Sample records for sallie mae securities

  1. 31 CFR 354.7 - Withdrawal of eligible Book-entry Sallie Mae Securities for conversion to definitive form.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Withdrawal of eligible Book-entry... PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.7 Withdrawal of eligible Book-entry Sallie Mae Securities for conversion to definitive form...

  2. 31 CFR 354.5 - Obligations of Sallie Mae; no adverse claims.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.5 Obligations of Sallie... a Federal Reserve Bank or otherwise as provided in § 354.4(c)(1), for the purposes of this part 354, Sallie Mae and the Federal Reserve Banks shall treat the Participant to whose Securities Account an...

  3. 31 CFR 354.9 - Liability of Sallie Mae and Federal Reserve Banks.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Reserve Banks. 354.9 Section 354.9 Money and Finance: Treasury Regulations Relating to Money and Finance...-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.9 Liability of Sallie Mae and Federal Reserve Banks. Sallie Mae and the Federal Reserve Banks may rely on the information...

  4. Sallie Mae Eyes Expansion beyond Its Charter.

    ERIC Educational Resources Information Center

    Zook, Jim

    1995-01-01

    The Student Loan Marketing Association (Sallie Mae) and the Clinton Administration are preparing legislation to transform the federally sponsored corporation into a private business but must negotiate complex political and financial issues. Destabilization of the private student-loan industry and conflict over direct-lending policies are central…

  5. Despite a Settlement, Sallie Mae Still Plays Host to College Student-Aid Sites

    ERIC Educational Resources Information Center

    Hermes, J. J.

    2008-01-01

    Last April, as part of a $2-million settlement with New York's attorney general, the nation's largest student-loan company, Sallie Mae, agreed to stop providing staff members for colleges' financial-aid offices and call centers at no cost to the institutions. But one year later, Sallie Mae still plays host to the entire online presence for the…

  6. How America Pays for College, 2014: Sallie Mae's National Study of College Students and Parents

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2014

    2014-01-01

    Sallie Mae has conducted "How America Pays for College" annually since 2008, providing information about the resources American families invest in an undergraduate college education. This study focuses particularly on the planning and payment behaviors in a given academic year. Now in its seventh year, the study provides a compelling…

  7. How America Pays for College, 2009. Sallie Mae's National Study of College Students and Parents

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2009

    2009-01-01

    Sallie Mae's study, "How America Pays for College 2009," conducted by Gallup, provides a picture of how families made the investment in higher education last academic year and how they are beginning to meet the challenges of the economic recession. Based on a nationally representative survey of college-going students and parents of undergraduates,…

  8. How America Pays for College, 2010. Sallie Mae's National Study of College Students and Parents

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2010

    2010-01-01

    This report presents the findings of a quantitative survey research program that Gallup, Inc. conducted on behalf of Sallie Mae. The overall objective of the study was to determine how American families are paying for higher education. The study also measures public attitudes toward college and various topics related to funding college. To achieve…

  9. How America Saves for College, 2009. Sallie Mae's National Study of College Students and Parents

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2009

    2009-01-01

    Sallie Mae's study, "How America Saves for College 2009," conducted by Gallup, provides a measure of the commitment parents have to helping their children reach higher education and whether and how they are saving for the investment. Based on a nationally representative survey of parents of children under age 18, the study found that without…

  10. How America Pays for College, 2011. Sallie Mae's National Study of College Students and Parents

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2011

    2011-01-01

    Sallie Mae's national study, "How America Pays for College," now in its fourth year, shows the resilience of American families' strongly held belief in the value of a college education. Even in the face of rising tuition costs and the worst economic decline in a generation, between academic years 2007-2008 and 2009-2010 Americans paid increasingly…

  11. How America Saves for College, 2014: Sallie Mae's National Study of Parents with Children under Age 18

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2014

    2014-01-01

    This is the fourth report in the Sallie Mae series "How America Saves for College," which launched in 2009. To understand how American families are planning for their children's education, the study captures data on parents' decision-making about savings, the use of savings vehicles, and the amount they save, as well as attitudes toward…

  12. How America Saves for College, 2013. Sallie Mae's National Study of Parents with Children under Age 18

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2013

    2013-01-01

    Sallie Mae has conducted an ongoing study, "How America Pays for College," annually since 2008. Through that study, the researchers are able to provide a clearer picture of how the typical American undergraduate is paying for college today. This report is the third in the "How America Saves for College" series conducted since 2009. Interviews took…

  13. How America Pays for College, 2017. Sallie Mae's 10th National Study of College Students and Parents

    ERIC Educational Resources Information Center

    Sallie Mae Bank, 2017

    2017-01-01

    "How America Pays for College", introduced in 2008, is a Sallie Mae national study conducted by Ipsos that annually surveys undergraduate students and parents of undergraduates about how much they pay for college and the resources they use to fund the expense. Now in its tenth year, this study also asks families about their attitudes…

  14. Oversight of Student Loan Marketing Association (Sallie Mae). Hearing Before the Subcommittee on Education, Arts and Humanities of the Committee on Labor and Human Resources. United States Senate, Ninety-Seventh Congress, Second Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Labor and Human Resources.

    Hearings concerning the activities of the Student Loan Marketing Association (Sallie Mae) are presented. Attention is focused on a request for an exemption under federal priority for recovering money owed the Association in the event that it files for liquidation or reorganization in the future under the Bankruptcy Act. It is noted that two goals…

  15. 31 CFR 354.1 - Definitions of terms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE... the claimant for another Person to hold, transfer, or deal with the Security. (b) Book-entry Sallie Mae Security means a Sallie Mae Security issued or maintained in the Book-entry System. (c) Book-entry...

  16. Hearing on the Reauthorization of the Higher Education Act of 1965; Sallie Mae--Safety and Soundness. Hearing before the Subcommittee on Postsecondary Education of the Committee on Education and Labor. House of Representatives, One Hundred Second Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Subcommittee on Postsecondary Education.

    As part of a series of hearings on the reauthorization of the Higher Education Act of 1965, testimony was heard on the safety and soundness of the Student Loan Marketing Association (Sallie Mae). Witnesses discussed many issues surrounding financial oversight of federal agencies and financial risk to the taxpayer through the potential failure of…

  17. 77 FR 74022 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-12

    ... multiple Issuer MBS is structured so that small issuers, who do not meet the minimum number of loans and... program, securities are backed by single-family or multifamily loans. Under the Ginnie Mae II program, securities are only backed by single family loans. Both the Ginnie Mae I and II MBS are modified pass-through...

  18. 78 FR 21393 - Notice of Submission of Proposed Information Collection to OMB Ginnie Mae Multiclass Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ..., allowing the private sector to combine and restructure cash flows from Ginnie Mae Single Class MBS into... program, Ginnie Mae guarantees, with the full faith and credit of the United States, the timely payment of... combine and restructure cash flows from Ginnie Mae Single Class MBS into securities that meet unique...

  19. 31 CFR 354.6 - Authority of Federal Reserve Banks.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Authority of Federal Reserve Banks... SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.6 Authority of Federal Reserve Banks. (a) Each Federal Reserve Bank is hereby authorized as fiscal agent of Sallie Mae to perform functions...

  20. 24 CFR 350.8 - Withdrawal of Eligible Book-entry Ginnie Mae Securities for Conversion to Definitive Form.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Withdrawal of Eligible Book-entry... ASSOCIATION, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.8 Withdrawal of Eligible Book-entry Ginnie Mae Securities for Conversion to Definitive Form. (a) Eligible book-entry Ginnie Mae...

  1. 24 CFR 350.8 - Withdrawal of Eligible Book-entry Ginnie Mae Securities for Conversion to Definitive Form.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Withdrawal of Eligible Book-entry... ASSOCIATION, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.8 Withdrawal of Eligible Book-entry Ginnie Mae Securities for Conversion to Definitive Form. (a) Eligible book-entry Ginnie Mae...

  2. 24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...

  3. 24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...

  4. 24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...

  5. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Sen. Barbara Mikulski, D-Md., left, talks with Tam O'Shaughnessy, Sally Ride's life partner and chair, board of directors of Sally Ride Science, prior to the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  6. Sally Ride Posthumously Receives Medal of Freedom

    NASA Image and Video Library

    2013-11-20

    Tam O'Shaughnessy, Sally Ride's life partner and chair, board of directors of Sally Ride Science, is seen with President Barack Obama as she accepts the Presidential Medal of Freedom on behalf of Dr. Ride, Wednesday, Nov. 20, 2013 at the White House in Washington. Sally Ride, who was awarded the Medal of Freedom posthumously, was the first American female astronaut to travel to space. As a role model to generations of young women, she advocated passionately for science education, stood up for racial and gender equality in the classroom, and taught students from every background that there are no limits to what they can accomplish. The Medal of Freedom is our Nation’s highest civilian honor, presented to individuals who have made especially meritorious contributions to the security or national interests of the United States, to world peace, or to cultural or other significant public or private endeavors. Photo Credit: (NASA/Carla Cioffi)

  7. Sally Ride Posthumously Receives Medal of Freedom

    NASA Image and Video Library

    2013-11-20

    Tam O'Shaughnessy, Sally Ride's life partner and chair, board of directors of Sally Ride Science, is seen with President Barack Obama as she prepares to accept the Presidential Medal of Freedom on behalf of Dr. Ride, Wednesday, Nov. 20, 2013 at the White House in Washington. Sally Ride, who was awarded the Medal of Freedom posthumously, was the first American female astronaut to travel to space. As a role model to generations of young women, she advocated passionately for science education, stood up for racial and gender equality in the classroom, and taught students from every background that there are no limits to what they can accomplish. The Medal of Freedom is our Nation’s highest civilian honor, presented to individuals who have made especially meritorious contributions to the security or national interests of the United States, to world peace, or to cultural or other significant public or private endeavors. Photo Credit: (NASA/Carla Cioffi)

  8. 31 CFR 354.6 - Authority of Federal Reserve Banks.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... accordance with the Securities Documentation, and Federal Reserve Bank Operating Circulars; to service and..., Security Entitlements, and the operation of the Book-entry System under this part. ... SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.6 Authority of Federal Reserve Banks...

  9. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    U.S. Senator Barbara Mikulski, D-Md., shares how astronaut Sally Ride changed STEM education and policy during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  10. Oversight Hearing on Student Loan Marketing Associations. Hearing before the Subcommittee on Postsecondary Education of the Committee on Education and Labor. House of Representatives, Ninety-Eighth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Education and Labor.

    Oversight hearings on the Student Loan Marketing Association (Sallie Mae) are presented. Sallie Mae was established by the Education Amendments of 1972 to provide liquidity for Guaranteed Student Loan (GSL) lenders by purchasing GSL portfolios from lenders or making loans on GSL loans held by lenders. In 1982, Sallie Mae had total cumulative…

  11. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Co-Founder of Sally Ride Science Karen Flammer talks about educational outreach programs for NASA, ISS EarthKAM, and Grail MoonKAM during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  12. 75 FR 44804 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Mortgage...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ...The Department proposes to establish a new Privacy Act SORN subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended, entitled Ginnie Mae Mortgage-Backed Security Unclaimed Funds System. The new record system will be used to track unclaimed security holder payments. Such unclaimed payments are owed to certificate holders of Ginnie Mae-guaranteed mortgage-backed securities who cannot be located by the Ginnie Mae servicer. Ginnie Mae tracks this information to ensure that security holders are paid properly.

  13. Sally Ride Science Festival

    NASA Image and Video Library

    2003-02-01

    Exhibits draw crowds of young women attending the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla. The event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees. Since it followed the tragic loss of the Columbia astronauts, a large poster was presented which attendees could sign as tribute.

  14. Cost-Free Financial Aid Focuses Kids on College

    ERIC Educational Resources Information Center

    Martinez, Tony P.; Martinez, Alison P.

    2006-01-01

    This article discusses college student financial aid. The core business of SLM Corporation, better known as Sallie Mae, is college loans. Its charitable affiliate, the Sallie Mae Fund, offers scholarships like the "First in My Family" grant, targeting first-generation Hispanic college students. Latino college students average less financial aid…

  15. The Second Annual Report of the Student Loan Marketing Association to the Congress of the United States.

    ERIC Educational Resources Information Center

    Student Loan Marketing Association, Washington, DC.

    The Student Loan Marketing Association ("Sallie Mae") is a government sponsored, private, for profit corporation, created in June 23, 1972, by the enactment of Section 439 of the Higher Education Act of 1965, as amended. Sallie Mae provides liquidity to commercial banks, savings and loan associations, mutual savings banks, credit unions,…

  16. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Singer Patti Austin performs Tena Clark's "Way Up There" during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  17. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Damian Kulash of OK Go performs "All Is Not Lost" during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  18. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Miles O'Brien of PBS serves as master of ceremonies during a National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  19. Why Students Can Still Get Loans

    ERIC Educational Resources Information Center

    Smith, Skee

    1978-01-01

    The Student Loan Marketing Association (Sallie Mae) is a private profit-making corporation chartered by Congress in 1972 to create a secondary market for Guaranteed Student Loans (a program established by Title IV-B of the 1965 Higher Education Act). Sallie Mae's job is to help lending institutions thaw frozen cash and make more loans. (BM)

  20. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Tennis legend and champion for change Billie Jean King talks of inspiration role models during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  1. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    The Maryland Classic Youth Orchestras performs "Clair du Lune" with Guest Conductor Emil de Cou during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  2. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Journalist and former First Lady of California Maria Shriver reads the poem "The Summer Day" by Mary Oliver during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  3. Children Facing School: Sally Brown and Peppermint Patty.

    ERIC Educational Resources Information Center

    Crain, William

    1999-01-01

    Analyzes the comic strip "Peanuts" characters Sally Brown and Peppermint Patty as they illustrate children's difficulties in school and their emotional responses to school. Explores how Sally illustrates the conflict between the creative impulses of childhood with school demands, while Patty illustrates the extent to which many children…

  4. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Journalist and former First Lady of California Maria Shriver talks prior to reading the poem "The Summer Day" by Mary Oliver during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  5. Sally Ride Tribute

    NASA Image and Video Library

    2013-05-20

    Student dancers from the North Carolina School of the Arts dance "Jordan" from Sweet Fields, Choreographed by Twayle Tharp, as the Centerville High School Chorus sings during the National Tribute to Sally Ride at the John F. Kennedy Center for the Performing Arts, Monday, May 20, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  6. View of Sally May/Purple Mountain Siphon Intake. Looking southeast ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of Sally May/Purple Mountain Siphon Intake. Looking southeast - Childs-Irving Hydroelectric Project, Childs System, Sally May-Purple Mountain Siphon Intake, Forest Service Road 708/502, Camp Verde, Yavapai County, AZ

  7. View of the Sally May Siphon discharge box and transition ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of the Sally May Siphon discharge box and transition to steel flume on wood trestle. Looking northeast - Childs-Irving Hydroelectric Project, Childs System, Sally May-Purple Mountain Siphon Discharge, Forest Service Road 708/502, Camp Verde, Yavapai County, AZ

  8. View of Sally May/Purple Mountain Siphon. FS road #502 is ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of Sally May/Purple Mountain Siphon. FS road #502 is in the bottom foreground. Looking west-southwest - Childs-Irving Hydroelectric Project, Childs System, Sally May-Purple Mountain Siphon, Forest Service Road 708/502, Camp Verde, Yavapai County, AZ

  9. View of Sally May/Purple Mountain Siphon Intake house from the ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of Sally May/Purple Mountain Siphon Intake house from the south showing the flume existing. Looking north - Childs-Irving Hydroelectric Project, Childs System, Sally May-Purple Mountain Siphon Intake, Forest Service Road 708/502, Camp Verde, Yavapai County, AZ

  10. The Legend of Sally Hemings

    ERIC Educational Resources Information Center

    Belz, Herman

    2012-01-01

    The part played by Sally Hemings in the life of Thomas Jefferson has been regarded as provocatively dubious since political enemy James Callender claimed in 1802 that Jefferson was the father of several of Hemings's children. Historian Merrill Peterson, observing that paternity is hard to prove, wrote in 1960 that no concrete evidence was ever…

  11. Sally Ride Women in Science Panel

    NASA Image and Video Library

    2013-05-17

    Dan Vergano, science writer for USA Today talks during a program titled "Sally Ride: How Her Historic Space Mission Opened Doors for Women in Science" held on Friday, May 17, 2013 at the National Air and Space Museum in Washington. Photo Credit: (NASA/Bill Ingalls)

  12. Simulator - Ride, Sally K.

    NASA Image and Video Library

    1983-05-24

    S83-32568 (23 May 1983) --- Astronaut Sally K. Ride, STS-7 mission specialist, straps herself into a seat in the Shuttle Mission Simulator (SMS) in Johnson Space Center?s Mission Simulation and Training Facility. Dr. Ride and the other STS-7 crew members continue their simulations in the motion base simulator in preparation for their flight in the space shuttle Challenger. Launch is scheduled for June 18. Troy Stewart, suit technician, assisted Dr. Ride. Photo credit: NASA

  13. Sally Ride Women in Science Panel

    NASA Image and Video Library

    2013-05-17

    Rene McCormick, director of standards and quality, National Math and Science Initiative, talks during a program titled "Sally Ride: How Her Historic Space Mission Opened Doors for Women in Science" held on Friday, May 17, 2013 at the National Air and Space Museum in Washington. Photo Credit: (NASA/Bill Ingalls)

  14. Bringing Sally Smith's Vision to Manayunk

    ERIC Educational Resources Information Center

    Ford, Jackie

    2010-01-01

    In this article, the author narrates her application of what she learned from her internship at Sally Smith's Lab School of Washington to her new school and shares the favorable impact it had brought on her teaching career. The author shares her first exposure to the powerful effects of Smith's "Live It, Learn It" methodology as she…

  15. Simulator - Ride, Sally K.

    NASA Image and Video Library

    1983-05-24

    S83-32571 (23 May 1983) --- Four-fifths of the STS-7 crew take a break from simulations in the Johnson Space Center?s Mission Simulation and Training Facility and pose for NASA photographer. Standing on the steps leading into the motion-based Shuttle Mission Simulator (SMS) are (left to right) astronauts Robert L. Crippen, John M. Fabian, Frederick H. Hauck and Sally K. Ride. Crippen is crew commander; Hauck, pilot; and Fabian and Ride are mission specialists, along with Norman E. Thagard (not involved in this phase of training and not pictured). Photo credit: NASA

  16. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Securities Program Documents AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase... Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None. Description of the Need for...

  17. Simulator - Ride, Sally K.

    NASA Image and Video Library

    1983-05-24

    S83-32569 (23 May 1983) --- A preview of NASA?s next spaceflight is provided by this scene in the Johnson Space Center?s Shuttle mission simulator (SMS) with four-fifths of the crew in the same stations they will be in for launch and landing phases of the Challenger?s second space mission. They are (left-right) Astronauts Robert L. Crippen, crew commander; Frederick H. Hauck, pilot; John M. Fabian and Dr. Sally K. Ride, mission specialists. Dr. Norman E. Thagard, a third mission specialist, is to be seated in the mid-deck area below the flight deck for launch and landing phases. Launch is now scheduled for June 18.

  18. 75 FR 58421 - Notice of Submission of Proposed Information Collection to OMB Ginnie Mae Mortgage-Backed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-24

    ...The proposed information collection requirement described below has been submitted to the Office of Management and Budget (OMB) for review, as required by the Paperwork Reduction Act. The Department is soliciting public comments on the subject proposal. This information is collected by Ginnie Mae from issuers/customers that participate in its Mortgage-Backed Securities programs to monitor performance and compliance with established rules and regulations.

  19. View of Steel Flume Bridge #3 crossing over Sally May ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of Steel Flume Bridge #3 crossing over Sally May Wash. Looking northwest - Childs-Irving Hydroelectric Project, Childs System, Flume Bridge No. 3, Forest Service Road 708/502, Camp Verde, Yavapai County, AZ

  20. Astronaut Sally K. Ride outside of shuttle mission simulator

    NASA Image and Video Library

    1983-05-26

    S83-32890 (23 May 1983) --- Astronaut Sally K. Ride, STS-7 mission specialist, stands near the Shuttle Mission Simulator (SMS) in Johnson Space Center's (JSC) Mission Simulation and Training Facility with suit specialist Alan M. Rochford after simulation of various phases of the upcoming STS-7 flight. Photo credit: NASA

  1. Motion mechanisms with different spatiotemporal characteristics identified by an MAE technique with superimposed gratings.

    PubMed

    Shioiri, Satoshi; Matsumiya, Kazumichi

    2009-05-29

    We investigated spatiotemporal characteristics of motion mechanisms using a new type of motion aftereffect (MAE) we found. Our stimulus comprised two superimposed sinusoidal gratings with different spatial frequencies. After exposure to the moving stimulus, observers perceived the MAE in the static test in the direction opposite to that of the high spatial frequency grating even when low spatial frequency motion was perceived during adaptation. In contrast, in the flicker test, the MAE was perceived in the direction opposite to that of the low spatial frequency grating. These MAEs indicate that two different motion systems contribute to motion perception and can be isolated by using different test stimuli. Using a psychophysical technique based on the MAE, we investigated the differences between the two motion mechanisms. The results showed that the static MAE is the aftereffect of the motion system with a high spatial and low temporal frequency tuning (slow motion detector) and the flicker MAE is the aftereffect of the motion system with a low spatial and high temporal frequency tuning (fast motion detector). We also revealed that the two motion detectors differ in orientation tuning, temporal frequency tuning, and sensitivity to relative motion.

  2. Sally Ride Women in Science Panel

    NASA Image and Video Library

    2013-05-17

    Panel discussion participants, from left, Linda Billings, research professor, Media and Public Affairs, The George Washington University, Ellen Ochoa, director, NASA Johnson Space Center, Tom Costello, NBC News and moderator for the event, Margaret Weitekamp, space history curator, National Air and Space Museum, Dan Vergano, science writer for USA Today, and Rene McCormick, director of standards and quality, National Math and Science Initiative, are seen during a program titled "Sally Ride: How Her Historic Space Mission Opened Doors for Women in Science" held on Friday, May 17, 2013 at the National Air and Space Museum in Washington. Photo Credit: (NASA/Bill Ingalls)

  3. View of the Flume above Sally May Siphon ("Steel Flume ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of the Flume above Sally May Siphon ("Steel Flume on Trestles" in narrative inventory). At far end is Flume Tunnel No. 3 (AZ-65-T) through Purple Mountain. Looking southwest - Childs-Irving Hydroelectric Project, Childs System, Steel Flume on Trestles, Forest Service Road 708/502, Camp Verde, Yavapai County, AZ

  4. Rethinking Research in Early Care and Education: Joining Sally's Quest

    ERIC Educational Resources Information Center

    New, Rebecca S.

    2008-01-01

    The article considers three domains of Sally Lubeck's scholarship as illustrations of her orientation to research on early care and education: her critique of positivism in general and the field of developmental psychology (and the sub-discipline of child development) specifically as the primary source of a "knowledge base" for the field of early…

  5. Optimization of microwave-assisted extraction with saponification (MAES) for the determination of polybrominated flame retardants in aquaculture samples.

    PubMed

    Fajar, N M; Carro, A M; Lorenzo, R A; Fernandez, F; Cela, R

    2008-08-01

    The efficiency of microwave-assisted extraction with saponification (MAES) for the determination of seven polybrominated flame retardants (polybrominated biphenyls, PBBs; and polybrominated diphenyl ethers, PBDEs) in aquaculture samples is described and compared with microwave-assisted extraction (MAE). Chemometric techniques based on experimental designs and desirability functions were used for simultaneous optimization of the operational parameters used in both MAES and MAE processes. Application of MAES to this group of contaminants in aquaculture samples, which had not been previously applied to this type of analytes, was shown to be superior to MAE in terms of extraction efficiency, extraction time and lipid content extracted from complex matrices (0.7% as against 18.0% for MAE extracts). PBBs and PBDEs were determined by gas chromatography with micro-electron capture detection (GC-muECD). The quantification limits for the analytes were 40-750 pg g(-1) (except for BB-15, which was 1.43 ng g(-1)). Precision for MAES-GC-muECD (%RSD < 11%) was significantly better than for MAE-GC-muECD (%RSD < 20%). The accuracy of both optimized methods was satisfactorily demonstrated by analysis of appropriate certified reference material (CRM), WMF-01.

  6. Effects of landuse change on the hydrologic regime of the Mae Chaem river basin, NW Thailand

    NASA Astrophysics Data System (ADS)

    Thanapakpawin, P.; Richey, J.; Thomas, D.; Rodda, S.; Campbell, B.; Logsdon, M.

    2007-02-01

    SummaryConflicts between upland shifting cultivation, upland commercial crops, and lowland irrigated agriculture cause water resource tension in the Mae Chaem watershed in Chiang Mai, Thailand. In this paper, we assess hydrologic regimes of the Mae Chaem River with landuse change. Three plausible future forest-to-crop expansion scenarios and a scenario of crop-to-forest reversal were developed based on the landcover transition from 1989 to 2000, with emphasis on influences of elevation bands and irrigation diversion. Basin hydrologic responses were simulated using the Distributed Hydrology Soil Vegetation Model (DHSVM). Meteorological data from six weather stations inside and adjacent to the Mae Chaem watershed during the period 1993-2000 were the climate inputs. Computed stream flow was compared to observed discharge at Ban Mae Mu gauge on Mae Mu river, Ban Mae Suk gauge on Mae Suk river, and at Kaeng Ob Luang, located downstream from the district town in Mae Chaem. With current assumptions, expansion of highland crop fields led to slightly higher regulated annual and wet-season water yields compared to similar expansion in the lowland-midland zone. Actual downstream water availability was sensitive to irrigation diversion. This modeling approach can be a useful tool for water allocation for small watersheds undergoing rapid commercialization, because it alerts land managers to the potential range of water supply in wet and dry seasons, and provides information on spatial distribution of basin hydrologic components.

  7. Objectivity and Its Discontents: Knowledge Advocacy in the Sally Hemings Controversy

    ERIC Educational Resources Information Center

    Whooley, Owen

    2008-01-01

    The sociology of knowledge, derived from research on the hard sciences, overlooks the potential for outsiders to determine the content of knowledge within professional disciplines. Using the case of the Sally Hemings affair, I introduce the concept of "knowledge advocacy" to analyze how outside groups shape historical knowledge. The Hemings…

  8. The Sally-Anne Test: An Interactional Analysis of a Dyadic Assessment

    ERIC Educational Resources Information Center

    Korkiakangas, Terhi; Dindar, Katja; Laitila, Aarno; Kärnä, Eija

    2016-01-01

    Background: The Sally-Anne test has been extensively used to examine children's theory of mind understanding. Many task-related factors have been suggested to impact children's performance on this test. Yet little is known about the interactional aspects of such dyadic assessment situations that might contribute to the ways in which children…

  9. Sally Reis and Joe Renzulli: Models for Education Reform, Part 2

    ERIC Educational Resources Information Center

    McLester, Susan

    2012-01-01

    The term "talent development" has historically been associated only with gifted education in the K12 education world. But for the past 30 years, husband and wife team Joseph Renzulli and Sally Reis have been steadily increasing the pool of educators trained to apply talent development practices to mainstream instruction through the Renzulli…

  10. Secondary Market Activities of the Student Loan Marketing Association. Report to the Committee on Labor and Human Resources, United States Senate.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC.

    Lending and secondary market activities of the Student Loan Marketing Association (Sallie Mae) since it began operations in 1973 were reviewed. Specific areas of review were: the Association's legislative development and financial activities, its profitability compared to commercial banks and other government-sponsored enterprises that provide…

  11. Implications of the Failure of the Higher Education Assistance Foundation. Hearing before the Committee on Banking, Housing, and Urban Affairs. United States Senate, One Hundred First Congress, Second Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Banking, Housing and Urban Affairs.

    This hearing before the Committee on Banking, Housing, and Urban Affairs, addresses the implications of the anticipated failure of the Higher Education Assistance Foundation (HEAF), the largest guarantor of student loans. HEAF's difficulties have affected Sallie Mae (Student Loan Marketing Association), and have raised general questions about the…

  12. SUMMER 2003 DOCUMENTATION TEAM FOR THE HOUSE, THE 2003 SALLY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    SUMMER 2003 DOCUMENTATION TEAM FOR THE HOUSE, THE 2003 SALLY KRESS TOMPKINS FELLOW, AND HABS STAFF IN FRONT OF THE MAIN ENTRANCE AT THE WOODLANDS DURING THE PROJECT CLOSE-OUT, 14 AUGUST 2003. LEFT TO RIGHT, FRONT ROW: SHALINI MAHAJAN, CATHERINE C. LAVOIE, STEVEN B. UTZ, COURTNEY L. GUNDERSON. BACK ROW: MARGARET TULLOCH, JAMES A. JACOBS, ROBERT R. ARZOLA, MORGAN GICK - The Woodlands, 4000 Woodlands Avenue, Philadelphia, Philadelphia County, PA

  13. Sally L. Smith: A Genius at Seeing the Potential in People

    ERIC Educational Resources Information Center

    Edgerton, Mary Allen

    2010-01-01

    What this author admired most about Sally Smith was the fact that she was a visionary about people and what they could accomplish. She saw more potential in a person--young or old--than anybody or even they themselves, frankly, had ever even considered possible. She was a genius at seeing the potential in people, expecting them to find it in…

  14. Policies and Practice: A Focus on Higher Education Retention.

    ERIC Educational Resources Information Center

    American Association of State Colleges and Universities, Washington, DC.

    This book, based on a discussion at an interactive videoconference, examines student diversity issues and retention strategies in the context of the Sallie Mae National Retention Project that addressed state expectations for more accountability and federal reporting requirements on graduation and retention. The eight chapters focus on equity as it…

  15. 31 CFR 354.3 - Law governing other interests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 354.3 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.3 Law governing other interests. (a) To... jurisdiction specified in paragraph (b) of this section is a State that has not adopted Revised Article 8...

  16. 31 CFR 354.3 - Law governing other interests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Law governing other interests. 354.3... OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.3 Law governing other interests. (a) To the extent not inconsistent with the regulations in this part, the law (not including the conflict-of...

  17. Student-Loan Investigation Sweeps Up More Colleges

    ERIC Educational Resources Information Center

    Basken, Paul; Field, Kelly

    2007-01-01

    An expanding investigation into conflicts of interest in the student-loan industry continued to sweep up more lenders and college financial-aid administrators last week. The nation's largest student-loan provider, Sallie Mae, accepted a $2-million settlement with New York State's attorney general, Andrew M. Cuomo, and three more college officials…

  18. Kids2College: Getting Students to Think about Their Future

    ERIC Educational Resources Information Center

    National Middle School Association (NJ3), 2007

    2007-01-01

    A sixth grade class is asked: "When should you start thinking about and planning for college?" Most students answer with "tenth or eleventh grade," but invariably some brave soul raises a hand and tentatively responds with more of a question than an answer: "Now?" Yes, now. In 1992, Sallie Mae, the nation's largest…

  19. Majoring in Money: How American College Students Manage Their Finances

    ERIC Educational Resources Information Center

    Sallie Mae Bank, 2016

    2016-01-01

    Sallie Mae, the nation's saving, planning, and paying for college company, along with Ipsos, one of the world's largest, independent market research companies, surveyed 800 college students to learn more about how they are managing their finances and using credit. The online survey, completed in December 2015, comprised a cross-section of key…

  20. Optimization of microwave-assisted extraction (MAE) of coriander phenolic antioxidants - response surface methodology approach.

    PubMed

    Zeković, Zoran; Vladić, Jelena; Vidović, Senka; Adamović, Dušan; Pavlić, Branimir

    2016-10-01

    Microwave-assisted extraction (MAE) of polyphenols from coriander seeds was optimized by simultaneous maximization of total phenolic (TP) and total flavonoid (TF) yields, as well as maximized antioxidant activity determined by 1,1-diphenyl-2-picrylhydrazyl and reducing power assays. Box-Behnken experimental design with response surface methodology (RSM) was used for optimization of MAE. Extraction time (X1 , 15-35 min), ethanol concentration (X2 , 50-90% w/w) and irradiation power (X3 , 400-800 W) were investigated as independent variables. Experimentally obtained values of investigated responses were fitted to a second-order polynomial model, and multiple regression analysis and analysis of variance were used to determine fitness of the model and optimal conditions. The optimal MAE conditions for simultaneous maximization of polyphenol yield and increased antioxidant activity were an extraction time of 19 min, an ethanol concentration of 63% and an irradiation power of 570 W, while predicted values of TP, TF, IC50 and EC50 at optimal MAE conditions were 311.23 mg gallic acid equivalent per 100 g dry weight (DW), 213.66 mg catechin equivalent per 100 g DW, 0.0315 mg mL(-1) and 0.1311 mg mL(-1) respectively. RSM was successfully used for multi-response optimization of coriander seed polyphenols. Comparison of optimized MAE with conventional extraction techniques confirmed that MAE provides significantly higher polyphenol yields and extracts with increased antioxidant activity. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.

  1. Astronauts Sally Ride and Terry Hart prepare for RMS training for STS-2

    NASA Image and Video Library

    1981-07-17

    Astronauts Sally Ride and Terry Hart prepare for remote manipulator system (RMS) training for STS-2 in bldg 9A. Views include Ride, Hart and Robert R. Kain of the Flight Activites Branch reviewing procedures for RMS training (34262); Ride and Hart stand beside the RMS control center looking down at the payload bay mock-up (34263).

  2. Speech/Language Pathologists Reflect on Sally Smith and the Lab School of Washington

    ERIC Educational Resources Information Center

    Learning Disabilities: A Multidisciplinary Journal, 2010

    2010-01-01

    Sally L. Smith had a clear vision of how she thought speech and language services should be integrated into her school, The Lab School of Washington. It was Smith's idea that language therapists should work individually with students to help them make gains in their particular areas of need, as well as to work collaboratively with the teachers,…

  3. Suspended Education Department Official Had Approved Waiver for Former Employer

    ERIC Educational Resources Information Center

    Basken, Paul

    2007-01-01

    Matteo Fontana, the student-aid official in the U.S. Department of Education who was suspended last month in an ethics case, issued a controversial high-stakes legal ruling in 2004 that benefited his former employer, Sallie Mae, on the day before the nation's top student lender completed its transition from a government-founded lender into a…

  4. A Reflective Conversation with Joe Renzulli and Sally Reis: About the Renzulli Learning System

    ERIC Educational Resources Information Center

    Renzulli, Joe; Reis, Sally; Shaughnessy, Michael F

    2014-01-01

    In this reflective conversation, Dr. Joe Renzulli and Dr. Sally Reis respond to questions about the newly developed Renzulli Learning System. They discuss the system in light of the Schoolwide Enrichment Model (SEM) and provide information regarding its use with curriculum compacting and Renzulli's "Three Ring Conceptualization of…

  5. Becoming a "History Person" or, If Sally Says It's Possible, It Must Be

    ERIC Educational Resources Information Center

    Rowland, Nancy

    2010-01-01

    In this article, the author shares how Sally Smith, founder of The Lab School of Washington, was right about her being a "history person" when she was assigned to teach Democracy at the Lab School. The author was hired to teach Democracy in 1996, after working in the Junior High for a year as an assistant teacher. Smith explained to the author…

  6. Microwave-assisted extraction (MAE) of bioactive saponin from mahogany seed (Swietenia mahogany Jacq)

    NASA Astrophysics Data System (ADS)

    Waziiroh, E.; Harijono; Kamilia, K.

    2018-03-01

    Mahogany is frequently used for medicines for cancer, tumor, and diabetes, as it contains saponin and flavonoid. Saponin is a complex glycosydic compound consisted of triterpenoids or steroids. Saponin can be extracted from a plant by using a solvent extraction. Microwave Assisted Extraction (MAE) is a non-conventional extraction method that use micro waves in the process. This research was conducted by a Complete Random Design with two factors which were extraction time (120, 150, and 180 seconds) and solvent ratio (10:1, 15:1, and 20:1 v/w). The best treatment of MAE were the solvent ratio 15:1 (v/w) for 180 seconds. The best treatment resulting crude saponin extract yield of 41.46%, containing 11.53% total saponins, and 49.17% of antioxidant activity. Meanwhile, the treatment of maceration method were the solvent ratio 20:1 (v/w) for 48 hours resulting 39.86% yield of saponin crude extract, 9.26% total saponins and 56.23% of antioxidant activity. The results showed MAE was more efficient (less time of extraction and solvent amount) than maceration method.

  7. How Fair Is College Financing that Speaks Spanish First?

    ERIC Educational Resources Information Center

    Allen, Kerri

    2007-01-01

    2Futuro is a new "Spanish-first" college-financing program rolled out by Sallie Mae and USA Funds. The pilot version of 2Futuro launched last summer and is, say its partnering agents, "the only fully bilingual college-financing and outreach program that enables Hispanic parents and students to apply for college loans in Spanish. By the end of the…

  8. SALLY LEVEL II- COMPUTE AND INTEGRATE DISTURBANCE AMPLIFICATION RATES ON SWEPT AND TAPERED LAMINAR FLOW CONTROL WINGS WITH SUCTION

    NASA Technical Reports Server (NTRS)

    Srokowski, A. J.

    1994-01-01

    The computer program SALLY was developed to compute the incompressible linear stability characteristics and integrate the amplification rates of boundary layer disturbances on swept and tapered wings. For some wing designs, boundary layer disturbance can significantly alter the wing performance characteristics. This is particularly true for swept and tapered laminar flow control wings which incorporate suction to prevent boundary layer separation. SALLY should prove to be a useful tool in the analysis of these wing performance characteristics. The first step in calculating the disturbance amplification rates is to numerically solve the compressible laminar boundary-layer equation with suction for the swept and tapered wing. A two-point finite-difference method is used to solve the governing continuity, momentum, and energy equations. A similarity transformation is used to remove the wall normal velocity as a boundary condition and place it into the governing equations as a parameter. Thus the awkward nonlinear boundary condition is avoided. The resulting compressible boundary layer data is used by SALLY to compute the incompressible linear stability characteristics. The local disturbance growth is obtained from temporal stability theory and converted into a local growth rate for integration. The direction of the local group velocity is taken as the direction of integration. The amplification rate, or logarithmic disturbance amplitude ratio, is obtained by integration of the local disturbance growth over distance. The amplification rate serves as a measure of the growth of linear disturbances within the boundary layer and can serve as a guide in transition prediction. This program is written in FORTRAN IV and ASSEMBLER for batch execution and has been implemented on a CDC CYBER 70 series computer with a central memory requirement of approximately 67K (octal) of 60 bit words. SALLY was developed in 1979.

  9. The Sally-Anne test: an interactional analysis of a dyadic assessment.

    PubMed

    Korkiakangas, Terhi; Dindar, Katja; Laitila, Aarno; Kärnä, Eija

    2016-11-01

    The Sally-Anne test has been extensively used to examine children's theory of mind understanding. Many task-related factors have been suggested to impact children's performance on this test. Yet little is known about the interactional aspects of such dyadic assessment situations that might contribute to the ways in which children respond to the test questions. To examine the interactional factors contributing to the performance of two children in the Sally-Anne test. To identify the interactional practices used by the tester administering the task and to describe how interactional features can pose challenges in the critical belief and reality questions for both the tester and the testee. The Sally-Anne test was carried out as part of a project examining children's interactions in a technology-enhanced environment. The present study uses video recordings of two children with communication disorders (one with a current diagnosis of autism spectrum disorder [ASD]) and an adult tester. We draw on a multimodal approach to conversation analysis (CA) to examine the sequential organization of the test questions and answers. The children drew on diverse resources when producing responses to the test questions: responding verbally, pointing or manually handling objects. The tester treated these responses differently depending on how they were produced. When the child pointed at an object and verbally indicated their response, the tester moved on to the next question apparently accepting the child's answer. When the child manually handled an object or produced a quiet verbal response, the tester repeated the question indicating that the child's actions did not constitute an adequate response to a test question. In response to this, both children modified or changed their previous responses. Through monitoring each other, the tester and the child produced actions highly responsive to the features of each other's conduct, which underpinned the conduct of the test itself

  10. Determination of Magneto-crystalline Anisotropy Energy (MAE) Of ordered L10 CoPt and FePt nanoparticles

    NASA Astrophysics Data System (ADS)

    Alsaad, A.; Ahmad, A. A.; Shukri, A. A.; Bani-Younes, O. A.

    2018-02-01

    The structural and magnetic properties of both L10 ordered FePt and CoPt nanoparticles make them potential candidates for optical-electronic and magneto-optical devices. First, we carried out an ab initio total energy minimization study to find the geometrical optimization of both L10 phases of FePt and CoPt nanoparticles. Then, we investigated the magnetocrystalline anisotropy energy (MAE) of both systems along special line joining the points of high symmetry (A,B and C points) using super-cell slap approach with alternating layers Fe/Co and Pt along the (001) direction. We found that the point (A) has the highest MAE value for both systems, where the value of MAE in FePt is 8.89 × 107 erg/cm3 and in CoPt is 6.40 × 107 erg/cm3. Our spin density based calculations indicate that large spin-orbit interaction and the hybridization between Pt 5d states and Fe/Co 3d states are the dominant factors in determining the MAE in both systems.

  11. African-American Soul Force: Dance, Music and Vera Mae Green.

    ERIC Educational Resources Information Center

    Bolles, A. Lynn

    1986-01-01

    The Black anthropologist, Vera Mae Green, is featured in this analysis of the concept of soul as applied to African-Americans. Music and dance are used to express soul in cultural context. But soul is also a force, an energy which encompasses the Black experience and makes Black culture persevere. (VM)

  12. 78 FR 77450 - Fannie Mae and Freddie Mac Loan Purchase Limits: Request for Public Input on Implementation Issues

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... reductions in Freddie Mac's and Fannie Mae's loan purchase limits. In short, no final decision on loan... decision to direct the setting of new and lower loan purchase limits by the Enterprises. A Plan for Setting... FEDERAL HOUSING FINANCE AGENCY [No. 2013-N-18] Fannie Mae and Freddie Mac Loan Purchase Limits...

  13. Palynology and organic/isotope geochemistry of the Mae Moh Basin, Northern Thailand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Minh, L.V.; Abrajano, T.; Burden, E.

    The Mae Moh basin is one of several Tertiary intermontane basins in northern Thailand, whose evolution has been linked to the collision of the Indian plate with the Eurasian plate since the early Eocene. As in most of these basins, lacustrine/swamp sedimentation in the Mae Moh basin can be broadly divided into an Oligocene to Miocene synrift sequence and a Miocene to Quarternary postrift sequence. The dominance of swamp flora recognized from spore and pollen assemblages (e.g., Polypodiidites usmensis, Verrucatosporites, Cyrtostachys), as well as the abundance of macrophytes and woody debris, indicate overwhelming hot and humid swamp conditions, with lakemore » development restricted to relatively small areas. The distribution of alkanes and their compound-specific carbon isotope compositions are used to further show climatic variations affecting the lake/swamp ecology during the deposition of the synrift sequence.« less

  14. Experiments on the applicability of MAE techniques for predicting sound diffraction by irregular terrains. [Matched Asymptotic Expansion

    NASA Technical Reports Server (NTRS)

    Berthelot, Yves H.; Pierce, Allan D.; Kearns, James A.

    1987-01-01

    The sound field diffracted by a single smooth hill of finite impedance is studied both analytically, within the context of the theory of Matched Asymptotic Expansions (MAE), and experimentally, under laboratory scale modeling conditions. Special attention is given to the sound field on the diffracting surface and throughout the transition region between the illuminated and the shadow zones. The MAE theory yields integral equations that are amenable to numerical computations. Experimental results are obtained with a spark source producing a pulse of 42 microsec duration and about 130 Pa at 1 m. The insertion loss of the hill is inferred from measurements of the acoustic signals at two locations in the field, with subsequent Fourier analysis on an IBM PC/AT. In general, experimental results support the predictions of the MAE theory, and provide a basis for the analysis of more complicated geometries.

  15. The Budget of the United States Government. Department of Defense Budget for Fiscal Years 1992 and 1993

    DTIC Science & Technology

    1991-02-04

    and reached agree- ment with the Student Loan Marketing Association (Sallie Mae) to assume man- agement responsibility for the HEAF port- folio in... Sensitivities 29 Part Two. THEMES AND PRIORITIES TV. Investing in the Future 1 A. Investing in Human Capital and Reforming American Education 3...With U.S. leadership, the global response to the Iraqi invasion has the potential to set a favor- able precedent for the post-Cold-War era

  16. Sorption characteristics of cadmium in a clay soil of Mae Ku creek, Tak Province, Thailand

    NASA Astrophysics Data System (ADS)

    Thunyawatcharakul, P.; Chotpantarat, S.

    2018-05-01

    Mae Sot is a district in Tak province, the northern part of Thailand where has encountered with cadmium (Cd) contaminated in soils. Exposure of Cd can lead to severe health effect, for examples, bone softening, osteoporosis, renal dysfunction, and Itai-Itai disease. This study aims at elucidating sorption behavior of Cd in the contaminated soil collected from Mae Ku creek, Mae Sot district, Thailand. Batch sorption experiment was conducted in order to investigate sorption characteristics of Cd onto the contaminated soil. The soil sample taken from the study area consists of 26% sand, 16% silt 58% clay, which categorized as a clay soil, based on USDA classification. Soil pH is slightly alkaline (pH∼7.7) and organic matter in the soil is 2.93%. The initial concentration in the batch sorption experiment was in the range from 0- 200 ppm. The result from the batch sorption experiment showed that soil sample can adsorb Cd up to 173.5 ppm and the sorption behavior of the soil sample can be well described by Freundlich isotherm, indicating the multilayer sorption (R2 = 0.9964), with Freundlich constants of 0.312 and 1.760 L g-1 for 1/n and Kf, respectively.

  17. [Aquatic Ecological Index based on freshwater (ICE(RN-MAE)) for the Rio Negro watershed, Colombia].

    PubMed

    Forero, Laura Cristina; Longo, Magnolia; John Jairo, Ramirez; Guillermo, Chalar

    2014-04-01

    Aquatic Ecological Index based on freshwater (ICE(RN-MAE)) for the Rio Negro watershed, Colombia. Available indices to assess the ecological status of rivers in Colombia are mostly based on subjective hypotheses about macroinvertebrate tolerance to pollution, which have important limitations. Here we present the application of a method to establish an index of ecological quality for lotic systems in Colombia. The index, based on macroinvertebrate abundance and physicochemical variables, was developed as an alternative to the BMWP-Col index. The method consists on determining an environmental gradient from correlations between physicochemical variables and abundance. The scores obtained in each sampling point are used in a standardized correlation for a model of weighted averages (WA). In the WA model abundances are also weighted to estimate the optimum and tolerance values of each taxon; using this information we estimated the index of ecological quality based also on macroinvertebrate (ICE(RN-MAE)) abundance in each sampling site. Subsequently, we classified all sites using the index and concentrations of total phosphorus (TP) in a cluster analysis. Using TP and ICE(RN-MAE), mean, maximum, minimum and standard deviation, we defined threshold values corresponding to three categories of ecological status: good, fair and critical.

  18. Temperature Variability Associated with the Middle Atmosphere Electrodynamics (MAE-1) Campaign

    NASA Technical Reports Server (NTRS)

    Schmidlin, F. J.

    1999-01-01

    Meteorological rockets launched during the Middle Atmosphere Electrodynamics (MAE-1) Campaign in October 1980 from Andoya Rocket Range (ARR), Norway, exhibited large and unexpected temperature variability. Temperatures were found to vary as much as 20 C within a few hours and demonstrated a similar type of variability from one day to the next. Following examination of the reduced rocketsonde profiles the question was raised whether the observed variability was due to natural atmospheric variability or instrument malfunction. Small-scale variability, as observed, may result from one or multiple sources, e.g., intense storms upstream from the observing site, orography such as mountain waves off of the Greenland Plateau, convective activity, gravity waves, etc. Arranging the observations spaced over time showed that the perturbations moved downward. Prior to MAE-1 very few small rocketsonde measurements had been launched from ARR, thus the quality of the initial measurements in early October caused concern when the large variability was noted. We discuss the errors of the rocketsonde measurements, graphically review the nature of the variability observed, compare the data with other measurements, and postulate a possible cause for the variability.

  19. Revisiting "No Easy Answers": Application of Sally Smith's Methods in the Lab School of Washington High School Program

    ERIC Educational Resources Information Center

    Reynolds, Meredith

    2010-01-01

    The first edition of "No Easy Answers" (Smith, 1995) was published in 1979, thirty years ago. That seminal work is as relevant today as it was when the book first appeared. This article provides a description of how Sally Smith's Academic Club Method is implemented in the High School program of The Lab School of Washington.

  20. Prone to pregnancy: Orlando, Virginia Woolf and Sally Potter represent the gestating body.

    PubMed

    Maher, Jane Maree

    2007-03-01

    The visibility of pregnancy in contemporary societies through various forms of medical imaging has often been interpreted by feminist critics as negative for the autonomy and experience of pregnant women. Here, I consider the representation of pregnancy in Virginia Woolf's novel, Orlando, and Sally Potter's film of the same name arguing that, despite limited critical attention to Orlando's pregnancy, these texts offer a productive interpretation of gestation that counters conventionally reductive cultural images of that embodied state. In particular, I argue that Potter's translation of Woolf's novel to the screen gives us a useful model for thinking through the new visibility of pregnancy in contemporary Western culture.

  1. 77 FR 37697 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ...- Backed Securities Issuer. 11702 I-2 Resolution of Board 210 1 210 0.08 16.8 of Directors and Certificate of Authorized Signatures. 11704 II-2 Commitment to 210 4 840 0.033 27.7 Guaranty Mortgage- Backed Securities. 11707 III-1 Master Servicing 210 1 210 0.016 3.4 Agreement. 11709 III-2 Master Agreement 210 1...

  2. Measuring teachers' knowledge of attention deficit hyperactivity disorder: the MAE-TDAH Questionnaire.

    PubMed

    Soroa, Marian; Balluerka, Nekane; Gorostiaga, Arantxa

    2014-10-28

    The lack of methodological rigor is frequent in most of instruments developed to assess the knowledge of teachers regarding Attention Deficit Hyperactivity Disorder (ADHD). The aim of this study was to develop a questionnaire, namely Questionnaire for the evaluation of teachers' knowledge of ADHD (MAE-TDAH), for measuring the level of knowledge about ADHD of infant and primary school teachers. A random sample of 526 teachers from 57 schools in the Autonomous Community of the Basque Country and Navarre was used for the analysis of the psychometric properties of the instrument. The participant teachers age range was between 22 and 65 (M = 42.59; SD = 10.89), and there were both generalist and specialized teachers. The measure showed a 4 factor structure (Etiology of ADHD, Symptoms/Diagnosis of ADHD, General information about ADHD and Treatment of ADHD) with adequate internal consistency (Omega values ranged between .83 and .91) and temporal stability indices (Spearman's Rho correlation values ranged between .62 and .79). Furthermore, evidence of convergent and external validity was obtained. Results suggest that the MAE-TDAH is a valid and reliable measure when it comes to evaluating teachers' level of knowledge of ADHD.

  3. 76 FR 31624 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-01

    ... Securities Issuer. 11702 I-2 Resolution of Board 210 1 210 0.08 16.8 of Directors and Certificate of Authorized Signatures. 11704 II-2 Commitment to 210 4 840 0.033 27.7 Guaranty Mortgage- Backed Securities. 11707 III-1 Master Servicing 210 1 210 0.016 3.4 Agreement. 11709 III-2 Master Agreement for 210 1 210 0...

  4. An exact algorithm for optimal MAE stack filter design.

    PubMed

    Dellamonica, Domingos; Silva, Paulo J S; Humes, Carlos; Hirata, Nina S T; Barrera, Junior

    2007-02-01

    We propose a new algorithm for optimal MAE stack filter design. It is based on three main ingredients. First, we show that the dual of the integer programming formulation of the filter design problem is a minimum cost network flow problem. Next, we present a decomposition principle that can be used to break this dual problem into smaller subproblems. Finally, we propose a specialization of the network Simplex algorithm based on column generation to solve these smaller subproblems. Using our method, we were able to efficiently solve instances of the filter problem with window size up to 25 pixels. To the best of our knowledge, this is the largest dimension for which this problem was ever solved exactly.

  5. Optimization of microwave assisted extraction (MAE) and soxhlet extraction of phenolic compound from licorice root.

    PubMed

    Karami, Zohreh; Emam-Djomeh, Zahra; Mirzaee, Habib Allah; Khomeiri, Morteza; Mahoonak, Alireza Sadeghi; Aydani, Emad

    2015-06-01

    In present study, response surface methodology was used to optimize extraction condition of phenolic compounds from licorice root by microwave application. Investigated factors were solvent (ethanol 80 %, methanol 80 % and water), liquid/solid ratio (10:1-25:1) and time (2-6 min). Experiments were designed according to the central composite rotatable design. The results showed that extraction conditions had significant effect on the extraction yield of phenolic compounds and antioxidant capacities. Optimal condition in microwave assisted method were ethanol 80 % as solvent, extraction time of 5-6 min and liquid/solid ratio of 12.7/1. Results were compared with those obtained by soxhlet extraction. In soxhlet extraction, Optimum conditions were extraction time of 6 h for ethanol 80 % as solvent. Value of phenolic compounds and extraction yield of licorice root in microwave assisted (MAE), and soxhlet were 47.47 mg/g and 16.38 %, 41.709 mg/g and 14.49 %, respectively. These results implied that MAE was more efficient extracting method than soxhlet.

  6. In vitro antibacterial activity of a novel resin-based pulp capping material containing the quaternary ammonium salt MAE-DB and Portland cement.

    PubMed

    Yang, Yanwei; Huang, Li; Dong, Yan; Zhang, Hongchen; Zhou, Wei; Ban, Jinghao; Wei, Jingjing; Liu, Yan; Gao, Jing; Chen, Jihua

    2014-01-01

    Vital pulp preservation in the treatment of deep caries is challenging due to bacterial infection. The objectives of this study were to synthesize a novel, light-cured composite material containing bioactive calcium-silicate (Portland cement, PC) and the antimicrobial quaternary ammonium salt monomer 2-methacryloxylethyl dodecyl methyl ammonium bromide (MAE-DB) and to evaluate its effects on Streptococcus mutans growth in vitro. The experimental material was prepared from a 2 : 1 ratio of PC mixed with a resin of 2-hydroxyethylmethacrylate, bisphenol glycerolate dimethacrylate, and triethylene glycol dimethacrylate (4 : 3 : 1) containing 5 wt% MAE-DB. Cured resin containing 5% MAE-DB without PC served as the positive control material, and resin without MAE-DB or PC served as the negative control material. Mineral trioxide aggregate (MTA) and calcium hydroxide (Dycal) served as commercial controls. S. mutans biofilm formation on material surfaces and growth in the culture medium were tested according to colony-forming units (CFUs) and metabolic activity after 24 h incubation over freshly prepared samples or samples aged in water for 6 months. Biofilm formation was also assessed by Live/Dead staining and scanning electron microscopy. S. mutans biofilm formation on the experimental material was significantly inhibited, with CFU counts, metabolic activity, viability staining, and morphology similar to those of biofilms on the positive control material. None of the materials affected bacterial growth in solution. Contact-inhibition of biofilm formation was retained by the aged experimental material. Significant biofilm formation was observed on MTA and Dycal. The synthesized material containing HEMA-BisGMA-TEGDMA resin with MAE-DB as the antimicrobial agent and PC to support mineralized tissue formation inhibited S. mutans biofilm formation even after aging in water for 6 months, but had no inhibitory effect on bacteria in solution. Therefore, this material shows

  7. Analysis of dextromethorphan and dextrorphan in decomposed skeletal tissues by microwave assisted extraction, microplate solid-phase extraction and gas chromatography- mass spectrometry (MAE-MPSPE-GCMS).

    PubMed

    Fraser, Candice D; Cornthwaite, Heather M; Watterson, James H

    2015-08-01

    Analysis of decomposed skeletal tissues for dextromethorphan (DXM) and dextrorphan (DXT) using microwave assisted extraction (MAE), microplate solid-phase extraction (MPSPE) and gas chromatography-mass spectrometry (GC-MS) is described. Rats (n = 3) received 100 mg/kg DXM (i.p.) and were euthanized by CO2 asphyxiation roughly 20 min post-dose. Remains decomposed to skeleton outdoors and vertebral bones were recovered, cleaned, and pulverized. Pulverized bone underwent MAE using methanol as an extraction solvent in a closed microwave system, followed by MPSPE and GC-MS. Analyte stability under MAE conditions was assessed and found to be stable for at least 60 min irradiation time. The majority (>90%) of each analyte was recovered after 15 min. The MPSPE-GCMS method was fit to a quadratic response (R(2)  > 0.99), over the concentration range 10-10 000 ng⋅mL(-1) , with coefficients of variation <20% in triplicate analysis. The MPSPE-GCMS method displayed a limit of detection of 10 ng⋅mL(-1) for both analytes. Following MAE for 60 min (80 °C, 1200 W), MPSPE-GCMS analysis of vertebral bone of DXM-exposed rats detected both analytes in all samples (DXM: 0.9-1.5 µg⋅g(-1) ; DXT: 0.5-1.8 µg⋅g(-1) ). Copyright © 2014 John Wiley & Sons, Ltd.

  8. 24 CFR 350.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Security) maintained in the Book-entry System, as set forth in Federal Reserve Bank Operating Circulars. (b...: Book-entry Ginnie Mae Security. A Ginnie Mae Security issued or maintained in the Book-entry System... Reserve Banks. Book-entry System. The automated book-entry system operated by the Federal Reserve Banks...

  9. 75 FR 12773 - Notice of Proposed Information Collection: Comment Request Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-17

    ... 210 0.016 3.4 Agreement. 11709 III-2 Master Agreement 210 1 210 0.033 6.9 for Servicer's Principal and....016 2.3 Certification for Construction Securities. IX-1 Financial 210 1 210 1 210.0 Statements and Audit Reports. Mortgage Bankers 350 4 1400 0.5 700.0 Financial Reporting Form. 11709-A I-6 ACH Debit 210...

  10. Sally Ride EarthKAM - Automated Image Geo-Referencing Using Google Earth Web Plug-In

    NASA Technical Reports Server (NTRS)

    Andres, Paul M.; Lazar, Dennis K.; Thames, Robert Q.

    2013-01-01

    Sally Ride EarthKAM is an educational program funded by NASA that aims to provide the public the ability to picture Earth from the perspective of the International Space Station (ISS). A computer-controlled camera is mounted on the ISS in a nadir-pointing window; however, timing limitations in the system cause inaccurate positional metadata. Manually correcting images within an orbit allows the positional metadata to be improved using mathematical regressions. The manual correction process is time-consuming and thus, unfeasible for a large number of images. The standard Google Earth program allows for the importing of KML (keyhole markup language) files that previously were created. These KML file-based overlays could then be manually manipulated as image overlays, saved, and then uploaded to the project server where they are parsed and the metadata in the database is updated. The new interface eliminates the need to save, download, open, re-save, and upload the KML files. Everything is processed on the Web, and all manipulations go directly into the database. Administrators also have the control to discard any single correction that was made and validate a correction. This program streamlines a process that previously required several critical steps and was probably too complex for the average user to complete successfully. The new process is theoretically simple enough for members of the public to make use of and contribute to the success of the Sally Ride EarthKAM project. Using the Google Earth Web plug-in, EarthKAM images, and associated metadata, this software allows users to interactively manipulate an EarthKAM image overlay, and update and improve the associated metadata. The Web interface uses the Google Earth JavaScript API along with PHP-PostgreSQL to present the user the same interface capabilities without leaving the Web. The simpler graphical user interface will allow the public to participate directly and meaningfully with EarthKAM. The use of

  11. Bone mineral density at distal forearm in men over 40 years of age in Mae Chaem district, Chiang Mai Province, Thailand: a pilot study.

    PubMed

    Tungjai, Montree; Kaewjaeng, Siriprapa; Jumpee, Chayanit; Sriburee, Sompong; Hongsriti, Pongsiri; Tapanya, Monruedee; Maghanemi, Utumma; Ratanasthien, Kwanchai; Kothan, Suchart

    2017-09-01

    To study the prevalence of bone mineral density (BMD) and osteoporosis in the distal forearm among Thai men over 40 years of age in Mae Chaem District, Chiang Mai Province, Thailand. The subjects in this study were 194 Thai men, aged between 40 and 87 years who resided in Mae Chaem District, Chiang Mai Province, Thailand. Self-administered questionnaires were used for receiving the demographic characteristics information. BMD was measured by peripheral dual energy X-ray absorptiometry at the nondominant distal forearm in all men. The BMD was highest in the age-group 40-49 years and lowest in the age-group 70-87 years. The average T-score at the distal forearm was also highest in the age-group 40-49 years and lowest in the age-group 70-87 years. The BMD decreased as a function of age-group (p < .05). In contrast, the BMD increased as a function of weight (p < .05). Height had weak impact on the BMD in the distal forearm (p > .05). The percentage of osteopenia and osteoporosis are increased as a function of age-group in, while decreased in that of normal bone density. We found the prevalence of osteoporosis in men who resided in Mae Chaem District, Chiang Mai Province, Thailand.

  12. How America Saves for College, 2010. Sallie Mae's National Study of Parents with Children under 18

    ERIC Educational Resources Information Center

    Sallie Mae, Inc., 2010

    2010-01-01

    American families have felt first-hand the significant impact of the economic crisis. The job market continues to show weakness, homes have lost value, and families are concerned about their economic future. Many studies have found that families are making tough choices in limiting their discretionary spending. It is in the context of this crisis…

  13. Potential role of acetyl-CoA synthetase (acs) and malate dehydrogenase (mae) in the evolution of the acetate switch in Bacteria and Archaea

    USGS Publications Warehouse

    Barnhart, Elliott P.; McClure, Marcella A.; Johnson, Kiki; Cleveland, Sean; Hunt, Kristopher A.; Fields, Matthew W.

    2015-01-01

    Although many Archaea have AMP-Acs (acetyl-coenzyme A synthetase) and ADP-Acs, the extant methanogenic genus Methanosarcina is the only identified Archaeal genus that can utilize acetate via acetate kinase (Ack) and phosphotransacetylase (Pta). Despite the importance of ack as the potential urkinase in the ASKHA phosphotransferase superfamily, an origin hypothesis does not exist for the acetate kinase in Bacteria, Archaea, or Eukarya. Here we demonstrate that Archaeal AMP-Acs and ADP-Acs contain paralogous ATPase motifs previously identified in Ack, which demonstrate a novel relation between these proteins in Archaea. The identification of ATPase motif conservation and resulting structural features in AMP- and ADP-acetyl-CoA synthetase proteins in this study expand the ASKHA superfamily to include acetyl-CoA synthetase. Additional phylogenetic analysis showed that Pta and MaeB sequences had a common ancestor, and that the Pta lineage within the halophilc archaea was an ancestral lineage. These results suggested that divergence of a duplicated maeB within an ancient halophilic, archaeal lineage formed a putative pta ancestor. These results provide a potential scenario for the establishment of the Ack/Pta pathway and provide novel insight into the evolution of acetate metabolism for all three domains of life.

  14. Potential Role of Acetyl-CoA Synthetase (acs) and Malate Dehydrogenase (mae) in the Evolution of the Acetate Switch in Bacteria and Archaea

    DOE PAGES

    Barnhart, Elliott P.; McClure, Marcella A.; Johnson, Kiki; ...

    2015-08-03

    Although many Archaea have AMP-Acs (acetyl-coenzyme A synthetase) and ADP-Acs, the extant methanogenic genus Methanosarcina is the only identified Archaeal genus that can utilize acetate via acetate kinase (Ack) and phosphotransacetylase (Pta). Despite the importance of ack as the potential urkinase in the ASKHA phosphotransferase superfamily, an origin hypothesis does not exist for the acetate kinase in Bacteria, Archaea, or Eukarya. Here we demonstrate that Archaeal AMP-Acs and ADP-Acs contain paralogous ATPase motifs previously identified in Ack, which demonstrate a novel relation between these proteins in Archaea. The identification of ATPase motif conservation and resulting structural features in AMP- andmore » ADP-acetyl-CoA synthetase proteins in this study expand the ASKHA superfamily to include acetyl-CoA synthetase. Additional phylogenetic analysis showed that Pta and MaeB sequences had a common ancestor, and that the Pta lineage within the halophilc archaea was an ancestral lineage. Lastly, these results suggested that divergence of a duplicated maeB within an ancient halophilic, archaeal lineage formed a putative pta ancestor. These results provide a potential scenario for the establishment of the Ack/Pta pathway and provide novel insight into the evolution of acetate metabolism for all three domains of life.« less

  15. 24 CFR 350.7 - Authority of Federal Reserve Banks as Depositories.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... applies, in accordance with the Securities Documentation, Federal Reserve Bank Operating Circulars, this..., Security Entitlements, and the operation of the book-entry system under this part. ...) Each Federal Reserve Bank is hereby authorized as Depository for Book-entry Ginnie Mae Securities to...

  16. Sally Ride and others speak at a women's forum at the Apollo/Saturn V Center

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Former astronaut Sally Ride (left) sits on a panel of women discussing 'Past, Present and Future of Space.' Other participants in the women's forum include Marta Bohn-Meyer (second from left), the first SR-71 female pilot; Kathryn Sullivan, Ph.D., the first American woman to walk in space; Donna Shirley, Ph.D., the first woman leading the Mars Exploration Program; astronaut Yvonne Cagle; Jennifer Harris, flight director, Mars Pathfinder; astronaut Ellen Ochoa, the first Hispanic female in space and member of the President's commission on the Celebration of Women in American History. The panel is being moderated by Lynn Sherr, ABC News correspondent. The forum about women in space included a welcome by Center Director Roy Bridges and remarks by Donna Shalala, secretary of Department of Health and Human Services. The attendees are planning to view the launch of STS-93 at the Banana Creek viewing sight. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. Liftoff is scheduled for July 20 at 12:36 a.m. EDT.

  17. 31 CFR 354.2 - Law governing rights and obligations of Federal Reserve Banks, and Sallie Mae; rights of any...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... on the books of a Federal Reserve Bank pursuant to § 354.4(c)(1), is governed by the law (not... recorded on the books of a Federal Reserve Bank pursuant to § 354.14(c)(1), is governed by the law... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Law governing rights and obligations...

  18. Sally Ride EarthKAM: 15 Years of STEM Education and Outreach from Aboard the International Space Station

    NASA Astrophysics Data System (ADS)

    Finley, T.; Griffin, R.; Klug, T.; Harbour, S.; Au, B.; Graves, S. J.

    2016-12-01

    Sally Ride EarthKAM @ Space Camp is a digital camera payload on board the International Space Station (ISS) that allows students from around the globe to request photos of the Earth from space. Since its launch to the ISS in 2001, approximately 110,000 images have been requested by students from over 90 countries. EarthKAM provides the ultimate platform for STEM engagement in both formal and informal educational settings, as it is currently the only earth observation science payload on station completely controlled by students. Images are requested and accessed through a web portal and can be used by educators in a multitude of ways to promote interest in geosciences, math, physics, and numerous other fields. EarthKAM is currently operated out of the US Space and Rocket Center in Huntsville, Alabama and is incorporated into many Space Camp programs. Space Camp hosts nearly 25,000 students and 500 educators each year, vastly improving EarthKAM exposure. Future concepts currently in development include the ability to collect new data products such as night-time and near-infrared imagery, additional science curricula in the form of focused lesson plans and image applications, and a redesigned graphical user interface for requesting photos. The EarthKAM project, a NASA educational outreach program, is currently managed by the US Space and Rocket Center, the University of Alabama in Huntsville, and Teledyne Brown Engineering, Inc.

  19. 7 CFR 3565.505 - Liability.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... GUARANTEED RURAL RENTAL HOUSING PROGRAM Agency Guaranteed Loans That Back Ginnie Mae Guaranteed Securities... limited to, negligence, fraud, abuse, misrepresentation or misuse of funds, property condition, or...

  20. 12 CFR 1270.5 - Leverage limit and credit rating requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...

  1. 12 CFR 1270.5 - Leverage limit and credit rating requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...

  2. 12 CFR 1270.5 - Leverage limit and credit rating requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...

  3. Construction of Military Intelligence Military Occupational Specialty Taxonomy

    DTIC Science & Technology

    1990-11-01

    Ji ARI Research Note 91-10 Construction of Military Intelligence Military Occupational Specialty N Taxonomy IFrederick A. Muckler, Sally Seven, and...11. TITLE (Include Security Classification) Construction of Military Intelligence Military Occupational Specialty Taxonomy 12. PERSONAL AUTHOR(S...Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP Military intelligence Evaluation taxonomy MOS restructuring

  4. Assessment of heavy metals in sediments of the Don Hoi Lot area in the Mae Klong estuary, Thailand.

    PubMed

    Pengthamkeerati, Patthra; Kornkanitnan, Narumol; Sawangarreruks, Suchat; Wanichacheva, Nantanit; Wainiphithapong, Chantana; Sananwai, Nipawan

    2013-01-01

    The status and seasonal variation of heavy metals in surface sediment were investigated at Don Hoi Lot, located in the Mae Klong estuary, Thailand. Results revealed that all the measured heavy metals, except Zn, in the sediments had lower concentrations than in other nearby estuaries. Only Zn may be of concern for potential negative effects on estuarine biota in the study area. With the exception of Fe, all the studied heavy metals showed seasonal variation, but the patterns were diverse. Organic matter and the clay fraction in sediments were good sinks for heavy metals, excluding Zn, while Fe and Mn were good catchers. Principal component analysis suggested that Zn might have different origins and/or mechanisms of transport, accumulation and circulation, compared with the other heavy metals studied. A better understanding of sources and the behavior of Zn would enhance the efficiency of the estuary management plan in this study area.

  5. Screening of the Antimicrobial Activity against Drug Resistant Bacteria of Photorhabdus and Xenorhabdus Associated with Entomopathogenic Nematodes from Mae Wong National Park, Thailand

    PubMed Central

    Muangpat, Paramaporn; Yooyangket, Temsiri; Fukruksa, Chamaiporn; Suwannaroj, Manawat; Yimthin, Thatcha; Sitthisak, Sutthirat; Chantratita, Narisara; Vitta, Apichat; Tobias, Nicholas J.; Bode, Helge B.; Thanwisai, Aunchalee

    2017-01-01

    Photorhabdus and Xenorhabdus are symbiotic with entomopathogenic nematodes (EPNs) of the genera Heterorhabditis and Steinernema, respectively. These bacteria produce several secondary metabolites including antimicrobial compounds. The objectives of this study were to isolate and identify EPNs and their symbiotic bacteria from Mae Wong National Park, Thailand and to evaluate the antibacterial activities of symbiont extracts against drug resistant bacteria. A total of 550 soil samples from 110 sites were collected between August 2014 and July 2015. A total of EPN isolates were obtained through baiting and White trap methods, which yielded 21 Heterorhabditis and 3 Steinernema isolates. Based on molecular identification and phylogenetic analysis, the most common species found in the present study was P. luminescens subsp. akhurstii associated with H. indica. Notably, two species of EPNs, H. zealandica and S. kushidai, and two species of symbiotic bacteria, X. japonica and P. temperata subsp. temperata represented new recorded organisms in Thailand. Furthermore, the association between P. temperata subsp. temperata and H. zealandica has not previously been reported worldwide. Disk diffusion, minimal inhibitory concentration, and minimal bactericidal concentration analyses demonstrated that the crude compound extracted by ethyl acetate from P. temperata subsp. temperata could inhibit the growth of up to 10 strains of drug resistant bacteria. Based on HPLC-MS analysis, compound classes in bacterial extracts were identified as GameXPeptide, xenoamicin, xenocoumacin, mevalagmapeptide phurealipids derivatives, and isopropylstilbene. Together, the results of this study provide evidence for the diversity of EPNs and their symbiotic bacteria in Mae Wong National Park, Thailand and demonstrate their novel associations. These findings also provide an important foundation for further research regarding the antimicrobial activity of Photorhabdus bacteria. PMID:28702004

  6. Shaping the Future: Security Cooperation to Shape Chinese Diplomacy in the South Pacific

    DTIC Science & Technology

    2008-10-31

    New Zealand ( Lonely Planet , 2006), 701. http://books.google.com...Miller, Sally O’Brien, and Charles Rawlings-Way. New Zealand . Lonely Planet , 2006. http://books.google.com/books?id=FHxJ4zuemtcC&dq=carolyn+baine... New Zealand (NZ), the total region covers 20 million square miles of ocean and 117,000 square miles of land with Papua New Guinea (PNG) accounting

  7. Laboratory Study of Quaternary Sediment Resistivity Related to Groundwater Contamination at Mae-Hia Landfill, Mueang District, Chiang Mai Province

    NASA Astrophysics Data System (ADS)

    Sichan, N.

    2007-12-01

    This study was aimed to understand the nature of the resistivity value of the sediment when it is contaminated, in order to use the information solving the obscure interpretation in the field. The pilot laboratory experiments were designed to simulate various degree of contamination and degree of saturation then observe the resulting changes in resistivity. The study was expected to get a better understanding of how various physical parameters effect the resistivity values in term of mathematic function. And also expected to apply those obtained function to a practical quantitatively interpretation. The sediment underlying the Mae-Hia Landfill consists of clay-rich material, with interfingerings of colluvium and sandy alluvium. A systematic study identified four kinds of sediment, sand, clayey sand, sandy clay, and clay. Representative sediment and leachate samples were taken from the field and returned to the laboratory. Both the physical and chemical properties of the sediments and leachate were analyzed to delineate the necessary parameters that could be used in Archie's equation. Sediment samples were mixed with various concentration of leachate solutions. Then the resistivity values were measured at various controlled steps in the saturation degree in a well- calibrated six-electrode model resistivity box. The measured resistivity values for sand, clayey sand, sandy clay when fully and partly saturated were collected, then plotted and fitted to Archie's equation, to obtain a mathematical relationship between bulk resistivity, porosity, saturation degree and resistivity of pore fluid. The results fit well to Archie's equation, and it was possible to determine all the unknown parameters representative of the sediment samples. For sand, clayey sand, sandy clay, and clay, the formation resistivity factors (F) are 2.90, 5.77, 7.85, and 7.85 with the products of cementation factor (m) and the pore geometry factors (a) (in term of -am) are 1.49, -1.63, -1.92, -2

  8. 7 CFR 3565.502 - Incontestability.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Securities § 3565.502 Incontestability. In the case of loans that back Ginnie Mae securities or loans that... incontestable except that the guarantee may not be enforced by a lender who commits fraud or misrepresentation or by a lender who had knowledge of the fraud or misrepresentation at the time such a lender acquired...

  9. Timing of metamorphism of the Lansang gneiss and implications for left-lateral motion along the Mae Ping (Wang Chao) strike-slip fault, Thailand

    NASA Astrophysics Data System (ADS)

    Palin, R. M.; Searle, M. P.; Morley, C. K.; Charusiri, P.; Horstwood, M. S. A.; Roberts, N. M. W.

    2013-10-01

    The Mae Ping fault (MPF), western Thailand, exhibits dominantly left-lateral strike-slip motion and stretches for >600 km, reportedly branching off the right-lateral Sagaing fault in Myanmar and extending southeast towards Cambodia. Previous studies have suggested that the fault assisted the large-scale extrusion of Sundaland that occurred during the Late Eocene-Early Oligocene, with a geological offset of ˜120-150 km estimated from displaced high-grade gneisses and granites of the Chiang Mai-Lincang belt. Exposures of high-grade orthogneiss in the Lansang National Park, part of this belt, locally contain strong mylonitic textures and are bounded by strike-slip ductile shear zones and brittle faults. Geochronological analysis of monazite from a sample of sheared biotite-K-feldspar orthogneiss suggests two episodes of crystallization, with core regions documenting Th-Pb ages between c. 123 and c. 114 Ma and rim regions documenting a significantly younger age range between c. 45-37 Ma. These data are interpreted to represent possible magmatic protolith emplacement for the Lansang orthogneiss during the Early Cretaceous, with a later episode of metamorphism occurring during the Eocene. Textural relationships provided by in situ analysis suggest that ductile shearing along the MPF occurred during the latter stages of, or after, this metamorphic event. In addition, monazite analyzed from an undeformed garnet-two-mica granite dyke intruding metamorphic units at Bhumipol Lake outside of the Mae Ping shear zone produced a Th-Pb age of 66.2 ± 1.6 Ma. This age is interpreted to date the timing of dyke emplacement, implying that the MPF cuts through earlier formed magmatic and high-grade metamorphic rocks. These new data, when combined with regional mapping and earlier geochronological work, show that neither metamorphism, nor regional cooling, was directly related to strike-slip motion.

  10. Geochemistry and mineralogy of fly-ash from the Mae Moh lignite deposit, Thailand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, B.R.; Powell, M.A.; Fyfe, W.S.

    The concentration of 21 elements in fly ash from three boilers (75 MW, 150 MW, and 300 MW) at the EGAT power plant, Mae Moh, Thailand, were determined by INAA. The concentration of 10 major elements was determined by XRF. As, Co, Cr, Ni, Mo, and Sb generally increase in concentration going from bottom ash (BA) through the sequence of electrostatic precipitator ashes (ESPA) and reach maxima of As (352 ppm), Co (45 ppm), Cr (105 ppm), Mo (32 ppm), Ni (106 ppm), and Sb (15 ppm) in the ESPA. Ce, Cs, Fe, Hf, La, Sc, Ta, Tb, and Ybmore » did not exhibit concentration trends or are variable except in the case of one boiler, which showed an increase going from BA to ESPA. Only Br decreased in composition going from BA to ESPA. Rb, Sm, U, and Th showed marked variation in trends. The major elements identified by EDS were Al, Si, S, K, Ca, Fe, and Ba, with minor amounts of Mg, Na, Ti, Mn, and Sr. Al, Si, K, and Ca occur together and are present in most of the fly-ash particles. Ba was found as a major component with Ca, Al, and Si. Fe and Ca are usually associated with sulfur. Some small spheres (< 5 {mu}m) are comprised almost entirely of Fe (probably as oxide). Symplectite textures are noted in high-Fe phases. All elements except Br are significantly enriched in the fly ash relative to the coal, which contains 35% ash. Particle chemistry is consistent with the major mineral phases identified by XRD, which include: quartz, magnetite, mullite, gehlenite, anorthite, hematite, anhydrite, and clinopyroxene.« less

  11. 76 FR 78775 - Investment of Customer Funds and Funds Held in an Account for Foreign Futures and Foreign Options...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-19

    ... States (U.S. government securities) and general obligations of any State or of any political subdivision... stability during the financial crisis. MF Global/Newedge, BlackRock and ADM noted that non-Fannie Mae... their mission, mitigate the systemic risk that contributed directly to instability in financial markets...

  12. Commission on the National Guard and Reserves: Strengthening America’s Defenses in the New Security Environment

    DTIC Science & Technology

    2007-03-01

    Guard would reduce its ability to respond effectively to state missions.10 Governor Ruth Ann Minner of Delaware testified before the Commission that the...2118 and 2216 Rayburn House Office Building, Washington DC June 15, 2006 9:00 a.m. • The Honorable Ruth Ann Minner, Governor of Delaware and Lead...2006 Arlington, VA Mr. Terrell Parker October 27, 2006 Arlington, VA Lieutenant Colonel Angel Perez October 27, 2006 Arlington, VA Ms. Sallie Shaffer

  13. 76 FR 51048 - Notice of Submission of Proposed Information Collection to OMB Ginnie Mae Mortgage-Backed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ...-Backed Securities programs and to monitor performance and compliance with established rules and... issuers/customers in its Mortgage-Backed Securities programs and to monitor performance and compliance...

  14. Workplace and security stressors and mental health among migrant workers on the Thailand-Myanmar border.

    PubMed

    Meyer, Sarah R; Decker, Michele R; Tol, Wietse A; Abshir, Nada; Mar, Aye Aye; Robinson, W Courtland

    2016-05-01

    Migrant workers in low-resource settings may experience multiple types of workplace and security-related stressors. This study explores the relationship between these stressors and adverse mental health outcomes, through a study of migrant workers from Myanmar, working in agriculture, factory, and sex industries in and around Mae Sot, Thailand. Respondent-driven sampling was used to recruit a total sample of 589 male and female migrants. Trained data collectors administered a survey, which included measures of workplace and security-related stressors, and depression and anxiety symptoms. Multivariate regression models were conducted separately for depression and anxiety symptoms. For male agricultural workers, security stressors (β = 1.9, p = .001) are associated with an increase in depression symptoms and coercive working conditions are associated with an increase in anxiety symptoms (β = .8, p = .000). For female agricultural workers, daily hassles and stressors were associated with both depression (β = 1.5, p = .000) and anxiety (β = .5, p = .027), and barriers to exit (β = 3.0, p = .005) and security stressors (β = .9, p = .010) were significantly associated with increased depression symptoms. In the factory subsample, sexual assault and abuse (depression: β = 2.7, p = .009; anxiety: β = 2.8, p = .002) and daily hassles and stressors (depression: β = .7, p = .007; anxiety: β = .7, p = .001) were both significantly associated with increased depression and anxiety symptoms for males. Other categories of stressors similarly showed different associations with mental health outcomes between occupational groups, and between male and female migrant workers. The differing influences of stressors on mental health between the three occupational groups, and between males and females, indicate the need for targeted and tailored approaches to reduce specific stressors and improve services to address mental health needs

  15. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  16. Reaching for the Stars

    ERIC Educational Resources Information Center

    Terry, Dorothy Givens

    2012-01-01

    Dr. Mae Jemison is the world's first woman astronaut of color who continues to reach for the stars. Jemison was recently successful in leading a team that has secured a $500,000 federal grant to make interstellar space travel a reality. The Dorothy Jemison Foundation for Excellence (named after Jemison's mother) was selected in June by the Defense…

  17. KSC-03pd0463

    NASA Image and Video Library

    2003-02-02

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., young women gather to sign a large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion the day before. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees.

  18. KSC-03pd0462

    NASA Image and Video Library

    2003-02-02

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., young women gather to sign a large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion the day before. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees.

  19. KSC-03pd0461

    NASA Image and Video Library

    2003-02-02

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., young women gather to sign a large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion the day before. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees.

  20. KSC-03PD-0463

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., young women gather to sign a large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion the day before. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees.

  1. KSC-03PD-0462

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., young women gather to sign a large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion the day before. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees.

  2. KSC-03PD-0461

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., young women gather to sign a large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion the day before. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees.

  3. AGOR 28: SIO Shipyard Representative Bi-Weekly Progress Report

    DTIC Science & Technology

    2015-05-08

    work on initial outfitting lists for Sally Ride. ii. Working on NS5 Hierarchy 4. Operator Concerns: • Tuff-Mass MLV and Acoustic Tiles – The...yard is continuing to install the Quad-zero MLV in various locations throughout Sally Ride. DCI is holding off on installing any new insulation in...Traction Winch Rm fwd bulkhead tiles • Sally Ride Quad-Zero MLV – The yard continues to install the Quad-Zero in location with no sound dampening tiles

  4. What is Security? A perspective on achieving security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  5. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  6. TMJ Disorders

    MedlinePlus

    ... referred Sally and her parents to a local dentist who specialized in jaw disorders. After examining Sally ... having symptoms of a TMJ disorder, let your dentist know. The earlier a TMJ disorder is diagnosed ...

  7. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  8. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  9. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  10. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  11. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  12. Alternative security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weston, B.H.

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  13. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  14. KSC-03pd0464

    NASA Image and Video Library

    2003-02-02

    KENNEDY SPACE CENTER, FLA. -- A large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion Feb. 1, is on display in the NASA News Center at KSC. The poster was signed by young women attending the Sally Ride Science Festival at the University of Central Florida, Orlando, Fla. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls at the festival, while breakout sessions afforded closer interaction between Ride and festival attendees.

  15. KSC-03PD-0464

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. -- A large poster in tribute to the Columbia astronauts who were lost in the Shuttle's explosion Feb. 1, is on display in the NASA News Center at KSC. The poster was signed by young women attending the Sally Ride Science Festival at the University of Central Florida, Orlando, Fla. The Sally Ride event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls at the festival, while breakout sessions afforded closer interaction between Ride and festival attendees.

  16. Software Security Practices: Integrating Security into the SDLC

    DTIC Science & Technology

    2011-05-01

    Software Security Practices Integrating Security into the SDLC Robert A. Martin HS SEDI is a trademark of the U.S. Department of Homeland Security...2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Security Practices Integrating Security into the SDLC 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 4 y y w SDLC Integrating Security into a typical software development lifecycle

  17. Risky alcohol use among reproductive-age men, not women, in Mae La refugee camp, Thailand, 2009

    PubMed Central

    2012-01-01

    Background Globally, alcohol use contributes to close to 4% of all deaths and is a leading cause of ill health and premature death among men of reproductive age. Problem alcohol use is an unaddressed public health issue among populations displaced by conflict. Assessing the magnitude of the problem and identifying affected groups and risk behaviours is difficult in mobile and unstable populations. Methods From 15–28 December 2009 we conducted a simple rapid screening test of risky alcohol use using the single item modified Short Assessment Screening Questionnaire (mSASQ) by all women currently enrolled in the antenatal care clinic in Mae La refugee camp, a long standing displaced setting on the Thai Burma border. Women self- reported and gave a secondary report of their male partners. Gender differences in alcohol use were further explored in semi-structured interviews with camp residents on attitudes, behaviours, and beliefs regarding alcohol and analysed thematically. Results Of 636 women screened in the antenatal clinic, almost none (0.2%, 95CI 0.0-0.9%) reported risky alcohol use prior to pregnancy, whereas around a quarter (24.4%, 95CI 21.2-27.9%) reported risky alcohol use by their male partners. Interviews with 97 camp residents described strong social controls against women’s alcohol use and men’s drinking to intoxication, despite a dominant perception that the social context of life in displacement promoted alcohol use and that controls are loosening. Conclusions As a stigmatised behaviour, alcohol use is difficult to assess, particularly in the context of highly mobile adult male populations: the simple assessment methods here show that it is feasible to obtain adequate data for the purposes of intervention design. The data suggest that risky drinking is common and normalised among men, but that the population may have been partially protected from rapid rises in problem alcohol use observed in nation-wide data from Thailand. The changing social

  18. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  19. Multiple acquisitions via sequential transfer of orphan spin polarization (MAeSTOSO): How far can we push residual spin polarization in solid-state NMR?

    NASA Astrophysics Data System (ADS)

    Gopinath, T.; Veglia, Gianluigi

    2016-06-01

    Conventional multidimensional magic angle spinning (MAS) solid-state NMR (ssNMR) experiments detect the signal arising from the decay of a single coherence transfer pathway (FID), resulting in one spectrum per acquisition time. Recently, we introduced two new strategies, namely DUMAS (DUal acquisition Magic Angle Spinning) and MEIOSIS (Multiple ExperIments via Orphan SpIn operatorS), that enable the simultaneous acquisitions of multidimensional ssNMR experiments using multiple coherence transfer pathways. Here, we combined the main elements of DUMAS and MEIOSIS to harness both orphan spin operators and residual polarization and increase the number of simultaneous acquisitions. We show that it is possible to acquire up to eight two-dimensional experiments using four acquisition periods per each scan. This new suite of pulse sequences, called MAeSTOSO for Multiple Acquisitions via Sequential Transfer of Orphan Spin pOlarization, relies on residual polarization of both 13C and 15N pathways and combines low- and high-sensitivity experiments into a single pulse sequence using one receiver and commercial ssNMR probes. The acquisition of multiple experiments does not affect the sensitivity of the main experiment; rather it recovers the lost coherences that are discarded, resulting in a significant gain in experimental time. Both merits and limitations of this approach are discussed.

  20. 77 FR 71433 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Multiclass Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Sponsor........ 15 8 120 0.33 39.6 Issuance Statement Attorney for Sponsor........ 15 8 120 0.5 60 Tax... Statements (attached to closing Accountant for Sponsor...... 15 8 120 32 3840 letter). Accountants' Closing Letter Accountant 15 8 120 8 960 Accountants' OCS Letter Accountant 15 8 120 8 960 Structuring Data...

  1. 75 FR 5336 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Multiclass Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-02

    ... 8 120 0.5 60 Tax Opinion Attorney for Sponsor........ 15 8 120 4 480 Transfer Affidavit Attorney for... Final Data Statements (attached to closing Accountant for Sponsor...... 15 8 120 32 3,840 letter). Accountants' Closing Letter Accountant 15 8 120 8 960 Accountants' OCS Letter Accountant 15 8 120 8 960...

  2. 78 FR 23281 - Notice of Proposed Information Collection; Comment Request: Ginnie Mae Multiclass Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-18

    ... Statements Accountant for 15 8 120 32 3840 (attached to closing Sponsor. letter). Accountants' Closing Accountant...... 15 8 120 8 960 Letter. Accountants' OCS Letter... Accountant...... 15 8 120 8 960 Structuring Data Accountant...... 15 8 120 8 960 Financial Statements...... Accountant...... 15 8 120 1 120...

  3. 2. Historic American Buildings Survey, Frederik C. Gjessing, Photographer January, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    2. Historic American Buildings Survey, Frederik C. Gjessing, Photographer January, 1956 ELEVATION OF CHAPEL AND SALLY PORT TOWARDS THE COURTYARD PLAZA DE ARMAS, SAN FELIPE DEL MORRO. - Castillo de San Felipe del Morro Sally Port & Chapel, Northwest end of San Juan Island, San Juan, San Juan Municipio, PR

  4. Sequential microwave superheated water extraction of mannans from spent coffee grounds.

    PubMed

    Passos, Cláudia P; Moreira, Ana S P; Domingues, M Rosário M; Evtuguin, Dmitry V; Coimbra, Manuel A

    2014-03-15

    The feasibility of using sequential microwave superheated water extraction (MAE) for the recovery of mannans from spent coffee grounds (SCG) was studied. Due to the high contents of mannose still present in the SCG residue left after two consecutive MAE, the unextracted material was re-suspended in water and submitted to a third microwave irradiation (MAE3) at 200 °C for 3 min. With MAE3, mannose recovery achieved 48%, increasing to 56% by MAE4, and reaching a maximum of 69% with MAE5. Glycosidic-linkage analysis showed that in MAE3 mainly galactomannans were recovered, while debranched galactomannans were recovered with MAE4 and MAE5. With increasing the number of extractions, the average degree of polymerization of the mannans decreased, as observed by size-exclusion chromatography and by methylation analysis. Scanning electron microscopy images showed a decrease on cell walls thickness. After final MAE5, the remaining un-extracted insoluble material, representing 22% of the initial SCG, was composed mainly by cellulose (84%). Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Questioning the Order of Operations

    ERIC Educational Resources Information Center

    Dupree, Kami M.

    2016-01-01

    For decades, students have been encouraged to use "Please Excuse My Dear Aunt Sally" as a means of learning the order of operations. Teachers unfamiliar with the Aunt Sally mnemonic are perhaps more familiar with a mnemonic such as PEMDAS. Each mnemonic is intended to convey "parentheses, exponents, multiplication, division,…

  6. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Closed vessel miniaturized microwave assisted chelating extraction for determination of trace metals in plant materials

    NASA Astrophysics Data System (ADS)

    Czarnecki, Sezin; Duering, Rolf-Alexander

    2013-04-01

    In recent years, the use of closed vessel microwave assisted extraction (MAE) for plant samples has shown increasing research interest which will probably substitute conventional procedures in the future due to their general disadvantages including consumption of time and solvents. The objective of this study was to demonstrate an innovative miniaturized closed vessel microwave assisted extraction (µMAE) method under the use of EDTA (µMAE-EDTA) to determine metal contents (Cd, Co, Cu, Mn, Ni, Pb, Zn) in plant samples (Lolio-Cynosuretum) by inductively coupled plasma-optical emission spectrometry (ICP-OES). Validation of the method was done by comparison of the results with another miniaturized closed vessel microwave HNO3 method (µMAE-H) and with two other macro scale MAE procedures (MAE-H and MAE-EDTA) which were applied by using a mixture of nitric acid (HNO3) and hydrogen peroxide (H2O2) (MAE-H) and EDTA (MAE-EDTA), respectively. The already established MAE-H method is taken into consideration as a reference validation MAE method for plant material. A conventional plant extraction (CE) method, based on dry ashing and dissolving of the plant material in HNO3, was used as a confidence comparative method. Certified plant reference materials (CRMs) were used for comparison of recovery rates from different extraction protocols. This allowed the validation of the applicability of the µMAE-EDTA procedure. For 36 real plant samples with triplicates each, µMAE-EDTA showed the same extraction yields as the MAE-H in the determination of Cd, Co, Cu, Mn, Ni, Pb, and Zn contents in plant samples. Analytical parameters in µMAE-EDTA should be further investigated and adapted for other metals of interest. By the reduction and elimination of the use of hazardous chemicals in environmental analysis and thus allowing a better understanding of metal distribution and accumulation process in plants and also the metal transfer from soil to plants and into the food chain, µMAE

  8. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  9. Methodological variations and their effects on reported medication administration error rates.

    PubMed

    McLeod, Monsey Chan; Barber, Nick; Franklin, Bryony Dean

    2013-04-01

    Medication administration errors (MAEs) are a problem, yet methodological variation between studies presents a potential barrier to understanding how best to increase safety. Using the UK as a case-study, we systematically summarised methodological variations in MAE studies, and their effects on reported MAE rates. Nine healthcare databases were searched for quantitative observational MAE studies in UK hospitals. Methodological variations were analysed and meta-analysis of MAE rates performed using studies that used the same definitions. Odds ratios (OR) were calculated to compare MAE rates between intravenous (IV) and non-IV doses, and between paediatric and adult doses. We identified 16 unique studies reporting three MAE definitions, 44 MAE subcategories and four different denominators. Overall adult MAE rates were 5.6% of a total of 21 533 non-IV opportunities for error (OE) (95% CI 4.6% to 6.7%) and 35% of a total of 154 IV OEs (95% CI 2% to 68%). MAEs were five times more likely in IV than non-IV doses (pooled OR 5.1; 95% CI 3.5 to 7.5). Including timing errors of ±30 min increased the MAE rate from 27% to 69% of 320 IV doses in one study. Five studies were unclear as to whether the denominator included dose omissions; omissions accounted for 0%-13% of IV doses and 1.8%-5.1% of non-IV doses. Wide methodological variations exist even within one country, some with significant effects on reported MAE rates. We have made recommendations for future MAE studies; these may be applied both within and outside the UK.

  10. Teaching Science to a Profoundly Deaf Child in a Mainstream Classroom

    ERIC Educational Resources Information Center

    Spicer, Sally

    2016-01-01

    From her experience of teaching a profoundly deaf child learning science with British Sign Language (BSL) as the child's first language, Sally Spicer learned methods that could be good practice for all learners. In this article, Sally Spicer shares how providing an opportunity for first-hand experience to develop knowledge and understanding of…

  11. Sandia National Laboratories: National Security Missions: Global Security

    Science.gov Websites

    Involvement News News Releases Media Contacts & Resources Lab News Image Gallery Publications Annual Library Events Careers View All Jobs Students & Postdocs Internships & Co-ops Fellowships Security Image Cyber and Infrastructure Security Advanced analyses and technologies for securing the

  12. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    DTIC Science & Technology

    2010-12-01

    relevant requirements, analyzed 2006 through 2009 security operations data, interviewed federal and industry officials, and made observations at five...warranted, acted on all findings and recommendations resulting from five agency- contracted studies on ferry security completed in 2005 and 2006 ...Figure 5: Security Deficiencies by Vessel Type, 2006 through 2009 27 Figure 6: Security Deficiencies by Facility Type, 2006 through 2009 28

  13. AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges

    DTIC Science & Technology

    2002-07-25

    circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify

  14. Social Security Administration

    MedlinePlus

    ... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...

  15. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  16. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  17. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  18. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  19. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  20. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  1. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  2. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  3. Nondestructive evaluation of fatigue damage on low alloy steel by magnetomechanical acoustic emission technique

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hiraasawa, T.; Saito, K.; Komura, I.

    1995-08-01

    A modified magnetomechanical acoustic emission (MAE) technique, denoted Pulse-MAE, in which the magnetization by current pulse was adopted, was newly developed and its applicability was assessed for the nondestructive detection and evaluation of fatigue damage in reactor pressure vessel steel SFVV2 and SA508 class2. MAE signals were measured with both conventional MAE and Pulse-MAE technique for fatigue damaged specimens having several damage fractions, and peak voltage ratio Vp/Vo, where Vp and Vo were the peak voltage for damaged and undamaged specimen respectively, was chosen as a measure. Vp/Vo was found to increase monotonously at the early stage of fatigue processmore » and the rate of increase in Vp/Vo during the fatigue process was larger in Pulse-MAE than conventional MAE. Therefore, Pulse-MAE technique proved to have higher sensitivity for the detection of fatigue damage compared with the conventional MAE and to have the potential of a practical technique for nondestructive detection and evaluation of fatigue damage in actual components.« less

  4. A Critical Reflection on My Learning and Its Integration into My Professional Practice

    ERIC Educational Resources Information Center

    Cartwright, Sally

    2016-01-01

    This paper, "A critical reflection on my learning and its integration into my professional practice," was successfully submitted for a Master's programme at the University of Bath (UK) in 2010, whilst Sally was working full-time as a teacher in a large secondary school in an English town 10 miles from the city of Bath. Sally died of a…

  5. Space Security Law

    NASA Astrophysics Data System (ADS)

    Blount, P. J.

    2017-06-01

    Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal

  6. Security Deposits

    DTIC Science & Technology

    1987-04-01

    security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now

  7. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  8. A Security Audit Framework to Manage Information System Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  9. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  10. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  11. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  12. Paleoseismology of Sinistral-Slip Fault System, Focusing on the Mae Chan Fault, on the Shan Plateau, SE Asia.

    NASA Astrophysics Data System (ADS)

    Curtiss, E. R.; Weldon, R. J.; Wiwegwin, W.; Weldon, E. M.

    2017-12-01

    The Shan Plateau, which includes portions of Myanmar, China, Thailand, Laos, and Vietnam lies between the dextral NS-trending Sagaing and SE-trending Red River faults and contains 14 active E-W sinistral-slip faults, including the Mae Chan Fault (MCF) in northern Thailand. The last ground-rupturing earthquake to occur on the broader sinistral fault system was the M6.8 Tarlay earthquake in Myanmar in March 2011 on the Nam Ma fault immediately north of the MCF the last earthquake to occur on the MCF was a M4.0 in the 5th century that destroyed the entire city of Wiang Yonok (Morley et al., 2011). We report on a trenching study of the MCF, which is part of a broader study to create a regional seismic hazard map of the entire Shan Plateau. By studying the MCF, which appears to be representative of the sinistral faults, and easy to work on, we hope to characterize both it and the other unstudied faults in the system. As part of a paleoseismology training course we dug two trenches at the Pa Tueng site on the MCF, within an offset river channel and the trenches exposed young sediment with abundant charcoal (in process of dating), cultural artifacts, and evidence for the last two (or three) ground-rupturing earthquakes on the fault. We hope to use the data from this site to narrow the recurrence interval, which is currently to be 2,000-4,000 years and the slip rate of 1-2 mm/year, being developed at other sites on the fault. By extrapolating the data of the MCF to the other faults we will have a better understanding of the whole fault system. Once we have characterized the MCF, we plan to use geomorphic offsets and strain rates from regional GPS to relatively estimate the activity of the other faults in this sinistral system.

  13. Security Strategy of the Bureau of Diplomatic Security.

    DTIC Science & Technology

    2011-06-10

    Williams, M.A. , Member John A. Dyson, MBA , Member Gregory Scott Hospodor, Ph.D Accepted this 10th day of June 2011 by...ACRONYMS AAR After Action Review ASOS Advance Security Overseas Seminar ATA Antiterrorism Assistance Program BRSO Regional Security Officer Course ...BSAC Basic Special Agent Course DS Bureau of Diplomatic Security FACT Foreign Affairs Counter Threat FAH Foreign Affairs Handbook FAM Foreign

  14. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and

  15. [Influence of electromagnetic emission at the frequencies of molecular absorption and emission spectra of oxygen and nitrogen oxide on the adhesion and formation of Pseudomonas aeruginosa biofilm].

    PubMed

    Pronina, E A; Shvidenko, I G; Shub, G M; Shapoval, O G

    2011-01-01

    Evaluate the influence of electromagnetic emission (EME) at the frequencies of molecular absorption and emission spectra of atmospheric oxygen and nitrogen oxide (MAES 02 and MAES NO respectively) on the adhesion, population progress and biofilm formation of Pseudomonas aeruginosa. Adhesive activity was evaluated by mean adhesion index (MAI) of bacteria on human erythrocytes. Population growth dynamic was assessed by optical density index of broth cultures; biofilm formation--by values of optical density of the cells attached to the surface of polystyrol wells. P.aeruginosa bacteria had high adhesive properties that have increased under the influence of MAES 02 frequency emission and have not changed under the influence of MAES NO frequency. Exposure of bacteria to MAES NO frequency did not influence the population progress; exposure to MAES 02 frequency stimulated the biofilm formation ability of the bacteria, and MAES NO--decreased this ability. EME at MAES NO frequency can be used to suppress bacterial biofilm formation by pseudomonas.

  16. Observational insights into aerosol formation from isoprene.

    PubMed

    Worton, David R; Surratt, Jason D; Lafranchi, Brian W; Chan, Arthur W H; Zhao, Yunliang; Weber, Robin J; Park, Jeong-Hoo; Gilman, Jessica B; de Gouw, Joost; Park, Changhyoun; Schade, Gunnar; Beaver, Melinda; Clair, Jason M St; Crounse, John; Wennberg, Paul; Wolfe, Glenn M; Harrold, Sara; Thornton, Joel A; Farmer, Delphine K; Docherty, Kenneth S; Cubison, Michael J; Jimenez, Jose-Luis; Frossard, Amanda A; Russell, Lynn M; Kristensen, Kasper; Glasius, Marianne; Mao, Jingqiu; Ren, Xinrong; Brune, William; Browne, Eleanor C; Pusede, Sally E; Cohen, Ronald C; Seinfeld, John H; Goldstein, Allen H

    2013-10-15

    Atmospheric photooxidation of isoprene is an important source of secondary organic aerosol (SOA) and there is increasing evidence that anthropogenic oxidant emissions can enhance this SOA formation. In this work, we use ambient observations of organosulfates formed from isoprene epoxydiols (IEPOX) and methacrylic acid epoxide (MAE) and a broad suite of chemical measurements to investigate the relative importance of nitrogen oxide (NO/NO2) and hydroperoxyl (HO2) SOA formation pathways from isoprene at a forested site in California. In contrast to IEPOX, the calculated production rate of MAE was observed to be independent of temperature. This is the result of the very fast thermolysis of MPAN at high temperatures that affects the distribution of the MPAN reservoir (MPAN / MPA radical) reducing the fraction that can react with OH to form MAE and subsequently SOA (F(MAE formation)). The strong temperature dependence of F(MAE formation) helps to explain our observations of similar concentrations of IEPOX-derived organosulfates (IEPOX-OS; ~1 ng m(-3)) and MAE-derived organosulfates (MAE-OS; ~1 ng m(-3)) under cooler conditions (lower isoprene concentrations) and much higher IEPOX-OS (~20 ng m(-3)) relative to MAE-OS (<0.0005 ng m(-3)) at higher temperatures (higher isoprene concentrations). A kinetic model of IEPOX and MAE loss showed that MAE forms 10-100 times more ring-opening products than IEPOX and that both are strongly dependent on aerosol water content when aerosol pH is constant. However, the higher fraction of MAE ring opening products does not compensate for the lower MAE production under warmer conditions (higher isoprene concentrations) resulting in lower formation of MAE-derived products relative to IEPOX at the surface. In regions of high NOx, high isoprene emissions and strong vertical mixing the slower MPAN thermolysis rate aloft could increase the fraction of MPAN that forms MAE resulting in a vertically varying isoprene SOA source.

  17. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  18. Association between an unhealthy lifestyle and other factors with hypertension among hill tribe populations of Mae Fah Luang District, Chiang Rai Province, Thailand.

    PubMed

    Duangtep, Yuwadee; Narksawat, Kulaya; Chongsuwat, Rawadee; Rojanavipart, Peungchon

    2010-05-01

    An unhealthy lifestyle may lead to hypertension which can cause strokes and cardiovascular disease. The aim of this study was to identify the specific unhealthy lifestyle practices which could cause hypertension among hill tribe populations in Mae Fah Luang District of Chiang Rai Province, Thailand. In 2006, 196 patients with hypertension were selected from 2 district hospitals and 13 health centers as cases, and 196 normotensive subjects from a local neighborhood were chosen as controls. Trained health personnel collected data by interviewing subjects from both groups regarding unhealthy lifestyles and other factors. All participants had a physical examination at the time of interview. The results from multiple logistic regression analysis show the factors associated with hypertension among the hill tribe people studied were smoking (OR 2.48; 95% CI 1.43-4.30, p = 0.001), no or irregular exercise (OR 1.84; 95% CI 1.16-2.99, p = 0.005), being overweight (OR 2.96; 95% CI 1.69-5.18, p < 0.002), having obesity (OR 2.65, 95% CI 1.04-6.73, p < 0.018) and having a high frequency intake of fatty foods (OR 1.98, 95% CI 1.23-3.18, p < 0.013). The findings suggest the need for significant lifestyle changes in regards to smoking, eating habits and leisure time exercise programs. The adoption of such lifestyle changes would result in a reduced chance of being hypertensive, which could later reduce cardiovascular morbidity and mortality.

  19. Career Ladder and Curriculum Guide: Housing Management. Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, Community Security Aide. Instructor's Manual.

    ERIC Educational Resources Information Center

    Allen, Archibald; Hailey, Pleasant L., Jr.

    This instructor's manual contains job analysis and training curriculum for the positions of Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, and Community Security Aide. The two sections of the manual and their parts are as follows: Section I: A Model Curriculum for Resident…

  20. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  1. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  2. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  3. Antiplatelet Activity of Morus alba Leaves Extract, Mediated via Inhibiting Granule Secretion and Blocking the Phosphorylation of Extracellular-Signal-Regulated Kinase and Akt

    PubMed Central

    Rhee, Man Hee; Sung, Yoon-Young; Yang, Won-Kyung; Kim, Seung Hyung; Kim, Ho-Kyoung

    2014-01-01

    Ethnopharmacological Relevance. Morus alba L. leaves (MAE) have been used in fork medicine for the treatment of beriberi, edema, diabetes, hypertension, and atherosclerosis. However, underlying mechanism of MAE on cardiovascular protection remains to be elucidated. Therefore, we investigated whether MAE affect platelet aggregation and thrombosis. Materials and Methods. The anti-platelet activity of MAE was studied using rat platelets. The extent of anti-platelet activity of MAE was assayed in collagen-induced platelet aggregation. ATP and serotonin release was carried out. The activation of integrin α IIb β 3 and phosphorylation of signaling molecules, including MAPK and Akt, were investigated with cytofluorometer and immunoblotting, respectively. The thrombus formation in vivo was also evaluated in arteriovenous shunt model of rats. Results. HPLC chromatographic analysis revealed that MAE contained rutin and isoquercetin. MAE dose-dependently inhibited collagen-induced platelet aggregation. MAE also attenuated serotonin secretion and thromboxane A2 formation. In addition, the extract in vivo activity showed that MAE at 100, 200, and 400 mg/kg significantly and dose-dependently attenuated thrombus formation in rat arterio-venous shunt model by 52.3% (P < 0.001), 28.3% (P < 0.01), and 19.1% (P < 0.05), respectively. Conclusions. MAE inhibit platelet activation, TXB2 formation, serotonin secretion, aggregation, and thrombus formation. The plant extract could be considered as a candidate to anti-platelet and antithrombotic agent. PMID:24701244

  4. The surface and deep structure of the waterfall illusion.

    PubMed

    Wade, Nicholas J; Ziefle, Martina

    2008-11-01

    The surface structure of the waterfall illusion or motion aftereffect (MAE) is its phenomenal visibility. Its deep structure will be examined in the context of a model of space and motion perception. The MAE can be observed following protracted observation of a pattern that is translating, rotating, or expanding/contracting, a static pattern appears to move in the opposite direction. The phenomenon has long been known, and it continues to present novel properties. One of the novel features of MAEs is that they can provide an ideal visual assay for distinguishing local from global processes. Motion during adaptation can be induced in a static central grating by moving surround gratings; the MAE is observed in the static central grating but not in static surrounds. The adaptation phase is local and the test phase is global. That is, localised adaptation can be expressed in different ways depending on the structure of the test display. These aspects of MAEs can be exploited to determine a variety of local/global interactions. Six experiments on MAEs are reported. The results indicated that relational motion is required to induce an MAE; the region adapted extends beyond that stimulated; storage can be complete when the MAE is not seen during the storage period; interocular transfer (IOT) is around 30% of monocular MAEs with phase alternation; large field spiral patterns yield MAEs with characteristic monocular and binocular interactions.

  5. 17 CFR 230.190 - Registration of underlying securities in asset-backed securities transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Registration of underlying securities in asset-backed securities transactions. 230.190 Section 230.190 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General...

  6. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  7. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  8. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  9. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  10. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests...

  11. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  12. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  13. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  14. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  15. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  16. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  17. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  18. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  19. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  20. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  1. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  2. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  3. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  4. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  5. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  6. Designing and evaluating an automated system for real-time medication administration error detection in a neonatal intensive care unit.

    PubMed

    Ni, Yizhao; Lingren, Todd; Hall, Eric S; Leonard, Matthew; Melton, Kristin; Kirkendall, Eric S

    2018-05-01

    Timely identification of medication administration errors (MAEs) promises great benefits for mitigating medication errors and associated harm. Despite previous efforts utilizing computerized methods to monitor medication errors, sustaining effective and accurate detection of MAEs remains challenging. In this study, we developed a real-time MAE detection system and evaluated its performance prior to system integration into institutional workflows. Our prospective observational study included automated MAE detection of 10 high-risk medications and fluids for patients admitted to the neonatal intensive care unit at Cincinnati Children's Hospital Medical Center during a 4-month period. The automated system extracted real-time medication use information from the institutional electronic health records and identified MAEs using logic-based rules and natural language processing techniques. The MAE summary was delivered via a real-time messaging platform to promote reduction of patient exposure to potential harm. System performance was validated using a physician-generated gold standard of MAE events, and results were compared with those of current practice (incident reporting and trigger tools). Physicians identified 116 MAEs from 10 104 medication administrations during the study period. Compared to current practice, the sensitivity with automated MAE detection was improved significantly from 4.3% to 85.3% (P = .009), with a positive predictive value of 78.0%. Furthermore, the system showed potential to reduce patient exposure to harm, from 256 min to 35 min (P < .001). The automated system demonstrated improved capacity for identifying MAEs while guarding against alert fatigue. It also showed promise for reducing patient exposure to potential harm following MAE events.

  7. About the Transportation Secure Data Center | Transportation Secure Data

    Science.gov Websites

    Center | NREL About the Transportation Secure Data Center About the Transportation Secure Data Center The Transportation Secure Data Center (TSDC) makes vital transportation data broadly available large, colorful map of the United States. NREL data experts and engineers analyze large sets of complex

  8. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  9. Evaluation of security algorithms used for security processing on DICOM images

    NASA Astrophysics Data System (ADS)

    Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.

    2005-04-01

    In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.

  10. Global Security Sciences Home - Global Security Sciences

    Science.gov Websites

    Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview

  11. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  12. Design for Security Workshop

    DTIC Science & Technology

    2014-09-30

    fingerprint sensor etc.  Secure application execution  Trust established outwards  With normal world apps  With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User

  13. Redefining Security. A Report by the Joint Security Commission

    DTIC Science & Technology

    1994-02-28

    security policies. This report offers recommendations on developing new strategies for achieving security within our infor-mation systems, including...better, and we outline methods of improving government and industry personnel security poli- cies. We offer recommendations on developing new strategies ... strategies , sufficient funding, and management attention if our comput- ers and networks are to protect the confidentiality, integrity, and availability of

  14. The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.

    PubMed

    Shahri, Ahmad Bakhtiyari; Ismail, Zuraini; Mohanna, Shahram

    2016-11-01

    The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.

  15. Jointness for the Rest of Us: Reforming Joint Professional Development

    DTIC Science & Technology

    2016-06-10

    October 2006), 907. 20 Foley, 1. 21 Gene A. Brewer and Sally Coleman Selden, “Why Elephants Gallop: Assessing and Predicting Organizational...22 Hal Rainey and Paula Steinbauer, “Galloping Elephants : Developing Elements of a Theory of Effective Government Organizations,” Journal of...Washington DC: Brookings Institute Press, 2009. Brewer, Gene A. and Sally Coleman Selden. “Why Elephants Gallop: Assessing and Predicting Organizational

  16. Aviation Security: Background and Policy Options for Screening and Securing Air Cargo

    DTIC Science & Technology

    2008-02-25

    today, employees with unescorted access privileges to security identification display areas ( SIDAs ) may access secured areas and aircraft without...where all-cargo aircraft are loaded and unloaded, as security identification display areas ( SIDAs ). This effectively elevates the required security

  17. Lemnos interoperable security project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance inmore » a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.« less

  18. Securing General Aviation

    DTIC Science & Technology

    2009-03-03

    ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and

  19. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGES

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  20. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Adam D.

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  1. Microwave-assisted extraction of silkworm pupal oil and evaluation of its fatty acid composition, physicochemical properties and antioxidant activities.

    PubMed

    Hu, Bin; Li, Cheng; Zhang, Zhiqing; Zhao, Qing; Zhu, Yadong; Su, Zhao; Chen, Yizi

    2017-09-15

    Microwave-assisted extraction (MAE) of oil from silkworm pupae was firstly performed in the present research. The response surface methodology was applied to optimize the parameters for MAE. The yield of oil by MAE was 30.16% under optimal conditions of a mixed solvent consisting of ethanol and n-hexane (1:1, v/v), microwave power (360W), liquid to solid ratio (7.5/1mL/g), microwave time (29min). Moreover, oil extracted by MAE was quantitatively (yield) and qualitatively (fatty acid profile) similar to those obtained using Soxhlet extraction (SE), but oil extracted by MAE exhibited favourable physicochemical properties and oxidation stability. Additionally, oil extracted by MAE had a higher content of total phenolic, and it showed stronger antioxidant activities. Scanning electron microscopy revealed that microwave technique efficiently promoted the release of oil by breaking down the cell structure of silkworm pupae. Therefore, MAE can be an effective method for the silkworm pupal oil extraction. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Computer Security Models

    DTIC Science & Technology

    1984-09-01

    Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development

  3. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  4. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  5. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  6. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  7. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  8. In-situ 40Ar/39Ar Laser Probe Dating of Micas from Mae Ping Shear Zone, Northern Thailand

    NASA Astrophysics Data System (ADS)

    Lin, Y. L.; Yeh, M. W.; Lo, C. H.; Lee, T. Y.; Charusiri, P.

    2012-04-01

    The Mae Ping Shear Zone (MPSZ, also known as Wang Chao Fault Zone), which trends NW-SE from Myanmar to central Thailand, was considered as the southern boundary of the SE extrusion of Indochina and Sibumasu block during the Cenozoic escape tectonic event of SE asia. Many analyses of 40Ar/39Ar dating on biotite and K-feldspar, K/Ar dating on biotite and illite, zircon fission-track and apatite fission-track dating had been accomplished to constrain the shearing period. Nevertheless, it is hard to convince that the ages could represent the end of the shearing since none of the dated minerals have been proved to be crystallized syn-tectonically. Meta-granitoid and gneiss from the MPSZ were analyzed in this study by applying in-situ 40Ar/39Ar laser probe dating with combination of petrology and micro-structural analysis in the purpose to decipher the geological significance of the dates. Plagioclase was replacing K-feldspar for K-feldspar was cut and embayed by plagioclase observed by SEM + EDS. Muscovite in the granitoid own fish shapes of sinistral sense of shearing, and are always in contact with plagioclase and quartz, which suggests that the muscovite crystallized from the dissolving K-feldspar under amphibolite facies condition. 117 spots on 12 muscovite fishes yield ages from 44 Ma to 35 Ma and have a mean age of 40 Ma. Since the growth condition of the muscovite is higher than the closure temperature, thus we can interpret these muscovite ages as cooling ages. Hence left-lateral shearing of the MPSZ can be deduced as syn- to post-muscovite growth and uplifted the crystalline rocks within the shear zone. The ages of matrix biotite in gneiss has a mean age of 35 Ma, which is consistent with the cooling path reconstructed from previous studies. While the ages of inclusion biotite in the K-feldspar phenocryst scatter from 40 to 50 Ma due to the isotopes were not totally re-equilibrated during the shearing. Consequently, the left-lateral shearing of the MPSZ was

  9. Implementing Filters to Identify and Prioritize Industrial Base Risk: Rules of Thumb to Reduce Cognitive Overload

    DTIC Science & Technology

    2015-04-30

    Thumb to Reduce Cognitive Overload Sally Sleeper, ODASD[M&IBP] John F. Starns, Northrop Grumman Published April 30, 2015 Disclaimer: The views...Prioritize Industrial Base Risk: Rules of Thumb to Reduce Cognitive Overload 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6... Cognitive Overload Sally Sleeper—joined the Office of the Deputy Assistant Secretary of Defense for Manufacturing and Industrial Base Policy as Senior

  10. KSC-03pd0458

    NASA Image and Video Library

    2003-02-02

    KENNEDY SPACE CENTER, FLA. - Former astronaut Sally Ride talks to young women at the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla. The event promotes science, math and technology as future career paths for girls. Breakout sessions afforded closer interaction between Ride and festival attendees. Since it followed the tragic loss of the Columbia astronauts, a large poster was presented which attendees could sign as tribute..

  11. KSC-03PD-0458

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. - Former astronaut Sally Ride talks to young women at the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla. The event promotes science, math and technology as future career paths for girls. Breakout sessions afforded closer interaction between Ride and festival attendees. Since it followed the tragic loss of the Columbia astronauts, a large poster was presented which attendees could sign as tribute..

  12. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  13. A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms

    NASA Astrophysics Data System (ADS)

    Hassan, Ahmed A.; Bahgat, Waleed M.

    2010-01-01

    Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.

  14. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  15. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  16. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  17. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  18. National ITS architecture security

    DOT National Transportation Integrated Search

    2003-10-01

    This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...

  19. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  20. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  1. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  2. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  3. International Nuclear Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less

  4. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    DTIC Science & Technology

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  5. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  6. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  7. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  8. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  9. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Creation of Participant's Security Entitlement; security interests. 987.4 Section 987.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD OFFICE OF FINANCE BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security...

  10. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; Security Interests. 350.5 Section 350.5 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement...

  11. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Creation of Participant's Security Entitlement; Security Interests. 350.5 Section 350.5 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement...

  12. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Creation of Participant's Security Entitlement; Security Interests. 350.5 Section 350.5 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement...

  13. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement; security interests. 987.4 Section 987.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD OFFICE OF FINANCE BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security...

  14. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Creation of Participant's Security Entitlement; Security Interests. 350.5 Section 350.5 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement...

  15. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Creation of Participant's Security Entitlement; Security Interests. 350.5 Section 350.5 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement...

  16. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... effect of perfection and priority of the security interest. A Federal Reserve Bank Operating Circular... SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry... has priority over any other interest in the securities. Where a security interest in favor of the...

  17. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  18. Exploring the Future of Security in the Caribbean: a Regional Security Partnership?

    DTIC Science & Technology

    2007-12-14

    by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and

  19. Magneto-acousto-electrical Measurement Based Electrical Conductivity Reconstruction for Tissues.

    PubMed

    Zhou, Yan; Ma, Qingyu; Guo, Gepu; Tu, Juan; Zhang, Dong

    2018-05-01

    Based on the interaction of ultrasonic excitation and magnetoelectrical induction, magneto-acousto-electrical (MAE) technology was demonstrated to have the capability of differentiating conductivity variations along the acoustic transmission. By applying the characteristics of the MAE voltage, a simplified algorithm of MAE measurement based conductivity reconstruction was developed. With the analyses of acoustic vibration, ultrasound propagation, Hall effect, and magnetoelectrical induction, theoretical and experimental studies of MAE measurement and conductivity reconstruction were performed. The formula of MAE voltage was derived and simplified for the transducer with strong directivity. MAE voltage was simulated for a three-layer gel phantom and the conductivity distribution was reconstructed using the modified Wiener inverse filter and Hilbert transform, which was also verified by experimental measurements. The experimental results are basically consistent with the simulations, and demonstrate that the wave packets of MAE voltage are generated at tissue interfaces with the amplitudes and vibration polarities representing the values and directions of conductivity variations. With the proposed algorithm, the amplitude and polarity of conductivity gradient can be restored and the conductivity distribution can also be reconstructed accurately. The favorable results demonstrate the feasibility of accurate conductivity reconstruction with improved spatial resolution using MAE measurement for tissues with conductivity variations, especially suitable for nondispersive tissues with abrupt conductivity changes. This study demonstrates that the MAE measurement based conductivity reconstruction algorithm can be applied as a new strategy for nondestructive real-time monitoring of conductivity variations in biomedical engineering.

  20. Marine Jurassic lithostratigraphy of Thailand

    NASA Astrophysics Data System (ADS)

    Meesook, A.; Grant-Mackie, J. A.

    Marine Jurassic rocks of Thailand are well-exposed in the Mae Sot and Umphang areas and less extensively near Mae Hong Son, Kanchanaburi, Chumphon and Nakhon Si Thammarat, in the north, west, and south respectively. They are generally underlain unconformably by Triassic and overlain by Quaternary strata. Based mainly on five measured sections, fourteen new lithostratigraphic units are established: (in ascending order) Pa Lan, Mai Hung and Kong Mu Formations of the Huai Pong Group in the Mae Hong Son area; Khun Huai, Doi Yot and Pha De Formations of the Hua Fai Group in the Mae Sot area; Klo Tho, Ta Sue Kho, Pu Khloe Khi and Lu Kloc Tu Formations of the Umphang Group in the Umphang area; and the Khao Lak Formation in the Chumphon area. Mudstone, siltstone, sandstone, limestone and marl are the dominant lithologies. Mudstones, siltstones and sandstones are widespread; limestones are confined to the Mae Sot, Umphang, Kanchanaburi and Mae Hong Son areas; marls are found only in Mae Sot. The sequences are approximately 900 m thick in Mae Sot and 450 m thick in Umphang and are rather thinner in the other areas, particularly in the south. Based on ammonites, with additional data from bivalves and foraminifera, the marine Jurassic is largely Toarcian-Aalenian plus some Bajocian. Late Jurassic ages given previously for strata in the Mae Sot and Umphang areas have not been confirmed.

  1. Effects of Crowding and Attention on High-Levels of Motion Processing and Motion Adaptation

    PubMed Central

    Pavan, Andrea; Greenlee, Mark W.

    2015-01-01

    The motion after-effect (MAE) persists in crowding conditions, i.e., when the adaptation direction cannot be reliably perceived. The MAE originating from complex moving patterns spreads into non-adapted sectors of a multi-sector adapting display (i.e., phantom MAE). In the present study we used global rotating patterns to measure the strength of the conventional and phantom MAEs in crowded and non-crowded conditions, and when attention was directed to the adapting stimulus and when it was diverted away from the adapting stimulus. The results show that: (i) the phantom MAE is weaker than the conventional MAE, for both non-crowded and crowded conditions, and when attention was focused on the adapting stimulus and when it was diverted from it, (ii) conventional and phantom MAEs in the crowded condition are weaker than in the non-crowded condition. Analysis conducted to assess the effect of crowding on high-level of motion adaptation suggests that crowding is likely to affect the awareness of the adapting stimulus rather than degrading its sensory representation, (iii) for high-level of motion processing the attentional manipulation does not affect the strength of either conventional or phantom MAEs, neither in the non-crowded nor in the crowded conditions. These results suggest that high-level MAEs do not depend on attention and that at high-level of motion adaptation the effects of crowding are not modulated by attention. PMID:25615577

  2. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Secure Printing Processes and Other Secure... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure... printing—a printing process utilized in the production of bank-notes and other security documents whereby...

  3. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  4. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  5. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  6. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  7. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  8. Opportune Landing Site CBR and Low-Density Laboratory Database

    DTIC Science & Technology

    2008-05-01

    Program Opportune Landing Site CBR and Low- Density Laboratory Database Larry S. Danyluk, Sally A. Shoop, Rosa T. Affleck, and Wendy L. Wieder...Opportune Landing Site Program ERDC/CRREL TR-08-9 May 2008 Opportune Landing Site CBR and Low- Density Laboratory Database Larry S. Danyluk, Sally A...reproduce in-situ density , moisture, and CBR values and therefore do not accurately repre- sent the complete range of these values measured in the field

  9. KSC-03pd0459

    NASA Image and Video Library

    2003-02-02

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., former astronaut Sally Ride talks to young women about their future. The event promotes science, math and technology as future career paths for girls. Breakout sessions afforded closer interaction between Ride and festival attendees. Since it followed the tragic loss of the Columbia astronauts, a large poster was presented which attendees could sign as tribute.

  10. Health Impact of US Military Service in a Large Population-Based Military Cohort: Findings of the Millennium Cohort Study, 2001-2008

    DTIC Science & Technology

    2011-01-01

    427. 26. Smith TC, Wingard DL, Ryan MA, Kritz- Silverstein D, Slymen DJ, Sallis JF, for the Millennium Cohort Study Team: Prior assault and... Silverstein D, for the Millennium Cohort Study Team: New onset and persistent symptoms of post- traumatic stress disorder self reported after deployment...deployed to the 2003 Iraq war: a cohort study. Lancet 2006, 367(9524):1731-1741. 41. Smith TC, Wingard DL, Ryan MAK, Kritz- Silverstein D, Slymen DJ, Sallis

  11. KSC-03PD-0459

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. -- At the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla., former astronaut Sally Ride talks to young women about their future. The event promotes science, math and technology as future career paths for girls. Breakout sessions afforded closer interaction between Ride and festival attendees. Since it followed the tragic loss of the Columbia astronauts, a large poster was presented which attendees could sign as tribute.

  12. A Generalized Approach to Soil Strength Prediction With Machine Learning Methods

    DTIC Science & Technology

    2006-07-01

    Machine Learning Methods” Peter M. Semen Master of Science Committee Susan P. McGrath, Ph.D. (Chair) Laura R. Ray, Ph.D. Sally A. Shoop ...to participate and provide valuable input, despite a heavy workload. And to Dr. Sally Shoop who championed the work throughout and had the...would also like to thank Dr. Shoop and Dr. Charles Ryerson for their careful oversight of the Opportune Landing Site program and making sure that

  13. AGOR 28

    DTIC Science & Technology

    2014-08-28

    release; distribution unlimited. Report No. A002.062 1. Meetings: i. Participated in weekly conference calls. ii. Design Review 16 2...outfitting lists for Sally Ride. iv. Working on NS5 Hierarchy 4. Sally Ride Progress: • HVAC – Ducting installation is moving forward with...large sections of ductwork being installed on the main deck port and starboard. HVAC crew is laying out runs on the foc’sle and 01 decks. • Pilot

  14. Effects of music aerobic exercise on depression and brain-derived neurotrophic factor levels in community dwelling women.

    PubMed

    Yeh, Shu-Hui; Lin, Li-Wei; Chuang, Yu Kuan; Liu, Cheng-Ling; Tsai, Lu-Jen; Tsuei, Feng-Shiou; Lee, Ming-Tsung; Hsiao, Chiu-Yueh; Yang, Kuender D

    2015-01-01

    A randomized clinical trial was utilized to compare the improvement of depression and brain-derived neurotrophic factor (BDNF) levels between community women with and without music aerobic exercise (MAE) for 12 weeks. The MAE group involved 47 eligible participants, whereas the comparison group had 59 participants. No significant differences were recorded in the demographic characteristics between the participants in the MAE group and the comparison group. Forty-one participants in the MAE group and 26 in the comparison group completed a pre- and posttest. The MAE group displayed significant improvement in depression scores (p = 0.016), decreased depression symptoms in crying (p = 0.03), appetite (p = 0.006), and fatigue (p = 0.011). The BDNF levels of the participants significantly increased after the 12-week MAE (p = 0.042). The parallel comparison group revealed no significant changes in depression scores or BDNF levels. In summary, the 12-week MAE had a significant impact on the enhancement of BDNF levels and improvement of depression symptoms. Middle-aged community women are encouraged to exercise moderately to improve their depression symptoms and BDNF levels.

  15. Effects of Music Aerobic Exercise on Depression and Brain-Derived Neurotrophic Factor Levels in Community Dwelling Women

    PubMed Central

    Yeh, Shu-Hui; Lin, Li-Wei; Chuang, Yu Kuan; Liu, Cheng-Ling; Tsai, Lu-Jen; Tsuei, Feng-Shiou; Lee, Ming-Tsung; Hsiao, Chiu-Yueh; Yang, Kuender D.

    2015-01-01

    A randomized clinical trial was utilized to compare the improvement of depression and brain-derived neurotrophic factor (BDNF) levels between community women with and without music aerobic exercise (MAE) for 12 weeks. The MAE group involved 47 eligible participants, whereas the comparison group had 59 participants. No significant differences were recorded in the demographic characteristics between the participants in the MAE group and the comparison group. Forty-one participants in the MAE group and 26 in the comparison group completed a pre- and posttest. The MAE group displayed significant improvement in depression scores (p = 0.016), decreased depression symptoms in crying (p = 0.03), appetite (p = 0.006), and fatigue (p = 0.011). The BDNF levels of the participants significantly increased after the 12-week MAE (p = 0.042). The parallel comparison group revealed no significant changes in depression scores or BDNF levels. In summary, the 12-week MAE had a significant impact on the enhancement of BDNF levels and improvement of depression symptoms. Middle-aged community women are encouraged to exercise moderately to improve their depression symptoms and BDNF levels. PMID:26075212

  16. Fabrication of a Micro-Needle Array Electrode by Thermal Drawing for Bio-Signals Monitoring

    PubMed Central

    Ren, Lei; Jiang, Qing; Chen, Keyun; Chen, Zhipeng; Pan, Chengfeng; Jiang, Lelun

    2016-01-01

    A novel micro-needle array electrode (MAE) fabricated by thermal drawing and coated with Ti/Au film was proposed for bio-signals monitoring. A simple and effective setup was employed to form glassy-state poly (lactic-co-glycolic acid) (PLGA) into a micro-needle array (MA) by the thermal drawing method. The MA was composed of 6 × 6 micro-needles with an average height of about 500 μm. Electrode-skin interface impedance (EII) was recorded as the insertion force was applied on the MAE. The insertion process of the MAE was also simulated by the finite element method. Results showed that MAE could insert into skin with a relatively low compression force and maintain stable contact impedance between the MAE and skin. Bio-signals, including electromyography (EMG), electrocardiography (ECG), and electroencephalograph (EEG) were also collected. Test results showed that the MAE could record EMG, ECG, and EEG signals with good fidelity in shape and amplitude in comparison with the commercial Ag/AgCl electrodes, which proves that MAE is an alternative electrode for bio-signals monitoring. PMID:27322278

  17. Fabrication of a Micro-Needle Array Electrode by Thermal Drawing for Bio-Signals Monitoring.

    PubMed

    Ren, Lei; Jiang, Qing; Chen, Keyun; Chen, Zhipeng; Pan, Chengfeng; Jiang, Lelun

    2016-06-17

    A novel micro-needle array electrode (MAE) fabricated by thermal drawing and coated with Ti/Au film was proposed for bio-signals monitoring. A simple and effective setup was employed to form glassy-state poly (lactic-co-glycolic acid) (PLGA) into a micro-needle array (MA) by the thermal drawing method. The MA was composed of 6 × 6 micro-needles with an average height of about 500 μm. Electrode-skin interface impedance (EII) was recorded as the insertion force was applied on the MAE. The insertion process of the MAE was also simulated by the finite element method. Results showed that MAE could insert into skin with a relatively low compression force and maintain stable contact impedance between the MAE and skin. Bio-signals, including electromyography (EMG), electrocardiography (ECG), and electroencephalograph (EEG) were also collected. Test results showed that the MAE could record EMG, ECG, and EEG signals with good fidelity in shape and amplitude in comparison with the commercial Ag/AgCl electrodes, which proves that MAE is an alternative electrode for bio-signals monitoring.

  18. Sensitive Security Information (SSI) and Transportation Security: Background and Controversies

    DTIC Science & Technology

    2004-02-05

    with airport security procedures, employee accountability, passenger screening, and airport secrecy agreements. In January 2003, the Dallas/Fort... Airport Security Flaws Bring Criticism,” Los Angeles Times, July 2, 2002, p. A8. 16 Charles Piller and Ricardo Alonso-Zaldivar, “A Suspect Computer...Secrecy in Airport Security Contract Criticized,” Des Moines Register, Sept. 27, 2003, p. 1A; James Andrews, “Here in Tristate, Security’s Tighter

  19. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  20. Securing the Global Airspace System Via Identity-Based Security

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  1. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    DTIC Science & Technology

    2012-12-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure

  2. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  3. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto

  4. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    PubMed

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  5. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  6. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...

  7. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  8. Auditing Organizational Security

    DTIC Science & Technology

    2017-01-01

    Managing organizational security is no different from managing any other of the command’s missions. Establish your policies, goals and risk...parameters; implement, train, measure and benchmark them. And then audit, audit, audit. Today, more than ever, Organizational Security is an essential...not be regarded as independent or standing alone. Cybersecurity is an indispensable element of organizational security, which is the subject of

  9. Investigation of the component in Artemisia annua L. leading to enhanced antiplasmodial potency of artemisinin via regulation of its metabolism.

    PubMed

    Cai, Tian-Yu; Zhang, Yun-Rui; Ji, Jian-Bo; Xing, Jie

    2017-07-31

    The chemical matrix of the herb Artemisia annua L. (A. annua), from which artemisinin (QHS) is isolated, can enhance both the bioavailability and efficacy of QHS. However, the exact mechanism of this synergism remains unknown. The biotransformation of QHS and potential "enzyme inhibitors" in plant matrix could be of great importance in understanding the improved efficacy of QHS in A. annua, which has been limited to the synergism with flavonoid components. To investigate the component in A. annua extracts (MAE) leading to enhanced antiplasmodial potency of QHS via regulation of its metabolism. The efficacy of QHS in combination with the synergistic component was also evaluated. The total MAE extract and its three MAE fractions (MAE-I eluted using 3% methanol, MAE-II eluted using 50% methanol and MAE-III eluted using 85% methanol) were obtained from dry plant materials and prepared after lyophilization. The pharmacokinetic profiles of QHS and its major phase I metabolite monohydroxylated artemisinin (QHS-M) were investigated in healthy rats after a single oral administration of QHS in each MAE extract. Major components isolated from the target MAE fraction were evaluated for their enzyme inhibition. The antimalarial activity of QHS in combination with the potential synergistic component against Plasmodium falciparum was studied in vivo (murine Plasmodium yoelii). The recrudescence and survival time of infected mice were also recorded after drug treatment. Compared to pure QHS, a 2-fold increase in QHS exposure (AUC and C max ) was found in healthy rats after a single oral dose of QHS in the total MAE extract or its fraction MAE-III. In addition, metabolic biotransformation of QHS to the metabolite QHS-M (mediated by CYP3A) was inhibited by MAE or MAE-III. Among nine major components isolated from MAE-III (five sesquiterpenenes, three flavonoids and one phenolic acid), only arteannuin B (AB) showed an inhibition of CYP3A4 (IC 50 1.2μM). The synergism between QHS and

  10. Smart security and securing data through watermarking

    NASA Astrophysics Data System (ADS)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  11. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  12. Security Analysis of Yeh-Tsai Security Mechanism

    NASA Astrophysics Data System (ADS)

    Yum, Dae Hyun; Shin, Jong Hoon; Lee, Pil Joong

    Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack.

  13. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  14. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  15. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  16. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  17. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  18. 7 CFR 1942.114 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 13 2011-01-01 2009-01-01 true Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...

  19. 7 CFR 1942.114 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 13 2012-01-01 2012-01-01 false Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...

  20. 7 CFR 1942.114 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 13 2014-01-01 2013-01-01 true Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...

  1. 7 CFR 1942.114 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 13 2013-01-01 2013-01-01 false Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...

  2. 7 CFR 1942.114 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...

  3. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  4. Systematic literature review of hospital medication administration errors in children

    PubMed Central

    Ameer, Ahmed; Dhillon, Soraya; Peters, Mark J; Ghaleb, Maisoon

    2015-01-01

    Objective Medication administration is the last step in the medication process. It can act as a safety net to prevent unintended harm to patients if detected. However, medication administration errors (MAEs) during this process have been documented and thought to be preventable. In pediatric medicine, doses are usually administered based on the child’s weight or body surface area. This in turn increases the risk of drug miscalculations and therefore MAEs. The aim of this review is to report MAEs occurring in pediatric inpatients. Methods Twelve bibliographic databases were searched for studies published between January 2000 and February 2015 using “medication administration errors”, “hospital”, and “children” related terminologies. Handsearching of relevant publications was also carried out. A second reviewer screened articles for eligibility and quality in accordance with the inclusion/exclusion criteria. Key findings A total of 44 studies were systematically reviewed. MAEs were generally defined as a deviation of dose given from that prescribed; this included omitted doses and administration at the wrong time. Hospital MAEs in children accounted for a mean of 50% of all reported medication error reports (n=12,588). It was also identified in a mean of 29% of doses observed (n=8,894). The most prevalent type of MAEs related to preparation, infusion rate, dose, and time. This review has identified five types of interventions to reduce hospital MAEs in children: barcode medicine administration, electronic prescribing, education, use of smart pumps, and standard concentration. Conclusion This review has identified a wide variation in the prevalence of hospital MAEs in children. This is attributed to the definition and method used to investigate MAEs. The review also illustrated the complexity and multifaceted nature of MAEs. Therefore, there is a need to develop a set of safety measures to tackle these errors in pediatric practice. PMID:29354530

  5. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  6. Updating energy security and environmental policy: Energy security theories revisited.

    PubMed

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  7. Process Improvement Should Link to Security: SEPG 2007 Security Track Recap

    DTIC Science & Technology

    2007-09-01

    the Systems Security Engineering Capability Maturity Model (SSE- CMM / ISO 21827) and its use in system software developments ...software development life cycle ( SDLC )? 6. In what ways should process improvement support security in the SDLC ? 1.2 10BPANEL RESOURCES For each... project management, and support practices through the use of the capability maturity models including the CMMI and the Systems Security

  8. Trajectories of trauma symptoms and resilience in deployed US military service members:prospective cohort study

    DTIC Science & Technology

    2012-01-01

    JAMA 2006; 295: 1023–32. 2 Smith TC, Ryan MA, Wingard DL, Slymen DJ, Sallis JF, Kritz- Silverstein D, et al. New onset and persistent symptoms of post...71. 3 Smith TC, Wingard DL, Ryan MAK, Kritz- Silverstein D, Slymen DJ, Sallis JF, et al. Prior assault and posttraumatic stress disorder after combat...Psychooncology 2010; 19: 1044–51. 17 Dickstein BD, Suvak M, Litz BT, Adler AB . Heterogeneity in the course of posttraumatic stress disorder: trajectories of

  9. Trajectories of Trauma Symptoms and Resilience in Deployed US Military Service Members: Prospective Cohort Study

    DTIC Science & Technology

    2012-04-01

    Afghanistan. JAMA 2006; 295: 1023–32. 2 Smith TC, Ryan MA, Wingard DL, Slymen DJ, Sallis JF, Kritz- Silverstein D, et al. New onset and persistent...2008; 336: 366–71. 3 Smith TC, Wingard DL, Ryan MAK, Kritz- Silverstein D, Slymen DJ, Sallis JF, et al. Prior assault and posttraumatic stress disorder...Psychooncology 2010; 19: 1044–51. 17 Dickstein BD, Suvak M, Litz BT, Adler AB . Heterogeneity in the course of posttraumatic stress disorder

  10. KSC-03PD-0460

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. -- Exhibits draw crowds of young women attending the Sally Ride Science Festival, held at the University of Central Florida, Orlando, Fla. The event promotes science, math and technology as future career paths for girls. Former astronaut Sally Ride addressed the girls, while breakout sessions afforded closer interaction between Ride and festival attendees. Since it followed the tragic loss of the Columbia astronauts, a large poster was presented which attendees could sign as tribute.

  11. AGOR 28: SIO Shipyard Representative Bi-Weekly Progress Report

    DTIC Science & Technology

    2015-07-30

    sides of the lower engine room still have sections of bare acoustic tile that require thermal insulation and Quad-Zero • Main Deck Noise Levels, Sally...for Sally Ride. ii. Working on NS5 Hierarchy 4. Operator Concerns: • Acoustic Tiles & MLV – No additional tiles have been removed this...reporting period. DCI has no plans to remove any more per USCG. No indication as to what sound treatment will be placed in the engine room bilge or on

  12. AGOR 28

    DTIC Science & Technology

    2015-04-23

    to work on initial outfitting lists for Sally Ride. ii. Working on NS5 Hierarchy 4. Operator Concerns: • Tuff-Mass MLV and Acoustic Tiles...The yard is continuing to install the Quad-zero MLV in various locations throughout Sally Ride. DCI is holding off on installing any new insulation ...in location with no sound dampening tiles. This includes the Main Engine Space overhead and aft bulkhead as well as the MCS. The Quad-Zeros is not

  13. Unconditionally Secure Blind Signatures

    NASA Astrophysics Data System (ADS)

    Hara, Yuki; Seito, Takenobu; Shikata, Junji; Matsumoto, Tsutomu

    The blind signature scheme introduced by Chaum allows a user to obtain a valid signature for a message from a signer such that the message is kept secret for the signer. Blind signature schemes have mainly been studied from a viewpoint of computational security so far. In this paper, we study blind signatures in unconditional setting. Specifically, we newly introduce a model of unconditionally secure blind signature schemes (USBS, for short). Also, we propose security notions and their formalization in our model. Finally, we propose a construction method for USBS that is provably secure in our security notions.

  14. Effect of atomic monolayer insertions on electric-field-induced rotation of magnetic easy axis

    NASA Astrophysics Data System (ADS)

    Tsujikawa, M.; Haraguchi, S.; Oda, T.

    2012-04-01

    We have investigated the electric field (EF) effect on the magnetic anisotropy energy (MAE) in the thin films MgO/M/Fe/Au(001) and MgO/Fe/M(001) (M = Pd, Pt, and Au) by means of first-principles density-functional calculations. We find that the MAE varies linearly with the EF and investigate the change in slope of the MAE as a function of the EF as the buffer layer is changed. We find that a single monatomic buffer layer may be useful for devices that use EF-modified MAE. We simulate the critical EF for easy-axis rotation and discuss interface effects of Mg/Fe and Fe/Au on MAE.

  15. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  16. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  17. Between security and military identities: The case of Israeli security experts.

    PubMed

    Grassiani, Erella

    2018-02-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.

  18. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  19. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  20. KENNEDY SPACE CENTER, FLA. - At the KSC Visitor Complex, past and present recipients of college scholarships awarded by the Astronaut Scholarship Foundation stand up to be recognized by the audience. The occasion was the induction ceremony of four Space Shuttle astronauts into the U.S. Astronaut Hall of Fame, including Daniel Brandenstein, Robert "Hoot" Gibson, Story Musgrave, and Sally K. Ride. The Foundation awards 17 scholarships annually, each worth $8,500, to students interested in studying science and engineering. Since 1984, more than $1.7 million in scholarship funds have been awarded.

    NASA Image and Video Library

    2003-06-21

    KENNEDY SPACE CENTER, FLA. - At the KSC Visitor Complex, past and present recipients of college scholarships awarded by the Astronaut Scholarship Foundation stand up to be recognized by the audience. The occasion was the induction ceremony of four Space Shuttle astronauts into the U.S. Astronaut Hall of Fame, including Daniel Brandenstein, Robert "Hoot" Gibson, Story Musgrave, and Sally K. Ride. The Foundation awards 17 scholarships annually, each worth $8,500, to students interested in studying science and engineering. Since 1984, more than $1.7 million in scholarship funds have been awarded.

  1. Why security fails.

    PubMed

    Sem, Richard D

    2016-10-01

    When a hospital suffers a serious loss or act of violence, the blame frequently centers on the facility's Security Department, but, as the author, a longtime security consultant, points out, there's plenty of blame to go around--including Administration at all levels, and employees, both clinical and non clinical. In this article, he presents the many reasons why security can fail and what should be done to prevent such failure.

  2. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...

  3. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...

  4. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...

  5. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...

  6. Aviation Security: Vulnerabilities in, and Alternatives for, Preboard Screening Security Operations

    DTIC Science & Technology

    2001-09-25

    establishing the certification program. This regulation is particularly significant because it is to include requirements mandated by the Airport Security Improvement...Assessment of Airport Security Screener Performance and Retention, Sept. 15, 2000. Page 8 GAO-01-1171T Criteria for Assessing Shifting responsibility for...airline and airport security officials to assess each option for reassigning screening responsibility against the key criteria- Specifically, we asked

  7. A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship

    PubMed Central

    Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman

    2017-01-01

    This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451

  8. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    PubMed Central

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226

  9. Security threat assessment of an Internet security system using attack tree and vague sets.

    PubMed

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  10. Changing Homeland Security: In 2010, Was Homeland Security Useful?

    DTIC Science & Technology

    2011-02-01

    Education Consortium, September 2007). 8 James Ramsay , Daniel Cutrer, and Robert Raffel, “Development of an Outcomes-Based Undergraduate Curriculum in... Gordon , “Changing Homeland Security: Teaching the Core,” Homeland Security Affairs II, no. 1 (April 2006) http://www.hsaj.org/?article=2.1.1. 13 Kuhn

  11. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  12. Materialism and food security.

    PubMed

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  13. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    PubMed

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  14. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  15. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  16. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  17. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  18. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... [Release No. 33-9251; File No. S7-31-11] RIN 3235-AL20 Covered Securities Pursuant to Section 18 of the... under Section 18 of the Securities Act of 1933 (``Securities Act''), as amended, to designate certain securities on BATS Exchange, Inc. (``BATS'' or ``Exchange'') as covered securities for purposes of Section 18...

  19. Farmland Tenure Security in China: Influencing Factors of Actual and Perceived Farmland Tenure Security

    NASA Astrophysics Data System (ADS)

    Ren, Guangcheng; Zhu, Xueqin; Heerink, Nico; van Ierland, Ekko; Feng, Shuyi

    2017-04-01

    Tenure security plays an important role in farm households' investment, land renting and other decisions. Recent literature distinguishes between actual farmland tenure security (i.e. farm households' actual control of farmland) and perceived farmland tenure security (i.e. farm households' subjective understanding of their farmland tenure situation and expectation regarding government enforcement and equality of the law). However little is known on what factors influence the actual and perceived farmland tenure security in rural China. Theoretically, actual farmland tenure security is related to village self-governance as a major informal governance rule in rural China. Both economic efficiency and equity considerations are likely to play a role in the distribution of land and its tenure security. Household perceptions of farmland tenure security depend not only on the actual farmland tenure security in a village, but may also be affected by households' investment in and ability of changing social rules. Our study examines what factors contribute to differences in actual and perceived farmland tenure security between different villages and farm households in different regions of China. Applying probit models to the data collected from 1,485 households in 124 villages in Jiangsu, Jiangxi, Liaoning and Chongqing, we find that development of farmland rental market and degree of self-governance of a village have positive impacts, and development of labour market has a negative effect on actual farmland tenure security. Household perceptions of tenure security depend not only on actual farmland tenure security and on households' investment in and ability of changing social rules, but also on risk preferences of households. This finding has interesting policy implications for future land reforms in rural China.

  20. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    PubMed

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  1. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    PubMed Central

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  2. Fabrication of Flexible Microneedle Array Electrodes for Wearable Bio-Signal Recording.

    PubMed

    Ren, Lei; Xu, Shujia; Gao, Jie; Lin, Zi; Chen, Zhipeng; Liu, Bin; Liang, Liang; Jiang, Lelun

    2018-04-13

    Laser-direct writing (LDW) and magneto-rheological drawing lithography (MRDL) have been proposed for the fabrication of a flexible microneedle array electrode (MAE) for wearable bio-signal monitoring. Conductive patterns were directly written onto the flexible polyethylene terephthalate (PET) substrate by LDW. The microneedle array was rapidly drawn and formed from the droplets of curable magnetorheological fluid with the assistance of an external magnetic field by MRDL. A flexible MAE can maintain a stable contact interface with curved human skin due to the flexibility of the PET substrate. Compared with Ag/AgCl electrodes and flexible dry electrodes (FDE), the electrode-skin interface impedance of flexible MAE was the minimum even after a 50-cycle bending test. Flexible MAE can record electromyography (EMG), electroencephalography (EEG) and static electrocardiography (ECG) signals with good fidelity. The main features of the dynamic ECG signal recorded by flexible MAE are the most distinguishable with the least moving artifacts. Flexible MAE is an attractive candidate electrode for wearable bio-signal monitoring.

  3. Effects of martial arts exercise on body composition, serum biomarkers and quality of life in overweight/obese premenopausal women: a pilot study

    PubMed Central

    Chyu, Ming-Chien; Zhang, Yan; Brismée, Jean-Michel; Dagda, Raul Y.; Chaung, Eugene; Von Bergen, Vera; Doctolero, Susan; Shen, Chwan-Li

    2013-01-01

    Various exercise interventions have been shown to benefit weight control and general health in different populations. However, very few studies have been conducted on martial arts exercise (MAE). The objective of this pilot study is to evaluate the efficacy of 12 weeks of MAE intervention on body composition, serum biomarkers and quality of life (QOL) in overweight/obese premenopausal women. We found that subjects in the MAE group did not lose body weight, while they significantly decreased fat-free mass and muscle mass as compared to those in the control group, who demonstrated an increase in these parameters. The MAE group demonstrated an increase in serum IGF-I concentration, but no change in others. MAE may be a feasible and effective approach to improve body composition and QOL in overweight/obese premenopausal women. Our study underscores the need for further studies using larger samples to establish possible benefits of MAE in various populations. PMID:24665215

  4. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  5. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  6. Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool

    DTIC Science & Technology

    2010-11-01

    designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and authorisation in terms...level authentication and authorisation in terms of security. It uses operating system level security but does not provide application level security for...and collaboration tool, designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and

  7. Maternal secure-base scripts and children's attachment security in an adopted sample.

    PubMed

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth

  8. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  9. Maritime security report. June 1999 [Inter-American Port Security Program

    DOT National Transportation Integrated Search

    1999-06-01

    Three international port security training courses were organized and managed by the U.S. Maritime Administration (MARAD) and conducted during the fall of 1998 in Panama, Peru, and Barbados as principal activities of the Inter-American Port Security ...

  10. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  11. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  12. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  13. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  14. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  15. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  16. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  17. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    PubMed Central

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  18. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    PubMed

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  19. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  20. Security system signal supervision

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  1. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  2. Between security and military identities: The case of Israeli security experts

    PubMed Central

    Grassiani, Erella

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228

  3. 17 CFR 230.602 - Securities exempted.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...

  4. 17 CFR 230.602 - Securities exempted.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...

  5. 17 CFR 230.602 - Securities exempted.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...

  6. 17 CFR 230.602 - Securities exempted.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...

  7. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  8. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  9. Introduction to Retail Security.

    ERIC Educational Resources Information Center

    Thomas, James E., Ed.

    This collection consists of 15 articles dealing with retail security. Included in the volume are the following papers: "Retail Security--an Introduction," by Andrew J. Thacker and Linda Cressman; "Systematic Planning and Retail Security," by Linda T. Thomas; "Identifying Potentially Dishonest Employees," by James E.…

  10. Quality improvements in decreasing medication administration errors made by nursing staff in an academic medical center hospital: a trend analysis during the journey to Joint Commission International accreditation and in the post-accreditation era

    PubMed Central

    Wang, Hua-fen; Jin, Jing-fen; Feng, Xiu-qin; Huang, Xin; Zhu, Ling-ling; Zhao, Xiao-ying; Zhou, Quan

    2015-01-01

    Background Medication errors may occur during prescribing, transcribing, prescription auditing, preparing, dispensing, administration, and monitoring. Medication administration errors (MAEs) are those that actually reach patients and remain a threat to patient safety. The Joint Commission International (JCI) advocates medication error prevention, but experience in reducing MAEs during the period of before and after JCI accreditation has not been reported. Methods An intervention study, aimed at reducing MAEs in hospitalized patients, was performed in the Second Affiliated Hospital of Zhejiang University, Hangzhou, People’s Republic of China, during the journey to JCI accreditation and in the post-JCI accreditation era (first half-year of 2011 to first half-year of 2014). Comprehensive interventions included organizational, information technology, educational, and process optimization-based measures. Data mining was performed on MAEs derived from a compulsory electronic reporting system. Results The number of MAEs continuously decreased from 143 (first half-year of 2012) to 64 (first half-year of 2014), with a decrease in occurrence rate by 60.9% (0.338% versus 0.132%, P<0.05). The number of MAEs related to high-alert medications decreased from 32 (the second half-year of 2011) to 16 (the first half-year of 2014), with a decrease in occurrence rate by 57.9% (0.0787% versus 0.0331%, P<0.05). Omission was the top type of MAE during the first half-year of 2011 to the first half-year of 2014, with a decrease by 50% (40 cases versus 20 cases). Intravenous administration error was the top type of error regarding administration route, but it continuously decreased from 64 (first half-year of 2012) to 27 (first half-year of 2014). More experienced registered nurses made fewer medication errors. The number of MAEs in surgical wards was twice that in medicinal wards. Compared with non-intensive care units, the intensive care units exhibited higher occurrence rates of MAEs

  11. Quality improvements in decreasing medication administration errors made by nursing staff in an academic medical center hospital: a trend analysis during the journey to Joint Commission International accreditation and in the post-accreditation era.

    PubMed

    Wang, Hua-Fen; Jin, Jing-Fen; Feng, Xiu-Qin; Huang, Xin; Zhu, Ling-Ling; Zhao, Xiao-Ying; Zhou, Quan

    2015-01-01

    Medication errors may occur during prescribing, transcribing, prescription auditing, preparing, dispensing, administration, and monitoring. Medication administration errors (MAEs) are those that actually reach patients and remain a threat to patient safety. The Joint Commission International (JCI) advocates medication error prevention, but experience in reducing MAEs during the period of before and after JCI accreditation has not been reported. An intervention study, aimed at reducing MAEs in hospitalized patients, was performed in the Second Affiliated Hospital of Zhejiang University, Hangzhou, People's Republic of China, during the journey to JCI accreditation and in the post-JCI accreditation era (first half-year of 2011 to first half-year of 2014). Comprehensive interventions included organizational, information technology, educational, and process optimization-based measures. Data mining was performed on MAEs derived from a compulsory electronic reporting system. The number of MAEs continuously decreased from 143 (first half-year of 2012) to 64 (first half-year of 2014), with a decrease in occurrence rate by 60.9% (0.338% versus 0.132%, P<0.05). The number of MAEs related to high-alert medications decreased from 32 (the second half-year of 2011) to 16 (the first half-year of 2014), with a decrease in occurrence rate by 57.9% (0.0787% versus 0.0331%, P<0.05). Omission was the top type of MAE during the first half-year of 2011 to the first half-year of 2014, with a decrease by 50% (40 cases versus 20 cases). Intravenous administration error was the top type of error regarding administration route, but it continuously decreased from 64 (first half-year of 2012) to 27 (first half-year of 2014). More experienced registered nurses made fewer medication errors. The number of MAEs in surgical wards was twice that in medicinal wards. Compared with non-intensive care units, the intensive care units exhibited higher occurrence rates of MAEs (1.81% versus 0.24%, P<0

  12. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  13. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  14. Development and Change in Swedish Municipal Adult Education: Occupational Life History Studies and Four Genealogies of Context

    ERIC Educational Resources Information Center

    Loeb, Ingrid Henning

    2007-01-01

    This article is based on the author's dissertation work on development and change in Swedish municipal adult education (MAE), investigated through occupational life history studies of four teachers in different municipalities who have worked in MAE since the mid 1970s. Three periods of development--three "eras"--in MAE have been…

  15. Optimum Antenna Configuration for Maximizing Access Point Range of an IEEE 802.11 Wireless Mesh Network in Support of Multi-Mission Operations Relative to Hastily Formed Scalable Deployments

    DTIC Science & Technology

    2007-09-01

    Configuration Consideration ...........................54 C. MAE NGAT DAM, CHIANG MAI , THAILAND, FIELD EXPERIMENT...2006 802.11 Network Topology Mae Ngat Dam, Chiang Mai , Thailand.......................39 Figure 31. View of COASTS 2006 802.11 Topology...Requirements (Background From Google Earth).....62 Figure 44. Mae Ngat Dam, Chiang Mai , Thailand (From Google Earth

  16. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  17. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  18. Telemedicine security: a systematic review.

    PubMed

    Garg, Vaibhav; Brewer, Jeffrey

    2011-05-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. © 2011 Diabetes Technology Society.

  19. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  20. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  1. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  2. How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.

    PubMed

    Stites, Mark; Pianykh, Oleg S

    2016-04-01

    Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.

  3. Indirection and computer security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyzemore » common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.« less

  4. Rates of minor adverse events and health resource utilization postcolonoscopy

    PubMed Central

    Azalgara, Vladimir Marquez; Sewitch, Maida J; Joseph, Lawrence; Barkun, Alan N

    2014-01-01

    BACKGROUND: Little is known about minor adverse events (MAEs) following outpatient colonoscopies and associated health care resource utilization. OBJECTIVE: To estimate the rates of incident MAE at two, 14 and 30 days postcolonoscopy, and associated health care resource utilization. A secondary aim was to identify factors associated with cumulative 30-day MAE incidence. METHODS: A longitudinal cohort study was conducted among individuals undergoing an outpatient colonoscopy at the Montreal General Hospital (Montreal, Quebec). Before colonoscopy, consecutive individuals were enrolled and interviewed to obtain data regarding age, sex, comorbidities, use of antiplatelets/anticoagulants and previous symptoms. Endoscopy reports were reviewed for intracolonoscopy procedures (biopsy, polypectomy). Telephone or Internet follow-up was used to obtain data regarding MAEs (abdominal pain, bloating, diarrhea, constipation, nausea, vomiting, blood in the stools, rectal or anal pain, headaches, other) and health resource use (visits to emergency department, primary care doctor, gastroenterologist; consults with nurse, pharmacist or telephone hotline). Rates of incident MAEs and health resources utilization were estimated using Bayesian hierarchical modelling to account for patient clustering within physician practices. RESULTS: Of the 705 individuals approached, 420 (59.6%) were enrolled. Incident MAE rates at the two-, 14- and 30-day follow-ups were 17.3% (95% credible interval [CrI] 8.1% to 30%), 10.5% (95% CrI 2.9% to 23.7%) and 3.2% (95% CrI 0.01% to 19.8%), respectively. The 30-day rate of health resources utilization was 1.7%, with 0.95% of participants seeking the services of a physician. No predictors of the cumulative 30-day incidence of MAEs were identified. DISCUSSION: The incidence of MAEs was highest in the 48 h following colonoscopy and uncommon after two weeks, supporting the Canadian Association of Gastroenterology’s recommendation for assessment of late

  5. Rates of minor adverse events and health resource utilization postcolonoscopy.

    PubMed

    Marquez Azalgara, Vladimir; Sewitch, Maida J; Joseph, Lawrence; Barkun, Alan N

    2014-12-01

    Little is known about minor adverse events (MAEs) following outpatient colonoscopies and associated health care resource utilization. To estimate the rates of incident MAE at two, 14 and 30 days postcolonoscopy, and associated health care resource utilization. A secondary aim was to identify factors associated with cumulative 30-day MAE incidence. A longitudinal cohort study was conducted among individuals undergoing an outpatient colonoscopy at the Montreal General Hospital (Montreal, Quebec). Before colonoscopy, consecutive individuals were enrolled and interviewed to obtain data regarding age, sex, comorbidities, use of antiplatelets/anticoagulants and previous symptoms. Endoscopy reports were reviewed for intracolonoscopy procedures (biopsy, polypectomy). Telephone or Internet follow-up was used to obtain data regarding MAEs (abdominal pain, bloating, diarrhea, constipation, nausea, vomiting, blood in the stools, rectal or anal pain, headaches, other) and health resource use (visits to emergency department, primary care doctor, gastroenterologist; consults with nurse, pharmacist or telephone hotline). Rates of incident MAEs and health resources utilization were estimated using Bayesian hierarchical modelling to account for patient clustering within physician practices. Of the 705 individuals approached, 420 (59.6%) were enrolled. Incident MAE rates at the two-, 14- and 30-day follow-ups were 17.3% (95% credible interval [CrI] 8.1% to 30%), 10.5% (95% CrI 2.9% to 23.7%) and 3.2% (95% CrI 0.01% to 19.8%), respectively. The 30-day rate of health resources utilization was 1.7%, with 0.95% of participants seeking the services of a physician. No predictors of the cumulative 30-day incidence of MAEs were identified. The incidence of MAEs was highest in the 48 h following colonoscopy and uncommon after two weeks, supporting the Canadian Association of Gastroenterology's recommendation for assessment of late complications at 14 days. Predictors of new onset of MAEs were

  6. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  7. 27 CFR 19.966 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.966 Section 19.966 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF... and Security § 19.966 Security. Proprietors shall provide security adequate to deter the unauthorized...

  8. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    NASA Astrophysics Data System (ADS)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  9. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  10. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  11. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  12. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  13. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  14. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  15. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  16. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  17. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 12 2011-01-01 2011-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  18. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...

  19. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 12 2012-01-01 2012-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  20. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 12 2013-01-01 2013-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  1. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...

  2. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 12 2014-01-01 2013-01-01 true Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  3. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...

  4. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...

  5. A Portable Computer Security Workshop

    ERIC Educational Resources Information Center

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  6. 7 CFR 331.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 5 2013-01-01 2013-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. Link... register under this part must develop and implement a written security plan. The security plan must be...

  7. Statin-Associated Muscle-Related Adverse Effects: A Case Series of 354 Patients

    PubMed Central

    Cham, Stephanie; Evans, Marcella A.; Denenberg, Julie O.; Golomb, Beatrice A.

    2016-01-01

    Study Objective To characterize the properties and natural history of 3-hydroxy-3-methylglutaryl coenzyme A reductase inhibitor (statin)-associated muscle-related adverse effects (MAEs). Design Patient-targeted postmarketing adverse-effect surveillance approach coupling survey design with an open-ended narrative. Setting University-affiliated health care system. Subjects Three hundred fifty-four patients (age range 34–86 yrs) who self-reported muscle-related problems associated with statin therapy. Measurements and Main Results Patients with perceived statin-associated MAEs completed a survey assessing statin drugs and dosages; characteristics of the MAEs; time course of onset, resolution, or recurrence; and impact on quality of life (QOL). Cases were assessed for putative drug adverse-effect causality by using the Naranjo adverse drug reaction probability scale criteria and were evaluated for inclusion in groups for which mortality benefit with statins has been shown. Patients reported muscle pain (93%), fatigue (88%), and weakness (85%). Three hundred patients (85%) met literature criteria for probable or definite drug adverse-effect causality. Ninety-four percent of atorvastatin usages (240/255) generated MAEs versus 61% of lovastatin usages (38/62, p<0.0001). Higher potency statins reproduced MAEs in 100% of 39 rechallenges versus 73% (29/40) with lower potency rechallenges (p<0.01). Time course of onset after statin initiation varied (median 14 wks); some MAEs occurred after long-term symptom-free use. Recurrence with rechallenge had a significantly shorter latency to onset (median 2 wks). The MAEs adversely affected all assessed functional and QOL domains. Most patients with probable or definite MAEs were in categories for which available randomized controlled trial evidence shows no trend to all-cause mortality benefit with statin therapy. Conclusion This study complements available information on the properties and natural history of statin

  8. Statin-associated muscle-related adverse effects: a case series of 354 patients.

    PubMed

    Cham, Stephanie; Evans, Marcella A; Denenberg, Julie O; Golomb, Beatrice A

    2010-06-01

    To characterize the properties and natural history of 3-hydroxy-3-methylglutaryl coenzyme A reductase inhibitor (statin)-associated muscle-related adverse effects (MAEs). Patient-targeted postmarketing adverse-effect surveillance approach coupling survey design with an open-ended narrative. University-affiliated health care system. Three hundred fifty-four patients (age range 34-86 yrs) who self-reported muscle-related problems associated with statin therapy. Patients with perceived statin-associated MAEs completed a survey assessing statin drugs and dosages; characteristics of the MAEs; time course of onset, resolution, or recurrence; and impact on quality of life (QOL). Cases were assessed for putative drug adverse-effect causality by using the Naranjo adverse drug reaction probability scale criteria and were evaluated for inclusion in groups for which mortality benefit with statins has been shown. Patients reported muscle pain (93%), fatigue (88%), and weakness (85%). Three hundred patients (85%) met literature criteria for probable or definite drug adverse-effect causality. Ninety-four percent of atorvastatin usages (240/255) generated MAEs versus 61% of lovastatin usages (38/62, p<0.0001). Higher potency statins reproduced MAEs in 100% of 39 rechallenges versus 73% (29/40) with lower potency rechallenges (p<0.01). Time course of onset after statin initiation varied (median 14 wks); some MAEs occurred after long-term symptom-free use. Recurrence with rechallenge had a significantly shorter latency to onset (median 2 wks). The MAEs adversely affected all assessed functional and QOL domains. Most patients with probable or definite MAEs were in categories for which available randomized controlled trial evidence shows no trend to all-cause mortality benefit with statin therapy. This study complements available information on the properties and natural history of statin-associated MAEs, affirming dose dependence and strong QOL impact. The data indicating a dose

  9. Ab initio study of magnetocrystalline anisotropy, magnetostriction, and Fermi surface of L10 FeNi (tetrataenite)

    NASA Astrophysics Data System (ADS)

    Werwiński, Mirosław; Marciniak, Wojciech

    2017-12-01

    We present results of ab initio calculations of several L10 FeNi characteristics, such as the summary of the magnetocrystalline anisotropy energies (MAEs), the full potential calculations of the anisotropy constant K 3, and the combined analysis of the Fermi surface and 3D {k} -resolved MAE. Other calculated parameters are the spin and orbital magnetic moments, the magnetostrictive coefficient λ0 0 1 , the bulk modulus B 0, and the lattice parameters. The MAEs summary shows rather big discrepancies among the experimental MAEs from the literature and also among the calculated MAE’s. The MAEs calculated in this work with the full potential and generalized gradient approximation (GGA) are equal to 0.47 MJ m-3 from WIEN2k, 0.34 MJ m-3 from FPLO, and 0.23 MJ m-3 from FP-SPR-KKR code. These results suggest that the MAE in GGA is below 0.5 MJ m-3 . It is expected that due to the limitations of the GGA, this value is underestimated. The L10 FeNi has further potential to improve its MAE by modifications, like e.g. tetragonal strain or alloying. The presented 3D {k} -resolved map of the MAE combined with the Fermi surface gives a complete picture of the MAE contributions in the Brillouin zone. The obtained, from the full potential FP-SPR-KKR method, magnetocrystalline anisotropy constants K 2 and K 3 are several orders of magnitude smaller than the MAE/K 1 and equal to -2.0 kJ m-3 and 110 J m-3 , respectively. The calculated spin and orbital magnetic moments of the L10 FeNi are equal to 2.72 and 0.054 μB for Fe and 0.53 and 0.039 μB for Ni atoms, respectively. The calculations of geometry optimization lead to a c/a ratio equal to 1.0036, B 0 equal to 194 GPa, and λ0 0 1 equal to 9.4  ×  10-6.

  10. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  11. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  12. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  13. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  14. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  15. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  16. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  17. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  18. 12 CFR 390.309 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security. 390.309 Section 390.309 Banks and... Associations § 390.309 Security. The term security means any non-withdrawable account, note, stock, treasury... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  19. 12 CFR 161.44 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security. 161.44 Section 161.44 Banks and... SAVINGS ASSOCIATIONS § 161.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  20. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 15 2014-01-01 2014-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  1. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  2. 12 CFR 561.44 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  3. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  4. 12 CFR 561.44 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  5. 12 CFR 561.44 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  6. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  7. 12 CFR 390.309 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security. 390.309 Section 390.309 Banks and... Associations § 390.309 Security. The term security means any non-withdrawable account, note, stock, treasury... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  8. 12 CFR 390.309 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Security. 390.309 Section 390.309 Banks and... Associations § 390.309 Security. The term security means any non-withdrawable account, note, stock, treasury... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  9. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  10. 12 CFR 561.44 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  11. 12 CFR 561.44 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  12. 12 CFR 161.44 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security. 161.44 Section 161.44 Banks and... SAVINGS ASSOCIATIONS § 161.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  13. 12 CFR 161.44 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Security. 161.44 Section 161.44 Banks and... SAVINGS ASSOCIATIONS § 161.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...

  14. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  15. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  16. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  17. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    PubMed

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. Band-filling effect on magnetic anisotropy using a Green's function method

    DOE PAGES

    Ke, Liqin; van Schilfgaarde, Mark

    2015-07-28

    We use an analytical model to describe the magnetocrystalline anisotropy energy (MAE) in solids as a function of band filling. The MAE is evaluated in second-order perturbation theory, which makes it possible to decompose the MAE into a sum of transitions between occupied and unoccupied pairs. The model enables us to characterize the MAE as a sum of contributions from different, often competing terms. The nitridometalates Li 2[(Li 1–xT x)N], with T= Mn, Fe, Co, Ni, provide a system where the model is very effective because atomiclike orbital characters are preserved and the decomposition is fairly clean. The model resultsmore » are also compared against MAE evaluated directly from first-principles calculations for this system. Good qualitative agreement is found.« less

  19. Military veterans and Social Security.

    PubMed

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  20. IPv6 Security

    NASA Astrophysics Data System (ADS)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  1. Cryptography for Big Data Security

    DTIC Science & Technology

    2015-07-13

    Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S) Distribution A: Public Release Ariel Hamlin1 Nabil...Email: arkady@ll.mit.edu ii Contents 1 Cryptography for Big Data Security 1 1.1 Introduction...48 Chapter 1 Cryptography for Big Data Security 1.1 Introduction With the amount

  2. MYSEA: The Monterey Security Architecture

    DTIC Science & Technology

    2009-01-01

    Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized

  3. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 12 2014-01-01 2013-01-01 true Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  4. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 12 2013-01-01 2013-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  5. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  6. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 12 2011-01-01 2011-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  7. 22 CFR 8.7 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  8. 22 CFR 8.7 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  9. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  10. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  11. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 12 2012-01-01 2012-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  12. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  13. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  14. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  15. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  16. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  17. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  18. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  19. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  20. Process Security in Chemical Engineering Education

    ERIC Educational Resources Information Center

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  1. Willingness of nurses to report medication administration errors in southern Taiwan: a cross-sectional survey.

    PubMed

    Lin, Yu-Hua; Ma, Su-mei

    2009-01-01

    Underreporting of medication administering errors (MAEs) is a threat to the quality of nursing care. The reasons for MAEs are complex and vary by health professional and institution. The purpose of this study was to explore the prevalence of MAEs and the willingness of nurses to report them. A cross-sectional study was conducted involving a survey of 14 medical surgical hospitals in southern Taiwan. Nurses voluntarily participated in this study. A structured questionnaire was completed by 605 participants. Data were collected from February 1, 2005 to March 15, 2005 using the following instruments: MAEs Unwillingness to Report Scale, Medication Errors Etiology Questionnaire, and Personal Features Questionnaire. One additional question was used to identify the willingness of nurses to report medication errors: "When medication errors occur, should they be reported to the department?" This question helped to identify the willingness or lack thereof, to report incident errors. The results indicated that 66.9% of the nurses reported experiencing MAEs and 87.7% of the nurses had a willingness to report the MAEs if there were no consequences for reporting. The nurses' willingness to report MAEs differed by job position, nursing grade, type of hospital, and hospital funding. The final logistic regression model demonstrated hospital funding to be the only statistically significant factor. The odds of a willingness to report MAEs increased 2.66-fold in private hospitals (p = 0.032, CI = 1.09 to 6.49), and 3.28 in nonprofit hospitals (p = 0.00, CI = 1.73 to 6.21) when compared to public hospitals. This study demonstrates that reporting of MAEs should be anonymous and without negative consequences in order to monitor and guide improvements in hospital medication systems.

  2. 26 CFR 1.1081-3 - Exchanges of stock or securities solely for stock or securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Exchanges of stock or securities solely for stock or securities. 1.1081-3 Section 1.1081-3 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF... § 1.1081-3 Exchanges of stock or securities solely for stock or securities. The exchange, without the...

  3. Fabrication of Flexible Microneedle Array Electrodes for Wearable Bio-Signal Recording

    PubMed Central

    Ren, Lei; Xu, Shujia; Gao, Jie; Lin, Zi; Chen, Zhipeng; Liu, Bin; Liang, Liang; Jiang, Lelun

    2018-01-01

    Laser-direct writing (LDW) and magneto-rheological drawing lithography (MRDL) have been proposed for the fabrication of a flexible microneedle array electrode (MAE) for wearable bio-signal monitoring. Conductive patterns were directly written onto the flexible polyethylene terephthalate (PET) substrate by LDW. The microneedle array was rapidly drawn and formed from the droplets of curable magnetorheological fluid with the assistance of an external magnetic field by MRDL. A flexible MAE can maintain a stable contact interface with curved human skin due to the flexibility of the PET substrate. Compared with Ag/AgCl electrodes and flexible dry electrodes (FDE), the electrode–skin interface impedance of flexible MAE was the minimum even after a 50-cycle bending test. Flexible MAE can record electromyography (EMG), electroencephalography (EEG) and static electrocardiography (ECG) signals with good fidelity. The main features of the dynamic ECG signal recorded by flexible MAE are the most distinguishable with the least moving artifacts. Flexible MAE is an attractive candidate electrode for wearable bio-signal monitoring. PMID:29652835

  4. Influence of the extraction process on the rheological and structural properties of agars.

    PubMed

    Sousa, Ana M M; Borges, João; Silva, A Fernando; Gonçalves, Maria P

    2013-07-01

    Agars obtained by traditional hot-water (TWE) and microwave-assisted (MAE) extractions were compared in terms of their rheological and physicochemical properties and molecular self-association in solutions of low (0.05%, w/w) and high (1.5%, w/w) polymer concentrations. At low concentration, thin gelled layers were imaged by AFM. Slow or rapid cooling of the solutions influenced structure formation. In each case, TWE and MAE agar structures were different and apparently larger for MAE. At high concentration, progressive structural reinforcement was seen; while TWE agar showed a more open and irregular 3D network, MAE agar gel imaged by cryoSEM was denser and fairly uniform. The rheological (higher thermal stability and consistency) and mechanical (higher gel strength) behaviors of MAE agar seemed consistent with a positive effect of molecular mass and 3,6-anhydro-α-l-galactose content. MAE produced non-degraded agar comparable with commercial ones and if properly monitored, could be a promising alternative to TWE. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. 49 CFR 1554.103 - Security Directives.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...

  6. Water security evaluation in Yellow River basin

    NASA Astrophysics Data System (ADS)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  7. Competitive Cyber-Insurance and Internet Security

    NASA Astrophysics Data System (ADS)

    Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean

    This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.

  8. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  9. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    DOT National Transportation Integrated Search

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  10. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...

  11. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...

  12. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...

  13. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NASA Astrophysics Data System (ADS)

    Wolthuis, Reinder; Broenink, Gerben; Fransen, Frank; Schultz, Sven; de Vries, Arnout

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.

  14. The pharmaceuticalisation of security: Molecular biomedicine, antiviral stockpiles, and global health security.

    PubMed

    Elbe, Stefan

    2014-12-01

    Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.

  15. 49 CFR 193.2911 - Security lighting.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...

  16. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  17. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  18. 49 CFR 193.2911 - Security lighting.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...

  19. 49 CFR 193.2911 - Security lighting.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...

  20. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...