in a patient symptomatic with mitral valve prolapse (MVP) and moderate mitral regurgitation (MR) before undergoing mitral valve repair surgery. Transesophageal echocardiography was avoided based on the findings of this new technique by 3D TTE. It was noninvasive, quick, reproducible and reliable. Also, it did not need the time-consuming reconstruction of multiple cardiac images. Mitral valve repair surgery was subsequently performed based on the MPR findings and corroborated the findings from the MPR examination.
Jabar, Syaheed B; Filipowicz, Alex; Anderson, Britt
2017-11-01
When a location is cued, targets appearing at that location are detected more quickly. When a target feature is cued, targets bearing that feature are detected more quickly. These attentional cueing effects are only superficially similar. More detailed analyses find distinct temporal and accuracy profiles for the two different types of cues. This pattern parallels work with probability manipulations, where both feature and spatial probability are known to affect detection accuracy and reaction times. However, little has been done by way of comparing these effects. Are probability manipulations on space and features distinct? In a series of five experiments, we systematically varied spatial probability and feature probability along two dimensions (orientation or color). In addition, we decomposed response times into initiation and movement components. Targets appearing at the probable location were reported more quickly and more accurately regardless of whether the report was based on orientation or color. On the other hand, when either color probability or orientation probability was manipulated, response time and accuracy improvements were specific for that probable feature dimension. Decomposition of the response time benefits demonstrated that spatial probability only affected initiation times, whereas manipulations of feature probability affected both initiation and movement times. As detection was made more difficult, the two effects further diverged, with spatial probability disproportionally affecting initiation times and feature probability disproportionately affecting accuracy. In conclusion, all manipulations of probability, whether spatial or featural, affect detection. However, only feature probability affects perceptual precision, and precision effects are specific to the probable attribute.
[A quick algorithm of dynamic spectrum photoelectric pulse wave detection based on LabVIEW].
Lin, Ling; Li, Na; Li, Gang
2010-02-01
Dynamic spectrum (DS) detection is attractive among the numerous noninvasive blood component detection methods because of the elimination of the main interference of the individual discrepancy and measure conditions. DS is a kind of spectrum extracted from the photoelectric pulse wave and closely relative to the artery blood. It can be used in a noninvasive blood component concentration examination. The key issues in DS detection are high detection precision and high operation speed. The precision of measure can be advanced by making use of over-sampling and lock-in amplifying on the pick-up of photoelectric pulse wave in DS detection. In the present paper, the theory expression formula of the over-sampling and lock-in amplifying method was deduced firstly. Then in order to overcome the problems of great data and excessive operation brought on by this technology, a quick algorithm based on LabVIEW and a method of using external C code applied in the pick-up of photoelectric pulse wave were presented. Experimental verification was conducted in the environment of LabVIEW. The results show that by the method pres ented, the speed of operation was promoted rapidly and the data memory was reduced largely.
An unusual recruitment strategy in a mass-recruiting stingless bee, Partamona orizabaensis.
Flaig, Isabelle C; Aguilar, Ingrid; Schmitt, Thomas; Jarau, Stefan
2016-10-01
Foragers of several stingless bee species deposit attractive scent marks on solid substrates to precisely recruit nestmates to food. Interestingly, Partamona workers quickly recruit large numbers of nest mates to resources, likely even without the deposition of attractive scent marks. However, systematic studies of the recruitment system of these bees are lacking. We now studied the recruitment behavior of P. orizabaensis. Our findings show that foragers of this species can recruit large numbers of nestmates to food sources at a particular location. The precise nestmate recruitment does not rely on attractive scent marks deposited on substrates. We never observed any scent marking behavior and feeders baited with labial or mandibular gland extracts were not attractive for the bees. Chemical analyses showed that the foragers' labial gland secretions exclusively contain long chain hydrocarbons, which render their role in recruitment communication unlikely. Whether mandibular gland secretions, which contain esters and alcohols that are known as attractive pheromones in other bee species, are used to guide recruits toward food during flight, remains elusive. We conclude that Partamona's quick recruitment system that does not rely on conspicuous scent marks has evolved as a strategy against competition with sympatrically occurring and more aggressive bee species.
NASA Astrophysics Data System (ADS)
Luo, Hanjun; Ouyang, Zhengbiao; Liu, Qiang; Chen, Zhiliang; Lu, Hualan
2017-10-01
Cumulative pulses detection with appropriate cumulative pulses number and threshold has the ability to improve the detection performance of the pulsed laser ranging system with GM-APD. In this paper, based on Poisson statistics and multi-pulses cumulative process, the cumulative detection probabilities and their influence factors are investigated. With the normalized probability distribution of each time bin, the theoretical model of the range accuracy and precision is established, and the factors limiting the range accuracy and precision are discussed. The results show that the cumulative pulses detection can produce higher target detection probability and lower false alarm probability. However, for a heavy noise level and extremely weak echo intensity, the false alarm suppression performance of the cumulative pulses detection deteriorates quickly. The range accuracy and precision is another important parameter evaluating the detection performance, the echo intensity and pulse width are main influence factors on the range accuracy and precision, and higher range accuracy and precision is acquired with stronger echo intensity and narrower echo pulse width, for 5-ns echo pulse width, when the echo intensity is larger than 10, the range accuracy and precision lower than 7.5 cm can be achieved.
Bahreini Moghadam, Seyed Ali; Hamzeh Pour, Siavash; Toorchi, Mahmoud; Sefidi Heris, Youssof
2016-01-01
Bioterrorism is a worldwide problem and has been the focus of attention during recent decades. There is no precise information on the knowledge, attitude, and preparedness of Iranian Red Crescent volunteers in dealing with bioterrorism. Therefore, the present study aimed to evaluate the above-mentioned parameters in Mahabad Red Crescent Society volunteers. In this prospective cross-sectional study, the knowledge of 120 volunteers was evaluated and rated as poor, moderate, and good. In addition, attitude of the volunteers and preparedness of Mahabad Red Crescent Society was rated as inappropriate and appropriate using a questionnaire. The mean age of volunteers was 32.0 ± 8.2 years (62.5% male). 2 (1.7%) volunteers had good knowledge while 94 (78.3%) had no knowledge regarding bioterrorist attack management. Only 1 (0.8%) volunteer had appropriate attitude and 6 (5.0%) stated their preparedness for being sent out to the crisis zone. 116 volunteers (96.7%) indicated that Mahabad Red Crescent Society has an inappropriate level of preparedness to encounter bioterrorist attacks. The findings of the present study showed poor knowledge and inappropriate attitude of Mahabad Red Crescent Society volunteers in encountering probable bioterrorist attacks. Furthermore, the Red Crescent Society of this town had an inappropriate level of preparedness in the field of bioterrorism from the viewpoint of the studied volunteers.
Development and flight test of a helicopter compact, portable, precision landing system concept
NASA Technical Reports Server (NTRS)
Clary, G. R.; Bull, J. S.; Davis, T. J.; Chisholm, J. P.
1984-01-01
An airborne, radar-based, precision approach concept is being developed and flight tested as a part of NASA's Rotorcraft All-Weather Operations Research Program. A transponder-based beacon landing system (BLS) applying state-of-the-art X-band radar technology and digital processing techniques, was built and is being flight tested to demonstrate the concept feasibility. The BLS airborne hardware consists of an add-on microprocessor, installed in conjunction with the aircraft weather/mapping radar, which analyzes the radar beacon receiver returns and determines range, localizer deviation, and glide-slope deviation. The ground station is an inexpensive, portable unit which can be quickly deployed at a landing site. Results from the flight test program show that the BLS concept has a significant potential for providing rotorcraft with low-cost, precision instrument approach capability in remote areas.
Uav for Geodata Acquisition in Agricultureal and Forestal Applications
NASA Astrophysics Data System (ADS)
Reidelstürz, P.; Schrenk, L.; Littmann, W.
2011-09-01
In the field of precision-farming research, solutions are worked out to combine ecological and economical requirements in a harmonic way. Integrating hightech in agricultural machinery, natural differences in the fields (biodiversity) can be detected and considered to economize agricultural resources and to give respect to natural ecological variability at the same time. Using precision farming resources, machining - and labour time can be economized, productivness can be improved, environmental burden can be discharged and documentation of production processes can be improved. To realize precision farming it is essential to make contemporary large scale data of the biodiversity in the field available. In the last years effectual traktor based equipment for real time precision farming applications was developed. Using remote sensing, biomass diversity of the field can be considered while applicating operating ressources economicly. Because these large scale data aquisition depends on expensive tractor based inspections, capable Unmanned Aerial Vehicles (UAVs) could complement or in special situations even replace such tractor based data aquisition needed for the realization of precision farming strategies. The specific advantages and application slots of UAVs seems to be ideal for the usage in the field of precision farming. For example the size of even large agricultural fields in germany can be managed even by smaller UAVs. Data can be captured spontaneously, promptly, in large scale, with less respect of weather conditions. In agricultural regions UAV flights can be arranged in visual range as actually the legislator requires in germany, especially because the use of autopilotsystems in fact is nessecary to assure regular area-wide data without gaps but not to fly in non-visible regions. Also a minimized risk of hazard is given, flying UAVs over deserted agricultural areas. In a first stage CIS GmbH cooperated with "Institute For Flightsystems" of the University of German Armed Forces in Neubiberg/Munich and the well-established precision farming company "Konsultationszentrum Liepen" to develop an applicable UAV for precision farming purposes. Currently Cis GmbH and Technologie Campus Freyung, with intense contact to the „flying robot"- team of DLR Oberpfaffenhofen, collaborate to optimize the existing UAV and to extend the applications from data aquisition for biomass diversity up to detect the water supply situation in agricultural fields, to support pest management systems as much as to check the possibilities to detect bark beetle attacks in european spruce in an early stage of attack (green attack phase) by constructing and integrating further payload modules with different sensors in the existing UAV airframe. Also effective data processing workflows are to be worked out. Actually in the existing UAV autopilotsystem "piccolo" (cloudcaptech) is integrated and also a replaceable payload module is available, carrying a VIS and a NIR camera to calculate maps of NDVI diversity as indicator of biomass diversity. Further modules with a 6 channel multispectral still camera and with a spectrometer are planned. The airframe's wingspan is about 3,45m weighting 4.2 kg, ready to fly. The hand launchable UAV can start from any place in agricultural regions. The wing is configured with flaps, allowing steep approaches and short landings using a „butterfly" brake configuration. In spite of the lightweight configuration the UAV yet proves its worth under windy baltic wether situations by collecting regular sharp images of fields under wind speed up to 15m/s (Beaufort 6 -7). In further projects the development of further payload modules and a user friendly flight planning tool is scheduled considering different payload - and airframe requirements for different precision farming purposes and forest applications. Data processing and workflow will be optimized. Cooperation with further partners to establish UAV systems in agricultural, forest and geodata aquisition is desired.
Ishihara, D; Yamashita, Y; Horie, T; Yoshida, S; Niho, T
2009-12-01
We have studied the passive maintenance of high angle of attack and its lift generation during the crane fly's flapping translation using a dynamically scaled model. Since the wing and the surrounding fluid interact with each other, the dynamic similarity between the model flight and actual insect flight was measured using not only the non-dimensional numbers for the fluid (the Reynolds and Strouhal numbers) but also those for the fluid-structure interaction (the mass and Cauchy numbers). A difference was observed between the mass number of the model and that of the actual insect because of the limitation of available solid materials. However, the dynamic similarity during the flapping translation was not much affected by the mass number since the inertial force during the flapping translation is not dominant because of the small acceleration. In our model flight, a high angle of attack of the wing was maintained passively during the flapping translation and the wing generated sufficient lift force to support the insect weight. The mechanism of the maintenance is the equilibrium between the elastic reaction force resulting from the wing torsion and the fluid dynamic pressure. Our model wing rotated quickly at the stroke reversal in spite of the reduced inertial effect of the wing mass compared with that of the actual insect. This result could be explained by the added mass from the surrounding fluid. Our results suggest that the pitching motion can be passive in the crane fly's flapping flight.
Generalized Helicopter Rotor Performance Predictions
1977-09-01
34- V : ~ ~ t V ~ ’ . - - - - - - -- behavior . In order to use this routine, the user must input a negative number for the variable XITLIM, item 73...the values provided in Section E. It is realized that available data on airfoil behavior at large angles of attack are very limited, but so is the...where dynamic pressure is low, little precision is lost in performance calculation by using one common representation for most airfoil behavior . As a
2017-01-01
annual investment of about $2.5 billion. The study also recommended that the Department of Defense enhance its ab ility to perform the kinds of broad...homeland fundamentally change the nature of the problem to one of strategic deterrence and that the spirit of the terms of reference was more...adversary investments in regional, precision attack cruise and ballistic threaten that foundation, investments that have dramatically increased both
JPRS Report, Soviet Union, Foreign Military Review, No. 2, February 1988
1988-08-05
polyurethane foam . The engine and transmission compartment is located in the front part of the hull. The eight-cylinder engine is connected with a...more effective land- based systems including MLRS and in the future the ATACMS missiles (it is planned to launch them from existing and future MLRS... ATACMS missiles, Skeet & TGSM precision-guidance munitions SADARM and TGSM precis ion-guidance munitions PLSS recon- attack system, MLRS, F-4G
ERIC Educational Resources Information Center
Odic, Darko
2018-01-01
Young children can quickly and intuitively represent the number of objects in a visual scene through the Approximate Number System (ANS). The precision of the ANS--indexed as the most difficult ratio of two numbers that children can reliably discriminate--is well known to improve with development: whereas infants require relatively large ratios to…
Mills, Robin; Hildenbrandt, Hanno; Taylor, Graham K; Hemelrijk, Charlotte K
2018-04-01
The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds' flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon's starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon's guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays.
Apparatus and method for variable angle slant hole collimator
Lee, Seung Joon; Kross, Brian J.; McKisson, John E.
2017-07-18
A variable angle slant hole (VASH) collimator for providing collimation of high energy photons such as gamma rays during radiological imaging of humans. The VASH collimator includes a stack of multiple collimator leaves and a means of quickly aligning each leaf to provide various projection angles. Rather than rotate the detector around the subject, the VASH collimator enables the detector to remain stationary while the projection angle of the collimator is varied for tomographic acquisition. High collimator efficiency is achieved by maintaining the leaves in accurate alignment through the various projection angles. Individual leaves include unique angled cuts to maintain a precise target collimation angle. Matching wedge blocks driven by two actuators with twin-lead screws accurately position each leaf in the stack resulting in the precise target collimation angle. A computer interface with the actuators enables precise control of the projection angle of the collimator.
Precise frequency calibration using television video carriers
NASA Technical Reports Server (NTRS)
Burkhardt, Edward E.
1990-01-01
The availability of inexpensive and quick precise frequency calibration methods is limited. VLF and GPS do offer precise calibration. However, antenna placement, cost of equipment, and calibration time place many restrictions on the user. The USNO maintained line-10 television Time of Coincidence (TOC) of station WTTG, channel 5, Washington, DC requires a frequency stable video carrier. This video carrier, 77.24 MHz is controlled by the same cesium beam standard controlling the TOC of line-10. Excellent frequency comparisons against this video carrier have been accomplished at 95 miles (153 km). With stable propagation and a three foot wire antenna, a part in 10(exp 9) can be determined in a few minutes. Inexpensive field equipment with a synthesized 1 kHz offset from the video carrier offers parts in 10(exp 11) calibrations in a few minutes using an oscilloscope as a phase comparator.
Zhang, Pei-feng; Hu, Yuan-man; He, Hong-shi
2010-05-01
The demand for accurate and up-to-date spatial information of urban buildings is becoming more and more important for urban planning, environmental protection, and other vocations. Today's commercial high-resolution satellite imagery offers the potential to extract the three-dimensional information of urban buildings. This paper extracted the three-dimensional information of urban buildings from QuickBird imagery, and validated the precision of the extraction based on Barista software. It was shown that the extraction of three-dimensional information of the buildings from high-resolution satellite imagery based on Barista software had the advantages of low professional level demand, powerful universality, simple operation, and high precision. One pixel level of point positioning and height determination accuracy could be achieved if the digital elevation model (DEM) and sensor orientation model had higher precision and the off-Nadir View Angle was relatively perfect.
Precise frequency calibration using television video carriers
NASA Astrophysics Data System (ADS)
Burkhardt, Edward E.
1990-05-01
The availability of inexpensive and quick precise frequency calibration methods is limited. VLF and GPS do offer precise calibration. However, antenna placement, cost of equipment, and calibration time place many restrictions on the user. The USNO maintained line-10 television Time of Coincidence (TOC) of station WTTG, channel 5, Washington, DC requires a frequency stable video carrier. This video carrier, 77.24 MHz is controlled by the same cesium beam standard controlling the TOC of line-10. Excellent frequency comparisons against this video carrier have been accomplished at 95 miles (153 km). With stable propagation and a three foot wire antenna, a part in 10(exp 9) can be determined in a few minutes. Inexpensive field equipment with a synthesized 1 kHz offset from the video carrier offers parts in 10(exp 11) calibrations in a few minutes using an oscilloscope as a phase comparator.
NASA Astrophysics Data System (ADS)
Ghann, William Emmanuel
Cardiovascular diseases (CVD) are the leading cause of morbidity and mortality in the United States with approximately one in every three death being attributed to these diseases. The overarching problem with heart diseases is that once a person has suffered from an attack, there is a high likelihood of a recurrent attack. According to the American Heart Association, approximately 785,000 Americans per year suffer from heart attacks for the first time and about half of the aforementioned experience an ensuing attack. The second attack is often fatal, and therefore relapse prevention is crucial. One of the possible ways of averting the recurrence of such an attack is through the precise monitoring of the preceding biomarkers or risk indicators. This project encompasses the design, synthesis, characterization, and application of nanoparticle-based contrast agents that can potentially be used in the monitoring of the reemergence of a biomarker expressed after a person has suffered myocardial infarction. The overexpression of this biomarker, angiotensin converting enzyme (ACE), is also associated with development of cardiac and pulmonary fibrosis. To this end, highly concentrated gold nanoparticles have been synthesized and conjugated to Lisinopril, an ACE inhibitor, for the molecular imaging of ACE using X-ray CT. Various stabilities studies were conducted to verify the resistance of this gold nanoprobe in biological relevant media. They have also been successfully used in X-ray computed tomography to visualize tissue ACE and thus render them potentially versatile in the monitoring of cardiovascular diseases. An MRI tag was also conjugated to the gold nanoparticle affording the opportunity for bimodal imaging of ACE. This contrast agent could further be used for the quantification using K-edge CT of the relationship between the amount of the said marker and its role in predicting the possibility of a successive heart attack. The prepared nanoparticle-based contrast agent could ultimately be used to monitor the levels of this biomarker in people predisposed to cardiovascular diseases due to genetic biases. It is anticipated that the targeted gold nanoparticle system could be applied in the design of similar multifunctional nanoparticles through the use of other disease-specific imaging nanoprobes.
Defending the Power Grid from Hackers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eber, Kevin
A new initiative underway at the National Renewable Energy Laboratory is intended to prevent hackers from gaining control of parts of the nation's power grid, potentially damaging electrical equipment and causing localized power outages. Our nation's power grid is evolving to be more responsive to changing power needs, more able to integrate renewable energy, more efficient, and more reliable. One key element of this evolution is adding communication and control devices to the power grid, closer to the end user, so that utilities have greater situational awareness of the grid and can respond quickly to disturbances. But these new devicesmore » and their communications requirements can also open up the power grid to potential cyber attacks.« less
Participation on official proficiency test of the OPCW: case study of Brazilian Army – IDQBRN
NASA Astrophysics Data System (ADS)
Silva, T. C.; Ferreira, C. N.; Cardozo, M.; de Paula, R. L.
2018-03-01
In recent years, Brazil has been the scene of international events, gaining worldwide repercussion. However, this increases the risk of terrorist attacks using chemical warfare agents. It brings the need to achieve proficiency to do a quick and unequivocal identification of these dangerous compounds. Thinking about it, the Laboratory of Chemical Analyzes (LAQ) of Brazilian Army has participated since the end of 2010 in the interlaboratory tests promoted by the Organisation for the Prohibition of Chemical Weapons (OPCW). In this article, we discuss about the participation of LAQ in the 40th OPCW Proficiency Test, one more step in the way to become a laboratory designated by OPCW and an international reference.
Practical continuous-variable quantum key distribution without finite sampling bandwidth effects.
Li, Huasheng; Wang, Chao; Huang, Peng; Huang, Duan; Wang, Tao; Zeng, Guihua
2016-09-05
In a practical continuous-variable quantum key distribution system, finite sampling bandwidth of the employed analog-to-digital converter at the receiver's side may lead to inaccurate results of pulse peak sampling. Then, errors in the parameters estimation resulted. Subsequently, the system performance decreases and security loopholes are exposed to eavesdroppers. In this paper, we propose a novel data acquisition scheme which consists of two parts, i.e., a dynamic delay adjusting module and a statistical power feedback-control algorithm. The proposed scheme may improve dramatically the data acquisition precision of pulse peak sampling and remove the finite sampling bandwidth effects. Moreover, the optimal peak sampling position of a pulse signal can be dynamically calibrated through monitoring the change of the statistical power of the sampled data in the proposed scheme. This helps to resist against some practical attacks, such as the well-known local oscillator calibration attack.
The role of exoproteases in governing intraneuronal metabolism of botulinum toxin.
Simpson, Lance L; Maksymowych, Andrew B; Kouguchi, Hirokazu; Dubois, Garrett; Bora, Roop S; Joshi, Suresh
2005-04-01
Botulinum toxin type A has a long duration of action, and thus it can block transmitter release for several weeks to several months. However, little is known about the precise mechanism that accounts for termination of toxin action. Therefore, experiments were done to gauge the effects of aminopeptidases and carboxypeptidases on the structure and function of the toxin. Exoproteases were added to the holotoxin, the native light chain, and a recombinant light chain. Treated toxin and light chain were examined for their effects on neuromuscular transmission and on isolated substrate. The data showed that aminopeptidase attack did not alter the N-terminus of the toxin/light chain, nor did it produce losses in biological activity. Carboxypeptidase attack did alter the C-terminus of the light chain, but not sufficiently to alter biological activity. The data suggest that the tertiary structure of the light chain confers upon the molecule substantial resistance to exoproteases.
IR panoramic alerting sensor concepts and applications
NASA Astrophysics Data System (ADS)
de Jong, Arie N.; Schwering, Piet B. W.
2003-09-01
During the last decade, protection of military and civilian operational platforms against weapons like guns, grenades, missiles, Unmanned Combat Aerial (and surface) Vehicles (UCAV's) and mines, has been an issue of increased importance due to the improved kill-probability of these threats. The standard countermeasure package of armour, guns, decoys, jammers, camouflage nets and smokes is inadequate when not accompanied by a suitable sensor package, primarily consisting of an alerting device, triggering consecutive steps in the countermeasure-chain. In this process of alert four different detection techniques are considered: pre-alert, giving the directions of possible attack, detection of an action of attack, identification of the threat and finally the precise localization (3-D). The design of the alerting device is greatly depending on the platform, on which it will be used, the associated and affordable cost and the nature of the threat. A number of sensor packages, considered, developed and evaluated at TNO-FEL is presented for simple, medium size and large and expensive platforms. In recent years the requirements for these sensors have become more and more strigent due to the growing number of scenarios. The attack can practically be from any direction, implying the need for a large Field of Regard (FOR), the attack range can vary considerably and the type of threat can be very diverse, implying great flexibility and dynamic range and rapid response of the sensor. Especially the localization at short ranges is a challenging issue. Various configurations including advantages and drawbacks are discussed.
What's Next in Complex Networks? Capturing the Concept of Attacking Play in Invasive Team Sports.
Ramos, João; Lopes, Rui J; Araújo, Duarte
2018-01-01
The evolution of performance analysis within sports sciences is tied to technology development and practitioner demands. However, how individual and collective patterns self-organize and interact in invasive team sports remains elusive. Social network analysis has been recently proposed to resolve some aspects of this problem, and has proven successful in capturing collective features resulting from the interactions between team members as well as a powerful communication tool. Despite these advances, some fundamental team sports concepts such as an attacking play have not been properly captured by the more common applications of social network analysis to team sports performance. In this article, we propose a novel approach to team sports performance centered on sport concepts, namely that of an attacking play. Network theory and tools including temporal and bipartite or multilayered networks were used to capture this concept. We put forward eight questions directly related to team performance to discuss how common pitfalls in the use of network tools for capturing sports concepts can be avoided. Some answers are advanced in an attempt to be more precise in the description of team dynamics and to uncover other metrics directly applied to sport concepts, such as the structure and dynamics of attacking plays. Finally, we propose that, at this stage of knowledge, it may be advantageous to build up from fundamental sport concepts toward complex network theory and tools, and not the other way around.
NASA Technical Reports Server (NTRS)
Iliff, Kenneth W.; Wang, Kon-Sheng Charles
1999-01-01
The subsonic, lateral-directional, stability and control derivatives of the thrust-vectoring F-1 8 High Angle of Attack Research Vehicle (HARV) are extracted from flight data using a maximum likelihood parameter identification technique. State noise is accounted for in the identification formulation and is used to model the uncommanded forcing functions caused by unsteady aerodynamics. Preprogrammed maneuvers provided independent control surface inputs, eliminating problems of identifiability related to correlations between the aircraft controls and states. The HARV derivatives are plotted as functions of angles of attack between 10deg and 70deg and compared to flight estimates from the basic F-18 aircraft and to predictions from ground and wind tunnel tests. Unlike maneuvers of the basic F-18 aircraft, the HARV maneuvers were very precise and repeatable, resulting in tightly clustered estimates with small uncertainty levels. Significant differences were found between flight and prediction; however, some of these differences may be attributed to differences in the range of sideslip or input amplitude over which a given derivative was evaluated, and to differences between the HARV external configuration and that of the basic F-18 aircraft, upon which most of the prediction was based. Some HARV derivative fairings have been adjusted using basic F-18 derivatives (with low uncertainties) to help account for differences in variable ranges and the lack of HARV maneuvers at certain angles of attack.
Linder, Suzanne K; Kamath, Geetanjali R; Pratt, Gregory F; Saraykar, Smita S; Volk, Robert J
2015-04-01
To compare the effectiveness of two search methods in identifying studies that used the Control Preferences Scale (CPS), a health care decision-making instrument commonly used in clinical settings. We searched the literature using two methods: (1) keyword searching using variations of "Control Preferences Scale" and (2) cited reference searching using two seminal CPS publications. We searched three bibliographic databases [PubMed, Scopus, and Web of Science (WOS)] and one full-text database (Google Scholar). We report precision and sensitivity as measures of effectiveness. Keyword searches in bibliographic databases yielded high average precision (90%) but low average sensitivity (16%). PubMed was the most precise, followed closely by Scopus and WOS. The Google Scholar keyword search had low precision (54%) but provided the highest sensitivity (70%). Cited reference searches in all databases yielded moderate sensitivity (45-54%), but precision ranged from 35% to 75% with Scopus being the most precise. Cited reference searches were more sensitive than keyword searches, making it a more comprehensive strategy to identify all studies that use a particular instrument. Keyword searches provide a quick way of finding some but not all relevant articles. Goals, time, and resources should dictate the combination of which methods and databases are used. Copyright © 2015 Elsevier Inc. All rights reserved.
Linder, Suzanne K.; Kamath, Geetanjali R.; Pratt, Gregory F.; Saraykar, Smita S.; Volk, Robert J.
2015-01-01
Objective To compare the effectiveness of two search methods in identifying studies that used the Control Preferences Scale (CPS), a healthcare decision-making instrument commonly used in clinical settings. Study Design & Setting We searched the literature using two methods: 1) keyword searching using variations of “control preferences scale” and 2) cited reference searching using two seminal CPS publications. We searched three bibliographic databases [PubMed, Scopus, Web of Science (WOS)] and one full-text database (Google Scholar). We report precision and sensitivity as measures of effectiveness. Results Keyword searches in bibliographic databases yielded high average precision (90%), but low average sensitivity (16%). PubMed was the most precise, followed closely by Scopus and WOS. The Google Scholar keyword search had low precision (54%) but provided the highest sensitivity (70%). Cited reference searches in all databases yielded moderate sensitivity (45–54%), but precision ranged from 35–75% with Scopus being the most precise. Conclusion Cited reference searches were more sensitive than keyword searches, making it a more comprehensive strategy to identify all studies that use a particular instrument. Keyword searches provide a quick way of finding some but not all relevant articles. Goals, time and resources should dictate the combination of which methods and databases are used. PMID:25554521
Critical components required to improve deployable laboratory biological hazards identification
NASA Astrophysics Data System (ADS)
Niemeyer, Debra M.
2004-08-01
An ever-expanding global military mission necessitates quick and accurate identification of biological hazards, whether naturally occurring or man-made. Coupled with an ever-present threat of biological attack, an expanded U.S. presence in worn-torn locations like Southwest Asia presents unique public health challenges. We must heed modern day "lessons learned" from Operation Desert Shield and the Soviet Afghanistan Campaign and guard against rapid incapacitation of troop strength from endemic disease and biological attack. To minimize readiness impacts, field hygiene is enforced, and research on better medical countermeasures such as antibiotics and vaccines continues. However, there are no preventions or remedies for all military-relevant infectious diseases or biological agents. A deployable, streamlined, self-contained diagnostic and public health surveillance laboratory capability with a reach-back communication is critical to meeting global readiness challenges. Current deployable laboratory packages comprise primarily diagnostic or environmental sample testing capabilities. Discussion will focus on critical components needed to improve existing laboratory assets, and to facilitate deployment of small, specialized packages far forward. The ideal laboratory model described will become an essential tool for the Combatant or Incident Commander to maintain force projection in the expeditionary environment.
TWA Flight 800, explosion airblast unexplained
NASA Astrophysics Data System (ADS)
Reed, Jack W.
2003-10-01
TWA Flight 800 disintegrated off Long Island, NY, on 16 July 1996. Immediate reports from other flyers described what appeared as attacking missiles. Search for terrorists began quickly, with over 1000 FBI agents to collect debris, interview eyewitnesses, and analyze sightings to give a missile launch point. They found no evidence of criminal attack, and turned investigations over to the NTSB to find some accidental cause. The ``empty'' central fuel tank was determined to be the likely explosion source. On the other hand, early witnesses reported a ``loud'' bang after seeing a great fireball fall from the sky, but at 15 km or greater range, they saw and heard two different events. This acoustic discrepancy has not been adequately investigated. When finally released, FBI reports from more than 200 ``ear-witnesses'' give similar observations. Their loudness reports confirm that at least a ton of TNT equivalent explosion had occurred. NASA acousticians engaged by NTSB, however, through spectral analysis techniques for sonic booms, concluded that a 10-kg TNT explosion, from detonating fuel tank vapors, could be heard on Long Island. Evidence for a much larger yield is presented here, but its form remains a mystery.
NASA Astrophysics Data System (ADS)
Ramachandran, Vasuda; Yoon, Hargsoon; Varadan, Vijay K.
2009-03-01
According to a report by the American Heart Association, there are approximately 3-4 million Americans that may experience silent Myocardial Ischemia (MI). Silent MI is a serious heart condition that can progress to a severe heart attack without any warning and the consequences of such an event can turn fatal quickly. Therefore, there is a strong need for a sensor that can continuously monitor the onset of the condition to prevent high risk individuals from deadly heart attacks. An increase in extracellular potassium levels is the first sign of MI and timely sensing with an implantable potassium sensing biosensor could play a critical role in detecting and expediting care. There are challenges in the development of an implantable potassium sensing electrode one of which includes signal drift. The incorporation of novel nanostructures and smarter materials hold the potential to combat these problems. This paper presents a unique design for an all-solid-state potassium sensing device which offers miniaturization along with enhanced signal transduction. These characteristics are important when it comes to implantable devices and signal drift. Sensor design details along with fabrication processes and sensing results are discussed.
Environmental Durability of Coated GRCop-84 Copper Alloys
NASA Technical Reports Server (NTRS)
Raj, Sai V.; Robinson, C.; Barrett, C.; Humphrey, D.
2005-01-01
An advanced Cu-8(at.%)Cr-4%Nb alloy developed at NASA's Glenn Research Center, and designated as GRCop-84, is currently being considered for use as liners in combustor chambers and nozzle ramps in NASA s future generations of reusable launch vehicles (RLVs). However, past experience has shown that unprotected copper alloys undergo an environmental attack called "blanching" in rocket engines using liquid hydrogen as fuel and liquid oxygen as the oxidizer. Potential for sulfidation attack of the liners in hydrocarbon-fueled engines is also of concern. As a result, protective overlay coatings alloys are being developed for GRCop-84. The oxidation behavior of several new coating alloys has been evaluated. GRCop-84 specimens were coated with several copper and nickel-based coatings, where the coatings were deposited by either vacuum plasma spraying or cold spraying techniques. Coated and uncoated specimens were thermally cycled in a furnace at different temperatures in order to evaluate the performance of the coatings. Additional studies were conducted in a high pressure burner rig using a hydrocarbon fuel and subjected to a high heat flux hydrogen-oxygen combustion flame in NASA s Quick Access Rocket Exhaust (QARE) rig. The performance of these coatings are discussed.
Error measuring system of rotary Inductosyn
NASA Astrophysics Data System (ADS)
Liu, Chengjun; Zou, Jibin; Fu, Xinghe
2008-10-01
The inductosyn is a kind of high-precision angle-position sensor. It has important applications in servo table, precision machine tool and other products. The precision of inductosyn is calibrated by its error. It's an important problem about the error measurement in the process of production and application of the inductosyn. At present, it mainly depends on the method of artificial measurement to obtain the error of inductosyn. Therefore, the disadvantages can't be ignored such as the high labour intensity of the operator, the occurrent error which is easy occurred and the poor repeatability, and so on. In order to solve these problems, a new automatic measurement method is put forward in this paper which based on a high precision optical dividing head. Error signal can be obtained by processing the output signal of inductosyn and optical dividing head precisely. When inductosyn rotating continuously, its zero position error can be measured dynamically, and zero error curves can be output automatically. The measuring and calculating errors caused by man-made factor can be overcome by this method, and it makes measuring process more quickly, exactly and reliably. Experiment proves that the accuracy of error measuring system is 1.1 arc-second (peak - peak value).
Biology of the sea lamprey in its parasitic phase
Parker, Phillip S.; Lennon, Robert E.
1956-01-01
The investigations conducted on sea lampreys in aquariums were concerned with the duration of the parasitic phase of life, feeding, growth, and the interrelations between predator and host fish. Observations on lampreys reared from metamorphosis to maturity were made at the Fish and Wildlife Service Laboratory at Hammond Bay, Michigan. Most of the experimental lampreys were mature and ripe after 14 to 18 months of parasitic life. They exhibited signs of irreversible physical degeneration which precedes death. Three specimens were immature after 14, 18, and 26 months in aquariums, thus indicating that under certain conditions, lampreys may extend their parasitic phase. The feeding activity, growth, and shrinkage in size of aquarium specimens were considered typical of lampreys in the Great Lakes, although the wild lampreys achieve greater average size. Female lampreys made more attacks, fed more, killed more fish, and grew larger than males. They also shrank proportionately more in length and weight as they approached sexual maturity, but their terminal average size was slightly larger than that of males. It is estimated that the average fish-kill by a wild lamprey exceeds, and could be approximately double, the 18.5 pounds of fish killed by a laboratory lamprey. The rate and extent of fish destruction depended on the size, sex, and stage in the parasitic phase of the lampreys, and on the species and size of the fish. There was an increase in the number of fish killed as the lampreys grew, and the fish were killed more quickly. Attacks made by experimental lampreys at any stage of their parasitic phase up to full maturity, and on any part of a prey fish except fins, usually resulted in death to the host. Some fish which survived lamprey attacks succumbed to fungus infections of the wounds. A small number of trout recovered from attacks, and their wounds healed.
Survival and spawning of gill-net-marked red salmon
Nelson, Philip R.; Abegglen, Carl E.
1955-01-01
The investigations conducted on sea lampreys in aquariums were concerned with the duration of the parasitic phase of life, feeding, growth, and the interrelations between predator and host fish. Observations on lampreys reared from metamorphosis to maturity were made at the Fish and Wildlife Service Laboratory at Hammond Bay, Michigan. Most of the experimental lampreys were mature and ripe after 14 to 18 months of parasitic life. They exhibited signs of irreversible physical degeneration which precedes death. Three specimens were immature after 14, 18, and 26 months in aquariums, thus indicating that under certain conditions, lampreys may extend their parasitic phase. The feeding activity, growth, and shrinkage in size of aquarium specimens were considered typical of lampreys in the Great Lakes, although the wild lampreys achieve greater average size. Female lampreys made more attacks, fed more, killed more fish, and grew larger than males. They also shrank proportionately more in length and weight as they approached sexual maturity, but their terminal average size was slightly larger than that of males. It is estimated that the average fish-kill by a wild lamprey exceeds, and could be approximately double, the 18.5 pounds of fish killed by a laboratory lamprey. The rate and extent of fish destruction depended on the size, sex, and stage in the parasitic phase of the lampreys, and on the species and size of the fish. There was an increase in the number of fish killed as the lampreys grew, and the fish were killed more quickly. Attacks made by experimental lampreys at any stage of their parasitic phase up to full maturity, and on any part of a prey fish except fins, usually resulted in death to the host. Some fish which survived lamprey attacks succumbed to fungus infections of the wounds. A small number of trout recovered from attacks, and their wounds healed.
NASA Astrophysics Data System (ADS)
Born, Joshua
The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.
Cowling, Benjamin J.; Fung, Rita O. P.; Cheng, Calvin K. Y.; Fang, Vicky J.; Chan, Kwok Hung; Seto, Wing Hong; Yung, Raymond; Chiu, Billy; Lee, Paco; Uyeki, Timothy M.; Houck, Peter M.; Peiris, J. S. Malik; Leung, Gabriel M.
2008-01-01
Background There are sparse data on whether non-pharmaceutical interventions can reduce the spread of influenza. We implemented a study of the feasibility and efficacy of face masks and hand hygiene to reduce influenza transmission among Hong Kong household members. Methodology/Principal Findings We conducted a cluster randomized controlled trial of households (composed of at least 3 members) where an index subject presented with influenza-like-illness of <48 hours duration. After influenza was confirmed in an index case by the QuickVue Influenza A+B rapid test, the household of the index subject was randomized to 1) control or 2) surgical face masks or 3) hand hygiene. Households were visited within 36 hours, and 3, 6 and 9 days later. Nose and throat swabs were collected from index subjects and all household contacts at each home visit and tested by viral culture. The primary outcome measure was laboratory culture confirmed influenza in a household contact; the secondary outcome was clinically diagnosed influenza (by self-reported symptoms). We randomized 198 households and completed follow up home visits in 128; the index cases in 122 of those households had laboratory-confirmed influenza. There were 21 household contacts with laboratory confirmed influenza corresponding to a secondary attack ratio of 6%. Clinical secondary attack ratios varied from 5% to 18% depending on case definitions. The laboratory-based or clinical secondary attack ratios did not significantly differ across the intervention arms. Adherence to interventions was variable. Conclusions/Significance The secondary attack ratios were lower than anticipated, and lower than reported in other countries, perhaps due to differing patterns of susceptibility, lack of significant antigenic drift in circulating influenza virus strains recently, and/or issues related to the symptomatic recruitment design. Lessons learnt from this pilot have informed changes for the main study in 2008. Trial Registration ClinicalTrials.gov NCT00425893 HKClinicalTrials.com HKCTR-365 PMID:18461182
Presentation accuracy of the web revisited: animation methods in the HTML5 era.
Garaizar, Pablo; Vadillo, Miguel A; López-de-Ipiña, Diego
2014-01-01
Using the Web to run behavioural and social experiments quickly and efficiently has become increasingly popular in recent years, but there is some controversy about the suitability of using the Web for these objectives. Several studies have analysed the accuracy and precision of different web technologies in order to determine their limitations. This paper updates the extant evidence about presentation accuracy and precision of the Web and extends the study of the accuracy and precision in the presentation of multimedia stimuli to HTML5-based solutions, which were previously untested. The accuracy and precision in the presentation of visual content in classic web technologies is acceptable for use in online experiments, although some results suggest that these technologies should be used with caution in certain circumstances. Declarative animations based on CSS are the best alternative when animation intervals are above 50 milliseconds. The performance of procedural web technologies based on the HTML5 standard is similar to that of previous web technologies. These technologies are being progressively adopted by the scientific community and have promising futures, which makes their use advisable to utilizing more obsolete technologies.
Exploiting the chaotic behaviour of atmospheric models with reconfigurable architectures
NASA Astrophysics Data System (ADS)
Russell, Francis P.; Düben, Peter D.; Niu, Xinyu; Luk, Wayne; Palmer, T. N.
2017-12-01
Reconfigurable architectures are becoming mainstream: Amazon, Microsoft and IBM are supporting such architectures in their data centres. The computationally intensive nature of atmospheric modelling is an attractive target for hardware acceleration using reconfigurable computing. Performance of hardware designs can be improved through the use of reduced-precision arithmetic, but maintaining appropriate accuracy is essential. We explore reduced-precision optimisation for simulating chaotic systems, targeting atmospheric modelling, in which even minor changes in arithmetic behaviour will cause simulations to diverge quickly. The possibility of equally valid simulations having differing outcomes means that standard techniques for comparing numerical accuracy are inappropriate. We use the Hellinger distance to compare statistical behaviour between reduced-precision CPU implementations to guide reconfigurable designs of a chaotic system, then analyse accuracy, performance and power efficiency of the resulting implementations. Our results show that with only a limited loss in accuracy corresponding to less than 10% uncertainty in input parameters, the throughput and energy efficiency of a single-precision chaotic system implemented on a Xilinx Virtex-6 SX475T Field Programmable Gate Array (FPGA) can be more than doubled.
Andrada, Emanuel; Rode, Christian; Blickhan, Reinhard
2013-10-21
Many birds use grounded running (running without aerial phases) in a wide range of speeds. Contrary to walking and running, numerical investigations of this gait based on the BSLIP (bipedal spring loaded inverted pendulum) template are rare. To obtain template related parameters of quails (e.g. leg stiffness) we used x-ray cinematography combined with ground reaction force measurements of quail grounded running. Interestingly, with speed the quails did not adjust the swing leg's angle of attack with respect to the ground but adapted the angle between legs (which we termed aperture angle), and fixed it about 30ms before touchdown. In simulations with the BSLIP we compared this swing leg alignment policy with the fixed angle of attack with respect to the ground typically used in the literature. We found symmetric periodic grounded running in a simply connected subset comprising one third of the investigated parameter space. The fixed aperture angle strategy revealed improved local stability and surprising tolerance with respect to large perturbations. Starting with the periodic solutions, after step-down step-up or step-up step-down perturbations of 10% leg rest length, in the vast majority of cases the bipedal SLIP could accomplish at least 50 steps to fall. The fixed angle of attack strategy was not feasible. We propose that, in small animals in particular, grounded running may be a common gait that allows highly compliant systems to exploit energy storage without the necessity of quick changes in the locomotor program when facing perturbations. © 2013 Elsevier Ltd. All rights reserved.
Kogan, Ilja; Pacholak, Steffen; Licht, Martin; Schneider, Jörg W.; Brücker, Christoph; Brandt, Sebastian
2015-01-01
ABSTRACT Recent pike-like predatory fishes attack prey animals by a quick strike out of rest or slow movement. This fast-start behaviour includes a preparatory, a propulsive and a final phase, and the latter is crucial for the success of the attack. To prevent prey from escape, predators tend to minimise the duration of the interaction and the disturbance caused to surrounding water in order to not be detected by the prey's lateral line sensory system. We compared the hydrodynamic properties of the earliest fossil representative of the pike-like morphotype, the Triassic actinopterygian Saurichthys, with several recent pike-like predators by means of computational fluid dynamics (CFD). Rainbow trout has been used as a control example of a fish with a generalist body shape. Our results show that flow disturbance produced by Saurichthys was low and similar to that of the recent forms Belone and Lepisosteus, thus indicative of an effective ambush predator. Drag coefficients are low for all these fishes, but also for trout, which is a good swimmer over longer distances but generates considerable disturbance of flow. Second-highest flow disturbance values are calculated for Esox, which compensates the large disturbance with its extremely high acceleration performance (i.e. attacks at high speeds) and the derived teleostean protrusible mouth that allows prey catching from longer distances compared to the other fishes. We show CFD modelling to be a useful tool for palaeobiological reconstruction of fossil fishes, as it allows quantification of impacts of body morphology on a hypothesised lifestyle. PMID:26603471
Asthma Management in New York City Schools: a Classroom Teacher Perspective
Cain, Agnieszka; Reznik, Marina
2016-01-01
Objective Classroom teachers play an important role in facilitating asthma management in school but little is known about their perspectives around asthma management. We examined the perspectives of classroom teachers around barriers to school asthma management. Methods We conducted key informant interviews with 21 inner-city classroom teachers from 3rd to 5th grades in 10 Bronx, New York elementary schools. Sampling continued until thematic saturation was reached. Interviews were recorded, transcribed, and independently coded for common themes. We used thematic and content review to analyze interview data. Results Seven themes representing teachers’ perspectives on in-school asthma management emerged: (1) the problematic process of identifying students with asthma; (2) poor familiarity with the city health department’s asthma initiative and poor general knowledge of school policies on asthma management (3) lack of competency in managing an acute asthma attack in the classroom and poor recognition of symptoms of an asthma attack; (4) lack of confidence in dealing with a hypothetical asthma attack in the classroom; (5) lack of quick access to asthma medication in school; (6) limited communication between school staff; and (7) enthusiasm about learning more about asthma management. Conclusions Our results revealed several barriers contributing to suboptimal in-school asthma management: ineffective ways of identifying students with asthma, lack of teacher knowledge of guidelines on asthma management, lack of comfort in managing students’ asthma, inadequate access to asthma medication in school, and limited communication between school staff. These issues should be considered in the design of interventions to improve in-school asthma management. PMID:27031532
Information War and the Air Force: Wave of the Future? Current Fad?
1996-03-01
computers and appears to be confident that they will be adequate.16 It also seems relatively sanguine about the security of classi- fied computers, at...the illusion that new weapons can take the horror out of war is a disservice to rational policymaking. Instead, all of the new weapons need to be...of large-scale precision attack requires maturation of a number of differ- ent technologies, and that has taken a considerable num - ber of years
1994-10-31
No comment S4: No comment 63 3. The HMD would my...released (i.e., not hung) without looking down on the PACS page is very good." S4: No comment 6. The HMD would my SITUATIONAL AWARENESS during the INGRESS...Substantially Degrade 0 (Subject 1: NO RATING) HOW? S 1: No comment S2: "Previous reasons, visibility REF # 2, 4" S3: No comment S4: No comment 65 7. The
An examination of Aikido's Fourth Teaching: an anatomical study of the tissues of the forearm.
Olson, G D; Seitz, F C
1990-12-01
One of the basic teachings of Aikido is known as Yonkyo (Fourth Teaching) or Tekubi-Osae (Wrist Securing). According to some Aikido master teachers, Yonkyo is designed to attack the opponent's weak points. This investigation focused on examining this teaching with the purpose of describing the anatomical tissues involved in the etiology of pain when this teaching is applied precisely. Particular focus was placed on the anatomical locations/sources of pain associated with the application of this teaching.
Precise and economic FIB/SEM for CLEM: with 2 nm voxels through mitosis.
Luckner, Manja; Wanner, Gerhard
2018-05-23
A portfolio is presented documenting economic, high-resolution correlative focused ion beam scanning electron microscopy (FIB/SEM) in routine, comprising: (i) the use of custom-labeled slides and coverslips, (ii) embedding of cells in thin, or ultra-thin resin layers for correlative light and electron microscopy (CLEM) and (iii) the claim to reach the highest resolution possible with FIB/SEM in xyz. Regions of interest (ROIs) defined in light microscope (LM), can be relocated quickly and precisely in SEM. As proof of principle, HeLa cells were investigated in 3D context at all stages of the cell cycle, documenting ultrastructural changes during mitosis: nuclear envelope breakdown and reassembly, Golgi degradation and reconstitution and the formation of the midzone and midbody.
NBS (National Bureau of Standards) calibration services users guide: Fee schedule
NASA Astrophysics Data System (ADS)
1987-04-01
The physical measurement services of the National Bureau of Standards are designed to help the makers and users of precision instruments achieve the highest possible levels of measurement quality and productivity. The hundreds of individual services found listed in the Fee Schedule constitute the highest-order calibration services available in the United States. These services directly link a customer's precision equipment or transfer standards to national measurement standards. These services are offered to public and private organizations and individuals alike. The Fee Schedule is a supplement to NBS Special Publication 250, Calibration Services Users Guide. These documents are designed to make the task of selecting and ordering an appropriate calibration service as quick and easy as possible.
Muhs, D.R.
2002-01-01
The last interglacial period has a timing and duration that can be estimated from U-series dating of emergent, coral-bearing deposits on tectonically stable coastlines. High-precision dating from Bermuda, the Bahamas, Hawaii, and Australia suggests that the last interglacial period had a sea level at least as high as present from ???128,000 to 116,000 yr B.P. Sea level reached a near-present level more quickly after the close of the penultimate glacial period than at the close of the last glacial period and the duration of high sea level is longer than that implied by the deep-sea record. ?? 2002 University of Washington.
Hou, Fang; Lesmes, Luis Andres; Kim, Woojae; Gu, Hairong; Pitt, Mark A.; Myung, Jay I.; Lu, Zhong-Lin
2016-01-01
The contrast sensitivity function (CSF) has shown promise as a functional vision endpoint for monitoring the changes in functional vision that accompany eye disease or its treatment. However, detecting CSF changes with precision and efficiency at both the individual and group levels is very challenging. By exploiting the Bayesian foundation of the quick CSF method (Lesmes, Lu, Baek, & Albright, 2010), we developed and evaluated metrics for detecting CSF changes at both the individual and group levels. A 10-letter identification task was used to assess the systematic changes in the CSF measured in three luminance conditions in 112 naïve normal observers. The data from the large sample allowed us to estimate the test–retest reliability of the quick CSF procedure and evaluate its performance in detecting CSF changes at both the individual and group levels. The test–retest reliability reached 0.974 with 50 trials. In 50 trials, the quick CSF method can detect a medium 0.30 log unit area under log CSF change with 94.0% accuracy at the individual observer level. At the group level, a power analysis based on the empirical distribution of CSF changes from the large sample showed that a very small area under log CSF change (0.025 log unit) could be detected by the quick CSF method with 112 observers and 50 trials. These results make it plausible to apply the method to monitor the progression of visual diseases or treatment effects on individual patients and greatly reduce the time, sample size, and costs in clinical trials at the group level. PMID:27120074
Mirador: A Simple, Fast Search Interface for Remote Sensing Data
NASA Technical Reports Server (NTRS)
Lynnes, Christopher; Strub, Richard; Seiler, Edward; Joshi, Talak; MacHarrie, Peter
2008-01-01
A major challenge for remote sensing science researchers is searching and acquiring relevant data files for their research projects based on content, space and time constraints. Several structured query (SQ) and hierarchical navigation (HN) search interfaces have been develop ed to satisfy this requirement, yet the dominant search engines in th e general domain are based on free-text search. The Goddard Earth Sci ences Data and Information Services Center has developed a free-text search interface named Mirador that supports space-time queries, inc luding a gazetteer and geophysical event gazetteer. In order to compe nsate for a slightly reduced search precision relative to SQ and HN t echniques, Mirador uses several search optimizations to return result s quickly. The quick response enables a more iterative search strateg y than is available with many SQ and HN techniques.
Savini, Vincenzo; Marrollo, Roberta; Coclite, Eleonora; Fusilli, Paola; D'Incecco, Carmine; Fazii, Paolo
2014-01-01
We report the case of a late-onset neonatal meningitis by Streptococcus agalactiae (group B Streptococcus - GBS) that was diagnosed with a latex agglutination assay (on cerebrospinal fluid, CSF), as well as by using, for the first time, Xpert GBS (Cepheid, US) on CSF. Due to empirical antibiotics given before sampling, both CSF and blood culture were negative, so the abovementioned diagnostics was crucial. Moreover, the Xpert GBS assay, performed according to an off-label, modified protocol (the system is designed for GBS-carriage intrapartum screening, based on a completely automated real time-Polymerase Chain Reaction) quickly detected the organism's genome target. Although further investigation on this test's performace on CSF is required, then, we trust it may be a promising, quick and precise diagnostic method for infections in newborns.
Rapid Planning and Quick Decision Making during Tactical Operations
1993-01-01
impact of a change in doctrine and the need for sound doctrine. On one hand, a major change in doctrine requires a significant institutional investment ...Shmanskiy’s Fundementals of Tactical Command and Control. Ivanov, et al, in particular offers a very precise approach to estimating the time available for a...heuristics, and groupthink. 4 4 Entrapment, according to Tanouye, is the temptation to "protect your investment and avoid embarrassment by staying the
A general-purpose balloon-borne pointing system for solar scientific instruments
NASA Technical Reports Server (NTRS)
Polites, M. E.
1990-01-01
A general purpose balloonborne pointing system for accommodating a wide variety of solar scientific instruments is described. It is designed for precise pointing, low cost, and quick launch. It offers the option of three-axis control, pitch-yaw-roll, or two-axis control, pitch-yaw, depending on the needs of the solar instrument. Simulation results are presented that indicate good pointing capability at Sun elevation angles ranging from 10 to 80 deg.
Design of weak link channel-cut crystals for fast QEXAFS monochromators
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polheim, O. von, E-mail: vonpolheim@uni-wuppertal.de; Müller, O.; Lützenkirchen-Hecht, D.
2016-07-27
A weak link channel-cut crystal, optimized for dedicated Quick EXAFS monochromators and measurements, was designed using finite element analysis. This channel-cut crystal offers precise detuning capabilities to enable suppression of higher harmonics in the virtually monochromatic beam. It was optimized to keep the detuning stable, withstanding the mechanical load, which occurs during oscillations with up to 50 Hz. First tests at DELTA (Dortmund, Germany), proved the design.
Foundation of a Knowledge Representation System for Image Understanding.
1980-10-01
This is useful for holding the system together, for computing similarity between objects, for quickly retrieving desired information in as detailed a...mined by how much precision is needed to carry through the current computation . In Section 2, we discuss the OVS system itself, its structure and how...2.0 OVS SYSTEM Our goal here is to present the computational constraints involved in the design of a knowledge representation system which is
qPR: An adaptive partial-report procedure based on Bayesian inference.
Baek, Jongsoo; Lesmes, Luis Andres; Lu, Zhong-Lin
2016-08-01
Iconic memory is best assessed with the partial report procedure in which an array of letters appears briefly on the screen and a poststimulus cue directs the observer to report the identity of the cued letter(s). Typically, 6-8 cue delays or 600-800 trials are tested to measure the iconic memory decay function. Here we develop a quick partial report, or qPR, procedure based on a Bayesian adaptive framework to estimate the iconic memory decay function with much reduced testing time. The iconic memory decay function is characterized by an exponential function and a joint probability distribution of its three parameters. Starting with a prior of the parameters, the method selects the stimulus to maximize the expected information gain in the next test trial. It then updates the posterior probability distribution of the parameters based on the observer's response using Bayesian inference. The procedure is reiterated until either the total number of trials or the precision of the parameter estimates reaches a certain criterion. Simulation studies showed that only 100 trials were necessary to reach an average absolute bias of 0.026 and a precision of 0.070 (both in terms of probability correct). A psychophysical validation experiment showed that estimates of the iconic memory decay function obtained with 100 qPR trials exhibited good precision (the half width of the 68.2% credible interval = 0.055) and excellent agreement with those obtained with 1,600 trials of the conventional method of constant stimuli procedure (RMSE = 0.063). Quick partial-report relieves the data collection burden in characterizing iconic memory and makes it possible to assess iconic memory in clinical populations.
qPR: An adaptive partial-report procedure based on Bayesian inference
Baek, Jongsoo; Lesmes, Luis Andres; Lu, Zhong-Lin
2016-01-01
Iconic memory is best assessed with the partial report procedure in which an array of letters appears briefly on the screen and a poststimulus cue directs the observer to report the identity of the cued letter(s). Typically, 6–8 cue delays or 600–800 trials are tested to measure the iconic memory decay function. Here we develop a quick partial report, or qPR, procedure based on a Bayesian adaptive framework to estimate the iconic memory decay function with much reduced testing time. The iconic memory decay function is characterized by an exponential function and a joint probability distribution of its three parameters. Starting with a prior of the parameters, the method selects the stimulus to maximize the expected information gain in the next test trial. It then updates the posterior probability distribution of the parameters based on the observer's response using Bayesian inference. The procedure is reiterated until either the total number of trials or the precision of the parameter estimates reaches a certain criterion. Simulation studies showed that only 100 trials were necessary to reach an average absolute bias of 0.026 and a precision of 0.070 (both in terms of probability correct). A psychophysical validation experiment showed that estimates of the iconic memory decay function obtained with 100 qPR trials exhibited good precision (the half width of the 68.2% credible interval = 0.055) and excellent agreement with those obtained with 1,600 trials of the conventional method of constant stimuli procedure (RMSE = 0.063). Quick partial-report relieves the data collection burden in characterizing iconic memory and makes it possible to assess iconic memory in clinical populations. PMID:27580045
The death of distinctions: From 9/11 to Abu Ghraib.
Moon, John Ellis van Courtland
2004-09-01
War, the great simplifier, is the inevitable enemy of distinctions, especially when conflicts evoke survival fears, sounding echoes from humanity's environment of evolutionary adaptation. Throughout the twentieth century, attackers and targets grew more distant, weaponry grew more destructive, and distinctions -- between combatants and civilians, between legitimate and protected targets, between defensive and offensive strategies, between the innocent and the guilty -- faded. In the twenty-first century's first major conflict, "the war against terror," distinctions have faded still further, making nearly indistinguishable the frontier between preemption and prevention and between interrogation and torture. Proclaimed a "new type of war" in which old rules and customary safeguards would often be inapplicable, this conflict quickly came to be characterized by political embarrassment and operational scandal.
Sherrell, Darren A.; Foster, Andrew J.; Hudson, Lee; ...
2015-01-01
The design and implementation of a compact and portable sample alignment system suitable for use at both synchrotron and free-electron laser (FEL) sources and its performance are described. The system provides the ability to quickly and reliably deliver large numbers of samples using the minimum amount of sample possible, through positioning of fixed target arrays into the X-ray beam. The combination of high-precision stages, high-quality sample viewing, a fast controller and a software layer overcome many of the challenges associated with sample alignment. A straightforward interface that minimizes setup and sample changeover time as well as simplifying communication with themore » stages during the experiment is also described, together with an intuitive naming convention for defining, tracking and locating sample positions. Lastly, the setup allows the precise delivery of samples in predefined locations to a specific position in space and time, reliably and simply.« less
Park, Chan Woo; Moon, Yu Gyeong; Seong, Hyejeong; Jung, Soon Won; Oh, Ji-Young; Na, Bock Soon; Park, Nae-Man; Lee, Sang Seok; Im, Sung Gap; Koo, Jae Bon
2016-06-22
We demonstrate a new patterning technique for gallium-based liquid metals on flat substrates, which can provide both high pattern resolution (∼20 μm) and alignment precision as required for highly integrated circuits. In a very similar manner as in the patterning of solid metal films by photolithography and lift-off processes, the liquid metal layer painted over the whole substrate area can be selectively removed by dissolving the underlying photoresist layer, leaving behind robust liquid patterns as defined by the photolithography. This quick and simple method makes it possible to integrate fine-scale interconnects with preformed devices precisely, which is indispensable for realizing monolithically integrated stretchable circuits. As a way for constructing stretchable integrated circuits, we propose a hybrid configuration composed of rigid device regions and liquid interconnects, which is constructed on a rigid substrate first but highly stretchable after being transferred onto an elastomeric substrate. This new method can be useful in various applications requiring both high-resolution and precisely aligned patterning of gallium-based liquid metals.
Precision Control Module For UV Laser 3D Micromachining
NASA Astrophysics Data System (ADS)
Wu, Wen-Hong; Hung, Min-Wei; Chang, Chun-Li
2011-01-01
UV laser has been widely used in various micromachining such as micro-scribing or patterning processing. At present, most of the semiconductors, LEDs, photovoltaic solar panels and touch panels industries need the UV laser processing system. However, most of the UV laser processing applications in the industries utilize two dimensional (2D) plane processing. And there are tremendous business opportunities that can be developed, such as three dimensional (3D) structures of micro-electromechanical (MEMS) sensor or the precision depth control of indium tin oxide (ITO) thin films edge insulation in touch panels. This research aims to develop a UV laser 3D micromachining module that can create the novel applications for industries. By special designed beam expender in optical system, the focal point of UV laser can be adjusted quickly and accurately through the optical path control lens of laser beam expender optical system. Furthermore, the integrated software for galvanometric scanner and focal point adjustment mechanism is developed as well, so as to carry out the precise 3D microstructure machining.
Development of an ultrasonic linear motor with ultra-positioning capability and four driving feet.
Zhu, Cong; Chu, Xiangcheng; Yuan, Songmei; Zhong, Zuojin; Zhao, Yanqiang; Gao, Shuning
2016-12-01
This paper presents a novel linear piezoelectric motor which is suitable for rapid ultra-precision positioning. The finite element analysis (FEA) was applied for optimal design and further analysis, then experiments were conducted to investigate its performance. By changing the input signal, the proposed motor was found capable of working in the fast driving mode as well as in the precision positioning mode. When working in the fast driving mode, the motor acts as an ultrasonic motor with maximum no-load speed up to 181.2mm/s and maximum thrust of 1.7N at 200Vp-p. Also, when working in precision positioning mode, the motor can be regarded as a flexible hinge piezoelectric actuator with arbitrary motion in the range of 8μm. The measurable minimum output displacement was found to be 0.08μm, but theoretically, can be even smaller. More importantly, the motor can be quickly and accurately positioned in a large stroke. Copyright © 2016 Elsevier B.V. All rights reserved.
[Contemporary threat of influenza virus infection].
Płusa, Tadeusz
2010-01-01
Swine-origine H1N1 influenza virus (S-OIV) caused a great mobilization of health medical service over the world. Now it is well known that a vaccine against novel virus is expected as a key point in that battle. In the situation when recommended treatment with neuraminidase inhibitors is not sufficient to control influenza A/H1N1 viral infection the quick and precisely diagnostic procedures should be applied to save and protect our patients.
Hildenbrandt, Hanno
2018-01-01
The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds’ flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon’s starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon’s guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays. PMID:29649207
Patent foramen ovale and migraine attacks: a systematic review.
Lip, Philomena Z Y; Lip, Gregory Y H
2014-05-01
Migraine headache and the presence of a patent foramen ovale have been associated with each other, although the precise pathophysiological mechanism(s) are uncertain. The purpose of this systematic review was to identify the extent of patent foramen ovale prevalence in migraineurs and to determine whether closure of a patent foramen ovale would improve migraine headache. An electronic literature search was performed to select studies between January 1980 and February 2013 that were relevant to the prevalence of patent foramen ovale and migraine, and the effects of intervention(s) on migraine attacks. Of the initial 368 articles presented by the initial search, 20 satisfied the inclusion criteria assessing patent foramen ovale prevalence in migraineurs and 21 presented data on patent foramen ovale closure. In case series and cohort studies, patent foramen ovale prevalence in migraineurs ranged from 14.6% to 66.5%. Case-control studies reported a prevalence ranging from 16.0% to 25.7% in controls, compared with 26.8% to 96.0% for migraine with aura. The extent of improvement or resolution of migraine headache attack symptoms was variable. In case series, intervention ameliorated migraine headache attack in 13.6% to 92.3% of cases. One single randomized trial did not show any benefit from patent foramen ovale closure. The data overall do not exclude the possibility of a placebo effect for resolving migraine following patent foramen ovale closure. This systematic review demonstrates firstly that migraine headache attack is associated with a higher prevalence of patent foramen ovale than among the general population. Observational data suggest that some improvement of migraine would be observed if the patent foramen ovale were to be closed. A proper assessment of any interventions for patent foramen ovale closure would require further large randomized trials to be conducted given uncertainties from existing trial data. Copyright © 2014 Elsevier Inc. All rights reserved.
Aufderheide, Helge; Rudolf, Lars; Gross, Thilo; Lafferty, Kevin D.
2013-01-01
Recent attempts to predict the response of large food webs to perturbations have revealed that in larger systems increasingly precise information on the elements of the system is required. Thus, the effort needed for good predictions grows quickly with the system's complexity. Here, we show that not all elements need to be measured equally well, suggesting that a more efficient allocation of effort is possible. We develop an iterative technique for determining an efficient measurement strategy. In model food webs, we find that it is most important to precisely measure the mortality and predation rates of long-lived, generalist, top predators. Prioritizing the study of such species will make it easier to understand the response of complex food webs to perturbations.
Strawberry Maturity Neural Network Detectng System Based on Genetic Algorithm
NASA Astrophysics Data System (ADS)
Xu, Liming
The quick and non-detective detection of agriculture product is one of the measures to increase the precision and productivity of harvesting and grading. Having analyzed H frequency of different maturities in different light intensities, the results show that H frequency for the same maturity has little influence in different light intensities; Under the same light intensity, three strawberry maturities are changing in order. After having confirmed the H frequency section to distinguish the different strawberry maturity, the triplelayer feed-forward neural network system to detect strawberry maturity was designed by using genetic algorithm. The test results show that the detecting precision ratio is 91.7%, it takes 160ms to distinguish one strawberry. Therefore, the online non-detective detecting the strawberry maturity could be realized.
Digital gate pulse generator for cycloconverter control
Klein, Frederick F.; Mutone, Gioacchino A.
1989-01-01
The present invention provides a digital gate pulse generator which controls the output of a cycloconverter used for electrical power conversion applications by determining the timing and delivery of the firing pulses to the switching devices in the cycloconverter. Previous gate pulse generators have been built with largely analog or discrete digital circuitry which require many precision components and periodic adjustment. The gate pulse generator of the present invention utilizes digital techniques and a predetermined series of values to develop the necessary timing signals for firing the switching device. Each timing signal is compared with a reference signal to determine the exact firing time. The present invention is significantly more compact than previous gate pulse generators, responds quickly to changes in the output demand and requires only one precision component and no adjustments.
Preparation and properties on hollow nano-structured smoke material
NASA Astrophysics Data System (ADS)
Liu, Xiang-cui; Dai, Meng-yan; Fang, Guo-feng; Shi, Wei-dong; Cheng, Xiang; Liu, Hai-feng; Zhang, Tong
2013-09-01
In recent years, the weapon systems of laser guidance and infrared (IR) imaging guidance have been widely used in modern warfare because of their high precision and strong anti-interference. Notwithstanding, military smoke, as a rapid and effective passive jamming means, can effectively counteract the attack of enemy precision-guided weapons by scattering and absorbability. Conventional smoke has good attenuation capability only to visible light (0.4-0.76 μm), but hardly any effect to other electromagnetic wave band. The weapon systems of laser guidance and IR imaging guidance usually work in broad band, including near IR (1-3 μm), middle IR (3-5 μm), far IR (8-14 μm), and so on. Accordingly, exploiting and using new efficient obscurant materials, which is one of the important factors that develop smoke technology, have become a focus and attracted more interests around the world. Then nano-structured materials that are developing very quickly have turned into our new choice. Hollow nano-structured materials (HNSM) have many special properties because of their nano-size wall-thickness and sub-micron grain-size. After a lot of HNSM were synthesized in this paper, their physical and chemical properties, including grain size, phase composition, microstructure, optical properties and resistivity were tested and analysed. Then the experimental results of the optical properties showed that HNSM exhibit excellent wave-absorbing ability in ultraviolet, visible and infrared regions. On the basis of the physicochemmical properties, HNSM are firstly applied in smoke technology field. And the obscuration performance of HNSM smoke was tested in smoke chamber. The testing waveband included 1.06μm and 10.6μm laser, 3-5μm and 8-14μm IR radiation. Then the main parameters were obtained, including the attenuation rate, the transmission rate, the mass extinction coefficient, the efficiency obscuring time, and the sedimentation rate, etc. The main parameters of HNSM smoke were contrasted in detail with graphite powder smoke agent. The results showed that HNSM smoke possesses better obscuration capability compared with the smoke performance of conventional materials (such as HC, RP, oil, carbon black, and graphite powder). Therefore, they are new smoke obscurant materials which can effectively interfere with broadband electromagnetic radiation, including 1.06 μm and 10.6 μm laser, 3-5 μm and 8-14 μm IR waveband.
NASA Technical Reports Server (NTRS)
Sprowls, D. O.; Bucci, R. J.; Ponchel, B. M.; Brazill, R. L.; Bretz, P. E.
1984-01-01
A technique is demonstrated for accelerated stress corrosion testing of high strength aluminum alloys. The method offers better precision and shorter exposure times than traditional pass fail procedures. The approach uses data from tension tests performed on replicate groups of smooth specimens after various lengths of exposure to static stress. The breaking strength measures degradation in the test specimen load carrying ability due to the environmental attack. Analysis of breaking load data by extreme value statistics enables the calculation of survival probabilities and a statistically defined threshold stress applicable to the specific test conditions. A fracture mechanics model is given which quantifies depth of attack in the stress corroded specimen by an effective flaw size calculated from the breaking stress and the material strength and fracture toughness properties. Comparisons are made with experimental results from three tempers of 7075 alloy plate tested by the breaking load method and by traditional tests of statistically loaded smooth tension bars and conventional precracked specimens.
Foster, E; Hawkins, A; Delve, J; Adamson, A J
2014-01-01
Self-Completed Recall and Analysis of Nutrition (scran24) is a prototype computerised 24-h recall system for use with 11-16 year olds. It is based on the Multiple Pass 24-h Recall method and includes prompts and checks throughout the system for forgotten food items. The development of scran24 was informed by an extensive literature review, a series of focus groups and usability testing. The first stage of the recall is a quick list where the user is asked to input all the foods and drinks they remember consuming the previous day. The quick list is structured into meals and snacks. Once the quick list is complete, additional information is collected on each food to determine food type and to obtain an estimate of portion size using digital images of food. Foods are located within the system using a free text search, which is linked to the information entered into the quick list. A time is assigned to each eating occasion using drag and drop onto a timeline. The system prompts the user if no foods or drinks have been consumed within a 3-h time frame, or if fewer than three drinks have been consumed throughout the day. The food composition code and weight (g) of all items selected are automatically allocated and stored. Nutritional information can be generated automatically via the scran24 companion Access database. scran24 was very well received by young people and was relatively quick to complete. The accuracy and precision was close to that of similar computer-based systems currently used in dietary studies. © 2013 The Authors Journal of Human Nutrition and Dietetics © 2013 The British Dietetic Association Ltd.
NASA Astrophysics Data System (ADS)
Li, Fu-Hai; Chiu, Yung-Yueh; Lee, Yen-Hui; Chang, Ru-Wei; Yang, Bo-Jun; Sun, Wein-Town; Lee, Eric; Kuo, Chao-Wei; Shirota, Riichiro
2013-04-01
In this study, we precisely investigate the charge distribution in SiN layer by dynamic programming of channel hot hole induced hot electron injection (CHHIHE) in p-channel silicon-oxide-nitride-oxide-silicon (SONOS) memory device. In the dynamic programming scheme, gate voltage is increased as a staircase with fixed step amplitude, which can prohibits the injection of holes in SiN layer. Three-dimensional device simulation is calibrated and is compared with the measured programming characteristics. It is found, for the first time, that the hot electron injection point quickly traverses from drain to source side synchronizing to the expansion of charged area in SiN layer. As a result, the injected charges quickly spread over on the almost whole channel area uniformly during a short programming period, which will afford large tolerance against lateral trapped charge diffusion by baking.
Image registration assessment in radiotherapy image guidance based on control chart monitoring.
Xia, Wenyao; Breen, Stephen L
2018-04-01
Image guidance with cone beam computed tomography in radiotherapy can guarantee the precision and accuracy of patient positioning prior to treatment delivery. During the image guidance process, operators need to take great effort to evaluate the image guidance quality before correcting a patient's position. This work proposes an image registration assessment method based on control chart monitoring to reduce the effort taken by the operator. According to the control chart plotted by daily registration scores of each patient, the proposed method can quickly detect both alignment errors and image quality inconsistency. Therefore, the proposed method can provide a clear guideline for the operators to identify unacceptable image quality and unacceptable image registration with minimal effort. Experimental results demonstrate that by using control charts from a clinical database of 10 patients undergoing prostate radiotherapy, the proposed method can quickly identify out-of-control signals and find special cause of out-of-control registration events.
Fast and accurate edge orientation processing during object manipulation
Flanagan, J Randall; Johansson, Roland S
2018-01-01
Quickly and accurately extracting information about a touched object’s orientation is a critical aspect of dexterous object manipulation. However, the speed and acuity of tactile edge orientation processing with respect to the fingertips as reported in previous perceptual studies appear inadequate in these respects. Here we directly establish the tactile system’s capacity to process edge-orientation information during dexterous manipulation. Participants extracted tactile information about edge orientation very quickly, using it within 200 ms of first touching the object. Participants were also strikingly accurate. With edges spanning the entire fingertip, edge-orientation resolution was better than 3° in our object manipulation task, which is several times better than reported in previous perceptual studies. Performance remained impressive even with edges as short as 2 mm, consistent with our ability to precisely manipulate very small objects. Taken together, our results radically redefine the spatial processing capacity of the tactile system. PMID:29611804
Fujii, Keisuke; Isaka, Tadao; Kouzaki, Motoki; Yamamoto, Yuji
2015-01-01
Humans interact by changing their actions, perceiving other’s actions and executing solutions in conflicting situations. Using oscillator models, nonlinear dynamics have been considered for describing these complex human movements as an emergence of self-organisation. However, these frameworks cannot explain the hierarchical structures of complex behaviours between conflicting inter-agent and adapting intra-agent systems, especially in sport competitions wherein mutually quick decision making and execution are required. Here we adopt a hybrid multiscale approach to model an attack-and-defend game during which both players predict the opponent’s movement and move with a delay. From both simulated and measured data, one synchronous outcome between two-agent (i.e. successful defence) can be described as one attractor. In contrast, the other coordination-breaking outcome (i.e. successful attack) cannot be explained using gradient dynamics because the asymmetric interaction cannot always assume a conserved physical quantity. Instead, we provide the asymmetric and asynchronous hierarchical dynamical models to discuss two-agent competition. Our framework suggests that possessing information about an opponent and oneself in local-coordinative and global-competitive scale enables us to gain a deeper understanding of sports competitions. We anticipate developments in the scientific fields of complex movement adapting to such uncontrolled environments. PMID:26538452
NASA Astrophysics Data System (ADS)
Fujii, Keisuke; Isaka, Tadao; Kouzaki, Motoki; Yamamoto, Yuji
2015-11-01
Humans interact by changing their actions, perceiving other’s actions and executing solutions in conflicting situations. Using oscillator models, nonlinear dynamics have been considered for describing these complex human movements as an emergence of self-organisation. However, these frameworks cannot explain the hierarchical structures of complex behaviours between conflicting inter-agent and adapting intra-agent systems, especially in sport competitions wherein mutually quick decision making and execution are required. Here we adopt a hybrid multiscale approach to model an attack-and-defend game during which both players predict the opponent’s movement and move with a delay. From both simulated and measured data, one synchronous outcome between two-agent (i.e. successful defence) can be described as one attractor. In contrast, the other coordination-breaking outcome (i.e. successful attack) cannot be explained using gradient dynamics because the asymmetric interaction cannot always assume a conserved physical quantity. Instead, we provide the asymmetric and asynchronous hierarchical dynamical models to discuss two-agent competition. Our framework suggests that possessing information about an opponent and oneself in local-coordinative and global-competitive scale enables us to gain a deeper understanding of sports competitions. We anticipate developments in the scientific fields of complex movement adapting to such uncontrolled environments.
Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images
Hsieh, Shang-Lin; Chen, Chun-Che; Shen, Wen-Shan
2014-01-01
This paper presents a copyright identification scheme for color images that takes advantage of the complementary nature of watermarking and fingerprinting. It utilizes an authentication logo and the extracted features of the host image to generate a fingerprint, which is then stored in a database and also embedded in the host image to produce a watermarked image. When a dispute over the copyright of a suspect image occurs, the image is first processed by watermarking. If the watermark can be retrieved from the suspect image, the copyright can then be confirmed; otherwise, the watermark then serves as the fingerprint and is processed by fingerprinting. If a match in the fingerprint database is found, then the suspect image will be considered a duplicated one. Because the proposed scheme utilizes both watermarking and fingerprinting, it is more robust than those that only adopt watermarking, and it can also obtain the preliminary result more quickly than those that only utilize fingerprinting. The experimental results show that when the watermarked image suffers slight attacks, watermarking alone is enough to identify the copyright. The results also show that when the watermarked image suffers heavy attacks that render watermarking incompetent, fingerprinting can successfully identify the copyright, hence demonstrating the effectiveness of the proposed scheme. PMID:25114966
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang, Shangping; Ye, Jian; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption.
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
Wang, Shangping; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption. PMID:29795577
Presentation Accuracy of the Web Revisited: Animation Methods in the HTML5 Era
Garaizar, Pablo; Vadillo, Miguel A.; López-de-Ipiña, Diego
2014-01-01
Using the Web to run behavioural and social experiments quickly and efficiently has become increasingly popular in recent years, but there is some controversy about the suitability of using the Web for these objectives. Several studies have analysed the accuracy and precision of different web technologies in order to determine their limitations. This paper updates the extant evidence about presentation accuracy and precision of the Web and extends the study of the accuracy and precision in the presentation of multimedia stimuli to HTML5-based solutions, which were previously untested. The accuracy and precision in the presentation of visual content in classic web technologies is acceptable for use in online experiments, although some results suggest that these technologies should be used with caution in certain circumstances. Declarative animations based on CSS are the best alternative when animation intervals are above 50 milliseconds. The performance of procedural web technologies based on the HTML5 standard is similar to that of previous web technologies. These technologies are being progressively adopted by the scientific community and have promising futures, which makes their use advisable to utilizing more obsolete technologies. PMID:25302791
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
NASA Astrophysics Data System (ADS)
Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.
Rosales, Roberto S; Martin-Hidalgo, Yolanda; Reboso-Morales, Luis; Atroshi, Isam
2016-03-03
The purpose of this study was to assess the reliability and construct validity of the Spanish version of the 6-item carpal tunnel syndrome (CTS) symptoms scale (CTS-6). In this cross-sectional study 40 patients diagnosed with CTS based on clinical and neurophysiologic criteria, completed the standard Spanish versions of the CTS-6 and the disabilities of the arm, shoulder and hand (QuickDASH) scales on two occasions with a 1-week interval. Internal-consistency reliability was assessed with the Cronbach alpha coefficient and test-retest reliability with the intraclass correlation coefficient, two way random effect model and absolute agreement definition (ICC2,1). Cross-sectional precision was analyzed with the Standard Error of the Measurement (SEM). Longitudinal precision for test-retest reliability coefficient was assessed with the Standard Error of the Measurement difference (SEMdiff) and the Minimal Detectable Change at 95 % confidence level (MDC95). For assessing construct validity it was hypothesized that the CTS-6 would have a strong positive correlation with the QuickDASH, analyzed with the Pearson correlation coefficient (r). The standard Spanish version of the CTS-6 presented a Cronbach alpha of 0.81 with a SEM of 0.3. Test-retest reliability showed an ICC of 0.85 with a SRMdiff of 0.36 and a MDC95 of 0.7. The correlation between CTS-6 and the QuickDASH was concordant with the a priori formulated construct hypothesis (r 0.69) CONCLUSIONS: The standard Spanish version of the 6-item CTS symptoms scale showed good internal consistency, test-retest reliability and construct validity for outcomes assessment in CTS. The CTS-6 will be useful to clinicians and researchers in Spanish speaking parts of the world. The use of standardized outcome measures across countries also will facilitate comparison of research results in carpal tunnel syndrome.
Improvements of cyberspace and effects to the battlefield
NASA Astrophysics Data System (ADS)
Gedıklı, Münir
2014-06-01
Wars previously being executed at land and sea have also become applicable in air and space due to the advancements of aircraft and satellite systems. Rapid improvements in information technologies have triggered the concept of cyberspace which is considered as the fifth dimension of war. While transferring information quickly from physical area to electronic/digital area, cyberspace has caused to emerge a lot of threats and methods like cyber-attack, cyber-crime, cyber war which are spreading too rapidly. Individuals, institutions and establishments have begun to take their own cyber security precautions to cope with these threats. This study gives information about the concepts and advances on cyberspace in order to raise comprehensive awareness. The study also focuses on the effects of these improvements in the battlefield, and analyzes them.
SCIGN; new Southern California GPS network advances the study of earthquakes
Hudnut, Ken; King, Nancy
2001-01-01
Southern California is a giant jigsaw puzzle, and scientists are now using GPS satellites to track the pieces. These puzzle pieces are continuously moving, slowly straining the faults in between. That strain is then eventually released in earthquakes. The innovative Southern California Integrated GPS Network (SCIGN) tracks the motions of these pieces over most of southern California with unprecedented precision. This new network greatly improves the ability to assess seismic hazards and quickly measure the larger displacements that occur during and immediatelyafter earthquakes.
2017-04-06
including the Korean, Vietnam, and Persian Gulf Wars. However, as the nature of warfare and weaponry technology has transformed with the advent of precision...close support of friendly troops which demanded improved accuracy to reduce the chances of friendly casualties.3 By the advent of the Persian ...armored infantry vehicles, and air assets to locate, fix, and destroy Iraqi artillery and infantry in quick night-time strikes.5 The Persian Gulf
1989-09-25
Orders and test specifications. Some mandatory replacement of high failure items are directed by Technical Orders to extend MTBF. Precision bearing and...Experience is very high but natural attrition is reducing the numbers faster than training is furnishing younger mechanics. Surge conditions would be...model validation run output revealed that utilization of equipment is very low and manpower is high . Based on this analysis and the brainstorming
NASA Astrophysics Data System (ADS)
Zhao, Ming-fu; Hu, Xin-Yu; Shao, Yun; Luo, Bin-bin; Wang, Xin
2008-10-01
This article analyses nowadays in common use of football robots in China, intended to improve the football robots' hardware platform system's capability, and designed a football robot which based on DSP core controller, and combined Fuzzy-PID control algorithm. The experiment showed, because of the advantages of DSP, such as quickly operation, various of interfaces, low power dissipation etc. It has great improvement on the football robot's performance of movement, controlling precision, real-time performance.
Wedemeyer, Gary
1973-01-01
A rapid (3 min) but sublethal temperature increase from 10 to 20 imposed a greater stress on juvenile coho salmon (Oncorhynchus kisutch) than on juvenile steelhead trout (Salmo gairdneri). Both species suffered hyperglycemia, hypocholesterolemia, increased blood hemoglobin, and decreased blood sugar regulatory precision, but the steelhead recovered more quickly. Acid–base equilibrium was essentially unaffected, and only the coho suffered any significant interrenal vitamin C depletion. Vitamin C normalization required about 24 hr.
Composite adaptive control of belt polishing force for aero-engine blade
NASA Astrophysics Data System (ADS)
Zhsao, Pengbing; Shi, Yaoyao
2013-09-01
The existing methods for blade polishing mainly focus on robot polishing and manual grinding. Due to the difficulty in high-precision control of the polishing force, the blade surface precision is very low in robot polishing, in particular, quality of the inlet and exhaust edges can not satisfy the processing requirements. Manual grinding has low efficiency, high labor intensity and unstable processing quality, moreover, the polished surface is vulnerable to burn, and the surface precision and integrity are difficult to ensure. In order to further improve the profile accuracy and surface quality, a pneumatic flexible polishing force-exerting mechanism is designed and a dual-mode switching composite adaptive control(DSCAC) strategy is proposed, which combines Bang-Bang control and model reference adaptive control based on fuzzy neural network(MRACFNN) together. By the mode decision-making mechanism, Bang-Bang control is used to track the control command signal quickly when the actual polishing force is far away from the target value, and MRACFNN is utilized in smaller error ranges to improve the system robustness and control precision. Based on the mathematical model of the force-exerting mechanism, simulation analysis is implemented on DSCAC. Simulation results show that the output polishing force can better track the given signal. Finally, the blade polishing experiments are carried out on the designed polishing equipment. Experimental results show that DSCAC can effectively mitigate the influence of gas compressibility, valve dead-time effect, valve nonlinear flow, cylinder friction, measurement noise and other interference on the control precision of polishing force, which has high control precision, strong robustness, strong anti-interference ability and other advantages compared with MRACFNN. The proposed research achieves high-precision control of the polishing force, effectively improves the blade machining precision and surface consistency, and significantly reduces the surface roughness.
Active-passive hybrid piezoelectric actuators for high-precision hard disk drive servo systems
NASA Astrophysics Data System (ADS)
Chan, Kwong Wah; Liao, Wei-Hsin
2006-03-01
Positioning precision is crucial to today's increasingly high-speed, high-capacity, high data density, and miniaturized hard disk drives (HDDs). The demand for higher bandwidth servo systems that can quickly and precisely position the read/write head on a high track density becomes more pressing. Recently, the idea of applying dual-stage actuators to track servo systems has been studied. The push-pull piezoelectric actuated devices have been developed as micro actuators for fine and fast positioning, while the voice coil motor functions as a large but coarse seeking. However, the current dual-stage actuator design uses piezoelectric patches only without passive damping. In this paper, we propose a dual-stage servo system using enhanced active-passive hybrid piezoelectric actuators. The proposed actuators will improve the existing dual-stage actuators for higher precision and shock resistance, due to the incorporation of passive damping in the design. We aim to develop this hybrid servo system not only to increase speed of track seeking but also to improve precision of track following servos in HDDs. New piezoelectrically actuated suspensions with passive damping have been designed and fabricated. In order to evaluate positioning and track following performances for the dual-stage track servo systems, experimental efforts are carried out to implement the synthesized active-passive suspension structure with enhanced piezoelectric actuators using a composite nonlinear feedback controller.
Research on Precision Tracking on Fast Steering Mirror and Control Strategy
NASA Astrophysics Data System (ADS)
Di, Lin; Yi-ming, Wu; Fan, Zhu
2018-01-01
Fast steering mirror is a device used for controlling the beam direction precisely. Due to the short travel of the push-pull FSM, a compound fast steering mirror system driven by both limited-angle voice coil motor and push-pull FSM together is proposed. In the compound FSM system, limited-angle voice coil motor quickly swings at wide angle, while the push-pull FSM do high frequency movement in a small range, which provides the system with the high bandwidth and long travel. In the control strategy, the method of combining feed-forward control in Kalman filtering with auto-disturbance rejection control is used to improve trajectory tracking accuracy. The simulation result shows that tracking accuracy measured by the compound method can be improved by more than 5 times than that of the conventional PID.
Way, M J; Heong, K L
2009-10-01
The tropical fire ant Solenopsis geminata (Fabricius) often nests very abundantly in the earthen banks (bunds) around irrigated rice fields in the tropics. Where some farmers habitually drain fields to the mud for about 3-4 days, the ants can quickly spread up to about 20 m into the fields where they collect food, including pest prey such as the eggs and young of the apple snail Pomacea caniculata (Lamarck) and insects such as lepidopterous larvae and hoppers, notably Nilaparvata lugens (Stäl) the brown planthopper (Bph) and green leafhoppers Nephotettix spp. Even in drained fields, the activity of S. geminata is restricted by rainfall in the wet season. The relatively few ant workers that forage characteristically into drained fields and on to the transplanted clumps of rice plants (hills) kill the normally few immigrant Bph adults but are initially slower acting than other species of the natural enemy complex. However, larger populations of Bph are fiercely attacked and effectively controlled by rapidly recruited ant workers; whereas, in the absence of the ant, the other natural enemies are inadequate. In normal circumstances, there is no ant recruitment in response to initially small populations of immigrant Bph and no evidence of incompatibility between ant foragers and other natural enemies such as spiders. However, when many ants are quickly and aggressively recruited to attack large populations of Bph, they temporarily displace some spiders from infested hills. It is concluded that, in suitable weather conditions and even when insecticides kill natural enemies within the rice field, periodic drainage that enables S. geminata to join the predator complex is valuable for ant-based control of pests such as snails and Lepidoptera, and especially against relatively large populations of Bph. Drainage practices to benefit ants are fully compatible with recent research, which shows that periodic drainage combats problems of 'yield decline' in intensively irrigated tropical rice and is also needed in South East Asia to make better use of seriously declining water supplies for irrigation.
Design and control of a macro-micro robot for precise force applications
NASA Technical Reports Server (NTRS)
Wang, Yulun; Mangaser, Amante; Laby, Keith; Jordan, Steve; Wilson, Jeff
1993-01-01
Creating a robot which can delicately interact with its environment has been the goal of much research. Primarily two difficulties have made this goal hard to attain. The execution of control strategies which enable precise force manipulations are difficult to implement in real time because such algorithms have been too computationally complex for available controllers. Also, a robot mechanism which can quickly and precisely execute a force command is difficult to design. Actuation joints must be sufficiently stiff, frictionless, and lightweight so that desired torques can be accurately applied. This paper describes a robotic system which is capable of delicate manipulations. A modular high-performance multiprocessor control system was designed to provide sufficient compute power for executing advanced control methods. An 8 degree of freedom macro-micro mechanism was constructed to enable accurate tip forces. Control algorithms based on the impedance control method were derived, coded, and load balanced for maximum execution speed on the multiprocessor system. Delicate force tasks such as polishing, finishing, cleaning, and deburring, are the target applications of the robot.
Retrieving clinical evidence: a comparison of PubMed and Google Scholar for quick clinical searches.
Shariff, Salimah Z; Bejaimal, Shayna Ad; Sontrop, Jessica M; Iansavichus, Arthur V; Haynes, R Brian; Weir, Matthew A; Garg, Amit X
2013-08-15
Physicians frequently search PubMed for information to guide patient care. More recently, Google Scholar has gained popularity as another freely accessible bibliographic database. To compare the performance of searches in PubMed and Google Scholar. We surveyed nephrologists (kidney specialists) and provided each with a unique clinical question derived from 100 renal therapy systematic reviews. Each physician provided the search terms they would type into a bibliographic database to locate evidence to answer the clinical question. We executed each of these searches in PubMed and Google Scholar and compared results for the first 40 records retrieved (equivalent to 2 default search pages in PubMed). We evaluated the recall (proportion of relevant articles found) and precision (ratio of relevant to nonrelevant articles) of the searches performed in PubMed and Google Scholar. Primary studies included in the systematic reviews served as the reference standard for relevant articles. We further documented whether relevant articles were available as free full-texts. Compared with PubMed, the average search in Google Scholar retrieved twice as many relevant articles (PubMed: 11%; Google Scholar: 22%; P<.001). Precision was similar in both databases (PubMed: 6%; Google Scholar: 8%; P=.07). Google Scholar provided significantly greater access to free full-text publications (PubMed: 5%; Google Scholar: 14%; P<.001). For quick clinical searches, Google Scholar returns twice as many relevant articles as PubMed and provides greater access to free full-text articles.
Study of the Productivity and Surface Quality of Hybrid EDM
NASA Astrophysics Data System (ADS)
Wankhade, Sandeepkumar Haribhau; Sharma, Sunil Bansilal
2016-01-01
The development of new, advanced engineering materials and the need for precise prototypes and low-volume production have made the electric discharge machining (EDM), an important manufacturing process to meet such demands. It is capable of machining geometrically complex and hard material components, that are precise and difficult-to-machine such as heat treated tool steels, composites, super alloys, ceramics, carbides etc. Conversely the low MRR limits its productivity. Abrasive water jet machine (AJM) tools are quick to setup and offer quick turn-around on the machine and could make parts out of virtually any material. They do not heat the material hence no heat affected zone and can make any intricate shape easily. The main advantages are flexibility, low heat production and ability to machine hard and brittle materials. Main disadvantages comprise the process produces a tapered cut and health hazards due to dry abrasives. To overcome the limitations and exploit the best of each of above processes; an attempt has been made to hybridize the processes of AJM and EDM. The appropriate abrasives routed with compressed air through the hollow electrode to construct the hybrid process i.e., abrasive jet electric discharge machining (AJEDM), the high speed abrasives could impinge on the machined surface to remove the recast layer caused by EDM process. The main process parameters were varied to explore their effects and experimental results show that AJEDM enhances the machining efficiency with better surface finish hence can fit the requirements of modern manufacturing applications.
Baker, W; Marn, M; Zawada, C
2001-02-01
Companies generally have set prices on the Internet in two ways. Many start-ups have offered untenably low prices in a rush to capture first-mover advantage. Many incumbents have simply charged the same prices on-line as they do off-line. Either way, companies are missing a big opportunity. The fundamental value of the Internet lies not in lowering prices or making them consistent but in optimizing them. After all, if it's easy for customers to compare prices on the Internet, it's also easy for companies to track customers' behavior and adjust prices accordingly. The Net lets companies optimize prices in three ways. First, it lets them set and announce prices with greater precision. Different prices can be tested easily, and customers' responses can be collected instantly. Companies can set the most profitable prices, and they can tap into previously hidden customer demand. Second, because it's so easy to change prices on the Internet, companies can adjust prices in response to even small fluctuations in market conditions, customer demand, or competitors' behavior. Third, companies can use the clickstream data and purchase histories that it collects through the Internet to segment customers quickly. Then it can offer segment-specific prices or promotions immediately. By taking full advantage of the unique possibilities afforded by the Internet to set prices with precision, adapt to changing circumstances quickly, and segment customers accurately, companies can get their pricing right. It's one of the ultimate drivers of e-business success.
Beekman, Madeleine; Doyen, Laurent; Oldroyd, Benjamin P
2005-12-01
Honey bee foragers communicate the direction and distance of both food sources and new nest sites to nest mates by means of a symbolic dance language. Interestingly, the precision by which dancers transfer directional information is negatively correlated with the distance to the advertised food source. The 'tuned-error' hypothesis suggests that colonies benefit from this imprecision as it spreads recruits out over a patch of constant size irrespective of the distance to the advertised site. An alternative to the tuned-error hypothesis is that dancers are physically incapable of dancing with great precision for nearby sources. Here we revisit the tuned-error hypothesis by studying the change in dance precision with increasing foraging distance over relatively short distances while controlling for environmental influences. We show that bees indeed increase their dance precision with the increase in foraging distance. However, we also show that dance performed by swarm-scouts for a nearby (30 m) nest site, where there could be no benefit to imprecision, are either without or with only limited directional information. This result suggests that imprecision in dance communication is caused primarily by physical constraints in the ability of dancers to turn around quickly enough when the advertised site is nearby.
Desired Precision in Multi-Objective Optimization: Epsilon Archiving or Rounding Objectives?
NASA Astrophysics Data System (ADS)
Asadzadeh, M.; Sahraei, S.
2016-12-01
Multi-objective optimization (MO) aids in supporting the decision making process in water resources engineering and design problems. One of the main goals of solving a MO problem is to archive a set of solutions that is well-distributed across a wide range of all the design objectives. Modern MO algorithms use the epsilon dominance concept to define a mesh with pre-defined grid-cell size (often called epsilon) in the objective space and archive at most one solution at each grid-cell. Epsilon can be set to the desired precision level of each objective function to make sure that the difference between each pair of archived solutions is meaningful. This epsilon archiving process is computationally expensive in problems that have quick-to-evaluate objective functions. This research explores the applicability of a similar but computationally more efficient approach to respect the desired precision level of all objectives in the solution archiving process. In this alternative approach each objective function is rounded to the desired precision level before comparing any new solution to the set of archived solutions that already have rounded objective function values. This alternative solution archiving approach is compared to the epsilon archiving approach in terms of efficiency and quality of archived solutions for solving mathematical test problems and hydrologic model calibration problems.
A Dual Wedge Microneedle for sampling of perilymph solution via round window membrane
Watanabe, Hirobumi; Cardoso, Luis; Lalwani, Anil K.; Kysar, Jeffrey W.
2017-01-01
Objective Precision medicine for inner-ear disease is hampered by the absence of a methodology to sample inner-ear fluid atraumatically. The round window membrane (RWM) is an attractive portal for accessing cochlear fluids as it heals spontaneously. In this study, we report on the development of a microneedle for perilymph sampling that minimizes size of RWM perforation, facilitates quick aspiration, and provides precise volume control. Methods Considering the mechanical anisotropy of the RWM and hydrodynamics through a microneedle, a 31G stainless steel pipe was machined into wedge-shaped design via electrical discharge machining. Guinea pig RWM was penetrated in vitro, and 1 μ1 of perilymph was sampled and analyzed via UV-vis spectroscopy. Results The prototype wedge shaped needle created oval perforation with minor and major diameter of 143 and 344 μm (n=6). The sampling duration and standard deviation of aspirated volume were seconds and 6.8% respectively. The protein concentration was 1.74 mg/mL. Conclusion The prototype needle facilitated precise perforation of RWMs and rapid aspiration of cochlear fluid with precise volume control. The needle design is promising and requires testing in human cadaveric temporal bone and further optimization to become clinically viable. PMID:26888440
Selections from 2017: Image Processing with AstroImageJ
NASA Astrophysics Data System (ADS)
Kohler, Susanna
2017-12-01
Editors note:In these last two weeks of 2017, well be looking at a few selections that we havent yet discussed on AAS Nova from among the most-downloaded paperspublished in AAS journals this year. The usual posting schedule will resume in January.AstroImageJ: Image Processing and Photometric Extraction for Ultra-Precise Astronomical Light CurvesPublished January2017The AIJ image display. A wide range of astronomy specific image display options and image analysis tools are available from the menus, quick access icons, and interactive histogram. [Collins et al. 2017]Main takeaway:AstroImageJ is a new integrated software package presented in a publication led byKaren Collins(Vanderbilt University,Fisk University, andUniversity of Louisville). Itenables new users even at the level of undergraduate student, high school student, or amateur astronomer to quickly start processing, modeling, and plotting astronomical image data.Why its interesting:Science doesnt just happen the momenta telescope captures a picture of a distantobject. Instead, astronomical images must firstbe carefully processed to clean up thedata, and this data must then be systematically analyzed to learn about the objects within it. AstroImageJ as a GUI-driven, easily installed, public-domain tool is a uniquelyaccessible tool for thisprocessing and analysis, allowing even non-specialist users to explore and visualizeastronomical data.Some features ofAstroImageJ:(as reported by Astrobites)Image calibration:generate master flat, dark, and bias framesImage arithmetic:combineimages viasubtraction, addition, division, multiplication, etc.Stack editing:easily perform operations on a series of imagesImage stabilization and image alignment featuresPrecise coordinate converters:calculate Heliocentric and Barycentric Julian DatesWCS coordinates:determine precisely where atelescope was pointed for an image by PlateSolving using Astronomy.netMacro and plugin support:write your own macrosMulti-aperture photometry with interactive light curve fitting:plot light curves of a star in real timeCitationKaren A. Collins et al 2017 AJ 153 77. doi:10.3847/1538-3881/153/2/77
Combating fraud in health care: an essential component of any cost containment strategy.
Morris, Lewis
2009-01-01
Federal health care programs, including Medicare and Medicaid, are under attack by dishonest people who lie to the government and exploit its programs to steal taxpayers' money. The full extent of health care fraud cannot be measured precisely. However, the Federal Bureau of Investigation (FBI) estimates that fraudulent billings to public and private health care programs are 3-10 percent of total health spending, or $75-$250 billion in fiscal year 2009. Successful efforts to stop such abuses, without unduly burdening legitimate providers, require aggressive, innovative, and sustained attention to protect taxpayers and beneficiaries.
Maia-Silva, Camila; Hrncir, Michael; Koedam, Dirk; Machado, Renato Jose Pires; Imperatriz-Fonseca, Vera Lucia
2013-01-01
Between April and June of 2012 mantisflies (Plega hagenella) were found to be extensively parasitizing the nests of two groups of managed colonzies of eusocial stingless bees (Melipona subnitida) in the semi-arid region of northeastern Brazil. The mantisfly larvae developed inside closed brood cells of the bee comb, where each mantispid larva fed on the bee larva or pupa present in a single brood cell. Mature mantispid larvae pupated inside silken cocoons spun in place within their hosts' brood cells then emerged as pharate adults inside the bee colony. Pharate adults were never attacked and killed by host colony workers. Instead, colony workers picked up the pharates and removed them from the nest unharmed, treating them similar to the way that the general refuse is removed from the nest. Adult mantispids subsequently eclosed from their pupal exuviae outside the nest. Manipulative experiments showed that post-eclosion adult mantispids placed back within active bee colonies were quickly attacked and killed. These observations demonstrate that pharate and post-eclosion adults of P. hagenella are perceived differently by colony workers and that delayed adult eclosion is an important functional element in the parasitic life strategy of P. hagenella, allowing adults to escape without injury from the bee colonies they parasitize.
NASA Astrophysics Data System (ADS)
Maia-Silva, Camila; Hrncir, Michael; Koedam, Dirk; Machado, Renato Jose Pires; Imperatriz-Fonseca, Vera Lucia
2013-01-01
Between April and June of 2012 mantisflies ( Plega hagenella) were found to be extensively parasitizing the nests of two groups of managed colonzies of eusocial stingless bees ( Melipona subnitida) in the semi-arid region of northeastern Brazil. The mantisfly larvae developed inside closed brood cells of the bee comb, where each mantispid larva fed on the bee larva or pupa present in a single brood cell. Mature mantispid larvae pupated inside silken cocoons spun in place within their hosts' brood cells then emerged as pharate adults inside the bee colony. Pharate adults were never attacked and killed by host colony workers. Instead, colony workers picked up the pharates and removed them from the nest unharmed, treating them similar to the way that the general refuse is removed from the nest. Adult mantispids subsequently eclosed from their pupal exuviae outside the nest. Manipulative experiments showed that post-eclosion adult mantispids placed back within active bee colonies were quickly attacked and killed. These observations demonstrate that pharate and post-eclosion adults of P. hagenella are perceived differently by colony workers and that delayed adult eclosion is an important functional element in the parasitic life strategy of P. hagenella, allowing adults to escape without injury from the bee colonies they parasitize.
Inns, Thomas; Keenan, Alex; Huyton, Rita; Harris, John; Iturriza-Gomara, Miren; O'Brien, Sarah J; Vivancos, Roberto
2018-04-12
Data on outbreaks of infectious gastroenteritis in care homes have been collected using an internet-based surveillance system in North West England since 2012. We analysed the burden and characteristics of care home outbreaks to inform future public health decision-making. We described characteristics of care homes and summary measures of the outbreaks such as attack rate, duration and pathogen identified. The primary analysis outcome was duration of closure following an outbreak. We used negative binomial regression to estimate Incidence Rate Ratios (IRR) and confidence intervals (CI) for each explanatory variable. We recorded 795 outbreaks from 379 care homes (37.1 outbreaks per 100 care homes per year). In total 11,568 cases, 75 hospitalisations and 29 deaths were reported. Closure within three days of the first case (IRR = 0.442, 95%CI 0.366-0.534) was significantly associated with reduced duration of closure. The total size of the home (IRR = 1.426, 95%CI = 1.275-1.595) and the total attack rate (IRR = 1.434, 95%CI = 1.257-1.595) were significantly associated with increased duration of closure. Care homes that closed promptly had outbreaks of shorter duration. Care home providers, and those advising them on infection control, should aim to close homes quickly to prevent lengthy disruption to services.
Menendez, Anne Marie; Molloy, Janice; Magaldi, Maryann Corrigan
2006-10-01
Much attention has been focused on New York City firefighters and their responses to the traumatic events of the September 11, 2001, terrorist attacks on the World Trade Center, given their extensive involvement in rescue efforts, and the overwhelming loss of life among the fire department employees. It quickly became evident that the impact of this horrendous event had resonated deeply not only on the families and children of the firefighters who gave their lives, but also on those who had survived. The goal of this study was to conduct semi-structured focus groups of women whose firefighter husbands were directly involved in rescue efforts at Ground Zero. We hoped to identify patterns in survivors' responses to the events as well as any coping mechanisms that the participants used to manage their exposure to the tragedy. An analysis of transcripts from interviews reveals the nature and extent of the impact of the trauma on these women, their husbands, and their children. There were two recurring themes that were apparent from the interview data. Women used patterns of connectedness to other spouses to cope with the emotional impact of the event. In addition, participants reported a constant need to be vigilant in helping their families cope. Issues related to the family's physical, mental, and spiritual health in the context of nursing practice are discussed.
Results of an experiment to lead cranes on migration behind motorized ground vehicles
Ellis, D.H.; Clauss, B.; Watanabe, T.; Mykut, R.C.; Kinloch, M.; Ellis, Catherine H.; Urbanek, Richard P.; Stahlecker, Dale W.
1997-01-01
Ten greater sandhill cranes (Grus canadensis tabida), trained to enter and ride in a specially equipped truck, were transported at 80? days of age from their rearing site at Patuxent Wildlife Research Center (Patuxent), Maryland, to a reintroduction site located within the species? former breeding range in northern Arizona. After 5 additional weeks of training, these juvenile cranes were led south ca 600 km to a wintering area on the Arizona/Mexico border. Nine of the 10 survived the trek, 495 km of which was flown, although only a few cranes flew every stage of the route. Their longest flight was 77 km. Major problems during the migration were power line collisions (three, one fatal), eagle attacks (none fatal), and overheating (when air temperatures exceeded ca 25?C). All cranes that entered training quickly learned to follow the truck, and their tenacity when following under unfavorable conditions (e.g., poor light, extreme dust, or heat) showed that cranes could consistently be led over long distances. We cannot predict if the cranes will retrace their route unassisted when adults, but 2 cranes returned 130 km to the starting point of the migration after the flock was scattered by an eagle during our migration south. Three other cranes were recovered 55 km from the attack site and on course toward the starting point.
Strodl, Markus Andreas; Schausberger, Peter
2012-01-01
Background Social familiarity, which is based on the ability to recognise familiar conspecific individuals following prior association, may affect all major life activities of group-living animals such as foraging, reproduction and anti-predator behaviours. A scarcely experimentally tested explanation why social familiarity is beneficial for group-living animals is provided by limited attention theory. Limited attention theory postulates that focusing on a given task, such as inspection and assessment of unfamiliar group members, has cognitive and associated physiological and behavioural costs with respect to the attention paid to other tasks, such as anti-predator vigilance and response. Accordingly, we hypothesised that social familiarity enhances the anti-predator success of group-living predatory mites, Phytoseiulus persimilis, confronted with an intraguild predator, the predatory mite Amblyseius andersoni. Methodology/Principal Findings We videotaped and analysed the response of two P. persimilis larvae, held in familiar or unfamiliar pairs, to attacks by a gravid A. andersoni female, using the behavioural analyses software EthoVision Pro®. Familiar larvae were more frequently close together, reacted more quickly to predator attacks, survived more predator encounters and survived longer than unfamiliar larvae. Significance In line with the predictions of limited attention theory, we suggest that social familiarity improves anti-predator behaviours because it allows prey to shift attention to other tasks rather than group member assessment. PMID:22927997
Martín, Maria Cruz; del Rio, Beatriz; Martínez, Noelia; Magadán, Alfonso H; Alvarez, Miguel A
2008-12-01
One of the main microbiological problems of the dairy industry is the susceptibility of starter bacteria to virus infections. Lactobacillus delbrueckii, a component of thermophilic starter cultures used in the manufacture of several fermented dairy products, including yogurt, is also sensitive to bacteriophage attacks. To avoid the problems associated with these viruses, quick and sensitive detection methods are necessary. In the present study, a fast real-time quantitative polymerase chain reaction assay for the direct detection and quantification of L. delbrueckii phages in milk was developed. A set of primers and a TaqMan MGB probe was designed, based on the lysin gene sequence of different L. delbrueckii phages. The results show the proposed method to be a rapid (total processing time 30 min), specific and highly sensitive technique for detecting L. delbrueckii phages in milk.
Disturbance-mediated accelerated succession in two Michigan forest types
Abrams, Marc D.; Scott, Michael L.
1989-01-01
In northern lower Michigan, logging accelerated sugar maple (Acer saccharum) dominance in a northern white cedar (Thuja occidentals) community, and clear-cutting and burning quickly converted certain sites dominated by mature jack pine (Pinus banksiana) to early-succesional hardwoods, including Prunus, Populus, and Quercus. In both forest types the succeeding hardwoods should continue to increase in the future at the expense of the pioneer conifer species. In the cedar example, sugar maple was also increasing a an undisturbed, old-growth stand, but at a much reduced rate than in the logged stand. Traditionally, disturbance was through to set back succession to some earlier stage. However, out study sites and at least several other North American forest communities exhibited accelerated succession following a wide range of disturbances, including logging fire, ice storms, wind-throw, disease, insect attack, and herbicide spraying.
What boxing-related stimuli reveal about response behaviour.
Ottoboni, Giovanni; Russo, Gabriele; Tessari, Alessia
2015-01-01
When two athletes meet inside the ropes of the boxing ring to fight, their cognitive systems have to respond as quickly as possible to a manifold of stimuli to assure victory. In the present work, we studied the pre-attentive mechanisms, which form the basis of an athlete's ability in reacting to an opponent's punches. Expert boxers, beginner boxers and people with no experience of boxing performed a Simon-like task where they judged the colour of the boxing gloves worn by athletes in attack postures by pressing two lateralised keys. Although participants were not instructed to pay attention to the direction of the punches, beginner boxers' responses resembled a defence-related pattern, expert boxers' resembled counterattacks, whereas non-athletes' responses were not influenced by the unrelated task information. Results are discussed in the light of an expertise-related action simulation account.
[Narcolepsy in childhood and adolescence: symptoms, diagnosis, and therapy. A case report].
Gehrmann, Jochen; Siegler, Dominik; Ignacy, Evelin; Reimer, Inga
2017-03-01
Narcolepsy is a rare, multifactorial disease of the hypothalamus characterized by its leading symptoms of excessive daytime sleepiness and cataplexy. Sleep-EEG and a HLA-DR-genotype serve to secure the diagnosis. We report here on a 14-year-old girl suffering from anxieties, depression, school refusal, social withdrawal as well as very frequent attacks of sleep during the day and cataplexy. Currently, there is no approved drug for children and adolescents suffering from narcolepsy. Our patient benefited significantly and quickly from an off-label treatment with methylphenidate in combination with psychoeducation, cognitive behavioral therapy, and family therapy. Narcolepsy is a very rare but probably underestimated differential diagnosis applied to unclear daytime sleepiness, anxieties, or depression in childhood and adolescence. Both the key symptoms and the comorbid symptoms improve significantly under treatment with stimulants, albeit at a higher dosage.
A Security Audit Framework to Manage Information System Security
NASA Astrophysics Data System (ADS)
Pereira, Teresa; Santos, Henrique
The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.
Albert, Markus; Belastegui-Macadam, Xana; Kaldenhoff, Ralf
2006-11-01
Dodder or Cuscutaceae are holoparasitic plants subsisting on other dicotyledonous plants. The infection process is initiated by adherence of Cuscuta prehaustoria to the host surface, followed by penetration attempts by hyphae. In the case of a successful infection, these organs connect the parasite's vascular tissue to that of the host. Here we show that contact of Cuscuta reflexa prehaustoria to tomato induces the expression of a new arabinogalactan protein (AGP), attAGP, in the tomato precisely at the site of dodder attack. We show that attAGP is a plasma membrane-bound cell wall-localized protein. Using the RNAi technique and attAGP-targeted virus-induced gene silencing, we observed a correlation between attAGP expression level and force of attachment of the parasite to host tomatoes. If the expression level of attAGP was reduced, the C. reflexa attachment capability was significantly reduced, too. We conclude that C. reflexa infection induced a signal in the host leading to expression of tomato attAGP, which promotes the parasite's adherence.
Scaling and saturation laws for the expansion of concrete exposed to sulfate attack.
Monteiro, Paulo J M
2006-08-01
Reinforced concrete structures exposed to aggressive environments often require repair or retrofit even though they were designed to last >50 years. This statement is especially true for structures subjected to sulfate attack. It is critical that fundamental models of life prediction be developed for durability of concrete. Based on experimental results obtained over a 40-year period, scaling and saturation laws were formulated for concrete exposed to sulfate solution. These features have not been considered in current models used to predict life cycle of concrete exposed to aggressive environment. The mathematical analysis shows that porous concrete made with high and moderate water-to-cement ratios develops a definite scaling law after an initiation time. The scaling coefficient depends on the cement composition but does not depend on the original water-to-cement ratio. Dense concrete made with low water-to-cement ratios develops a cyclic saturation curve. An index for "potential of damage" is created to allow engineers to design concrete structures with better precision and cement chemists to develop portland cements with optimized composition.
Actuated forebody strake controls for the F-18 high alpha research vehicle
NASA Technical Reports Server (NTRS)
Murri, Daniel G.; Shah, Gautam H.; Dicarlo, Daniel J.; Trilling, Todd W.
1993-01-01
A series of ground-based studies have been conducted to develop actuated forebody strake controls for flight test evaluations using the NASA F-18 High-Alpha Research Vehicle. The actuated forebody strake concept has been designed to provide increased levels of yaw control at high angles of attack where conventional rudders become ineffective. Results are presented from tests conducted with the flight-test strake design, including static and dynamic wind-tunnel tests, transonic wind-tunnel tests, full-scale wind-tunnel tests, pressure surveys, and flow visualization tests. Results from these studies show that a pair of conformal actuated forebody strakes applied to the F-18 HARV can provide a powerful and precise yaw control device at high angles of attack. The preparations for flight testing are described, including the fabrication of flight hardware and the development of aircraft flight control laws. The primary objectives of the flight tests are to provide flight validation of the groundbased studies and to evaluate the use of this type of control to enhance fighter aircraft maneuverability.
Meloni, Gabriel N; Bertotti, Mauro
2017-01-01
A simple and cost effective alternative for fabricating custom Scanning Electron Microscope (SEM) sample holders using 3D printers and conductive polylactic acid filament is presented. The flexibility of the 3D printing process allowed for the fabrication of sample holders with specific features that enable the high-resolution imaging of nanoelectrodes and nanopipettes. The precise value of the inner semi cone angle of the nanopipettes taper was extracted from the acquired images and used for calculating their radius using electrochemical methods. Because of the low electrical resistivity presented by the 3D printed holder, the imaging of non-conductive nanomaterials, such as alumina powder, was found to be possible. The fabrication time for each sample holder was under 30 minutes and the average cost was less than $0.50 per piece. Despite being quick and economical to fabricate, the sample holders were found to be sufficiently resistant, allowing for multiple uses of the same holder.
Bertotti, Mauro
2017-01-01
A simple and cost effective alternative for fabricating custom Scanning Electron Microscope (SEM) sample holders using 3D printers and conductive polylactic acid filament is presented. The flexibility of the 3D printing process allowed for the fabrication of sample holders with specific features that enable the high-resolution imaging of nanoelectrodes and nanopipettes. The precise value of the inner semi cone angle of the nanopipettes taper was extracted from the acquired images and used for calculating their radius using electrochemical methods. Because of the low electrical resistivity presented by the 3D printed holder, the imaging of non-conductive nanomaterials, such as alumina powder, was found to be possible. The fabrication time for each sample holder was under 30 minutes and the average cost was less than $0.50 per piece. Despite being quick and economical to fabricate, the sample holders were found to be sufficiently resistant, allowing for multiple uses of the same holder. PMID:28753638
End-to-end system of license plate localization and recognition
NASA Astrophysics Data System (ADS)
Zhu, Siyu; Dianat, Sohail; Mestha, Lalit K.
2015-03-01
An end-to-end license plate recognition system is proposed. It is composed of preprocessing, detection, segmentation, and character recognition to find and recognize plates from camera-based still images. The system utilizes connected component (CC) properties to quickly extract the license plate region. A two-stage CC filtering is utilized to address both shape and spatial relationship information to produce high precision and to recall values for detection. Floating peak and valleys of projection profiles are used to cut the license plates into individual characters. A turning function-based method is proposed to quickly and accurately recognize each character. It is further accelerated using curvature histogram-based support vector machine. The INFTY dataset is used to train the recognition system, and MediaLab license plate dataset is used for testing. The proposed system achieved 89.45% F-measure for detection and 87.33% accuracy for overall recognition rate which is comparable to current state-of-the-art systems.
NASA Astrophysics Data System (ADS)
Li, Chun-Hao; Tsai, Ming-Jong
2009-06-01
A novel diode-pumped Nd:YAG laser system that employs a fixed active laser medium and a pair of quick-change output couplers on a precision linear stage for 1064 or 532 nm wavelength generation is presented. Fixed elements include a rear mirror, an acousto-optical Q-switch, and a diode-pumped solid-state laser (DPSSL). Movable elements for 1064 nm generation include an intra-cavity aperture as a mode selection element (MSE) and an output coupler. Movable elements for 532 nm generation include an intra-cavity frequency conversion with KTP, an intra-cavity aperture as a mode selection element (MSE), and an output coupler. Under stable operating conditions, the 1064 nm configuration produced a beam propagation ratio of 1.18 whereas the 532 nm configuration produced a beam propagation ratio of 1.1, both of which used an intra-cavity MSE with an aperture of 1.2 mm and a length of 5 mm.
Optical contrast for identifying the thickness of two-dimensional materials
NASA Astrophysics Data System (ADS)
Bing, Dan; Wang, Yingying; Bai, Jing; Du, Ruxia; Wu, Guoqing; Liu, Liyan
2018-01-01
One of the most intriguing properties of two-dimensional (2D) materials is their thickness dependent properties. A quick and precise technique to identify the layer number of 2D materials is therefore highly desirable. In this review, we will introduce the basic principle of using optical contrast to determine the thickness of 2D material and also its advantage as compared to other modern techniques. Different 2D materials, including graphene, graphene oxide, transitional metal dichalcogenides, black phosphorus, boron nitride, have been used as examples to demonstrate the capability of optical contrast methods. A simple and more efficient optical contrast image technique is also emphasized, which is suitable for quick and large-scale thickness identification. We have also discussed the factors that could affect the experimental results of optical contrast, including incident light angle, anisotropic nature of materials, and also the twisted angle between 2D layers. Finally, we give perspectives on future development of optical contrast methods for the study and application of 2D materials.
Shi, Longxiang; Li, Shijian; Yang, Xiaoran; Qi, Jiaheng; Pan, Gang; Zhou, Binbin
2017-01-01
With the explosion of healthcare information, there has been a tremendous amount of heterogeneous textual medical knowledge (TMK), which plays an essential role in healthcare information systems. Existing works for integrating and utilizing the TMK mainly focus on straightforward connections establishment and pay less attention to make computers interpret and retrieve knowledge correctly and quickly. In this paper, we explore a novel model to organize and integrate the TMK into conceptual graphs. We then employ a framework to automatically retrieve knowledge in knowledge graphs with a high precision. In order to perform reasonable inference on knowledge graphs, we propose a contextual inference pruning algorithm to achieve efficient chain inference. Our algorithm achieves a better inference result with precision and recall of 92% and 96%, respectively, which can avoid most of the meaningless inferences. In addition, we implement two prototypes and provide services, and the results show our approach is practical and effective.
Use of Uas for the Conservation of Historical Buildings in Case of Emergencies
NASA Astrophysics Data System (ADS)
Gagliolo, S.; Fagandini, R.; Federici, B.; Ferrando, I.; Passoni, D.; Pagliari, D.; Pinto, L.; Sguerso, D.
2017-05-01
The task of conservation and management of cultural heritage is quite central in Italy, which lists a high number of beautiful architectures. A quick and precise survey may be requested in case of calamity. In the present paper, the most commonly used survey techniques are discussed, focusing on their applications for the conservation of the artistic heritage in case of emergency. Particular attention is given to Unmanned Aerial Systems (UAS) photogrammetry and its potentiality in obtaining good results in terms of speed, cheapness, precision and accuracy, assuring at the same time the safety of the operators in critical situations (e.g. natural disasters). A case study, realized at the Castle of Casalbagliano (Alessandria, Italy), is discussed. Different image block configurations and acquisition geometries (nadiral and oblique images) have been exploited, with the aim of defining useful guidelines for emergencies UAS survey of partially collapsed structures. An application to a significative case study is introduced.
Yang, Xiaoran; Qi, Jiaheng; Pan, Gang; Zhou, Binbin
2017-01-01
With the explosion of healthcare information, there has been a tremendous amount of heterogeneous textual medical knowledge (TMK), which plays an essential role in healthcare information systems. Existing works for integrating and utilizing the TMK mainly focus on straightforward connections establishment and pay less attention to make computers interpret and retrieve knowledge correctly and quickly. In this paper, we explore a novel model to organize and integrate the TMK into conceptual graphs. We then employ a framework to automatically retrieve knowledge in knowledge graphs with a high precision. In order to perform reasonable inference on knowledge graphs, we propose a contextual inference pruning algorithm to achieve efficient chain inference. Our algorithm achieves a better inference result with precision and recall of 92% and 96%, respectively, which can avoid most of the meaningless inferences. In addition, we implement two prototypes and provide services, and the results show our approach is practical and effective. PMID:28299322
Urban forest topographical mapping using UAV LIDAR
NASA Astrophysics Data System (ADS)
Putut Ash Shidiq, Iqbal; Wibowo, Adi; Kusratmoko, Eko; Indratmoko, Satria; Ardhianto, Ronni; Prasetyo Nugroho, Budi
2017-12-01
Topographical data is highly needed by many parties, such as government institution, mining companies and agricultural sectors. It is not just about the precision, the acquisition time and data processing are also carefully considered. In relation with forest management, a high accuracy topographic map is necessary for planning, close monitoring and evaluating forest changes. One of the solution to quickly and precisely mapped topography is using remote sensing system. In this study, we test high-resolution data using Light Detection and Ranging (LiDAR) collected from unmanned aerial vehicles (UAV) to map topography and differentiate vegetation classes based on height in urban forest area of University of Indonesia (UI). The semi-automatic and manual classifications were applied to divide point clouds into two main classes, namely ground and vegetation. There were 15,806,380 point clouds obtained during the post-process, in which 2.39% of it were detected as ground.
Digital detection of endonuclease mediated gene disruption in the HIV provirus
Sedlak, Ruth Hall; Liang, Shu; Niyonzima, Nixon; De Silva Feelixge, Harshana S.; Roychoudhury, Pavitra; Greninger, Alexander L.; Weber, Nicholas D.; Boissel, Sandrine; Scharenberg, Andrew M.; Cheng, Anqi; Magaret, Amalia; Bumgarner, Roger; Stone, Daniel; Jerome, Keith R.
2016-01-01
Genome editing by designer nucleases is a rapidly evolving technology utilized in a highly diverse set of research fields. Among all fields, the T7 endonuclease mismatch cleavage assay, or Surveyor assay, is the most commonly used tool to assess genomic editing by designer nucleases. This assay, while relatively easy to perform, provides only a semi-quantitative measure of mutation efficiency that lacks sensitivity and accuracy. We demonstrate a simple droplet digital PCR assay that quickly quantitates a range of indel mutations with detection as low as 0.02% mutant in a wild type background and precision (≤6%CV) and accuracy superior to either mismatch cleavage assay or clonal sequencing when compared to next-generation sequencing. The precision and simplicity of this assay will facilitate comparison of gene editing approaches and their optimization, accelerating progress in this rapidly-moving field. PMID:26829887
NASA Astrophysics Data System (ADS)
Hu, Xiaoqian; Tao, Jinxu; Ye, Zhongfu; Qiu, Bensheng; Xu, Jinzhang
2018-05-01
In order to solve the problem of medical image segmentation, a wavelet neural network medical image segmentation algorithm based on combined maximum entropy criterion is proposed. Firstly, we use bee colony algorithm to optimize the network parameters of wavelet neural network, get the parameters of network structure, initial weights and threshold values, and so on, we can quickly converge to higher precision when training, and avoid to falling into relative extremum; then the optimal number of iterations is obtained by calculating the maximum entropy of the segmented image, so as to achieve the automatic and accurate segmentation effect. Medical image segmentation experiments show that the proposed algorithm can reduce sample training time effectively and improve convergence precision, and segmentation effect is more accurate and effective than traditional BP neural network (back propagation neural network : a multilayer feed forward neural network which trained according to the error backward propagation algorithm.
CRISPR/Cas9 Editing of the Bacillus subtilis Genome
Burby, Peter E.; Simmons, Lyle A.
2017-01-01
A fundamental procedure for most modern biologists is the genetic manipulation of the organism under study. Although many different methods for editing bacterial genomes have been used in laboratories for decades, the adaptation of CRISPR/Cas9 technology to bacterial genetics has allowed researchers to manipulate bacterial genomes with unparalleled facility. CRISPR/Cas9 has allowed for genome edits to be more precise, while also increasing the efficiency of transferring mutations into a variety of genetic backgrounds. As a result, the advantages are realized in tractable organisms and organisms that have been refractory to genetic manipulation. Here, we describe our method for editing the genome of the bacterium Bacillus subtilis. Our method is highly efficient, resulting in precise, markerless mutations. Further, after generating the editing plasmid, the mutation can be quickly introduced into several genetic backgrounds, greatly increasing the speed with which genetic analyses may be performed. PMID:28706963
A new type industrial total station based on target automatic collimation
NASA Astrophysics Data System (ADS)
Lao, Dabao; Zhou, Weihu; Ji, Rongyi; Dong, Dengfeng; Xiong, Zhi; Wei, Jiang
2018-01-01
In the case of industrial field measurement, the present measuring instruments work with manual operation and collimation, which give rise to low efficiency for field measurement. In order to solve the problem, a new type industrial total station is presented in this paper. The new instrument can identify and trace cooperative target automatically, in the mean time, coordinate of the target is measured in real time. For realizing the system, key technology including high precision absolutely distance measurement, small high accuracy angle measurement, target automatic collimation with vision, and quick precise controlling should be worked out. After customized system assemblage and adjustment, the new type industrial total station will be established. As the experiments demonstrated, the coordinate accuracy of the instrument is under 15ppm in the distance of 60m, which proved that the measuring system is feasible. The result showed that the total station can satisfy most industrial field measurement requirements.
Walker, Simon M.; Thomas, Adrian L. R.; Taylor, Graham K.
2009-01-01
Here, we present a detailed analysis of the wing kinematics and wing deformations of desert locusts (Schistocerca gregaria, Forskål) flying tethered in a wind tunnel. We filmed them using four high-speed digital video cameras, and used photogrammetry to reconstruct the motion of more than 100 identified points. Whereas the hindwing motions were highly stereotyped, the forewing motions showed considerable variation, consistent with a role in flight control. Both wings were positively cambered on the downstroke. The hindwing was cambered through an ‘umbrella effect’ whereby the trailing edge tension compressed the radial veins during the downstroke. Hindwing camber was reversed on the upstroke as the wing fan corrugated, reducing the projected area by 30 per cent, and releasing the tension in the trailing edge. Both the wings were strongly twisted from the root to the tip. The linear decrease in incidence along the hindwing on the downstroke precisely counteracts the linear increase in the angle of attack that would otherwise occur in root flapping for an untwisted wing. The consequent near-constant angle of attack is reminiscent of the optimum for a propeller of constant aerofoil section, wherein a linear twist distribution allows each section to operate at the unique angle of attack maximizing the lift to drag ratio. This implies tuning of the structural, morphological and kinematic parameters of the hindwing for efficient aerodynamic force production. PMID:19091683
Empirical forecast of the quiet time Ionosphere over Europe: a comparative model investigation
NASA Astrophysics Data System (ADS)
Badeke, R.; Borries, C.; Hoque, M. M.; Minkwitz, D.
2016-12-01
The purpose of this work is to find the best empirical model for a reliable 24 hour forecast of the ionospheric Total Electron Content (TEC) over Europe under geomagnetically quiet conditions. It will be used as an improved reference for the description of storm-induced perturbations in the ionosphere. The observational TEC-data were obtained from the International GNSS Service (IGS). Four different forecast model approaches were validated with observational IGS TEC-data: a 27 day median model (27d), a Fourier Analysis (FA) approach, the Neustrelitz TEC global model (NTCM-GL) and NeQuick 2. Two years were investigated depending on the solar activity: 2015 (high activity) and 2008 (low avtivity) The time periods of magnetic storms, which were identified with the Dst index, were excluded from the validation. For both years the two models 27d and FA show better results than NTCM-GL and NeQuick 2. For example for the year 2015 and 15° E / 50° N the difference between the IGS data and the predicted 27d model shows a mean value of 0.413 TEC units (TECU), a standard deviation of 3.307 TECU and a correlation coefficient of 0.921, while NTCM-GL and NeQuick 2 have mean differences of around 2-3 TECU, standard deviations of 4.5-5 TECU and correlation coefficients below 0.85. Since 27d and FA predictions strongly depend on observational data, the results confirm that data driven forecasts perform better than the climatological models NTCM-GL and NeQuick 2. However, the benefits of NTCM-GL and NeQuick 2 are actually the lower data dependency, i.e. they do not lack on precision when observational IGS TEC data are unavailable. Hence a combination of the different models is recommended reacting accordingly to the different data availabilities.
QUICK - AN INTERACTIVE SOFTWARE ENVIRONMENT FOR ENGINEERING DESIGN
NASA Technical Reports Server (NTRS)
Schlaifer, R. S.
1994-01-01
QUICK provides the computer user with the facilities of a sophisticated desk calculator which can perform scalar, vector and matrix arithmetic, propagate conic orbits, determine planetary and satellite coordinates and perform other related astrodynamic calculations within a Fortran-like environment. QUICK is an interpreter, therefore eliminating the need to use a compiler or a linker to run QUICK code. QUICK capabilities include options for automated printing of results, the ability to submit operating system commands on some systems, and access to a plotting package (MASL)and a text editor without leaving QUICK. Mathematical and programming features of QUICK include the ability to handle arbitrary algebraic expressions, the capability to define user functions in terms of other functions, built-in constants such as pi, direct access to useful COMMON areas, matrix capabilities, extensive use of double precision calculations, and the ability to automatically load user functions from a standard library. The MASL (The Multi-mission Analysis Software Library) plotting package, included in the QUICK package, is a set of FORTRAN 77 compatible subroutines designed to facilitate the plotting of engineering data by allowing programmers to write plotting device independent applications. Its universality lies in the number of plotting devices it puts at the user's disposal. The MASL package of routines has proved very useful and easy to work with, yielding good plots for most new users on the first or second try. The functions provided include routines for creating histograms, "wire mesh" surface plots and contour plots as well as normal graphs with a large variety of axis types. The library has routines for plotting on cartesian, polar, log, mercator, cyclic, calendar, and stereographic axes, and for performing automatic or explicit scaling. The lengths of the axes of a plot are completely under the control of the program using the library. Programs written to use the MASL subroutines can be made to output to the Calcomp 1055 plotter, the Hewlett-Packard 2648 graphics terminal, the HP 7221, 7475 and 7550 pen plotters, the Tektronix 40xx and 41xx series graphics terminals, the DEC VT125/VT240 graphics terminals, the QMS 800 laser printer, the Sun Microsystems monochrome display, the Ridge Computers monochrome display, the IBM/PC color display, or a "dumb" terminal or printer. Programs using this library can be written so that they always use the same type of plotter or they can allow the choice of plotter type to be deferred until after program execution. QUICK is written in RATFOR for use on Sun4 series computers running SunOS. No source code is provided. The standard distribution medium for this program is a .25 inch streaming magnetic tape cartridge in UNIX tar format. An electronic copy of the documentation in ASCII format is included on the distribution medium. QUICK was developed in 1991 and is a copyrighted work with all copyright vested in NASA.
Pre-Test Assessment of the Upper Bound of the Drag Coefficient Repeatability of a Wind Tunnel Model
NASA Technical Reports Server (NTRS)
Ulbrich, N.; L'Esperance, A.
2017-01-01
A new method is presented that computes a pre{test estimate of the upper bound of the drag coefficient repeatability of a wind tunnel model. This upper bound is a conservative estimate of the precision error of the drag coefficient. For clarity, precision error contributions associated with the measurement of the dynamic pressure are analyzed separately from those that are associated with the measurement of the aerodynamic loads. The upper bound is computed by using information about the model, the tunnel conditions, and the balance in combination with an estimate of the expected output variations as input. The model information consists of the reference area and an assumed angle of attack. The tunnel conditions are described by the Mach number and the total pressure or unit Reynolds number. The balance inputs are the partial derivatives of the axial and normal force with respect to all balance outputs. Finally, an empirical output variation of 1.0 microV/V is used to relate both random instrumentation and angle measurement errors to the precision error of the drag coefficient. Results of the analysis are reported by plotting the upper bound of the precision error versus the tunnel conditions. The analysis shows that the influence of the dynamic pressure measurement error on the precision error of the drag coefficient is often small when compared with the influence of errors that are associated with the load measurements. Consequently, the sensitivities of the axial and normal force gages of the balance have a significant influence on the overall magnitude of the drag coefficient's precision error. Therefore, results of the error analysis can be used for balance selection purposes as the drag prediction characteristics of balances of similar size and capacities can objectively be compared. Data from two wind tunnel models and three balances are used to illustrate the assessment of the precision error of the drag coefficient.
In vivo precision of conventional and digital methods for obtaining quadrant dental impressions.
Ender, Andreas; Zimmermann, Moritz; Attin, Thomas; Mehl, Albert
2016-09-01
Quadrant impressions are commonly used as alternative to full-arch impressions. Digital impression systems provide the ability to take these impressions very quickly; however, few studies have investigated the accuracy of the technique in vivo. The aim of this study is to assess the precision of digital quadrant impressions in vivo in comparison to conventional impression techniques. Impressions were obtained via two conventional (metal full-arch tray, CI, and triple tray, T-Tray) and seven digital impression systems (Lava True Definition Scanner, T-Def; Lava Chairside Oral Scanner, COS; Cadent iTero, ITE; 3Shape Trios, TRI; 3Shape Trios Color, TRC; CEREC Bluecam, Software 4.0, BC4.0; CEREC Bluecam, Software 4.2, BC4.2; and CEREC Omnicam, OC). Impressions were taken three times for each of five subjects (n = 15). The impressions were then superimposed within the test groups. Differences from model surfaces were measured using a normal surface distance method. Precision was calculated using the Perc90_10 value. The values for all test groups were statistically compared. The precision ranged from 18.8 (CI) to 58.5 μm (T-Tray), with the highest precision in the CI, T-Def, BC4.0, TRC, and TRI groups. The deviation pattern varied distinctly depending on the impression method. Impression systems with single-shot capture exhibited greater deviations at the tooth surface whereas high-frame rate impression systems differed more in gingival areas. Triple tray impressions displayed higher local deviation at the occlusal contact areas of upper and lower jaw. Digital quadrant impression methods achieve a level of precision, comparable to conventional impression techniques. However, there are significant differences in terms of absolute values and deviation pattern. With all tested digital impression systems, time efficient capturing of quadrant impressions is possible. The clinical precision of digital quadrant impression models is sufficient to cover a broad variety of restorative indications. Yet the precision differs significantly between the digital impression systems.
Cheeranont, Piyapan
2009-02-01
Bombing attacks by terrorists in the three most southern provinces of Thailand increased both in frequency and intensity from the year 2004 until now. Patterns of bombing were not only destroying buildings or killing targets victims by dropping bombs under roads and in public places but also harming scene investigators by dropping second bombs nearby. Emergency medical personnel working there also had some risks from these second bombs while helping victims at the scene. The purposes of the present study aimed to describe patterns and risks of bombing attacks, analyze locations of wounds of bombing casualties and propose a standing operation procedure for emergency medical technicians (EMTs) in helping victims at scenes to reduce harm from second bombs. The authors gathered some information about patterns of bombing from the Forward 4th Army Area Explosive Ordnance Disposal (EOD) team and reviewed insurgency related casualty reports from Yala, Pattani and Narathivasrajanakarin Hospital from January 2004 to December 2006. From these reports, data of deep wounds or wounds that caused serious injuries or deaths of 144 improvised explosive devices (IED) victims was collected and separated into fatal (45 casualties) and nonfatal groups (99 casualties). In each group, casualties' demographic data and number of casualties separated by locations of wounds and occupations are shown and compared by percentage of the total number of each group and was found that most of fatal casualties had wounds on head (42.22%), chest (33.33%) and abdomen (33.33%) that should be protected by wearing helmets and body armors. But there was a higher proportion of extremity injuries in non-fatal casualties (63.64%). Thus, the authors proposed measures for EMTs in helping victims at scenes to reduce their risks by wearing helmets and body armors and quickly removal of the injured with minimal medical intervention.
Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Paul, Nathanael R; Shue, Craig; Taylor, Curtis
While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless localmore » area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.« less
Retrieving Clinical Evidence: A Comparison of PubMed and Google Scholar for Quick Clinical Searches
Bejaimal, Shayna AD; Sontrop, Jessica M; Iansavichus, Arthur V; Haynes, R Brian; Weir, Matthew A; Garg, Amit X
2013-01-01
Background Physicians frequently search PubMed for information to guide patient care. More recently, Google Scholar has gained popularity as another freely accessible bibliographic database. Objective To compare the performance of searches in PubMed and Google Scholar. Methods We surveyed nephrologists (kidney specialists) and provided each with a unique clinical question derived from 100 renal therapy systematic reviews. Each physician provided the search terms they would type into a bibliographic database to locate evidence to answer the clinical question. We executed each of these searches in PubMed and Google Scholar and compared results for the first 40 records retrieved (equivalent to 2 default search pages in PubMed). We evaluated the recall (proportion of relevant articles found) and precision (ratio of relevant to nonrelevant articles) of the searches performed in PubMed and Google Scholar. Primary studies included in the systematic reviews served as the reference standard for relevant articles. We further documented whether relevant articles were available as free full-texts. Results Compared with PubMed, the average search in Google Scholar retrieved twice as many relevant articles (PubMed: 11%; Google Scholar: 22%; P<.001). Precision was similar in both databases (PubMed: 6%; Google Scholar: 8%; P=.07). Google Scholar provided significantly greater access to free full-text publications (PubMed: 5%; Google Scholar: 14%; P<.001). Conclusions For quick clinical searches, Google Scholar returns twice as many relevant articles as PubMed and provides greater access to free full-text articles. PMID:23948488
Increased Amplitude of Thalamocortical Low-Frequency Oscillations in Patients with Migraine
Wilcox, Sophie L.; Veggeberg, Rosanna; Noseda, Rodrigo; Burstein, Rami; Borsook, David; Becerra, Lino
2016-01-01
For many years, neurobiological theories have emphasized the importance of neuronal oscillations in the emergence of brain function. At the same time, clinical studies have shown that disturbances or irregularities in brain rhythms may relate to various common neurological conditions, including migraine. Increasing evidence suggests that the CNS plays a fundamental role in the predisposition to develop different forms of headache. Here, we present human imaging data that strongly support the presence of abnormal low-frequency oscillations (LFOs) in thalamocortical networks of patients in the interictal phase of migraine. Our results show that the main source of arrhythmic activity was localized to the higher-order thalamic relays of the medial dorsal nucleus. In addition, spontaneous LFOs in the thalamus were selectively associated with the headache attack frequency, meaning that the varying amplitude of dysrhythmia could predispose patients to recurrent attacks. Rhythmic cortical feedback to the thalamus is a major factor in the amplification of thalamocortical oscillations, making it a strong candidate for influencing neuronal excitability. We further speculate that the intrinsic dynamics of thalamocortical network oscillations are crucial for early sensory processing and therefore could underlie important pathophysiological processes involved in multisensory integration. SIGNIFICANCE STATEMENT In many cases, migraine attacks are thought to begin centrally. A major obstacle to studying intrinsic brain activity has been the identification of the precise anatomical structures and functional networks that are involved in migraine. Here, we present imaging data that strongly support the presence of abnormal low-frequency oscillations in thalamocortical networks of patients in the interictal phase of migraine. This arrhythmic activity was localized to the higher-order thalamic relays of the medial dorsal nucleus and was selectively associated with headache attack frequency. Rhythmic cortical feedback to the thalamus is a major factor in the amplification of thalamocortical oscillations, making it a strong candidate for influencing neuronal excitability and higher-level processes involved in multisensory integration. PMID:27466345
NASA Astrophysics Data System (ADS)
Ferrando, N.; Gosálvez, M. A.; Cerdá, J.; Gadea, R.; Sato, K.
2011-02-01
The current success of the continuous cellular automata for the simulation of anisotropic wet chemical etching of silicon in microengineering applications is based on a relatively fast, approximate, constant time stepping implementation (CTS), whose accuracy against the exact algorithm—a computationally slow, variable time stepping implementation (VTS)—has not been previously analyzed in detail. In this study we show that the CTS implementation can generate moderately wrong etch rates and overall etching fronts, thus justifying the presentation of a novel, exact reformulation of the VTS implementation based on a new state variable, referred to as the predicted removal time (PRT), and the use of a self-balanced binary search tree that enables storage and efficient access to the PRT values in each time step in order to quickly remove the corresponding surface atom/s. The proposed PRT method reduces the simulation cost of the exact implementation from {O}(N^{5/3}) to {O}(N^{3/2} log N) without introducing any model simplifications. This enables more precise simulations (only limited by numerical precision errors) with affordable computational times that are similar to the less precise CTS implementation and even faster for low reactivity systems.
An integrated clinical and genomic information system for cancer precision medicine.
Jang, Yeongjun; Choi, Taekjin; Kim, Jongho; Park, Jisub; Seo, Jihae; Kim, Sangok; Kwon, Yeajee; Lee, Seungjae; Lee, Sanghyuk
2018-04-20
Increasing affordability of next-generation sequencing (NGS) has created an opportunity for realizing genomically-informed personalized cancer therapy as a path to precision oncology. However, the complex nature of genomic information presents a huge challenge for clinicians in interpreting the patient's genomic alterations and selecting the optimum approved or investigational therapy. An elaborate and practical information system is urgently needed to support clinical decision as well as to test clinical hypotheses quickly. Here, we present an integrated clinical and genomic information system (CGIS) based on NGS data analyses. Major components include modules for handling clinical data, NGS data processing, variant annotation and prioritization, drug-target-pathway analysis, and population cohort explorer. We built a comprehensive knowledgebase of genes, variants, drugs by collecting annotated information from public and in-house resources. Structured reports for molecular pathology are generated using standardized terminology in order to help clinicians interpret genomic variants and utilize them for targeted cancer therapy. We also implemented many features useful for testing hypotheses to develop prognostic markers from mutation and gene expression data. Our CGIS software is an attempt to provide useful information for both clinicians and scientists who want to explore genomic information for precision oncology.
Microsurgery robots: addressing the needs of high-precision surgical interventions.
Mattos, Leonardo S; Caldwell, Darwin G; Peretti, Giorgio; Mora, Francesco; Guastini, Luca; Cingolani, Roberto
2016-01-01
Robotics has a significant potential to enhance the overall capacity and efficiency of healthcare systems. Robots can help surgeons perform better quality operations, leading to reductions in the hospitalisation time of patients and in the impact of surgery on their postoperative quality of life. In particular, robotics can have a significant impact on microsurgery, which presents stringent requirements for superhuman precision and control of the surgical tools. Microsurgery is, in fact, expected to gain importance in a growing range of surgical specialties as novel technologies progressively enable the detection, diagnosis and treatment of diseases at earlier stages. Within such scenarios, robotic microsurgery emerges as one of the key components of future surgical interventions, and will be a vital technology for addressing major surgical challenges. Nonetheless, several issues have yet to be overcome in terms of mechatronics, perception and surgeon-robot interfaces before microsurgical robots can achieve their full potential in operating rooms. Research in this direction is progressing quickly and microsurgery robot prototypes are gradually demonstrating significant clinical benefits in challenging applications such as reconstructive plastic surgery, ophthalmology, otology and laryngology. These are reassuring results offering confidence in a brighter future for high-precision surgical interventions.
Rower, Joseph E.; Bushman, Lane R.; Hammond, Kyle P.; Kadam, Rajendra S.; Aquilante, Christina L.
2011-01-01
Gemfibrozil, a fibric acid hypolipidemic agent, is increasingly being used in clinical drug-drug interaction studies as an inhibitor of drug metabolizing enzymes and drug transporters. The validation of a fast, accurate, and precise LC/MS method is described for the quantitative determination of gemfibrozil in an EDTA-anticoagulated human plasma matrix. Briefly, gemfibrozil was extracted from human plasma by an acetonitrile protein precipitation method. The assay was reproducible with intra-assay precision between 1.6% and 10.7%, and inter-assay precision ranging from 4.4% to 7.8%. The assay also showed good accuracy, with intra-assay concentrations within 85.6% and 108.7% of the expected value, and inter-assay concentrations within 89.4 to 104.0% of the expected value. The linear concentration range was between 0.5 and 50 μg/mL with a lower limit of quantitation of 0.5 μg/mL when 125 μL of plasma were extracted. This LC/MS method yielded a quick, simple, and reliable protocol for determining gemfibrozil concentrations in plasma and is applicable to clinical pharmacokinetic studies. PMID:21077249
Rower, Joseph E; Bushman, Lane R; Hammond, Kyle P; Kadam, Rajendra S; Aquilante, Christina L
2010-12-01
Gemfibrozil, a fibric acid hypolipidemic agent, is increasingly being used in clinical drug-drug interaction studies as an inhibitor of drug metabolizing enzymes and drug transporters. The validation of a fast, accurate and precise LC/MS method is described for the quantitative determination of gemfibrozil in an EDTA-anticoagulated human plasma matrix. Briefly, gemfibrozil was extracted from human plasma by an acetonitrile protein precipitation method. The assay was reproducible with intra-assay precision between 1.6 and 10.7%, and inter-assay precision ranging from 4.4 to 7.8%. The assay also showed good accuracy, with intra-assay concentrations within 85.6-108.7% of the expected value, and inter-assay concentrations within 89.4-104.0% of the expected value. The linear concentration range was between 0.5 and 50 µg/mL with a lower limit of quantitation of 0.5 µg/mL when 125 µL of plasma were extracted. This LC/MS method yielded a quick, simple and reliable protocol for determining gemfibrozil concentrations in plasma and is applicable to clinical pharmacokinetic studies. Copyright © 2010 John Wiley & Sons, Ltd.
Watstein, Daniel M; McNerney, Monica P; Styczynski, Mark P
2015-09-01
Micronutrient deficiencies, including zinc deficiency, are responsible for hundreds of thousands of deaths annually. A key obstacle to allocating scarce treatment resources is the ability to measure population blood micronutrient status inexpensively and quickly enough to identify those who most need treatment. This paper develops a metabolically engineered strain of Escherichia coli to produce different colored pigments (violacein, lycopene, and β-carotene) in response to different extracellular zinc levels, for eventual use in an inexpensive blood zinc diagnostic test. However, obtaining discrete color states in the carotenoid pathway required precise engineering of metabolism to prevent reaction at low zinc concentrations but allow complete reaction at higher concentrations, and all under the constraints of natural regulator limitations. Hence, the metabolic engineering challenge was not to improve titer, but to enable precise control of pathway state. A combination of gene dosage, post-transcriptional, and post-translational regulation was necessary to allow visible color change over physiologically relevant ranges representing a small fraction of the regulator's dynamic response range, with further tuning possible by modulation of precursor availability. As metabolic engineering expands its applications and develops more complex systems, tight control of system components will likely become increasingly necessary, and the approach presented here can be generalized to other natural sensing systems for precise control of pathway state. Copyright © 2015 International Metabolic Engineering Society. Published by Elsevier Inc. All rights reserved.
X-33 (Rev-F) Aeroheating Results of Test 6770 in NASA Langley 20-Inch Mach 6 Air Tunnel
NASA Technical Reports Server (NTRS)
Berry, Scott A.; Horvath, Thomas J.; Kowalkowski, Matthew K.; Liechty, Derek S.
1999-01-01
Aeroheating characteristics of the X-33 Rev-F configuration have been experimentally examined in the Langley 20-Inch Mach 6 Air Tunnel (Test 6770). Global surface heat transfer distributions, surface streamline patterns, and shock shapes were measured on a 0.013-scale model at Mach 6 in air. Parametric variations include angles-of-attack of 20-deg, 30-deg, and 40-deg; Reynolds numbers based on model length of 0.9 to 4.9 million; and body-flap deflections of 10-deg and 20-deg. The effects of discrete roughness elements on boundary layer transition, which included trip height, size, and location, both on and off the windward centerline, were investigated. This document is intended to serve as a quick release of preliminary data to the X-33 program; analysis is limited to observations of the experimental trends in order to expedite dissemination.
New designs for portable Raman instrumentation in defense applications
NASA Astrophysics Data System (ADS)
Carron, Keith; Ray, Bryan; Buller, Shane; Strickland, Aaron
2016-05-01
The realization of global terrorism after the September 11 attacks led immediately to a need for rapid field analysis of materials. Colorimetric test kits existed, but they are very subjective to interpret and they require contact with the sample. A push for handheld spectrometers quickly led to FTIR systems with ATR sampling, handheld IMS systems, and handheld Raman spectrometers. No single technique solves all of the problems of field detection. We will discuss the development of Raman instrumentation and, in particular, cover the advantages and the problems that are inherent in Raman portability. Portable Raman instrumentation began with a limited number of accessories: a point-and-shoot and some sort of vial adaptor. Currently this has expanded to stand-off attachments for measurements at a distance, air sampling to look for toxic gasses or aerosols, Orbital Raster Scan (ORS) to spatially average over samples, SERS attachments for trace detection, and fiber optic probes.
Lin, Chao; Shen, Xueju; Wang, Zhisong; Zhao, Cheng
2014-06-20
We demonstrate a novel optical asymmetric cryptosystem based on the principle of elliptical polarized light linear truncation and a numerical reconstruction technique. The device of an array of linear polarizers is introduced to achieve linear truncation on the spatially resolved elliptical polarization distribution during image encryption. This encoding process can be characterized as confusion-based optical cryptography that involves no Fourier lens and diffusion operation. Based on the Jones matrix formalism, the intensity transmittance for this truncation is deduced to perform elliptical polarized light reconstruction based on two intensity measurements. Use of a quick response code makes the proposed cryptosystem practical, with versatile key sensitivity and fault tolerance. Both simulation and preliminary experimental results that support theoretical analysis are presented. An analysis of the resistance of the proposed method on a known public key attack is also provided.
Hatta, Kotaro; Kitajima, Akiyoshi; Ito, Masanobu; Usui, Chie; Arai, Heii
2007-03-01
A 68-year-old man was scheduled to receive 8 treatments of electroconvulsive therapy (ECT) for severe depression. He was being treated for long-standing asthma with a beta2 stimulant, clenbuterol hydrochloride, and had experienced no asthma attack for 9 years. Although he experienced no adverse consequence in his 7 treatments, pulmonary edema ensued from his eighth treatment despite no change in anesthesia and in the technical parameters of ECT. He was treated with oxygen and intravenous hydrocortisone, after which he quickly recovered. Transient eosinophilia was observed, but clinical symptoms of asthma did not appear. Although the association between pulmonary edema and well-controlled asthma was unclear, thiopental as induction of anesthesia or esmolol as poststimulus delivery might have played a role in the event. There may be a possibility of pulmonary edema even after several uneventful ECT treatments in a patient with asthma.
Wall interference correction improvements for the ONERA main wind tunnels
NASA Technical Reports Server (NTRS)
Vaucheret, X.
1982-01-01
This paper describes improved methods of calculating wall interference corrections for the ONERA large windtunnels. The mathematical description of the model and its sting support have become more sophisticated. An increasing number of singularities is used until an agreement between theoretical and experimental signatures of the model and sting on the walls of the closed test section is obtained. The singularity decentering effects are calculated when the model reaches large angles of attack. The porosity factor cartography on the perforated walls deduced from the measured signatures now replaces the reference tests previously carried out in larger tunnels. The porosity factors obtained from the blockage terms (signatures at zero lift) and from the lift terms are in good agreement. In each case (model + sting + test section), wall corrections are now determined, before the tests, as a function of the fundamental parameters M, CS, CZ. During the windtunnel tests, the corrections are quickly computed from these functions.
Dual Key Speech Encryption Algorithm Based Underdetermined BSS
Zhao, Huan; Chen, Zuo; Zhang, Xixiang
2014-01-01
When the number of the mixed signals is less than that of the source signals, the underdetermined blind source separation (BSS) is a significant difficult problem. Due to the fact that the great amount data of speech communications and real-time communication has been required, we utilize the intractability of the underdetermined BSS problem to present a dual key speech encryption method. The original speech is mixed with dual key signals which consist of random key signals (one-time pad) generated by secret seed and chaotic signals generated from chaotic system. In the decryption process, approximate calculation is used to recover the original speech signals. The proposed algorithm for speech signals encryption can resist traditional attacks against the encryption system, and owing to approximate calculation, decryption becomes faster and more accurate. It is demonstrated that the proposed method has high level of security and can recover the original signals quickly and efficiently yet maintaining excellent audio quality. PMID:24955430
Azar, Carol F; Ruiz, Yumary
2003-10-01
No one could have predicted the events of September 11. The days following this tragic event put public health educators' skills to the test as they transferred theory to practice to assist rescue workers, victims, and community residents to cope and rebuild their lives. As health educators working in New York City at that time, the authors were quickly thrust into experiences, roles, and responsibilities for which they thought they had little preparation. But as they worked at Ground Zero in the days immediately after the attack and later in the neighborhoods of lower Manhattan, they realized their health promotion practice and research training provided them with what they needed to play their part. This article briefly illustrates their experiences and describes the skills and knowledge they tapped into to assist the community.
Requirements for radiation emergency urine bioassay techniques for the public and first responders.
Li, Chunsheng; Vlahovich, Slavica; Dai, Xiongxin; Richardson, Richard B; Daka, Joseph N; Kramer, Gary H
2010-11-01
Following a radiation emergency, the affected public and the first responders may need to be quickly assessed for internal contamination by the radionuclides involved. Urine bioassay is one of the most commonly used methods for assessing radionuclide intake and radiation dose. This paper attempts to derive the sensitivity requirements (from inhalation exposure) for the urine bioassay techniques for the top 10 high-risk radionuclides that might be used in a terrorist attack. The requirements are based on a proposed reference dose to adults of 0.1 Sv (CED, committed effective dose). In addition, requirements related to sample turnaround time and field deployability of the assay techniques are also discussed. A review of currently available assay techniques summarized in this paper reveals that method development for ²⁴¹Am, ²²⁶Ra, ²³⁸Pu, and ⁹⁰Sr urine bioassay is needed.
Water striders adjust leg movement speed to optimize takeoff velocity for their morphology.
Yang, Eunjin; Son, Jae Hak; Lee, Sang-Im; Jablonski, Piotr G; Kim, Ho-Young
2016-12-07
Water striders are water-walking insects that can jump upwards from the water surface. Quick jumps allow striders to avoid sudden dangers such as predators' attacks, and therefore their jumping is expected to be shaped by natural selection for optimal performance. Related species with different morphological constraints could require different jumping mechanics to successfully avoid predation. Here we show that jumping striders tune their leg rotation speed to reach the maximum jumping speed that water surface allows. We find that the leg stroke speeds of water strider species with different leg morphologies correspond to mathematically calculated morphology-specific optima that maximize vertical takeoff velocity by fully exploiting the capillary force of water. These results improve the understanding of correlated evolution between morphology and leg movements in small jumping insects, and provide a theoretical basis to develop biomimetic technology in semi-aquatic environments.
NASA Astrophysics Data System (ADS)
Zakharchenko, V. D.; Kovalenko, I. G.
2014-05-01
A new method for the line-of-sight velocity estimation of a high-speed near-Earth object (asteroid, meteorite) is suggested. The method is based on the use of fractional, one-half order derivative of a Doppler signal. The algorithm suggested is much simpler and more economical than the classical one, and it appears preferable for use in orbital weapon systems of threat response. Application of fractional differentiation to quick evaluation of mean frequency location of the reflected Doppler signal is justified. The method allows an assessment of the mean frequency in the time domain without spectral analysis. An algorithm structure for the real-time estimation is presented. The velocity resolution estimates are made for typical asteroids in the X-band. It is shown that the wait time can be shortened by orders of magnitude compared with similar value in the case of a standard spectral processing.
Water striders adjust leg movement speed to optimize takeoff velocity for their morphology
NASA Astrophysics Data System (ADS)
Yang, Eunjin; Son, Jae Hak; Lee, Sang-Im; Jablonski, Piotr G.; Kim, Ho-Young
2016-12-01
Water striders are water-walking insects that can jump upwards from the water surface. Quick jumps allow striders to avoid sudden dangers such as predators' attacks, and therefore their jumping is expected to be shaped by natural selection for optimal performance. Related species with different morphological constraints could require different jumping mechanics to successfully avoid predation. Here we show that jumping striders tune their leg rotation speed to reach the maximum jumping speed that water surface allows. We find that the leg stroke speeds of water strider species with different leg morphologies correspond to mathematically calculated morphology-specific optima that maximize vertical takeoff velocity by fully exploiting the capillary force of water. These results improve the understanding of correlated evolution between morphology and leg movements in small jumping insects, and provide a theoretical basis to develop biomimetic technology in semi-aquatic environments.
Situational Awareness of Network System Roles (SANSR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huffer, Kelly M; Reed, Joel W
In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. Wemore » will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.« less
Simultaneous control of microorganisms and disinfection by-products by sequential chlorination.
Chen, Chao; Zhang, Xiao-Jian; He, Wen-Jie; Han, Hong-Da
2007-04-01
To introduce a new sequential chlorination disinfection process in which short-term free chlorine and chloramine are sequentially added. Pilot tests of this sequential chlorination were carried out in a drinking water plant. The sequential chlorination disinfection process had the same or better efficiency on microbe (including virus) inactivation compared with the free chlorine disinfection process. There seemed to be some synergetic disinfection effect between free chlorine and monochloramine because they attacked different targets. The sequential chlorination disinfection process resulted in 35.7%-77.0% TTHM formation and 36.6%-54.8% THAA5 formation less than the free chlorination process. The poorer the water quality was, the more advantage the sequential chlorination disinfection had over the free chlorination. This process takes advantages of free chlorine's quick inactivation of microorganisms and chloramine's low disinfection by-product (DBP) yield and long-term residual effect, allowing simultaneous control of microbes and DBPs in an effective and economic way.
NASA Technical Reports Server (NTRS)
Freymuth, Peter
1992-01-01
Aims for improvement of fighter aircraft pursued by the unsteady flow community are high agility (the ability of the aircraft to make close turns in a low-speed regime) and super maneuverability (the ability of the aircraft to operate at high angles of attack in a post stall regime during quick maneuvers in a more extended speed range). High agility requires high lift coefficients at low speeds in a dynamic situation and this requirement can be met by dynamically forced separation or by quasistatic stall control. The competing methods will be assessed based on the known physics. Maneuvering into the post stall regime also involves dynamic separation but because even fast maneuvers involving the entire aircraft are 'aerodynamically slow' the resulting dynamic vortex structures should be considered 'elicited' rather than 'forced.' More work seems to be needed in this area of elicited dynamic separation.
Practice style and patient health outcomes: The case of heart attacks
Currie, Janet; MacLeod, W. Bentley; Van Parys, Jessica
2016-01-01
When a patient arrives at the Emergency Room with acute myocardial infarction (AMI), the provider on duty must quickly decide how aggressively the patient should be treated. Using Florida data on all such patients from 1992 to 2014, we decompose practice style into two components: The provider's probability of conducting invasive procedures on the average patient (which we characterize as aggressiveness), and the responsiveness of the choice of procedure to the patient's characteristics. We show that within hospitals and years, patients with more aggressive providers have consistently higher costs and better outcomes. Since all patients benefit from higher utilization of invasive procedures, targeting procedure use to the most appropriate patients benefits these patients at the expense of the less appropriate patients. We also find that the most aggressive and responsive physicians are young, male, and trained in top 20 schools. PMID:26938940
Integration of phytochemicals and phytotherapy into cancer precision medicine.
Efferth, Thomas; Saeed, Mohamed E M; Mirghani, Elhaj; Alim, Awadh; Yassin, Zahir; Saeed, Elfatih; Khalid, Hassan E; Daak, Salah
2017-07-25
Concepts of individualized therapy in the 1970s and 1980s attempted to develop predictive in vitro tests for individual drug responsiveness without reaching clinical routine. Precision medicine attempts to device novel individual cancer therapy strategies. Using bioinformatics, relevant knowledge is extracted from huge data amounts. However, tumor heterogeneity challenges chemotherapy due to genetically and phenotypically different cell subpopulations, which may lead to refractory tumors. Natural products always served as vital resources for cancer therapy (e.g., Vinca alkaloids, camptothecin, paclitaxel, etc.) and are also sources for novel drugs. Targeted drugs developed to specifically address tumor-related proteins represent the basis of precision medicine. Natural products from plants represent excellent resource for targeted therapies. Phytochemicals and herbal mixtures act multi-specifically, i.e. they attack multiple targets at the same time. Network pharmacology facilitates the identification of the complexity of pharmacogenomic networks and new signaling networks that are distorted in tumors. In the present review, we give a conceptual overview, how the problem of drug resistance may be approached by integrating phytochemicals and phytotherapy into academic western medicine. Modern technology platforms (e.g. "-omics" technologies, DNA/RNA sequencing, and network pharmacology) can be applied for diverse treatment modalities such as cytotoxic and targeted chemotherapy as well as phytochemicals and phytotherapy. Thereby, these technologies represent an integrative momentum to merge the best of two worlds: clinical oncology and traditional medicine. In conclusion, the integration of phytochemicals and phytotherapy into cancer precision medicine represents a valuable asset to chemically synthesized chemicals and therapeutic antibodies.
Novel EO/IR sensor technologies
NASA Astrophysics Data System (ADS)
Lewis, Keith
2011-10-01
The requirements for advanced EO/IR sensor technologies are discussed in the context of evolving military operations, with significant emphasis on the development of new sensing technologies to meet the challenges posed by asymmetric threats. The Electro-Magnetic Remote Sensing (EMRS DTC) was established in 2003 to provide a centre of excellence in sensor research and development, supporting new capabilities in key military areas such as precision attack, battlespace manoeuvre and information superiority. In the area of advanced electro-optic technology, the DTC has supported work on discriminative imaging, advanced detectors, laser components/technologies, and novel optical techniques. This paper provides a summary of some of the EO/IR technologies explored by the DTC.
Finding optimum airfoil shape to get maximum aerodynamic efficiency for a wind turbine
NASA Astrophysics Data System (ADS)
Sogukpinar, Haci; Bozkurt, Ismail
2017-02-01
In this study, aerodynamic performances of S-series wind turbine airfoil of S 825 are investigated to find optimum angle of attack. Aerodynamic performances calculations are carried out by utilization of a Computational Fluid Dynamics (CFD) method withstand finite capacity approximation by using Reynolds-Averaged-Navier Stokes (RANS) theorem. The lift and pressure coefficients, lift to drag ratio of airfoil S 825 are analyzed with SST turbulence model then obtained results crosscheck with wind tunnel data to verify the precision of computational Fluid Dynamics (CFD) approximation. The comparison indicates that SST turbulence model used in this study can predict aerodynamics properties of wind blade.
Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Griswold, Richard L.; Beech, Zachary W.
2014-07-11
Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engi- neering, the resilience of a substance is mathematically defined as the area under the stress vs. strain curve. We took inspiration from mechanics in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in language and engineering terms and then translate these definitions to information sciences. Then we tested our definitions of resilience for a very simple problem in networked queuing systems. We discuss lessons learned and make recommendations for using this approach in futuremore » work.« less
Ranjith, A P; Quicke, Donald L J; Saleem, U K A; Butcher, Buntika A; Zaldívar-Riverón, Alejandro; Nasser, M
2016-01-01
The vast majority of braconid wasps are parasitoids of other insects. Although a few cases of pure phytophagy (primary gall production and seed predation) are known, no previous entomophytophagous species (i.e. ones that display entomophagy and phytophagy sequentially), has been discovered among braconids. We describe the detailed biology and specialized larval morphology for the first confirmed entomophytophagous braconid species. Leaf galls on Garuga pinnata Roxb. (Burseraceae) in India, induced by the psyllid, Phacopteron lentiginosum Buckton (Hemiptera: Psylloidea, Phacopteronidae) were sampled throughout a period of several months and found to suffer a high level of attack by a new species Bracon garugaphagae Ranjith & Quicke which is here described and illustrated. The wasps oviposit singly into the galls without paralysing the psyllids. The larvae first attack psyllid nymphs which they seek out within the gall, kill them with a single bite and consume them. Unique dorsal abdominal tubercles, with eversible tips present on the abdominal segments of the larvae that are used to help maintain larval position while feeding, are illustrated. After consuming all available prey, the larvae continue feeding on gall tissue until mature enough to spin cocoons and pupate. The new species illustrates, for the first time, a possible intermediate stage in the evolution of pure phytophagy within the Braconidae. Interestingly, the two unrelated seed predator Bracon species are also associated with Burseraceae, perhaps indicating that this plant family is particularly suited as a food for braconine wasps.
Psychotherapy with the boring patient.
Taylor, G J
1984-04-01
Boredom is an unpleasant affective state which may be evoked by monotonous sensory input and reduction of an individual's internal instinctual and fantasy activity. Certain difficult patients have the capacity to evoke boredom in their psychotherapists and unless technical modifications are used, therapy quickly reaches an impasse and may be terminated on the grounds that the patient is 'not psychologically-minded.' Chronically boring patients have an impaired capacity for symbolization and can be identified by their non-symbolic communicative style. This reflects an inner struggle with primitive mental states due to fixation at, or regression to, the paranoid-schizoid developmental position. The patient may use projective identification to discharge unbearable psychic tension into the therapist whose boredom is partly a defense against this. Alternatively, the patient may create impenetrable barriers with language by making 'attacks on linking' which are tantamount to attacks on the therapist's peace of mind. The therapist should initially interpret the form and function of the patient's communications rather than the contents. In a manner comparable to a mother's interaction with her young child, the therapist can help the patient acquire a greater capacity for symbolization, including the ability to accurately label and verbalize different affective experiences. Careful analysis of the countertransference will identify the patient's projective identifications, provide valuable information about the patient's primitive mental life, and prevent anti-therapeutic projective counter-identifications. The patient will become less boring as he learns to use symbols and as his primitive anxieties are resolved.
[Current views on surface enhanced Raman spectroscopy in microbiology].
Jia, Xiaoxiao; Li, Jing; Qin, Tian; Deng, Aihua; Liu, Wenjun
2015-05-01
Raman spectroscopy has generated many branches during the development for more than 90 years. Surface enhanced Raman spectroscopy (SERS) improves SNR by using the interaction between tested materials and the surface of rough metal, as to quickly get higher sensitivity and precision spectroscopy without sample pretreatment. This article describes the characteristic and classification of SERS, and updates the theory and clinical application of SERS. It also summarizes the present status and progress of SERS in various disciplines and illustrates the necessity and urgency of its research, which provides rationale for the application for SERS in microbiology.
Fast cat-eye effect target recognition based on saliency extraction
NASA Astrophysics Data System (ADS)
Li, Li; Ren, Jianlin; Wang, Xingbin
2015-09-01
Background complexity is a main reason that results in false detection in cat-eye target recognition. Human vision has selective attention property which can help search the salient target from complex unknown scenes quickly and precisely. In the paper, we propose a novel cat-eye effect target recognition method named Multi-channel Saliency Processing before Fusion (MSPF). This method combines traditional cat-eye target recognition with the selective characters of visual attention. Furthermore, parallel processing enables it to achieve fast recognition. Experimental results show that the proposed method performs better in accuracy, robustness and speed compared to other methods.
Clinical assessment of hand strength using a microcomputer.
Jain, A S; Hennedy, J A; Carus, D A
1985-10-01
A microcomputer based system has been designed for precise, objective quantification of hand strength. Pinch, grasp and shear strengths are measured using force transducers. The system, which is quick and easy to operate, not only measures these strengths accurately, but also collects, stores and displays this data numerically or in graphical form, at the touch of a button. The data can be manipulated to answer any type of statistical question related to any group of patients. The assessment of hand strength in ninety-six people, representing normal hand function, by means of this system, is reported.
Refraction corrections for surveying
NASA Technical Reports Server (NTRS)
Lear, W. M.
1979-01-01
Optical measurements of range and elevation angle are distorted by the earth's atmosphere. High precision refraction correction equations are presented which are ideally suited for surveying because their inputs are optically measured range and optically measured elevation angle. The outputs are true straight line range and true geometric elevation angle. The 'short distances' used in surveying allow the calculations of true range and true elevation angle to be quickly made using a programmable pocket calculator. Topics covered include the spherical form of Snell's Law; ray path equations; and integrating the equations. Short-, medium-, and long-range refraction corrections are presented in tables.
Forward Period Analysis Method of the Periodic Hamiltonian System.
Wang, Pengfei
2016-01-01
Using the forward period analysis (FPA), we obtain the period of a Morse oscillator and mathematical pendulum system, with the accuracy of 100 significant digits. From these results, the long-term [0, 1060] (time unit) solutions, ranging from the Planck time to the age of the universe, are computed reliably and quickly with a parallel multiple-precision Taylor series (PMT) scheme. The application of FPA to periodic systems can greatly reduce the computation time of long-term reliable simulations. This scheme provides an efficient way to generate reference solutions, against which long-term simulations using other schemes can be tested.
2011-03-01
machine gun , or distributor cap in an automobile. In a Gatling- Gun , when the barrel rotates it collects a round and as the round rotates, it comes...ejected and another is fed into the barrel . This design allows multiple rounds to be fired from the gun very quickly, and still prevent the barrel from...T6061 aluminum and had dimensions of (127 x 76.2 x76.2) mm, cross sectional area of 5.80644 *10-3 m2 and a volume of 7.374*10-4 m3. Using the volume
Wang, Lin; Tian, Dan; Sun, Xiumei; Xiao, Yanju; Chen, Li; Wu, Guomin
2017-08-01
Facial asymmetry is very common in maxillofacial deformities. It is difficult to achieve accurate reconstruction. With the help of 3D printing models and surgical templates, the osteotomy line and the amount of bone grinding can be accurate. Also, by means of the precise repositioning instrument, the repositioning of genioplasty can be accurate and quick. In this study, we present a three-dimensional printing technique and the precise repositioning instrument to guide the osteotomy and repositioning, and illustrate their feasibility and validity. Eight patients with complex facial asymmetries were studied. A precise 3D printing model was obtained. We made the preoperative design and surgical templates according to it. The surgical templates and precise repositioning instrument were used to obtain an accurate osteotomy and repositioning during the operation. Postoperative measurements were made based on computed tomographic data, including chin point deviation as well as the symmetry of the mandible evaluated by 3D curve functions. All patients obtained satisfactory esthetic results, and no recurrences occurred during follow-up. The results showed that we achieved clinically acceptable precision for the mandible and chin. The mean and SD of ICC between R-Post and L-Post were 0.973 ± 0.007. The mean and SD of chin point deviation 6 months after the operation were 0.63 ± 0.19 mm. The results of this study suggest that the three-dimensional printing technique and the precise repositioning instrument could aid in making better operation designs and more accurate manipulation in orthognathic surgery for complex facial asymmetry. This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266 .
Investigation Into the Utilization of 3D Printing in Laser Cooling Experiments
NASA Astrophysics Data System (ADS)
Hazlett, Eric
With the advancement of 3D printing new opportunities are abound in many different fields, but with the balance between the precisions of atomic physics experiments and the material properties of current 3D printers the benefit of 3D printing technology needs to be investigated. We report on the progress of two investigations of 3D printing of benefit to atomic physics experiments: laser feedback module and the other being an optical chopper. The first investigation looks into creation of a 3D printed laser diode feedback module. This 3D printed module would allow for the quick realization of an external cavity diode laser that would have an adjustable cavity distance. We will report on the first tests of this system, by looking at Rb spectroscopy and mode-hop free tuning range as well as possibilities of using these lasers for MOT generation. We will also discuss our investigation into a 3D-printed optical chopper that utilizes an Arduino and a computer hard drive motor. By implementing an additional Arduino we create a low cost way to quickly measure laser beam waists
Dynamic corticostriatal activity biases social bonding in monogamous female prairie voles
Amadei, Elizabeth A.; Johnson, Zachary V.; Kwon, Yong Jun; Shpiner, Aaron C.; Saravanan, Varun; Mays, Wittney D.; Ryan, Steven J.; Walum, Hasse; Rainnie, Donald G.; Young, Larry J.; Liu, Robert C.
2017-01-01
Summary paragraph Adult pair bonding involves dramatic changes in the perception and valuation of another individual1. One key change is that partners come to reliably activate the brain's reward system2-6, though the precise neural mechanisms by which partners become rewarding during sociosexual interactions leading to a bond remain unclear. Using a prairie vole model of social bonding7, we show how a functional circuit from medial prefrontal cortex (mPFC) to nucleus accumbens (NAcc) is dynamically modulated to enhance females' affiliative behavior towards a partner. Individual variation in the strength of this functional connectivity, particularly after the first mating encounter, predicts how quickly animals begin affiliative huddling with their partner. Rhythmically activating this circuit in a social context without mating biases later preference towards a partner, indicating that this circuit's activity is not just correlated with how quickly animals become affiliative but causally accelerates it. These results provide the first dynamic view of corticostriatal activity during bond formation, revealing how social interactions can recruit brain reward systems to drive changes in affiliative behavior. PMID:28562592
Investigation Into the Utilization of 3D Printing in Laser Cooling Experiments
NASA Astrophysics Data System (ADS)
Hazlett, Eric; Nelson, Brandon; de Leon, Sam Diaz; Shaw, Jonah
2016-05-01
With the advancement of 3D printing new opportunities are abound in many different fields, but with the balance between the precisions of atomic physics experiments and the material properties of current 3D printers the benefit of 3D printing technology needs to be investigated. We report on the progress of two investigations of 3D printing of benefit to atomic physics experiments: laser feedback module and the other being an optical chopper. The first investigation looks into creation of a 3D printed laser diode feedback module. This 3D printed module would allow for the quick realization of an external cavity diode laser that would have an adjustable cavity distance. We will report on the first tests of this system, by looking at Rb spectroscopy and mode-hop free tuning range as well as possibilities of using these lasers for MOT generation. We will also discuss our investigation into a 3D-printed optical chopper that utilizes an Arduino and a computer hard drive motor. By implementing an additional Arduino we create a low cost way to quickly measure laser beam waists.
Fast Beam-Based BPM Calibration
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bertsche, K.; Loos, H.; Nuhn, H.-D.
2012-10-15
The Alignment Diagnostic System (ADS) of the LCLS undulator system indicates that the 33 undulator quadrupoles have extremely high position stability over many weeks. However, beam trajectory straightness and lasing efficiency degrade more quickly than this. A lengthy Beam Based Alignment (BBA) procedure must be executed every two to four weeks to re-optimize the X-ray beam parameters. The undulator system includes RF cavity Beam Position Monitors (RFBPMs), several of which are utilized by an automatic feedback system to align the incoming electron-beam trajectory to the undulator axis. The beam trajectory straightness degradation has been traced to electronic drifts of themore » gain and offset of the BPMs used in the beam feedback system. To quickly recover the trajectory straightness, we have developed a fast beam-based procedure to recalibrate the BPMs. This procedure takes advantage of the high-precision monitoring capability of the ADS, which allows highly repeatable positioning of undulator quadrupoles. This report describes the ADS, the position stability of the LCLS undulator quadrupoles, and some results of the new recovery procedure.« less
Mani, Ganesh Kumar; Morohoshi, Madoka; Yasoda, Yutaka; Yokoyama, Sho; Kimura, Hiroshi; Tsuchiya, Kazuyoshi
2017-02-15
The present study is concerned about the development of highly sensitive and stable microfluidic pH sensor for possible identification of circulating tumor cells (CTCs) in blood. The precise pH measurements between silver-silver chloride (Ag/AgCl) reference electrode and zinc oxide (ZnO) working electrode have been investigated in the microfluidic device. Since there is a direct link between pH and cancer cells, the developed device is one of the valuable tools to examine circulating tumor cells (CTCs) in blood. The ZnO-based working electrode was deposited by radio frequency (rf) sputtering technique. The potential voltage difference between the working and reference electrodes (Ag/AgCl) is evaluated on the microfluidic device. The ideal Nernstian response of -43.71165 mV/pH was achieved along with high stability and quick response time. Finally, to evaluate the real time capability of the developed microfluidic device, in vitro testing was done with A549, A7r5, and MDCK cells.
Technique for rapid establishment of American lotus in remediation efforts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ryon, M. G.; Jett, R. T.; McCracken, M. K.
A technique for increasing the establishment rate of American lotus (Nelumbo lutea) and simplifying planting was developed as part of a pond remediation project. Lotus propagation techniques typically require scarification of the seed, germination in heated water, and planting in nursery containers. Then mature (~ 1 yr) nursery-grown stock is transferred to planting site or scarified seed are broadcast applied. Mature plants should grow more quickly, but can be sensitive to handling, require more time to plant, and cost more. Scarified seeds are easier to plant and inexpensive, but have a lag time in growth, can fail to germinate, andmore » can be difficult to site precisely. We developed an intermediate technique using small burlap bags that makes planting easier, provides greater germination success, and avoids lag time in growth. Data on survival and growth from experiments using mature stock, scarified seeds, and bag lotus demonstrate that bag lotus grow rapidly in a variety of conditions, have a high survival rate, can be processed and planted easily and quickly, and are very suitable for a variety of remediation projects« less
Usuda, Takashi; Kobayashi, Naoki; Takeda, Sunao; Kotake, Yoshifumi
2010-01-01
We have developed the non-invasive blood pressure monitor which can measure the blood pressure quickly and robustly. This monitor combines two measurement mode: the linear inflation and the linear deflation. On the inflation mode, we realized a faster measurement with rapid inflation rate. On the deflation mode, we realized a robust noise reduction. When there is neither noise nor arrhythmia, the inflation mode incorporated on this monitor provides precise, quick and comfortable measurement. Once the inflation mode fails to calculate appropriate blood pressure due to body movement or arrhythmia, then the monitor switches automatically to the deflation mode and measure blood pressure by using digital signal processing as wavelet analysis, filter bank, filter combined with FFT and Inverse FFT. The inflation mode succeeded 2440 measurements out of 3099 measurements (79%) in an operating room and a rehabilitation room. The new designed blood pressure monitor provides the fastest measurement for patient with normal circulation and robust measurement for patients with body movement or severe arrhythmia. Also this fast measurement method provides comfortableness for patients.
ColorMoves: Optimizing Color's Potential for Exploration and Communication of Data
NASA Astrophysics Data System (ADS)
Samsel, F.
2017-12-01
Color is the most powerful perceptual channel available for exposing and communicating data. Most visualizations are rendered in one of a handful of common colormaps - the rainbow, cool-warm, heat map and viridis. These maps meet the basic criteria for encoding data - perceptual uniformity and reasonable discriminatory power. However, as the size and complexity of data grows, our need to optimize the potential of color grows. The ability to expose greater detail and differentiate between multiple variables becomes ever more important. To meet this need we have created ColorMoves, an interactive colormap construction tool that enables scientists to quickly and easily align a concentration contrast with the data ranges of interest. Perceptual research tells us that luminance is the strongest contrast and thus provides the highest degree of perceptual discrimination. However, the most commonly used colormaps contain a limited range of luminance contrast. ColorMoves enables interactive constructing colormaps enabling one to distribute the luminance where is it most needed. The interactive interface enables optimal placement of the color scales. The ability to watch the changes on ones data, in real time makes precision adjustment quick and easy. By enabling more precise placement and multiple ranges of luminance one can construct colomaps containing greater discriminatory power. By selecting from the wide range of color scale hues scientists can create colormaps intuitive to their subject. ColorMoves is comprised of four main components: a set of 40 color scales; a histogram of the data distribution; a viewing area showing the colormap on your data; and the controls section. The 40 color scales span the spectrum of hues, saturation levels and value distributions. The histogram of the data distribution enables placement of the color scales in precise locations. The viewing area show is the impact of changes on the data in real time. The controls section enables export of the constructed colormaps for use in tools such as ParaView and Matplotlib. For a clearer understanding of ColorMoves capability we recommend trying it out at SciVisColor.org.
Bottrel, Sue Ellen C; Pereira, Pedro C; de Oliveira Pereira, Renata; Leão, Mônica M D; Amorim, Camila C
2018-06-25
Ethylenethiourea (ETU) is a toxic degradation product of one class of fungicide which is largely employed in the world, the ethylenebisdithiocarbamates. In this study, ETU was degraded by ozonation enhanced by UV-C light irradiation (O 3 /UV-C) in aqueous medium. Degradation experiments were conducted at natural pH (6.8) and neutral pH (7.0, buffered). ETU was promptly eliminated from the reactive medium during ozonation in the presence and absence of light. Within the first few minutes of reaction conducted in natural pH, the pH decreased quickly from 6.8 to 3.0. Results show that ETU mineralization occurs only in the reaction conducted in neutral pH and that it takes place in a higher rate when enhanced by UV-C irradiation. Main intermediates formed during the O3/UV-C experiments in different conditions tested were also investigated and three different degradation mechanisms were proposed considering the occurrence of direct and indirect ozone reactions. At pH 7, ethylene urea (EU) was quickly generated and degraded. Meanwhile, at natural pH, besides EU, other compounds originated from the electrophilic attack of ozone to the sulfur atom present in the contaminant molecule were also identified during reaction and EU was detected within 60 min of reaction. Results showed that ozonation enhanced by UV-C promotes a faster reaction than the same system in the absence of light, and investigation of the toxicity is recommended.
PROPERTIES OF 42 SOLAR-TYPE KEPLER TARGETS FROM THE ASTEROSEISMIC MODELING PORTAL
DOE Office of Scientific and Technical Information (OSTI.GOV)
Metcalfe, T. S.; Mathur, S.; Creevey, O. L.
2014-10-01
Recently the number of main-sequence and subgiant stars exhibiting solar-like oscillations that are resolved into individual mode frequencies has increased dramatically. While only a few such data sets were available for detailed modeling just a decade ago, the Kepler mission has produced suitable observations for hundreds of new targets. This rapid expansion in observational capacity has been accompanied by a shift in analysis and modeling strategies to yield uniform sets of derived stellar properties more quickly and easily. We use previously published asteroseismic and spectroscopic data sets to provide a uniform analysis of 42 solar-type Kepler targets from the Asteroseismicmore » Modeling Portal. We find that fitting the individual frequencies typically doubles the precision of the asteroseismic radius, mass, and age compared to grid-based modeling of the global oscillation properties, and improves the precision of the radius and mass by about a factor of three over empirical scaling relations. We demonstrate the utility of the derived properties with several applications.« less
Liu, Huiling; Jiang, Yueming; Yang, Hongshun; Yang, Bao
2017-08-01
Banana is one of the most important fruits over the world. The chemical composition is critical for the organoleptic properties and health benefits. As one of the leading bioactive components in banana pulp, the polysaccharides may contribute to the beneficial health effects. However, their precise structure information remains unknown. A leading acidic polysaccharide (ABPP) of banana pulp was purified and identified by nuclear magnetic resonnance spectroscopy (NMR) and gas chromatography-mass spectrometry (GC-MS). →4-α-d-GalpA-1→ and →4-α-d-GalpAMe-1→ constituted the backbone. No branch chains were detected. The molecular weight was determined to be 8.9kDa by gel permeation chromatography, which was smaller than previously reported fruit-derived polygalacturonic acids. The precise structure was identified as below. Digestion by enzyme would lead to production of oligogalacturonic acids and quick accumulation of 5000-7000Da fraction. Copyright © 2017 Elsevier B.V. All rights reserved.
Hassanpour, Saeed; Bay, Graham; Langlotz, Curtis P
2017-06-01
We built a natural language processing (NLP) method to automatically extract clinical findings in radiology reports and characterize their level of change and significance according to a radiology-specific information model. We utilized a combination of machine learning and rule-based approaches for this purpose. Our method is unique in capturing different features and levels of abstractions at surface, entity, and discourse levels in text analysis. This combination has enabled us to recognize the underlying semantics of radiology report narratives for this task. We evaluated our method on radiology reports from four major healthcare organizations. Our evaluation showed the efficacy of our method in highlighting important changes (accuracy 99.2%, precision 96.3%, recall 93.5%, and F1 score 94.7%) and identifying significant observations (accuracy 75.8%, precision 75.2%, recall 75.7%, and F1 score 75.3%) to characterize radiology reports. This method can help clinicians quickly understand the key observations in radiology reports and facilitate clinical decision support, review prioritization, and disease surveillance.
Fractionation of uranium isotopes in minerals screened by gamma spectrometry.
NASA Astrophysics Data System (ADS)
Geiger, Jeffrey L.; Baldwin, Austin M.; Blatchley, Charles C.
2008-03-01
At least two groups have reported finding shifts in the ratio of U-235/U-238 for sandstone, black shale, and other sedimentary samples using precision ICP-MS. These shifts were tentatively attributed to a recently predicted isotope effect based on nuclear volume that causes fractionation for U^IV-U^VI transitions. However, fractionation of high Z elements may be less likely an explanation than U-235 depletion induced by galactic cosmic ray neutrons. Isotope depletion in marine sediments could therefore be an indicator of changes in cosmic ray flux due to nearby supernovae, gamma-ray bursts, or longer term changes during the 62 million year cycle of the Sun above and below the galactic plane. We report using a less precise approach than ICP-MS, but one which can quickly screen samples to look for anomalies in isotope ratios, namely HPGe gamma ray spectrometry. Various levels of depletion were measured for uranium rich minerals, including brannerite, carnotite, and pitchblende, as well as coal and limestone samples.
QSL Squasher: A Fast Quasi-separatrix Layer Map Calculator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tassev, Svetlin; Savcheva, Antonia, E-mail: svetlin.tassev@cfa.harvard.edu
Quasi-Separatrix Layers (QSLs) are a useful proxy for the locations where current sheets can develop in the solar corona, and give valuable information about the connectivity in complicated magnetic field configurations. However, calculating QSL maps, even for two-dimensional slices through three-dimensional models of coronal magnetic fields, is a non-trivial task, as it usually involves tracing out millions of magnetic field lines with immense precision. Thus, extending QSL calculations to three dimensions has rarely been done until now. In order to address this challenge, we present QSL Squasher—a public, open-source code, which is optimized for calculating QSL maps in both twomore » and three dimensions on graphics processing units. The code achieves large processing speeds for three reasons, each of which results in an order-of-magnitude speed-up. (1) The code is parallelized using OpenCL. (2) The precision requirements for the QSL calculation are drastically reduced by using perturbation theory. (3) A new boundary detection criterion between quasi-connectivity domains is used, which quickly identifies possible QSL locations that need to be finely sampled by the code. That boundary detection criterion relies on finding the locations of abrupt field-line length changes, which we do by introducing a new Field-line Length Edge (FLEDGE) map. We find FLEDGE maps useful on their own as a quick-and-dirty substitute for QSL maps. QSL Squasher allows construction of high-resolution 3D FLEDGE maps in a matter of minutes, which is two orders of magnitude faster than calculating the corresponding 3D QSL maps. We include a sample of calculations done using QSL Squasher to demonstrate its capabilities as a QSL calculator, as well as to compare QSL and FLEDGE maps.« less
Estimating DXA total body fat percentage by lipometer subcutaneous adipose tissue thicknesses.
Tafeit, Erwin; Greilberger, Joachim; Cvirn, Gerhard; Lipp, Rainer Walther; Schnedl, Wolfgang Johann; Jürimäe, Toivo; Jürimäe, Jaak; Wallner-Liebmann, Sandra Johanna
2009-06-01
DXA is an accepted reference method to estimate body composition. However several difficulties in the applicability exist. The equipment is rather expensive, not portable, impractical for measurement of big study populations and it provides a minimal amount of ionizing radiation exposure. The optical device Lipometer (EU Pat.No. 0516251) provides non-invasive, quick, precise and safe measurements of subcutaneous adipose tissue (SAT) layer thicknesses at any site of the human body. Compared to DXA there are some advantages in the Lipometer approach, because this device is portable, quick, not expensive and no radiation is involved. To use these advantages in the field of total body fat% (TBF%) assessment, an acceptable estimation of DXA TBF% by Lipometer SAT thicknesses is necessary, which was the aim of this study. Height, weight, waist and hip circumferences, DXA TBF% and Lipometer SAT thicknesses at fifteen defined body sites were measured in 28 healthy men (age: 33.9 +/- 16.6 years) and 52 healthy women (age: 40.1 +/- 10.7 years). To estimate Lipometer TBF% stepwise multiple regression analysis was applied, using DXA TBF% as dependent variable. Using the fifteen Lipometer SAT thicknesses together with age, height, weight and BMI as independent variables provided the best estimations of Lipometer TBF% for both genders with strong correlations to DXA TBF% (R = 0.985 for males and R = 0.953 for females). The limits of agreement were -2.48% to +2.48% for males and -4.28% to + 4.28% for females. For both genders we received a bias of 0.00%. The results of this paper extend the abilities of the Lipometer by a precise estimation of TBF% using DXA as golden standard.
QSL Squasher: A Fast Quasi-separatrix Layer Map Calculator
NASA Astrophysics Data System (ADS)
Tassev, Svetlin; Savcheva, Antonia
2017-05-01
Quasi-Separatrix Layers (QSLs) are a useful proxy for the locations where current sheets can develop in the solar corona, and give valuable information about the connectivity in complicated magnetic field configurations. However, calculating QSL maps, even for two-dimensional slices through three-dimensional models of coronal magnetic fields, is a non-trivial task, as it usually involves tracing out millions of magnetic field lines with immense precision. Thus, extending QSL calculations to three dimensions has rarely been done until now. In order to address this challenge, we present QSL Squasher—a public, open-source code, which is optimized for calculating QSL maps in both two and three dimensions on graphics processing units. The code achieves large processing speeds for three reasons, each of which results in an order-of-magnitude speed-up. (1) The code is parallelized using OpenCL. (2) The precision requirements for the QSL calculation are drastically reduced by using perturbation theory. (3) A new boundary detection criterion between quasi-connectivity domains is used, which quickly identifies possible QSL locations that need to be finely sampled by the code. That boundary detection criterion relies on finding the locations of abrupt field-line length changes, which we do by introducing a new Field-line Length Edge (FLEDGE) map. We find FLEDGE maps useful on their own as a quick-and-dirty substitute for QSL maps. QSL Squasher allows construction of high-resolution 3D FLEDGE maps in a matter of minutes, which is two orders of magnitude faster than calculating the corresponding 3D QSL maps. We include a sample of calculations done using QSL Squasher to demonstrate its capabilities as a QSL calculator, as well as to compare QSL and FLEDGE maps.
Human attention filters for single colors.
Sun, Peng; Chubb, Charles; Wright, Charles E; Sperling, George
2016-10-25
The visual images in the eyes contain much more information than the brain can process. An important selection mechanism is feature-based attention (FBA). FBA is best described by attention filters that specify precisely the extent to which items containing attended features are selectively processed and the extent to which items that do not contain the attended features are attenuated. The centroid-judgment paradigm enables quick, precise measurements of such human perceptual attention filters, analogous to transmission measurements of photographic color filters. Subjects use a mouse to locate the centroid-the center of gravity-of a briefly displayed cloud of dots and receive precise feedback. A subset of dots is distinguished by some characteristic, such as a different color, and subjects judge the centroid of only the distinguished subset (e.g., dots of a particular color). The analysis efficiently determines the precise weight in the judged centroid of dots of every color in the display (i.e., the attention filter for the particular attended color in that context). We report 32 attention filters for single colors. Attention filters that discriminate one saturated hue from among seven other equiluminant distractor hues are extraordinarily selective, achieving attended/unattended weight ratios >20:1. Attention filters for selecting a color that differs in saturation or lightness from distractors are much less selective than attention filters for hue (given equal discriminability of the colors), and their filter selectivities are proportional to the discriminability distance of neighboring colors, whereas in the same range hue attention-filter selectivity is virtually independent of discriminabilty.
Leveraging prognostic baseline variables to gain precision in randomized trials
Colantuoni, Elizabeth; Rosenblum, Michael
2015-01-01
We focus on estimating the average treatment effect in a randomized trial. If baseline variables are correlated with the outcome, then appropriately adjusting for these variables can improve precision. An example is the analysis of covariance (ANCOVA) estimator, which applies when the outcome is continuous, the quantity of interest is the difference in mean outcomes comparing treatment versus control, and a linear model with only main effects is used. ANCOVA is guaranteed to be at least as precise as the standard unadjusted estimator, asymptotically, under no parametric model assumptions and also is locally semiparametric efficient. Recently, several estimators have been developed that extend these desirable properties to more general settings that allow any real-valued outcome (e.g., binary or count), contrasts other than the difference in mean outcomes (such as the relative risk), and estimators based on a large class of generalized linear models (including logistic regression). To the best of our knowledge, we give the first simulation study in the context of randomized trials that compares these estimators. Furthermore, our simulations are not based on parametric models; instead, our simulations are based on resampling data from completed randomized trials in stroke and HIV in order to assess estimator performance in realistic scenarios. We provide practical guidance on when these estimators are likely to provide substantial precision gains and describe a quick assessment method that allows clinical investigators to determine whether these estimators could be useful in their specific trial contexts. PMID:25872751
Comparative Study on a Solving Model and Algorithm for a Flush Air Data Sensing System
Liu, Yanbin; Xiao, Dibo; Lu, Yuping
2014-01-01
With the development of high-performance aircraft, precise air data are necessary to complete challenging tasks such as flight maneuvering with large angles of attack and high speed. As a result, the flush air data sensing system (FADS) was developed to satisfy the stricter control demands. In this paper, comparative stuides on the solving model and algorithm for FADS are conducted. First, the basic principles of FADS are given to elucidate the nonlinear relations between the inputs and the outputs. Then, several different solving models and algorithms of FADS are provided to compute the air data, including the angle of attck, sideslip angle, dynamic pressure and static pressure. Afterwards, the evaluation criteria of the resulting models and algorithms are discussed to satisfy the real design demands. Futhermore, a simulation using these algorithms is performed to identify the properites of the distinct models and algorithms such as the measuring precision and real-time features. The advantages of these models and algorithms corresponding to the different flight conditions are also analyzed, furthermore, some suggestions on their engineering applications are proposed to help future research. PMID:24859025
Comparative study on a solving model and algorithm for a flush air data sensing system.
Liu, Yanbin; Xiao, Dibo; Lu, Yuping
2014-05-23
With the development of high-performance aircraft, precise air data are necessary to complete challenging tasks such as flight maneuvering with large angles of attack and high speed. As a result, the flush air data sensing system (FADS) was developed to satisfy the stricter control demands. In this paper, comparative stuides on the solving model and algorithm for FADS are conducted. First, the basic principles of FADS are given to elucidate the nonlinear relations between the inputs and the outputs. Then, several different solving models and algorithms of FADS are provided to compute the air data, including the angle of attck, sideslip angle, dynamic pressure and static pressure. Afterwards, the evaluation criteria of the resulting models and algorithms are discussed to satisfy the real design demands. Futhermore, a simulation using these algorithms is performed to identify the properites of the distinct models and algorithms such as the measuring precision and real-time features. The advantages of these models and algorithms corresponding to the different flight conditions are also analyzed, furthermore, some suggestions on their engineering applications are proposed to help future research.
Joyce After Flaubert: the cuckold as imperfect physician, the writer as physiologist.
Bénéjam, Valérie
2008-01-01
Although Joyce was not as familiar with the practice and theory of medicine as was Gustave Flaubert, this article argues that, through Flaubert's legacy, Joyce's writing was influenced by the French school of medical thought. Several aspects of Flaubert's style and narration-what has been dubbed his "medical realism"-were taken up by Joyce: the artist's impersonal perspective, the precision of descriptions, and the materialist attack against Romanticism, as well as the irony built into the narrative voice through free indirect discourse. While the cuckold in Madame Bovary is an incompetent surgeon serving as foil to the precise description of sentiments offered by the narrator, Joyce's cuckold in Ulysses is an amateur physiologist, both perspicacious and sympathetic to human suffering. Bloom's interest in internal bodily processes opens up new dimensions for a modernist aesthetics as he relates physiology and psychology, in accordance with the theories of Xavier Bichat, Etienne Bonnot de Condillac, and Pierre Jean Georges Cabanis. In keeping with such focus, Joyce's physiological version of stream-of-consciousness stems from Flaubert's clinical description of characters, but he directs matters even further inward.
Semipermanent GPS (SPGPS) as a volcano monitoring tool: Rationale, method, and applications
Dzurisin, Daniel; Lisowski, Michael; Wicks, Charles W.
2017-01-01
Semipermanent GPS (SPGPS) is an alternative to conventional campaign or survey-mode GPS (SGPS) and to continuous GPS (CGPS) that offers several advantages for monitoring ground deformation. Unlike CGPS installations, SPGPS stations can be deployed quickly in response to changing volcanic conditions or earthquake activity such as a swarm or aftershock sequence. SPGPS networks can be more focused or more extensive than CGPS installations, because SPGPS equipment can be moved from station to station quickly to increase the total number of stations observed in a given time period. SPGPS networks are less intrusive on the landscape than CGPS installations, which makes it easier to satisfy land-use restrictions in ecologically sensitive areas. SPGPS observations are preferred over SGPS measurements because they provide better precision with only a modest increase in the amount of time, equipment, and personnel required in the field. We describe three applications of the SPGPS method that demonstrate its utility and flexibility. At the Yellowstone caldera, Wyoming, a 9-station SPGPS network serves to densify larger preexisting networks of CGPS and SGPS stations. At the Three Sisters volcanic center, Oregon, a 14-station SPGPS network complements an SGPS network and extends the geographic coverage provided by 3 CGPS stations permitted under wilderness land-use restrictions. In the Basin and Range province in northwest Nevada, a 6-station SPGPS network has been established in response to a prolonged earthquake swarm in an area with only sparse preexisting geodetic coverage. At Three Sisters, the estimated precision of station velocities based on annual ~ 3 month summertime SPGPS occupations from 2009 to 2015 is approximately half that for nearby CGPS stations. Conversely, SPGPS-derived station velocities are about twice as precise as those based on annual ~ 1 week SGPS measurements. After 5 years of SPGPS observations at Three Sisters, the precision of velocity determinations is estimated to be 0.5 mm/yr in longitude, 0.6 mm/yr in latitude, and 0.8 mm/yr in height. We conclude that an optimal approach to monitoring volcano deformation includes complementary CGPS and SPGPS networks, periodic InSAR observations, and measurements from in situ borehole sensors such as tiltmeters or strainmeters. This comprehensive approach provides the spatial and temporal detail necessary to adequately characterize a complex and evolving deformation pattern. Such information is essential to multi-parameter models of magmatic or tectonic processes that can help to guide research efforts, and also to inform hazards assessments and land-use planning decisions.
Semipermanent GPS (SPGPS) as a volcano monitoring tool: Rationale, method, and applications
NASA Astrophysics Data System (ADS)
Dzurisin, Daniel; Lisowski, Michael; Wicks, Charles W.
2017-09-01
Semipermanent GPS (SPGPS) is an alternative to conventional campaign or survey-mode GPS (SGPS) and to continuous GPS (CGPS) that offers several advantages for monitoring ground deformation. Unlike CGPS installations, SPGPS stations can be deployed quickly in response to changing volcanic conditions or earthquake activity such as a swarm or aftershock sequence. SPGPS networks can be more focused or more extensive than CGPS installations, because SPGPS equipment can be moved from station to station quickly to increase the total number of stations observed in a given time period. SPGPS networks are less intrusive on the landscape than CGPS installations, which makes it easier to satisfy land-use restrictions in ecologically sensitive areas. SPGPS observations are preferred over SGPS measurements because they provide better precision with only a modest increase in the amount of time, equipment, and personnel required in the field. We describe three applications of the SPGPS method that demonstrate its utility and flexibility. At the Yellowstone caldera, Wyoming, a 9-station SPGPS network serves to densify larger preexisting networks of CGPS and SGPS stations. At the Three Sisters volcanic center, Oregon, a 14-station SPGPS network complements an SGPS network and extends the geographic coverage provided by 3 CGPS stations permitted under wilderness land-use restrictions. In the Basin and Range province in northwest Nevada, a 6-station SPGPS network has been established in response to a prolonged earthquake swarm in an area with only sparse preexisting geodetic coverage. At Three Sisters, the estimated precision of station velocities based on annual 3 month summertime SPGPS occupations from 2009 to 2015 is approximately half that for nearby CGPS stations. Conversely, SPGPS-derived station velocities are about twice as precise as those based on annual 1 week SGPS measurements. After 5 years of SPGPS observations at Three Sisters, the precision of velocity determinations is estimated to be 0.5 mm/yr in longitude, 0.6 mm/yr in latitude, and 0.8 mm/yr in height. We conclude that an optimal approach to monitoring volcano deformation includes complementary CGPS and SPGPS networks, periodic InSAR observations, and measurements from in situ borehole sensors such as tiltmeters or strainmeters. This comprehensive approach provides the spatial and temporal detail necessary to adequately characterize a complex and evolving deformation pattern. Such information is essential to multi-parameter models of magmatic or tectonic processes that can help to guide research efforts, and also to inform hazards assessments and land-use planning decisions.
NASA Astrophysics Data System (ADS)
Powell, J. W.; Westphal, D. A.
1991-08-01
A workshop to obtain input from industry on the establishment of the Precision Joining Center (PJC) was held on July 10-12, 1991. The PJC is a center for training Joining Technologists in advanced joining techniques and concepts in order to promote the competitiveness of U.S. industry. The center will be established as part of the DOE Defense Programs Technology Commercialization Initiative, and operated by EG&G Rocky Flats in cooperation with the American Welding Society and the Colorado School of Mines Center for Welding and Joining Research. The overall objectives of the workshop were to validate the need for a Joining Technologists to fill the gap between the welding operator and the welding engineer, and to assure that the PJC will train individuals to satisfy that need. The consensus of the workshop participants was that the Joining Technologist is a necessary position in industry, and is currently used, with some variation, by many companies. It was agreed that the PJC core curriculum, as presented, would produce a Joining Technologist of value to industries that use precision joining techniques. The advantage of the PJC would be to train the Joining Technologist much more quickly and more completely. The proposed emphasis of the PJC curriculum on equipment intensive and hands-on training was judged to be essential.
Applied 3D printing for microscopy in health science research
NASA Astrophysics Data System (ADS)
Brideau, Craig; Zareinia, Kourosh; Stys, Peter
2015-03-01
The rapid prototyping capability offered by 3D printing is considered advantageous for commercial applications. However, the ability to quickly produce precision custom devices is highly beneficial in the research laboratory setting as well. Biological laboratories require the manipulation and analysis of delicate living samples, thus the ability to create custom holders, support equipment, and adapters allow the extension of existing laboratory machines. Applications include camera adapters and stage sample holders for microscopes, surgical guides for tissue preparation, and small precision tools customized to unique specifications. Where high precision is needed, especially the reproduction of fine features, a printer with a high resolution is needed. However, the introduction of cheaper, lower resolution commercial printers have been shown to be more than adequate for less demanding projects. For direct manipulation of delicate samples, biocompatible raw materials are often required, complicating the printing process. This paper will examine some examples of 3D-printed objects for laboratory use, and provide an overview of the requirements for 3D printing for this application. Materials, printing resolution, production, and ease of use will all be reviewed with an eye to producing better printers and techniques for laboratory applications. Specific case studies will highlight applications for 3D-printed devices in live animal imaging for both microscopy and Magnetic Resonance Imaging.
Carrier-separating demodulation of phase shifting self-mixing interferometry
NASA Astrophysics Data System (ADS)
Tao, Yufeng; Wang, Ming; Xia, Wei
2017-03-01
A carrier separating method associated with noise-elimination had been introduced into a sinusoidal phase-shifting self-mixing interferometer. The conventional sinusoidal phase shifting self-mixing interferometry was developed into a more competitive instrument with high computing efficiency and nanometer accuracy of λ / 100 in dynamical vibration measurement. The high slew rate electro-optic modulator induced a sinusoidal phase carrier with ultralow insertion loss in this paper. In order to extract phase-shift quickly and precisely, this paper employed the carrier-separating to directly generate quadrature signals without complicated frequency domain transforms. Moreover, most noises were evaluated and suppressed by a noise-elimination technology synthesizing empirical mode decomposition with wavelet transform. The overall laser system was described and inherent advantages such as high computational efficiency and decreased nonlinear errors of the established system were demonstrated. The experiment implemented on a high precision PZT (positioning accuracy was better than 1 nm) and compared with laser Doppler velocity meter. The good agreement of two instruments shown that the short-term resolution had improved from 10 nm to 1.5 nm in dynamic vibration measurement with reduced time expense. This was useful in precision measurement to improve the SMI with same sampling rate. The proposed signal processing was performed in pure time-domain requiring no preprocessing electronic circuits.
Aboud, Maurice J; Gassmann, Marcus; McCord, Bruce
2015-09-01
There are situations in which it is important to quickly and positively identify an individual. Examples include suspects detained in the neighborhood of a bombing or terrorist incident, individuals detained attempting to enter or leave the country, and victims of mass disasters. Systems utilized for these purposes must be fast, portable, and easy to maintain. DNA typing methods provide the best biometric information yielding identity, kinship, and geographical origin, but they are not portable and rapid. This study details the development of a portable short-channel microfluidic device based on a modified Agilent 2100 bioanalyzer for applications in forensic genomics. The system utilizes a denaturing polymer matrix with dual-channel laser-induced fluorescence and is capable of producing a genotype in 80 sec. The device was tested for precision and resolution using an allelic ladder created from 6 short tandem repeat (STR) loci and a sex marker (amelogenin). The results demonstrated a precision of 0.09-0.21 bp over the entire size range and resolution values from 2.5 to 4.1 bp. Overall, the results demonstrate the chip provides a portable, rapid, and precise method for screening amplified short tandem repeats and human identification screening. © 2015 American Academy of Forensic Sciences.
Yasumatsu, Naoya; Watanabe, Shinichi
2012-02-01
We propose and develop a method to quickly and precisely determine the polarization direction of coherent terahertz electromagnetic waves generated by femtosecond laser pulses. The measurement system consists of a conventional terahertz time-domain spectroscopy system with the electro-optic (EO) sampling method, but we add a new functionality in the EO crystal which is continuously rotating with the angular frequency ω. We find a simple yet useful formulation of the EO signal as a function of the crystal orientation, which enables a lock-in-like detection of both the electric-field amplitude and the absolute polarization direction of the terahertz waves with respect to the probe laser pulse polarization direction at the same time. The single measurement finishes around two periods of the crystal rotations (∼21 ms), and we experimentally prove that the accuracy of the polarization measurement does not suffer from the long-term amplitude fluctuation of the terahertz pulses. Distribution of the measured polarization directions by repeating the measurements is excellently fitted by a gaussian distribution function with a standard deviation of σ = 0.56°. The developed technique is useful for the fast direct determination of the polarization state of the terahertz electromagnetic waves for polarization imaging applications as well as the precise terahertz Faraday or Kerr rotation spectroscopy.
Rudolph, Heike; Quaas, Sebastian; Haim, Manuela; Preißler, Jörg; Walter, Michael H; Koch, Rainer; Luthardt, Ralph G
2013-06-01
The use of fast-setting impression materials with different viscosities for the one-stage impression technique demands precise working times when mixing. We examined the effect of varying working time on impression precision in a randomized clinical trial. Focusing on tooth 46, three impressions were made from each of 96 volunteers, using either a polyether (PE: Impregum Penta H/L DuoSoft Quick, 3 M ESPE) or an addition-curing silicone (AS: Aquasil Ultra LV, Dentsply/DeTrey), one with the manufacturer's recommended working time (used as a reference) and two with altered working times. All stages of the impression-taking were subject to randomization. The three-dimensional precision of the non-standard working time impressions was digitally analyzed compared to the reference impression. Statistical analysis was performed using multivariate models. The mean difference in the position of the lower right first molar (vs. the reference impression) ranged from ±12 μm for PE to +19 and -14 μm for AS. Significantly higher mean values (+62 to -40 μm) were found for AS compared to PE (+21 to -26 μm) in the area of the distal adjacent tooth. Fast-set impression materials offer high precision when used for single tooth restorations as part of a one-stage impression technique, even when the working time (mixing plus application of the light- and heavy-body components) diverges significantly from the manufacturer's recommended protocol. Best accuracy was achieved with machine-mixed heavy-body/light-body polyether. Both materials examined met the clinical requirements regarding precision when the teeth were completely syringed with light material.
NASA Astrophysics Data System (ADS)
Rodi, A. R.; Leon, D. C.
2012-11-01
A method is described that estimates the error in the static pressure measurement on an aircraft from differential pressure measurements on the hemispherical surface of a Rosemount model 858AJ air velocity probe mounted on a boom ahead of the aircraft. The theoretical predictions for how the pressure should vary over the surface of the hemisphere, involving an unknown sensitivity parameter, leads to a set of equations that can be solved for the unknowns - angle of attack, angle of sideslip, dynamic pressure and the error in static pressure - if the sensitivity factor can be determined. The sensitivity factor was determined on the University of Wyoming King Air research aircraft by comparisons with the error measured with a carefully designed sonde towed on connecting tubing behind the aircraft - a trailing cone - and the result was shown to have a precision of about ±10 Pa over a wide range of conditions, including various altitudes, power settings, and gear and flap extensions. Under accelerated flight conditions, geometric altitude data from a combined Global Navigation Satellite System (GNSS) and inertial measurement unit (IMU) system are used to estimate acceleration effects on the error, and the algorithm is shown to predict corrections to a precision of better than ±20 Pa under those conditions. Some limiting factors affecting the precision of static pressure measurement on a research aircraft are discussed.
Microwave (EPR) measurements of the penetration depth measurements of high-Tc superconductors
NASA Technical Reports Server (NTRS)
Dalal, N. S.; Rakvin, B.; Mahl, T. A.; Bhalla, A. S.; Sheng, Z. Z.
1991-01-01
The use is discussed of electron paramagnetic resonance (EPR) as a quick and easily accessible method for measuring the London penetration depth, lambda for the high T sub c superconductors. The method uses the broadening of the EPR signal, due to the emergence of the magnetic flux lattice, of a free radical adsorbed on the surface of the sample. The second moment, of the EPR signal below T sub c is fitted to the Brandt equation for a simple triangular lattice. The precision of this method compares quite favorably with those of the more standard methods such as micro sup(+)SR, neutron scattering, and magnetic susceptibility.
Research of PV Power Generation MPPT based on GABP Neural Network
NASA Astrophysics Data System (ADS)
Su, Yu; Lin, Xianfu
2018-05-01
Photovoltaic power generation has become the main research direction of new energy power generation. But high investment and low efficiency of photovoltaic industry arouse concern in some extent. So maximum power point tracking of photovoltaic power generation has been a popular study point. Due to slow response, oscillation at maximum power point and low precision, the algorithm based on genetic algorithm combined with BP neural network are designed detailedly in this paper. And the modeling and simulation are completed by use of MATLAB/SIMULINK. The results show that the algorithm is effective and the maximum power point can be tracked accurately and quickly.
Reinforcement learning in complementarity game and population dynamics
NASA Astrophysics Data System (ADS)
Jost, Jürgen; Li, Wei
2014-02-01
We systematically test and compare different reinforcement learning schemes in a complementarity game [J. Jost and W. Li, Physica A 345, 245 (2005), 10.1016/j.physa.2004.07.005] played between members of two populations. More precisely, we study the Roth-Erev, Bush-Mosteller, and SoftMax reinforcement learning schemes. A modified version of Roth-Erev with a power exponent of 1.5, as opposed to 1 in the standard version, performs best. We also compare these reinforcement learning strategies with evolutionary schemes. This gives insight into aspects like the issue of quick adaptation as opposed to systematic exploration or the role of learning rates.
An EPR methodology for measuring the London penetration depth for the ceramic superconductors
NASA Technical Reports Server (NTRS)
Rakvin, B.; Mahl, T. A.; Dalal, N. S.
1990-01-01
The use is discussed of electron paramagnetic resonance (EPR) as a quick and easily accessible method for measuring the London penetration depth, lambda for the high T(sub c) superconductors. The method utilizes the broadening of the EPR signal, due to the emergence of the magnetic flux lattice, of a free radical adsorbed on the surface of the sample. The second moment, of the EPR signal below T(sub c) is fitted to the Brandt equation for a simple triangular lattice. The precision of this method compares quite favorably with those of the more standard methods such as micro sup(+)SR, Neutron scattering, and magnetic susceptibility.
[Sinonasal fungal infections are not exclusively due to mucorales and Aspergillus!].
Tauziède-Espariat, Arnault; Wassef, Michel; Adle-Biassette, Homa; Alanio, Alexandre; Bretagne, Stéphane; Lanternier, Fanny; Boui, Mohammed; Bouchaud, Olivier; Vironneau, Pierre; Kania, Romain; Jouvion, Grégory; Chrétien, Fabrice; Classe, Marion
2016-08-01
Rhino-sinusal infections are serious diseases and possibly lethal. When they are invasive, we easily discuss apergilloses and mucormycoses. The confirmation of the diagnosis of mucormycosis need an extensive surgery for precise histopathological and mycological evaluation. The pathologist may be faced to other rare mycoses such as phaeohyphomycoses, which present different morphological features than mucormycoses and Aspergillus. Once the diagnosis is established, an appropriate antifungal treatment is quickly started. The aim of our work is to report two observations of phaeohyphomycoses, to describe their histopathological features, to discuss complementary diagnostic methods and to present the main differential diagnoses. Copyright © 2016 Elsevier Masson SAS. All rights reserved.
High precision active nutation control for a flexible momentum biased spacecraft
NASA Technical Reports Server (NTRS)
Laskin, R. A.; Kopf, E. H.
1984-01-01
The controller design for the Solar Dynamics Observatory (SDO) is presented. SDO is a momentum biased spacecraft with three flexible appendages. Its primary scientific instrument, the solar oscillations imager (SOI), is rigidly attached to the spacecraft bus and has arc-second pointing requirements. Meeting these requirements necessitates the use of an active nutation controller (ANC) which is here mechanized with a small reaction wheel oriented along a bus transverse axis. The ANC does its job by orchestrating the transfer of angular momentum out of the bus transverse axes and into the momentum wheel. A simulation study verifies that the controller provides quick, stable, and accurate response.
Spectrophotometric estimation of bromide ion in excess chloride media.
Adimurthy, S; Susarla, V R K S; Reddy, M P; Ramachandraiah, G
2005-10-31
The redox reaction between bromate and chloride ions in the presence and the absence of two or less equivalents of bromide ion ascertaining the formation of bromine chloride species of type BrCl and BrCl(2)(-) in subsequent reactions in 4% H(2)SO(4), has been studied by spectrophotometry. Calibration graphs for the bromide ion estimation in 0.1% KBrO(3)-4% H(2)SO(4) medium are determined separately in the presence of known amounts of NaCl. The effect of Cl(-) ion percentage on the determination of Br(-) ion is studied and reported herewith a suitable equation for a precise, reliable and quick spectrophotometric estimation.
NASA Astrophysics Data System (ADS)
Driandanu, Galih; Surarso, Bayu; Suryono
2018-02-01
A radio frequency identification (RFID) has obtained increasing attention with the emergence of various applications. This study aims to examine the implementation of rule based expert system supported by RFID technology into a monitoring information system of drug supply in a hospital. This research facilitates in monitoring the real time drug supply by using data sample from the hospital pharmacy. This system able to identify and count the number of drug and provide warning and report in real time. the conclusion is the rule based expert system and RFID technology can facilitate the performance in monitoring the drug supply quickly and precisely.
Uav-Based 3d Urban Environment Monitoring
NASA Astrophysics Data System (ADS)
Boonpook, Wuttichai; Tan, Yumin; Liu, Huaqing; Zhao, Binbin; He, Lingfeng
2018-04-01
Unmanned Aerial Vehicle (UAV) based remote sensing can be used to make three-dimensions (3D) mapping with great flexibility, besides the ability to provide high resolution images. In this paper we propose a quick-change detection method on UAV images by combining altitude from Digital Surface Model (DSM) and texture analysis from images. Cases of UAV images with and without georeferencing are both considered. Research results show that the accuracy of change detection can be enhanced with georeferencing procedure, and the accuracy and precision of change detection on UAV images which are collected both vertically and obliquely but without georeferencing also have a good performance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ryan, M.T.; Butler, H.M.; Gupton, E.D.
The UCC-ND Employee Identification Badge contains an indium foil disc that is intended for use as a dosimetry screening device in the event of a criticality accident. While it is recognized that indium is not a precise mixed neutron-gamma dosimeter, its activation by neutrons provides adequate means for separating potentially exposed persons into three groups. These groups are: (1) personnel exposed below annual dose limits, (2) personnel exposed above annual dose limits but below 25 rem, and (3) personnel exposed above 25 rem. This screening procedure is designed to facilitate dosimeter processing in order to meet regulatory reporting requirements. Amore » quick method of interpreting induced activity measurements is presented and discussed.« less
The Fundamentals of Using the Digital Micromirror Device (DMD(TM)) for Projection Display
NASA Technical Reports Server (NTRS)
Yoder, Lars A.
1995-01-01
Developed by Texas Instruments (TI) the digital micromirror device (DMD(tm)) is a quickly emerging and highly useful micro-electro-mechanical structures (MEMS) device. Using standard semiconductor fabrication technology, the DMD's simplicity in concept and design will provide advantageous solutions for many different applications. At the rudimentary level, the DMD is a precision, semiconductor light switch. In the initial commercial development of DMD technology, TI has concentrated on projection display and hardcopy. This paper will focus on how the DMD is used for projection display. Other application areas are being explored and evaluated to find appropriate and beneficial uses for the DMD.
Mass sensors with mechanical traps for weighing single cells in different fluids.
Weng, Yaochung; Delgado, Francisco Feijó; Son, Sungmin; Burg, Thomas P; Wasserman, Steven C; Manalis, Scott R
2011-12-21
We present two methods by which single cells can be mechanically trapped and continuously monitored within the suspended microchannel resonator (SMR) mass sensor. Since the fluid surrounding the trapped cell can be quickly and completely replaced on demand, our methods are well suited for measuring changes in cell size and growth in response to drugs or other chemical stimuli. We validate our methods by measuring the density of single polystyrene beads and Saccharomyces cerevisiae yeast cells with a precision of approximately 10(-3) g cm(-3), and by monitoring the growth of single mouse lymphoblast cells before and after drug treatment.
Conic state extrapolation. [computer program for space shuttle navigation and guidance requirements
NASA Technical Reports Server (NTRS)
Shepperd, S. W.; Robertson, W. M.
1973-01-01
The Conic State Extrapolation Routine provides the capability to conically extrapolate any spacecraft inertial state vector either backwards or forwards as a function of time or as a function of transfer angle. It is merely the coded form of two versions of the solution of the two-body differential equations of motion of the spacecraft center of mass. Because of its relatively fast computation speed and moderate accuracy, it serves as a preliminary navigation tool and as a method of obtaining quick solutions for targeting and guidance functions. More accurate (but slower) results are provided by the Precision State Extrapolation Routine.
[Enzymatic analysis of the quality of foodstuffs].
Kolesnov, A Iu
1997-01-01
Enzymatic analysis is an independent and separate branch of enzymology and analytical chemistry. It has become one of the most important methodologies used in food analysis. Enzymatic analysis allows the quick, reliable determination of many food ingredients. Often these contents cannot be determined by conventional methods, or if methods are available, they are determined only with limited accuracy. Today, methods of enzymatic analysis are being increasingly used in the investigation of foodstuffs. Enzymatic measurement techniques are used in industry, scientific and food inspection laboratories for quality analysis. This article describes the requirements of an optimal analytical method: specificity, sample preparation, assay performance, precision, sensitivity, time requirement, analysis cost, safety of reagents.
Delavar Kasmaei, Hosein; Ghorbanifar, Zahra; Zayeri, Farid; Minaei, Bagher; Kamali, Seyed Hamid; Rezaeizadeh, Hossein; Amin, Gholamreza; Ghobadi, Ali; Mirzaei, Zohreh
2016-01-01
Background: Migraine is one of the most common and debilitating neurological problems. Although numerous preventive drugs are used to treat migraine, their complications are unavoidable. Application of herbal medicine, especially well-known medicinal plants, to treatment of chronic diseases, like migraine, could be effective. Coriandrum sativum L. (C. sativum) fruit is one of the most commonly prescribed herbs in Persian medicine, which has been used to treat headache. Objectives: This study was designed to evaluate the effects of C. sativum syrup on duration, severity and frequency of migraine. Patients and Methods: A total of 68 migraineurs, who had the eligibility criteria, according to international headache society diagnostic criteria, were randomly assigned to intervention group (n = 34) or control group (n = 34). In addition to 500 mg of sodium valproate per day, in intervention group, they received 15 mL of Coriander fruit syrup and 15 mL of placebo syrup, in control group, three times a day, during a month. The subjects were followed for clinical efficacy at weeks 1, 2, 3 and 4. The number of migraine attacks per week, as well as the duration and severity of attacks, were evaluated. Results: Of 68 patients randomized, 66 were included in analysis. The generalized estimating equations analysis showed that the Coriander fruit syrup decreased duration, severity and frequency of migraine, in the intervention group (P < 0.001). To be more precise, the mean migraine duration, severity and frequency, in the intervention group, were 5.7 hours, 3.65 units and about 50% less than control group, respectively. Conclusions: Results of this study showed that C. sativum fruit is efficient in reduction of the duration and frequency of migraine attacks and in diminishing pain degree. PMID:26889386
Multicasting for all-optical multifiber networks
NASA Astrophysics Data System (ADS)
Kã¶Ksal, Fatih; Ersoy, Cem
2007-02-01
All-optical wavelength-routed WDM WANs can support the high bandwidth and the long session duration requirements of the application scenarios such as interactive distance learning or on-line diagnosis of patients simultaneously in different hospitals. However, multifiber and limited sparse light splitting and wavelength conversion capabilities of switches result in a difficult optimization problem. We attack this problem using a layered graph model. The problem is defined as a k-edge-disjoint degree-constrained Steiner tree problem for routing and fiber and wavelength assignment of k multicasts. A mixed integer linear programming formulation for the problem is given, and a solution using CPLEX is provided. However, the complexity of the problem grows quickly with respect to the number of edges in the layered graph, which depends on the number of nodes, fibers, wavelengths, and multicast sessions. Hence, we propose two heuristics layered all-optical multicast algorithm [(LAMA) and conservative fiber and wavelength assignment (C-FWA)] to compare with CPLEX, existing work, and unicasting. Extensive computational experiments show that LAMA's performance is very close to CPLEX, and it is significantly better than existing work and C-FWA for nearly all metrics, since LAMA jointly optimizes routing and fiber-wavelength assignment phases compared with the other candidates, which attack the problem by decomposing two phases. Experiments also show that important metrics (e.g., session and group blocking probability, transmitter wavelength, and fiber conversion resources) are adversely affected by the separation of two phases. Finally, the fiber-wavelength assignment strategy of C-FWA (Ex-Fit) uses wavelength and fiber conversion resources more effectively than the First Fit.
Rubin, G James; Chowdhury, Alexander K; Amlôt, Richard
2012-12-01
A deliberate attack involving chemical, biological, radiological, or nuclear (CBRN) material has the potential to cause substantial fear among the public. This presents problems for communicators, who will need to provide information quickly after an attack while ensuring that their messages are easily understood and likely to be attended to by members of the public. Identifying in advance what people would want to know, where they would get information from, and how messages should be presented might allow communicators to ensure that their messages have the best chance of having their desired effect. In this review, we identified all peer-reviewed studies that have assessed communication strategies or information needs using hypothetical CBRN scenarios or in actual CBRN incidents. We identified 33 relevant studies. Their results support existing psychological models of why people engage in health protective behaviors, with information about the severity of the incident, the likelihood of being exposed, the efficacy and costs or risks of recommended behaviors, and the ability of individuals to perform recommended behaviors being sought by the public. Trust plays a crucial role in ensuring that people attend to messages. Finally, while a large variety of spokespeople and sources were identified as being turned to in the event of an incident, the use of multiple information sources was also common, affirming the importance of communicating a consistent message through multiple channels. Further research is required to extend these predominantly US-based findings to other countries and to confirm the findings of research using hypothetical scenarios.
Guidelines for the diagnosis and management of migraine in clinical practice
Pryse-Phillips, W E; Dodick, D W; Edmeads, J G; Gawel, M J; Nelson, R F; Purdy, R A; Robinson, G; Stirling, D; Worthington, I
1997-01-01
OBJECTIVE: To provide physicians and allied health care professionals with guidelines for the diagnosis and management of migraine in clinical practice. OPTIONS: The full range and quality of diagnostic and therapeutic methods available for the management of migraine. OUTCOMES: Improvement in the diagnosis and treatment of migraine, which will lead to a reduction in suffering, increased productivity and decreased economic burden. EVIDENCE AND VALUES: The creation of the guidelines followed a needs assessment by members of the Canadian Headache Society and included a statement of objectives; development of guidelines by multidisciplinary working groups using information from literature reviews and other resources; comparison of alternative clinical pathways and description of how published data were analysed; definition of the level of evidence for data in each case; evaluation and revision of the guidelines at a consensus conference held in Ottawa on Oct. 27-29, 1995; redrafting and insertion of tables showing key variables and data from various studies and tables of data with recommendations; and reassessment by all conference participants. BENEFITS, HARMS AND COSTS: Accuracy in diagnosis is a major factor in improving therapeutic effectiveness. Improvement in the precise diagnosis of migraine, coupled with a rational plan for the treatment of acute attacks and for prophylactic therapy, is likely to lead to substantial benefits in both human and economic terms. RECOMMENDATIONS: The diagnosis of migraine can be improved by using modified criteria of the International Headache Society as well as a semistructured patient interview technique. Appropriate treatment of symptoms should take into account the severity of the migraine attack, since most patients will have attacks of differing severity and can learn to use medication appropriate for each attack. When headaches are frequent or particularly severe, prophylactic therapy should be considered. Both the avoidance of migraine trigger factors and the application of nonpharmacological therapies play important roles in overall migraine management and will be addressed at a later date. VALIDATION: The guidelines are based on consensus of Canadian experts in neurology, emergency medicine, psychiatry, psychology, family medicine and pharmacology, and consumers. Previous guidelines did not exist. Field testing of the guidelines is in progress. PMID:9145054
Damage assessment of mission essential buildings based on simulation studies of low yield explosives
NASA Astrophysics Data System (ADS)
Allen, Thomas G. L.
2006-04-01
There has been a lack of investigations related to low yield explosives instigated by terrorist on small but high occupancy buildings. Also, mitigating the threat of terrorist attacks against high occupancy buildings with network equipment essential to the mission of an organization is a challenging task. At the same time, it is difficult to predict how, why, and when terrorists may attack theses assets. Many factors must be considered in creating a safe building environment. Although it is possible that the dominant threat mode may change in the future, bombings have historically been a favorite tactic of terrorists. Ingredients for homemade bombs are easily obtained on the open market, as are the techniques for making bombs. Bombings are easy and quick to execute. This paper discusses the problems with and provides insights of experience gained in analyzing small scale explosions on older military base buildings. In this study, we examine the placement of various bombs on buildings using the shock wave simulation code CTH and examine the damage effects on the interior of the building, particularly the damage that is incurred on a computer center. These simulation experiments provide data on the effectiveness of a building's security and an understanding of the phenomenology of shocks as they propagate through rooms and corridors. It's purpose is to motivate researchers to take the seriousness of small yield explosives on moderately sized buildings. Visualizations from this analysis are used to understand the complex flow of the air blasts around corridors and hallways. Finally, we make suggestions for improving the mitigation of such terrorist attacks. The intent of this study is not to provide breakthrough technology, but to provide a tool and a means for analyzing the material hardness of a building and to eventually provide the incentive for more security. The information mentioned in this paper is public domain information and easily available via the internet as well as in any public library or bookstore. Therefore, the information discussed in this paper is unclassified and in no way reveals any new methodology or new technology.
What Should Space Be Used For? Physical and Political Guidelines
NASA Astrophysics Data System (ADS)
Grego, Laura
2005-04-01
Space has long been important to the commercial, civil scientific, and military sectors, serving essential missions like communications, environmental monitoring and astronomical research, early warning of missile attack, and precision navigation. However, rhetoric, official planning documents, and funded military research programs show that the current administration has a vision for space that significantly departs from long-held norms. This new vision includes four additional missions for satellites: 1) ballistic missile defense, 2) attacking targets on the ground 3) protecting other satellites, and 4) denying other users the ability to operate in space. Such a dramatic change deserves a thorough vetting. The discussion can be organized into three main types of issues: The first are international and strategic issues, such as how space weaponization may affect national and international security and stability; and, in space, what are the roles of weapons versus treaties and cooperation? Second: how useful would space actually be for these four proposed military missions? The laws of physics and the current state of technology will strongly limit what orbiting craft can do. And third: how may these new uses of space affect other current and future users of space? And what are the proper guidelines for the equitable use and longterm stewardship of space?
Meeting blood requirements following terrorist attacks: the Israeli experience.
Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G
2006-11-01
Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.
Sleep and chronobiology in cluster headache.
Barloese, M; Lund, N; Petersen, A; Rasmussen, M; Jennum, P; Jensen, R
2015-10-01
Cluster headache (CH) is the headache disorder with the strongest chronobiological traits. The severe attacks of pain occur with diurnal and annual rhythmicity but the precise rhythm and involvement of potential zeitgebers is unknown. Patients complain of poor sleep quality yet this has never been studied. We investigated triggers, rhythms, sleep quality and chronotypes in CH. Patients and controls completed questionnaires and structured interviews composed of new and previously validated parts including the Pittsburgh Sleep Quality Index (PSQI) and Morningness-Eveningness Questionnaire (MEQ). Patients were characterized by a CH index, a unified measure of headache burden. A total of 275 CH patients and 145 matched controls were included. The most common trigger was sleep (80%) and a relationship between clusters and daylight was identified. Of the patients, 82.2% reported diurnal and 56% annual rhythmicity. Patients reported impaired sleep quality (PSQI) (p < 0.0001) and an inverse relationship between time passed since last attack and sleep quality was identified (p < 0.0001). The CH index was positively related to the PSQI (p < 0.0001). Diurnally, CH exhibits a relationship with night-time and annually with daylight hours. Patients' sleep quality is reduced compared with controls. Results suggest a complex relationship as sleep quality improves between clusters, but remains pathological. © International Headache Society 2015.
King, Everett Louis
1980-01-01
Criteria for the classification of marks inflicted by sea lamprey (Petromyzon marinus) into nine categories were developed from laboratory studies in an attempt to refine the classification system used in field assessment work. These criteria were based on characteristics of the attachment site that could be identified under field conditions by unaided visual means and by touching the attachment site. Healing of these marks was somewhat variable and was influenced by the size of lamprey, duration of attachment, severity of the wound at lamprey detachment, season and water temperature, and by other less obvious factors. Even under laboratory conditions staging of some wounds was difficult, especially at low water temperatures. If these criteria are to be used effectively and with precision in the field, close examination of individual fish may be required. If the feeding and density of specific year-classes of sea lampreys are to be accurately assessed on an annual basis, close attention to the wound size (as it reflects the size of the lamprey's oral disc) and character of wounds on fish will be required as well as consideration of the season of the year in which they are observed.Key words: sea lamprey, attack marks, lake trout, Great Lakes
Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks
NASA Astrophysics Data System (ADS)
Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai
2017-09-01
Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.
Avanesyan, Alina; Jaffe, Benjamin D.; Guédot, Christelle
2017-01-01
The spotted wing drosophila, Drosophila suzukii (Diptera: Drosophilidae), is an emerging invasive pest, which attacks a wide variety of fruits and berries. Although previous studies have focused on different aspects of D. suzukii reproductive biology, there are no protocols available for determining the mating status of D. suzukii females and drosophilids in general. In this study, a step-by-step protocol for tissue dissection, isolating spermathecae, and determining the mating status of females was developed specifically for D. suzukii. This protocol is an effective and relatively quick method for determining female mating status. It has important applications from exploring reproductive output of D. suzukii females to understanding the biology of D. suzukii winter morph, which presumably plays the main role in the overwintering of this invasive species. We demonstrated applicability of this protocol for both field collected flies and flies reared in the lab, including fly specimens stored on a long-term basis. PMID:28287438
Mortar radiocarbon dating: preliminary accuracy evaluation of a novel methodology.
Marzaioli, Fabio; Lubritto, Carmine; Nonni, Sara; Passariello, Isabella; Capano, Manuela; Terrasi, Filippo
2011-03-15
Mortars represent a class of building and art materials that are widespread at archeological sites from the Neolithic period on. After about 50 years of experimentation, the possibility to evaluate their absolute chronology by means of radiocarbon ((14)C) remains still uncertain. With the use of a simplified mortar production process in the laboratory environment, this study shows the overall feasibility of a novel physical pretreatment for the isolation of the atmospheric (14)CO(2) (i.e., binder) signal absorbed by the mortars during their setting. This methodology is based on the assumption that an ultrasonic attack in liquid phase isolates a suspension of binder carbonates from bulk mortars. Isotopic ((13)C and (14)C), % C, X-ray diffractometry (XRD), and scanning electron microscopy (SEM) analyses were performed to characterize the proposed methodology. The applied protocol allows suppression of the fossil carbon (C) contamination originating from the incomplete burning of the limestone during the quick lime production, providing unbiased dating for "laboratory" mortars produced operating at historically adopted burning temperatures.
Technologies for diagnosis and treatment of acute stroke
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fitch, J.P.
1998-02-09
From October 1994 to June 1997, a multidisciplinary team of scientists and engineers at Lawrence Livermore National Laboratory were funded through LDRD to develop and integrate technologies for diagnosis and treatment of acute stroke. The project was summarized in a Science and Technology Review article `Brain Attack` that appeared in June 1997 and again in the Center for Healthcare Technologies Report (UCRL-LR-124761). This article is the best overview of the project, epidemiology of stroke and technical progress. Most of the technical progress has been documented in conference papers and presentations and refereed journal articles. Additional technical publication can be expectedmore » as our remaining patent applications progress through the US Patent and Trademark Office. The purpose of this report is to provide an appropriate introduction and organization to the numerous publications so that interested readers can quickly find information. Because there is no documentation for the history of this project, this report provides a summary. It also provides the final status report for the LDRD funding.« less
The role of predators in maintaining the geographic organization of aposematic signals.
Chouteau, Mathieu; Angers, Bernard
2011-12-01
Selective predation of aposematic signals is expected to promote phenotypic uniformity. But while these signals may be uniform within a population, numerous species display impressive variations in warning signals among adjacent populations. Predators from different localities who learn to avoid distinct signals while performing intense selection on others are thus expected to maintain such a geographic organization. We tested this assumption by placing clay frog models, representing distinct color morphs of the Peruvian poison dart frog Ranitomeya imitator and a nonconspicuous frog, reciprocally between adjacent localities. In each locality, avian predators were able to discriminate between warning signals; the adjacent exotic morph experienced up to four times more attacks than the local one and two times more than the nonconspicuous phenotype. Moreover, predation attempts on the exotic morph quickly decreased to almost nil, suggesting rapid learning. This experiment offers direct evidence for the existence of different predator communities performing localized homogenizing selection on distinct aposematic signals.
Nitrocobinamide, a New Cyanide Antidote That Can Be Administered by Intramuscular Injection
Chan, Adriano; Jiang, Jingjing; Fridman, Alla; Guo, Ling T.; Shelton, G. Diane; Liu, Ming-Tao; Green, Carol; Haushalter, Kristofer J.; Patel, Hemal H.; Lee, Jangwoen; Yoon, David; Burney, Tanya; Mukai, David; Mahon, Sari B.; Brenner, Matthew; Pilz, Renate B.; Boss, Gerry R.
2015-01-01
Currently available cyanide antidotes must be given by intravenous injection over 5–10 min, making them illsuited for treating many people in the field, as could occur in a major fire, an industrial accident, or a terrorist attack. These scenarios call for a drug that can be given quickly, e.g., by intramuscular injection. We have shown that aquohydroxocobinamide is a potent cyanide antidote in animal models of cyanide poisoning, but it is unstable in solution and poorly absorbed after intramuscular injection. Here we show that adding sodium nitrite to cobinamide yields a stable derivative (referred to as nitrocobinamide) that rescues cyanide-poisoned mice and rabbits when given by intramuscular injection. We also show that the efficacy of nitrocobinamide is markedly enhanced by coadministering sodium thiosulfate (reducing the total injected volume), and we calculate that ∼1.4 mL each of nitrocobinamide and sodium thiosulfate should rescue a human from a lethal cyanide exposure. PMID:25650735
A self-pumping lab-on-a-chip for rapid detection of botulinum toxin.
Lillehoj, Peter B; Wei, Fang; Ho, Chih-Ming
2010-09-07
A robust poly(dimethylsiloxane) (PDMS) surface treatment was utilized for the development of a self-pumping lab-on-a-chip (LOC) to rapidly detect minute quantities of toxic substances. One such toxin, botulinum neurotoxin (BoNT), is an extremely lethal substance, which has the potential to cause hundreds of thousands of fatalities if as little as a few grams are released into the environment. To prevent such an outcome, a quick (<45 min) and sensitive detection format is needed. We have developed a self-pumping LOC that can sense down to 1 pg of BoNT type A (in a 1 microL sample) within 15 min in an autonomous manner. The key technologies enabling for such a device are a sensitive electrochemical sensor, an optimized fluidic network and a robust hydrophilic PDMS coating, thereby facilitating autonomous delivery of liquid samples for rapid detection. The stability, simplicity and portability of this device make possible for a storable and distributable system for monitoring bioterrorist attacks.
NASA Astrophysics Data System (ADS)
Huehnerhoff, Joseph; Ketzeback, William; Bradley, Alaina; Dembicky, Jack; Doughty, Caitlin; Hawley, Suzanne; Johnson, Courtney; Klaene, Mark; Leon, Ed; McMillan, Russet; Owen, Russell; Sayres, Conor; Sheen, Tyler; Shugart, Alysha
2016-08-01
The Astrophysical Research Consortium Telescope Imaging Camera, ARCTIC, is a new optical imaging camera now in use at the Astrophysical Research Consortium (ARC) 3.5m telescope at Apache Point Observatory (APO). As a facility instrument, the design criteria broadly encompassed many current and future science opportunities, and the components were built for quick repair or replacement, to minimize down-time. Examples include a quick change shutter, filter drive components accessible from the exterior and redundant amplifiers on the detector. The detector is a Semiconductor Technology Associates (STA) device with several key properties (e.g. high quantum efficiency, low read-noise, quick readout, minimal fringing, operational bandpass 350-950nm). Focal reducing optics (f/10.3 to f/8.0) were built to control aberrations over a 7.8'x7.8' field, with a plate scale of 0.11" per 0.15 micron pixel. The instrument body and dewar were designed to be simple and robust with only two components to the structure forward of the dewar, which in turn has minimal feedthroughs and permeation areas and holds a vacuum <10-8 Torr. A custom shutter was also designed, using pneumatics as the driving force. This device provides exceptional performance and reduces heat near the optical path. Measured performance is repeatable at the 2ms level and offers field uniformity to the same level of precision. The ARCTIC facility imager will provide excellent science capability with robust operation and minimal maintenance for the next decade or more at APO.
Saraiva, M; Cavalheiro, J; Lanceleur, L; Monperrus, M
2016-06-01
This study aims at developing a method for the determination of 9 synthetic musk compounds in seafood products by combining the quick, easy, cheap, effective, rugged, and safe (QuEChERS) method and determination by gas chromatography mass spectrometry (GC-EI-MS). Method detection limits (MDL) ranging between 0.001 and 1.94 ng g(-1) were obtained. The linearity is higher than 0.9899 in the range MDL - 100 ng g(-1) with precision below 18% and recoveries between 46% and 120% were obtained. The method was applied to quantify musk compounds in seafood products from the European southwest coast (oysters, mussels, salmon organs, glass eels). Galaxolide and Tonalide exhibited the highest concentration levels ranging between MDL - 96.4 ng g(-1) and MDL - 6.85 ng g(-1), respectively. Contamination levels observed for the two nitro musks (musk xylene and musk ketone) are significantly lower ranging between MDL - 0.6 ng g(-1) and MDL - 0.09 ng g(-1), respectively. Analysis of different organs of salmons showed higher concentrations in liver and gonad than in muscle tissues. Copyright © 2016 Elsevier Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Theodore, Colin R.; Tischler, Mark B.
2010-01-01
An automatic rotor trim control system was developed and successfully used during a wind tunnel test of a full-scale UH-60 rotor system with Individual Blade Control (IBC) actuators. The trim control system allowed rotor trim to be set more quickly, precisely and repeatably than in previous wind tunnel tests. This control system also allowed the rotor trim state to be maintained during transients and drift in wind tunnel flow, and through changes in IBC actuation. The ability to maintain a consistent rotor trim state was key to quickly and accurately evaluating the effect of IBC on rotor performance, vibration, noise and loads. This paper presents details of the design and implementation of the trim control system including the rotor system hardware, trim control requirements, and trim control hardware and software implementation. Results are presented showing the effect of IBC on rotor trim and dynamic response, a validation of the rotor dynamic simulation used to calculate the initial control gains and tuning of the control system, and the overall performance of the trim control system during the wind tunnel test.
Program for Editing Spacecraft Command Sequences
NASA Technical Reports Server (NTRS)
Gladden, Roy; Waggoner, Bruce; Kordon, Mark; Hashemi, Mahnaz; Hanks, David; Salcedo, Jose
2006-01-01
Sequence Translator, Editor, and Expander Resource (STEER) is a computer program that facilitates construction of sequences and blocks of sequences (hereafter denoted generally as sequence products) for commanding a spacecraft. STEER also provides mechanisms for translating among various sequence product types and quickly expanding activities of a given sequence in chronological order for review and analysis of the sequence. To date, construction of sequence products has generally been done by use of such clumsy mechanisms as text-editor programs, translating among sequence product types has been challenging, and expanding sequences to time-ordered lists has involved arduous processes of converting sequence products to "real" sequences and running them through Class-A software (defined, loosely, as flight and ground software critical to a spacecraft mission). Also, heretofore, generating sequence products in standard formats has been troublesome because precise formatting and syntax are required. STEER alleviates these issues by providing a graphical user interface containing intuitive fields in which the user can enter the necessary information. The STEER expansion function provides a "quick and dirty" means of seeing how a sequence and sequence block would expand into a chronological list, without need to use of Class-A software.
NASA Technical Reports Server (NTRS)
Theodore, Colin R.
2010-01-01
A full-scale wind tunnel test to evaluate the effects of Individual Blade Control (IBC) on the performance, vibration, noise and loads of a UH-60A rotor was recently completed in the National Full-Scale Aerodynamics Complex (NFAC) 40- by 80-Foot Wind Tunnel [1]. A key component of this wind tunnel test was an automatic rotor trim control system that allowed the rotor trim state to be set more precisely, quickly and repeatably than was possible with the rotor operator setting the trim condition manually. The trim control system was also able to maintain the desired trim condition through changes in IBC actuation both in open- and closed-loop IBC modes, and through long-period transients in wind tunnel flow. This ability of the trim control system to automatically set and maintain a steady rotor trim enabled the effects of different IBC inputs to be compared at common trim conditions and to perform these tests quickly without requiring the rotor operator to re-trim the rotor. The trim control system described in this paper was developed specifically for use during the IBC wind tunnel test
Light, D A
2001-01-01
The merger announcement between DeWaal Pharmaceuticals and BioHealth Labs was front-page news. Pictures of CEO Steve Lindell and chairman Kaspar van de Velde had appeared in newspapers around the world. Two months later, the press had moved on to a new story, and the hard labor of integration loomed. Steve had worked tirelessly to clear regulatory hurdles, and all signs pointed toward approval in the near future. Now Steve was feeling pressure to attack the real challenge of the merger: bringing together two very different cultures as quickly and efficiently as possible. DeWaal was an established drug-maker based in the Netherlands, and BioHealth, headquartered just north of New York City, had in recent years become competitive at the highest tier of the market. The first step in integrating the two companies was to select the top layers of management for the new company. At the moment, there were some 120 people on two continents for about 65 senior-level jobs. Steve's urgency was not without cause: talented people from both sides were jumping ship, and BioHealth's stock price had dipped 20% after the initial euphoria over the deal had worn off. Complicating matters was confusion over who was really in charge: Steve wanted to take leadership and move ahead rapidly, but he was often disarmed by Kaspar's charming persuasiveness. As the two men attempt to work through the important personnel issues during a lunch meeting, they quickly hit a roadblock. How can they come to agreement about who goes and who stays? Four commentators offer advice in response to this fictional case.
Advances in handheld FT-IR instrumentation
NASA Astrophysics Data System (ADS)
Arnó, Josep; Cardillo, Len; Judge, Kevin; Frayer, Maxim; Frunzi, Michael; Hetherington, Paul; Levy, Dustin; Oberndorfer, Kyle; Perec, Walter; Sauer, Terry; Stein, John; Zuidema, Eric
2012-06-01
FT-IR spectroscopy is the technology of choice to identify solid and liquid phase unknown samples. The challenges of ConOps (Concepts of Operation) in emergency response and military field applications require a significant redesign of the stationary FT-IR bench-top instruments typically used in laboratories. Specifically, field portable units require high levels of resistance against mechanical shock and chemical attack, ease of use in restrictive gear, quick and easy interpretation of results, and reduced size. In the last 20 years, FT-IR instruments have been re-engineered to fit in small suitcases for field portable use and recently further miniaturized for handheld operation. This article introduces the advances resulting from a project designed to overcome the challenges associated with miniaturizing FT-IR instruments. The project team developed a disturbance-corrected permanently aligned cube corner interferometer for improved robustness and optimized opto-mechanical design to maximize optical throughput and signal-to-noise ratios. Thermal management and heat flow were thoroughly modeled and studied to isolate sensitive components from heat sources and provide the widest temperature operation range. Similarly, extensive research on mechanical designs and compensation techniques to protect against shock and vibration will be discussed. A user interface was carefully created for military and emergency response applications to provide actionable information in a visual, intuitive format. Similar to the HazMatID family of products, state-of-the-art algorithms were used to quickly identify the chemical composition of complex samples based on the spectral information. This article includes an overview of the design considerations, tests results, and performance validation of the mechanical ruggedness, spectral, and thermal performance.
A novel approach for high precision rapid potentiometric titrations: application to hydrazine assay.
Sahoo, P; Malathi, N; Ananthanarayanan, R; Praveen, K; Murali, N
2011-11-01
We propose a high precision rapid personal computer (PC) based potentiometric titration technique using a specially designed mini-cell to carry out redox titrations for assay of chemicals in quality control laboratories attached to industrial, R&D, and nuclear establishments. Using this technique a few microlitre of sample (50-100 μl) in a total volume of ~2 ml solution can be titrated and the waste generated after titration is extremely low comparing to that obtained from the conventional titration technique. The entire titration including online data acquisition followed by immediate offline analysis of data to get information about concentration of unknown sample is completed within a couple of minutes (about 2 min). This facility has been created using a new class of sensors, viz., pulsating sensors developed in-house. The basic concept in designing such instrument and the salient features of the titration device are presented in this paper. The performance of the titration facility was examined by conducting some of the high resolution redox titrations using dilute solutions--hydrazine against KIO(3) in HCl medium, Fe(II) against Ce(IV) and uranium using Davies-Gray method. The precision of titrations using this innovative approach lies between 0.048% and 1.0% relative standard deviation in different redox titrations. With the evolution of this rapid PC based titrator it was possible to develop a simple but high precision potentiometric titration technique for quick determination of hydrazine in nuclear fuel dissolver solution in the context of reprocessing of spent nuclear fuel in fast breeder reactors. © 2011 American Institute of Physics
Human attention filters for single colors
Sun, Peng; Chubb, Charles; Wright, Charles E.; Sperling, George
2016-01-01
The visual images in the eyes contain much more information than the brain can process. An important selection mechanism is feature-based attention (FBA). FBA is best described by attention filters that specify precisely the extent to which items containing attended features are selectively processed and the extent to which items that do not contain the attended features are attenuated. The centroid-judgment paradigm enables quick, precise measurements of such human perceptual attention filters, analogous to transmission measurements of photographic color filters. Subjects use a mouse to locate the centroid—the center of gravity—of a briefly displayed cloud of dots and receive precise feedback. A subset of dots is distinguished by some characteristic, such as a different color, and subjects judge the centroid of only the distinguished subset (e.g., dots of a particular color). The analysis efficiently determines the precise weight in the judged centroid of dots of every color in the display (i.e., the attention filter for the particular attended color in that context). We report 32 attention filters for single colors. Attention filters that discriminate one saturated hue from among seven other equiluminant distractor hues are extraordinarily selective, achieving attended/unattended weight ratios >20:1. Attention filters for selecting a color that differs in saturation or lightness from distractors are much less selective than attention filters for hue (given equal discriminability of the colors), and their filter selectivities are proportional to the discriminability distance of neighboring colors, whereas in the same range hue attention-filter selectivity is virtually independent of discriminabilty. PMID:27791040
A novel approach for high precision rapid potentiometric titrations: Application to hydrazine assay
NASA Astrophysics Data System (ADS)
Sahoo, P.; Malathi, N.; Ananthanarayanan, R.; Praveen, K.; Murali, N.
2011-11-01
We propose a high precision rapid personal computer (PC) based potentiometric titration technique using a specially designed mini-cell to carry out redox titrations for assay of chemicals in quality control laboratories attached to industrial, R&D, and nuclear establishments. Using this technique a few microlitre of sample (50-100 μl) in a total volume of ˜2 ml solution can be titrated and the waste generated after titration is extremely low comparing to that obtained from the conventional titration technique. The entire titration including online data acquisition followed by immediate offline analysis of data to get information about concentration of unknown sample is completed within a couple of minutes (about 2 min). This facility has been created using a new class of sensors, viz., pulsating sensors developed in-house. The basic concept in designing such instrument and the salient features of the titration device are presented in this paper. The performance of the titration facility was examined by conducting some of the high resolution redox titrations using dilute solutions--hydrazine against KIO3 in HCl medium, Fe(II) against Ce(IV) and uranium using Davies-Gray method. The precision of titrations using this innovative approach lies between 0.048% and 1.0% relative standard deviation in different redox titrations. With the evolution of this rapid PC based titrator it was possible to develop a simple but high precision potentiometric titration technique for quick determination of hydrazine in nuclear fuel dissolver solution in the context of reprocessing of spent nuclear fuel in fast breeder reactors.
Newborn Screening in the Era of Precision Medicine.
Yang, Lan; Chen, Jiajia; Shen, Bairong
2017-01-01
As newborn screening success stories gained general confirmation during the past 50 years, scientists quickly discovered diagnostic tests for a host of genetic disorders that could be treated at birth. Outstanding progress in sequencing technologies over the last two decades has made it possible to comprehensively profile newborn screening (NBS) and identify clinically relevant genomic alterations. With the rapid developments in whole-genome sequencing (WGS) and whole-exome sequencing (WES) recently, we can detect newborns at the genomic level and be able to direct the appropriate diagnosis to the different individuals at the appropriate time, which is also encompassed in the concept of precision medicine. Besides, we can develop novel interventions directed at the molecular characteristics of genetic diseases in newborns. The implementation of genomics in NBS programs would provide an effective premise for the identification of the majority of genetic aberrations and primarily help in accurate guidance in treatment and better prediction. However, there are some debate correlated with the widespread application of genome sequencing in NBS due to some major concerns such as clinical analysis, result interpretation, storage of sequencing data, and communication of clinically relevant mutations to pediatricians and parents, along with the ethical, legal, and social implications (so-called ELSI). This review is focused on these critical issues and concerns about the expanding role of genomics in NBS for precision medicine. If WGS or WES is to be incorporated into NBS practice, considerations about these challenges should be carefully regarded and tackled properly to adapt the requirement of genome sequencing in the era of precision medicine.
Route Sanitizer: Connected Vehicle Trajectory De-Identification Tool
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, Jason M; Ferber, Aaron E
Route Sanitizer is ORNL's connected vehicle moving object database de-identification tool and a graphical user interface to ORNL's connected vehicle de-identification algorithm. It uses the Google Chrome (soon to be Electron) platform so it will run on different computing platforms. The basic de-identification strategy is record redaction: portions of a vehicle trajectory (e.g. sequences of precise temporal spatial records) are removed. It does not alter retained records. The algorithm uses custom techniques to find areas within trajectories that may be considered private, then it suppresses those in addition to enough of the trajectory surrounding those locations to protect against "inferencemore » attacks" in a mathematically sound way. Map data is integrated into the process to make this possible.« less
LUNA: low-flying UAV-based forest monitoring system
NASA Astrophysics Data System (ADS)
Keizer, Jan Jacob; Pereira, Luísa; Pinto, Glória; Alves, Artur; Barros, Antonio; Boogert, Frans-Joost; Cambra, Sílvia; de Jesus, Cláudia; Frankenbach, Silja; Mesquita, Raquel; Serôdio, João; Martins, José; Almendra, Ricardo
2015-04-01
The LUNA project is aiming to develop an information system for precision forestry and, in particular, the monitoring of eucalypt plantations that is first and foremost based on multi-spectral imagery acquired using low-flying uav's. The presentation will focus on the first phase of image acquisition, processing and analysis for a series of pot experiments addressing main threats for early-stage eucalypt plantations in Portugal, i.e. acute , chronic and cyclic hydric stress, nutrient stress, fungal infections and insect plague attacks. The imaging results will be compared with spectroscopic measurements as well as with eco-physiological and plant morphological measurements. Furthermore, the presentation will show initial results of the project's second phase, comprising field tests in existing eucalypt plantations in north-central Portugal.
Large-Vortex Capture by a Wing at Very High Angles of Attack
NASA Technical Reports Server (NTRS)
Wu, J. M.; Wu, J. Z.; Denny, G. A.; Lu, X. Y.
1996-01-01
In generating the lift on a wing, the static stall is a severe barrier. As the angle of attack, alpha, increases to the stall angle, alpha(sub stall) the flow separation point on the upper surface of the wing moves to the leading edge, so that on a two-dimensional airfoil or a large-aspect-ratio wing, the lift abruptly drops to a very low level. Therefore, the first generation of aeronautical flow type, i.e., the attached steady flow, has been limited to alpha less than alpha(sub stall). Owing to the obvious importance in applications, therefore, a great effort has been made in the past two decades to enlarge the range of usable angles of attack by various flow controls for a large-aspect-ratio wing. Basically, relevant works fall into two categories. The first category is usually refereed to as separation control, which concentrates on partially separated flow at alpha less than alpha(sub stall). Since the first experimental study of Collins and Zelenevitz, there has been ample literature showing that a partially separated flow can be turned to almost fully attached by flow controls, so that the lift is recovered and the stall is delayed (for a recent work see Seifert et al.). It has been well established that, in this category, unsteady controls are much more effective than steady ones and can be realized at a very low power-input level (Wu et al.; Seifert et al.). The second and more ambitious category of relevant efforts is the post-stall lift enhancement. Its possibility roots at the existence of a second lift peak at a very high angle of attack. In fact, As alpha further increases from alpha(sub stall), the completely separated flow develops and gradually becomes a bluff-body flow. This flow gives a normal force to the airfoil with a lift component, which reaches a peak at a maximum utilizable angle of attack, alpha(sub m) approx.= 40 deg. This second peak is of the same level as the first lift peak at alpha(sub stall). Meanwhile, the drag is also quickly increased (e.g., Fage and Johansen ; Critzos et al.). Figure 1 shows a typical experimental lift and drag coefficients of NACA-0012 airfoil in this whole range of angle of attack. Obviously, without overcoming the lift crisis at alpha(sub stall) the second lift peak is completely useless. Thus, the ultimate goal of post-stall lift enhancement is to fill the lift valley after stall by flow controls, so that a wing and/or flap can work at the whole range of 0 deg less than alpha less than alpha(sub m). Relevant early experimental studies have been extensively reviewed by Wu et al., who concluded that, first, similar to the leading-edge vortex on a slender wing, the lift enhancement on a large-aspect-ratio wing should be the result of capturing a vortex on the upper surface of the wing; and, second, using steady controls cannot reach the goal, and one must rely on unsteady controls with low-level power input as well. Wu et al. also conjectured that the underlying physics of post-stall lift enhancement by unsteady controls consists of a chain of mechanisms: vortex layer instability - receptivity resonance - nonlinear streaming.
Predicting Factors of Zone 4 Attack in Volleyball.
Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert
2017-06-01
This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.
Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard
2017-01-01
Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.
Direct model reference adaptive control of a flexible robotic manipulator
NASA Technical Reports Server (NTRS)
Meldrum, D. R.
1985-01-01
Quick, precise control of a flexible manipulator in a space environment is essential for future Space Station repair and satellite servicing. Numerous control algorithms have proven successful in controlling rigid manipulators wih colocated sensors and actuators; however, few have been tested on a flexible manipulator with noncolocated sensors and actuators. In this thesis, a model reference adaptive control (MRAC) scheme based on command generator tracker theory is designed for a flexible manipulator. Quicker, more precise tracking results are expected over nonadaptive control laws for this MRAC approach. Equations of motion in modal coordinates are derived for a single-link, flexible manipulator with an actuator at the pinned-end and a sensor at the free end. An MRAC is designed with the objective of controlling the torquing actuator so that the tip position follows a trajectory that is prescribed by the reference model. An appealing feature of this direct MRAC law is that it allows the reference model to have fewer states than the plant itself. Direct adaptive control also adjusts the controller parameters directly with knowledge of only the plant output and input signals.
a Method of Generating dem from Dsm Based on Airborne Insar Data
NASA Astrophysics Data System (ADS)
Lu, W.; Zhang, J.; Xue, G.; Wang, C.
2018-04-01
Traditional methods of terrestrial survey to acquire DEM cannot meet the requirement of acquiring large quantities of data in real time, but the DSM can be quickly obtained by using the dual antenna synthetic aperture radar interferometry and the DEM generated by the DSM is more fast and accurate. Therefore it is most important to acquire DEM from DSM based on airborne InSAR data. This paper aims to the method that generate DEM from DSM accurately. Two steps in this paper are applied to acquire accurate DEM. First of all, when the DSM is generated by interferometry, unavoidable factors such as overlay and shadow will produce gross errors to affect the data accuracy, so the adaptive threshold segmentation method is adopted to remove the gross errors and the threshold is selected according to the coherence of the interferometry. Secondly DEM will be generated by the progressive triangulated irregular network densification filtering algorithm. Finally, experimental results are compared with the existing high-precision DEM results. The results show that this method can effectively filter out buildings, vegetation and other objects to obtain the high-precision DEM.
A new computerized moving stage for optical microscopes
NASA Astrophysics Data System (ADS)
Hatiboglu, Can Ulas; Akin, Serhat
2004-06-01
Measurements of microscope stage movements in the x and y directions are of importance for some stereological methods. Traditionally, the length of stage movements is measured with differing precision and accuracy using a suitable motorized stage, a microscope and software. Such equipment is generally expensive and not readily available in many laboratories. One other challenging problem is the adaptability to available microscope systems which weakens the possibility of the equipment to be used with any kind of light microscope. This paper describes a simple and cheap programmable moving stage that can be used with the available microscopes in the market. The movements of the stage are controlled by two servo-motors and a controller chip via a Java-based image processing software. With the developed motorized stage and a microscope equipped with a CCD camera, the software allows complete coverage of the specimens with minimum overlap, eliminating the optical strain associated with counting hundreds of images through an eyepiece, in a quick and precise fashion. The uses and the accuracy of the developed stage are demonstrated using thin sections obtained from a limestone core plug.
Automated Text Markup for Information Retrieval from an Electronic Textbook of Infectious Disease
Berrios, Daniel C.; Kehler, Andrew; Kim, David K.; Yu, Victor L.; Fagan, Lawrence M.
1998-01-01
The information needs of practicing clinicians frequently require textbook or journal searches. Making these sources available in electronic form improves the speed of these searches, but precision (i.e., the fraction of relevant to total documents retrieved) remains low. Improving the traditional keyword search by transforming search terms into canonical concepts does not improve search precision greatly. Kim et al. have designed and built a prototype system (MYCIN II) for computer-based information retrieval from a forthcoming electronic textbook of infectious disease. The system requires manual indexing by experts in the form of complex text markup. However, this mark-up process is time consuming (about 3 person-hours to generate, review, and transcribe the index for each of 218 chapters). We have designed and implemented a system to semiautomate the markup process. The system, information extraction for semiautomated indexing of documents (ISAID), uses query models and existing information-extraction tools to provide support for any user, including the author of the source material, to mark up tertiary information sources quickly and accurately.
The Development of using the digital projection method to measure the contact angle of ball screw
NASA Astrophysics Data System (ADS)
Chen, Chun-Jen; Jywe, Wenyuh; Liu, Yu-Chun; Jwo, Hsin-Hong
The ball screw frequently used to drive or translate the parts on the precision machine, such as machine tool and motorized stage. Therefore they were most frequently used on the precision machine, semiconductor equipment, medical instrument and aero industry. The main parts of ball screw are screw, ball and nut. The contact angle between the screw, ball and nut will affect the performance (include loading and noise) and lifecycle of a ball screw. If the actual contact angle and the designed contact angle are not the same, the friction between the ball, screw and nut will increase and it will result in the thermal increase and lifecycle decrease. This paper combines the traditional profile projector and commercial digital camera to build an imaging based and noncontact measurements system. It can implement the contact angle measurement quickly and accurately. Three different pitch angles of ball screws were completed tests in this paper. The angle resolution of this measurement system is about 0.001 degree and its accuracy is about 0.05 degree.
Tagiri-Endo, Misako; Suzuki, Shigeru; Nakamura, Tomoyuki; Hatakeyama, Takashi; Kawamukai, Kazuo
2009-02-01
A simple and quick online solid-phase extraction (SPE) coupled to liquid chromatography (LC)/tandem mass spectrometry (MS/MS) for the determination of the five antibiotics (florfenicol, FF; lincomycin, LCM; oxytetracyclin, OTC; tylosin, TS; valnemulin, VLM) in swine wastewater has been developed. After filtration, aliquots (100 microl) of wastewater samples were directly injected to a column-switching LC system. Some matrix interference was removed by washing up SPE column with 0.2% formic acid solution and acetonitrile. Antibiotics eluted from SPE column were separated on analytical column by converting switching valve and were detected by MS/MS. Calibration curves using the method of standard addition had very good correlation coefficients (r > 0.99) in the range of 0.1 to 2 ng/ml. The intra-day precision of the method was less than 12% and the inter-day precision was between 6 to 17%. The detection limits were 0.01-0.1 ng/ml. When this method was applied to wastewater samples in swine facilities, four compounds (LCM, OTC, TS, and VLM) were detected.
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Method and tool for network vulnerability analysis
Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM
2006-03-14
A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."
Epidemiology of Basil Downy Mildew.
Cohen, Yigal; Ben Naim, Yariv; Falach, Lidan; Rubin, Avia E
2017-10-01
Basil downy mildew (BDM) caused by the oomycete Peronospora belbahrii is a destructive disease of sweet basil (Ocimum basilicum) worldwide. It originated in Uganda in the 1930s and recently spread to Europe, the Middle East, Americas, and the Far East. Seed transmission may be responsible for its quick global spread. The pathogen attacks leaf blades, producing chlorotic lesions with ample dark asexual spores on the lower leaf surface. Oospores may form in the mesophyll of infected leaves. The asexual spores germinate on a wet leaf surface within 2 h and penetrate into the epidermis within 4 h. Spore germination and infection occur at a wide range of temperatures from 5 to 28.5°C. Infection intensity depends on the length of dew period, leaf temperature, and inoculum dose. The duration of latent period (from infection to sporulation) extends from 5 to 10 days, depending on temperature and light regime. The shortest is 5 days at 25°C under continuous light. Sporulation requires high humidity but not free leaf wetness. Sporulation occurs at 10 to 26°C. At the optimum temperature of 18°C, the process of sporulation requires 7.5 h at relative humidity ≥ 85%, with 3 h for sporophores emergence from stomata and 4.5 h for spore formation. Sporophores can emerge under light or darkness, but spore formation occurs in the dark only. Limited data are available on spore dispersal. Spores dispersed from sporulating plants contaminate healthy plants within 2 h of exposure. Settled spores may survive on leaf surface of healthy plants for prolonged periods, depending on temperature. Seed transmission of the disease occurs in Europe, but not in Israel or the United States. P. belbahrii in Israel also attacks species belonging to Rosemarinus, Nepeta, Agastache, Micromeria, and Salvia but not Plectranthus (coleus). A Peronospora species that infects coleus does not infect sweet basil. Control of BDM includes chemical, physical, and genetic means. The fungicide mefenoxam was highly effective in controlling the disease but resistant populations were quickly selected for in Israel and Europe rendering it ineffective. A new compound oxathiapiprolin (OSBP inhibitor) is highly effective. Nocturnal illumination of basil crops controls the disease by preventing sporulation. Daytime solar heating suppressed the disease effectively by reducing spore and mycelium viability. The most effective physical means is fanning. Nocturnal fanning prevents or limits dew deposition on leaf surfaces, and as a result, infection and sporulation diminish and epidemics are prevented. Genetic resistance occurs in wild basil and its transfer to sweet basil is under way.
Xin, Qiuhong; Ogura, Yukiko; Matsushima, Toshiya
2017-07-01
To examine how resource competition contributes to patch-use behaviour, we examined domestic chicks foraging in an I-shaped maze equipped with two terminal feeders. In a variable interval schedule, one feeder supplied grains three times more frequently than the other, and the sides were reversed midway through the experiment. The maze was partitioned into two lanes by a transparent wall, so that chicks fictitiously competed without actual interference. Stay time at feeders was compared among three groups. The "single" group contained control chicks; the "pair" group comprised the pairs of chicks tested in the fictitious competition; "mirror" included single chicks accompanied by their respective mirror images. Both "pair" and "mirror" chicks showed facilitated running. In terms of the patch-use ratio, "pair" chicks showed precise matching at approximately 3:1 with significant mutual dependence, whereas "single" and "mirror" chicks showed a comparable under-matching. The facilitated running increased visits to feeders, but failed to predict the patch-use ratio of the subject. At the reversal, quick switching occurred similarly in all groups, but the "pair" chicks revealed a stronger memory-based matching. Perceived competition therefore contributes to precise matching and lasting memory of the better feeder, in a manner dissociated from socially facilitated food search. Copyright © 2017 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Tu, Rui; Zhang, Rui; Zhang, Pengfei; Liu, Jinhai; Lu, Xiaochun
2018-07-01
This study proposes an approach to facilitate real-time fast point positioning of the BeiDou Navigation Satellite System (BDS) based on regional augmentation information. We term this as the precise positioning based on augmentation information (BPP) approach. The coordinates of the reference stations were highly constrained to extract the augmentation information, which contained not only the satellite orbit clock error correlated with the satellite running state, but also included the atmosphere error and unmodeled error, which are correlated with the spatial and temporal states. Based on these mixed augmentation corrections, a precise point positioning (PPP) model could be used for the coordinates estimation of the user stations, and the float ambiguity could be easily fixed for the single-difference between satellites. Thus, this technique provided a quick and high-precision positioning service. Three different datasets with small, medium, and large baselines (0.6 km, 30 km and 136 km) were used to validate the feasibility and effectiveness of the proposed BPP method. The validations showed that using the BPP model, 1–2 cm positioning service can be provided in a 100 km wide area after just 2 s of initialization. Thus, as the proposed approach not only capitalized on both PPP and RTK but also provided consistent application, it can be used for area augmentation positioning.
A precise laboratory goniometer system to collect spectral BRDF data of materials
NASA Astrophysics Data System (ADS)
Jiao, Guangping; Jiao, Ziti; Wang, Jie; Zhang, Hu; Dong, Yadong
2014-11-01
This paper presents a precise laboratory goniometer system to quickly collect bidirectional reflectance distribution factor(BRDF)of typical materials such soil, canopy and artificial materials in the laboratory. The system consists of the goniometer, SVC HR1024 spectroradiometer, and xenon long-arc lamp as light source. the innovation of cantilever slab can reduce the shadow of the goniometer in the principle plane. The geometric precision of the footprint centre is better than +/-4cm in most azimuth directions, and the angle-controlling accuracy is better than 0.5°. The light source keeps good stability, with 0.8% irradiance decrease in 3 hours. But the large areal heterogeneity of the light source increase the data processing difficulty to capture the accurate BRDF. First measurements are taken from soil in a resolution of 15° and 30° in zenith and azimuth direction respectively, with the +/-50° biggest view angle. More observations are taken in the hot-spot direction. The system takes about 40 minutes to complete all measurements. A spectralon panel is measured at the beginning and end of the whole period. A simple interactive interface on the computer can automatically control all operations of the goniometer and data-processing. The laboratory experiment of soil layer and grass lawn shows that the goniometer can capture the the multi-angle variation of BRDF.
A Method for Precision Closed-Loop Irrigation Using a Modified PID Control Algorithm
NASA Astrophysics Data System (ADS)
Goodchild, Martin; Kühn, Karl; Jenkins, Malcolm; Burek, Kazimierz; Dutton, Andrew
2016-04-01
The benefits of closed-loop irrigation control have been demonstrated in grower trials which show the potential for improved crop yields and resource usage. Managing water use by controlling irrigation in response to soil moisture changes to meet crop water demands is a popular approach but requires knowledge of closed-loop control practice. In theory, to obtain precise closed-loop control of a system it is necessary to characterise every component in the control loop to derive the appropriate controller parameters, i.e. proportional, integral & derivative (PID) parameters in a classic PID controller. In practice this is often difficult to achieve. Empirical methods are employed to estimate the PID parameters by observing how the system performs under open-loop conditions. In this paper we present a modified PID controller, with a constrained integral function, that delivers excellent regulation of soil moisture by supplying the appropriate amount of water to meet the needs of the plant during the diurnal cycle. Furthermore, the modified PID controller responds quickly to changes in environmental conditions, including rainfall events which can result in: controller windup, under-watering and plant stress conditions. The experimental work successfully demonstrates the functionality of a constrained integral PID controller that delivers robust and precise irrigation control. Coir substrate strawberry growing trial data is also presented illustrating soil moisture control and the ability to match water deliver to solar radiation.
The EBI search engine: EBI search as a service—making biological data accessible for all
Park, Young M.; Squizzato, Silvano; Buso, Nicola; Gur, Tamer
2017-01-01
Abstract We present an update of the EBI Search engine, an easy-to-use fast text search and indexing system with powerful data navigation and retrieval capabilities. The interconnectivity that exists between data resources at EMBL–EBI provides easy, quick and precise navigation and a better understanding of the relationship between different data types that include nucleotide and protein sequences, genes, gene products, proteins, protein domains, protein families, enzymes and macromolecular structures, as well as the life science literature. EBI Search provides a powerful RESTful API that enables its integration into third-party portals, thus providing ‘Search as a Service’ capabilities, which are the main topic of this article. PMID:28472374
COSMOS: Carnegie Observatories System for MultiObject Spectroscopy
NASA Astrophysics Data System (ADS)
Oemler, A.; Clardy, K.; Kelson, D.; Walth, G.; Villanueva, E.
2017-05-01
COSMOS (Carnegie Observatories System for MultiObject Spectroscopy) reduces multislit spectra obtained with the IMACS and LDSS3 spectrographs on the Magellan Telescopes. It can be used for the quick-look analysis of data at the telescope as well as for pipeline reduction of large data sets. COSMOS is based on a precise optical model of the spectrographs, which allows (after alignment and calibration) an accurate prediction of the location of spectra features. This eliminates the line search procedure which is fundamental to many spectral reduction programs, and allows a robust data pipeline to be run in an almost fully automatic mode, allowing large amounts of data to be reduced with minimal intervention.
Design automation techniques for custom LSI arrays
NASA Technical Reports Server (NTRS)
Feller, A.
1975-01-01
The standard cell design automation technique is described as an approach for generating random logic PMOS, CMOS or CMOS/SOS custom large scale integration arrays with low initial nonrecurring costs and quick turnaround time or design cycle. The system is composed of predesigned circuit functions or cells and computer programs capable of automatic placement and interconnection of the cells in accordance with an input data net list. The program generates a set of instructions to drive an automatic precision artwork generator. A series of support design automation and simulation programs are described, including programs for verifying correctness of the logic on the arrays, performing dc and dynamic analysis of MOS devices, and generating test sequences.
Three dimensional profile measurement using multi-channel detector MVM-SEM
NASA Astrophysics Data System (ADS)
Yoshikawa, Makoto; Harada, Sumito; Ito, Keisuke; Murakawa, Tsutomu; Shida, Soichi; Matsumoto, Jun; Nakamura, Takayuki
2014-07-01
In next generation lithography (NGL) for the 1x nm node and beyond, the three dimensional (3D) shape measurements such as side wall angle (SWA) and height of feature on photomask become more critical for the process control. Until today, AFM (Atomic Force Microscope), X-SEM (cross-section Scanning Electron Microscope) and TEM (Transmission Electron Microscope) tools are normally used for 3D measurements, however, these techniques require time-consuming preparation and observation. And both X-SEM and TEM are destructive measurement techniques. This paper presents a technology for quick and non-destructive 3D shape analysis using multi-channel detector MVM-SEM (Multi Vision Metrology SEM), and also reports its accuracy and precision.
New techniques in neutron data measurements above 30 MeV
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lisowski, P.W.; Haight, R.C.
1991-01-01
Recent developments in experimental facilities have enabled new techniques for measurements of neutron interactions above 30 MeV. Foremost is the development of both monoenergetic and continuous neutron sources using accelerators in the medium energy region between 100 and 800 MeV. Measurements of the reaction products have been advanced by the continuous improvement in detector systems, electronics and computers. Corresponding developments in particle transport codes and in the theory of nuclear reactions at these energies have allowed more precise design of neutron sources, experimental shielding and detector response. As a result of these improvements, many new measurements are possible and themore » data base in this energy range is expanding quickly.« less
Even illumination in total internal reflection fluorescence microscopy using laser light.
Fiolka, R; Belyaev, Y; Ewers, H; Stemmer, A
2008-01-01
In modern fluorescence microscopy, lasers are a widely used source of light, both for imaging in total internal reflection and epi-illumination modes. In wide-field imaging, scattering of highly coherent laser light due to imperfections in the light path typically leads to nonuniform illumination of the specimen, compromising image analysis. We report the design and construction of an objective-launch total internal reflection fluorescence microscopy system with excellent evenness of specimen illumination achieved by azimuthal rotation of the incoming illuminating laser beam. The system allows quick and precise changes of the incidence angle of the laser beam and thus can also be used in an epifluorescence mode. 2007 Wiley-Liss, Inc
Design and development of miniature parallel robot for eye surgery.
Sakai, Tomoya; Harada, Kanako; Tanaka, Shinichi; Ueta, Takashi; Noda, Yasuo; Sugita, Naohiko; Mitsuishi, Mamoru
2014-01-01
A five degree-of-freedom (DOF) miniature parallel robot has been developed to precisely and safely remove the thin internal limiting membrane in the eye ground during vitreoretinal surgery. A simulator has been developed to determine the design parameters of this robot. The developed robot's size is 85 mm × 100 mm × 240 mm, and its weight is 770 g. This robot incorporates an emergency instrument retraction function to quickly remove the instrument from the eye in case of sudden intraoperative complications such as bleeding. Experiments were conducted to evaluate the robot's performance in the master-slave configuration, and the results demonstrated that it had a tracing accuracy of 40.0 μm.
Latest Progress of Fault Detection and Localization in Complex Electrical Engineering
NASA Astrophysics Data System (ADS)
Zhao, Zheng; Wang, Can; Zhang, Yagang; Sun, Yi
2014-01-01
In the researches of complex electrical engineering, efficient fault detection and localization schemes are essential to quickly detect and locate faults so that appropriate and timely corrective mitigating and maintenance actions can be taken. In this paper, under the current measurement precision of PMU, we will put forward a new type of fault detection and localization technology based on fault factor feature extraction. Lots of simulating experiments indicate that, although there are disturbances of white Gaussian stochastic noise, based on fault factor feature extraction principal, the fault detection and localization results are still accurate and reliable, which also identifies that the fault detection and localization technology has strong anti-interference ability and great redundancy.
... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Mechanically based generative laws of morphogenesis
NASA Astrophysics Data System (ADS)
Beloussov, Lev V.
2008-03-01
A deep (although at the first glance naïve) question which may be addressed to embryonic development is why during this process quite definite and accurately reproduced successions of precise and complicated shapes are taking place, or why, in several cases, the result of development is highly precise in spite of an extensive variability of intermediate stages. This problem can be attacked in two different ways. One of them, up to now just slightly employed, is to formulate robust macroscopic generative laws from which the observed successions of shapes could be derived. Another one, which dominates in modern embryology, regards the development as a succession of highly precise 'micropatterns', each of them arising due to the action of specific factors, having, as a rule, nothing in common with each other. We argue that the latter view contradicts a great bulk of firmly established data and gives no satisfactory answers to the main problems of development. Therefore we intend to follow the first way. By doing this, we regard developing embryos as self-organized systems transpierced by feedbacks among which we pay special attention to those linked with mechanical stresses (MS). We formulate a hypothesis of so-called MS hyper-restoration as a common basis for the developmentally important feedback loops. We present a number of examples confirming this hypothesis and use it for reconstructing prolonged chains of developmental events. Finally, we discuss the application of the same set of assumptions to the first steps of egg development and to the internal differentiation of embryonic cells.
Application of Cellular Automata to Detection of Malicious Network Packets
ERIC Educational Resources Information Center
Brown, Robert L.
2014-01-01
A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…
Cooperating attackers in neural cryptography.
Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang
2004-06-01
A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.
Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks
Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David
2014-01-01
Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753
Reliable Location-Based Services from Radio Navigation Systems
Qiu, Di; Boneh, Dan; Lo, Sherman; Enge, Per
2010-01-01
Loran is a radio-based navigation system originally designed for naval applications. We show that Loran-C’s high-power and high repeatable accuracy are fantastic for security applications. First, we show how to derive a precise location tag—with a sensitivity of about 20 meters—that is difficult to project to an exact location. A device can use our location tag to block or allow certain actions, without knowing its precise location. To ensure that our tag is reproducible we make use of fuzzy extractors, a mechanism originally designed for biometric authentication. We build a fuzzy extractor specifically designed for radio-type errors and give experimental evidence to show its effectiveness. Second, we show that our location tag is difficult to predict from a distance. For example, an observer cannot predict the location tag inside a guarded data center from a few hundreds of meters away. As an application, consider a location-aware disk drive that will only work inside the data center. An attacker who steals the device and is capable of spoofing Loran-C signals, still cannot make the device work since he does not know what location tag to spoof. We provide experimental data supporting our unpredictability claim. PMID:22163532
NASA Astrophysics Data System (ADS)
Meng, ZhuXuan; Fan, Hu; Peng, Ke; Zhang, WeiHua; Yang, HuiXin
2016-12-01
This article presents a rapid and accurate aeroheating calculation method for hypersonic vehicles. The main innovation is combining accurate of numerical method with efficient of engineering method, which makes aeroheating simulation more precise and faster. Based on the Prandtl boundary layer theory, the entire flow field is divided into inviscid and viscid flow at the outer edge of the boundary layer. The parameters at the outer edge of the boundary layer are numerically calculated from assuming inviscid flow. The thermodynamic parameters of constant-volume specific heat, constant-pressure specific heat and the specific heat ratio are calculated, the streamlines on the vehicle surface are derived and the heat flux is then obtained. The results of the double cone show that at the 0° and 10° angle of attack, the method of aeroheating calculation based on inviscid outer edge of boundary layer parameters reproduces the experimental data better than the engineering method. Also the proposed simulation results of the flight vehicle reproduce the viscid numerical results well. Hence, this method provides a promising way to overcome the high cost of numerical calculation and improves the precision.
Reliable location-based services from radio navigation systems.
Qiu, Di; Boneh, Dan; Lo, Sherman; Enge, Per
2010-01-01
Loran is a radio-based navigation system originally designed for naval applications. We show that Loran-C's high-power and high repeatable accuracy are fantastic for security applications. First, we show how to derive a precise location tag--with a sensitivity of about 20 meters--that is difficult to project to an exact location. A device can use our location tag to block or allow certain actions, without knowing its precise location. To ensure that our tag is reproducible we make use of fuzzy extractors, a mechanism originally designed for biometric authentication. We build a fuzzy extractor specifically designed for radio-type errors and give experimental evidence to show its effectiveness. Second, we show that our location tag is difficult to predict from a distance. For example, an observer cannot predict the location tag inside a guarded data center from a few hundreds of meters away. As an application, consider a location-aware disk drive that will only work inside the data center. An attacker who steals the device and is capable of spoofing Loran-C signals, still cannot make the device work since he does not know what location tag to spoof. We provide experimental data supporting our unpredictability claim.
Resonant ultrasound spectroscopy and non-destructive testing
NASA Astrophysics Data System (ADS)
Migliori, A.; Darling, T. W.
The use of mechanical resonances to test properties of materials is perhaps older than the industrial revolution. Early documented cases of British railroad engineers tapping the wheels of a train and using the sound to detect cracks perhaps mark the first real use of resonances to test the integrity of high-performance alloys. Attempts were made in the following years to understand the resonances of solids mathematically, based on the shape and composition. But Nobel Laureate Lord Rayleigh best summarized the state of affairs in 1894, stating 'the problem has, for the most part, resisted attack'. More recently, modern computers and electronics have enabled Anderson and co-workers with their work on minerals, and our work at Los Alamos on new materials and manufactured components to advance the use of resonances to a precision non-destructive testing tool that makes anisotropic modulus measurements, defect detection and geometry error detection routine. The result is that resonances can achieve the highest absolute accuracy for any dynamic modulus measurement technique, can be used on the smallest samples, and can also enable detection of errors in certain classes of precision manufactured components faster and more accurately than any other technique.
Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.
ERIC Educational Resources Information Center
Affleck, Glenn; And Others
1987-01-01
Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…
On Patarin's Attack against the lIC Scheme
NASA Astrophysics Data System (ADS)
Ogura, Naoki; Uchiyama, Shigenori
In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.
Rama, Mélanie; Duflos, Claire; Melki, Isabelle; Bessis, Didier; Bonhomme, Axelle; Martin, Hélène; Doummar, Diane; Valence, Stéphanie; Rodriguez, Diana; Carme, Emilie; Genevieve, David; Heimdal, Ketil; Insalaco, Antonella; Franck, Nathalie; Queyrel-Moranne, Viviane; Tieulie, Nathalie; London, Jonathan; Uettwiller, Florence; Georgin-Lavialle, Sophie; Belot, Alexandre; Koné-Paut, Isabelle; Hentgen, Véronique; Boursier, Guilaine; Touitou, Isabelle; Sarrabay, Guillaume
2018-04-23
Deficiency of adenosine deaminase 2 (DADA2) is a recently described autoinflammatory disorder. Genetic analysis is required to confirm the diagnosis. We aimed to describe the identifying symptoms and genotypes of patients referred to our reference centres and to improve the indications for genetic testing. DNA from 66 patients with clinically suspected DADA2 were sequenced by Sanger or next-generation sequencing. Detailed epidemiological, clinical and biological features were collected by use of a questionnaire and were compared between patients with and without genetic confirmation of DADA2. We identified 13 patients (19.6%) carrying recessively inherited mutations in ADA2 that were predicted to be deleterious. Eight patients were compound heterozygous for mutations. Seven mutations were novel (4 missense variants, 2 predicted to affect mRNA splicing and 1 frameshift). The mean age of the 13 patients with genetic confirmation was 12.7 years at disease onset and 20.8 years at diagnosis. Phenotypic manifestations included fever (85%), vasculitis (85%) and neurological disorders (54%). Features best associated with a confirmatory genotype included fever with neurologic or cutaneous attacks (odds ratio [OR] 10.71, p = 0.003 and OR 10.9, p < 0.001), fever alone (OR 8.1, p = 0.01), and elevated C-reactive protein (CRP) level with neurologic involvement (OR 6.63, p = 0.017). Our proposed decision tree may help improve obtaining genetic confirmation of DADA2 in the context of autoinflammatory symptoms. Prerequisites for quick and low-cost Sanger analysis include one typical cutaneous or neurological sign, one marker of inflammation (fever or elevated CRP level), and recurrent or chronic attacks in adults.
Landy, Stephen; DeRossett, Sarah E.; Rapoport, Alan; Rothrock, John; Ames, Michael H.; McDonald, Susan A.; Burch, Steven P.
2007-01-01
Objective To describe return to normal function, productivity, and satisfaction of patients with moderate or severe migraine attacks treated with combined sumatriptan/naproxen sodium, sumatriptan alone, naproxen sodium alone, or placebo. Patients, design, and setting Patients in 2 identical, US, phase 3, randomized, double-blind, parallel-group, placebo-controlled, single-dose, multicenter studies treated a single moderate or severe migraine attack with sumatriptan/naproxen sodium (85 mg sumatriptan formulated with RT Technology and 500 mg naproxen sodium in a single-tablet formulation), sumatriptan, naproxen sodium, or placebo. Main outcome measures Ability to function (not impaired, mildly impaired, severely impaired, or required bed rest) was collected in diary cards completed immediately prior to treatment, every 30 minutes for the first 2 hours, and hourly from 2 to 24 hours while awake. Patients completed the Productivity Assessment Questionnaire (PAQ) 24 hours after study drug administration. The Patient Perception of Migraine Questionnaire (PPMQ) was administered at screening and 24 hours post treatment to capture patient satisfaction. Results Compared with the other groups, the sumatriptan/naproxen sodium group reported significantly higher levels of normal or mildly impaired functioning as early as 2 and 4 hours after dosing. They also demonstrated greater reductions in workplace productivity loss compared with placebo in both studies, and were consistently more satisfied with their treatment compared with patients in other treatment groups and compared with their usual medications. Conclusions Treatment with sumatriptan/naproxen sodium allowed significantly more subjects to return to normal or mildly impaired functioning more quickly, and sumatriptan/naproxen sodium patients were significantly more satisfied with their treatment compared with other treatment groups. Overall productivity loss was significantly reduced following use of sumatriptan/naproxen sodium. PMID:17955107
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fischler, M.
1992-04-01
The issues to be addressed here are those of balance'' in machine architecture. By this, we mean how much emphasis must be placed on various aspects of the system to maximize its usefulness for physics. There are three components that contribute to the utility of a system: How the machine can be used, how big a problem can be attacked, and what the effective capabilities (power) of the hardware are like. The effective power issue is a matter of evaluating the impact of design decisions trading off architectural features such as memory bandwidth and interprocessor communication capabilities. What is studiedmore » is the effect these machine parameters have on how quickly the system can solve desired problems. There is a reasonable method for studying this: One selects a few representative algorithms and computes the impact of changing memory bandwidths, and so forth. The only room for controversy here is in the selection of representative problems. The issue of how big a problem can be attacked boils down to a balance of memory size versus power. Although this is a balance issue it is very different than the effective power situation, because no firm answer can be given at this time. The power to memory ratio is highly problem dependent, and optimizing it requires several pieces of physics input, including: how big a lattice is needed for interesting results; what sort of algorithms are best to use; and how many sweeps are needed to get valid results. We seem to be at the threshold of learning things about these issues, but for now, the memory size issue will necessarily be addressed in terms of best guesses, rules of thumb, and researchers' opinions.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fischler, M.
1992-04-01
The issues to be addressed here are those of ``balance`` in machine architecture. By this, we mean how much emphasis must be placed on various aspects of the system to maximize its usefulness for physics. There are three components that contribute to the utility of a system: How the machine can be used, how big a problem can be attacked, and what the effective capabilities (power) of the hardware are like. The effective power issue is a matter of evaluating the impact of design decisions trading off architectural features such as memory bandwidth and interprocessor communication capabilities. What is studiedmore » is the effect these machine parameters have on how quickly the system can solve desired problems. There is a reasonable method for studying this: One selects a few representative algorithms and computes the impact of changing memory bandwidths, and so forth. The only room for controversy here is in the selection of representative problems. The issue of how big a problem can be attacked boils down to a balance of memory size versus power. Although this is a balance issue it is very different than the effective power situation, because no firm answer can be given at this time. The power to memory ratio is highly problem dependent, and optimizing it requires several pieces of physics input, including: how big a lattice is needed for interesting results; what sort of algorithms are best to use; and how many sweeps are needed to get valid results. We seem to be at the threshold of learning things about these issues, but for now, the memory size issue will necessarily be addressed in terms of best guesses, rules of thumb, and researchers` opinions.« less
Machine Learning Methods for Attack Detection in the Smart Grid.
Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent
2016-08-01
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.
Split-second escape decisions in blue tits (Parus caeruleus)
NASA Astrophysics Data System (ADS)
Lind, Johan; Kaby, Ulrika; Jakobsson, Sven
2002-07-01
Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.
Hybrid attacks on model-based social recommender systems
NASA Astrophysics Data System (ADS)
Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao
2017-10-01
With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.
Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
NASA Astrophysics Data System (ADS)
Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.
2009-12-01
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).
Cyber-Physical Attacks With Control Objectives
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-08-18
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Cyber-Physical Attacks With Control Objectives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Introduction to magnification in endodontics.
Arens, Donald E
2003-01-01
Dentistry has recently recognized the practicality and benefits of treating damaged and diseased oral tissues under high magnification levels. Initially, enhanced vision was more-or-less restricted to the use of prescription bifocals, awkward magnifying loops, and heavy cumbersome telephoto glasses; the microscope drew little interest and was quickly viewed as another useless and expensive dental gadget. However, owing to the very nature and demands of the therapy, endodontists were quick to accept and adopt this technology, and the manufacturers were quick to adapt and market their surgical microscopes to the endodontic office. Since acceptance leads to progression, we are currently witnessing manufacturers adapting the microscopic and other magnifying lenses to other areas of dentistry. However, choosing and purchasing a microscope involves a great number of issues, including the adequacy of one's present vision, the type of practice conducted, the demands one places on the quality of his or her dentistry, and the amount of time and expense one wishes to devote to becoming competent in using magnification. In addition, one must become familiar with what the different levels of magnification offer, what different depths and widths of field meet their normal practice needs, the amount of space required for the equipment, and whether the investment is cost effective. This article details all of the benefits as well as the difficulties encountered when embarking on a magnification journey. The art of dentistry is based on precision. The human naked eye is capable of distinguishing fine detail, but it is no match for what can be accomplished when an image is sharpened and enlarged. The microscope and other forms of magnification fill that need, especially for accomplishing endodontic procedures.
Developmental differences in masked form priming are not driven by vocabulary growth.
Bhide, Adeetee; Schlaggar, Bradley L; Barnes, Kelly Anne
2014-01-01
As children develop into skilled readers, they are able to more quickly and accurately distinguish between words with similar visual forms (i.e., they develop precise lexical representations). The masked form priming lexical decision task is used to test the precision of lexical representations. In this paradigm, a prime (which differs by one letter from the target) is briefly flashed before the target is presented. Participants make a lexical decision to the target. Primes can facilitate reaction time by partially activating the lexical entry for the target. If a prime is unable to facilitate reaction time, it is assumed that participants have a precise orthographic representation of the target and thus the prime is not a close enough match to activate its lexical entry. Previous developmental work has shown that children and adults' lexical decision times are facilitated by form primes preceding words from small neighborhoods (i.e., very few words can be formed by changing one letter in the original word; low N words), but only children are facilitated by form primes preceding words from large neighborhoods (high N words). It has been hypothesized that written vocabulary growth drives the increase in the precision of the orthographic representations; children may not know all of the neighbors of the high N words, making the words effectively low N for them. We tested this hypothesis by (1) equating the effective orthographic neighborhood size of the targets for children and adults and (2) testing whether age or vocabulary size was a better predictor of the extent of form priming. We found priming differences even when controlling for effective neighborhood size. Furthermore, age was a better predictor of form priming effects than was vocabulary size. Our findings provide no support for the hypothesis that growth in written vocabulary size gives rise to more precise lexical representations. We propose that the development of spelling ability may be a more important factor.
Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
NASA Astrophysics Data System (ADS)
Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam
A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.
Attacks on public telephone networks: technologies and challenges
NASA Astrophysics Data System (ADS)
Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet
2003-09-01
Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.
Novel mechanism of network protection against the new generation of cyber attacks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit
2012-06-01
A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
NASA Astrophysics Data System (ADS)
Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu
Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.
Clinical applications of virtual navigation bronchial intervention.
Kajiwara, Naohiro; Maehara, Sachio; Maeda, Junichi; Hagiwara, Masaru; Okano, Tetsuya; Kakihana, Masatoshi; Ohira, Tatsuo; Kawate, Norihiko; Ikeda, Norihiko
2018-01-01
In patients with bronchial tumors, we frequently consider endoscopic treatment as the first treatment of choice. All computed tomography (CT) must satisfy several conditions necessary to analyze images by Synapse Vincent. To select safer and more precise approaches for patients with bronchial tumors, we determined the indications and efficacy of virtual navigation intervention for the treatment of bronchial tumors. We examined the efficacy of virtual navigation bronchial intervention for the treatment of bronchial tumors located at a variety of sites in the tracheobronchial tree using a high-speed 3-dimensional (3D) image analysis system, Synapse Vincent. Constructed images can be utilized to decide on the simulation and interventional strategy as well as for navigation during interventional manipulation in two cases. Synapse Vincent was used to determine the optimal planning of virtual navigation bronchial intervention. Moreover, this system can detect tumor location and alsodepict surrounding tissues, quickly, accurately, and safely. The feasibility and safety of Synapse Vincent in performing useful preoperative simulation and navigation of surgical procedures can lead to safer, more precise, and less invasion for the patient, and makes it easy to construct an image, depending on the purpose, in 5-10 minutes using Synapse Vincent. Moreover, if the lesion is in the parenchyma or sub-bronchial lumen, it helps to perform simulation with virtual skeletal subtraction to estimate potential lesion movement. By using virtual navigation system for simulation, bronchial intervention was performed with no complications safely and precisely. Preoperative simulation using virtual navigation bronchial intervention reduces the surgeon's stress levels, particularly when highly skilled techniques are needed to operate on lesions. This task, including both preoperative simulation and intraoperative navigation, leads to greater safety and precision. These technological instruments are helpful for bronchial intervention procedures, and are also excellent devices for educational training.
Wrzaczek, Michael; Brosché, Mikael
2009-01-01
Programmed cell death is a common feature of developmental processes and responses to environmental cues in many multicellular organisms. Examples of programmed cell death in plants are leaf abscission in autumn and the hypersensitive response during pathogen attack. Reactive oxygen species (ROS) have been implicated in the regulation of various types of cell death.1,2 However, the precise mechanics of the involvement of ROS in the processes leading to initiation of cell death and subsequent containment are currently unknown. We recently showed the involvement of an Arabidopsis protein GRIM REAPER in the regulation of ROS-induced cell death under stress conditions.3 Our results indicated that the presence of a truncated protein primes plants for cell death in the presence of ROS leading to ozone sensitivity and increased resistance to hemibiotrophic pathogens. PMID:19820355
Dragging ras back in the ring.
Stephen, Andrew G; Esposito, Dominic; Bagni, Rachel K; McCormick, Frank
2014-03-17
Ras proteins play a major role in human cancers but have not yielded to therapeutic attack. Ras-driven cancers are among the most difficult to treat and often excluded from therapies. The Ras proteins have been termed "undruggable," based on failures from an era in which understanding of signaling transduction, feedback loops, redundancy, tumor heterogeneity, and Ras' oncogenic role was poor. Structures of Ras oncoproteins bound to their effectors or regulators are unsolved, and it is unknown precisely how Ras proteins activate their downstream targets. These knowledge gaps have impaired development of therapeutic strategies. A better understanding of Ras biology and biochemistry, coupled with new ways of targeting undruggable proteins, is likely to lead to new ways of defeating Ras-driven cancers. Copyright © 2014 Elsevier Inc. All rights reserved.
NASA Technical Reports Server (NTRS)
Townsend, J. C.
1980-01-01
In order to provide experimental data for comparison with newly developed finite difference methods for computing supersonic flows over aircraft configurations, wind tunnel tests were conducted on four arrow wing models. The models were machined under numeric control to precisely duplicate analytically defined shapes. They were heavily instrumented with pressure orifices at several cross sections ahead of and in the region where there is a gap between the body and the wing trailing edge. The test Mach numbers were 2.36, 2.96, and 4.63. Tabulated pressure data for the complete test series are presented along with selected oil flow photographs. Comparisons of some preliminary numerical results at zero angle of attack show good to excellent agreement with the experimental pressure distributions.
NASA Astrophysics Data System (ADS)
Liu, Penghui; Liu, Jing
2017-08-01
Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.
Hummingbird wing efficacy depends on aspect ratio and compares with helicopter rotors
Kruyt, Jan W.; Quicazán-Rubio, Elsa M.; van Heijst, GertJan F.; Altshuler, Douglas L.; Lentink, David
2014-01-01
Hummingbirds are the only birds that can sustain hovering. This unique flight behaviour comes, however, at high energetic cost. Based on helicopter and aeroplane design theory, we expect that hummingbird wing aspect ratio (AR), which ranges from about 3.0 to 4.5, determines aerodynamic efficacy. Previous quasi-steady experiments with a wing spinner set-up provide no support for this prediction. To test this more carefully, we compare the quasi-steady hover performance of 26 wings, from 12 hummingbird taxa. We spun the wings at angular velocities and angles of attack that are representative for every species and measured lift and torque more precisely. The power (aerodynamic torque × angular velocity) required to lift weight depends on aerodynamic efficacy, which is measured by the power factor. Our comparative analysis shows that AR has a modest influence on lift and drag forces, as reported earlier, but interspecific differences in power factor are large. During the downstroke, the power required to hover decreases for larger AR wings at the angles of attack at which hummingbirds flap their wings (p < 0.05). Quantitative flow visualization demonstrates that variation in hover power among hummingbird wings is driven by similar stable leading edge vortices that delay stall during the down- and upstroke. A side-by-side aerodynamic performance comparison of hummingbird wings and an advanced micro helicopter rotor shows that they are remarkably similar. PMID:25079868
Transition Analysis for the Mars Science Laboratory Entry Vehicle
NASA Technical Reports Server (NTRS)
Chang, Chau-Lyan; Choudhari, Meelan M.; Hollis, Brian R.; Li, Fei
2009-01-01
Viscous Laminar-turbulent transition plays an important role in the design of the Mars Science Laboratory (MSL) entry vehicle. The lift-to-drag ratio required for the precision landing trajectory will be achieved via an angle of attack equal to 16 degrees. At this relatively high angle of attack, the boundary layer flow near the leeward meridian is expected to transition early in the trajectory, resulting in substantially increased heating loads. This paper presents stability calculations and transition correlations for a series of wind tunnel models of the MSL vehicle. Experimentally measured transition onset locations are used to correlate with the N-factor calculations for various wind tunnel conditions. Due to relatively low post-shock Mach numbers near the edge of the boundary layer, the dominant instability waves are found to be of the first mode type. The N-factor values correlating with measured transition onset at selected test points from the Mach 6 conventional facility experiments fall between 3.5 and 4.5 and apparently vary linearly with the wind tunnel unit Reynolds number, indicating strong receptivity effect. The small transition N value is consistent with previous correlations for second-mode dominant transition in the same wind tunnel facility. Stability calculations for stationary and traveling crossflow instability waves in selected configurations indicate that an N value of 4 and 6, respectively, correlates reasonably well with transition onset discerned from one experimentally measured thermographic image.
Wioland, Laetitia; Dupont, Jean-Luc; Bossu, Jean-Louis; Popoff, Michel R; Poulain, Bernard
2013-12-01
Epsilon toxin (ET), produced by Clostridium perfringens types B and D, ranks among the four most potent poisonous substances known so far. ET-intoxication is responsible for enterotoxaemia in animals, mainly sheep and goats. This disease comprises several manifestations indicating the attack of the nervous system. This review aims to summarize the effects of ET on central nervous system. ET binds to endothelial cells of brain capillary vessels before passing through the blood-brain barrier. Therefore, it induces perivascular oedema and accumulates into brain. ET binding to different brain structures and to different component in the brain indicates regional susceptibility to the toxin. Histological examination has revealed nerve tissue and cellular lesions, which may be directly or indirectly caused by ET. The naturally occurring disease caused by ET-intoxication can be reproduced experimentally in rodents. In mice and rats, ET recognizes receptor at the surface of different neural cell types, including certain neurons (e.g. the granule cells in cerebellum) as well as oligodendrocytes, which are the glial cells responsible for the axons myelination. Moreover, ET induces release of glutamate and other transmitters, leading to firing of neural network. The precise mode of action of ET on neural cells remains to be determined. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.
Anilanmert, Beril; Aydin, Muhammet; Apak, Resat; Avci, Gülfidan Yenel; Cengiz, Salih
2016-01-01
Direct analyses of explosives in soil using liquid chromatography tandem mass spectrometry (LC-MS/MS) methods are very limited in the literature and require complex procedures or relatively high amount of solvent. A simple and rapid method was developed for the determination of pentaerythritol tetranitrate (PETN), 3,5-trinitro-1,3,5-triazacyclohexane (RDX) and octahydro-1,3,5,7-tetranitro-1,3,5,7-tetrazocine (HMX), which are among the explosives used in terrorist attacks. A one-step extraction method for 1.00 g soil with 2.00 mL acetonitrile, and a 8-min LC-MS/MS method was developed. The detection limits for PETN, RDX and HMX were 5.2, 8.5 and 3.4 ng/g and quantitation limits were 10.0, 24.5, 6.0 ng/g. The intermediate precisions and Horwitz Ratio's were between 4.10 - 13.26% and 0.24 - 0.98, in order. This method was applied to a model post-blast debris collected from an artificial explosion and real samples collected after a terrorist attack in Istanbul. The method is easy and fast and requires less solvent use than other methods.
Ali, Mohammad; Debes, Amanda K; Luquero, Francisco J; Kim, Deok Ryun; Park, Je Yeon; Digilio, Laura; Manna, Byomkesh; Kanungo, Suman; Dutta, Shanta; Sur, Dipika; Bhattacharya, Sujit K; Sack, David A
2016-09-01
Vaccinating a buffer of individuals around a case (ring vaccination) has the potential to target those who are at highest risk of infection, reducing the number of doses needed to control a disease. We explored the potential vaccine effectiveness (VE) of oral cholera vaccines (OCVs) for such a strategy. This analysis uses existing data from a cluster-randomized clinical trial in which OCV or placebo was given to 71,900 participants in Kolkata, India, from 27 July to 10 September 2006. Cholera surveillance was then conducted on 144,106 individuals living in the study area, including trial participants, for 5 y following vaccination. First, we explored the risk of cholera among contacts of cholera patients, and, second, we measured VE among individuals living within 25 m of cholera cases between 8 and 28 d after onset of the index case. For the first analysis, individuals living around each index case identified during the 5-y period were assembled using a ring to define cohorts of individuals exposed to cholera index cases. An index control without cholera was randomly selected for each index case from the same population, matched by age group, and individuals living around each index control were assembled using a ring to define cohorts not exposed to cholera cases. Cholera attack rates among the exposed and non-exposed cohorts were compared using different distances from the index case/control to define the rings and different time frames to define the period at risk. For the VE analysis, the exposed cohorts were further stratified according to the level of vaccine coverage into high and low coverage strata. Overall VE was assessed by comparing the attack rates between high and low vaccine coverage strata irrespective of individuals' vaccination status, and indirect VE was assessed by comparing the attack rates among unvaccinated members between high and low vaccine coverage strata. Cholera risk among the cohort exposed to cholera cases was 5-11 times higher than that among the cohort not exposed to cholera cases. The risk gradually diminished with an increase in distance and time. The overall and indirect VE measured between 8 and 28 d after exposure to a cholera index case during the first 2 y was 91% (95% CI 62%-98%) and 93% (95% CI 44%-99%), respectively. VE persisted for 5 y after vaccination and was similar whether the index case was a young child (<5 y) or was older. Of note, this study was a reanalysis of a cholera vaccine trial that used two doses; thus, a limitation of the study relates to the assumption that a single dose, if administered quickly, will induce a similar level of total and indirect protection over the short term as did two doses. These findings suggest that high-level protection can be achieved if individuals living close to cholera cases are living in a high coverage ring. Since this was an observational study including participants who had received two doses of vaccine (or placebo) in the clinical trial, further studies are needed to determine whether a ring vaccination strategy, in which vaccine is given quickly to those living close to a case, is feasible and effective. ClinicalTrials.gov NCT00289224.
Ali, Mohammad; Luquero, Francisco J.; Kim, Deok Ryun; Park, Je Yeon; Digilio, Laura; Manna, Byomkesh; Kanungo, Suman; Dutta, Shanta; Sur, Dipika; Bhattacharya, Sujit K.
2016-01-01
Introduction Vaccinating a buffer of individuals around a case (ring vaccination) has the potential to target those who are at highest risk of infection, reducing the number of doses needed to control a disease. We explored the potential vaccine effectiveness (VE) of oral cholera vaccines (OCVs) for such a strategy. Methods and Findings This analysis uses existing data from a cluster-randomized clinical trial in which OCV or placebo was given to 71,900 participants in Kolkata, India, from 27 July to 10 September 2006. Cholera surveillance was then conducted on 144,106 individuals living in the study area, including trial participants, for 5 y following vaccination. First, we explored the risk of cholera among contacts of cholera patients, and, second, we measured VE among individuals living within 25 m of cholera cases between 8 and 28 d after onset of the index case. For the first analysis, individuals living around each index case identified during the 5-y period were assembled using a ring to define cohorts of individuals exposed to cholera index cases. An index control without cholera was randomly selected for each index case from the same population, matched by age group, and individuals living around each index control were assembled using a ring to define cohorts not exposed to cholera cases. Cholera attack rates among the exposed and non-exposed cohorts were compared using different distances from the index case/control to define the rings and different time frames to define the period at risk. For the VE analysis, the exposed cohorts were further stratified according to the level of vaccine coverage into high and low coverage strata. Overall VE was assessed by comparing the attack rates between high and low vaccine coverage strata irrespective of individuals’ vaccination status, and indirect VE was assessed by comparing the attack rates among unvaccinated members between high and low vaccine coverage strata. Cholera risk among the cohort exposed to cholera cases was 5–11 times higher than that among the cohort not exposed to cholera cases. The risk gradually diminished with an increase in distance and time. The overall and indirect VE measured between 8 and 28 d after exposure to a cholera index case during the first 2 y was 91% (95% CI 62%–98%) and 93% (95% CI 44%–99%), respectively. VE persisted for 5 y after vaccination and was similar whether the index case was a young child (<5 y) or was older. Of note, this study was a reanalysis of a cholera vaccine trial that used two doses; thus, a limitation of the study relates to the assumption that a single dose, if administered quickly, will induce a similar level of total and indirect protection over the short term as did two doses. Conclusions These findings suggest that high-level protection can be achieved if individuals living close to cholera cases are living in a high coverage ring. Since this was an observational study including participants who had received two doses of vaccine (or placebo) in the clinical trial, further studies are needed to determine whether a ring vaccination strategy, in which vaccine is given quickly to those living close to a case, is feasible and effective. Trial registration ClinicalTrials.gov NCT00289224 PMID:27622507
Sumatriptan (subcutaneous route of administration) for acute migraine attacks in adults
Derry, Christopher J; Derry, Sheena; Moore, R Andrew
2014-01-01
Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Subcutaneous administration may be preferable to oral for individuals experiencing nausea and/or vomiting Objectives To determine the efficacy and tolerability of subcutaneous sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using subcutaneous sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Thirty-five studies (9365 participants) compared subcutaneous sumatriptan with placebo or an active comparator. Most of the data were for the 6 mg dose. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 6 mg versus placebo the NNTs were 2.9, 2.3, 2.2, and 2.1 for pain-free at one and two hours, and headache relief at one and two hours, respectively, and 6.1 for sustained pain-free at 24 hours. Results for the 4 mg and 8 mg doses were similar to the 6 mg dose, with 6 mg significantly better than 4 mg only for pain-free at one hour, and 8 mg significantly better than 6 mg only for headache relief at one hour. There was no evidence of increased migraine relief if a second dose of sumatriptan 6 mg was given after an inadequate response to the first. Relief of headache-associated symptoms, including nausea, photophobia, and phonophobia, was greater with sumatriptan than with placebo, and use of rescue medication was lower with sumatriptan than placebo. For the most part, adverse events were transient and mild and were more common with sumatriptan than placebo. Sumatriptan was compared directly with a number of active treatments, including other triptans, acetylsalicylic acid plus metoclopramide, and dihydroergotamine, but there were insufficient data for any pooled analyses. Authors’ conclusions Subcutaneous sumatriptan is effective as an abortive treatment for acute migraine attacks, quickly relieving pain, nausea, photophobia, phonophobia, and functional disability, but is associated with increased adverse events. PMID:22336869
Moisan, Frédéric; Gonzalez, Cleotilde
2017-01-01
Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Blind Data Attack on BGP Routers
2017-03-01
implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions
NASA Astrophysics Data System (ADS)
Anis Atikah, Nurul; Yeng Weng, Leong; Anuar, Adzly; Chien Fat, Chau; Sahari, Khairul Salleh Mohamed; Zainal Abidin, Izham
2017-10-01
Currently, the methods of actuating robotic-based prosthetic limbs are moving away from bulky actuators to more fluid materials such as artificial muscles. The main disadvantages of these artificial muscles are their high cost of manufacturing, low-force generation, cumbersome and complex controls. A recent discovery into using super coiled polymer (SCP) proved to have low manufacturing costs, high force generation, compact and simple controls. Nevertheless, the non-linear controls still exists due to the nature of heat-based actuation, which is hysteresis. This makes position control difficult. Using electrically conductive devices allows for very quick heating, but not quick cooling. This research tries to solve the problem by using peltier devices, which can effectively heat and cool the SCP, hence giving way to a more precise control. The peltier device does not actively introduce more energy to a volume of space, which the coiled heating does; instead, it acts as a heat pump. Experiments were conducted to test the feasibility of using peltier as an actuating method on different diameters of nylon fishing strings. Based on these experiments, the performance characteristics of the strings were plotted, which could be used to control the actuation of the string efficiently in the future.
EEG electrode caps can reduce SAR induced in the head by GSM900 mobile phones.
Hamblin, Denise L; Anderson, Vitas; McIntosh, Robert L; McKenzie, Ray J; Wood, Andrew W; Iskra, Steve; Croft, Rodney J
2007-05-01
This paper investigates the influence of EEG electrode caps on specific absorption rate (SAR) in the head from a GSM900 mobile phone (217-Hz modulation, peak power output 2 W). SAR measurements were recorded in an anthropomorphic phantom using a precision robotic system. Peak 10 g average SAR in the whole head and in just the temporal region was compared for three phantom arrangements; no cap, 64-electrode "Electro-Cap," and 64-electrode "Quick-Cap". Relative to the "no cap" arrangement, the Electro-Cap and Quick-Cap caused a peak SAR (10 g) reduction of 14% and 18% respectively in both the whole head and in the temporal region. Additional computational modeling confirmed that SAR (10 g) is reduced by the presence of electrode leads and that the extent of the effect varies according to the orientation of the leads with respect to the radiofrequency (RF) source. The modeling also indicated that the nonconductive shell between the electrodes and simulated head material does not significantly alter the electrode lead shielding effect. The observed SAR reductions are not likely to be sufficiently large to have accounted for null EEG findings in the past but should nonetheless be noted in studies aiming to measure and report human brain activity under similar exposure conditions.