Science Hack Day: an opportunity for public engagement, art/science mash-ups, and inspiration
NASA Astrophysics Data System (ADS)
Bellis, Matthew
2013-04-01
The idea of a Science Hack Day (http://sciencehackday.com/) is to put non-scientists (designers, web developers, artists, interested enthusiasts) in a room with scientists and some good ideas, and see what science-themed project they can create in a weekend (about 24 hours of real hacking). The motto of the organizers is ``Get Excited and Make Things with Science!'' I have participated in several of these events including the first one held in the United State in Palo Alto in 2010 and as a remote advisor to participants in Nairobi, Kenya. To these events I have brought particle physics data from both the BaBar and the CMS (Compact Muon Solenoid) experiments, data from the CoGeNT dark matter direct-detection experiment, and my expertise and enthusiasm. The experience has been transformative for me as both a scientist and a science advocate. This talk will recount my experiences with Science Hack Day events in general and detail some projects that have come out of these days, including the Particle Physics Wind Chime (http://www.mattbellis.com/windchime/) and the Standard Model of Cocktail Physics (http://www.physicsdavid.net/2012/11/standard-model-of-cocktail-physics/). Opportunities for other scientists to take part in similar events will be discussed.
Development of a turn-key cloud chamber in collaboration with non-academic science enthusiasts
NASA Astrophysics Data System (ADS)
Muenkel, Jessica; Harrington, Meghan; Bellis, Matthew; Waldman, Ariel; Bergey, Nathan; Cooper, Ivan; Bombosch, Juliane
2014-03-01
Science Hack Day is an event that brings together scientists and science enthusiasts for 24 hours to ``hack'' a science project. These events serve two purposes. The first and most obvious is to provide a structured environment for science outreach. Academics and researchers have the opportunity for ``boots-on-the-ground'' interactions with the general public. The second purpose, though more challenging, is to enable science enthusiasts to donate their skills so that they are able to push back to educators and researchers in a fashion that that benefits their work. We discuss our experiences at the 2013 San Francisco Science Hack Day at the California Academy of Sciences. We worked with attendees of the conference to create a cloud chamber that worked with Peltier thermocoolers, rather than dry ice. In this fashion, we educated attendees about radiation and particle physics, while also benefitting from the experience and knowledge of the attendees in constructing the device. This ``turn-key'' cloud chamber is now in use at Siena College as an outreach and educational device. The properties of this device and the story of its construction will be presented. Representing CMS.
The extent and consequences of p-hacking in science.
Head, Megan L; Holman, Luke; Lanfear, Rob; Kahn, Andrew T; Jennions, Michael D
2015-03-01
A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.
The Extent and Consequences of P-Hacking in Science
Head, Megan L.; Holman, Luke; Lanfear, Rob; Kahn, Andrew T.; Jennions, Michael D.
2015-01-01
A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as “p-hacking,” occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses. PMID:25768323
2013-12-30
MIT Lincoln Laboratory in cooperation with Edgewood Chemical Biological Center (ECBC). These events explored the utility of a short-term “ hack day...conceived as an experiment applying a short “ hack day” format to bioinformatics problems of interest to DTRA. Participants of diverse technical...organizers took note of different types of previous hack day formats that had been very open-ended (i.e., gave participants a collection of hardware or
The first SPIE software Hack Day
NASA Astrophysics Data System (ADS)
Kendrew, S.; Deen, C.; Radziwill, N.; Crawford, S.; Gilbert, J.; Gully-Santiago, M.; Kubánek, P.
2014-07-01
We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montréal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.
A Hands-On Approach for Teaching Denial of Service Attacks: A Case Study
ERIC Educational Resources Information Center
Trabelsi, Zouheir; Ibrahim, Walid
2013-01-01
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
An Epistemological Approach to Modeling: Cases Studies and Implications for Science Teaching
ERIC Educational Resources Information Center
Sensevy, Gerard; Tiberghien, Andree; Santini, Jerome; Laube, Sylvain; Griggs, Peter
2008-01-01
Models and modeling are a major issue in science studies and in science education. In addressing such an issue, we first propose an epistemological discussion based on the works of Cartwright (1983, 1999), Fleck (1935/1979), and Hacking (1983). This leads us to emphasize the transitions between the abstract and the concrete in the modeling…
ERIC Educational Resources Information Center
Tselfes, Vasilis; Paroussi, Antigoni
2009-01-01
There is, in Greece, an ongoing attempt to breach the boundaries established between the different teaching-learning subjects of compulsory education. In this context, we are interested in exploring to what degree the teaching and learning of ideas from the sciences' "internal life" (Hacking, in: Pickering (ed) "Science as practice…
Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking.
Hartgerink, Chris H J
2017-01-01
Head et al. (2015) provided a large collection of p -values that, from their perspective, indicates widespread statistical significance seeking (i.e., p -hacking). This paper inspects this result for robustness. Theoretically, the p -value distribution should be a smooth, decreasing function, but the distribution of reported p -values shows systematically more reported p -values for .01, .02, .03, .04, and .05 than p -values reported to three decimal places, due to apparent tendencies to round p -values to two decimal places. Head et al. (2015) correctly argue that an aggregate p -value distribution could show a bump below .05 when left-skew p -hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p -values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher's method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p -hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p -values. Moreover, inspecting the bins that include two-decimal reported p -values potentially increases sensitivity if strategic rounding down of p -values as a form of p -hacking is widespread. Given the far-reaching implications of supposed widespread p -hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p -hacking is found in this reanalysis, this does not mean that there is no p -hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p -hacking is ambiguous at best.
Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking
2017-01-01
Head et al. (2015) provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking). This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015) correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher’s method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking is found in this reanalysis, this does not mean that there is no p-hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p-hacking is ambiguous at best. PMID:28265523
Religion and Rationality: Quaker Women and Science Education 1790-1850
ERIC Educational Resources Information Center
Leach, Camilla
2006-01-01
This article examines the work of two Quaker women, Priscilla Wakefield (1750-1832) and Maria Hack (1777-1844) as popularizers of science and in the context of the development of scientific literacy. Both women were writers who specialized in scientific educational texts for children and young adults. As Quakers their community and culture played…
Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Sarode, Gargi
2017-08-01
Due to increasing rate of research articles getting published in recent times, medical science is evolving very fast. Open access policies of the journals make information easily available to the stakeholders for building future research proposal. Blindly having faith in whatever is published in the literature is detrimental for science; however, it is hard to find out the correctness of the data analysis.
Python in Astronomy 2016 Unproceedings
NASA Astrophysics Data System (ADS)
Robitaille, Thomas; Cruz, Kelle; Greenfield, Perry; Jeschke, Eric; Juric, Mario; Mumford, Stuart; Prescod-Weinstein, Chanda; Sosey, Megan; Tollerud, Erik; VanderPlas, Jake; Ford, Jes; Foreman-Mackey, Dan; Jenness, Tim; Aldcroft, Tom; Alexandersen, Mike; Bannister, Michele; Barbary, Kyle; Barentsen, Geert; Bennett, Samuel; Boquien, Médéric; Campos Rozo, Jose Ivan; Christe, Steven; Corrales, Lia; Craig, Matthew; Deil, Christoph; Dencheva, Nadia; Donath, Axel; Douglas, Stephanie; Ferreira, Leonardo; Ginsburg, Adam; Goldbaum, Nathan; Gordon, Karl; Hearin, Andrew; Hummels, Cameron; Huppenkothen, Daniela; Jennings, Elise; King, Johannes; Lawler, Samantha; Leonard, Andrew; Lim, Pey Lian; McBride, Lisa; Morris, Brett; Nunez, Carolina; Owen, Russell; Parejko, John; Patel, Ekta; Price-Whelan, Adrian; Ruggiero, Rafael; Sipocz, Brigitta; Stevens, Abigail; Turner, James; Tuttle, Sarah; Yanchulova Merica-Jones, Petia; Yoachim, Peter
2016-03-01
This document provides proceedings for unconference sessions as well as hacks/sprints which took place at the Python in Astronomy 2016 workshop, which was held at the University of Washington eScience Institute in Seattle from March 21st to 25th 2016.
Hacking medical devices a review - biomed 2013.
Frenger, Paul
2013-01-01
Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as hacking. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (buggy) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.
76 FR 29665 - Migratory Bird Permits; Changes in the Regulations Governing Raptor Propagation
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-23
... hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under your propagation permit. Check with... you hack must have two attached functioning radio transmitters during hacking. (3) You may not hack a...
DePasse, Jacqueline W; Carroll, Ryan; Ippolito, Andrea; Yost, Allison; Santorino, Data; Chu, Zen; Olson, Kristian R
2014-07-01
Medical technology offers enormous potential for scalable medicine--to improve the quality and access in health care while simultaneously reducing cost. However, current medical device innovation within companies often only offers incremental advances on existing products, or originates from engineers with limited knowledge of the clinical complexities. We describe how the Hacking Medicine Initiative, based at Massachusetts Institute of Technology has developed an innovative "healthcare hackathon" approach, bringing diverse teams together to rapidly validate clinical needs and develop solutions. Hackathons are based on three core principles; emphasis on a problem-based approach, cross-pollination of disciplines, and "pivoting" on or rapidly iterating on ideas. Hackathons also offer enormous potential for innovation in global health by focusing on local needs and resources as well as addressing feasibility and cultural contextualization. Although relatively new, the success of this approach is clear, as evidenced by the development of successful startup companies, pioneering product design, and the incorporation of creative people from outside traditional life science backgrounds who are working with clinicians and other scientists to create transformative innovation in health care.
2017-06-09
those with talent in the computer sciences. Upon graduation from high school, computer -proficient teenagers are selected for an elite cyber force and...Arguably, the Massachusetts Institute of Technology (M.I.T.) is the premiere institution for computer science. M.I.T. graduates make, on average, $83,455...study specific to computer science and provide certification in programs like ethical hacking, cyber security, and programing. As with the other
50 CFR 21.30 - Raptor propagation permits.
Code of Federal Regulations, 2012 CFR
2012-10-01
... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...
50 CFR 21.30 - Raptor propagation permits.
Code of Federal Regulations, 2014 CFR
2014-10-01
... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...
50 CFR 21.30 - Raptor propagation permits.
Code of Federal Regulations, 2013 CFR
2013-10-01
... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...
50 CFR 21.30 - Raptor propagation permits.
Code of Federal Regulations, 2011 CFR
2011-10-01
... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...
Care and the Construction of Hacker Identities, Communities, and Society
ERIC Educational Resources Information Center
Toombs, Austin Lewis
2016-01-01
Recent scholarship in Human-Computer Interaction, science and technology studies, and design research has focused on hacker communities as sites of innovation and entrepreneurship, novel forms of education, and the democratization of technological production. However, hacking practices are more than new technical practices; they are also…
Delgado, Ana; Callén, Blanca
2017-02-01
In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach to politics, we analyse hacks as 'inquiry' to see how they serve to articulate public and political action. We argue that do-it-yourself and makers' hacks are technical and political demonstrations. What do-it-yourself and makers' hacks ultimately demonstrate is that things can be done otherwise and that 'you' can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.
A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?
Bodford, Jessica E; Kwan, Virginia S Y
2018-02-01
The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.
Hackathons as A Capacity Building Tool for Environmental Applications
NASA Astrophysics Data System (ADS)
Bye, B. L.; Mildorf, T.; Charvat, K.; Berre, A. J.
2017-12-01
Today's society requires easy, reliable and quick access to environmental information published by various organizations and initiatives. The environment questions require many activities that produce various sorts of data; by authorities through operation of instruments such as satellites, and through informal local and community activities producing videos, photos or oral stories. The collected information can contribute to up-to-date data. Volunteered geographic information (VGI) is the harnessing of tools to create, assemble, and disseminate geographic data provided voluntarily by individuals. Under the INSPIRE (Infrastructure for spatial information in Europe) umbrella, a number of EU projects co-organize hackathons - the INSPIRE Hack. The INSPIRE Hack focuses on methods where citizens are able to contribute to different environmental and societal issues through smart phones and other sensors. The INSPIRE Hack supports creativity, innovation, technical capabilities and knowledge sharing by combining open data, VGI, and data from citizens observatories or other citizen science activities. This presentation offer a capacity building perspective on the INSPIRE hackathons, the co-design aspects and the argility with respect to the accelerating technological and social innovations, and effective up-take in societal use. Starting in Europe, the concept can be broadened to encompass all continents.
P-Hacking in Orthopaedic Literature: A Twist to the Tail.
Bin Abd Razak, Hamid Rahmatullah; Ang, Jin-Guang Ernest; Attal, Hersh; Howe, Tet-Sen; Allen, John Carson
2016-10-19
"P-hacking" occurs when researchers preferentially select data or statistical analyses until nonsignificant results become significant. We wanted to evaluate if the phenomenon of p-hacking was evident in orthopaedic literature. We text-mined through all articles published in three top orthopaedic journals in 2015. For anonymity, we cipher-coded the three journals. We included all studies that reported a single p value to answer their main hypothesis. These p values were then charted and frequency graphs were generated to illustrate any evidence of p-hacking. Binomial tests were employed to look for evidence of evidential value and significance of p-hacking. Frequency plots for all three journals revealed evidence of p-hacking. Binomial tests for all three journals were significant for evidence of evidential value (p < 0.0001 for all). However, the binomial test for p-hacking was significant only for one journal (p = 0.0092). P-hacking is an evolving phenomenon that threatens to jeopardize the evidence-based practice of medicine. Although our results show that there is good evidential value for orthopaedic literature published in our top journals, there is some evidence of p-hacking of which authors and readers should be wary. Copyright © 2016 by The Journal of Bone and Joint Surgery, Incorporated.
78 FR 29615 - Establishment of Area Navigation (RNAV) Routes; Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-21
...). Q-72 extends between the HACKS, WV, intersection and the RAMAY, VA, WP. It provides an alternate route for jet route J-149 via a direct routing to the HACKS intersection, thus reducing miles flown for...]12'20'' W.) Q72 HACKS, WV to RAMAY, VA [New] HACKS, WV FIX (Lat. 39[deg]07'46'' N., long. 081[deg]05...
Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value.
Bishop, Dorothy V M; Thompson, Paul A
2016-01-01
Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the "p-hacking bump" just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed.
Outcomes From AAS Hack Day at the 227th AAS Meeting
NASA Astrophysics Data System (ADS)
Kohler, Susanna
2016-01-01
Editors Note:This is a final post from the 227th AAS Meeting in Kissimmee, FL. This special summary of AAS Hack Day, a meeting of AAS members to collaboratively work on various small projects, was written by Meredith Rawls (@Merrdiff) and was originally posted on astrobites.com.As the 227thAmerican Astronomical Society meeting drew to a close (see highlights from Day 1, Day 2, Day 3, and Day 4), a group of at least 50 attendees spent Day 4working on small projects fondly called hacks. Thanks to sponsorship from LSST and Northrup Grumman, the industrious hackers werewell-caffeinated and fed so we could devote time and energy toworking in groups on one-day projects.TheHack Day beganat 10am with pitches. Anybody with a project idea was welcome to briefly speak and try to convince others to work with them. Only someideas panned out, but the enthusiasm was palpable. Its not every day you get a full room of astronomers and affiliates eager to spend hours working on fun and useful projects to benefit the community.#hackAAS is getting underway! #aas227 pic.twitter.com/yX7jlOnSCK James R A Davenport (@jradavenport) January 8, 2016Here is a rundown of what we accomplished. Pretty impressive for a single day! Many thanks to fellow astrobiter Erika Nesvold (now at Carnegie DTM; @erikanesvold) whose hack was live-documenting all the other hacks. Her tweets as @astrobites appeared with the #hackaas hashtag, and her notes made this recap post infinitely easier to write.Interested in joining the fun? Sign up for Hack Day at the 2017 JanuaryAAS meeting (its free with meeting registration), and consider applying for the .Astronomy conference this summer.Towards Optimal Session Scheduling:Adrian Price-Whelan (Columbia), David Hogg (NYU), and Scott Idem (AAS) began writing a program to take all submitted abstracts to a conference like AAS and sort them using keywords to avoid scheduling similar talks in parallel sessions. Its impossible to make everyone happy, but minimizing conflicts will be a huge first step.Gender in Astronomy Conferences: Jim Davenport (WWU), Ben Nelson (Northwestern), Mehmet Alpsalan (NASA Ames), and Erin Maier (University of Iowa) analyzed data collected during the conference on the gender breakdown of who asks questions after oral presentations. Now in its third year, one new finding from the study is that women dont ask questions as much as men do, but they tend to ask questions more when the speaker is a woman or the first question-asker is a woman.More from #hackaas at #aas227: Gender of speaker vs. 1st to ask a question for all 3 years of Gender in Astro survey pic.twitter.com/l74D3rSUOD Erin Maier (@fallelujah) January 9, 2016The Early Reference Project: Many pre-1950 publications lack up-to-date citation information because the text is digitally archived as an image. Brendan Wells (UC Santa Cruz) worked with representatives from ADS and Zooniverse to set up a crowd-sourced platform to identify references in these old papers.Glassdome: Ellie Schwab (CUNY) and colleagues Paige Godfrey, Munazza Alam, and Cam Buzzard began work on a website modeled after glassdoor for safely sharing experiences throughout their astronomy careers. Glassdome will feature career path stories, department reviews, and salaries, all optionally anonymous. The site is hosted by ScienceBetter and is under development.Observing Run Sharing: Sometimes near the end of a long night at the telescope you have observed everything you need but still have time left. Short of choosing randomly or hoping a colleague is online in the middle of the night, there is currently no good solution. To address this, Brooke Simmons (UC San Diego) designed a web app that would allow astronomers to submit their favorite night sky targets. The project is still a work in progress.ArXiv Podcast: Ruth Angus (Oxford) started a podcast featuring astronomers summarizing their new papers submitted to astro-ph in one minute. Its like audio astrobites! If youve recently published a paper, Ruth is seeking contributions of one-minute audio recordings.RadioFree LST: Radio observers dont care when the Sun is up, but they do care if their astronomical objects of interest are above the horizon. Demitri Muna (Ohio State) and Amanda Kepley (NRAO) created a calculator which uses local sidereal time (LST) to determine when sources rise and set based on the position of the observatory and the coordinates of the target..@demitrimuna @aakepley are creating a LST calculator for radio telescopes. #radiofreelst #hackaas pic.twitter.com/TEAdYe3hvi astrobites (@astrobites) January 8, 2016Hidden Killer Detective: The Kepler spacecraft has enabled many discoveries related to exoplanets and stars. But now that K2 is observing in the ecliptic plane, it should also find asteroids. Geert Barentsen (NASA Ames), Tom Barclay (NASA Ames), Meg Schwamb (ASIAA), and Brooke Simmons (UC San Diego) created a new crowd-sourced Zooniverse project so anyone can help search for moving objects that may be asteroids.Expanding Astronomy on Tap: This casual science pub night, started in 2013, is now a regular event in seven cities worldwide. Jeff Silverman (UT Austin) created a Launch Manifesto and guide for bringing Astronomy on Tap to your own city. If youre interested, fill out their survey to get more information.The Arceli Project: Arceli is publishing online astronomy content. A team led by ScienceBetter and Kelle Cruz (CUNY) including Daina Bouquin (Harvard CfA), Aram Zucker-Scharff, Lars Holm Nielsen (CERN), Jonathan Sick (LSST), Chris Erdmann (Harvard CfA), and Meredith Rawls (NMSU) worked on getting each component of Arceli to talk to the others. Eventually, Arceli will accept submissions of informal scholarly contentlike blog postswhich will become archived and citable just like traditional papers.Special Dark: Leonidas Moustakas (JPL/Caltech) and Tonima Ananna (Yale) hosted a special session at this years AAS meeting all about dark matter. During hack day, they began a repository for information that may help constrain the nature of dark matter. Assuming dark matter is aparticle, many different kinds of astronomical observations can help nail down its properties, but they are scattered all over the literature. The goal is to compile these observations in one place so the community can piece together a more complete picture of dark matter. A preliminary table of overlap from different astronomical surveys is available online..@lamoustakas @tonimatasnim are compiling dark matter data into one useful #specialdark repository. #hackaas pic.twitter.com/LnkDotaHej astrobites (@astrobites) January 8, 2016BibTeX Updater: Mike Lund (Vanderbilt) wrote a python program that takes a citation database created by Mendeley and updates its BibTeX reference information. This tool will help anyonewho uses Mendeley as a citation manager and writes papers in LaTeX with BibTeX. By the end of the day, someone from Mendeley had already gotten in touch with Mike to talk about implementing his fixes!Improved Plotly Colormaps: The open source Java graphing code plotly.js lacks colorblind-friendly color tables, so Timothy Pickering (STScI) added some. The color schemes include the new default viridis from matplotlib and are perceptually uniform, meaning they dont have any significant perceptual jumps in color. They are better for displaying data whether youre colorblind or not. Look for the new colors to be available after he submits a pull request to the main plotly repository.Interfacing with Amazons Web Services: Meagan Lang (UIUC), Kyle Conroy (Vanderbilt), and Kaylan Burleigh (UC Berkeley/LBNL) worked on a package to streamline running computing jobs with Amazons distributed computing. Right now, you can run parallelized computer programs with Amazon Web Services and pay per CPU-hour, but its a hassle to set everything up and ensure youdont pay for more time than you need. Their new rc-submit solves this.#MarsFilter: Becky Smethurst (Oxford), Meredith Durbin (STScI), and Jana Grcevich (AMNH) developed a filter for digital photos to make them look like they were taken on Mars by Curiosity.Coming soon from @becky1505 co: #marsfilter, for making your images look like they were taken on #Mars! #hackaas pic.twitter.com/2LVA1DRmwh Lucianne Walkowicz (@shaka_lulu) January 8, 2016Different Kind of Kepler Light Curve: Every so often, the Kepler spacecraft sends us an image of its entire field of view rather than just small regions of pixels near specific stars. Jennifer Cash (South Carolina U), Lucianne Walkowicz (Adler), and Joe Filipazzo (CUNY) worked with these Full-Frame Images to identify all the sources. The next step is to identify all the stars in the image and perform aperture photometry.There are likely new exoplanets, binary stars, and other interesting variable sources hidden in this dataset.Exoplanets in the WorldWide Telescope (WWT): Did someone say exoplanets?WWT, now run by the AAS, is an open source data visualization tool often used by planetariums to virtually fly around the Universe.David Weigal (Samford U) worked to improve WWT by adding exoplanetary systems. This was tricky, but he was able to demo one example of a planet orbiting a Sirius-like star.Career Paths: Peter Yoachim (UW) and Eric Bellm (Caltech) took different approaches to study career paths in astronomy. Peter tracked how publishing records affect hiring outcomes, while Eric mapped the careers of astronomers with prize fellowships. Explore their findingshere and here.Preliminary results from Peter Yoachims project show a significantly lower fraction of recent astronomy PhD recipients continue to publish regularly. Figure courtesy of Peter.Testing Stationarity of Time Series Data: Matthew Graham (Caltech) and Phil Marshall (Slac) wrote some codeto determine whether a set of observations taken over a period of time is stationary. This will be useful for surveys like LSST which observe the same source multiple times over many visits. It is important to have a way to quantify if something has changed since the last time we looked at it. Their idea was inspired bya paper about wavelets.FuzzyBlobs: David Nidever (LSST) and Phil Marshall (Slac) worked on a technique to automatically find nearby satellite galaxies to the Milky Way hidden in images from astronomical surveys. The name stems from the fact that satellite galaxies have a low surface brightness and generally appear as faint, fuzzy blobs in images.FabricPoster Fashion (#makeAAS at #hackAAS): What do you get when you bring a sewing machine to a hack day? Dozens of creative garments and accessories fashioned from research posters printed on fabric! This idea was originated on twitterby Emily Rice (CUNY), Josh Peek (STScI), and Ashley Pagnotta (AMNH), and dozens of astronomers including Rachael Livermore (UT Austin) and Haley Fica (Columbia) participated.So pleased with my #hackaas projecttote bag showing off @astr1101s new method of finding R CrB stars! #aas227 pic.twitter.com/1e160XfSQp Ashley Pagnotta (@ashpags) January 9, 2016My knit cowl from strips cut from fabric posters at #aas227 #makeaas #hackaas pic.twitter.com/tguDhDOoMp Katie Frey (@katieefrey) January 9, 2016Good use of #hackaas at #aas227: my research poster is now a stylish skirt! pic.twitter.com/4BPiIfHWnX Rachael Livermore (@rhaegal) January 8, 2016Heres all the #hackaas ex-poster finery at #hackaas from @ashpags @J_M_Silverman and more! pic.twitter.com/ofAYBDjaxH Lucianne Walkowicz (@shaka_lulu) January 8, 2016
Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times
Delgado, Ana; Callén, Blanca
2016-01-01
In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. What do-it-yourself and makers’ hacks ultimately demonstrate is that things can be done otherwise and that ‘you’ can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration. PMID:27233296
P-Hacking: A Wake-Up Call for the Scientific Community.
Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Salameh, Ziad
2017-10-25
P-hacking or data dredging involves manipulation of the research data in order to obtain a statistically significant result. The reasons behind P-hacking and the consequences of the same are discussed in the present manuscript.
Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value
Thompson, Paul A.
2016-01-01
Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the “p-hacking bump” just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed. PMID:26925335
Intelligence Sharing, Fusion Centers, and Homeland Security
2008-06-01
particular area. For example, “J3” focuses on current operations, planning “ J5 ” focuses on future planning and “J2” focuses on intelligence. USNORTHCOM...rights of the suspected attacker, taking days or months to complete the investigation. For example, in February 1998, three teenagers hacked into 11
Students "Hacking" School Computer Systems
ERIC Educational Resources Information Center
Stover, Del
2005-01-01
This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…
76 FR 50123 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-12
... temporary deviation from the regulation governing the operation of the Hack Freight Bridge, mile 3.1, across...-9826. SUPPLEMENTARY INFORMATION: The Hack Freight Bridge, across the Hackensack River at mile 3.1 has a... to provide openings. Under this temporary deviation the Hack Freight Bridge, mile 3.1, across the...
75 FR 68704 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
... temporary deviation from the regulation governing the operation of the Upper Hack Bridge at mile 6.9, across.... SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a vertical.... Under this temporary deviation the Upper Hack Bridge, mile 6.9, across the Hackensack River may remain...
76 FR 4818 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-27
... temporary deviation from the regulation governing the operation of the Upper Hack Bridge across the...-9826. SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a... temporary deviation the Upper Hack Bridge, mile 6.9, across the Hackensack River may remain in the closed...
Transformative Rendering of Internet Resources
2012-10-01
4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any
[Do-it-yourself biology and medicine: history, practices, issues].
Meyer, Morgan
2018-05-01
Do-it-yourself (DIY) biology and medicine are based on various practices and logics: amateur and DIY practices, the ethics of hacking and open source, the drive to domesticate molecular biology and genetics, the ideal of participation and citizen science. The article shows that this democratization is a process that is at once spatial (construction of new spaces), technical (creative workarounds equipment), social (establishment of accessible networks/laboratories) and political. It is therefore through their practices, gestures and questions - tinkering, experimenting, working around, amaterializing, ethicizing, comparing, valuating, etc. - that we need to grasp DIY sciences. © 2018 médecine/sciences – Inserm.
From "Hack to Hallé"--Making a Robot Orchestra for the Hallé Orchestra
ERIC Educational Resources Information Center
Moseley, Ainsley; White, Stephanie; Knowles, Mike
2017-01-01
As part of the celebration of Manchester being the European City of Science 2016, schools across the City were invited to take part in a Citizen-Engineering project, which set out a quest to make a recycled robot orchestra. It is a unique project, which is an experiment itself--to bring people together to create, collaborate and care for the…
33 CFR 117.723 - Hackensack River.
Code of Federal Regulations, 2011 CFR
2011-07-01
... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...
33 CFR 117.723 - Hackensack River.
Code of Federal Regulations, 2014 CFR
2014-07-01
... stationed at Upper Hack and the other drawtender at the HX drawbridge. Adequate security measures shall be... Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New Jersey. In the event the HX...
33 CFR 117.723 - Hackensack River.
Code of Federal Regulations, 2013 CFR
2013-07-01
... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...
76 FR 13288 - Drawbridge Operation Regulations; Hackensack River, Secaucus, NJ
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-11
... deviation from the regulation governing the operation of the Upper Hack Bridge at mile 6.9, across the...: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a vertical clearance in the closed... rehabilitation at the bridge. Under this temporary deviation the Upper Hack Bridge, mile 6.9, across the...
33 CFR 117.723 - Hackensack River.
Code of Federal Regulations, 2010 CFR
2010-07-01
... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...
33 CFR 117.723 - Hackensack River.
Code of Federal Regulations, 2012 CFR
2012-07-01
... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...
2009-05-04
inconvenience and denial of Internet service, CNAs pose a threat to national security, if the right computer is hacked , to every day operations, if baking...expert J3: Current Operations Rep Private Sector/Civilian: cyber/CNA SME J5 Future Operations Rep Private Sector/Civilian: cyber/CND SME Table 2
NASA Astrophysics Data System (ADS)
Cataldo, Franca
The world is at the dawn of a third industrial revolution, the digital revolution, that brings great changes the world over. Today, computing devices, the Internet, and the World Wide Web are vital technology tools that affect every aspect of everyday life and success. While computing technologies offer enormous benefits, there are equally enormous safety and security risks that have been growing exponentially since they became widely available to the public in 1994. Cybercriminals are increasingly implementing sophisticated and serious hack attacks and breaches upon our nation's government, financial institutions, organizations, communities, and private citizens. There is a great need for computer scientists to carry America's innovation and economic growth forward and for cybersecurity professionals to keep our nation safe from criminal hacking. In this digital age, computer science and cybersecurity are essential foundational ingredients of technological innovation, economic growth, and cybersecurity that span all industries. Yet, America's K-12 education institutions are not teaching the computer science and cybersecurity skills required to produce a technologically-savvy 21st century workforce. Education is the key to preparing students to enter the workforce and, therefore, American K-12 STEM education must be reformed to accommodate the teachings required in the digital age. Keywords: Cybersecurity Education, Cybersecurity Education Initiatives, Computer Science Education, Computer Science Education Initiatives, 21 st Century K-12 STEM Education Reform, 21st Century Digital Literacies, High-Tech Innovative Problem-Solving Skills, 21st Century Digital Workforce, Standardized Testing, Foreign Language and Culture Studies, Utica College, Professor Chris Riddell.
Free-space QKD system hacking by wavelength control using an external laser.
Lee, Min Soo; Woo, Min Ki; Jung, Jisung; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung
2017-05-15
We develop a way to hack free-space quantum key distribution (QKD) systems by changing the wavelength of the quantum signal laser using an external laser. Most free-space QKD systems use four distinct lasers for each polarization, thereby making the characteristics of each laser indistinguishable. We also discover a side-channel that can distinguish the lasers by using an external laser. Our hacking scheme identifies the lasers by automatically applying the external laser to each signal laser at different intensities and detecting the wavelength variation according to the amount of incident external laser power. We conduct a proof-of-principle experiment to verify the proposed hacking structure and confirm that the wavelength varies by several gigahertzes to several nanometers, depending on the intensity of the external laser. The risk of hacking is successfully proven through the experimental results. Methods for prevention are also suggested.
78 FR 76195 - Drawbridge Operation Regulations; Hackensack River, New Jersey
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-17
... Upper Hack and HX Bridges, miles 6.9 and 7.7, respectively, all across the Hackensack River, NJ to... Upper Hack Bridge, mile 6.9, has a vertical clearance of 8 feet at mean high water, and 13 feet at mean... so at all times. Under this temporary deviation the PATH, Portal, Upper Hack and HX bridges may...
78 FR 10562 - Proposed Establishment of Area Navigation (RNAV) Routes; Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-14
... (VORTAC) aid and the OTTTO, VA, waypoint (WP). Q-72 would extend between the HACKS, WV, intersection and... HACKS intersection, thus reducing miles flown for RNAV-equipped aircraft. Q-80 would extend between the...., long. 078[deg]22'27'' W.) OTTTO, VA WP (Lat. 38[deg]51'16'' N., long. 078[deg]12'20'' W.) Q72 HACKS, WV...
Hacking the quantum revolution: 1925-1975
NASA Astrophysics Data System (ADS)
Schweber, Silvan S.
2015-01-01
I argue that the quantum revolution should be seen as an Ian Hacking type of scientific revolution: a profound, longue durée, multidisciplinary process of transforming our understanding of physical nature, with deep-rooted social components from the start. The "revolution" exhibits a characteristic style of reasoning - the hierarchization of physical nature - and developed and uses a specific language - quantum field theory (QFT). It is by virtue of that language that the quantum theory has achieved some of its deepest insights into the description of the dynamics of the physical world. However, the meaning of what a quantum field theory is and what it describes has deeply altered, and one now speaks of "effective" quantum field theories. Interpreting all present day quantum field theories as but "effective" field theories sheds additional light on Phillip Anderson's assertion that "More is different". This important element is addressed in the last part of the paper.
1993-09-01
AND TIME POSTBURN Adriana C. Drost, MS, David G. Burleson, PhD, William G. Cioffi, Jr., MD, Bryan S. Jordan, RN, MS, Arthur D. Mason, Jr., MD, and...trauma. J 2, IL-6). Science 239-502,1i988 Surg Res 48:622, 1990 7. Garmnan RD, Jacobs KA , Clark SC, et al: B-cell-stimulatory factor 23. Hack CE, De Groot
Research in Computer Forensics
2002-06-01
systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to
Changing the Lines in the Coloring Book
2004-05-18
multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The
2007-03-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. HACKING SOCIAL NETWORKS : EXAMINING THE...VIABILITY OF USING COMPUTER NETWORK ATTACK AGAINST SOCIAL NETWORKS by Russell G. Schuhart II March 2007 Thesis Advisor: David Tucker Second Reader...Master’s Thesis 4. TITLE AND SUBTITLE: Hacking Social Networks : Examining the Viability of Using Computer Network Attack Against Social Networks 6. AUTHOR
A Framework for Programming and Budgeting for Cybersecurity
2016-01-01
environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol
Debates—Hypothesis testing in hydrology: Theory and practice
NASA Astrophysics Data System (ADS)
Pfister, Laurent; Kirchner, James W.
2017-03-01
The basic structure of the scientific method—at least in its idealized form—is widely championed as a recipe for scientific progress, but the day-to-day practice may be different. Here, we explore the spectrum of current practice in hypothesis formulation and testing in hydrology, based on a random sample of recent research papers. This analysis suggests that in hydrology, as in other fields, hypothesis formulation and testing rarely correspond to the idealized model of the scientific method. Practices such as "p-hacking" or "HARKing" (Hypothesizing After the Results are Known) are major obstacles to more rigorous hypothesis testing in hydrology, along with the well-known problem of confirmation bias—the tendency to value and trust confirmations more than refutations—among both researchers and reviewers. Nonetheless, as several examples illustrate, hypothesis tests have played an essential role in spurring major advances in hydrological theory. Hypothesis testing is not the only recipe for scientific progress, however. Exploratory research, driven by innovations in measurement and observation, has also underlain many key advances. Further improvements in observation and measurement will be vital to both exploratory research and hypothesis testing, and thus to advancing the science of hydrology.
2016-06-10
DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best
DOE Office of Scientific and Technical Information (OSTI.GOV)
Granger, S.
The hacker ethic can be a peculiar concept to those unfamiliar with hacking and what really is. In fact, the entire definition of hacking is somewhat obscure. Hacking originated as a challenge between programmers. Programmers at MIT are known for coining the term. Individuals would hack at code meaning that they would work at programming problems until they could maniuplate their computers into doing exactly what they wanted. The MIT hackers began with simple programs and moved on to fidding with UNIX machines, especially those on the Arpanet. Hackers started freely distributing their code to their friends and eventually tomore » their friends across the network. This gave rise to a notion that software should be free. Eventually this was taken to the extreme information and network access should also be free.« less
2001-03-01
distinguishing between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the...and is referred to as Signaling System # 7 ( SS7 ). Commercial Intelligent Network Architecture Switching Signal Point (SSP) Service - Originates...Wireless access point to fixed infrastructure Ut c Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network SP SW SS7 System Data Bases Network
2014-11-18
multiple platforms were forced to be reset and Forbes.com and its WordPress platform were taken offline several times over 2 days. Forbes has focused...does not enter h1s credentials on the subsequent login page Returning to his blog, WordPress prompts him to log in again. Almost immediately...again compromise the WordPress super-administrator account and deface six Forbes blog pages with the phrase "Hacked By The Syrian Electronic Army
The Need for Specific Penalties for Hacking in Criminal Law
Oh, Sangkyo; Lee, Kyungho
2014-01-01
In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment. PMID:25032236
The need for specific penalties for hacking in criminal law.
Oh, Sangkyo; Lee, Kyungho
2014-01-01
In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.
A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model.
Gubin, Tatyana A; Iyer, Hari P; Liew, Shirlene N; Sarma, Aartik; Revelos, Alex; Ribas, João; Movassaghi, Babak; Chu, Zen M; Khalid, Ayesha N; Majmudar, Maulik D; Lee, Christopher Xiang
2017-07-26
MIT Hacking Medicine is a student, academic, and community-led organization that uses systems-oriented "healthcare hacking" to address challenges around innovation in healthcare. The group has organized more than 80 events around the world that attract participants with diverse backgrounds. These participants are trained to address clinical needs from the perspective of multiple stakeholders and emphasize utility and implementation viability of proposed solutions. We describe the MIT Hacking Medicine model as a potential method to integrate collaboration and training in rapid innovation techniques into academic medical centers. Built upon a systems approach to healthcare innovation, the time-compressed but expertly guided nature of the events could enable more widely accessible preliminary training in systems-level innovation methodology, as well as creating a structured opportunity for interdisciplinary congregation and collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.
Delille, Emmanuel; Kirsch, Marc
2016-12-01
The concepts developed by Ian Hacking during his lectures at the Collège de France (2000-2006) have provided an important contribution to the debates within the field of philosophy of psychiatry. Professor at the Chair of Philosophy and History of Scientific Concepts after Michel Foucault, Hacking is the author of a reflection on the classification of mental disorders, which arises from the problem of the natural kinds. In order to explain the case studies developed in Hacking's Paris lectures, we first go back to the definition of a series of concepts, then we discuss the status of his scientific metaphors. Finally we analyze the relationship between the notions, respectively, of "transient mental illness" and "culture-bound syndrome". We emphasize that the latter derives from the Canadian transcultural psychiatry.
Examining publication bias—a simulation-based evaluation of statistical tests on publication bias
2017-01-01
Background Publication bias is a form of scientific misconduct. It threatens the validity of research results and the credibility of science. Although several tests on publication bias exist, no in-depth evaluations are available that examine which test performs best for different research settings. Methods Four tests on publication bias, Egger’s test (FAT), p-uniform, the test of excess significance (TES), as well as the caliper test, were evaluated in a Monte Carlo simulation. Two different types of publication bias and its degree (0%, 50%, 100%) were simulated. The type of publication bias was defined either as file-drawer, meaning the repeated analysis of new datasets, or p-hacking, meaning the inclusion of covariates in order to obtain a significant result. In addition, the underlying effect (β = 0, 0.5, 1, 1.5), effect heterogeneity, the number of observations in the simulated primary studies (N = 100, 500), and the number of observations for the publication bias tests (K = 100, 1,000) were varied. Results All tests evaluated were able to identify publication bias both in the file-drawer and p-hacking condition. The false positive rates were, with the exception of the 15%- and 20%-caliper test, unbiased. The FAT had the largest statistical power in the file-drawer conditions, whereas under p-hacking the TES was, except under effect heterogeneity, slightly better. The CTs were, however, inferior to the other tests under effect homogeneity and had a decent statistical power only in conditions with 1,000 primary studies. Discussion The FAT is recommended as a test for publication bias in standard meta-analyses with no or only small effect heterogeneity. If two-sided publication bias is suspected as well as under p-hacking the TES is the first alternative to the FAT. The 5%-caliper test is recommended under conditions of effect heterogeneity and a large number of primary studies, which may be found if publication bias is examined in a discipline-wide setting when primary studies cover different research problems. PMID:29204324
NASA Astrophysics Data System (ADS)
Hunt, Allen G.
2016-04-01
Percolation theory can be used to find water flow paths of least resistance. Application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law may allow interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.
Explanation of the values of Hack's drainage basin, river length scaling exponent
NASA Astrophysics Data System (ADS)
Hunt, A. G.
2015-08-01
Percolation theory can be used to find water flow paths of least resistance. The application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law allows interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.
2001-03-01
between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the speed of events in...International Telegraph and Telephone (CCITT) international standards body and is referred to as Signaling System # 7 ( SS7 ). Commerc" I Intelligent...point to fixed infrastructure "" Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network STP ... SS7 * System Data Bases i Network
33 CFR 117.739 - Passaic River.
Code of Federal Regulations, 2014 CFR
2014-07-01
... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...
33 CFR 117.739 - Passaic River.
Code of Federal Regulations, 2012 CFR
2012-07-01
... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...
33 CFR 117.739 - Passaic River.
Code of Federal Regulations, 2013 CFR
2013-07-01
... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...
33 CFR 117.739 - Passaic River.
Code of Federal Regulations, 2011 CFR
2011-07-01
... signal if at least one hour advance notice is given to the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge...
33 CFR 117.739 - Passaic River.
Code of Federal Regulations, 2010 CFR
2010-07-01
... signal if at least one hour advance notice is given to the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge...
ERIC Educational Resources Information Center
Zirkel, Perry A.
1999-01-01
Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…
SFU Hacking for Non-Hackers v. 1.005
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, David James
The program provides a limited virtual environment for exploring some concepts of computer hacking. It simulates a simple computer system with intentional vulnerabilities, allowing the user to issue commands and observe their results. It does not affect the computer on which it runs.
Ethical Hacking in Information Security Curricula
ERIC Educational Resources Information Center
Trabelsi, Zouheir; McCoey, Margaret
2016-01-01
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security. Volume 1
2003-11-01
were used to develop a web-based "deployment picture." (A little money -a few million dollars-can go a long way in the combatant commands). OSD critical...AND MISSIONS f1 HOMELAND SECURJTY 91 APP8VD&XH Dr. Mark Harper U.S. Naval Academy Mr. Art Money Private Consultant Mr. Walter Morrow, Jr. MIT Lincoln...Protection BrigGen Irv Halter Discussion Mr. John Lauder Overview of NRO support to Homeland Security Mr. Brian Hack and Mr. Alan NRO Comms - NRO backbone
Fyfe, Aileen
2005-06-01
Existing scholarship on the debates over expertise in mid-nineteenth-century Britain has demonstrated the importance of popular writings on the sciences to definitions of scientific authority. Yet while men of science might position themselves in opposition to the stereotype of the merely popular writer, the self-identity of the popular writer remained ambiguous. This essay examines the careers of William Charles Linnaeus Martin (1798-1864) and Thomas Milner (1808-ca. 1883) and places them in the context of others who made their living by writing works on the sciences for the general reader. Martin wrote on zoology and Milner moved between astronomy, geology, and geography. The essay unravels the close but ambivalent relationship between the professions of authorship and of science and highlights writing as another aspect of scientific practice. Both writers were moderately financially successful, but Martin's sense of failure and Milner's satisfaction reflect their contrasting images of their professional identity.
NASA Astrophysics Data System (ADS)
Ijjasz-Vasquez, Ede J.; Bras, Rafael L.; Rodriguez-Iturbe, Ignacio
1993-08-01
As pointed by Hack (1957), river basins tend to become longer and narrower as their size increases. This work shows that this property may be partially regarded as the consequence of competition and minimization of energy expenditure in river basins.
SafeSlinger: An Easy-to-use and Secure Approach for Human Trust Establishment
2012-03-12
communication modalities (Bluetooth, WiFi , 4G), camera, and sensors. Unfortunately, smartphone platforms suffer from many risks. Vulnerabilities exist in...December 2010. [31] Dave Neal. Defcon hackers get hacked over 4G. http://www.theinquirer.net/inquirer/news/ 16 2100989/defcon-hackers- hacked -4g
Internet Attack Traceback: Cross-Validation and Pebble-Trace
2013-02-28
stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical
Better value digital health: the medium, the market and the role of openness.
Reynolds, Carl J
2013-08-01
The recent NHS 'hack days' have showcased the enthusiasm and talent of the junior doctor body as well as the potential of open source, open governance and small-medium enterprise. There still remains much scope for developing better value digital health services within the NHS. This article sets out the current state of NHS information technology (IT), how it fails to meet the needs of patients and professionals alike and suggests how better value digital health can be achieved.
Connected Learning in the Library as a Product of Hacking, Making, Social Diversity and Messiness
ERIC Educational Resources Information Center
Bilandzic, Mark
2016-01-01
Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people's interactions at "Hack The…
Ian Hacking, Learner Categories and Human Taxonomies
ERIC Educational Resources Information Center
Davis, Andrew
2008-01-01
I use Ian Hacking's views to explore ways of classifying people, exploiting his distinction between indifferent kinds and interactive kinds, and his accounts of how we "make up" people. The natural kind/essentialist approach to indifferent kinds is explored in some depth. I relate this to debates in psychiatry about the existence of mental…
Second generation bioethanol production from Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.
Danilo Scordia; Salvatore L. Consentino; Thomas W. Jeffries
2010-01-01
Saccharum (Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.), is a rapidly growing, wide ranging high-yield perennial, suitable for second generation bioethanol production. This study evaluated oxalic acid as a pretreatment for bioconversion. Overall sugar yields, sugar degradation products, enzymatic glucan hydrolysis and ethanol production were studied as...
p-Curve and p-Hacking in Observational Research.
Bruns, Stephan B; Ioannidis, John P A
2016-01-01
The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable.
Can a biologist fix a smartphone?-Just hack it!
Kamoun, Sophien
2017-05-08
Biological systems integrate multiscale processes and networks and are, therefore, viewed as difficult to dissect. However, because of the clear-cut separation between the software code (the information encoded in the genome sequence) and hardware (organism), genome editors can operate as software engineers to hack biological systems without any particularly deep understanding of the complexity of the systems.
Employing Two Factor Authentication Mechanisms: A Case Study
ERIC Educational Resources Information Center
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David
2014-01-01
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…
POCKET $beta$ AND $gamma$ RADIOMETER (in Russian)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Markelov, V.V.; Lushikhin, A.M.; Nikoforov, V.I.
A pocket BETA and gamma rate meter was designed by the Academy of Medical Sciences of U.S.S.R. for detecting gamma radiation of 0.25 to 2 Mev and for BETA particles of 0 to 50 and 0 to 500 particles/cm/sup 2/sec, with energies of 0.5 to 2 Mev. Measurements of BETA particles are made through the hack wall opening in the appuratus. The opening is closed durtng the recording of gamma radiation, which permits differentiation between the BETA and gamma radiation. The accuracy of the counter is within plus or minus 15%. (R.V.J.)
p-Curve and p-Hacking in Observational Research
Bruns, Stephan B.; Ioannidis, John P. A.
2016-01-01
The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable. PMID:26886098
Ashdown, Brien K; Hackathorn, Jana M; Daniels, Jordan
2018-04-06
In 2015, AshleyMadison.com (AshleyMadison) was hacked, leading to the release of site members' personal information. The exposed members faced public scrutiny, judgment, and other negative outcomes. In this study, we examined predictors of the demonization of the AshleyMadison participants (i.e., AshleyMadison members, owners, hackers) to help explain victim derogation. We attempted to discern the role religiosity and sexual guilt played in the demonization of the AshleyMadison hacking participants. We predicted sexual guilt would mediate between religiosity and demonization of the AshleyMadison hacking participants. Our findings indicate that religiosity alone does not predict demonization. Instead, sex guilt was a necessary part of the equation and mediated between participants' religiosity and the amount they demonized the different groups.
Ideas for Advancing Code Sharing: A Different Kind of Hack Day
NASA Astrophysics Data System (ADS)
Teuben, P.; Allen, A.; Berriman, B.; DuPrie, K.; Hanisch, R. J.; Mink, J.; Nemiroff, R. J.; Shamir, L.; Shortridge, K.; Taylor, M. B.; Wallin, J. F.
2014-05-01
How do we as a community encourage the reuse of software for telescope operations, data processing, and ? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.
ERIC Educational Resources Information Center
Aveling, Nado
2006-01-01
When teaching about race and racism and how we as "Whites" are implicated in the discursive practices that sustain racism, we are indeed "hacking at the very roots" of the ways in which students have conceptualized their identity in terms of being non-racialized and at the same time non-racist. In this paper I focus on the challenges and…
2012-04-06
Estonia 6 : 98% of Estonian‟s territory was covered with Internet access: fixed line, broadband, WiMax, WiFi , and CDMA21 mobile wireless Internet...The hacked homepage displayed a prominent image of Bashar al-Assad, the President of Syria, with a text proclaiming “Syrian Electronic Army Were...update and harmonize their criminal laws against hacking , infringements on copyrights, computer facilitated fraud, child pornography, and other illicit
Should We Turn the Robots Loose?
2010-05-02
interference. Potential sources of electromagnetic interference include everyday signals such as cell phones and Wifi , intentional friendly jamming of IED...might even attempt to hack or hijack our robotic warriors. Our current enemies have proven to be very adaptable and have developed simple counters to our...demonstrates the ease with which robot command and control might be hacked . It is reasonable to suspect that a future threat with a more robust
Continuous-Tone Electrostatic Electrography
1948-09-15
selected as "being of greatest impor- tance: (l) exposure speed equivalent to 50 Westen» (2) high- quality continuous-tone reproduction, and...the developing or ’the fixing techniques» (10) Uniformity of Quality of Plates or Pilm from 3atch to Batch This cannot be considered until...directly to tho electrically cöhductivo hacking of the plato. This hacking is groundod aftor tho plate surfaco lias hoon chargod under corona
Facts, values, and journalism.
Gilbert, Susan
2017-03-01
At a time of fake news, hacks, leaks, and unverified reports, many people are unsure whom to believe. How can we communicate in ways that make individuals question their assumptions and learn? My colleagues at The Hastings Center and many journalists and scientists are grappling with this question and have, independently, reached the same first step: recognize that facts can't be fully understood without probing their connection to values. "Explaining the basics is important, of course, but we also need to diversify our approach to the coverage of science-particularly as it intersects with the matrix of cultural, religious, social, and political values of our readers," said an article in Undark, an online magazine of science journalism. An editorial in Nature called for scientists to engage directly with citizens in debates over climate change and genome editing, noting that "the ethical issues can be critically dependent on the science, for example, in understanding where the boundaries between non-heritable and heritable genome modifications might be." We're here to help. © 2017 The Hastings Center.
The MAGTF’s Reliance on the Global Positioning System: A Critical Vulnerability
2013-05-02
Reference&ItemId=+++1 499015&Pubabbrev=JC4IJ 45 “AURA Mobile Communications GPS/ WiFi Jammer”, Jane’s Police and Homeland Security Equipment, last...securityaffairs.co/wordpress/2845/ hacking /gps-spoofing- old-threat-and-new-problems.html 52“GPS Spoofing, Old Threat and New Problems”, Pierluigi...Paganini, Security Affairs, last modified February 23, 2012, http://securityaffairs.co/wordpress/2845/ hacking /gps-spoofing- old-threat-and-new
Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know?
Baranchuk, Adrian; Refaat, Marwan M; Patton, Kristen K; Chung, Mina K; Krishnan, Kousik; Kutyifa, Valentina; Upadhyay, Gaurav; Fisher, John D; Lakkireddy, Dhanunjaya R
2018-03-20
Medical devices have been targets of hacking for over a decade, and this cybersecurity issue has affected many types of medical devices. Lately, the potential for hacking of cardiac devices (pacemakers and defibrillators) claimed the attention of the media, patients, and health care providers. This is a burgeoning problem that our newly electronically connected world faces. In this paper from the Electrophysiology Section Council, we briefly discuss various aspects of this relatively new threat in light of recent incidents involving the potential for hacking of cardiac devices. We explore the possible risks for the patients and the effect of device reconfiguration in an attempt to thwart cybersecurity threats. We provide an outline of what can be done to improve cybersecurity from the standpoint of the manufacturer, government, professional societies, physician, and patient. Copyright © 2018 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.
Wang, Chuangqi; Choi, Hee June; Kim, Sung-Jin; Desai, Aesha; Lee, Namgyu; Kim, Dohoon; Bae, Yongho; Lee, Kwonmoo
2018-04-27
Cell protrusion is morphodynamically heterogeneous at the subcellular level. However, the mechanism of cell protrusion has been understood based on the ensemble average of actin regulator dynamics. Here, we establish a computational framework called HACKS (deconvolution of heterogeneous activity in coordination of cytoskeleton at the subcellular level) to deconvolve the subcellular heterogeneity of lamellipodial protrusion from live cell imaging. HACKS identifies distinct subcellular protrusion phenotypes based on machine-learning algorithms and reveals their underlying actin regulator dynamics at the leading edge. Using our method, we discover "accelerating protrusion", which is driven by the temporally ordered coordination of Arp2/3 and VASP activities. We validate our finding by pharmacological perturbations and further identify the fine regulation of Arp2/3 and VASP recruitment associated with accelerating protrusion. Our study suggests HACKS can identify specific subcellular protrusion phenotypes susceptible to pharmacological perturbation and reveal how actin regulator dynamics are changed by the perturbation.
Little River revisited - thirty-five years after Hack and Goodlett
Osterkamp, W.R.; Hupp, C.R.; Schening, M.R.
1995-01-01
In possibly the first detailed study to relate geomorphology, vegetation, and hydrology at a watershed scale, Hack and Goodlett (1960) documented variation in the eastern forest with topographic positions of cove, side slope, and nose. The study also described effects on landforms and vegetation of a catastrophic flood that occurred in June, 1949. Field investigations, conducted nearly four decades later, review selected parts of the study by Hack and Goodlett (1960). Replicate data provide a basis to evaluate their interpretations, to document geomorphic change since the 1949 flood, and to identify vegetation change in uplands and bottomlands. Results suggest that change to hillslope landforms has been minor since 1949, but that changes have occurred, seemingly during flow events of 1952, 1955 and 1985. Change in areal extent of forest types was not detected. Change in the relative abundances of dominant species may have resulted from 20th century fire suppression. -from Authors
Seven Deadliest Network Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prowell, Stacy J; Borkin, Michael; Kraus, Robert
2010-05-01
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less
Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome.
Millard, Chris
2017-08-01
Concepts used by historians are as historical as the diagnoses or categories that are studied. The example of Munchausen syndrome (deceptive presentation of illness in order to adopt the 'sick role') is used to explore this. Like most psychiatric diagnoses, Munchausen syndrome is not thought applicable across time by social historians of medicine. It is historically specific, drawing upon twentieth-century anthropology and sociology to explain motivation through desire for the 'sick role'. Ian Hacking's concepts of 'making up people' and 'looping effects' are regularly utilised outside of the context in which they are formed. However, this context is precisely the same anthropological and sociological insight used to explain Munchausen syndrome. It remains correct to resist the projection of Munchausen syndrome into the past. However, it seems inconsistent to use Hacking's concepts to describe identity formation before the twentieth century as they are given meaning by an identical context.
2009-01-01
Relations for the Joint Task Force- Global Network Operations (JTF-GNO/ J5 ). He assists in development of cyber policy and strategy for operations and...History (Manchester, U.K: Manchester Univ. Press, 2000), 1. 10. See The Steamship Appam, 243 U.S. 124 (1917). 11. Jeffrey T. G. Kelsey, “ Hacking into...Arrest for Computer Hacking ,” news release, 1 October 2007, http://www.cybercrime.gov/kingIndict.pdf. 39. Grant Gross, “FBI: Several Nations Eyeing U.S
European Stroke Science Workshop
Mattle, Heinrich P.; Brainin, Michael; Chamorro, Angel; Diener, Hans Christoph; Hacke, Werner; Leys, Didier; Norrving, Bo; Ward, Nick
2012-01-01
The European Stroke Organisation (ESO) held its first European Stroke Science Workshop in Garmisch-Partenkirchen, Germany (15-17 December 2011). Stroke experts based in Europe were invited to present and discuss their current research. The scope of the workshop was to review the most recent findings of selected topics in stroke, to exchange ideas, to stimulate new research and to enhance collaboration between European stroke research groups. Seven scientific sessions were held, each starting with a keynote lecture to review the state of the art of the given topic, followed by 4 or 5 short presentations by experts. They were asked to limit their presentations to 10 slides containing only recent information. The meeting was organized by the executive committee of the ESO (Heinrich Mattle, chairman, Michael Brainin, Angel Chamorro, Werner Hacke, Didier Leys) and supported by the European Stroke Conference (Michael Hennerici). In this article we summarize the main contents of this successful workshop. PMID:22836350
Barstow, A; Bailey, J; Campbell, J; Harris, C; Weller, R; Pfau, T
2018-04-17
Both pleasure and competition horses regularly exercise on surfaces such as tarmac, gravel and turf during 'hacking'. Despite this, there is limited evidence relating to the effect of these surfaces upon foot-surface interaction. To investigate forelimb foot placement, hoof vibration and movement symmetry in pleasure horses on three commonly encountered hacking surfaces. Quantitative gait study in a convenience sample. Six horses regularly partaking in hacking exercise were ridden in walk and trot on all surfaces. Horses were equipped with one hoof-mounted, accelerometer and four body-mounted inertial measurement units (IMUs) to measure foot impact and movement symmetry. High-speed (400 FPS) video footage of foot-placement was acquired (dorsal, palmar, lateral views). Foot-impact and movement symmetry were analysed with a mixed effects model and Bowker symmetry tests for foot-placement analysis. Vibration power and frequency parameters increase as perceived surface firmness increases from grass, to gravel, to tarmac (P≤0.001). Vibration power parameters were consistently greater at trot compared with walk (P≤0.001), but the same was not true for vibration frequency (P≥0.2). Greatest movement asymmetry was recorded during grass surface trotting. No significant difference in foot-placement was detected between the three surfaces. This was a field study using three commonly encountered hacking surfaces. Surface properties change easily with water content and temperature fluctuations so care must be taken when considering other similar surfaces, especially at different times of the year. Six leisure horses were used so the results may not be representative of horses of all types. Vibration parameters generally increase as perceived surface firmness increases. Increasing speed alters vibration power but not frequency. Further investigations are required to determine the role that this may play in the development of musculoskeletal disease in horses. © 2018 EVJ Ltd.
Charles A. Gresham
2010-01-01
In May 2005, 12 plots approximately 21 by 27 m each were established on the exterior bank of a dredge spoil area in Georgetown, SC. The tree cover was primarily Chinese tallowtree, but there were also live oak trees in each plot. Also in May 2005, Chinese tallowtree s (d.b.h. > 2.4 cm) in three randomly selected plots received a âhack and squirtâ application of...
Nogueira, Luísa; Quatrehomme, Gérald; Bertrand, Marie-France; Rallon, Christophe; Ceinos, Romain; du Jardin, Philippe; Adalian, Pascal; Alunni, Véronique
2017-03-01
This experimental study examined the lesions produced by a hatchet on human bones (tibiae). A total of 30 lesions were produced and examined macroscopically (naked eye) and by stereomicroscopy. 13 of them were also analyzed using scanning electron microscopy. The general shape of the lesion, both edges, both walls, the kerf floor and the extremities were described. The length and maximum width of the lesions were also recorded. The microscopic analysis of the lesions led to the description of a sharp-blunt mechanism. Specific criteria were identified (lateral pushing back, fragmentation of the upraising, fossa dug laterally to the edge and vertical striae) enabling the forensic expert to conclude that a hacking instrument was used. These criteria are easily identifiable using scanning electron microscopy, but can also be observed with stereomicroscopy. Overall, lateral pushing back and vertical striae visible using stereomicroscopy and scanning electron microscopy signal the use of a hacking tool.
Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena
2016-01-01
Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings. PMID:27242491
Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena
2016-01-01
Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders-attention to detail and systemizing-may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.
Reevaluating excess success in psychological science.
van Boxtel, Jeroen J A; Koch, Christof
2016-10-01
Francis (Psychonomic Bulletin Review, 21, 1180-1187, 2014) recently claimed that 82 % of articles with four or more experiments published in Psychological Science between 2009 and 2012 cannot be trusted. We critique Francis' analysis and point out the dependence of his approach on including the appropriate experiments and significance tests. We focus on one of the articles (van Boxtel & Koch, in Psychological Science, 23(4), 410-418, 2012) flagged by Francis and show that the inappropriate inclusion of experiments and tests have led Francis to mistakenly flag this article. We found that decisions about whether to include certain tests potentially affect 34 of the 44 articles analyzed by Francis. We further performed p-curve analyses on the articles discussed in Francis' analysis. We found that 9 of 44 studies showed significant evidential value, 11 studies showed insufficient evidential value, and 1 study showed evidence of p-hacking. Our reevaluation is important, because some researchers may have gained the false impression that none of the quoted articles in Psychological Science can be trusted (as stated by Francis). The analysis by Francis is most likely insufficient to warrant this conclusion for some articles and certainly is insufficient with respect to the study by van Boxtel and Koch (Psychological Science, 23, 410-418, 2012).
NASA Astrophysics Data System (ADS)
Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan
2014-10-01
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].
Upconversion-based receivers for quantum hacking-resistant quantum key distribution
NASA Astrophysics Data System (ADS)
Jain, Nitin; Kanter, Gregory S.
2016-07-01
We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.
NASA Technical Reports Server (NTRS)
1988-01-01
A NASA-developed software package has played a part in technical education of students who major in Mechanical Engineering Technology at William Rainey Harper College. Professor Hack has been using (APT) Automatically Programmed Tool Software since 1969 in his CAD/CAM Computer Aided Design and Manufacturing curriculum. Professor Hack teaches the use of APT programming languages for control of metal cutting machines. Machine tool instructions are geometry definitions written in APT Language to constitute a "part program." The part program is processed by the machine tool. CAD/CAM students go from writing a program to cutting steel in the course of a semester.
Progress on white papers from the Demographic Hack Session at WiA IV
NASA Astrophysics Data System (ADS)
Norman, Dara J.; WiA IV Demographics Hack Session Attendees.
2018-06-01
At the Women in Astronomy IV meeting in June 2017, a number of white papers were started as part of the Demographic Hack session. Several of these white papers are intended for submission to the Decadal Survey on topics including, ‘Providing a Timely Review of Input Demographics to Advisory Committees’, and ‘Tying Research Funding to Progress in Inclusion’. In my talk, I will review the content of these white papers and the progress that has been made in writing them. Interested session attendees are encouraged ‘endorse’ the papers by becoming signatories.
Wireless Network Security Vulnerabilities and Concerns
NASA Astrophysics Data System (ADS)
Mushtaq, Ahmad
The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.
Ulrich, Rolf; Miller, Jeff
2015-12-01
Simonsohn, Nelson, and Simmons (2014) have suggested a novel test to detect p-hacking in research, that is, when researchers report excessive rates of "significant effects" that are truly false positives. Although this test is very useful for identifying true effects in some cases, it fails to identify false positives in several situations when researchers conduct multiple statistical tests (e.g., reporting the most significant result). In these cases, p-curves are right-skewed, thereby mimicking the existence of real effects even if no effect is actually present. (c) 2015 APA, all rights reserved).
Optimised quantum hacking of superconducting nanowire single-photon detectors
NASA Astrophysics Data System (ADS)
Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.
2014-03-01
We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.
Alunni, Véronique; Nogueira, Luísa; Quatrehomme, Gérald
2018-03-01
This experimental study examined lesions produced by a hatchet on pig femurs before and after carbonization. A total of 30 lesions were produced and analyzed using stereomicroscopy and then reexamined after carbonization. Not only was the sharp-blunt mechanism of the hacking trauma (V-shape, regularity of one edge, irregularity of the other edge, upraising, lateral pushing back, fossae dug laterally to the edge) still recognizable after carbonization; in some instances, the carbonization actually enhanced the features observed. Carbonization also did not significantly alter the measurements of the lesions. Carbonization tends to alter the structure of the bone especially in areas weakened by the blunt trauma.
Optimised quantum hacking of superconducting nanowire single-photon detectors.
Tanner, Michael G; Makarov, Vadim; Hadfield, Robert H
2014-03-24
We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.
Editing Transgenic DNA Components by Inducible Gene Replacement in Drosophila melanogaster
Lin, Chun-Chieh; Potter, Christopher J.
2016-01-01
Gene conversions occur when genomic double-strand DNA breaks (DSBs) trigger unidirectional transfer of genetic material from a homologous template sequence. Exogenous or mutated sequence can be introduced through this homology-directed repair (HDR). We leveraged gene conversion to develop a method for genomic editing of existing transgenic insertions in Drosophila melanogaster. The clustered regularly-interspaced palindromic repeats (CRISPR)/Cas9 system is used in the homology assisted CRISPR knock-in (HACK) method to induce DSBs in a GAL4 transgene, which is repaired by a single-genomic transgenic construct containing GAL4 homologous sequences flanking a T2A-QF2 cassette. With two crosses, this technique converts existing GAL4 lines, including enhancer traps, into functional QF2 expressing lines. We used HACK to convert the most commonly-used GAL4 lines (labeling tissues such as neurons, fat, glia, muscle, and hemocytes) to QF2 lines. We also identified regions of the genome that exhibited differential efficiencies of HDR. The HACK technique is robust and readily adaptable for targeting and replacement of other genomic sequences, and could be a useful approach to repurpose existing transgenes as new genetic reagents become available. PMID:27334272
A consistent framework for Horton regression statistics that leads to a modified Hack's law
Furey, P.R.; Troutman, B.M.
2008-01-01
A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ??. Data show that ?? plays a statistically significant role in the modified Hack's law expression. ?? 2008 Elsevier B.V.
Quantum key distribution with hacking countermeasures and long term field trial.
Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J
2017-05-16
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
Wright, Michelle F
2017-03-01
The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; M age = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber aggression perpetration (i.e., cyber relational aggression, cyber verbal aggression, hacking) through mobile phones, social-networking sites, and gaming consoles. Findings indicated that boys and girls with more feminine traits engaged in more cyber relational aggression through social-networking sites and mobile phones, while boys and girls who endorsed more masculine traits perpetrated this behavior and cyber verbal aggression more often through online gaming. In addition, these boys and girls engaged in more hacking through all technologies when compared with girls and boys who reported more feminine traits. Results of this study indicate the importance of delineating gender stereotype traits, behaviors, and technologies when examining cyber aggression perpetration.
The Weak Spots in Contemporary Science (and How to Fix Them).
Wicherts, Jelte M
2017-11-27
In this review, the author discusses several of the weak spots in contemporary science, including scientific misconduct, the problems of post hoc hypothesizing (HARKing), outcome switching, theoretical bloopers in formulating research questions and hypotheses, selective reading of the literature, selective citing of previous results, improper blinding and other design failures, p-hacking or researchers' tendency to analyze data in many different ways to find positive (typically significant) results, errors and biases in the reporting of results, and publication bias. The author presents some empirical results highlighting problems that lower the trustworthiness of reported results in scientific literatures, including that of animal welfare studies. Some of the underlying causes of these biases are discussed based on the notion that researchers are only human and hence are not immune to confirmation bias, hindsight bias, and minor ethical transgressions. The author discusses solutions in the form of enhanced transparency, sharing of data and materials, (post-publication) peer review, pre-registration, registered reports, improved training, reporting guidelines, replication, dealing with publication bias, alternative inferential techniques, power, and other statistical tools.
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
NASA Astrophysics Data System (ADS)
Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun
2016-08-01
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).
Hypothesis testing in hydrology: Theory and practice
NASA Astrophysics Data System (ADS)
Kirchner, James; Pfister, Laurent
2017-04-01
Well-posed hypothesis tests have spurred major advances in hydrological theory. However, a random sample of recent research papers suggests that in hydrology, as in other fields, hypothesis formulation and testing rarely correspond to the idealized model of the scientific method. Practices such as "p-hacking" or "HARKing" (Hypothesizing After the Results are Known) are major obstacles to more rigorous hypothesis testing in hydrology, along with the well-known problem of confirmation bias - the tendency to value and trust confirmations more than refutations - among both researchers and reviewers. Hypothesis testing is not the only recipe for scientific progress, however: exploratory research, driven by innovations in measurement and observation, has also underlain many key advances. Further improvements in observation and measurement will be vital to both exploratory research and hypothesis testing, and thus to advancing the science of hydrology.
... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...
Hack the Planet: What we Talk About When we Talk About Geoengineering
NASA Astrophysics Data System (ADS)
Kintisch, E.
2010-12-01
Hack the Planet (Wiley, 2010) explores how an idea once basically anathema to meetings like AGU has, in the space of a few years, become part of the geoscience mainstream. Through chapters involving researchers like David Battisti, Stephen Salter, Edward Teller and Brent Constanz the book documents the roots of this shift and how scientists are breaking new ground in the controversial field. And it shows how trying to engineer the planet's climate or manage its carbon poses novel scientific, geopolitical and moral risks and rewards. This session will cover how the topic of climate engineering has moved from something geoscientists don't talk about to something geoscientists can talk about, to something, in my view, that geoscientists must talk about.
ERIC Educational Resources Information Center
Scrogan, Len
1988-01-01
Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)
1988-05-28
The new book on occupational health for nurses called Nurses At Risk written by [illegible word] Salvage, former Nursing Standard journalist and Rosemary Rogers, currently our Clinical News Editor, received widespread press coverage.
Thomas, Michael H; Burns, Steve P
The purpose of this study was to determine the effect strength training frequency has on improvements in lean mass and strength. Participants were 7 women and 12 men, age ( χ̄ = 34.64 years ± 6.91 years), with strength training experience, training age ( χ̄ = 51.16 months ± 39.02 months). Participants were assigned to one of two groups to equal baseline group demographics. High frequency training group (HFT) trained each muscle group as the agonist, 3 times per week, exercising with 3 sets per muscle group per session (3 total body workouts). Low frequency training group (LFT) trained each muscle group as the agonist one time per week, completing all 9 sets during that one workout. LFT consisted of a routine split over three days: 1) pectoralis, deltoids, and triceps; 2) upper back and biceps; 3) quadriceps, hamstrings, calves, and abdominals. Following eight weeks of training, HFT increased lean mass by 1.06 kg ± 1.78 kg, (1.9%), and LFT increased lean mass by .99 kg ± 1.31 kg, (2.0%). HFT strength improvements on the chest press was 9.07 kg ± 6.33 kg, (11%), and hack squat 20.16 kg ± 11.59 kg, (21%). LFT strength improvements on chest press was 5.80kg ± 4.26 kg, (7.0%), and hack squat 21.83 kg ± 11.17 kg, (24 %). No mean differences between groups were significant. These results suggest that HFT and LFT of equal set totals result in similar improvements in lean mass and strength, following 8 weeks of strength training.
The Shifting Aesthetics of Expertise in the Sharing Economy of Scientific Medicine.
Ostherr, Kirsten
2018-03-01
Argument The deficit model of science communication assumes that the creation and dissemination of knowledge is limited to researchers with formal credentials. Recent challenges to this model have emerged among "e-patients" who develop extensive online activist communities, demand access to their own health data, conduct crowd-sourced experiments, and "hack" health problems that traditional medical experts have failed to solve. This article explores the aesthetics of medical media that enact the transition from a deficit model to a patient-driven model of visual representation and health communication. I present a framework for understanding the role of film and video in patient movements by analyzing the historical transition from researchers filming patients as nameless, voiceless human research subjects to patients recording their own health narratives through activist cinematography. By comparing several approaches to patient-centered video, I argue that imperfect production aesthetics play a critically important role in establishing the credibility of health communications.
Publication bias and the canonization of false facts.
Nissen, Silas Boye; Magidson, Tali; Gross, Kevin; Bergstrom, Carl T
2016-12-20
Science is facing a "replication crisis" in which many experimental findings cannot be replicated and are likely to be false. Does this imply that many scientific facts are false as well? To find out, we explore the process by which a claim becomes fact. We model the community's confidence in a claim as a Markov process with successive published results shifting the degree of belief. Publication bias in favor of positive findings influences the distribution of published results. We find that unless a sufficient fraction of negative results are published, false claims frequently can become canonized as fact. Data-dredging, p-hacking, and similar behaviors exacerbate the problem. Should negative results become easier to publish as a claim approaches acceptance as a fact, however, true and false claims would be more readily distinguished. To the degree that the model reflects the real world, there may be serious concerns about the validity of purported facts in some disciplines.
Arribas-Ayllon, Michael
2016-06-01
The concept of geneticization belongs to a style of thinking within the social sciences that refers to wide-ranging processes and consequences of genetic knowledge. Lippman's original use of the term was political, anticipating the onerous consequences of genetic reductionism and determinism, while more recent engagements emphasise the productivity and heterogeneity of genetic concepts, practices and technologies. This paper reconstructs the geneticization concept, tracing it back to early political critiques of medicine. The argument is made that geneticization belongs to a style of constructionist thinking that obscures and exaggerates the essentializing effects of genetic knowledge. Following Hacking's advice, we need a more literal sense of construction in terms of 'assembly' to give a clearer account of the relationship between processes and products. Using the 'assemblage' concept to explore the social ontology of genetics, the paper reviews three areas of the empirical literature on geneticization - disease classification, clinical practice and biosociality - to show that a new style of thinking has appeared within the social sciences. In the final assessment, the conditions that gave rise to geneticization are now obsolete. While it may serve as a useful ritual of debate, conceptually geneticization offers a limited account of the heterogeneity of socio-technical change. Copyright © 2016 The Author. Published by Elsevier Ltd.. All rights reserved.
Learning about Alpha-1 Antitrypsin Deficiency (AATD)
... Tests Genomics and Health Disparities Genetic Discrimination Human Subjects Research Informed Consent for Genomics Research Intellectual Property ... the lungs are damaged. Symptoms of emphysema include difficulty breathing, a hacking cough and a barrel-shaped ...
Hacking on decoy-state quantum key distribution system with partial phase randomization
NASA Astrophysics Data System (ADS)
Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
2014-04-01
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.
Simonsohn, Uri; Simmons, Joseph P; Nelson, Leif D
2015-12-01
When studies examine true effects, they generate right-skewed p-curves, distributions of statistically significant results with more low (.01 s) than high (.04 s) p values. What else can cause a right-skewed p-curve? First, we consider the possibility that researchers report only the smallest significant p value (as conjectured by Ulrich & Miller, 2015), concluding that it is a very uncommon problem. We then consider more common problems, including (a) p-curvers selecting the wrong p values, (b) fake data, (c) honest errors, and (d) ambitiously p-hacked (beyond p < .05) results. We evaluate the impact of these common problems on the validity of p-curve analysis, and provide practical solutions that substantially increase its robustness. (c) 2015 APA, all rights reserved).
Hacking on decoy-state quantum key distribution system with partial phase randomization.
Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
2014-04-23
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.
Lewtas, K L M; Birch, G F; Foster-Thorpe, C
2014-01-01
Metal concentrations of the inshore greentail prawn, Metapenaeus bennettae, and surface sediments from locations within Sydney estuary and Port Hacking (Australia) were assessed for bioaccumulation and contamination. The current study aimed to assess metal concentrations in prawn tissue (tail muscle, exoskeleton, hepatopancreas and gills), relate whole body prawn tissue metal concentrations to sediment metal concentrations and animal size, as well as assess prawn consumption as a risk to human health. Metal concentrations were highest in sediment and prawns from contaminated locations (Iron Cove, Hen and Chicken Bay and Lane Cove) in Sydney estuary compared with the reference estuary (Port Hacking). Concentrations in sediments varied considerably between sites and between metals (As, Cd, Cr, Cu, Ni, Pb and Zn), and although concentrations exceeded Interim Sediment Quality Guideline-Low values, metals (As, Cd, Cr, Cu, Ni, Pb and Zn) were below Australian National Health and Medical Research Council human consumption guidelines in prawn tail muscle tissue. Metal concentrations in prawn tail muscle tissue were significantly different (p ≤ 0.05) amongst locations for Pb, Zn and Cd, and metal concentrations were generally highest in gills tissue, followed by the hepatopancreas, exoskeleton and tail muscle. The exoskeleton contained the highest Sr concentration; the hepatopancreas contained the highest As, Cu and Mo concentrations; and the gills contained the highest Al, Cr, Fe and Pb concentrations. Concentrations of Pb, As and Sr were significantly different (p ≤ 0.05) between size groups amongst locations.
NASA Astrophysics Data System (ADS)
Ferkinhoff, Carl
2014-07-01
There have been several exciting developments in the technologies commonly used n in the hardware hacking community. Advances in low cost additive-manufacturing processes (i.e. 3D-printers) and the development of openhardware projects, which have produced inexpensive and easily programmable micro-controllers and micro-computers (i.e. Arduino and Raspberry Pi) have opened a new door for individuals seeking to make their own devices. Here we describe the potential for these technologies to reduce costs in construction and development of submillimeter/millimeter astronomical instrumentation. Specifically we have begun a program to measure the optical properties of the custom plastics used in 3D-printers as well as the printer accuracy and resolution to assess the feasibility of directly printing sub- /millimeter transmissive optics. We will also discuss low cost designs for cryogenic temperature measurement and control utilizing Arduino and Raspberry Pi.
NPF MECHANICAL CELL NaK DISPOSAL AND FUME ABATEMENT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rey, G.
Some of the fuels originally scheduled for processing in the nonproduction fuel (NPF) processing program incorporated sodium or sodium- potassium alloy (NaK) as the bonding material between stainless-steel cladding and the uranium or uranium-molybdenum alloy core. Because of the special hazards involved in handling NaK, studies were made to determine safe methods for processing NaK-containing fuels. An underwater NaK dispensing system was installed, and tests were made to determine the characteristics of the NaK-water reaction. The equipment consisted of a dispenser, reaction pan, and off-gas scrubber. After initinl studies, a prototype test was made wherein U-Mo canned slugs containing NaKmore » reservoirs were hack sawed underwater. The studies demonstrated that the NaK reservoirs can be safely deactivated by hack sawing under a submerged hood in a shallow water bath. (W.L.H.)« less
ERIC Educational Resources Information Center
Hauptman, Robert
2001-01-01
Considers problems that have arisen with the vast quantities of information available as a result of the popularity of computers. Topics include inequity; capitalism, commodification, and privatization; hacking, privacy, and fraud; censorship; monitoring and surveillance; cyberethics; and integrity in an age of electronic communication. (LRW)
... and your blood may not get enough oxygen. Causes of pulmonary fibrosis include environmental pollutants, some medicines, some connective tissue ... or scar the lungs. In most cases, the cause cannot be found. This is called ... fibrosis. Symptoms include Shortness of breath A dry, hacking ...
Intelligence, Information Technology, and Information Warfare.
ERIC Educational Resources Information Center
Davies, Philip H. J.
2002-01-01
Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…
Registration of 'hammock' centipedegrass.
USDA-ARS?s Scientific Manuscript database
‘Hammock’ (Reg. No. ________, PI 652949) centipedegrass [Eremochloa ophiuroides (Munro) Hack] was developed at the Everglades Research and Education Center, IFAS, University of Florida, Belle Glade, FL and initially approved for release in 2006. A plant patent was filed in 2008 with Plant Patent PP...
Police close unsolved 'climategate' investigation
NASA Astrophysics Data System (ADS)
Lavender, Gemma
2012-09-01
Police in Norfolk in the UK have closed an investigation into the hacking of e-mails at the University of East Anglia's Climate Research Unit (CRU) after admitting that they will not be able to find the hackers who broke into CRU computer servers.
Publication bias and the canonization of false facts
Nissen, Silas Boye; Magidson, Tali; Gross, Kevin; Bergstrom, Carl T
2016-01-01
Science is facing a “replication crisis” in which many experimental findings cannot be replicated and are likely to be false. Does this imply that many scientific facts are false as well? To find out, we explore the process by which a claim becomes fact. We model the community’s confidence in a claim as a Markov process with successive published results shifting the degree of belief. Publication bias in favor of positive findings influences the distribution of published results. We find that unless a sufficient fraction of negative results are published, false claims frequently can become canonized as fact. Data-dredging, p-hacking, and similar behaviors exacerbate the problem. Should negative results become easier to publish as a claim approaches acceptance as a fact, however, true and false claims would be more readily distinguished. To the degree that the model reflects the real world, there may be serious concerns about the validity of purported facts in some disciplines. DOI: http://dx.doi.org/10.7554/eLife.21451.001 PMID:27995896
NASA Astrophysics Data System (ADS)
Tanner, Meghan; Henson, Gabriel; Senevirathne, Indrajith
Advent of cost-effective solid-state sensors has spurred an immense interest in microcontrollers, in particular Arduino microcontrollers. These include serious engineering and physical science applications due to their versatility and robustness. An Arduino microcontroller coupled with a commercially available sensor has been used to methodically measure, record, and explore low currents, low voltages, and corresponding dissipated power towards assessing secondary physical properties in a select set of engineered systems. System was assembled via breadboard, wire, and simple soldering with an Arduino Uno with ATmega328P microcontroller connected to a PC. The microcontroller was programmed with Arduino software while the bootloader was used to upload the code. High-side measurement INA169 current shunt monitor was used to measure corresponding low to ultra-low currents and voltages. A collection of measurements was obtained via the sensor and was compared with measurements from standardized devices to assess reliability and uncertainty. Some sensors were modified/hacked to improve the sensitivity of the measurements.
Geodiversity and the natural history of landforms
NASA Astrophysics Data System (ADS)
Giusti, Christian
2014-05-01
For a long time, landforms were studied according to the criteria exposed in the theory of the geographical cycle, at least for geomorphologists claiming a Davisian approach. In this context, particular importance was attached, concerning landforms, to the remains of "peneplains". At this point, it must be remembered that Davis has never been followed unanimously, including the United States, but it was the German geomorphologists who by far developed the strongest criticism of Davisian ideas: scientists such as Albrecht Penck, Siegfried Passarge or Johannes Walther could not be satisfied with views so different of concepts and methods used by German naturalists in geology, geography and geomorphology. This intellectual opposition, however, leads Davis to constantly improve the model of the geographical cycle depending on climatic conditions (arid cycle, glacial cycle…), thick formations of limestones (karstic cycle), or a peculiar geographical position (coastal cycle, coral reef problem). After 1950, Davisian conceptions were, either abruptly given up (Strahler), or severely criticized (Tricart, Hack, Chorley), or deeply modified (King, Baulig, Klein), in particular to make them compatible with situations where it is not possible to identify in the topography the remains of several geographic cycles. For example, in the case of the Appalachians, Hack's originality is to reason exactly at the opposite to Davis and Johnson. Where the latter would select in the topographic continuum supposed elements of successive cycles, in order to interpret current landscape with the hypothetical lights of a theoretical past, Hack starts by a comprehensive analysis of landforms, patterned reliefs and soils of the present mountain chain, leading to the famous conclusion that the Appalachians are not evolving under decay conditions but are in situation of steady state through dynamic equilibrium. So the question becomes now to understand how far it is relevant and how it is possible for a geomorphologist to travel back in the past, a delicate and speculative succession of operations: as noted by Schumm (1979, 485), "The extrapolation of measured average rates of erosion and deposition to longer periods of time is misleading, in the sense that they do not reveal the natural complexity of landform development or the variability of existing landforms". Any extrapolation in the past or future implies true actualiste approach verifying only methodological uniformitarianism (i.e. spatial and temporal invariance of natural laws) as well as quantitative models purged of any hint of gradualism and which takes into account variations of timing, frequency and intensity in the action of morphogenetic forcings. In continuation of Hack's work, the concepts of landscape sensitivity developed by Brunsden and Thornes (1979) explain that some landforms are particularly well fitted to the present conditions of endogenetic and exogenetic forcings (characteristic landforms) while others not at all (transient landforms). This highly effective approach within the Holocene and the Pleistocene marks the beginning of a return to the investigation of the past in geomorphology, given that for the Neogene or even older times, the ancient concept of "héritage" (Birot, 1958) seems more relevant than the concepts of transient or characteristic landforms. We propose here as an illustration to describe the sequence of landforms defined in the Southern Massif Central (France). The full sequence is to be observed between the Languedoc Lowlands and the Monts de Lacaune Highlands, while an elision of the lower terms of the sequence towards the Aquitaine Basin allow to highlight a highly significant limit between two modes of landform development at regional level. In short, the natural history of landforms deserve a high status in the Earth sciences: geomorphology not only needs mechanics and chemistry (i.e. the changing ratio of tectonic-driven to climatic-driven processes), but history too (i.e. landform development in space and time).
The Cybersecurity Challenge in Acquisition
2016-04-30
problems. Scarier yet, another group took control of a car’s computers through a cellular telephone and Bluetooth connections and could access...did more extensive work, hacking their way into a 2009 midsize car through its cellular, Bluetooth , and other wireless connections. Stefan Savage, a
Hacking Facebook Privacy and Security
2012-08-28
that their information is somehow protected. However, practically this is not always the case and privacy on social networking sites has received...fraudsters target Facebook and other social networking sites to harvest information about you. Here’s how we recommend you set your Facebook privacy
Duff, Whitney R D; Kontulainen, Saija A; Candow, Darren G; Gordon, Julianne J; Mason, Riley S; Taylor-Gjevre, Regina; Nair, Bindu; Szafron, Michael; Baxter-Jones, Adam D G; Zello, Gordon A; Chilibeck, Philip D
2016-12-01
To compare the effects of nine months of exercise training and ibuprofen supplementation (given immeditately after exercise sessions) on bone and muscle in postmenopausal women. In a double-blind randomized trial, participants (females: n = 90, mean age 64.8, SD 4.3 years) were assigned (computer generated, double blind) to receive supervised resistance training or stretching 3 days/week, and ibuprofen (400 mg, post-exercise) or placebo (i.e. 4 groups) for 9 months. In this proof-of-concept study the sample size was halved from required 200 identified via 90% power calculation. Baseline and post-intervention testing included: Dual energy x-ray absorptiometry (DXA) for lumbar spine, femoral neck, and total body areal bone mineral density (aBMD); geometry of proximal femur; total body lean tissue and fat mass; predicted 1-repetition maximum muscle strength testing (1RM; biceps curl, hack squat). Exercise training or ibuprofen supplementation had no effects on aBMD of the lumbar spine, femoral neck, and total body. There was a significant exercise × supplement × time interaction for aBMD of Ward's region of the femoral neck (p = 0.015) with post hoc comparison showing a 6% decrease for stretching with placebo vs. a 3% increase for stretching with ibuprofen (p = 0.017). Resistance training increased biceps curl and hack squat strength vs. stretching (22% vs. 4% and 114% vs. 12%, respectively) (p < 0.01) and decreased percent body fat compared to stretching (2% vs. 0%) (p < 0.05). Ibuprofen supplementation provided some benefits to bone when taken independent of exercise training in postmenopausal women. This study provides evidence towards a novel, easily accessible stimulus for enhancing bone health [i.e. ibuprofen].
Inter-relationship between scaling exponents for describing self-similar river networks
NASA Astrophysics Data System (ADS)
Yang, Soohyun; Paik, Kyungrock
2015-04-01
Natural river networks show well-known self-similar characteristics. Such characteristics are represented by various power-law relationships, e.g., between upstream length and drainage area (exponent h) (Hack, 1957), and in the exceedance probability distribution of upstream area (exponent É) (Rodriguez-Iturbe et al., 1992). It is empirically revealed that these power-law exponents are within narrow ranges. Power-law is also found in the relationship between drainage density (the total stream length divided by the total basin area) and specified source area (the minimum drainage area to form a stream head) (exponent η) (Moussa and Bocquillon, 1996). Considering that above three scaling relationships all refer to fundamental measures of 'length' and 'area' of a given drainage basin, it is natural to hypothesize plausible inter-relationship between these three scaling exponents. Indeed, Rigon et al. (1996) demonstrated the relationship between É and h. In this study, we expand this to a more general É-η-h relationship. We approach É-η relationship in an analytical manner while η-h relationship is demonstrated for six study basins in Korea. Detailed analysis and implications will be presented. References Hack, J. T. (1957). Studies of longitudinal river profiles in Virginia and Maryland. US, Geological Survey Professional Paper, 294. Moussa, R., & Bocquillon, C. (1996). Fractal analyses of tree-like channel networks from digital elevation model data. Journal of Hydrology, 187(1), 157-172. Rigon, R., Rodriguez-Iturbe, I., Maritan, A., Giacometti. A., Tarboton, D. G., & Rinaldo, A. (1996). On Hack's Law. Water Resources Research, 32(11), 3367-3374. Rodríguez-Iturbe, I., Ijjasz-Vasquez, E. J., Bras, R. L., & Tarboton, D. G. (1992). Power law distributions of discharge mass and energy in river basins. Water Resources Research, 28(4), 1089-1093.
Prior, M; Hibberd, R; Asemota, N; Thornton, J G
2017-06-01
Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.
Gildersleeve, Kelly; Haselton, Martie G; Fales, Melissa R
2014-09-01
Two meta-analyses evaluated shifts across the ovulatory cycle in women's mate preferences but reported very different findings. In this journal, we reported robust evidence for the pattern of cycle shifts predicted by the ovulatory shift hypothesis (Gildersleeve, Haselton, & Fales, 2014). However, Wood, Kressel, Joshi, and Louie (2014) claimed an absence of compelling support for this hypothesis and asserted that the few significant cycle shifts they observed were false positives resulting from publication bias, p-hacking, or other research artifacts. How could 2 meta-analyses of the same literature reach such different conclusions? We reanalyzed the data compiled by Wood et al. These analyses revealed problems in Wood et al.'s meta-analysis-some of which are reproduced in Wood and Carden's (2014) comment in the current issue of this journal-that led them to overlook clear evidence for the ovulatory shift hypothesis in their own set of effects. In addition, we present right-skewed p-curves that directly contradict speculations by Wood et al.; Wood and Carden; and Harris, Pashler, and Mickes (2014) that supportive findings in the cycle shift literature are false positives. Therefore, evidence from both of the meta-analyses and the p-curves strongly supports genuine, robust effects consistent with the ovulatory shift hypothesis and contradicts claims that these effects merely reflect publication bias, p-hacking, or other research artifacts. Unfounded speculations about p-hacking distort the research record and risk unfairly damaging researchers' reputations; they should therefore be made only on the basis of firm evidence. PsycINFO Database Record (c) 2014 APA, all rights reserved.
Hacking DNA copy number for circuit engineering.
Wu, Feilun; You, Lingchong
2017-07-27
DNA copy number represents an essential parameter in the dynamics of synthetic gene circuits but typically is not explicitly considered. A new study demonstrates how dynamic control of DNA copy number can serve as an effective strategy to program robust oscillations in gene expression circuits.
Computer Abuse: Vandalizing the Information Society.
ERIC Educational Resources Information Center
Furnell, Steven M.; Warren, Matthew J.
1997-01-01
Computing and telecommunications, key to an information-based society, are increasingly targets for criminals and mischief makers. This article examines the effects of malicious computer abuse: hacking and viruses, highlights the apparent increase in incidents, and examines their effect on public perceptions of technology. Presents broad…
Future Operating Concept - Joint Computer Network Operations
2010-02-17
into the system‖ at a later date by circumventing the need for access privileges 3. Cyberwarfare Tools 67 • Social Engineering • Hacking ...Forces Command, Joint Operating Environment 2008, November 2008https://us.jfcom.mil/sites/ J5 /j59/default.aspx VIII Appendix V
Potential highwall use by raptors in coal mine reclamation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Waage, B.
In 1982, Western Energy Company`s Rosebud Mine, located in southeastern Montana, received legal exception, {open_quotes}a first{close_quotes} in Montana to leave a standing mine highwall extending a native bluff. This bluff extension stands 110 feet high and 900 feet long. Normally, all highwalls by law are reduced to a 5:1 slope. This legal exception was accomplished with the support of several governmental agencies and was justified on the highwalls potential value for raptors. Enhancement measures undertaken on the highwall included the construction of three artificial eryies and the release of young prairie falcons (Falco mexicanus) employing hacking methods of the Peregrinemore » Fund. The hack is now in its fourth year with a total of 46 young falcons having been released. Opportunities exist for creating a more diverse habitat for raptors and other cliff obligate species on reclaimed mine lands in the west. It is believed that this practical approach should be explored.« less
Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.
King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S
2018-05-01
As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.
Floridi, Luciano; Taddeo, Mariarosaria
2016-12-28
This theme issue has the founding ambition of landscaping data ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing and use), algorithms (including artificial intelligence, artificial agents, machine learning and robots) and corresponding practices (including responsible innovation, programming, hacking and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data ethics builds on the foundation provided by computer and information ethics but, at the same time, it refines the approach endorsed so far in this research field, by shifting the level of abstraction of ethical enquiries, from being information-centric to being data-centric. This shift brings into focus the different moral dimensions of all kinds of data, even data that never translate directly into information but can be used to support actions or generate behaviours, for example. It highlights the need for ethical analyses to concentrate on the content and nature of computational operations-the interactions among hardware, software and data-rather than on the variety of digital technologies that enable them. And it emphasizes the complexity of the ethical challenges posed by data science. Because of such complexity, data ethics should be developed from the start as a macroethics, that is, as an overall framework that avoids narrow, ad hoc approaches and addresses the ethical impact and implications of data science and its applications within a consistent, holistic and inclusive framework. Only as a macroethics will data ethics provide solutions that can maximize the value of data science for our societies, for all of us and for our environments.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).
NASA Astrophysics Data System (ADS)
Montigiana, N.; Benedetti, W.; Mannucci, M.; Riccetti, S.
2008-09-01
Analysis of data taken in March and April 2007 by groups from Osservatorio Astronomico Margherita Hack and the University of Wisconsin-Eau Claire indicates a likely period of 5.7186 ± 0.0001 h for 2167 Erin. The amplitude of the lightcurve was 0.53 ± 0.02 mag.
Radio Frequency Based Programmable Logic Controller Anomaly Detection
2013-09-01
include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques
Toward Realistic Acquisition Schedule Estimates
2016-04-30
Harrier successor. NASA and the UK both participated in this effort. It was merged by Congress with JAST in mid-1994. CALF (Common Affordable...5th Generation revolution in military aviation. Space Daily. Sternstein, A. (2015, April 27). Here’s how you hack a military drone. Next Gov
Teachers as Hackers: Implications for 21st Century Teacher Education
ERIC Educational Resources Information Center
Wizel, Maya
2017-01-01
This qualitative study introduces a new framework for describing teachers who act innovatively in public schools--teachers as "hackers." It examines the characteristics and conditions under which teachers "hack" their classroom pedagogy to create disruptive innovation in the public education system and identify implications for…
Bit by Bit: Using Design-Based Research to Improve the Health Literacy of Adolescents
St. Jean, Beth; Taylor, Natalie Greene; Kodama, Christie; Follman, Rebecca; Casciotti, Dana
2015-01-01
Background Although a low health literacy level has been found to be among the most powerful predictors of poor health outcomes, there is very little research focused on assessing and improving the health literacy skills of adolescents, particularly those from socioeconomically disadvantaged backgrounds. The vast majority of existing research focuses solely on reading comprehension, despite the fact that health literacy is actually a multifaceted concept, which entails many different types of skills. Objective The aim of this paper is to first mine existing literature to identify the many different skills that have been posited to constitute health literacy, and then, using this collection of skills as an overarching structure, to highlight the challenges that disadvantaged youth participating in our HackHealth after-school program encounter as they identify and articulate their health-related information needs, search for health-related information online, assess the relevance and credibility of this information, and manage and make use of it. Methods We utilized the design-based research method to design, implement, and revise our HackHealth program. To collect data regarding HackHealth participants’ health literacy skills and associated challenges, we used a variety of methods, including participant observation, surveys, interviews, focus groups, and logging of Web browser activities. We also collected data through specialized instructional activities and data collection forms that we developed for this purpose. Quantitative and qualitative techniques were used to analyze this data, as well as all of the artifacts that each student produced, including their final projects. Results We identified the various challenges that the 30 HackHealth participants faced in completing various health-related information activities during the course of the program. Based on these findings, we describe important implications for working with youth from socioeconomically disadvantaged backgrounds, how to assess and improve their health literacy skills, and offer specific recommendations for health literacy instruction aimed at this population. Conclusions With an increased societal focus on health and a shift from viewing patients as passive recipients of medical care to viewing them as active arbiters of their own health, today’s youth need to possess an array of health literacy skills to ensure that they can live long and healthy lives. Working with adolescents to help them develop and practice these skills will also help to break the cycle between poor health literacy and poor health outcomes, thereby reducing health disparities and improving the long-term outlook for the health of our nation. PMID:26025101
photovoltaic (PV) modules, inspections for root cause of module failures in the field, and accelerated lifetime delamination. His research interests are in modeling of degradation processes of PV modules, module integrated analysis of PV degradation data. He also explores accelerated multi-stress and combined stress testing to
Hack City Summer: Computer Camps Can Bring a Vacation of Keyboard Delights.
ERIC Educational Resources Information Center
Shell, Ellen Ruppel
1983-01-01
Activities at a summer computer camp (Camp Atari held at East Stroudsburg State College PA) are described. The curriculum, using logic, systematic analysis, and other fundamental programing skills, teaches students to interact effectively and creatively with computers. Sources for finding a computer camp are included. (JN)
ERIC Educational Resources Information Center
Schaffhauser, Dian
2009-01-01
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
THE INFORMATION BATTLESPACE: A LEVEL PLAYING FIELD FOR THE ASYMMETRIC FOE
2016-02-01
America” to carry out attacks on those listed.7 Despite ISIS claims that the list had been obtained via hacking by an advanced, tech-savvy division... Facebook , YouTube and Twitter. Many general officers maintain personal social media accounts that they personally use to communicate with multiple
Hacking Say and Reviving ELIZA: Lessons from Virtual Environments
ERIC Educational Resources Information Center
Mazar, Rochelle; Nolan, Jason
2009-01-01
As text-based predecessors to Second Life, MOOs can offer educators important insights on managing virtual communities to create rich, meaningful learning experiences. Rochelle Mazar and Jason Nolan outline two instructional experiments in MOOs that have implications for current educational practice in Second Life. One involves modifying and…
The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.
ERIC Educational Resources Information Center
Stewart, Michael
2000-01-01
In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help…
Right and Wrong Online. Teaching Your Children Ethics in Cyberspace.
ERIC Educational Resources Information Center
Our Children, 1998
1998-01-01
Parents must describe and reinforce the importance of truthfulness, responsibility, and respect when their children use the Internet. The paper presents potential situations that could arise and discusses issues related to the law online, copyrighted materials, copying or distributing software, privacy, hacking, and obscenity. A sidebar offers…
ERIC Educational Resources Information Center
Harris, Mark A.; Patten, Karen P.
2015-01-01
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Hacked Landscapes: Tensions, Borders, and Positionality in Spatial Literacy
ERIC Educational Resources Information Center
Schmidt, Sandra J.
2017-01-01
By focusing on critical geographies, landscape, and spatial literacy, this article evaluates a semester-long spatial justice project conducted in a preservice teacher education program. The analysis recognizes the limitations of reading the products literally as a means of comprehending spatial representation. It expands the analysis by hacking…
Workshop Report: The Future of ROK Navy-US Navy Cooperation
2007-10-01
vulnerability also increases. Cyber attacks to paralyze information and communication systems through hacking , virus attacks on computers, and jamming...Pacific Fleet (N5) 250 Makalpa Dr. Pearl Harbor, HI 96860-7000 Ms. Ariane L. Whitemore Chief of Staff, Strategic Planning and Policy HQ USPACOM/ J5 COS
NASA GIBS & Worldview - Lesson Ready Visualizations
NASA Astrophysics Data System (ADS)
Cechini, M. F.; Boller, R. A.; Baynes, K.; Gunnoe, T.; Wong, M. M.; Schmaltz, J. E.; De Luca, A. P.; King, J.; Roberts, J. T.; Rodriguez, J.; Thompson, C. K.; Alarcon, C.; De Cesare, C.; Pressley, N. N.
2016-12-01
For more than 20 years, the NASA Earth Observing System (EOS) has operated dozens of remote sensing satellites collecting 14 Petabytes of data that span thousands of science parameters. Within these observations are keys the Earth Scientists have used to unlock many things that we understand about our planet. Also contained within these observations are a myriad of opportunities for learning and education. The trick is making them accessible to educators and students in convenient and simple ways so that effort can be spent on lesson enrichment and not overcoming technical hurdles. The NASA Global Imagery Browse Services (GIBS) system and NASA Worldview website provide a unique view into EOS data through daily full resolution visualizations of hundreds of earth science parameters. For many of these parameters, visualizations are available within hours of acquisition from the satellite. For others, visualizations are available for the entire mission of the satellite. Accompanying the visualizations are visual aids such as color legends, place names, and orbit tracks. By using these visualizations, educators and students can observe natural phenomena that enrich a scientific education. This presentation will provide an overview of the visualizations available in NASA GIBS and Worldview and how they are accessed. We will also provide real-world examples of how the visualizations have been used in educational settings including planetariums, visitor centers, hack-a-thons, and public organizations.
Semeraro, Dominique; Passalacqua, Nicholas V; Symes, Steven; Gilson, Thomas
2012-11-01
Understanding patterns of trauma is important to determining cause and manner of death. A thorough evaluation of taphonomy, trauma, and bone fracture mechanisms is necessary to reconstruct the circumstances of the death. This study examines the skeletal trauma caused by boat propeller strikes in terms of wound characteristics and location based on three cases from Rhode Island. These case studies review the traumatic characteristics caused by propeller injuries and highlight the anatomic regions most likely to sustain skeletal trauma. With this information, investigators may be able to identify propeller trauma even in severely decomposed remains. The discussion of boat propeller trauma also raises issues regarding how forensic anthropologists and forensic pathologists classify trauma (specifically blunt force vs. sharp) and highlights semantic issues arising in trauma classification. The study also discusses why these propeller cases should be classified as blunt trauma rather than sharp or chop/hack trauma. Ultimately, the authors urge consistency and communication between pathologist and forensic anthropologists performing trauma analyses. © 2012 American Academy of Forensic Sciences.
MACULA: Fast Modeling of Rotational Modulations of Spotty Stars
NASA Astrophysics Data System (ADS)
Kipping, David
2015-08-01
Rotational modulations are frequently observed on stars observed by photometry surveys such as Kepler, with periodicities ranging from days to months and amplitudes of sub-parts-per-million to several percent. These variations may be studied to reveal important stellar properties such as rotational periods, inclinations and gradients of differential rotation. However, inverting the disk-integrated flux into a solution for spot number, sizes, contrasts, etc is highly degenerate and thereby necessitating an exhaustive search of the parameter space. In recognition of this, the software MACULA is designed to be a fast forward model of circular, grey spots on rotating stars, including effects such as differential rotation, spot evolution and even spot penumbra/umbra. MACULA seeks to achieve computational efficiency by using a wholly analytic description of the disk-integrated flux, which is described in Kipping (2012), leading to a computational improvement of three orders-of-magnitude over its numerical counterparts. As part of the hack day, I'll show how to simulate light curves with MACULA and provide examples with visualizations. I will also discuss the on-going development of the code, which will head towards modeling spot crossing events and radial velocity jitter and I encourage discussions amongst the participants on analytic methods to this end.
Boisen, Kirsten A; Boisen, Anne; Thomsen, Stine Legarth; Matthiesen, Simon Meggers; Hjerming, Maiken; Hertz, Pernille Grarup
2015-12-09
There is a need for youth-friendly hospital environments as the ward environment may affect both patient satisfaction and health outcomes. To involve young people in designing youth-friendly ward environment. We arranged a design competition lasting 42 h (Hackathon). Students in architecture, design, engineering, communication and anthropology participated (27 young adults) - forming eight groups. Adolescents and young adults (AYA) with current or former cancer experience participated as sparring partners. We provided workspace and food during the weekend. The groups presented their products to a jury and relevant stakeholders. The groups created eight unique design concepts. The young designers were extremely flexible listening to ideas and experiences from the young patients, which led to common features including individual and flexible design, privacy in two-bed wardrooms and social contact with other hospitalized AYA. The winning project included an integrated concept for both wardrooms and the AYA day room, including logos and names for the rooms and an 'energy wall' in the day room. A hackathon event was an effective mode of youth participation. The design concepts and ideas were in line with current evidence regarding pleasing hospital environment and youth-friendly inpatient facilities and may be applicable to other young patients.
Enhanced Cyberspace Defense through Covert Publish-Subscribe Broker Pattern Communications
2008-06-01
http://www.cnn.com/TECH/computing/9902/26/t_t/internet.time/, accessed June 2008. [3] C. V. Clausewitz, On War, 1st ed.. London, England: Kegan ...34 2003. [17] T. Greene . (2008 , Apr.) Network World. [Online]. http://www.networkworld.com/news/2008/040908-rsa-hack-power-grid.html, accessed
Always Wanted to Hack the Pentagon? DoD Says Bring It
test and find vulnerabilities in the department's applications, websites and networks, he added Resolve/Foal Eagle 2010, a joint U.S. and South Korean command-post exercise with computer-based command-post exercise with computer-based simulations and field exercises. Cook said other networks
Hacking Your Ride: Is Web 2.0 Creating Vulnerabilities To Surface Transportation
2016-09-01
SMSN’s vulnerabilities, and uncovers terrorists’ malign use of social media for intelligence gathering. Academic researchers have already discovered...of social media for intelligence gathering. Academic researchers have already discovered threats in social navigation platforms such as Waze and...51 4. Social Navigation as Intelligence ................................................52 C. FUTURE CONCERNS
Diagnostic ultrasound exposure in man.
Gramiak, R
1975-09-01
In his review of the AAPM statement on ultrasound, the author feels that allowing "some" research or demonstration on normal persons in the face of cautionary statements on as yet unknown side effects is an inconsistent position. The use of videotapes and the development of simulators hacked by data banks are offered in place of tissue phantoms.
Developing a Pedagogy of "Making" through Collaborative Self-Study
ERIC Educational Resources Information Center
Bullock, Shawn M.; Sator, Andrea
2018-01-01
We believe that the ideas associated with the Maker Movement have profound implications for teacher education. We have isolated the pedagogical principles of hack, adapt, design, and create as central to exploring how they work with teacher candidate participants in a maker pedagogy lab. We frame these ideas as Maker Pedagogy, which is the…
ERIC Educational Resources Information Center
Dewey, Patrick R.
1986-01-01
The history of patron access microcomputers in libraries is described as carrying on a tradition that information and computer power should be shared. Questions that all types of libraries need to ask in planning microcomputer centers are considered and several model centers are described. (EM)
ERIC Educational Resources Information Center
Yu, Chong Ho
Although quantitative research methodology is widely applied by psychological researchers, there is a common misconception that quantitative research is based on logical positivism. This paper examines the relationship between quantitative research and eight major notions of logical positivism: (1) verification; (2) pro-observation; (3)…
ERIC Educational Resources Information Center
Vigh, Pia
The paper presents the model behind net2art, a joint Nordic project of creating a platform for Nordic net art. The projects background and scope, organization, impact and experiences, funding structures, and copyright issues are covered. The paper argues that museums do not have a natural role in the distribution of net art (i.e., art that is made…
01010000 01001100 01000001 01011001: Play Elements in Computer Programming
ERIC Educational Resources Information Center
Breslin, Samantha
2013-01-01
This article explores the role of play in human interaction with computers in the context of computer programming. The author considers many facets of programming including the literary practice of coding, the abstract design of programs, and more mundane activities such as testing, debugging, and hacking. She discusses how these incorporate the…
Suggested Approaches to the Measurement of Computer Anxiety.
ERIC Educational Resources Information Center
Toris, Carol
Psychologists can gain insight into human behavior by examining what people feel about, know about, and do with, computers. Two extreme reactions to computers are computer phobia, or anxiety, and computer addiction, or "hacking". A four-part questionnaire was developed to measure computer anxiety. The first part is a projective technique which…
Hacking an Algal Transcription Factor for Lipid Biosynthesis.
Chen, Xiulai; Hu, Guipeng; Liu, Liming
2018-03-01
Transcriptional engineering is a viable means for engineering microalgae to produce lipid, but it often results in a trade-off between production and growth. A recent study shows that engineering a single transcriptional regulator enables efficient carbon partitioning to lipid biosynthesis with high biomass productivity. Copyright © 2017 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Wynn, Cynthia L.
2017-01-01
An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…
28 CFR 541.13 - Prohibited acts and disciplinary severity scale.
Code of Federal Regulations, 2010 CFR
2010-07-01
... personal safety; e.g., hack-saw blade) A. Recommend parole date rescission or retardation.B. Forfeit earned... disrupts or interferes with the security or orderly running of the institution or the Bureau of Prisons... interferes with the security or orderly running of the institution or the Bureau of Prisons. (Conduct must be...
28 CFR 541.3 - Prohibited acts and available sanctions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...
28 CFR 541.3 - Prohibited acts and available sanctions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...
28 CFR 541.3 - Prohibited acts and available sanctions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...
28 CFR 541.3 - Prohibited acts and available sanctions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...
Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008
2009-01-16
involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These
Wireless Sensor Node Data Gathering and Location Mapping
2012-03-01
adaptive two-phase approach to WiFi location sensing,” 4 th Int. Conf. on Pervasive Computing and Communications Workshops, Pisa, Italy, 2006, pp. 452...wrt.v24_micro_generic.bin, March 2010. [11] P. Asadoorian and L. Pesce, Linksys WRT54G Ultimate Hacking , Burlington, MA: Syngress, 2007, pp. 25. 32
All About PID - Testing and Avoidance in the Field
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hacke, Peter; Johnston, Steve
2016-09-01
Potential-induced degradation can cause significant power loss in modules if the appropriate precautions are not taken. In the first part of a new series in PV Tech Power on module failure, Peter Hacke and Steve Johnston assess the current state-of-the-art in detecting, avoiding and mitigating the worst effects of PID.
USDA-ARS?s Scientific Manuscript database
Lemongrass [Cymbopogon flexuosus (Steud.) Wats, (syn. Andropogon nardus var. flexuosus Hack; A. flexuosus Nees)] is one of the most widely grown essential oil plants in the world. Field experiments were conducted at Verona and Poplarville, Mississippi, to evaluate the effects of N (0, 40, 80, and 16...
Deterring Iran’s Use of Offensive Cyber: A Case Study
2014-10-01
departments, such as Sharif University of Technology, began to hold hacking competitions to identify potential recruits.26 Dr . Hassan Abbasi, as well-known...that discovered it—to use social networking sites such as LinkedIn and Facebook to target hundreds of U.S. officials and their connections in order
A Framework for Event Prioritization in Cyber Network Defense
2014-07-15
U.S.," Reuters (US online Edition), pp. http://www.reuters.com/article/2013/11/06/net-us-usa-china- hacking - idUSBRE9A51AN20131106, 6 Nov 2013. [2...expressed individually, or as a single vector by using the magnitude of these three factors (cell J5 in Table 5
The Benefits, and Fear, of Cookie Technology
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
"Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…
Teaching Hackers: School Computing Culture and the Future of Cyber-Rights.
ERIC Educational Resources Information Center
Van Buren, Cassandra
2001-01-01
Discussion of the need for ethical computing strategies and policies at the K-12 level to acculturate computer hackers away from malicious network hacking focuses on a three-year participant observation ethnographic study conducted at the New Technology High School (California) that examined the school's attempts to socialize its hackers to act…
New results of the spectral observations of CP stars
NASA Astrophysics Data System (ADS)
Polosukhina, N. S.; Shavrina, A. V.; Drake, N. A.; Kudryavtsev, D. O.; Smirnova, M. A.
2010-04-01
The lithium problem in Ap-CP stars has been, for a long time, a subject of debate. Individual characteristics of CP stars, such as high abundance of the rare-earth elements presence of magnetic fields, complicate structure of the surface distribution of chemical elements, rapid oscillations of some CP-stars, make the detection of the lithium lines and the determination of the lithium abundance, a difficult task. During the International Meeting in Slovakia in 1996, the lithium problem in Ap-CP stars was discussed. The results of the Li study carried out in CrAO Polosukhina (1973-1976), the works of Hack & Faraggiana (1963), Wallerstein & Hack (1964), Faraggiana et al. (1992-1996) formed the basis of the International project ‘Lithium in the cool CP-stars with magnetic fields’. The main goal of the project was, using systematical observations of Ap-CP stars with phase rotation in the spectral regions of the resonance doublet Li I 6708 Å and subordinate 6104 Å lithium lines with different telescopes, to create a database, which will permit to explain the physical origin of anomalous Li abundance in the atmospheres of these stars.
NASA Astrophysics Data System (ADS)
Stoof, Cathelijne; Hut, Rolf
2016-04-01
There's a secret MacGyver in every researcher, whether they realize it or not. It's always a challenge to get setups working, transport material, or create a solution that works in the exact environment that you have. We have our own tricks to deal with this, and know you have them too. Do you use a kitchen bowl and spatula to evenly mix water and sand, sanitary pads (super absorbent) to stop leaking flow experiments), nylons to line piezometers, duct tape for everything? No matter how obvious or simple your own geoscience hacks are to you, we'd like to hear about them! On this blank poster and on Twitter (#geosciencehack), we invite you to share the tricks that make your field and lab research work. We will collect all ideas and communicate them through Twitter (@geosciencehack), a blog (www.rolfhut.nl), and if we have sufficient material we plan to submit a joint paper to the upcoming MacGyver special issue in Frontiers, so leave your contact details along with your geoscience hack if you'd like to be a co-author.
Rubinstein, C Dustin; Wolfner, Mariana F
2014-01-01
Seminal proteins are critical for reproductive success in all animals that have been studied. Although seminal proteins have been identified in many taxa, and female reproductive responses to receipt of these proteins have been documented in several, little is understood about the mechanisms by which seminal proteins affect female reproductive physiology. To explore this topic, we investigated how a Drosophila seminal protein, ovulin, increases ovulation rate in mated females. Ovulation is a relatively simple physiological process, with known female regulators: previous studies have shown that ovulation rate is promoted by the neuromodulator octopamine (OA) in D. melanogaster and other insects. We found that ovulin stimulates ovulation by increasing OA signaling in the female. This finding supports a model in which a male seminal protein acts through "hacking" a well-conserved, regulatory system females use to adjust reproductive output, rather than acting downstream of female mechanisms of control or in parallel pathways altogether. We also discuss similarities between 2 forms of intersexual control of behavior through chemical communication: seminal proteins and pheromones.
After the data breach: Managing the crisis and mitigating the impact.
Brown, Hart S
2016-01-01
Historically, the unauthorised access and theft of information was a tactic used between countries as part of espionage campaigns, during times of conflict as well as for personal and criminal purposes. The consumers of the information were relatively isolated and specific. As information became stored and digitised in larger quantities in the 1980s the ability to access mass amounts of records at one time became possible. The expertise needed to remotely access and exfiltrate the data was not readily available and the number of markets to monetise the data was limited. Over the past ten years, shadow networks have been used by criminals to collaborate on hacking techniques, exchange hacking advice anonymously and commercialise data on the black market. The intersection of these networks along with the unintentional losses of information have resulted in 5,810 data breaches made public since 2005 (comprising some 847,807,830 records) and the velocity of these events is increasing. Organisations must be prepared for a potential breach event to maintain cyber resiliency. Proper management of a breach response can reduce response costs and can serve to mitigate potential reputational losses.
What caused the breach? An examination of use of information technology and health data breaches.
Wikina, Suanu Bliss
2014-01-01
Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states-Virginia, Illinois, California, Florida, New York, and Tennessee-in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates.
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Wikina, Suanu Bliss
2014-01-01
Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states—Virginia, Illinois, California, Florida, New York, and Tennessee—in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates. PMID:25593574
Prime Suspect, Second Row Center
ERIC Educational Resources Information Center
Laird, Ellen A.
2011-01-01
His father had been hacked to death in his own bed with an ax the previous November. His mother was similarly brutalized and left for dead with her husband but survived. On the last Monday of that August, after several months and many investigative twists, turns, and fumbles, there sat the son--the prime suspect--in Ellen Laird's literature class,…
, physics and chemistry. (1998-2002) Featured Publications Fu, R., T.L. James, M. Woodhouse. "Economic /10.1039/C3EE40701B. Goodrich, A., P. Hacke, Q. Wang, B. Sopori, R. Margolis, T.L. James, and Woodhouse, M InformationMicrosoft Excel. Woodhouse, M., A. Goodrich, R. Margolis, T.L. James, M. Lokanc, and R. Eggert. "
Five Ways to Hack and Cheat with Bring-Your-Own-Device Electronic Examinations
ERIC Educational Resources Information Center
Dawson, Phillip
2016-01-01
Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves.…
Creative Nonfiction in the Classroom: Extending the Boundaries of Literary Study.
ERIC Educational Resources Information Center
Skrebels, Paul
The net effect of the early experiences of writing "compositions" which involved either describing the circumstances of a student's life or recounting the kinds of events encapsulated in that proverbially hack title, "What I Did on My Summer Vacation," has been a tendency for older teachers to devalue nonfiction as an object of…
ERIC Educational Resources Information Center
Jensen, Laura M.; Miller, Rebecca
2009-01-01
Accumulating evidence suggests children born premature are at increased risk of lower cognitive abilities, poor academic performance, low social competence and behavioral problems, compared with individuals born full-term (e.g., Whitside-Mansell, Barrett, Bradley & Gargus, 2006; Litt, Taylor, Klein, & Hack, 2005). The goal of the current…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Borovetz, H.S.; Shaffer, F.; Schaub, R.
This paper discusses a series of experiments to visualize and measure flow fields in the Novacor left ventricular assist system (LVAS). The experiments utilize a multiple exposure, optical imaging technique called fluorescent image tracking velocimetry (FITV) to hack the motion of small, neutrally-buoyant particles in a flowing fluid.
Listening to Students: How I Came to Love My Low-Residency Program
ERIC Educational Resources Information Center
Atwood, Megan
2009-01-01
Finding an academic program that caters to children's literature is hard. Many people consider children's literature no more sophisticated than its audience--an arena for those who cannot hack it either as writers or as teachers of adult literature. This author, however, found a new program--a "low residency program"--at Hamline…
(DEPSCOR FY 09) Obfuscation and Deobfuscation of Intent of Computer Programs
2012-12-21
increased as the malware distribution mechanism has moved to the web through infected sites. In this use a site is hacked so as to distribute malware to...Simpósio Brasileiro em Segurança da Informaçao e de Sistemas Computacionais (2009). (Chen et al., 2012) Jundong Chen, Matthias R. Brust, Vir V. Phoha
Google and the "Twisted Cyber Spy" Affair: US-Chinese Communication in an Age of Globalization
ERIC Educational Resources Information Center
Hartnett, Stephen John
2011-01-01
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Czerwinski, Michael; Spence, Jason R
2017-01-05
Recently in Nature, Gjorevski et al. (2016) describe a fully defined synthetic hydrogel that mimics the extracellular matrix to support in vitro growth of intestinal stem cells and organoids. The hydrogel allows exquisite control over the chemical and physical in vitro niche and enables identification of regulatory properties of the matrix. Copyright © 2017 Elsevier Inc. All rights reserved.
Policy-Aware Sender Anonymity in Location-Based Services
ERIC Educational Resources Information Center
Vyas, Avinash
2011-01-01
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
75 FR 76263 - Inmate Discipline Program/Special Housing Units: Subpart Revision and Clarification
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
... security or orderly running of the institution or the Bureau of Prisons most like another prohibited act in... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... Conduct which disrupts or interferes with the security or orderly running of the institution or the Bureau...
ERIC Educational Resources Information Center
Mei, Jianyang
2016-01-01
This research project uses a large research university in the Midwest as a research site to explore the time management skills of international students and analyzes how using the Course Hack, an online Learning Management System (LMS) calendar tool, improves participants' time management skills and positively impacts their academic performance,…
Recurrent selection for increased seed germination in sand bluestem (Andropogon hallii)
USDA-ARS?s Scientific Manuscript database
Water is essential for plant growth and under field conditions is often inadequate for satisfactory seed germination and seedling growth. The objective of this research was to improve the seed germination of sand bluestem (Andropogon hallii Hack.) lines ‘AB-medium Syn-0’ and ‘CD-tall Syn-0’ at low ...
Picture of the Week: Hacking the bio-nano interface for better biofuels
) influence electron transfer between the enzyme and the electrode to determine the best placement of enzymes compounds) influence electron transfer between the enzyme and the electrode to determine the best placement studied how three quinones (a class of organic compounds) influence electron transfer between the enzyme
Security Meets Real-World Computing. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence K.
2005-01-01
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Should There Be an Expectation of Privacy in the Library? Online Treasures
ERIC Educational Resources Information Center
Balas, Janet L.
2005-01-01
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
The Social Organization of the Computer Underground
1989-08-01
colleagues, with only small groups approaching peer relationships. 14 . SUBJECT TERMS HACK, Computer Underground 15. NUMBER OF PAGES 16. PRICE CODE 17...between individuals involved in a common activity (pp. 13- 14 ). Assessing the degree and manner in which the...criminalized over the past several years . Hackers, and the "danger" that they present in our computer dependent
ERIC Educational Resources Information Center
Kellam, Lynda M.; Cox, Richard; Winkler, Hannah
2009-01-01
Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…
ERIC Educational Resources Information Center
Borja, Rhea R.
2006-01-01
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
2016-01-01
This theme issue has the founding ambition of landscaping data ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing and use), algorithms (including artificial intelligence, artificial agents, machine learning and robots) and corresponding practices (including responsible innovation, programming, hacking and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data ethics builds on the foundation provided by computer and information ethics but, at the same time, it refines the approach endorsed so far in this research field, by shifting the level of abstraction of ethical enquiries, from being information-centric to being data-centric. This shift brings into focus the different moral dimensions of all kinds of data, even data that never translate directly into information but can be used to support actions or generate behaviours, for example. It highlights the need for ethical analyses to concentrate on the content and nature of computational operations—the interactions among hardware, software and data—rather than on the variety of digital technologies that enable them. And it emphasizes the complexity of the ethical challenges posed by data science. Because of such complexity, data ethics should be developed from the start as a macroethics, that is, as an overall framework that avoids narrow, ad hoc approaches and addresses the ethical impact and implications of data science and its applications within a consistent, holistic and inclusive framework. Only as a macroethics will data ethics provide solutions that can maximize the value of data science for our societies, for all of us and for our environments. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336805
Reintroduction and translocation of 'Oma'o: A comparison of methods
Fancy, Steven G.; Nelson, Jay T.; Harrity, Peter; Kuhn, Jope; Kuhn, Marla; Kuehler, Cyndi; Giffin, Jon G.
2001-01-01
We reintroduced 25 captive-reared ‘Oma‘o (Myadestes obscurus) and translocated 16 wild-caught ‘Oma‘o to former range in the Pu‘u Wa‘awa‘a Wildlife Sanctuary on the island of Hawai‘i to develop and refine methods that might be used in the recovery of the closely related and critically endangered Puaiohi (Myadestes palmeri) on Kaua‘i. Captive-reared ‘Oma‘o were soft-released from two hacking towers at 66-57 days of age, whereas wild birds (all adults) were hard-released on the same day as capture or after a l-9 day holding period. The fate of all birds was monitored daily for two months using radiotelemetry. Only 16 of 76 (21%) wild-caught ‘Oma‘o were translocated because of problems with active avian poxlike lesions, an imbalanced sex ratio, or because birds would not eat during holding. Survival to 30 days post-release was similar for birds released by the two methods: three captive-reared ‘Oma‘o were killed by predators, and four wild ‘Oma‘o died of handling/transport stress. ‘Oma‘o populations are highly male biased, and a sex ratio of captive-hatched eggs of 18 males to 6 females suggests that the sex ratio may not be 1:1 at hatching. Translocation of hatching-year ‘Oma‘o would not be practical because of very low capture success for juvenile ‘Oma‘o and the skewed sex ratio. Fidelity to the release site was higher for captive-reared birds, and this approach is less expensive for ‘Oma‘o and more likely to result in successful establishment of a new population in continuous habitat.
Design Thinking as a Tool for Interdisciplinary Education in Health Care.
van de Grift, Tim C; Kroeze, Renske
2016-09-01
Grappling with complex structural health care issues requires medical professionals to have training in skills and knowledge that go beyond the basic and clinical sciences. It is also crucial for health care professionals to be able to work collaboratively. However, medical education has only limitedly institutionalized the teaching of these skills. In fall 2014, a one-semester crossover course called Hacking Healthcare was developed by the University of Amsterdam in cooperation with the Gerrit Rietveld Academie of Fine Arts and six health care institutions in the greater Amsterdam area. The course comprised one or two weekly three-hour evening sessions consisting of a lecture, workshop, and group work. It was structured using the three stages of the design thinking process-inspiration, ideation, and implementation. Twenty-seven medicine, psychology, other science disciplines, and art students participated, working in interdisciplinary groups on an assigned case study. The course yielded both unconventional and holistic key insights and a wide range of tangible outcomes, which were also considered to be relevant by the patient. Among university (i.e., nonart) students (n = 14), the average overall score of the course was 8.5 out of 10, with 10 being the highest rating. Aspects of the course that were mentioned as positive points were the activating teaching environment, academic development, and development of collaboration skills and creative capabilities. This approach could be applied in other fields, such as medical education on a larger scale, clinical practice, and the design of scientific research.
An analysis of the concept of teaching in elementary school science education
NASA Astrophysics Data System (ADS)
Seatter, Carol Eunice Scarff
The problem for this thesis arises directly from several years of observation of science classrooms in British Columbia. The troubling phenomenon seen within numerous classrooms, taught by teachers claiming to be constructivist teachers, involved teachers fostering the idea that children can think about science in terms of their own ideas, that is, that children can think about science in common-sense terms. In the many cases I have observed, teachers justify this practice on the grounds of constructivist theory. However, this kind of "constructivist teaching" does not, in my opinion, lead to scientific reasoning. My argument begins with the premise that the development of scientific reasoning in children is necessary for science education. I will argue that the currently popular "constructivist" movement has significant potential to fail in producing scientific reasoning in children, as did its predecessor, the "discovery learning" movement of the 1960s. The incommensurable differences between scientific and common-sense reasoning are presented and discussed. This thesis examines constructivist theory in terms of its potential to hinder the development of scientific reasoning in children. Two features of the constructivist writings are examined: those which pertain to the nature of science, and those relating to the concept of teaching. A chapter on the logic of scientific inquiry is central to the thesis, as it describes and explains the concepts, forms of explanation and truth criteria unique to the discipline of science. The epistemological foundations of science education are discussed in terms of the realist/instrumentalist debate. The thesis argues in favor of a sophisticated realist view of knowledge, such as those offered by Hacking and Matthews who take into account Hanson's "theory-laden" observation without falling prey to a naive realist view. Reasoning in science is compared with children's common-sense reasoning in an attempt to further understand the phenomenon of children's science. The chapter on teaching discusses intellectual and strategic teaching acts and relates these to Roberts' notion of the "Trialogue" teaching style. Roberts' notion of "Abandonment"---a style of teaching in which the teacher's prerogative to share his or her expertise is omitted---is presented as a way of discussing the potential for abandonment in contemporary science education. The final chapter addresses the question, "What can we do about the potential problem of Abandonment?" Strategies are presented in which students are able to develop scientific understanding with respect to objects and events, while allowing the teacher to implement intellectual teaching acts, necessary for the teaching of scientific concepts.
The Weak Spots in Contemporary Science (and How to Fix Them)
2017-01-01
Simple Summary Several fraud cases, widespread failure to replicate or reproduce seminal findings, and pervasive error in the scientific literature have led to a crisis of confidence in the biomedical, behavioral, and social sciences. In this review, the author discusses some of the core findings that point at weak spots in contemporary science and considers the human factors that underlie them. He delves into the human tendencies that create errors and biases in data collection, analyses, and reporting of research results. He presents several solutions to deal with observer bias, publication bias, the researcher’s tendency to exploit degrees of freedom in their analysis of data, low statistical power, and errors in the reporting of results, with a focus on the specific challenges in animal welfare research. Abstract In this review, the author discusses several of the weak spots in contemporary science, including scientific misconduct, the problems of post hoc hypothesizing (HARKing), outcome switching, theoretical bloopers in formulating research questions and hypotheses, selective reading of the literature, selective citing of previous results, improper blinding and other design failures, p-hacking or researchers’ tendency to analyze data in many different ways to find positive (typically significant) results, errors and biases in the reporting of results, and publication bias. The author presents some empirical results highlighting problems that lower the trustworthiness of reported results in scientific literatures, including that of animal welfare studies. Some of the underlying causes of these biases are discussed based on the notion that researchers are only human and hence are not immune to confirmation bias, hindsight bias, and minor ethical transgressions. The author discusses solutions in the form of enhanced transparency, sharing of data and materials, (post-publication) peer review, pre-registration, registered reports, improved training, reporting guidelines, replication, dealing with publication bias, alternative inferential techniques, power, and other statistical tools. PMID:29186879
Flame Retardant: Cyberbullies Torment Their Victims 24/7: Here's How to Stop the Abuse
ERIC Educational Resources Information Center
Willard, Nancy
2006-01-01
Cyberbullying is the use of electronic information such as e-mail and other digital age tools to bully or harass individuals. Cyberbullies post angry and vulgar messages in online "flaming" wars or hack into a peer's e-mail account to wreak havoc, assaulting the reputations and already fragile egos of their young victims. The devastating effects…
Fire effects on flaked stone, ground stone, and other stone artifacts [Chapter 4
Krista Deal
2012-01-01
Lithic artifacts can be divided into two broad classes, flaked stone and ground stone, that overlap depending on the defining criteria. For this discussion, flaked stone is used to describe objects that cut, scrape, pierce, saw, hack, etch, drill, or perforate, and the debris (debitage) created when these items are manufactured. Objects made of flaked stone include...
Efficacy of stem injection treatments on striped maple in central West Virginia
Jeffrey D. Kochenderfer; James N. Kochenderfer
2008-01-01
Hack-and-squirt injection treatments were applied to individual striped maple (Acer pennsylvanicum L.) stems and to the largest stem in sprout clumps in a 25-year-old clearcut in central West Virginia to evaluate seasonal efficacy of imazapyr as Arsenal (28.7%) and glyphosate as Glypro Plus (41.0%) in water carriers. Complete control of injected...
ERIC Educational Resources Information Center
Brown, Keffrelyn D.
2013-01-01
Drawing from the work of philosophers Sylvia Wynter and Ian Hacking, in this conceptual article I argue why a humanizing critical approach to sociocultural knowledge is needed for teacher education, particularly in preparing teachers to work effectively with black students. In light of enduring concerns in teacher education with improving the…
Historical Reflections on the Ascendancy of ADHD in North America, c. 1980 - c. 2005
ERIC Educational Resources Information Center
Neufeld, Paul; Foy, Michael
2006-01-01
An ecological niche framework (Hacking, 1998) is utilised to examine the growth of ADHD in North America. The analysis suggests ADHD flourishes, at least in part, due to a complex and historically situated interaction of factors that created a niche within which a particular kind of explanation and treatment for the troubling behaviours of…
The New Taylorism: Hacking at the Philosophy of the University's End
ERIC Educational Resources Information Center
Goodman, Robin Truth
2012-01-01
This article looks at the critical writings of Mark C. Taylor. It suggests that Mark C. Taylor is rewriting a global imaginary devoid of the kind of citizenship that Henry Giroux claims as the basis for public education. Instead, Taylor wants to see the university take shape as profit-generating. According to Taylor, in lieu of learning to take…
Measuring Cyber Operations Effectiveness
2014-11-01
are advanced firewalls capable of taking limited action to block malicious traffic or hacking attempts. Their capabilities vary widely and must be...using many automated tools, included in the defense hardware and software itself. These devices include hardware and software firewalls , Network...DoD networks are probed millions of times per day…the Air Force blocks roughly two billion threats and denies two million emails each week
Radiation Effects in 3D Integrated SOl SRAM Circuits
2011-08-23
Because of the front-to- hack capacitive coupling, significant device parametric shifts can be observed unless the BOX has been engineered to...8. - l.E-12 .,..--------------, .. J5 ;::.. 5 63-MeV Protons · Tier1 • ner2 ner3 -c a • ’i 1.E-13 ----·· -----·-- ~ . = . i§ • • g • f L_
NASA Astrophysics Data System (ADS)
Polosukhina, N.; Shavrina, A.; Drake, N.; Kudryavtsev, D.; Smirnova, M.
The lithium problem in Ap-CP stars has for a long time been a subject of debates. Individual characteristics of CP stars, such as a high abundance of rare-earth elements, the presence of magnetic fields, complex structures of the surface distribution of chemical elements, rapid oscillations of some CP stars, make the detection of lithium lines, and determination of lithium abundance a challenging task. The lithium problem in Ap-CP stars was discussed during the meeting in Slovakia in 1996. The results of the Li study, carried out in CrAO (Polosukhina, 1973 - 1976), the works of Faraggiana & Hack (1963), Wallerstein & Hack (1964), Faraggiana et al. (1992 - 1996) formed the basis of the international project, called Lithium in the Cool CP Stars with Magnetic Fields. The main goal of the project was, using systematical observations of Ap-CP stars with phase rotation in the spectral regions of the resonance doublet Li I 6708 Å and subordinate 6104 Å lithium lines with different telescopes, to create a database, which will permit to explain the physical origin of the anomalous Li abundance in the atmospheres of these stars.
Mind Invasion: Situated Affectivity and the Corporate Life Hack.
Slaby, Jan
2016-01-01
In view of the philosophical problems that vex the debate on situated affectivity, it can seem wise to focus on simple cases. Accordingly, theorists often single out scenarios in which an individual employs a device in order to enhance their emotional experience, or to achieve new kinds of experience altogether, such as playing an instrument, going to the movies, or sporting a fancy handbag. I argue that this narrow focus on cases that fit a "user/resource model" tends to channel attention away from more complex and also more problematic instances of situated affectivity. Among these are scenarios in which a social domain draws individuals into certain modes of affective interaction, often by way of attunement and habituation to affective styles and interaction patterns that are normative in the domain in question. This can lead to a phenomenon that is not so much "mind extension" than "mind invasion": affectivity is dynamically framed and modulated from without, often contrary to the prior orientations of the individuals in question. As an example, I discuss affective patterns prevalent in today's corporate workplace. I claim that workplace affect sometimes contributes to what is effectively a "hack" of employees' subjectivity.
Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy
NASA Astrophysics Data System (ADS)
Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner
2014-02-01
In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.
An eight-year study of internet-based remote medical counselling.
Labiris, G; Coertzen, I; Katsikas, A; Karydis, A; Petounis, A
2002-01-01
We carried out a prospective study of an Internet-based remote counselling service. A total of 15456 Internet users visited the Website over eight years. From these, 1500 users were randomly selected for analysis. Medical counselling had been granted to 901 of the people requesting it (60%). One hundred and sixty-four physicians formed project groups to process the requests and responded using email. The distribution of patients using the service was similar to the availability of the Internet: 78% were from the European Union, North America and Australia. Sixty-seven per cent of the patients lived in urban areas and the remainder were residents of remote rural areas with limited local medical coverage. Sixty-five per cent of the requests were about problems of internal medicine and 30% of the requests concerned surgical issues. The remaining 5% of the patients sought information about recent developments, such molecular medicine or aviation medicine. During the project, our portal became inaccessible five times, and counselling was not possible on 44 days. There was no hacking of the Website. Internet-based medical counselling is a helpful addition to conventional practice.
Wiemeyer, Stanley N.
1981-01-01
One to 5 pairs of the Bald Eagle (Haliaeetus leucocephalus) were in the captive propagation project at Patuxent Wildlife Research Center during 1976-80. Four pairs produced viable eggs or young by natural mating in one or more years. Pairs laid second clutches 9 of 11 times when their first clutches were collected within 8 days of clutch completion. Sixty-nine percent of fertile artificially incubated eggs hatched; 93% of fertile parent-incubated eggs hatched. Eleven eaglets from artificially incubated eggs were hand reared. Age of birds at the time they were acquired from the wild was not a factor in their reproductive success. Ten hand-reared and 2 parent-reared young were fostered to adult Bald Eagles at active wild nests; 11 were accepted and survived. Eleven parent-reared young were provided to hacking projects. Egg transplants to wild nests were conducted, but discontinued because of poor success. Double clutching of captive pairs has not resulted in substantially increased numbers of eaglets. Additional research is needed in artificial incubation, artificial insemination, and nutrition and care of hand-reared eaglets.
Morphology and Sediment Dynamics of the East Friesian Tidal Inlets, West Germany.
1982-01-01
by three major environmental factors: (1) the tide range, (2) the nearshore wave energy, and (3) the geometry of the hack -barrier hav. Both...ASg .147 Ebb a A~ ps4 . 0.1 Fig. 15(a) and (b). For legend see opposite. 18 t7 7d 7’AI 3LI EBBTIALDELA ARI- HNE Juy1 .17 EBBW TIDAL DELTA MARINCHNL j
Lawful Hacking: Toward a Middle-Ground Solution to the Going Dark Problem
2017-03-01
14 2. 9/11 Terrorist Attacks..................................................................17 3. The Rise of Encryption Post -Snowden’s...taking pictures, posting pictures, shopping, conducting business, and searching the web. To investigate these 100,000 [the number of criminal cases his...non-U.S. person who does not have strong ties to the United States, FISA is the de facto Fourth Amendment limitation on government’s domestic
ERIC Educational Resources Information Center
White, Jim; Alexander, Larry
This student activity kit consists of a programmed, self-instructional learning guide and an accompanying instructor's manual for use in teaching trade and industrial education students how to make an adjustable C-clamp. The student guide contains step-by-step instructions in the following areas: basic layout principles; use of a hack saw, file,…
A comparison of two stem injection treatments applied to American beech in central West Virginia
Jeffrey D. Kochenderfer; Gary W. Miller; James N. Kochenderfer
2012-01-01
Efficacies for two herbicide stem injection treatments on American beech (Fagus grandifolia Ehrh.) and impacts to nontarget residual trees were evaluated in central West Virginia. The treatments consisted of hack-and-squirt injection of all beech stems ≥1.0 in. to 9.9 in. diameter at breast height (d.b.h.) with either imazapyr as Arsenal...
ERIC Educational Resources Information Center
Fenster, Judy
2004-01-01
The achievement of a group of undergraduate students enrolled in a pilot program for welfare recipients in the form of TANF (Temporary Aid to Needy Families) was compared with the achievement of general population students at an urban community college. Grades attained in a basic level, introductory Psychology course were used to measure academic…
Herbicide hardwood crop tree release in central West Virginia
Jeffrey D. Kochenderfer; Shepard M. Zedaker; James E. Johnson; David W. Smith; Gary W. Miller
2001-01-01
Chemical crop tree release treatments were applied to young hardwood stands at three sites in central West Virginia to evaluate the effectiveness of glyphosate as Accord (41.5% SL), imazapyr as Arsenal AC (53.1% SL) and Chopper (27.6% EC), and triclopyr as Garlon 3A (44.4% triethylamine salt SL), and Garlon 4 (61.6% butoxyethyl ester EC) using hack-and-squirt injection...
ERIC Educational Resources Information Center
Lind, Sophie E.; Bowler, Dermot M.
2009-01-01
This study aimed to test the hypothesis that children with autism spectrum disorder (ASD) use their knowledge of complement syntax as a means of "hacking out" solutions to false belief tasks, despite lacking a representational theory of mind (ToM). Participants completed a "memory for complements" task, a measure of receptive vocabulary, and…
Hacking the Silos: Eliminating Information Barriers Between Public Health and Law Enforcement
2018-03-01
ELIMINATING INFORMATION BARRIERS BETWEEN PUBLIC HEALTH AND LAW ENFORCEMENT by Cody L. Minks March 2018 Thesis Advisor: Anke Richter...burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this
Organizing the Army for Information Warfare
2013-03-01
US’s reputation in the global community, but by pilfering intellectual property, foiling industrial controls, and ‘ hacking ’ into secured networks...human factors can be exploited to discern passwords and circumvent other physical safeguards that secure cyber infrastructure.48 The increasing...Ranking of America’s Largest Corporations.” 7 David F. Carr, Information Week, January 25, 2012, “ Facebook : The Database Of Wealth And Power,” http
Integrated mobile robot control
NASA Astrophysics Data System (ADS)
Amidi, Omead; Thorpe, Chuck E.
1991-03-01
This paper describes the strucwre implementation and operation of a real-time mobile robot controller which integrates capabilities such as: position estimation path specification and hacking human interfaces fast communication and multiple client support The benefits of such high-level capabilities in a low-level controller was shown by its implementation for the Naviab autonomous vehicle. In addition performance results from positioning and tracking systems are reported and analyzed.
DoD Involvement with The Rendon Group
2007-03-06
34ilC:r.dix E for ;he ~"port cist:-ibL;.~;or.. Th:• team mcnbC’"’- ~r.: listed insHic ":le hack C()\\’CV. _ 5~y~ Shelton R. Young Deput\\" lnspcc:u...Net Assessment; the Defense Intelligence Agency; the Joint Staff, J39; the U.S. Central Command (J2, 13, J5 , and Public Affairs); Multi-National Force
Students at the University of Abertay Dundee Learn Computer Hacking to Defend Networks
ERIC Educational Resources Information Center
Vance, Erik
2007-01-01
In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…
Eclipsing and density effects on the spectral behavior of Beta Lyrae binary system in the UV
NASA Astrophysics Data System (ADS)
Sanad, M. R.
2010-01-01
We analyze both long and short high resolution ultraviolet spectrum of Beta Lyrae eclipsing binary system observed with the International Ultraviolet Explorer (IUE) between 1980 and 1989. The main spectral features are P Cygni profiles originating from different environments of Beta Lyrae. A set of 23 Mg II k&h spectral lines at 2800 Å, originating from the extended envelope [Hack, M., 1980. IAUS, 88, 271H], have been identified and measured to determine their fluxes and widths. We found that there is spectral variability for these physical parameters with phase, similar to that found for the light curve [Kondo, Y., McCluskey, G.E., Jeffery, M.M.S., Ronald, S.P., Carolina, P.S. McCluskey, Joel, A.E., 1994. ApJ, 421, 787], which we attribute to the eclipse effects [Ak, H., Chadima, P., Harmanec, P., Demircan, O., Yang, S., Koubský, P., Škoda, P., Šlechta, M., Wolf, M., Božić, H., 2007. A&A, 463, 233], in addition to the changes of density and temperature of the region from which these lines are coming, as a result of the variability of mass loss from the primary star to the secondary [Hoffman, J.L., Nordsieck, K.H., Fox, G.K., 1998. AJ, 115, 1576; Linnell, A.P., Hubeny, I., Harmanec, P., 1998. ApJ, 509, 379]. Also we present a study of Fe II spectral line at 2600 Å, originating from the atmosphere of the primary star [Hack, M., 1980. IAUS, 88, 271H]. We found spectral variability of line fluxes and line widths with phase similar to that found for Mg II k&h lines. Finally we present a study of Si IV spectral line at 1394 Å, originating from the extended envelope [Hack, M., 1980. IAUS, 88, 271H]. A set of 52 Si IV spectral line at 1394 Å have been identified and measured to determine their fluxes and widths. Also we found spectral variability of these physical parameters with phase similar to that found for Mg II k&h and Fe II spectral lines.
NASA Astrophysics Data System (ADS)
Tselfes, Vasilis; Paroussi, Antigoni
2009-09-01
There is, in Greece, an ongoing attempt to breach the boundaries established between the different teaching-learning subjects of compulsory education. In this context, we are interested in exploring to what degree the teaching and learning of ideas from the sciences’ “internal life” (Hacking, in: Pickering (ed) Science as practice and culture, 1992) benefits from creatively coming into contact with theatrical education as part of the corresponding curriculum subject. To this end, 57 students of the Early Childhood Education Department of the University of Athens were called to study extracts from Galileo’s Dialogue Concerning the Two Chief World Systems, Ptolemaic and Copernican, to focus on a subject that the Dialogue’s “interlocutors” forcefully disagree about and to theatrically represent (using shadow theatre techniques) what they considered as being the central idea of this clash of opinions. The results indicate that this attempt leads to a satisfactory understanding of ideas relating to the content and methodology of the natural sciences. At the same time, theatrical education avails itself of the representation of scientific ideas and avoids the clichés and hackneyed techniques that the (often) simplistic choices available in the educational context of early childhood education tend towards. The basic reasons for both facets of this success are: (a) Genuine scientific texts force the students to approach them with seriousness, and all the more so if these recount the manner in which scientific ideas are produced and are embedded in the historical and social context of the age that created them; (b) The theatrical framework, which essentially guides the students’ activities, allows (if not obliges) them to approach scientific issues creatively; in other words, it allows them to create something related to science and recognize it as theirs; and, (c) Both the narrative texts describing processes of “science making” (Bruner, J Sci Educ Technol 1:5-12, 1992) and theatrical expression constitute fields that are characterized by what, for the students, is a common and understandable manner of expression: the narrative.
ERIC Educational Resources Information Center
Siegel, Deborah
2013-01-01
Science fairs can be good motivators, but as extracurricular activities, they leave some students behind. However, by staging a Science Challenge Day at school, educators can involve all students in doing everything from choosing activities to judging projects. This article presents a model for running a successful Science Challenge Day. The…
Secure quantum key distribution
NASA Astrophysics Data System (ADS)
Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi
2014-08-01
Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.
Publications D.C. Miller, E. Annigoni, A. Ballion, J.G. Bokria, L.S. Bruckman, D.M. Burns, X. Chen, L. Elliott , J. Feng, R.H. French, S. Fowler, C.C. Honeker, M.D. Kempe, H. Khonkar, M. Köhl, L.-E. Perret-Aebi , L. Elliott, L. Feng, R.H. French, S. Fowler, X. Gu, P.L. Hacke, C.C. Honeker, M.D. Kempe, H. Khonkar
Air & Space Power Journal. Volume 27, Number 4, July-August 2013
2013-08-01
with old-fashioned radio communications . Meanwhile, our cyber warrior has successfully isolated the hack and goes on the counteroffensive with an...impostors is best solved with technological solutions. • Radio frequency identication • Biometrics • Embedded security markers Figure 4. Defectors...Museum, 26 July 1948, http://www.trumanlibrary.org/9981a.htm. 21. Jones, “ Community Defense in Afghanistan,” 11 . July–August 2013 Air & Space Power
Consortia for Improving Medicine with Innovation and Technology
2016-12-01
2011 Out - 001585 11-484 Award Closed Hacking, Adam Non-invasive Fasciotomy to Treat Extremity Compartment Syndrome 2012 Out - 001706 12-1173 Award...592 Award Closed 7 Kaushal, Shalesh Low Energy Laser as a Therapeutic for Dry Age-related Macular Degeneration 2011 Out - 001607 11-397 Award Closed...Electrostatic dry powder inhaler for constant dose respiratory drug delivery 2010 Out - 000885 10-512 Award Closed McLaughlin, Bryan An implantable
Genesis: A Framework for Achieving Software Component Diversity
2007-01-01
correctly—the initial filters develop to fix the Hotmail vulnerability could be circumvented by using alternate character encodings4. Hence, we focus on...Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo, (March 2004); http://www.greymagic.com/security/advisories/gm005-mc/. 4...EyeonSecurity, Microsoft Passport Account Hijack Attack: Hacking Hotmail and More, Hacker’s Digest. 5. Y.-W. Huang et al., Web Application Security Assessment by
Surviving Hacker Attacks Proves That Every Cloud Has a Silver Lining
ERIC Educational Resources Information Center
Cheng, Kirby
2005-01-01
When I first realized I'd been hacked, I thought, 'Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly calm voice, I told them one by one, "Sorry to let you know, our server is down; it has been hacked…
Re-engineering the Pancreas Tumor Microenvironment: A “Regenerative Program” Hacked
Evan, Gerard I.; Hah, Nasun; Littlewood, Trevor D.; Sodir, Nicole M.; Vidal, Tania Campos; Downes, Michael; Evans, Ronald M.
2017-01-01
The “hallmarks” of pancreatic ductal adenocarcinoma (PDAC) include proliferative, invasive and metastatic tumor cells and an associated dense desmoplasia comprised of fibroblasts, pancreatic stellate cells, extracellular matrix and immune cells. The oncogenically-activated pancreatic epithelium and its associated stroma are obligatorily interdependent, with the resulting inflammatory and immune-suppressive microenvironment contributing greatly to the evolution and maintenance of PDAC. The peculiar pancreas-specific tumor phenotype is a consequence of oncogenes hacking the resident pancreas regenerative program, a tissue specific repair mechanism regulated by discrete super enhancer networks. Defined as genomic regions containing clusters of multiple enhancers, super enhancers play pivotal roles in cell/tissue specification, identity and maintenance. Hence, interfering with such super enhancer driven repair networks should exert a disproportionately disruptive effect on tumor versus normal pancreatic tissue. Novel drugs that directly or indirectly inhibit processes regulating epigenetic status and integrity, including those driven by histone deacetylases, histone methyltransferase and hydroxylases, DNA methyltransferases, various metabolic enzymes, and bromodomain and extra-terminal motif proteins (BETs) have shown the feasibility of disrupting super enhancer-dependent transcription in treating multiple tumor types, including PDAC. The idea that pancreatic adenocarcinomas rely on embedded super enhancer transcriptional mechanism suggests a vulnerability that can be potentially targeted as novel therapies for this intractable disease. PMID:28373363
Integrating student feedback during "Dental Curriculum Hack-A-thon".
Saffari, Shawheen S; Frederick Lambert, R; Dang, Lucy; Pagni, Sarah; Dragan, Irina F
2018-05-02
The future of dental education is at crossroads. This study used the parameter of the 2016 Dental Curriculum Hack-a-Thon to assess intra- and inter-institutional agreement between student and faculty views regarding dental curriculums to determine if there is an impact in student perceptions towards dental education from before and after the event. This exploratory, cross-sectional study involved two surveys, with Survey 1 being distributed among four faculty-student pairs of the four participating dental schools answering 14 questions. Survey 2 assessed the views of 20 participating dental students through 26 questions in a pre- and post- event survey design. Descriptive statistics were used to explore differences in perceptions towards dental education across both instrument surveys. The results revealed valuable student insights regarding intra- and inter-institutional agreement relevant for the change in dental curriculum that needs to occur. Survey 2 revealed that mandatory attendance in didactic courses, electronic based examination preferences, and the preference of preclinical courses being held in the first and second years of a four-year dental curriculum were of particular importance to student participants. The results of this study indicate that exposure and participation in subjects pertaining to dental education can be influential on student preferences and opinions on how dental education should be delivered in a four-year curriculum.
Quantum key distribution: vulnerable if imperfectly implemented
NASA Astrophysics Data System (ADS)
Leuchs, G.
2013-10-01
We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.
Using hacked point and shoot cameras for time-lapse snow cover monitoring in an Alpine valley
NASA Astrophysics Data System (ADS)
Weijs, S. V.; Diebold, M.; Mutzner, R.; Golay, J. R.; Parlange, M. B.
2012-04-01
In Alpine environments, monitoring snow cover is essential get insight in the hydrological processes and water balance. Although measurement techniques based on LIDAR are available, their cost is often a restricting factor. In this research, an experiment was done using a distributed array of cheap consumer cameras to get insight in the spatio-temporal evolution of snowpack. Two experiments are planned. The first involves the measurement of eolic snow transport around a hill, to validate a snow saltation model. The second monitors the snowmelt during the melting season, which can then be combined with data from a wireless network of meteorological stations and discharge measurements at the outlet of the catchment. The poster describes the hardware and software setup, based on an external timer circuit and CHDK, the Canon Hack Development Kit. This latter is a flexible and developing software package, released under a GPL license. It was developed by hackers that reverse engineered the firmware of the camera and added extra functionality such as raw image output, more full control of the camera, external trigger and motion detection, and scripting. These features make it a great tool for geosciences. Possible other applications involve aerial stereo photography, monitoring vegetation response. We are interested in sharing experiences and brainstorming about new applications. Bring your camera!
Australian National University Science Extension Day
ERIC Educational Resources Information Center
Fletcher, Sarah
2016-01-01
The first Australian National University (ANU) Science Extension Day was held on September 8, 2015. The ANU Science Extension Day is a project that was initiated by Theodore Primary School (ACT) and developed by Theodore Primary, Calwell High School, Science Educators Association of the ACT (SEA*ACT), and the ANU. The project was developed with a…
Science as the Center of a Coherent, Integrated Early Childhood Curriculum
ERIC Educational Resources Information Center
French, Lucia
2004-01-01
This article describes the ScienceStart! Curriculum, an early childhood curriculum that takes coherently organized science content as the hub of an integrated approach. ScienceStart! maps onto the typical preschool day and may be adapted for use in full-day or half-day preschool programs. It is designed to support the important developmental…
Speech Recognition: Acoustic, Phonetic and Lexical Knowledge
1985-08-05
J I ■ < < i* *’*"zz • sassss g SS««« SS7 «97 SSS«SS is m y^ e e 5 o « e S 2 .1 t 11 I e f Q ö i io • u ŗ...the words nock, hack , and mack li.xainplcs such as those shown in Figure 1 suggest that it is not possible to distinüuish nasaliyed and oral /owcls
American Bald Eagle Restoration Plan for Dale Hollow Lake.
1987-06-01
Wildlife Resources Agency’s (TWRA) Reelfoot Lake site, Tennessee Valley Authority’s (TVA), Land Between the Lakes operation in Kentucky, and the Alabama...three active hacking sites were visited: (1) Reelfoot Lake (Tennessee), (2) Land Between the Lakes (Kentucky), and (3) Mud Creek (Alabama). These...somewhat differently. Some of the differences are hereby noted: (1) Reelfoot Lake -- The towers here are constructed in lIve cypress trees at a height
Abuse of Customer Premise Equipment and Recommended Actions
2014-08-07
as reflectors. Descriptions of hacks and control of CPE are more difficult to provide, as such operations are more clandestine. DNS changer provides...connected to broadband Internet, as of July 2013. 7 In the United States, about 84% of those connections have a local home network, such as WiFi . 8...with 324 million WiFi -enabled consumer electronics devices shipped during 2013 in the United States alone. 10 Thus if there were a systematic
2010-09-01
in T-Mobile’s ,G IP range began expe- riencing extortion popup windows. The popup window notifies the victim that the phone has been hacked , and...range, 192.168.0.0/16. Such scanning may be of particular interest when the victim’s iPhone opportunistically connects to a WiFi LAN for Internet...connected to local WiFi networks should understand that the convenience of their Internet-tethered web, media, and email service, comes with a
Window of Opportunity: Mitigating Threats from Disruptive Technologies Before Widespread Adoption
2014-09-01
involved. A contemporary example of this is the emergence of online peer-to-peer payment systems like Bitcoin . Bitcoin was left to proliferate...collapse of Mt. Gox, a bitcoin exchange.195 The problem with this method of protection is that governmental based actions are typically a tediously slow...195 Mt. Gox was one of the foremost bitcoin exchange networks, and it collapsed when it was hacked and lost the
Air & Space Power Journal. Volume 28, Number 3, May-June 2014
2014-06-01
critical role that AETC organizations—such as the Air Force Security Assistance Training Squadron; HQ AETC/A3Q; the AAA; and, potentially , the IAAFA... Potential de- fects in the design are more likely than computer hacking and are most effectively abated through comprehensive testing demanded by the best...fascinating picture of the potential employment methodologies and skill sets demanded of crews that operate assets like FQ-X. From a cyber-defense
National Register Testing of 19 Prehistoric Archeological Sites on Fort Hood, Texas: The 1995 Season
1999-07-01
arboreal species include ash (Fraxinus sp.), redbud (Cercis canadensis), hack- berry (Celtis sp.), Texas persimmon ( Diospyros texana), and Mexican...from flotation of hearth fill were identified as Celtis sp. nutlets, woody legume, Rosaceae wood, and Diospyros virginiana wood, the latter...early 1990s. For consistency, all of their studies have focused on a single genus , Rabdotus sp., that is abundant in the archeological deposits at
Officer Education: Preparing Leaders for the Air Force of 2035
2009-02-15
Environment (JOE) 2008: Challenges and Implications for the Future Joint Force”, https://us.jfcom.mil/sites/ J5 /j59/default.aspx., 23. 6 The world...capabilities might be utilized in their work Unrestricted Warfare. In this book, “ Hacking into websites, targeting financial institutions, terrorism...Forces Command. “Joint Operating Environment: Challenges and Implications for the Future Joint Force.” https://us.jfcom.mil/sites/ J5 /j59
ERIC Educational Resources Information Center
McCubbins, Sara; Thomas, Bethany; Vetere, Michael
2014-01-01
This article describes a family-friendly science day event that encourages scientific discovery through hands-on activities, while also providing an opportunity to learn about scientific careers from actual research scientists and science educators, thereby raising awareness of the importance of STEM in our society. The one-day event bought…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wenrich, K.J.; Hlava, P.F.
An extensive suite of Ni-Co-Fe-Cu sulfides and arsenides lies within the matrix of solution-collapse breccias buried deep within the plateaus of the Grand Canyon region. Ceilings over large caverns in the Redwall collapsed, brecciating the overlying sandstone and forming cylindrical breccia pipes up to 300 ft in diameter that extend vertically as much as 3,000 ft. These highly permeable breccias served as a host for the precipitation of a suite of over 100 minerals, including uraninite, sphalerite, galena and various copper phases, in addition to the Ni-Co-bearing-phase discussed here. Intricately zoned crystals of small (<1 mm), euhedral Ni-Co-Fe-As-S minerals weremore » the first to form during the second major episode of mineralization in these pipes. Several of these phases replace minerals, such as barite and anhydrite, from the first episode. Extensive microprobe work has been done on samples from two breccia pipe mines, the Hack 2 and Orphan, which are about 50 miles apart. Mineral compositions are similar except that no copper is found in the Ni-Co-Fe phases from the Hack 2 mine, while pyrites containing 1 wt % Cu are common from the Orphan, which was mined for copper. In some of these pyrites', Cu is dominant and the mineral is actually villamaninite. Pyrites from both mines characteristically contain 0.5 to 3 wt % As. Metal contents in zones pyrite-bravoite-vaesite (M[sub 1]S[sub 2]) crystals at the Hack 2 mine range from Fe[sub 1] to Fe[sub .12], Ni[sub 0] to Ni[sub .86], and Co[sub 0] to Co[sub .10]. The metal content for polydymite-siegenite-violarite averages about (Ni[sub 2.33]Co[sub .39]Fe[sub .23])(S[sub 3.9]As[sub .1]). Orphan mine pyrite-bravoite-vaesite-villamaninite ranges in composition from pure FeS[sub 2] to (Ni[sub .6]Fe[sub .21]Co[sub .17])S[sub 2], and (Cu[sub .46]Ni[sub .27]Fe[sub .21]Co[sub .13])S[sub 2]. Of all the sulfides or arsenides found in these breccia pipes, only nickeline consistently occurs as the pure end member.« less
Effect of creatine supplementation and drop-set resistance training in untrained aging adults.
Johannsmeyer, Sarah; Candow, Darren G; Brahms, C Markus; Michel, Deborah; Zello, Gordon A
2016-10-01
To investigate the effects of creatine supplementation and drop-set resistance training in untrained aging adults. Participants were randomized to one of two groups: Creatine (CR: n=14, 7 females, 7 males; 58.0±3.0yrs, 0.1g/kg/day of creatine+0.1g/kg/day of maltodextrin) or Placebo (PLA: n=17, 7 females, 10 males; age: 57.6±5.0yrs, 0.2g/kg/day of maltodextrin) during 12weeks of drop-set resistance training (3days/week; 2 sets of leg press, chest press, hack squat and lat pull-down exercises performed to muscle fatigue at 80% baseline 1-repetition maximum [1-RM] immediately followed by repetitions to muscle fatigue at 30% baseline 1-RM). Prior to and following training and supplementation, assessments were made for body composition, muscle strength, muscle endurance, tasks of functionality, muscle protein catabolism and diet. Drop-set resistance training improved muscle mass, muscle strength, muscle endurance and tasks of functionality (p<0.05). The addition of creatine to drop-set resistance training significantly increased body mass (p=0.002) and muscle mass (p=0.007) compared to placebo. Males on creatine increased muscle strength (lat pull-down only) to a greater extent than females on creatine (p=0.005). Creatine enabled males to resistance train at a greater capacity over time compared to males on placebo (p=0.049) and females on creatine (p=0.012). Males on creatine (p=0.019) and females on placebo (p=0.014) decreased 3-MH compared to females on creatine. The addition of creatine to drop-set resistance training augments the gains in muscle mass from resistance training alone. Creatine is more effective in untrained aging males compared to untrained aging females. Copyright © 2016 Elsevier Inc. All rights reserved.
1992-02-01
If abrasive cutting equipment is not available or coolant contamination is a concern, hand operated toothed blades or saws such as hack or coping saws...325 F) CE-345 7781 387 9.0 (15 PSI/250 F) CE-aSS 7781 35.1 8.1 (15 PS1/250 F) CE-339 120 A9.4 19.3 (15 PS4 /250 F) CE-324 7781 37 * 3 10.__5 I10 MIN/15
Public Key Infrastructure Utilization to Provide an Added Level of Authenticity to Transmitted Data
2010-03-01
WIFI Wireless Fidelity – a trademark of the Wi-Fi Alliance that manufacturers may use to brand certified products that belong to a class of...removed by the receiving computer. This security concept is applicable for any WIFI or EVDO wireless transmitted computer because only the end users... hacked and keeping the computer safe from outside sources was still a definite concern. Therefore, a non-Hotmail e-mail account was designed
Philosophy Driving Ontology: Ideas from the Past Influencing the Future of Command (and Control)
2010-04-01
current communications technology is able to be penetrated and hacked by a determined and skilled foe. Two examples illustrate two different approaches...the Price of Progress: Thomas Hobbes (English, 1588-1679) lived an unusually long life that encompassed the birth of the Enlightenment. He... strategy , and supporting weapons’ technologies should be based on the idea of shaping and adapting to this change — and doing so faster than one’s
Nomonhan: Japanese-Soviet Tactical Combat, 1939 (Leavenworth Papers, Number 2)
1981-01-01
describes the evolution of thatiJA tactical doctrine, and then pre- sents a detailed examination of how a partkular Japanese infantry battalion applied...transpmtation, and a field sanitation unit composed the task force. They set out to hack down and destroy an elu- 21 s1ve foe in the barren desert steppes...this sandy covering, the desert surface was genexally firm enough to support wheeled transport. South of the Holsten Rivex eucalyptus trees grew
Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector
2014-07-01
the conclusions in the Verizon Data Breach Report 2013 that 47% of malware was downloaded through e-mail at- tachments, 48% of hacking took place...the attackers pivoted onto other systems and databases and exfiltrated approximately 8.2 GB of data . BREACH : Accessing an employee account via a...Symantec. “Internet Security Threat Report 2014.” 2013 Trends 19 (April 2014). Symantec Cor- poration. [Verizon 2013] Verizon. 2013 Data Breach Investigations
The hack attack - Increasing computer system awareness of vulnerability threats
NASA Technical Reports Server (NTRS)
Quann, John; Belford, Peter
1987-01-01
The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).
Re-engineering the Pancreas Tumor Microenvironment: A "Regenerative Program" Hacked.
Evan, Gerard I; Hah, Nasun; Littlewood, Trevor D; Sodir, Nicole M; Campos, Tania; Downes, Michael; Evans, Ronald M
2017-04-01
The "hallmarks" of pancreatic ductal adenocarcinoma (PDAC) include proliferative, invasive, and metastatic tumor cells and an associated dense desmoplasia comprised of fibroblasts, pancreatic stellate cells, extracellular matrix, and immune cells. The oncogenically activated pancreatic epithelium and its associated stroma are obligatorily interdependent, with the resulting inflammatory and immunosuppressive microenvironment contributing greatly to the evolution and maintenance of PDAC. The peculiar pancreas-specific tumor phenotype is a consequence of oncogenes hacking the resident pancreas regenerative program, a tissue-specific repair mechanism regulated by discrete super enhancer networks. Defined as genomic regions containing clusters of multiple enhancers, super enhancers play pivotal roles in cell/tissue specification, identity, and maintenance. Hence, interfering with such super enhancer-driven repair networks should exert a disproportionately disruptive effect on tumor versus normal pancreatic tissue. Novel drugs that directly or indirectly inhibit processes regulating epigenetic status and integrity, including those driven by histone deacetylases, histone methyltransferase and hydroxylases, DNA methyltransferases, various metabolic enzymes, and bromodomain and extraterminal motif proteins, have shown the feasibility of disrupting super enhancer-dependent transcription in treating multiple tumor types, including PDAC. The idea that pancreatic adenocarcinomas rely on embedded super enhancer transcriptional mechanisms suggests a vulnerability that can be potentially targeted as novel therapies for this intractable disease. Clin Cancer Res; 23(7); 1647-55. ©2017 AACR See all articles in this CCR Focus section, "Pancreatic Cancer: Challenge and Inspiration." ©2017 American Association for Cancer Research.
1983-02-25
Southwest Research Institute, Gerry Leverand, David Davidson and John Hack . 3. Discussions with Howard Katzman, Gary Steckle and George Kendall...C 10- 4 Ti-6A1-4V (4 K/ETi) -3 b.. ~. 010 10-5i I L ai f /Ec=20 x 10 6 psi w E~i=68 x 106 ps4 !i:’ )i"N2 Ti Ŕ-4 - 1x i - 3 1 0’- 3 10 - 1&~0 10ps
Guided Tour of Pythonian Museum
NASA Technical Reports Server (NTRS)
Lee, H. Joe
2017-01-01
At http:hdfeos.orgzoo, we have a large collection of Python examples of dealing with NASA HDF (Hierarchical Data Format) products. During this hands-on Python tutorial session, we'll present a few common hacks to access and visualize local NASA HDF data. We'll also cover how to access remote data served by OPeNDAP (Open-source Project for a Network Data Access Protocol). As a glue language, we will demonstrate how you can use Python for your data workflow - from searching data to analyzing data with machine learning.
Establishing and operating an incident response team
DOE Office of Scientific and Technical Information (OSTI.GOV)
Padgett, K.M.
1992-09-01
Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.
Establishing and operating an incident response team
DOE Office of Scientific and Technical Information (OSTI.GOV)
Padgett, K.M.
1992-01-01
Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.
2015-12-01
Period 2011 Out - 001585 11-484 Award Closed Hacking, Adam Non-invasive Fasciotomy to Treat Extremity Compartment Syndrome 2012 Out - 001706 12-1173...10-592 Award Closed Kaushal, Shalesh Low Energy Laser as a Therapeutic for Dry Age-related Macular Degeneration 2011 Out - 001607 11-397 Award Closed...Electrostatic dry powder inhaler for constant dose respiratory drug delivery 2010 Out - 000885 10-512 Award Closed McLaughlin, Bryan An implantable
The Ballistic Research Laboratory CAD Package Release, 4.0, Volume 1: The BRL CAD Philosophy
1991-12-01
basis. As with many large systems, parts of it were the result of years of evolution , with many band-aids, hacks, and •backward compatibility...6) and from a PATCH file VIa the FASTGEN code [ 5 ) Over a period spannmg more than fifteen years , two stgntficant communities of vulnerability...Release 4.0 follow the man pages. Release 3.0 Notes and Errata Sheets are found in the last sections of this volume. Papers discussing supplemental
The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement’s Role?
2001-04-01
defined as cyber crime or —hacker“. Although this category of hacker includes many kinds of cyber criminals , from a DOD perspective, the motivation of a...perpetrator. 6 In his book, —Fighting Computer Crime“, Wiley identifies several types of cyber criminals . They range from pranksters who perpetrate...usually financial11 This first group of cyber criminals or —hackers“ can be categorized as Unintentional Cyber actors. Although they have a variety of
2011-04-01
pornographic sites [Moaveni, 2002]. This demonstrates the flipside of launching online attacks: one tends to live within a ―glass house‖ created by the cycle of...also apparently has at times been in business running pornographic websites may somehow seem ironic given the target of its efforts. 302 Volume 28...National Security and What to Do About It, New York, NY: HarperCollins. CNN.com (2002) ― Pornographer Says He Hacked al Qaeda‖, Aug. 8, http
On the Suitability of Radios That Interface with Tactical Apps on Android OS
2014-08-21
comprising TEC3 and longer-term research): a tablet with its own internal chip connected to a MANET; a tablet tethered to a TP-LINK3 connected to the...MANET; a tablet tethered to a TP-LINK connected to the MANET, and connected to the Internet (as a gateway) with its own internal chip; a tablet...establishment; and a tablet with its own internal chip connected to the MANET, and tethered to a HackRF to perform sensing operations. These
The Equivalent Static Accelerations of Shock Motions
1948-06-21
BLOW 3 HACK -.,. .:■-■ 5" PACK BL 0 » .r .a ^r .’.«.«.« -a TrMr Ih’fflVJiL BETWEEN TPACF IN’EHh Fig. 12...I • • • • fa « --^ o <« is >• 8 Sa 3 I! o • n Is i ä «H « <" 0 tJ u _ a> l-’S- bO ^ 2 c S3 5 | J5 I c a> 6 v fa 3
PREFACE: IUPAP C20 Conference on Computational Physics (CCP 2011)
NASA Astrophysics Data System (ADS)
Troparevsky, Claudia; Stocks, George Malcolm
2012-12-01
Increasingly, computational physics stands alongside experiment and theory as an integral part of the modern approach to solving the great scientific challenges of the day on all scales - from cosmology and astrophysics, through climate science, to materials physics, and the fundamental structure of matter. Computational physics touches aspects of science and technology with direct relevance to our everyday lives, such as communication technologies and securing a clean and efficient energy future. This volume of Journal of Physics: Conference Series contains the proceedings of the scientific contributions presented at the 23rd Conference on Computational Physics held in Gatlinburg, Tennessee, USA, in November 2011. The annual Conferences on Computational Physics (CCP) are dedicated to presenting an overview of the most recent developments and opportunities in computational physics across a broad range of topical areas and from around the world. The CCP series has been in existence for more than 20 years, serving as a lively forum for computational physicists. The topics covered by this conference were: Materials/Condensed Matter Theory and Nanoscience, Strongly Correlated Systems and Quantum Phase Transitions, Quantum Chemistry and Atomic Physics, Quantum Chromodynamics, Astrophysics, Plasma Physics, Nuclear and High Energy Physics, Complex Systems: Chaos and Statistical Physics, Macroscopic Transport and Mesoscopic Methods, Biological Physics and Soft Materials, Supercomputing and Computational Physics Teaching, Computational Physics and Sustainable Energy. We would like to take this opportunity to thank our sponsors: International Union of Pure and Applied Physics (IUPAP), IUPAP Commission on Computational Physics (C20), American Physical Society Division of Computational Physics (APS-DCOMP), Oak Ridge National Laboratory (ORNL), Center for Defect Physics (CDP), the University of Tennessee (UT)/ORNL Joint Institute for Computational Sciences (JICS) and Cray, Inc. We are grateful to the committees that helped put the conference together, especially the local organizing committee. Particular thanks are also due to a number of ORNL staff who spent long hours with the administrative details. We are pleased to express our thanks to the conference administrator Ann Strange (ORNL/CDP) for her responsive and efficient day-to-day handling of this event, Sherry Samples, Assistant Conference Administrator (ORNL), Angie Beach and the ORNL Conference Office, and Shirley Shugart (ORNL) and Fern Stooksbury (ORNL) who created and maintained the conference website. Editors: G Malcolm Stocks (ORNL) and M Claudia Troparevsky (UT) http://ccp2011.ornl.gov Chair: Dr Malcolm Stocks (ORNL) Vice Chairs: Adriana Moreo (ORNL/UT) James Guberrnatis (LANL) Local Program Committee: Don Batchelor (ORNL) Jack Dongarra (UTK/ORNL) James Hack (ORNL) Robert Harrison (ORNL) Paul Kent (ORNL) Anthony Mezzacappa (ORNL) Adriana Moreo (ORNL) Witold Nazarewicz (UT) Loukas Petridis (ORNL) David Schultz (ORNL) Bill Shelton (ORNL) Claudia Troparevsky (ORNL) Mina Yoon (ORNL) International Advisory Board Members: Joan Adler (Israel Institute of Technology, Israel) Constantia Alexandrou (University of Cyprus, Cyprus) Claudia Ambrosch-Draxl (University of Leoben, Austria) Amanda Barnard (CSIRO, Australia) Peter Borcherds (University of Birmingham, UK) Klaus Cappelle (UFABC, Brazil) Giovanni Ciccotti (Università degli Studi di Roma 'La Sapienza', Italy) Nithaya Chetty (University of Pretoria, South Africa) Charlotte Froese-Fischer (NIST, US) Giulia A. Galli (University of California, Davis, US) Gillian Gehring (University of Sheffield, UK) Guang-Yu Guo (National Taiwan University, Taiwan) Sharon Hammes-Schiffer (Penn State, US) Alex Hansen (Norweigan UST) Duane D. Johnson (University of Illinois at Urbana-Champaign, US) David Landau (University of Georgia, US) Joaquin Marro (University of Granada, Spain) Richard Martin (UIUC, US) Todd Martinez (Stanford University, US) Bill McCurdy (Lawrence Berkeley National Laboratory, US) Ingrid Mertig (Martin Luther University, Germany) Alejandro Muramatsu (Universitat Stuttgart, Germany) Richard Needs (Cavendish Laboratory, UK) Giuseppina Orlandini (University of Trento, Italy) Martin Savage (University of Washington, US) Thomas Schulthess (ETH, Switzerland) Dzidka Szotek (Daresbury Laboratory, UK) Hideaki Takabe (Osaka University, Japan) William M. Tang (Princeton University, US) James Vary (Iowa State, US) Enge Wang (Chinese Academy of Science, China) Jian-Guo Wang (Institute of Applied Physics and Computational Mathematics, China) Jian-Sheng Wang (National University, Singapore) Dan Wei (Tsinghua University, China) Tony Williams (University of Adelaide, Australia) Rudy Zeller (Julich, Germany) Conference Administrator: Ann Strange (ORNL)
NASA Astrophysics Data System (ADS)
Keen, Arthur A.
2006-04-01
This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.
A Simple, Scalable, Script-based Science Processor
NASA Technical Reports Server (NTRS)
Lynnes, Christopher
2004-01-01
The production of Earth Science data from orbiting spacecraft is an activity that takes place 24 hours a day, 7 days a week. At the Goddard Earth Sciences Distributed Active Archive Center (GES DAAC), this results in as many as 16,000 program executions each day, far too many to be run by human operators. In fact, when the Moderate Resolution Imaging Spectroradiometer (MODIS) was launched aboard the Terra spacecraft in 1999, the automated commercial system for running science processing was able to manage no more than 4,000 executions per day. Consequently, the GES DAAC developed a lightweight system based on the popular Per1 scripting language, named the Simple, Scalable, Script-based Science Processor (S4P). S4P automates science processing, allowing operators to focus on the rare problems occurring from anomalies in data or algorithms. S4P has been reused in several systems ranging from routine processing of MODIS data to data mining and is publicly available from NASA.
Physical Science Day: Design, Implementation, and Assessment
ERIC Educational Resources Information Center
Zeng, Liang; Cunningham, Mark A.; Tidrow, Steven C.; Smith, K. Christopher; Contreras, Jerry
2016-01-01
Physical Science Day at The University of Texas--Pan American (UTPA), in collaboration with the Edinburg Consolidated Independent School District, has been designed, developed and implemented to address an identified fundamental shortcoming in our educational process within this primarily (90+%) Hispanic serving border region. Physical Science Day…
2013-04-22
A participant at NASA's Earth Day Science Gallery Exhibit calculates his carbon footprint at the Carbon Footprint Estimator, Monday, April 22, 2013 at Union Station in Washington. The NASA Science Gallery exhibits are being sponsored by NASA in honor of Earth Day. (Photo Credit: NASA/Carla Cioffi)
Public Water Supply, Red River Parish, Louisiana.
1982-04-01
aI -4 w0 > k)~ 04 00 004 0 Ř 1-4 ua4 0 to 441 Ia) 40 1.H r. ) 4 14w w. ’a (A 0a 4) 0 a 0 Ai 0 41 .a- .a. to 0tic .. 9-:. PS4 W w~ u 00 r4 to- $4 0...tidT.ant sho~uld he recoarded on the hack -4 VA IL Ilbis Ir t o a. st.panite %heef andI alla, hv.. r I L_ 1 1 14. 4;. ian the valaies in ech
SCP -- A Simple CCD Processing Package
NASA Astrophysics Data System (ADS)
Lewis, J. R.
This note describes a small set of programs, written at RGO, which deal with basic CCD frame processing (e.g. bias subtraction, flat fielding, trimming etc.). The need to process large numbers of CCD frames from devices such as FOS or ISIS in order to extract spectra has prompted the writing of routines which will do the basic hack-work with a minimal amount of interaction from the user. Although they were written with spectral data in mind, there are no ``spectrum-specific'' features in the software which means they can be applied to any CCD data.
Bell nonlocality: a resource for device-independent quantum information protocols
NASA Astrophysics Data System (ADS)
Acin, Antonio
2015-05-01
Bell nonlocality is not only one of the most fundamental properties of quantum physics, but has also recently acquired the status of an information resource for device-independent quantum information protocols. In the device-independent approach, protocols are designed so that their performance is independent of the internal working of the devices used in the implementation. We discuss all these ideas and argue that device-independent protocols are especially relevant or cryptographic applications, as they are insensitive to hacking attacks exploiting imperfections on the modelling of the devices.
NASA Technical Reports Server (NTRS)
1976-01-01
Space Spin-Offs, Inc. under a contract with Lewis Research Center and Marshall Space Flight Center produced a new water-powered saw that cuts through concrete and steel plate reducing danger of explosion or electric shock in rescue and other operations. In prototype unit efficient water-powered turbine drives an 8 inch diameter grinding disk at 6,600 rpm. Exhaust water cools disk and workpiece quenching any sparks produced by cutting head. At maximum power, tool easily cuts through quarter inch steel plate. Adapter heads for chain saws, impact wrenches, heavy duty drills, and power hack saws can be fitted.
A global distributed basin morphometric dataset
NASA Astrophysics Data System (ADS)
Shen, Xinyi; Anagnostou, Emmanouil N.; Mei, Yiwen; Hong, Yang
2017-01-01
Basin morphometry is vital information for relating storms to hydrologic hazards, such as landslides and floods. In this paper we present the first comprehensive global dataset of distributed basin morphometry at 30 arc seconds resolution. The dataset includes nine prime morphometric variables; in addition we present formulas for generating twenty-one additional morphometric variables based on combination of the prime variables. The dataset can aid different applications including studies of land-atmosphere interaction, and modelling of floods and droughts for sustainable water management. The validity of the dataset has been consolidated by successfully repeating the Hack's law.
Hacking into the granuloma: could antibody antibiotic conjugates be developed for TB?
Ekins, Sean
2014-12-01
Alternatives to small molecule or vaccine approaches to treating tuberculosis are rarely discussed. Attacking Mycobacterium tuberculosis in the granuloma represents a challenge. It is proposed that the conjugation of small molecules onto a monoclonal antibody that recognizes macrophage or lymphocytes cell surface receptors, might be a way to target the bacteria in the granuloma. This antibody drug conjugate approach is currently being used in 2 FDA approved targeted cancer therapies. The pros and cons of this proposal for further research are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.
2013-09-01
Ethical hacking & penetration testing,” University of Waterloo, Waterloo, Canada, 2011. [2] B. Jurjonas, “Smart selection and configuration of...Ettercap (XP) X X X X Wireshark X tshark X X Tethereal (XP) *Command line version of Ethereal * X X X X tcpdump X NetStumbler ( Wifi ) X X...Ethereal X X X dsniff X X X X Kismet ( Wifi ) X X X EtherApe X X X Netcat X X X X 2. Robustness Due to the limitations of the operating
2011-05-01
communications and on computer networks—its Global Information Grid—which are potentially jeopardized by the millions of denial-of-service attacks, hacking ...Director,a National Security Agency Chief of Staff Joint Operations Center Defense Information Systems Agency Command Center J1 J2 J3 J4 J5 J6 J7 J8...DC Joint Staff • J39, Operations, Pentagon, Washington, DC • J5 , Strategic Plans and Policy, Pentagon, Washington, DC U.S. Strategic Command • J882
1945-11-01
appliod, and then hacked off "by 15 por.cent "before EJaking tho X—ray exposures. To find what tho stroös distribution... J5 2.868 H s 3 a) 8.860 • ••4 4» 3 S.8S8 87 1.23 1.84 1.86 1.88 Ratio D 1.30 1.38 1.34 1.36 VD’« fro« f11a Figur« 37a.- Ohart for
Nuclear Tracer Measurements of Low Temperature Water Diffusion in Silicon Dioxide (Si02) Thin Films.
1982-06-01
that value stably. . -:-’.i s ’.i1:n evacuated, this time through the hacking valve, and the w", ’<ought up to temperature. No difficulty was...I F+ ;. 91 F l i, : -’ t’.l [iv p IIf: i - 4’. -njf I’, I J5 + , -;4, I *,F’Th’.I , 1-5i . ]Ci-,Pr’I[’ t:I-., KJFFC "’ i 1! V TIt . F * F , 3l- . fr
Evaluation of Tools for Protection of Interest against Hacking and Cracking
NASA Astrophysics Data System (ADS)
Jahankhani, Hossein; Antonijevic, Branko; Walcott, Terry
The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper.
NASA Astrophysics Data System (ADS)
Eppler, Dean; Adams, Byron; Archer, Doug; Baiden, Greg; Brown, Adrian; Carey, William; Cohen, Barbara; Condit, Chris; Evans, Cindy; Fortezzo, Corey; Garry, Brent; Graff, Trevor; Gruener, John; Heldmann, Jennifer; Hodges, Kip; Hörz, Friedrich; Hurtado, Jose; Hynek, Brian; Isaacson, Peter; Juranek, Catherine; Klaus, Kurt; Kring, David; Lanza, Nina; Lederer, Susan; Lofgren, Gary; Marinova, Margarita; May, Lisa; Meyer, Jonathan; Ming, Doug; Monteleone, Brian; Morisset, Caroline; Noble, Sarah; Rampe, Elizabeth; Rice, James; Schutt, John; Skinner, James; Tewksbury-Christle, Carolyn M.; Tewksbury, Barbara J.; Vaughan, Alicia; Yingst, Aileen; Young, Kelsey
2013-10-01
Desert Research and Technology Studies (Desert RATS) is a multi-year series of hardware and operations tests carried out annually in the high desert of Arizona on the San Francisco Volcanic Field. These activities are designed to exercise planetary surface hardware and operations in conditions where long-distance, multi-day roving is achievable, and they allow NASA to evaluate different mission concepts and approaches in an environment less costly and more forgiving than space. The results from the RATS tests allow selection of potential operational approaches to planetary surface exploration prior to making commitments to specific flight and mission hardware development. In previous RATS operations, the Science Support Room has operated largely in an advisory role, an approach that was driven by the need to provide a loose science mission framework that would underpin the engineering tests. However, the extensive nature of the traverse operations for 2010 expanded the role of the science operations and tested specific operational approaches. Science mission operations approaches from the Apollo and Mars-Phoenix missions were merged to become the baseline for this test. Six days of traverse operations were conducted during each week of the 2-week test, with three traverse days each week conducted with voice and data communications continuously available, and three traverse days conducted with only two 1-hour communications periods per day. Within this framework, the team evaluated integrated science operations management using real-time, tactical science operations to oversee daily crew activities, and strategic level evaluations of science data and daily traverse results during a post-traverse planning shift. During continuous communications, both tactical and strategic teams were employed. On days when communications were reduced to only two communications periods per day, only a strategic team was employed. The Science Operations Team found that, if communications are good and down-linking of science data is ensured, high quality science returns is possible regardless of communications. What is absent from reduced communications is the scientific interaction between the crew on the planet and the scientists on the ground. These scientific interactions were a critical part of the science process and significantly improved mission science return over reduced communications conditions. The test also showed that the quality of science return is not measurable by simple numerical quantities but is, in fact, based on strongly non-quantifiable factors, such as the interactions between the crew and the Science Operations Teams. Although the metric evaluation data suggested some trends, there was not sufficient granularity in the data or specificity in the metrics to allow those trends to be understood on numerical data alone.
NASA Technical Reports Server (NTRS)
Eppler, Dean; Adams, Byron; Archer, Doug; Baiden, Greg; Brown, Adrian; Carey, William; Cohen, Barbara; Condit, Chris; Evans, Cindy; Fortezzo, Corey;
2012-01-01
Desert Research and Technology Studies (Desert RATS) is a multi-year series of hardware and operations tests carried out annually in the high desert of Arizona on the San Francisco Volcanic Field. These activities are designed to exercise planetary surface hardware and operations in conditions where long-distance, multi-day roving is achievable, and they allow NASA to evaluate different mission concepts and approaches in an environment less costly and more forgiving than space.The results from the RATS tests allows election of potential operational approaches to planetary surface exploration prior to making commitments to specific flight and mission hardware development. In previous RATS operations, the Science Support Room has operated largely in an advisory role, an approach that was driven by the need to provide a loose science mission framework that would underpin the engineering tests. However, the extensive nature of the traverse operations for 2010 expanded the role of the science operations and tested specific operational approaches. Science mission operations approaches from the Apollo and Mars-Phoenix missions were merged to become the baseline for this test. Six days of traverse operations were conducted during each week of the 2-week test, with three traverse days each week conducted with voice and data communications continuously available, and three traverse days conducted with only two 1-hour communications periods per day. Within this framework, the team evaluated integrated science operations management using real-time, tactical science operations to oversee daily crew activities, and strategic level evaluations of science data and daily traverse results during a post-traverse planning shift. During continuous communications, both tactical and strategic teams were employed. On days when communications were reduced to only two communications periods per day, only a strategic team was employed. The Science Operations Team found that, if communications are good and down-linking of science data is ensured, high quality science returns is possible regardless of communications. What is absent from reduced communications is the scientific interaction between the crew on the planet and the scientists on the ground. These scientific interactions were a critical part of the science process and significantly improved mission science return over reduced communications conditions. The test also showed that the quality of science return is not measurable by simple numerical quantities but is, in fact, based on strongly non-quantifiable factors, such as the interactions between the crew and the Science Operations Teams. Although the metric evaluation data suggested some trends, there was not sufficient granularity in the data or specificity in the metrics to allow those trends to be understood on numerical data alone.
NASA's Desert RATS Science Backroom: Remotely Supporting Planetary Exploration
NASA Technical Reports Server (NTRS)
Cohen, Barbara A.; Eppler, Dean; Gruener, John; Horz, Fred; Ming, Doug; Yingst, R. Aileen
2012-01-01
NASA's Desert Research and Technology Studies (Desert RATS) is a multi-year series of tests designed to exercise planetary surface hardware and operations in conditions where long-distance, multi-day roving is achievable. In recent years, a D-RATS science backroom has conducted science operations and tested specific operational approaches. Approaches from the Apollo, Mars Exploration Rovers and Phoenix missions were merged to become the baseline for these tests. In 2010, six days of lunar-analog traverse operations were conducted during each week of the 2-week test, with three traverse days each week conducted with voice and data communications continuously available, and three traverse days conducted with only two 1-hour communications periods per day. In 2011, a variety of exploration science scenarios that tested operations for a near-earth asteroid using several small exploration vehicles and a single habitat. Communications between the ground and the crew in the field used a 50-second one-way delay, while communications between crewmembers in the exploration vehicles and the habitat were instantaneous. Within these frameworks, the team evaluated integrated science operations management using real-time science operations to oversee daily crew activities, and strategic level evaluations of science data and daily traverse results. Exploration scenarios for Mars may include architectural similarities such as crew in a habitat communicating with crew in a vehicle, but significantly more autonomy will have to be given to the crew rather than step-by-step interaction with a science backroom on Earth.
Changing the face of science: Lessons from the 2017 Science-A-Thon
NASA Astrophysics Data System (ADS)
Barnes, R. T.; Licker, R.; Burt, M. A.; Holloway, T.
2017-12-01
Studies have shown that over two-thirds of Americans cannot name a living scientist. This disconnect is a concern for science and scientists, considering the large role of public funding for science, and the importance of science in many policy issues. As a large-scale public outreach initiative and fundraiser, the Earth Science Women's Network (ESWN) launched "Science-A-Thon" on July 13, 2017. This "day of science" invited participants to share 12 photos over 12 hours of a day, including both personal routines and professional endeavors. Over 200 scientists participated, with the #DayofScience hashtag trending on Twitter for the day. Earth scientists represented the largest portion of participants, but the event engaged cancer biologists, computer scientists, and more, including scientists from more than 10 countries. Science-A-Thon builds on the success and visibility of other social media campaigns, such as #actuallivingscientist and #DresslikeaWoman. Importantly these efforts share a common goal, by providing diverse images of scientists we can shift the public perception of who a scientist is and what science looks like in the real world. This type of public engagement offers a wide range of potential role models for students, and individual stories to increase public engagement with science. Social media campaigns such as this shift the public perception of who scientists are, why they do what they do, and what they do each day. The actions and conversations emerging from Science-A-Thon included scientists talking about (1) their science and motivation, (2) the purpose and need for ESWN, and (3) why they chose to participate in this event increased the reach of a social media campaign and fundraiser.
ERIC Educational Resources Information Center
Rao, C. S., Ed.
Science should not be presented as a collection of facts; it must be presented as an active dynamic subject. It should be used to stimulate young minds and encourage questioning. This is a publication designed to meet the needs of science teachers for a day-to-day reference in science. It was intended for the use of Peace Corps volunteers and…
The Effects of "Girls in Science Day" on Middle School Girls' Attitudes and Interests in Science
NASA Astrophysics Data System (ADS)
Dixon, Carmen S.
Because of the underrepresentation of women in STEM fields, many organizations are hosting days to promote middle school girls' interest in science. The purpose of this dissertation examines one of these days, and is three-fold: Number one, to determine if the event "Girls in Science Day [GIS]" affected the interests and attitudes of the middle school girls who attend. Number two, to examine how GIS affected their interests and attitudes in science, and number three, to examine if there is a long time impact on the girls who attend GIS in middle school by interviewing them when they are older and determine if attending GIS made lasting impressions on their lives. It utilizes a mixed-methods approach by using a quantitative Likert-type scale to determine the first purpose mentioned, pre- and post- attendance interviews to examine purpose two, and longitudinal interviews of past participants to determine purpose three. These methods are then combined using meta-inference and results and implications are examined. Future research is then recommended to improve the status of women in science careers.
Trunk muscle activation in the back and hack squat at the same relative loads.
Clark, David R; Lambert, Michael I; Hunter, Angus M
2017-07-12
The hack squat (HS) is likely to produce a greater 1 repetition maximum (1RM) compared to the back squat (BS). This can be attributed to the support of the trunk during the HS compared to no support during BS. This support however, may compromise trunk muscle activation (TMA), therefore producing different training adaptations. Accordingly, the purpose of this study was to compare 1RM in BS and HS and TMA at 4 relative loads, 65, 75, 85 and 95% of maximal system mass. Ten males completed 3 test sessions:1) BS and HS 1RM, 2) HS & BS neuromuscular test familiarization, and, 3) Neuromuscular test for 3 reps at 4 loads for BS and HS. BS TMA was significantly greater (p<0.05) than HS for all muscles and phases except rectus abdominus in concentric phase. TMA increased (p<0.05) with load in all muscles for both exercises and phases apart from lumbar sacral erector spinae in HS eccentric phase. Mean HS 1RM and submaximal loads were significantly (p<0.0001) higher than the equivalent BS loads. Duration of the eccentric phase was higher (p<0.01) in HS than BS but not different in concentric phase. Duration increased significantly (p<0.01) with load in both exercises and both phases. Despite higher absolute tests loads in HS, TMA was higher in BS. TMA is sensitive to load in both exercises. BS is more effective than HS in activating the muscles of the trunk and therefore arguably more effective in developing trunk strength and stability for dynamic athletic performance.
2013-04-22
Holli Riebeek, Education and Public Outreach Lead for NASA/Landsat Mission at NASA's Goddard Spaceflight Center, is seen speaking to students at NASA's Earth Day Science Gallery Exhibit, Monday, April 22, 2013 at Union Station in Washington. The NASA Science Gallery exhibits are being sponsored by NASA in honor of Earth Day. (Photo Credit: NASA/Carla Cioffi)
2013-04-22
Holli Riebeek, Education and Public Outreach Lead for NASA/Landsat Mission at NASA's Goddard Spaceflight Center, holds up Landsat maps NASA's Earth Day Science Gallery Exhibit, Monday, April 22, 2013 at Union Station in Washington. The NASA Science Gallery exhibits are being sponsored by NASA in honor of Earth Day. (Photo Credit: NASA/Carla Cioffi)
ERIC Educational Resources Information Center
Zervas, Panagiotis; Fiskilis, Stefanos; Sampson, Demetrios G.
2014-01-01
Over the past years, Remote and Virtual Labs (RVLs) have gained increased attention for their potential to support technology-enhanced science education by enabling science teachers to improve their day-to-day science teaching. Therefore, many educational institutions and scientific organizations have invested efforts for providing online access…
MiTEP's Collaborative Field Course Design Process Based on Earth Science Literacy Principles
NASA Astrophysics Data System (ADS)
Engelmann, C. A.; Rose, W. I.; Huntoon, J. E.; Klawiter, M. F.; Hungwe, K.
2010-12-01
Michigan Technological University has developed a collaborative process for designing summer field courses for teachers as part of their National Science Foundation funded Math Science Partnership program, called the Michigan Teacher Excellence Program (MiTEP). This design process was implemented and then piloted during two two-week courses: Earth Science Institute I (ESI I) and Earth Science Institute II (ESI II). Participants consisted of a small group of Michigan urban science teachers who are members of the MiTEP program. The Earth Science Literacy Principles (ESLP) served as the framework for course design in conjunction with input from participating MiTEP teachers as well as research done on common teacher and student misconceptions in Earth Science. Research on the Earth Science misconception component, aligned to the ESLP, is more fully addressed in GSA Abstracts with Programs Vol. 42, No. 5. “Recognizing Earth Science Misconceptions and Reconstructing Knowledge through Conceptual-Change-Teaching”. The ESLP were released to the public in January 2009 by the Earth Science Literacy Organizing Committee and can be found at http://www.earthscienceliteracy.org/index.html. Each day of the first nine days of both Institutes was focused on one of the nine ESLP Big Ideas; the tenth day emphasized integration of concepts across all of the ESLP Big Ideas. Throughout each day, Michigan Tech graduate student facilitators and professors from Michigan Tech and Grand Valley State University consistantly focused teaching and learning on the day's Big Idea. Many Earth Science experts from Michigan Tech and Grand Valley State University joined the MiTEP teachers in the field or on campus, giving presentations on the latest research in their area that was related to that Big Idea. Field sites were chosen for their unique geological features as well as for the “sense of place” each site provided. Preliminary research findings indicate that this collaborative design process piloted as ESI I and ESI II was successful in improving MiTEP teacher understanding of Earth Science content and that it was helpful to use the ESLP framework. Ultimately, a small sample of student scores will look at the impact on student learning in the MiTEP teacher classrooms.
Mandrake--an ancient herbal discovered.
Sutcliffe, Terry
2008-09-01
I recently purchased the pharmacy container (illustrated) from an antique dealer friend who had kept three of these tins for 20 years intending to convert them into lamp bases. Fortunately I persuaded him to sell them to me rather than being hacked up. The other two are labeled 'BETT. RT PUL' 'LUNGWORT'. (All three are similarly painted, lidded tins and all stand 13 inches high, with a diameter of seven inches.) The label 'MANDRAKERT' immediately conjured up two impressions, firstly my boyhood reading of Mandrake the magician comics, and secondly a strong interest to research the story behind this 19th century tin's mystical contents.
A very deep IRAS survey. III - VLA observations
NASA Astrophysics Data System (ADS)
Hacking, Perry; Condon, J. J.; Houck, J. R.; Beichman, C. A.
1989-04-01
The 60-micron fluxes and positions of sources (primarily starburst galaxies) found in a deep IRAS survey by Hacking and Houck (1987) are compared with 1.49 HGz maps made by the Very Large Array. The radio results are consistent with radio measurements of brighter IRAS galaxies and provide evidence that infrared cirrus does not contaminate the 60-micron sample. The flux-independent ratio of infrared to radio flux densities implies that the 1.4 GHz luminosity function for spiral galaxies is evolving at less than (1 + z) to the power of 4 relative to the 60-micron luminosity function.
Theoretical Investigations of Nitrocubane Decomposition.
1988-02-29
this line are the ammonium nitronate salts, e.g., 5j rNH C(NO,) 3 The synthesis and characterization of nitrocubanes such as these is currently of...arceenit i th the experimental results is also very good except at the 0% 40 30 00 C-)0 ~10 00 10 -0.8 -0.4 0.0 0.4 0.8 1.2 s(aO) 1Fiunpre 2. Comparison...excellent (differences of 18- 40 %) but at higher temperatures the computed rates are f .actors of 2.2 to 2.7 lwer than the results of Hack et. al. The
2018-02-01
4, 2014), http://www.businessinsider.com/ experts-the-sony-hack-looks-a-lot-like-previous-attacks-on- south-korea-2014-12. 39 Kim Zetter, “Logic Bomb ...Set Off South Korea Cyberattack,” Wired (March 21, 2013), https://www.wired.com/2013/03/logic- bomb -south-korea-attack/. 40 Brian Krebs, “The Case...Agency (March 21, 2013), http://english.yonhapnews.co.kr/ national/2013/03/21/55/0302000000AEN20130321003552315F. HTML. 47 Kim Zetter, “Logic Bomb
Using RF-DNA Fingerprints to Discriminate ZigBee Devices in an Operational Environment
2013-03-01
network keys and Media Access Control (MAC) lists which can be subverted through interception and spoofing using open-source hacking tools. This work...for Mobile Communication (GSM) cellular phones [40, 47], IEEE 802.11 WiFi [21, 23, 24, 28, 29, 35, 42], and IEEE 802.16 WiMAX [34, 35, 37, 38, 48...802.11a WiFi × [21, 28–30, 35, 48] GSM Cellular × [39, 40, 47] 802.16e WiMax × [34, 35, 38, 48] 802.15.4 ZigBee × [31] × [11, 12] Classifier Type MDA/ML
PROCESS DEVELOPMENT QUARTERLY REPORT. II. PILOT PLANT WORK
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kuhlman, N. ed.
1957-05-01
Progress is reported on the gross solubility of U in digestions of Mallinokrodt feed materials, studies of variables affecting U purity in a TBP hexane extraction cycle, low-acid flowsheet for TBP--hexane extraction process based on a 440 g U/liter in lM HNO/sub 3/ digest liquor, hacking studies in the pilot plant pumperdecanter system, recovery of U from residues from the dingot process, lowering the H level in dingot metal, forging of dingot bar stock, dingot extrusion, fubrication of UO/sub 2/ fuel elements, and the determination of H content of derby and ingot metal. (W.L.H.)
Hacker tracking Security system for HMI
NASA Astrophysics Data System (ADS)
Chauhan, Rajeev Kumar
2011-12-01
Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.
ERIC Educational Resources Information Center
Reis, Giuliano; Barwell, Richard
2013-01-01
The day-to-day business of being a science or mathematics teacher involves the continuous assessment of students. This, in turn, is an inherently discursive process. The aim of the present study is to examine some of the specific discursive practices through which science and mathematics knowing is jointly produced through classroom interaction.…
Security challenge to using smartphones for SHM
NASA Astrophysics Data System (ADS)
Abueh, Yeka; Liu, Hong
2016-04-01
Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.
The Social Context of "Do-It-Yourself" Brain Stimulation: Neurohackers, Biohackers, and Lifehackers.
Wexler, Anna
2017-01-01
The "do-it-yourself" (DIY) brain stimulation movement began in earnest in late 2011, when lay individuals began building stimulation devices and applying low levels of electricity to their heads for self-improvement purposes. To date, scholarship on the home use of brain stimulation has focused on characterizing the practices of users via quantitative and qualitative studies, and on analyzing related ethical and regulatory issues. In this perspective piece, however, I take the opposite approach: rather than viewing the home use of brain stimulation on its own, I argue that it must be understood within the context of other DIY and citizen science movements. Seen in this light, the home use of brain stimulation is only a small part of the "neurohacking" movement, which is comprised of individuals attempting to optimize their brains to achieve enhanced performance. Neurohacking itself is an offshoot of the "life hacking" (or "quantified self") movement, in which individuals self-track minute aspects of their daily lives in order to enhance productivity or performance. Additionally, the home or DIY use of brain stimulation is in many ways parallel to the DIY Biology (or "biohacking") movement, which seeks to democratize tools of scientific experimentation. Here, I describe the place of the home use of brain stimulation with regard to neurohackers, lifehackers, and biohackers, and suggest that a policy approach for the home use of brain stimulation should have an appreciation both of individual motivations as well as the broader social context of the movement itself.
Fish Facts: Science with a Splash.
ERIC Educational Resources Information Center
Coffey, Pat F.
1988-01-01
This article presents a five-day science unit focusing on fish to get kindergarten students interested in science and ideas for incorporating science instruction with language arts and art instruction. (CB)
NASA Astrophysics Data System (ADS)
Simões, Ana; Diogo, Maria Paula; Carneiro, Ana
2012-09-01
We provide a two-day tour of Lisbon, Portugal, focusing on sites of scientific and technological importance, setting them within their historical contexts. On the first day we visit the Academy of Sciences of Lisbon, the building that successively housed the College of Nobles, the Polytechnic School, and the University of Lisbon Faculty of Sciences, and then go on to the Arpad Szenes-Vieira da Silva Museum and the Astronomical Observatory of Lisbon. On the second day we visit the Industrial Institute and Museum, the Geographical Society of Lisbon, the Jesuit College of Santo Antão, and the Technical Institute.
... Inside Life Science > Genetics by the Numbers Inside Life Science View All Articles | Inside Life Science Home Page Genetics by the Numbers By Chelsea ... New Genetics NIH's National DNA Day This Inside Life Science article also appears on LiveScience . Learn about related ...
Scaling relations for large Martian valleys
NASA Astrophysics Data System (ADS)
Som, Sanjoy M.; Montgomery, David R.; Greenberg, Harvey M.
2009-02-01
The dendritic morphology of Martian valley networks, particularly in the Noachian highlands, has long been argued to imply a warmer, wetter early Martian climate, but the character and extent of this period remains controversial. We analyzed scaling relations for the 10 large valley systems incised in terrain of various ages, resolvable using the Mars Orbiter Laser Altimeter (MOLA) and the Thermal Emission Imaging System (THEMIS). Four of the valleys originate in point sources with negligible contributions from tributaries, three are very poorly dissected with a few large tributaries separated by long uninterrupted trunks, and three exhibit the dendritic, branching morphology typical of terrestrial channel networks. We generated width-area and slope-area relationships for each because these relations are identified as either theoretically predicted or robust terrestrial empiricisms for graded precipitation-fed, perennial channels. We also generated distance-area relationships (Hack's law) because they similarly represent robust characteristics of terrestrial channels (whether perennial or ephemeral). We find that the studied Martian valleys, even the dendritic ones, do not satisfy those empiricisms. On Mars, the width-area scaling exponent b of -0.7-4.7 contrasts with values of 0.3-0.6 typical of terrestrial channels; the slope-area scaling exponent $\\theta$ ranges from -25.6-5.5, whereas values of 0.3-0.5 are typical on Earth; the length-area, or Hack's exponent n ranges from 0.47 to 19.2, while values of 0.5-0.6 are found on Earth. None of the valleys analyzed satisfy all three relations typical of terrestrial perennial channels. As such, our analysis supports the hypotheses that ephemeral and/or immature channel morphologies provide the closest terrestrial analogs to the dendritic networks on Mars, and point source discharges provide terrestrial analogs best suited to describe the other large Martian valleys.
Geology of the Carnegie museum dinosaur quarry site of Diplodocus carnegii, Sheep Creek, Wyoming
Brezinski, D.K.; Kollar, A.D.
2008-01-01
The holotype of Diplodocus carnegii Hatcher, 1901, consists of a partial skeleton (CM 84) that was recovered, along with a second partial skeleton of the same species (CM 94), from the upper 10 m of the Talking Rock facies of the Brushy Basin Member of the Morrison Formation exposed along Bone Quarry Draw, a tributary of Sheep Creek in Albany County, Wyoming. A composite measured section of the stratigraphic interval exposed adjacent to the quarry indicates that the Brushy Basin Member in this area is a stacked succession of lithofacies consisting of hackly, greenish gray, calcareous mudstone and greenish brown, dense, fine-grained limestone. The more erosion resistant limestone layers can be traced over many hundreds of meters. Thus, these strata do not appear to represent a highly localized deposit such as a stream channel, oxbow lake, or backwater pond. The Sheep Creek succession is interpreted as representing a clastic-dominated lake where high turbidity and sediment influx produced deposition of calcareous mudstone. During drier periods the lake's turbidity decreased and limestone and dolomite precipitation replaced mud deposition. Microkarsting at the top of some limestone/ dolomite layers suggests subaerial deposition may have prevailed during these dry episodes. The quarry of D. carnegii was excavated within the top strata of one of the numerous intervals of hackly, greenish gray, calcareous mudstone that represent an ephemeral freshwater lake. The quarry strata are directly overlain by 0.3 m of dolomite-capped limestone that was deposited shortly after interment of D. carnegii in the lake mudstones. The close vertical proximity of the overlying limestone to the skeleton's stratigraphic: level suggests that the animal's carcass may have been buried beneath the drying lake deposits during a period of decreased rainfall.
Luo, Jianhao; Liu, Mingxi; Zhang, Chendong; Zhang, Peipei; Chen, Jingjing; Guo, Zhenfei; Lu, Shaoyun
2017-01-01
Centipedegrass ( Eremochloa ophiuroides [Munro] Hack.) is an important warm-season turfgrass species. Transgenic centipedgrass plants overexpressing S-adenosylmethionine decarboxylase from bermudagrass ( CdSAMDC1 ) that was induced in response to cold were generated in this study. Higher levels of CdSAMDC1 transcript and sperimidine (Spd) and spermin (Spm) concentrations and enhanced freezing and chilling tolerance were observed in transgenic plants as compared with the wild type (WT). Transgenic plants had higher levels of polyamine oxidase (PAO) activity and H 2 O 2 than WT, which were blocked by pretreatment with methylglyoxal bis (guanylhydrazone) or MGBG, inhibitor of SAMDC, indicating that the increased PAO and H 2 O 2 were a result of expression of CdSAMDC1 . In addition, transgenic plants had higher levels of nitrate reductase (NR) activity and nitric oxide (NO) concentration. The increased NR activity were blocked by pretreatment with MGBG and ascorbic acid (AsA), scavenger of H 2 O 2 , while the increased NO level was blocked by MGBG, AsA, and inhibitors of NR, indicating that the enhanced NR-derived NO was dependent upon H 2 O 2 , as a result of expression CdSAMDC1 . Elevated superoxide dismutase (SOD) and catalase (CAT) activities were observed in transgenic plants than in WT, which were blocked by pretreatment with MGBG, AsA, inhibitors of NR and scavenger of NO, indicating that the increased activities of SOD and CAT depends on expression of CdSAMDC1 , H 2 O 2 , and NR-derived NO. Our results suggest that the elevated cold tolerance was associated with PAO catalyzed production of H 2 O 2 , which in turn led to NR-derived NO production and induced antioxidant enzyme activities in transgenic plants.
Li, JianJian; Ma, Jingjing; Guo, Hailin; Zong, Junqin; Chen, Jingbo; Wang, Yi; Li, Dandan; Li, Ling; Wang, Jingjing; Liu, Jianxiu
2018-05-01
Salinity is one of the major abiotic environmental stress factors affecting plant growth and development. Centipedegrass (Eremochloa ophiuroides [Munro)] Hack.) is an important warm-season turfgrass species with low turf maintenance requirements, but is sensitive to salinity stress. To explore salt tolerant germplasms in centipedegrass and better understand the growth and physiological responses of centipedegrass to salinity, we conducted anatomic observation and phytochemical quantification, examined growth parameters, and investigated photosynthetic machinery and antioxidant system in two phenotypically distinct centipedegrass accessions under NaCl salt stress. The morphophenotypical difference of the stems in the two accessions mainly depends on whether or not a thickened epidermal horny layer with purple colour was formed, which was caused by anthocyanin accumulation in the tissue. Successive salinity treatment was found to result in an inhibition of leaf growth, a marked decrease in photosynthesis, chlorophyll contents, and the maximal photochemical efficiency of PSII (Fv/Fm). Under the same treatment, purple-stem accession (E092) showed a lower degree of inhibition or decrease than green-stem one (E092-1). With the exception of malondialdehyde level, both proline content and antioxidant enzymes were upregulated to a greater extent in E092 following exposure to salinity condition. Meanwhile, significant enhancements of anthocyanin accumulation and total protein synthesis were detected in E092 after salt treatment, but not in E092-1. These results demonstrated that E092 favor better accumulation of anthocyanins under salinity condition, which contribute to salt tolerance by adjusting physiological functions and osmotic balance, and better maintenance of high turf quality. Hence, genetic phenotype can be utilized as a key indicator in E. ophiuroides breeding for salt-tolerance. Copyright © 2018. Published by Elsevier Masson SAS.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Timothy J.
2016-03-01
While benchmarking software is useful for testing the performance limits and stability of Argonne National Laboratory’s new Theta supercomputer, there is no substitute for running real applications to explore the system’s potential. The Argonne Leadership Computing Facility’s Theta Early Science Program, modeled after its highly successful code migration program for the Mira supercomputer, has one primary aim: to deliver science on day one. Here is a closer look at the type of science problems that will be getting early access to Theta, a next-generation machine being rolled out this year.
Technology for NASA's Planetary Science Vision 2050.
NASA Technical Reports Server (NTRS)
Lakew, B.; Amato, D.; Freeman, A.; Falker, J.; Turtle, Elizabeth; Green, J.; Mackwell, S.; Daou, D.
2017-01-01
NASAs Planetary Science Division (PSD) initiated and sponsored a very successful community Workshop held from Feb. 27 to Mar. 1, 2017 at NASA Headquarters. The purpose of the Workshop was to develop a vision of planetary science research and exploration for the next three decades until 2050. This abstract summarizes some of the salient technology needs discussed during the three-day workshop and at a technology panel on the final day. It is not meant to be a final report on technology to achieve the science vision for 2050.
Neff, Gina; Tanweer, Anissa; Fiore-Gartland, Brittany; Osburn, Laura
2017-06-01
What would data science look like if its key critics were engaged to help improve it, and how might critiques of data science improve with an approach that considers the day-to-day practices of data science? This article argues for scholars to bridge the conversations that seek to critique data science and those that seek to advance data science practice to identify and create the social and organizational arrangements necessary for a more ethical data science. We summarize four critiques that are commonly made in critical data studies: data are inherently interpretive, data are inextricable from context, data are mediated through the sociomaterial arrangements that produce them, and data serve as a medium for the negotiation and communication of values. We present qualitative research with academic data scientists, "data for good" projects, and specialized cross-disciplinary engineering teams to show evidence of these critiques in the day-to-day experience of data scientists as they acknowledge and grapple with the complexities of their work. Using ethnographic vignettes from two large multiresearcher field sites, we develop a set of concepts for analyzing and advancing the practice of data science and improving critical data studies, including (1) communication is central to the data science endeavor; (2) making sense of data is a collective process; (3) data are starting, not end points, and (4) data are sets of stories. We conclude with two calls to action for researchers and practitioners in data science and critical data studies alike. First, creating opportunities for bringing social scientific and humanistic expertise into data science practice simultaneously will advance both data science and critical data studies. Second, practitioners should leverage the insights from critical data studies to build new kinds of organizational arrangements, which we argue will help advance a more ethical data science. Engaging the insights of critical data studies will improve data science. Careful attention to the practices of data science will improve scholarly critiques. Genuine collaborative conversations between these different communities will help push for more ethical, and better, ways of knowing in increasingly datum-saturated societies.
Neff, Gina; Tanweer, Anissa; Fiore-Gartland, Brittany; Osburn, Laura
2017-01-01
Abstract What would data science look like if its key critics were engaged to help improve it, and how might critiques of data science improve with an approach that considers the day-to-day practices of data science? This article argues for scholars to bridge the conversations that seek to critique data science and those that seek to advance data science practice to identify and create the social and organizational arrangements necessary for a more ethical data science. We summarize four critiques that are commonly made in critical data studies: data are inherently interpretive, data are inextricable from context, data are mediated through the sociomaterial arrangements that produce them, and data serve as a medium for the negotiation and communication of values. We present qualitative research with academic data scientists, “data for good” projects, and specialized cross-disciplinary engineering teams to show evidence of these critiques in the day-to-day experience of data scientists as they acknowledge and grapple with the complexities of their work. Using ethnographic vignettes from two large multiresearcher field sites, we develop a set of concepts for analyzing and advancing the practice of data science and improving critical data studies, including (1) communication is central to the data science endeavor; (2) making sense of data is a collective process; (3) data are starting, not end points, and (4) data are sets of stories. We conclude with two calls to action for researchers and practitioners in data science and critical data studies alike. First, creating opportunities for bringing social scientific and humanistic expertise into data science practice simultaneously will advance both data science and critical data studies. Second, practitioners should leverage the insights from critical data studies to build new kinds of organizational arrangements, which we argue will help advance a more ethical data science. Engaging the insights of critical data studies will improve data science. Careful attention to the practices of data science will improve scholarly critiques. Genuine collaborative conversations between these different communities will help push for more ethical, and better, ways of knowing in increasingly datum-saturated societies. PMID:28632445
NASA Technical Reports Server (NTRS)
Masuoka, Edward J.; Tilmes, Curt A.; Ye, Gang; Devine, Neal; Smith, David E. (Technical Monitor)
2000-01-01
The MODerate resolution Imaging Spectroradiometer (MODIS) was launched on NASA's EOS-Terra spacecraft December 1999. With 36 spectral bands covering the visible, near wave and short wave infrared. MODIS produces over 40 global science data products, including sea surface temperature, ocean color, cloud properties, vegetation indices land surface temperature and land cover change. The MODIS Data Processing System (MODAPS) produces 400 GB/day of global MODIS science products from calibrated radiances generated in the Earth Observing System Data and Information System (EOSDIS). The science products are shipped to the EOSDIS for archiving and distribution to the public. An additional 200 GB of products are shipped each day to MODIS team members for quality assurance and validation of their products. In the sections that follow, we will describe the architecture of the MODAPS, identify processing bottlenecks encountered in scaling MODAPS from 50 GB/day backup system to a 400 GB/day production system and discuss how these were handled.
Two-Phase Thermal Switching System for a Small, Extended Duration Lunar Science Platform
NASA Technical Reports Server (NTRS)
Bugby, D.; Farmer, J.; OConnor, B.; Wirzburger, M.; Abel, E.; Stouffer, C.
2010-01-01
Issue: extended duration lunar science platforms, using solar/battery or radioisotope power, require thermal switching systems that: a) Provide efficient cooling during the 15-earth-day 390 K lunar day; b) Consume minimal power during the 15-earth-day 100 K lunar night. Objective: carry out an analytical study of thermal switching systems that can meet the thermal requirements of: a) International Lunar Network (ILN) anchor node mission - primary focus; b) Other missions such as polar crater landers. ILN Anchor Nodes: network of geophysical science platforms to better understand the interior structure/composition of the moon: a) Rationale: no data since Apollo seismic stations ceased operation in 1977; b) Anchor Nodes: small, low-power, long-life (6-yr) landers with seismographic and a few other science instruments (see next chart); c) WEB: warm electronics box houses ILN anchor node electronics/batteries. Technology Need: thermal switching system that will keep the WEB cool during the lunar day and warm during the lunar night.
ERIC Educational Resources Information Center
Busch, Phyllis S.
Contained are some of the instructional materials developed by the Science Project Related to Upgrading Conservation Education. Outdoor activities for elementary school children, suitable for use in camps, parks, playgrounds or sanctuaries are described. Programs are designed for one-day (K-4), two-day (grade 5), and three-day (grade 6) camps, and…
Science Fairs: Tired of the Same Old, Same Old?
ERIC Educational Resources Information Center
Silver, Debbie
1994-01-01
Presents an alternative to the competition fostered through traditional science fairs. The Science Expo is an all-day event meant to show students and the community that science is fascinating and fun. (PR)
2013-04-22
Izolda Trakhtenberg, Science Educator at NASA Goddard Spaceflight Center, conducts an experiment with students to create a cloud in a bottle, Monday, April 22, 2013 at Union Station in Washington. The NASA Science Gallery exhibits are being sponsored by NASA in honor of Earth Day. (Photo Credit: NASA/Carla Cioffi)
2013-04-22
Todd Toth, Science Educator at NASA Goddard Spaceflight Center, conducts an experiment with students to create a cloud in a bottle, Monday, April 22, 2013 at Union Station in Washington. The NASA Science Gallery exhibits are being sponsored by NASA in honor of Earth Day. (Photo Credit: NASA/Carla Cioffi)
β Coronae Bolealis: Lithium and Cerium Contribution to the Blend at 6708 Å
NASA Astrophysics Data System (ADS)
Drake, N. A.; Hubrig, S.; Polosukhina, N. S.; de La Reza, R.
2006-06-01
We analyze the Li I 6708 Å spectral region of the chemically peculiar Ap star βCrB using high resolution, high signal-to-noise spectra obtained at different rotation phases. Our study shows that the Ce II line at 6708.099 Å is a main contributor to the spectral feature at 6708 Å. This fact explains the observed red shift of the Li I doublet of about 0.2 Å found by Hack et al. (1997). We derive the values of lithium and cerium abundances for different rotation phases and show that βCrB has ``cosmic'' Li abundance.
The quantum Hall effects: Philosophical approach
NASA Astrophysics Data System (ADS)
Lederer, P.
2015-05-01
The Quantum Hall Effects offer a rich variety of theoretical and experimental advances. They provide interesting insights on such topics as gauge invariance, strong interactions in Condensed Matter physics, emergence of new paradigms. This paper focuses on some related philosophical questions. Various brands of positivism or agnosticism are confronted with the physics of the Quantum Hall Effects. Hacking's views on Scientific Realism, Chalmers' on Non-Figurative Realism are discussed. It is argued that the difficulties with those versions of realism may be resolved within a dialectical materialist approach. The latter is argued to provide a rational approach to the phenomena, theory and ontology of the Quantum Hall Effects.
NASA Astrophysics Data System (ADS)
Dimitroulis, Christos; Raptis, Theophanes; Raptis, Vasilios
2015-12-01
We present an application for the calculation of radial distribution functions for molecular centres of mass, based on trajectories generated by molecular simulation methods (Molecular Dynamics, Monte Carlo). When designing this application, the emphasis was placed on ease of use as well as ease of further development. In its current version, the program can read trajectories generated by the well-known DL_POLY package, but it can be easily extended to handle other formats. It is also very easy to 'hack' the program so it can compute intermolecular radial distribution functions for groups of interaction sites rather than whole molecules.
Robust shot-noise measurement for continuous-variable quantum key distribution
NASA Astrophysics Data System (ADS)
Kunz-Jacques, Sébastien; Jouguet, Paul
2015-02-01
We study a practical method to measure the shot noise in real time in continuous-variable quantum key distribution systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e., noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.
Development of Theoretical Foundations for Description and Analysis of Discrete Information Systems
1975-05-07
on work of M. Hack , M.W. Marean, J.M, Myers, and P.M. Shapiro. What is presented is an introduction to a body of methods related to Pngmatic...Program FrPPU910 which creates the Account Validation file (FFPFDS20) from input cards without contacting any other files in the system FP-910 The...34•"■ •""^•"’J«^ *• ^’’•"’»’">* ^’*», *’" \\’, A6. S18 FPU PDS 10 Rcqulslclo.) Master S20 FFPFDS20 Account Validation (used to check thai charges
Using the Wiimote as a sensor in water research
NASA Astrophysics Data System (ADS)
Hut, R. W.; Weijs, S. V.; Luxemburg, W. M. J.
2010-12-01
The $40 "Wiimote" (an input device belonging with the Nintendo® Wii™ game system) can be used by hydrologists as a sensor. The device contains three accelerometers and an infrared camera with built-in source tracking. It communicates by Bluetooth®. Because of the efforts of the hacking community it is now easy to let the Wiimote communicate with a standard personal computer. Using a floating evaporation pan as an example, we show that the Wiimote, although it may have potential drawbacks when used in field campaigns, is a good addition to the hydrologist's bag of tools, especially for proof of concept testing.
Expertise Reversal for Iconic Representations in Science Visualizations
ERIC Educational Resources Information Center
Homer, Bruce D.; Plass, Jan L.
2010-01-01
The influence of prior knowledge and cognitive development on the effectiveness of iconic representations in science visualizations was examined. Middle and high school students (N = 186) were given narrated visualizations of two chemistry topics: Kinetic Molecular Theory (Day 1) and Ideal Gas Laws (Day 2). For half of the visualizations, iconic…
2013-04-22
Students assemble balloon race cars and Alka-Seltzer film canister rockets to demonstrate Newton's third Law of motion at the NASA Science Gallery at Union Station, Monday, April 22, 2013 in Washington. The NASA Science Gallery exhibits are being sponsored by NASA in honor of Earth Day. (Photo Credit: NASA/Carla Cioffi)
JPRS Report Science & Technology USSR: Life Sciences
1988-09-27
Mos- cow ] [Abstract] Two tritiated probes were devised for study- ing the nature of receptors for the 1,4-dihydropyridine class of calcium channel...purulent wounds, 64 with carbuncles, 61 with mastitis and 57 with panaris. Some patients (33) had concomi- tant disease, which aggravated the course...wounds and within 5.2 days after beginning of treatment of mastitis , panaris and carbuncles in comparison to 5.8 days and 7.8 days, JPRS-ULS-88
JPRS Report, Science & Technology, USSR: Life Sciences
1990-12-11
and duration of neutropenia . A specialized hospital treated 115 ARS patients with degrees of severity I-IV who were victims of the Cher- nobyl AES... neutropenia (less than 500 neutrophils per 1 ul). Five patients died between days 48 and 99, even after restoration of hemopoiesis. The infectious...radiation (15 to 34 days), duration of neutropenia with a cell count of 500 per 1 ul or less (6-22 days), severity of oropharyngeal syndrome (II-IV
Project Tektite 1: A multiagency 60-day saturated dive
NASA Technical Reports Server (NTRS)
Pauli, D. C. (Editor); Cole, H. A. (Editor)
1970-01-01
The history, organization, and accomplishments of Project Tektite are presented. The project demonstrated that it is possible for men to live and work successfully at underwater depths of 49 feet. The biomedical responses of the aquanauts to the 60 day dive are described. The behavioral and psychological responses to each other, the work, and the isolated environment are reported. The experiments conducted in the fields of marine science, psychological sciences, and biomedical sciences are discussed.
The reproducibility of research and the misinterpretation of p-values
2017-01-01
We wish to answer this question: If you observe a ‘significant’ p-value after doing a single unbiased experiment, what is the probability that your result is a false positive? The weak evidence provided by p-values between 0.01 and 0.05 is explored by exact calculations of false positive risks. When you observe p = 0.05, the odds in favour of there being a real effect (given by the likelihood ratio) are about 3 : 1. This is far weaker evidence than the odds of 19 to 1 that might, wrongly, be inferred from the p-value. And if you want to limit the false positive risk to 5%, you would have to assume that you were 87% sure that there was a real effect before the experiment was done. If you observe p = 0.001 in a well-powered experiment, it gives a likelihood ratio of almost 100 : 1 odds on there being a real effect. That would usually be regarded as conclusive. But the false positive risk would still be 8% if the prior probability of a real effect were only 0.1. And, in this case, if you wanted to achieve a false positive risk of 5% you would need to observe p = 0.00045. It is recommended that the terms ‘significant’ and ‘non-significant’ should never be used. Rather, p-values should be supplemented by specifying the prior probability that would be needed to produce a specified (e.g. 5%) false positive risk. It may also be helpful to specify the minimum false positive risk associated with the observed p-value. Despite decades of warnings, many areas of science still insist on labelling a result of p < 0.05 as ‘statistically significant’. This practice must contribute to the lack of reproducibility in some areas of science. This is before you get to the many other well-known problems, like multiple comparisons, lack of randomization and p-hacking. Precise inductive inference is impossible and replication is the only way to be sure. Science is endangered by statistical misunderstanding, and by senior people who impose perverse incentives on scientists. PMID:29308247
Especially for Teachers: Selected Documents on the Teaching of Science 1966-1981.
ERIC Educational Resources Information Center
Helgeson, Stanley, Comp.; And Others
Designed to supplement the day-to-day planning, teaching, and evaluation activities of science teachers at all educational levels, this compilation contains over 900 resumes of practitioner-oriented documents announced in "Resources in Education" (RIE) between 1966 and 1981. The resumes are presented under these headings: (1) elementary…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-06
..., fathers, public health and environmental science professional organizations and practitioners, and schools..., 2011, pages 23603-23605, and allowed 60 days for public comment. Two written comments and two verbal... allow an additional 30 days for public comment. The National Institutes of Health may not conduct or...
Landsat science team meeting: Summer 2015
Schroeder, Todd; Loveland, Thomas; Wulder, Michael A.; Irons, James R.
2015-01-01
With over 60 participants in attendance, this was the largest LST meeting ever held. Meeting topics on the first day included Sustainable Land Imaging and Landsat 9 development, Landsat 7 and 8 operations and data archiving, the Landsat 8 Thermal Infrared Sensor (TIRS) stray-light issue, and the successful Sentinel-2 launch. In addition, on days two and three the LST members presented updates on their Landsat science and applications research. All presentations are available at landsat.usgs.gov/science_LST_Team_ Meetings.php.
2017-04-01
The 4th Annual Congress on Medicine & Science in Ultra-Endurance Sports will be held on May 30, 2017, in Denver, Colorado. While prior meetings have been multiple-day events, the 2017 Congress will be an intense 1-day preconference to the American College of Sports Medicine annual meeting. Details of this Congress, as well as past and future meetings, can be found at the Ultra Sports Science Foundation Web site: http://ultrasportsscience.us.
Next-generation Strategies for Human Lunar Sorties
NASA Technical Reports Server (NTRS)
Cohen, B. A.
2013-01-01
The science community has had success in remote field experiences using two distinctly different models for humans-in-the-loop: the Apollo Science Support team (science backroom), and the robotic exploration of Mars. In the Apollo experience, the science team helped train the crew, designed geologic traverses, and made real-time decisions by reviewing audio and video transmissions and providing recommendations for geologic sampling. In contrast, the Mars Exploration Rover (MER) and Mars Science Lab (MSL) missions have been conducted entirely robotically, with significant time delays between science- driven decisions and remote field activities. Distinctive operations methods and field methodologies were developed for MER/MSL [1,2] because of the reliance on the "backroom" science team (rather than astronaut crew members) to understand the surroundings. Additionally, data are relayed to the team once per day, giving the team many hours or even days to assimilate the data and decide on a plan of action.
NASA Astrophysics Data System (ADS)
2008-09-01
Use your degree The UK's Training and Development Agency is seeking to persuade science and maths graduates who are unhappy in their current jobs to consider switching to teaching. According to their research, 75% of recent science and maths graduates expected to be able to use their degree in their profession, but 46% are dissatisfied because they cannot now use the knowledge and skills gained during their degree in their day-to-day work. This research, which comprised interviews with 200 maths and science graduates who graduated up to three years ago, forms part of a campaign to recruit up to 6000 science and maths teachers for the new school year.
USSR Report, Life Sciences, Biomedical and Behavioral Sciences.
1987-02-06
containing hyphal bodies were innocuous for the aphids. Some toxicity was shown by the 2-day culture marked by initial stages of sporulation. Highest...Medical Institute] [Abstract] Medium MW blood peptides have been previously demonstrated in burn studies to possess toxic effect, a fact that provided a...and 7-12 days after use of 0.6-1.2g doses of the drug three times a day. The effect of mebicar was compared with the effect of piracetam in doses
Teaching planetary sciences to elementary school teachers: Programs that work
NASA Technical Reports Server (NTRS)
Lebofsky, Larry A.; Lebofsky, Nancy R.
1993-01-01
Planetary sciences can be used to introduce students to the natural world which is a part of their lives. Even children in an urban environment are aware of such phenomena as day and night, shadows, and the seasons. It is a science that transcends cultures, has been prominent in the news in recent years, and can generate excitement in young minds as no other science can. Planetary sciences also provides a useful tool for understanding other sciences and mathematics, and for developing problem solving skills which are important in our technological world. However, only 15 percent of elementary school teachers feel very well qualified to teach earth/space science, while better than 80 percent feel well qualified to teach reading; many teachers avoid teaching science; very little time is actually spent teaching science in the elementary school: 19 minutes per day in K-3 and 38 minutes per day in 4-6. While very little science is taught in elementary and middle school, earth/space science is taught at the elementary level in less than half of the states. It was pointed out that science is not generally given high priority by either teachers or school districts, and is certainly not considered on a par with language arts and mathematics. Therefore, in order to teach science to our youth, we must empower our teachers, making them familiar and comfortable with existing materials. In our earlier workshops, several of our teachers taught in classrooms where the majority of the students were Hispanic (over 90 percent). However, few space sciences materials existed in Spanish. Therefore, most of our materials could not be used effectively in the classroom. To address this issue, NASA materials were translated into Spanish and a series of workshops for bilingual classroom teachers from Tucson and surrounding cities was conducted. Our space sciences workshops and our bilingual classroom workshops and how they address the needs of elementary school teachers in Arizona are addressed in detail.
Little C Creativity: A Case for Our Science Classroom--An Indian Perspective
ERIC Educational Resources Information Center
Chander, Subhash
2012-01-01
The number of day-to-day challenges has increased at every stage of life, particularly in developing countries, and therefore there is a crying need for a search for solutions. Education plays an important role in providing correct direction, and science education can prove crucial in achieving this goal. Solutions to individual as well as…
The Butterfly that Stamped or the Elephant's Child
ERIC Educational Resources Information Center
Watkinson, Anne
2005-01-01
In those far off days, before the days of the National Curriculum, there lived two rare beasts in the primary jungle. The beasts were known as "science" and "citizenship", and it depended on which school one went to, and which teacher one got, as to whether one learned any science at all or whether discussion of ethical issues…
Meteorology and Climate Inspire Secondary Science Students
ERIC Educational Resources Information Center
Charlton-Perez, Andrew; Dacre, Helen; Maskell, Kathy; Reynolds, Ross; South, Rachel; Wood, Curtis
2010-01-01
As part of its National Science and Engineering Week activities in 2009 and 2010, the University of Reading organised two open days for 60 local key stage 4 pupils. The theme of both open days was "How do we predict weather and climate?" Making use of the students' familiarity with weather and climate, several concepts of relevance to secondary…
ERIC Educational Resources Information Center
Burton, Larry D.; Nino, Ruth J.; Hollingsead, Candice C.
2004-01-01
This investigation focused on instructional practices within fifth- through eighth-grade science classes of selected Seventh-day Adventist schools. Teachers reported regular use of discussion, student projects, and tests or quizzes. Most respondents said they did not feel prepared or had "never heard of" inquiry, the learning cycle, or…
International Primary Science: What's in It for Us?
ERIC Educational Resources Information Center
Dunne, Mick; Maklad, Rania
2013-01-01
It is all too common, given the considerable day-to-day challenges facing those involved in education, to focus on the here and now rather than look further afield. The authors of this article have been fortunate enough to see "primary science" in a wide range of international settings, from Nigeria to Chile, North America and Canada,…
NASA Astrophysics Data System (ADS)
Keyser, V.
2015-12-01
Philosophers of science discuss how multiple modes of measurement can generate evidence for the existence and character of a phenomenon (Horwich 1982; Hacking 1983; Franklin and Howson 1984; Collins 1985; Sober 1989; Trout 1993; Culp 1995; Keeley 2002; Staley 2004; Weber 2005; Keyser 2012). But how can this work systematically in climate change measurement? Additionally, what conclusions can scientists and policy-makers draw when different modes of measurement fail to be robust by producing contradictory results? First, I present a new technical account of robust measurement (RAMP) that focuses on the physical independence of measurement processes. I detail how physically independent measurement processes "check each other's results." (This account is in contrast to philosophical accounts of robustness analysis that focus on independent model assumptions or independent measurement products or results.) Second, I present a puzzle about contradictory and divergent climate change measures, which has consistently re-emerged in climate measurement. This discussion will focus on land, drilling, troposphere, and computer simulation measures. Third, to systematically solve this climate measurement puzzle, I use RAMP in the context of drought measurement in order to generate a classification of measurement processes. Here, I discuss how multimodal precipitation measures—e.g., measures of precipitation deficit like the Standard Precipitation Index vs. air humidity measures like the Standardized Relative Humidity Index--can help with the classification scheme of climate change measurement processes. Finally, I discuss how this classification of measures can help scientists and policy-makers draw effective conclusions in contradictory multimodal climate change measurement contexts.
A Space Science Summer Program for Minority Students in Middle School
NASA Astrophysics Data System (ADS)
Baker, A. M.; Patterson, L. A., III; Walter, D. K.
2003-05-01
South Carolina State University's (SCSU) Center for NASA Research and Technology started the Space Science Academy in 1998 for underrepresented minority students and teachers in grades 7-9. It has been offered every summer since then and has expanded from five half-days in 1998 to its current format as a full, two-week, residential program for the students with an additional three days of training for the teachers. Nearly 120 students and twenty teachers have participated over the years. The three day workshop for in-service and preservice teachers is based on the national and state science standards and includes hands-on, inquiry-based activities. The students live in the dorms on the campus at SCSU during the two weeks of the Space Science Academy. Sample activities include construction of model rockets and the planet Saturn, an in-depth study of the Sun and accessing astrophysical and NASA websites. We wish to acknowledge generous funding from the NASA MU-SPIN project through NCC 5-116 and NCC 5-534 as well as an IDEAS grant HST-ED-90242.01-A through the Space Telescope Science Institute.
Overview of the NASA Suborbital Program
NASA Astrophysics Data System (ADS)
Jones, W. Vernon
2014-08-01
The NASA Suborbital Program consists of Sounding Rocket and Balloon Projects managed, respectively, by the Heliophysics and Astrophysics Divisions of the Science Mission Directorate, which maintains “Program” Offices at the NASA Wallops Flight Facility. Suborbital missions have for several decades enabled investigations with significant results from relatively modest investments. Some have been competitive with orbital missions, while others have enabled orbital missions. NASA launches suborbital missions from sites established in the U.S. and around the world to meet investigators’ needs. A sea change in scientific ballooning occurred with the inauguration of 8 - 20 day flights around Antarctica in the early 1990’s. The U.S. National Science Foundation supports these circumpolar flights, which have been spectacularly successful with many investigations utilizing multiple flights of payloads that are recovered, refurbished, and reused to minimize life-cycle costs. The attainment of 25 - 32 day and 35 - 55 day flights in two and three circumnavigations, respectively, of the Antarctic continent has greatly increased expectations of scientific users. The 55-day Super-TIGER flight over Antarctica during the 2012-13 season broke the 42-day CREAM record during the 2004-05 season, as well as the 54-day super pressure balloon test flight in 2008-09. Qualification of super pressure flights to support 1000 kg science instruments for up to 100 days at 33 km have proceeded in parallel with plans to increase the altitude for less massive instruments requiring less atmospheric overburden. The nearly constant volume of super-pressure balloons allows stable altitude flights at non-polar latitudes. Long-duration flights in both polar and non-polar regions will confirm the important contributions that ballooning can make in traditional Astrophysics, Solar and Heliophysics, and Earth Science disciplines. With two comets approaching the sun in 2013-14, the Planetary Science community has shown increased interest in remote observations of comets, planets, and other objects in the Solar System.
Science 101: What Constitutes a Good Science Project
ERIC Educational Resources Information Center
Robertson, Bill
2016-01-01
Having written columns dealing with science fairs before, Bill Robertson notes that it's been a long time since he has tackled the subject of what passes for a "science fair" in schools these days. Because science fairs have changed over the years, Robertson revisits the topic and explains the scientific method. The main focus of the…
Ventures in science status report, Summer 1992
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The Ventures in Science summer program is directed towards students who are from underrepresented minority groups in mathematics and science professions. The target group of 40 was drawn from eligible students who will be entering high school freshman in the fall of 1992. 450 students applied. The theme for the summer is Chicago as an Ecosystem. The students are instructed in integrated math and science (2 hours), English/ESL (1 1/2 hrs.), counseling (1 hr.) and, physical education (1 hr.) each day four days a week. Integrated math and science are team taught. Parents are invited to participate in two workshopsmore » that will be presented based on their input. Parents may also visit the program at any time and participate in any field trip.« less
Ventures in science status report, Summer 1992. [Program description and Evaluation Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fredrick, Wayne C.
The Ventures in Science summer program is directed towards students who are from underrepresented minority groups in mathematics and science professions. The target group of 40 was drawn from eligible students who will be entering high school freshman in the fall of 1992. 450 students applied. The theme for the summer is Chicago as an Ecosystem. The students are instructed in integrated math and science (2 hours), English/ESL (1 1/2 hrs.), counseling (1 hr.) and, physical education (1 hr.) each day four days a week. Integrated math and science are team taught. Parents are invited to participate in two workshopsmore » that will be presented based on their input. Parents may also visit the program at any time and participate in any field trip.« less
NASA Astrophysics Data System (ADS)
2013-09-01
Conference: The Big Bangor Day Meeting Lecture: Charterhouse plays host to a physics day Festival: Science on Stage festival 2013 arrives in Poland Event: Scottish Physics Teachers' Summer School Meeting: Researchers and educators meet at Lund University Conference: Exeter marks the spot Recognition: European Physical Society uncovers an historic site Education: Initial teacher education undergoes big changes Forthcoming events
1996-02-08
SS6. Ccifcted SS7 . Si;*: amount of water Between spoon and 0’.:- Je ol sample. B - 33 Page 3 of - Fort Sheridan RI/FS a r — H5 -20 -25 m o...few cobbles. Colected SS7 . Collected SS8. B - 56 c- _- Fort Sheridan RI/FS Log of Well LF02SB02/LF2MW02 n SL — ID " Q — -15 II CD O...sana anc !Vie gravel, roots, very dark gray brown (IOYR 3/2). low plasticity, soft. aast. Coat sone fine sand and grave* Hack (2.5Y 2/0) to black
A very deep IRAS survey - Constraints on the evolution of starburst galaxies
NASA Astrophysics Data System (ADS)
Hacking, Perry; Condon, J. J.; Houck, J. R.
1987-05-01
Counts of sources (primarily starburst galaxies) from a deep 60 microns IRAS survey published by Hacking and Houck (1987) are compared with four evolutionary models. The counts below 100 mJy are higher than expected if no evolution has taken place out to a redshift of approximately 0.2. Redshift measurements of the survey sources should be able to distinguish between luminosity-evolution and density-evolution models and detect as little as a 20 percent brightening or increase in density of infrared sources per billion years ago (H/0/ = 100 km/s per Mpc). Starburst galaxies cannot account for the reported 100 microns background without extreme evolution at high redshifts.
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
NASA Astrophysics Data System (ADS)
Polosukhina, N.
The detection of remarkable variations in the profile of the resonance doublet Li I 6708 Å with rotational phase of the roAp star HD 83368 (North et al. 1998) prompted us to consider the behaviour of other characteristics of this star. The observational data on magnetic field (Heff), brightness and amplitude of rapid light oscillations of HD 83368 are analyzed. A clear synchronism appears between the variations of the Li line intensity, brightness, magnetic field and pulsation amplitude with rotational phase, which can be explained in terms of a spotted rotator model. Reference: North P., Polosukhina N., Malanushenko V., Hack M., 1998, A&A 333, 644
Light field reconstruction robust to signal dependent noise
NASA Astrophysics Data System (ADS)
Ren, Kun; Bian, Liheng; Suo, Jinli; Dai, Qionghai
2014-11-01
Capturing four dimensional light field data sequentially using a coded aperture camera is an effective approach but suffers from low signal noise ratio. Although multiplexing can help raise the acquisition quality, noise is still a big issue especially for fast acquisition. To address this problem, this paper proposes a noise robust light field reconstruction method. Firstly, scene dependent noise model is studied and incorporated into the light field reconstruction framework. Then, we derive an optimization algorithm for the final reconstruction. We build a prototype by hacking an off-the-shelf camera for data capturing and prove the concept. The effectiveness of this method is validated with experiments on the real captured data.
Measurement-device-independent quantum cryptography
Xu, Feihu; Curty, Marcos; Qi, Bing; ...
2014-12-18
In theory, quantum key distribution (QKD) provides information-theoretic security based on the laws of physics. Owing to the imperfections of real-life implementations, however, there is a big gap between the theory and practice of QKD, which has been recently exploited by several quantum hacking activities. To fill this gap, a novel approach, called measurement-device-independent QKD (mdiQKD), has been proposed. In addition, it can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKD systems, thus offering a clear avenue toward secure QKD realisations. In this study, we review the latest developments in the framework of mdiQKD,more » together with its assumptions, strengths, and weaknesses.« less
7 years of MacGyver sessions at EGU and AGU: what happened?
NASA Astrophysics Data System (ADS)
Hut, Rolf; Selker, John; Weijs, Steven; Luxemburg, Wim; Wickert, Andy; Blume, Theresa; Bamburger, Jan; Stoof, Cathelijne; Tauro, Flavia
2016-04-01
The session that this poster is in, the: "Self-made sensors and unintended use of measurement equipment", also known as the "MacGyver-session" has had 7 years of scientists contributing their self made devices, hacks and solutions with the hydrological community. In 2009, the first session was held at the AGU fall meeting and since 2011 a session is also organised at the EGU General Assembly. On this poster, and in the accompanying review paper, we will present an overview of the work presented in the last 7 years, cataloging the work of the inventive scientists who have contributed to these successful, and above all: fun, sessions.
A Weak Value Based QKD Protocol Robust Against Detector Attacks
NASA Astrophysics Data System (ADS)
Troupe, James
2015-03-01
We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.
NASA Astrophysics Data System (ADS)
Nelson, Benjamin Earl; Wright, Jason Thomas; Wang, Sharon
2015-08-01
For this hack session, we will present three tools used in analyses of radial velocity exoplanet systems. RVLIN is a set of IDL routines used to quickly fit an arbitrary number of Keplerian curves to radial velocity data to find adequate parameter point estimates. BOOTTRAN is an IDL-based extension of RVLIN to provide orbital parameter uncertainties using bootstrap based on a Keplerian model. RUN DMC is a highly parallelized Markov chain Monte Carlo algorithm that employs an n-body model, primarily used for dynamically complex or poorly constrained exoplanet systems. We will compare the performance of these tools and their applications to various exoplanet systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dagget, D.
Exploration for and mining of uranium ore is going on within 10 miles of the Grand Canyon National Park. The current rush started in 1980, when a Denver-based company, Energy Fuels Nuclear, took over a claim in Hack Canyon and uncovered a very rich deposit of uranium ore. Recent explorations have resulted in some 1300 claims in the area around the Grand Canyon, many of them in the Arizona Strip, the land between the Canyon and Utah. The center of current controversy is the 1872 Mining Law. Replacement of the law with a leasing system similar to that used formore » leasable minerals such as coal, oil shale, oil and gas, potash, and phosphate is advocated. 1 figure.« less
Strange Bedfellows: Anachronisms, Identity Politics, and the Queer Case of Trans.
Gailey, Nerissa
2017-01-01
This article explores trans identities, as articulated within a few historical texts. From early literary depictions of gender difference, to medicalized conceptions of transsexualism, to a proliferation of trans and queer identities represented by an ever-expanding "alphabet soup" of identity labels, our understandings of identities, sexualities, and queer community-building continue to change. I use the notion of "kind-making," as elaborated on in the work of Ian Hacking, to illustrate that some queer and trans identifications are affiliative, whereas others are contrastive or oppositional in nature, and these structural differences have important implications with respect to understanding identity and sexuality, and also trans inclusion within LGBT communities and activist efforts.
Rehabilitation of degraded forests in Asia. World Bank technical paper
DOE Office of Scientific and Technical Information (OSTI.GOV)
Banerjee, A.K.
The degraded forests discussed in this paper are those that have been so badly damaged they have completely lost their protective or productive functions--but still retain their potential revive. The paper focusses on the major areas in Asia fitting this description: swidden agriculture areas in moist forests; human-induced extensive Imperata grasslands; repeatedly hacked, low-profile hardwood forests; and overlogged forests. The areas are defined carefully to determine their extent in Asia; key characteristics are described; their impacts on the local ecology are evaluated; the social and economic pressures that prolong the degradation are analyzed; and technical methods for rehabilitating the damagedmore » areas are proposed.« less
Regalo, Gonçalo; Leutz, Achim
2013-01-01
Initiating neoplastic cell transformation events are of paramount importance for the comprehension of regeneration and vanguard oncogenic processes but are difficult to characterize and frequently clinically overlooked. In epithelia, pre-neoplastic transformation stages are often distinguished by the appearance of phenotypic features of another differentiated tissue, termed metaplasia. In haemato/lymphopoietic malignancies, cell lineage ambiguity is increasingly recorded. Both, metaplasia and biphenotypic leukaemia/lymphoma represent examples of dysregulated cell differentiation that reflect a history of trans-differentiation and/or epigenetic reprogramming. Here we compare the similarity between molecular events of experimental cell trans-differentiation as an emerging therapeutic concept, with lineage confusion, as in metaplasia and dysplasia forecasting tumour development. PMID:23828660
Armstrong, David G.; Kleidermacher, David N.; Klonoff, David C.; Slepian, Marvin J.
2015-01-01
We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as “medjacking”) is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. PMID:26319227
Armstrong, David G; Kleidermacher, David N; Klonoff, David C; Slepian, Marvin J
2015-08-27
We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as "medjacking") is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. © 2015 Diabetes Technology Society.
Why am I not disabled? Making state subjects, making statistics in post--Mao China.
Kohrman, Matthew
2003-03-01
In this article I examine how and why disability was defined and statistically quantified by China's party-state in the late 1980s. I describe the unfolding of a particular epidemiological undertaking--China's 1987 National Sample Survey of Disabled Persons--as well as the ways the survey was an extension of what Ian Hacking has called modernity's "avalanche of numbers." I argue that, to a large degree, what fueled and shaped the 1987 survey's codification and quantification of disability was how Chinese officials were incited to shape their own identities as they negotiated an array of social, political, and ethical forces, which were at once national and transnational in orientation.
Veterinary Aspects of Bird of Prey Reproduction.
Bailey, Tom A; Lierz, Michael
2017-05-01
Captive breeding has contributed to successful restoration of many species of birds of prey. Avicultural techniques pioneered by raptor breeders include double clutching, direct fostering, cross-fostering, hatch and switch, hacking, imprinting male and female falcons for semen collection, and artificial insemination techniques. However, reproductive failure occurs related to management problems, including hygiene measures, food quality issues, breeding flock structure, or individual health issues of breeding birds. These may result in non-egg laying females, low-quality eggs, or infertile eggs caused by male infertility. Veterinary care of breeding collections is extremely important. This article provides an overview of veterinary involvement in raptor breeding projects. Copyright © 2016 Elsevier Inc. All rights reserved.
Paradigms and Postmodernism in Science and Science Education.
ERIC Educational Resources Information Center
Pushkin, David B.
Science, particularly the physical sciences, has undergone several paradigm shifts during history. The modernistic and mechanistic world that was viewed through the lens of Newton's laws no longer offers valid answers to present-day questions. This paper examines four themes: the evolution of physics, the evolution of chemistry, the evolution of…
Water Pollution, Environmental Science Curriculum Guide Supplement.
ERIC Educational Resources Information Center
McKenna, Harold J.
This curriculum guide is a 40-day unit plan on water pollution developed, in part, from the National Science Foundation Environmental Science Institutes' Ninth Grade Environmental Science Curriculum Guide. This unit contains teacher lesson plans, suggested teacher and student modules, case studies, and activities to be developed by teachers…
ERIC Educational Resources Information Center
Mlangeni, Angstone Noel J. Thembachako; Chiotha, Sosten Staphael
2015-01-01
A study was conducted to investigate factors that affect students' poor performance in physical science examinations at Malawi School Certificate of Education and Junior Certificate of Education levels in Community day secondary schools (CDSS) in Lilongwe Rural West Education District in Malawi. Students' performance was collected from schools'…
Williams, Austin D; Mann, Barry D
2017-02-01
As they enter the clinical years, medical students face large adjustments in the acquisition of medical knowledge. We hypothesized that basic science review related to the topic of journal club papers would increase the educational benefit for third-year medical students. Students were randomized either to participation in a review session about basic science related to the journal club paper, or to no review. After one day, and after three months, students were given a 10-question quiz encompassing the basic science and the clinical implications of the paper. Twenty-six of 50 students were randomized to basic science review. These students scored better on both sections of the quiz one day after journal club, but only on basic science questions after three months. Students who participated in basic science review had better knowledge gain and retention. Educational activities building upon foundational knowledge improves learning on clinical rotations. Copyright © 2016 Elsevier Inc. All rights reserved.
Sun-Earth Days- "Have a Solar Blast"- Educational Outreach on a National Scale
NASA Astrophysics Data System (ADS)
Mortfield, P.; Lewis, E. M.; Cline, T.; Thieman, J. R.
2001-05-01
Sun-Earth Days was an Educational Outreach on a Massive Scale. This was NASA's first-ever "Sun-Earth Days," April 27-28, 2001, developed to share information and excitement about our star and its electric connection to Earth. For the year 2001, NASA's Sun-Earth Connection missions and The Astronomical League partnered to sponsor this educational and entertaining event in the context of National Astronomy Day and Week. As part of NASA's Sun-Earth Connection Education Forum's Sun-Earth Day events, a webcast was hosted by EPO team at Stanford SOLAR Center in collaboration with Astronomy Day and Project Astro. Prior to the webcast NASA Centers and the Educator Resource Centers conducted training workshops to aid 4000 teachers in their participation in the interactive webcast. The webcast involved 35,000 students from across the country and allowed students an opportunity to present results from a variety of solar activities and interact with fellow students. NASA Scientists were on hand to field questions, and had the opportunity to tell viewers why they chose their exciting careers. Webcasts are a great way to reach and interact with a large audience of educators and students who wish to incorporate the science of the Sun into their curriculum. Sun-Earth Days was on the Web, with a single website of information, featuring excellent classroom activities and ideas, selections of the best background reading on the science, links to our many spacecraft and science missions, and some pointers to raw science data and imagery on the web. Sun-Earth Days kits were assembled and packaged through NASA's CORE, a distribution facility in Ohio and mailed to each of the NASA Centers and 25 Educator Resource Centers who participated in a training workshop for educators. Over 4000 educators attended workshops through the NASA network to learn about the Sun. " An Event Near You", portion of the website, listed the events within the USA that linked scientists with educators and created a wide network for learning about the Sun across the USA. Numerous publications announced the event and Discovery Science Channel supported NASA's Sun-Earth Days with two special programs, SAVAGE SUN and THE SUN. There have been many lessons learned during the development and initiation of Sun-Earth Days, as a national event. The most rewarding and exciting outcome was the demand for materials and the positive response for the event, leading to the determination to continue as an annual event. The results will be featured and plans announced for the second annual event, which features the Sun and the science from Sun-Earth Connection missions, in anticipation of others joining us for 2002 to make use of this medium for their education and outreach efforts
Empowering Teachers to Teach Science in the Early Years in Mauritius
ERIC Educational Resources Information Center
Kamudu Applasawmy, B.; Naugah, J.; Maulloo, A. K.
2017-01-01
Children act as emergent scientists through active involvement with their environment and adults. Science forms an important component of early childhood education curriculum in Mauritius. Since 2015, The Rajiv Gandhi Science Centre (RGSC), has initiated a new project: empowering educators to teach science in pre-primary schools. One-day workshop…
ERIC Educational Resources Information Center
Bircher, Lisa S.; Sansenbaugher, Bonnie
2017-01-01
This article describes an elementary science summer day camp at East Palatine High School in East Palestine, Ohio, for students in grades K-4, aided by high school (grades 9-12) student mentors. The school's Outdoor Area for Studies in Science (OASIS) is used for formal and informal studies in science for an elementary science camp week. The camp…
ERIC Educational Resources Information Center
Harris, Richard; Ratcliffe, Mary
2005-01-01
This project was designed to examine the feasibility of using a "collapsed day" to explore socio-scientific issues relating to genes and genetic engineering in secondary schools by enabling science and humanities staff to collaborate. It was believed that science staff would have expertise in promoting understanding of genetics and humanities…
ERIC Educational Resources Information Center
Raker, Jeffrey R.; Towns, Marcy H.
2012-01-01
Understanding of the nature of science is key to the development of new curricular materials that mirror the practice of science. Three problem types (project level, synthetic planning, and day-to-day) in synthetic organic chemistry emerged during a thematic content analysis of the research experiences of eight practising synthetic organic…
The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems
NASA Astrophysics Data System (ADS)
Bianco, Louis J.
The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.
NASA Astrophysics Data System (ADS)
Skalak, K.; Benthem, A. J.; Walton-Day, K. E.; Jolly, G.
2015-12-01
The Grand Canyon region contains a large number of breccia pipes with economically viable uranium, copper, and silver concentrations. Mining in this region has occurred since the late 19th century and has produced ore and waste rock having elevated levels of uranium and other contaminants. Fluvial transport of these contaminants from mine sites is a possibility, as this arid region is susceptible to violent storms and flash flooding which might erode and mobilize ore or waste rock. In order to assess and manage the risks associated with uranium mining, it is important to understand the transport and storage rates of sediment and uranium within the ephemeral streams of this region. We are developing a 1-dimensional sediment transportation model to examine uranium transport and storage through a typical canyon system in this region. Our study site is Hack Canyon Mine, a uranium and copper mine site, which operated in the 1980's and is currently experiencing fluvial erosion of its waste rock repository. The mine is located approximately 40km upstream from the Colorado River and is in a deep, narrow canyon with a small watershed. The stream is ephemeral for the upper half of its length and sediment is primarily mobilized during flash flood events. We collected sediment samples at 110 locations longitudinally through the river system to examine the distribution of uranium in the stream. Samples were sieved to the sand size and below fraction (<2mm) and uranium was measured by gamma-ray spectroscopy. Sediment storage zones were also examined in the upper 8km of the system to determine where uranium is preferentially stored in canyon systems. This information will quantify the downstream transport of constituents associated with the Hack Canyon waste rock and contribute to understanding the risks associated with fluvial mobilization of uranium mine waste.
NASA Astrophysics Data System (ADS)
Materazzi, Marco; Aringoli, Domenico; Carducci, Tamara; Cavitolo, Paolo; Farabollini, Piero; Giacopetti, Marco; Pambianchi, Gilberto; Tondi, Emanuele; Troiani, Francesco
2016-04-01
Quantitative geomorphic analysis can be provided a useful contribution to the study of recent tectonics. Some parameters, that quantify the channels morphology, as the Stream Length-Gradient (SL) Index (Hack, 1973) and the Steepness (Ks) Index (Flint, 1974), are generally used to detect anomalies on the expected concave-up equilibrium stream-profile, which can result in local abrupt changes in stream gradient (i.e., knickpoints) and/or broad convexities on stream long-profiles extending for tens of kilometres (i.e., knickzones). The main goal of this work is the study of the morphological and morphometrical features in the southern sector of the Marche Region, with the aim to gain new knowledge on the influences of rock resistance and rock uplift on the fluvial and topographic system. The investigated area is situated in central Italy and it extends from the axial zone of the Umbria-Marche Apennines to the Adriatic Sea, including the southern sector of the Marche Region and belongs to the foredeep domain of the Apennines orogenic system, which has affected by tectonic activity up to very recent times. The rheology of outcropping deposits doesn't allow the strain to be easily recorded at the outcrop scale. The analyses have been aimed at to test the sensitivity of both SL and Ks for evaluating active crustal deformations, acting at different wavelengths on land surface, within a low tectonically active thrust-and-fold belt. Additional purpose was the understanding of the pattern of regional differential crustal activity in the topographic arrangement of the study area In this research project two sets of analysis were conducted. References Hack J.T. 1973. Stream-profile analysis and stream-gradient index. Journal of Research of the U.S. Geological Survey, 1, 421-429. Flint J.J. 1974. Stream gradient as a function of order, magnitude and discharge. Water Resources Research, 10, 969-973.
Hack, Jason B; Goldlust, Eric J; Ferrante, Dennis; Zink, Brian J
2017-10-01
Over 35 million alcohol-impaired (AI) patients are cared for in emergency departments (EDs) annually. Emergency physicians are charged with ensuring AI patients' safety by identifying resolution of alcohol-induced impairment. The most common standard evaluation is an extemporized clinical examination, as ethanol levels are not reliable or predictive of clinical symptoms. There is no standard assessment of ED AI patients. The objective was to evaluate a novel standardized ED assessment of alcohol impairment, Hack's Impairment Index (HII score), in a busy urban ED. A retrospective chart review was performed for all AI patients seen in our busy urban ED over 24 months. Trained nurses evaluated AI patients with both "usual" and HII score every 2 hours. Patients were stratified by frequency of visits for AI during this time: high (≥ 6), medium (2-5), and low (1). Within each category, comparisons were made between HII scores, measured ethanol levels, and usual nursing assessment of AI. Changes in HII scores over time were also evaluated. A total of 8,074 visits from 3,219 unique patients were eligible for study, including 7,973 (98.7%) with ethanol levels, 5,061 (62.7%) with complete HII scores, and 3,646 (45.2%) with health care provider assessments. Correlations between HII scores and ethanol levels were poor (Pearson's R 2 = 0.09, 0.09, and 0.17 for high-, medium-, and low-frequency strata). HII scores were excellent at discriminating nursing assessment of AI, while ethanol levels were less effective. Omitting extrema, HII scores fell consistently an average 0.062 points per hour, throughout patients' visits. The HII score applied a quantitative, objective assessment of alcohol impairment. HII scores were superior to ethanol levels as an objective clinical measure of impairment. The HII declines in a reasonably predictable manner over time, with serial evaluations corresponding well with health care provider evaluations. © 2017 by the Society for Academic Emergency Medicine.
NASA Astrophysics Data System (ADS)
Pathak, Rohit; Joshi, Satyadhar
Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.
Reliability and validity of two isometric squat tests.
Blazevich, Anthony J; Gill, Nicholas; Newton, Robert U
2002-05-01
The purpose of the present study was first to examine the reliability of isometric squat (IS) and isometric forward hack squat (IFHS) tests to determine if repeated measures on the same subjects yielded reliable results. The second purpose was to examine the relation between isometric and dynamic measures of strength to assess validity. Fourteen male subjects performed maximal IS and IFHS tests on 2 occasions and 1 repetition maximum (1-RM) free-weight squat and forward hack squat (FHS) tests on 1 occasion. The 2 tests were found to be highly reliable (intraclass correlation coefficient [ICC](IS) = 0.97 and ICC(IFHS) = 1.00). There was a strong relation between average IS and 1-RM squat performance, and between IFHS and 1-RM FHS performance (r(squat) = 0.77, r(FHS) = 0.76; p < 0.01), but a weak relation between squat and FHS test performances (r < 0.55). There was also no difference between observed 1-RM values and those predicted by our regression equations. Errors in predicting 1-RM performance were in the order of 8.5% (standard error of the estimate [SEE] = 13.8 kg) and 7.3% (SEE = 19.4 kg) for IS and IFHS respectively. Correlations between isometric and 1-RM tests were not of sufficient size to indicate high validity of the isometric tests. Together the results suggest that IS and IFHS tests could detect small differences in multijoint isometric strength between subjects, or performance changes over time, and that the scores in the isometric tests are well related to 1-RM performance. However, there was a small error when predicting 1-RM performance from isometric performance, and these tests have not been shown to discriminate between small changes in dynamic strength. The weak relation between squat and FHS test performance can be attributed to differences in the movement patterns of the tests
The "normal" elongation of river basins
NASA Astrophysics Data System (ADS)
Castelltort, Sebastien
2013-04-01
The spacing between major transverse rivers at the front of Earth's linear mountain belts consistently scales with about half of the mountain half-width [1], despite strong differences in climate and rock uplift rates. Like other empirical measures describing drainage network geometry this result seems to indicate that the form of river basins, among other properties of landscapes, is invariant. Paradoxically, in many current landscape evolution models, the patterns of drainage network organization, as seen for example in drainage density and channel spacing, seem to depend on both climate [2-4] and tectonics [5]. Hovius' observation [1] is one of several unexplained "laws" in geomorphology that still sheds mystery on how water, and rivers in particular, shape the Earth's landscapes. This narrow range of drainage network shapes found in the Earth's orogens is classicaly regarded as an optimal catchment geometry that embodies a "most probable state" in the uplift-erosion system of a linear mountain belt. River basins currently having an aspect away from this geometry are usually considered unstable and expected to re-equilibrate over geological time-scales. Here I show that the Length/Width~2 aspect ratio of drainage basins in linear mountain belts is the natural expectation of sampling a uniform or normal distribution of basin shapes, and bears no information on the geomorphic processes responsible for landscape development. This finding also applies to Hack's [6] law of river basins areas and lengths, a close parent of Hovius' law. [1]Hovius, N. Basin Res. 8, 29-44 (1996) [2]Simpson, G. & Schlunegger, F. J. Geophys. Res. 108, 2300 (2003) [3]Tucker, G. & Bras, R. Water Resour. Res. 34, 2751-2764 (1998) [4]Tucker, G. & Slingerland, R. Water Resour. Res. 33, 2031-2047 (1997) [5]Tucker, G. E. & Whipple, K. X. J. Geophys. Res. 107, 1-1 (2002) [6]Hack, J. US Geol. Surv. Prof. Pap. 294-B (1957)
Girltalk: Energy, Climate and Water in the 21ST Century
NASA Astrophysics Data System (ADS)
Olson, H. C.; Osborne, V.; Bush, R.; Bauer, S.; Bourgeois, E.; Brownlee, D.; Clark, C.; Ellins, K. K.; Hempel-Medina, D.; Hernandez, A.; Hovorka, S. D.; Olson, J. E.; Romanak, K.; Smyth, R. C.; Tinker, S.; Torres-Verdin, C.; Williams, I. P.
2011-12-01
In preparation for Earth Science Week, The University of Texas at Austin, Striker Communications and Ursuline Academy of Dallas partnered on a GirlTalk event ("Energy, Climate and Water in the 21st Century") to create a two-day (Fri-Sat), community science symposium and open house on critical issues surrounding energy, water and climate. On Friday, over 800 high school girls and 100 teachers from Ursuline participated in hands-on activities (led by faculty, researchers and graduate students from UT Austin and professionals from the surrounding Dallas community), films and discussions, plenary sessions and an expert panel discussion. An opening talk by Dr. Hilary Olson on "Energy, Water and Climate in the 21st Century: Critical Issues for the Global Community" began the day. A series of hands-on activities, and science and technology films with discussion followed. Each girl had an individualized, modular schedule for the day, completing four of the over twenty modules offered. During lunch, Dr. Scott Tinker, Director of the Bureau of Economic Geology, presented a compelling talk on "Time, Technology and Transition", and afterwards girls attended another round of hands-on activities in the afternoon. The day ended with a panel discussion where girls could submit questions to the various participants from the day's activities. The exciting experience of a full day of GirlTalk led many high school girls to volunteer for the middle school event on the following morning (Sat.), when 150 middle school girls and their mentors (parents, teachers) attended a community-wide public event to learn about the energy, water and climate nexus. "Breakfast with a Pro" was hosted by the various professionals. Girls and their mentors enjoyed breakfast and discussion about topics and careers in the earth sciences and engineering with presenters, followed by an informal discussion with a panel of professionals. Next, girls and their mentors were each given a pre-assigned individual schedule: the program was an abbreviated version of the high school program, with each girl able to attend four different sessions during the half-day program. Many of the activities used were developed as part of the TeXas Earth and Space Science (TXESS) Revolution project, sponsored by the National Science Foundation and the STORE (Sequestration Training, Outreach, Research and Education) project, sponsored by the National Energy Technology Laboratory, Department of Energy.
Landsat Science Team meeting: Winter 2015
Schroeder, Todd A.; Loveland, Thomas; Wulder, Michael A.; Irons, James R.
2015-01-01
The summer meeting of the joint U.S. Geological Survey (USGS)–NASA Landsat Science Team (LST) was held at the USGS’s Earth Resources Observation and Science (EROS) Center July 7-9, 2015, in Sioux Falls, SD. The LST co-chairs, Tom Loveland [EROS—Senior Scientist] and Jim Irons [NASA’s Goddard Space Flight Center (GSFC)—Landsat 8 Project Scientist], opened the three-day meeting on an upbeat note following the recent successful launch of the European Space Agency’s Sentinel-2 mission on June 23, 2015 (see image on page 14), and the news that work on Landsat 9 has begun, with a projected launch date of 2023.With over 60 participants in attendance, this was the largest LST meeting ever held. Meeting topics on the first day included Sustainable Land Imaging and Landsat 9 development, Landsat 7 and 8 operations and data archiving, the Landsat 8 Thermal Infrared Sensor (TIRS) stray-light issue, and the successful Sentinel-2 launch. In addition, on days two and three the LST members presented updates on their Landsat science and applications research. All presentations are available at landsat.usgs.gov/science_LST_Team_ Meetings.php.
Simon van der Meer (1925-2011):. A Modest Genius of Accelerator Science
NASA Astrophysics Data System (ADS)
Chohan, Vinod C.
2011-02-01
Simon van der Meer was a brilliant scientist and a true giant of accelerator science. His seminal contributions to accelerator science have been essential to this day in our quest for satisfying the demands of modern particle physics. Whether we talk of long base-line neutrino physics or antiproton-proton physics at Fermilab or proton-proton physics at LHC, his techniques and inventions have been a vital part of the modern day successes. Simon van der Meer and Carlo Rubbia were the first CERN scientists to become Nobel laureates in Physics, in 1984. Van der Meer's lesserknown contributions spanned a whole range of subjects in accelerator science, from magnet design to power supply design, beam measurements, slow beam extraction, sophisticated programs and controls.
Translations on Eastern Europe, Scientific Affairs, Number 567
1977-12-16
becomes effective on the day of its promulgation. [signed by] Ferenc Marta general secretary 2542 CSO: 2502 11 HUNGARY ACADEMY ESTABLISHES...doctor of medical sciences, Dezso Schüler, doctor of medical sciences, Gabor Szabo , academician, Jozsef Szegi, doctor of agricultural sciences, Pal...were: Marta Dery, doctor of technical sciences, L. Gyprgy Nagy and Sandor Rohrsetzer, doctors of chemical sciences. II. The Committee of
NASA Technical Reports Server (NTRS)
Griffin, Brand Norman
2010-01-01
With 1 rover, 2 astronauts and 3 days, the Apollo 17 Mission covered over 30 km, setup 10 scientific experiments and returned 110 kg of samples. This is a lot of science in a short time and the inspiration for a barebones, return-to-the-Moon strategy called Daylight Exploration. The Daylight Exploration approach poses an answer to the question, What could the Apollo crew have done with more time and today s robotics? In contrast to more ambitious and expensive strategies that create outposts then rely on pressurized rovers to drive to the science sites, Daylight Exploration is a low-overhead approach conceived to land near the scientific site, conduct Apollo-like exploration then leave before the sun goes down. A key motivation behind Daylight Exploration is cost reduction, but it does not come at the expense of scientific exploration. As a goal, Daylight Exploration provides access to the top 10 science sites by using the best capabilities of human and robotic exploration. Most science sites are within an equatorial band of 26 degrees latitude and on the Moon, at the equator, the day is 14 Earth days long; even more important, the lunar night is 14 days long. Human missions are constrained to 12 days because the energy storage systems required to operate during the lunar night adds mass, complexity and cost. In addition, short missions are beneficial because they require fewer consumables, do not require an airlock, reduce radiation exposure, minimize the dwell-time for the ascent and orbiting propulsion systems and allow a low-mass, campout accommodations. Key to Daylight Exploration is the use of piloted rovers used as tele-operated science platforms. Rovers are launched before or with the crew, and continue to operate between crew visits analyzing and collecting samples during the lunar daylight
Preparing minority undergraduate students for successful science careers.
NASA Astrophysics Data System (ADS)
Akundi, Murty
2008-03-01
Xavier University of Louisiana is well known for being number one in graduating the most minority students in physical and biological sciences. The reason for this success is built on the concept of Standards with Sympathy in the Sciences (Triple S). This is an outgrowth of over twenty years of planning and development by the Xavier science faculty to devise a program for preparing and retaining students in the sciences and engineering. Xavier has been successfully conducting for over ten years, Summer Science Academy (SSA) for middle and high school students; Science Technology, Engineering and Mathematics (STEM) Scholars and Howard Hughes Biomedical programs for in-coming freshmen. Recently, through a grant from NSF, we have developed the Experiential Problem-solving and Analytical Reasoning (EPsAR) summer bridge program for in-coming freshmen who were given conditional admission to the university (i.e., those students who scored below the acceptable range for placement into degree mathematics courses). In this program, EPsAR participants will be engaged in problem-solving and critical thinking activities for eight hours per day, five days per week, for six weeks. Additionally, an interdisciplinary approach is taken to convey the mathematical skills learned to relate to physics, chemistry, biology, and computer science. Sixty-six students have participated in the last two years in the EPsAR program. During the first year 23 of 28 students successfully bi-passed the algebra review course and were placed into a degree credit course in mathematics. In the second year, thirty-one (31) of the 38 were advanced to a higher-level mathematics course. Twenty-three (23) out of 38 went on to degree credit math course. To retain students in the sciences peer tutoring in all the science disciplines are made available to students throughout the day for 5 days per week. Faculty and students are available to give guidance to the needed students. The University has established a Graduate Placement Office and a Center for Undergraduate Research to facilitate students' pursuit of gradate studies. The results of these efforts indicate a 40 percent graduation rate in four years and increased to 90 percent in six years in the natural sciences and 50 percent of these graduates pursue graduate/professional careers.
Beisner, Kimberly R.; Tillman, Fred D.; Anderson, Jessica R.; Antweiler, Ronald C.; Bills, Donald J.
2017-08-01
A geochemical study was conducted on 37 springs discharging from the Toroweap Formation, Coconino Sandstone, Hermit Formation, Supai Group, and Redwall Limestone north of the Grand Canyon near areas of breccia-pipe uranium mining. Baseline concentrations were established for the elements As, B, Li, Se, SiO2, Sr, Tl, U, and V. Three springs exceeded U.S. Environmental Protection Agency drinking water standards: Fence Spring for arsenic, Pigeon Spring for selenium and uranium, and Willow (Hack) Spring for selenium. The majority of the spring sites had uranium values of less than 10 micrograms per liter (μg/L), but six springs discharging from all of the geologic units studied that are located stratigraphically above the Redwall Limestone had uranium values greater than 10 μg/L (Cottonwood [Tuckup], Grama, Pigeon, Rock, and Willow [Hack and Snake Gulch] Springs). The geochemical characteristics of these six springs with elevated uranium include Ca-Mg-SO4 water type, circumneutral pH, high specific conductance, correlation and multivariate associations between U, Mo, Sr, Se, Li, and Zn, low 87Sr/86Sr, low 234U/238U activity ratios (1.34–2.31), detectable tritium, and carbon isotopic interpretation indicating they may be a mixture of modern and pre-modern waters. Similar geochemical compositions of spring waters having elevated uranium concentrations are observed at sites located both near and away from sites of uranium-mining activities in the present study. Therefore, mining does not appear to explain the presence of elevated uranium concentrations in groundwater at the six springs noted above. The elevated uranium at the six previously mentioned springs may be influenced by iron mineralization associated with mineralized breccia pipe deposits. Six springs discharging from the Coconino Sandstone (Upper Jumpup, Little, Horse, and Slide Springs) and Redwall Limestone (Kanab and Side Canyon Springs) contained water with corrected radiocarbon ages as much as 9,300 years old. Of the springs discharging water with radiocarbon age, Kanab and Side Canyon Springs contain tritium of more than 1.3 picocuries per liter (pCi/L), indicating they may contain a component of modern water recharged after 1952. Springs containing high values of tritium (greater than 5.1 pCi/L), which may suggest a significant component of modern water, include Willow (Hack), Saddle Horse, Cottonwood (Tuckup), Hotel, Bitter, Unknown, Hole in the Wall, and Hanging Springs. Fence and Rider Springs, located on the eastern end of the study area near the Colorado River, have distinctly different geochemical compositions compared to the other springs of the study. Additionally, water from Fence Spring has the highest 87Sr/86Sr for samples analyzed from this study with a value greater than those known in sedimentary rocks from the region. Strontium isotope data likely indicate that water discharging at Fence Spring has interacted with Precambrian basement rocks. Rider Spring had the most depleted values of stable O and H isotopes indicating that recharge, if recent, occurred at higher elevations or was recharged during earlier, cooler-climate conditions.
ERIC Educational Resources Information Center
Phillips, Mary Nied
2001-01-01
Describes a three-week inservice teacher education program that involves two sessions of preparatory classes ashore in nautical science and oceanography, and concludes with a nine-day sea voyage. (ASK)
The Place of Fieldwork in Science Qualifications
ERIC Educational Resources Information Center
Lambert, David; Reiss, Michael J.
2015-01-01
The place of fieldwork in both geography and science qualifications across the 14-19 age range remains contested, unclear and sometimes under threat. This article explores these issues for science education and was informed by a one-day, invitation-only workshop, which cut across geography and the sciences, that we ran at the behest of the Field…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piburn, Jesse; Morton, April
Jesse Piburn and April Morton of Oak Ridge National Laboratory's Geographic Information Science & Technology Group discuss the science and technology Pokémon GO and how it is used every day to solve real-world problems. (Pokémon GO photos/videos courtesy of Pokémon/Nintendo).
Science and football: evaluating the influence of science on performance.
Drust, B; Green, M
2013-01-01
The scientific study of football has its origins in the early research completed in the 1970's. Since these early efforts the available scientific knowledge base related to football has developed substantially. The ability of this scientific information to influence practice in the day-to-day activity of football organisations, especially elite teams, has been largely taken for granted. The close examination of this impact can lead to more uncertainty regarding the usefulness of the scientific data to the sport. Few articles are available that have attempted to critique the link between science and football practice. As such, the aims of this article are 2-fold; (i) to examine the historical background to "science and football" and to analyse the influence of sports science research on the current practice of coaches and practitioners within the sport and (ii) to identify potential ways to increase the influence of scientific research on practice in the "real world".
ERIC Educational Resources Information Center
Manzo, Rosa D.; Whent, Linda; Liets, Lauren; de la Torre, Adela; Gomez-Camacho, Rosa
2016-01-01
This study examined how science teachers' knowledge of research methods, neuroscience and drug addiction changed through their participation in a 5-day summer science institute. The data for this study evolved from a four-year NIH funded science education project called Addiction Research and Investigation for Science Educators (ARISE). Findings…
High Frequency Active Auroral Research Program (HAARP) Imager
1993-09-30
T-3 HCTL!; *WR-EN HCTL@ F- 3 HC7L! ; * HACK H(TL-@ F-4 HCTL!; ]NIiT-HOST 00 HB! F8 HCrL!; DSP-RESET INIT-HOST HCTL@ DUP F-6 HCTh! T-6 HCTU! DSP-IRQB...CONSTANTPS2 PI_HI P2-11 OR 3_-1O OR TG..LO OR CONSTANT PS3 P1I.,O P2_.i OR P3..LO OR TG_.LO OR CONSTANT PS4 PlLO P21-1I OR P3_H1 OR TGIIl OR CONSTANTPS5 P1_LO...CONSTANT PSTATEI PS2 SER-IDLE OR CONSTANT PSTATE2 PS3 SERIDLE OR CONSTANT PSTATE3 PS4 SERIDLE OR CONSTANT PSTATE4 PS5 SERIDLE OR CONSTANT PSTATES PS6
Cybersecurity for Connected Diabetes Devices
Klonoff, David C.
2015-01-01
Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. PMID:25883162
The Infrared Spectral Region of Stars
NASA Astrophysics Data System (ADS)
Jaschek, Carlos; Andrillat, Y.
1991-09-01
1. Stars in the infrared: results from IRAS H. J. G. L. M. Lamers and L. B. F. M. Watera; 2. What is expected from ISO J. P. Baluteau; 3. New infrared instrumentation S. Bensammar; 4. High resolution atomic spectroscopy in the infrared and its application to astrophysics S. Johansson; 5. Spectroscopy of early -type stars C. Jaschek; 6. Spectroscopy of late type stars U. F. Jøgensen; 7. Dust formation and evolution in circumstellar media J. P. J. Lafon; 8. The infrared solar spectrum N. Grevesse; 9. Symbiotic and related objects M. Hack; 10. Stellar photometry and spectrophotometry in the infrared R. F. Wing; 11. Stellar variability in the infrared A. Evans; 12. Circumstellar material in main sequence H. H. Aamann.
Randomness determines practical security of BB84 quantum key distribution.
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-10
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Forecasting of indirect consumables for a Job Shop
NASA Astrophysics Data System (ADS)
Shakeel, M.; Khan, S.; Khan, W. A.
2016-08-01
A job shop has an arrangement where similar machines (Direct consumables) are grouped together and use indirect consumables to produce a product. The indirect consumables include hack saw blades, emery paper, painting brush etc. The job shop is serving various orders at a particular time for the optimal operation of job shop. Forecasting is required to predict the demand of direct and indirect consumables in a job shop. Forecasting is also needed to manage lead time, optimize inventory cost and stock outs. The objective of this research is to obtain the forecast for indirect consumables. The paper shows how job shop can manage their indirect consumables more accurately by establishing a new technique of forecasting. This results in profitable use of job shop by multiple users.
Wicherts, Jelte M.; Veldkamp, Coosje L. S.; Augusteijn, Hilde E. M.; Bakker, Marjan; van Aert, Robbie C. M.; van Assen, Marcel A. L. M.
2016-01-01
The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of false positive results and may inflate effect size estimates. In this review article, we present an extensive list of 34 degrees of freedom that researchers have in formulating hypotheses, and in designing, running, analyzing, and reporting of psychological research. The list can be used in research methods education, and as a checklist to assess the quality of preregistrations and to determine the potential for bias due to (arbitrary) choices in unregistered studies. PMID:27933012
Very deep IRAS survey - constraints on the evolution of starburst galaxies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hacking, P.; Houck, J.R.; Condon, J.J.
1987-05-01
Counts of sources (primarily starburst galaxies) from a deep 60 microns IRAS survey published by Hacking and Houck (1987) are compared with four evolutionary models. The counts below 100 mJy are higher than expected if no evolution has taken place out to a redshift of approximately 0.2. Redshift measurements of the survey sources should be able to distinguish between luminosity-evolution and density-evolution models and detect as little as a 20 percent brightening or increase in density of infrared sources per billion years ago (H/0/ = 100 km/s per Mpc). Starburst galaxies cannot account for the reported 100 microns background withoutmore » extreme evolution at high redshifts. 21 references.« less
Wicherts, Jelte M; Veldkamp, Coosje L S; Augusteijn, Hilde E M; Bakker, Marjan; van Aert, Robbie C M; van Assen, Marcel A L M
2016-01-01
The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of false positive results and may inflate effect size estimates. In this review article, we present an extensive list of 34 degrees of freedom that researchers have in formulating hypotheses, and in designing, running, analyzing, and reporting of psychological research. The list can be used in research methods education, and as a checklist to assess the quality of preregistrations and to determine the potential for bias due to (arbitrary) choices in unregistered studies.
Randomness determines practical security of BB84 quantum key distribution
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-01-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359
Randomness determines practical security of BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Experimental Measurement-Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-01
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Experimental measurement-device-independent quantum key distribution.
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-27
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.
Sackner-Bernstein, Jonathan
2017-03-01
The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.
Cybersecurity for Connected Diabetes Devices.
Klonoff, David C
2015-04-16
Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. © 2015 Diabetes Technology Society.
Fable or fact?: did Janet really come to repudiate his dissociation theory?
Dorahy, Martin J; van der Hart, Onno
2006-01-01
Commencing in the late 1880s Pierre Janet developed the most complete theory of dissociation of his time. It has been suggested that Janet later repudiated his belief in dissociation theory (e.g., Hacking, 1995). Recently this viewpoint has been cited to support skepticism in dissociative identity disorder and researchers and clinicians of dissociation may be faced with such suggestions to challenge their work. The veracity of whether Janet actually recanted, or even lost interest in his dissociation theory is investigated through an examination of his later writings. Although Janet expanded his theoretical interests well beyond phenomena accounted for by dissociation, there is no evidence to indicate he renounced or lost confidence in his dissociation theory.
Common Scientific and Statistical Errors in Obesity Research
George, Brandon J.; Beasley, T. Mark; Brown, Andrew W.; Dawson, John; Dimova, Rositsa; Divers, Jasmin; Goldsby, TaShauna U.; Heo, Moonseong; Kaiser, Kathryn A.; Keith, Scott; Kim, Mimi Y.; Li, Peng; Mehta, Tapan; Oakes, J. Michael; Skinner, Asheley; Stuart, Elizabeth; Allison, David B.
2015-01-01
We identify 10 common errors and problems in the statistical analysis, design, interpretation, and reporting of obesity research and discuss how they can be avoided. The 10 topics are: 1) misinterpretation of statistical significance, 2) inappropriate testing against baseline values, 3) excessive and undisclosed multiple testing and “p-value hacking,” 4) mishandling of clustering in cluster randomized trials, 5) misconceptions about nonparametric tests, 6) mishandling of missing data, 7) miscalculation of effect sizes, 8) ignoring regression to the mean, 9) ignoring confirmation bias, and 10) insufficient statistical reporting. We hope that discussion of these errors can improve the quality of obesity research by helping researchers to implement proper statistical practice and to know when to seek the help of a statistician. PMID:27028280
Lind, Sophie E; Bowler, Dermot M
2009-06-01
This study aimed to test the hypothesis that children with autism spectrum disorder (ASD) use their knowledge of complement syntax as a means of "hacking out" solutions to false belief tasks, despite lacking a representational theory of mind (ToM). Participants completed a "memory for complements" task, a measure of receptive vocabulary, and traditional location change and unexpected contents false belief tasks. Consistent with predictions, the correlation between complement syntax score and location change task performance was significantly stronger within the ASD group than within the comparison group. However, contrary to predictions, complement syntax score was not significantly correlated with unexpected contents task performance within either group. Possible explanations for this pattern of results are considered.
Young Scientists Discuss Recent Advances, Future Challenges.
ERIC Educational Resources Information Center
Baum, Rudy M.
1989-01-01
Discusses a National Academy of Science forum at which a group of outstanding young researchers in astronomy, molecular and developmental biology, physics, chemistry, mathematics, atmospheric science, and materials science met for three days of formal presentations and informal conversations. Provides a short synopsis of major speakers. (MVL)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-05
... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology Directorate, DHS. ACTION: 30-Day notice and request for comment. SUMMARY: The Department of Homeland Security (DHS), Science & Technology (S&T...
ERIC Educational Resources Information Center
Lacy, Larry W.; And Others
National estimates of activities of science and engineering faculty in universities and four-year colleges for 1978-1979 are examined, based on a National Science Foundation survey of faculty members in 20 science and engineering (S/E) fields. Individual respondents provided information for only one 7-day period; however, the survey sample was…
ERIC Educational Resources Information Center
Sottile, James M., Jr.; Carter, William; Watson, George
The purpose of this research was to describe how self-efficacy affects the development and science achievement of practicing teachers after their participation in a half day long hands-on science lesson provided by the Science on Wheels project. The 42 practicing K-8 teachers were from eight different counties located in a rural mid-eastern state.…
NASA Astrophysics Data System (ADS)
Fensham, Peter J.
2014-09-01
In this response to Tom G. K. Bryce and Stephen P. Day's (Cult Stud Sci Educ. doi: 10.1007/s11422-013-9500-0, 2013) original article, I share with them their interest in the teaching of climate change in school science, but I widen it to include other contemporary complex socio-scientific issues that also need to be discussed. I use an alternative view of the relationship between science, technology and society, supported by evidence from both science and society, to suggest science-informed citizens as a more realistic outcome image of school science than the authors' one of mini-scientists. The intellectual independence of students Bryce and Day assume, and intend for school science, is countered with an active intellectual dependence. It is only in relation to emerging and uncertain scientific contexts that students should be taught about scepticism, but they also need to learn when, and why to trust science as an antidote to the expressions of doubting it. Some suggestions for pedagogies that could lead to these new learnings are made. The very recent fifth report of the IPCC answers many of their concerns about climate change.
USSR Report, Life Sciences Biomedical and Behavioral Sciences
1984-06-04
in Regulation of Ideomotor Movements U. G. Goryacheva and S. A. Kapustin- PSIKHOLOGICHESKIY ZHURNAL, No 1, Jan-Feb 84) 77 Perception of Binaural ...with considerable individual variability. The heart rate decreased from 116.6-124.1 beats /min, on days 2-4, to 89.9 beats /min, on day 5, for the...292-8586] PERCEPTION OF BINAURAL TEMPORAL SHIFTS Moscow PSIKHOLOGICHESKIY ZHURNAL in Russian Vol 5, No 1, Jan-Feb 84 (manuscript received 15
AGU scientists meet with legislators during Geosciences Congressional Visits Day
NASA Astrophysics Data System (ADS)
Uhlenbrock, Kristan
2011-10-01
This year marks the fourth annual Geosciences Congressional Visits Day (Geo-CVD), in which scientists from across the nation join together in Washington, D. C., to meet with their legislators to discuss the importance of funding for Earth and space sciences. AGU partnered with seven other Earth and space science organizations to bring more than 50 scientists, representing 23 states, for 2 days of training and congressional visits on 20-21 September 2011. As budget negotiations envelop Congress, which must find ways to agree on fiscal year (FY) 2012 budgets and reduce the deficit by $1.5 trillion over the next 10 years, Geo-CVD scientists seized the occasion to emphasize the importance of federally funded scientific research as well as science, technology, engineering, and math (STEM) education. Cuts to basic research and STEM education could adversely affect innovation, stifle future economic growth and competitiveness, and jeopardize national security.
1992-11-01
field of inquiry. Good solid research advances fault library science and information science for not ask- the state of the art by contributing to the...further research and application. Ennis (1967) problems faced each day by practitioners. Robert Smith commented that library science research is...under ogy, and technical communications. Library science the title "On Information Science." Keren raises interest- and information science have been
NASA Astrophysics Data System (ADS)
Anderson, Dayle; Moeed, Azra
2017-05-01
Current curriculum demands require primary teachers to teach about the Nature of Science; yet, few primary teachers have had opportunity to learn about science as a discipline. Prior schooling and vicarious experiences of science may shape their beliefs about science and, as a result, their science teaching. This qualitative study describes the impact on teacher beliefs about science and science education of a programme where 26 New Zealand primary (elementary) teachers worked fulltime for 6 months alongside scientists, experiencing the nature of work in scientific research institutes. During the 6 months, teachers were supported, through a series of targeted professional development days, to make connections between their experiences working with scientists, the curriculum and the classroom. Data for the study consisted of mid- and end-of-programme written teacher reports and open-ended questionnaires collected at three points, prior to and following 6 months with the science host and after 6 to 12 months back in school. A shift in many teachers' beliefs was observed after the 6 months of working with scientists in combination with curriculum development days; for many, these changes were sustained 6 to 12 months after returning to school. Beliefs about the aims of science education became more closely aligned with the New Zealand curriculum and its goal of developing science for citizenship. Responses show greater appreciation of the value of scientific ways of thinking, deeper understanding about the nature of scientists' work and the ways in which science and society influence each other.
Block Scheduling: Teaching Strategies for the Restructured School Day.
ERIC Educational Resources Information Center
National Science Teachers Association, Arlington, VA.
This book is a compilation of articles taken from the National Science Teachers Association (NSTA) journal entitled "The Science Teacher" that pertain to block scheduling and strategies for effective science instruction within this framework. Articles include "Blockbuster Ideas" (Judy Bohince and Ireve King), "Tackling Block Scheduling" (Martha M.…
The "Green" Root Beer Laboratory
ERIC Educational Resources Information Center
Clary, Renee; Wandersee, James
2010-01-01
No, your students will not be drinking green root beer for St. Patrick's Day--this "green" root beer laboratory promotes environmental awareness in the science classroom, and provides a venue for some very sound science content! While many science classrooms incorporate root beer-brewing activities, the root beer lab presented in this article has…
The Elementary Institute of Science 1964-1970
ERIC Educational Resources Information Center
Watts, Thomas H.
1970-01-01
Describes an elementary science institute intended to provide children with scientific training in such a way that science becomes a worthwhile and significant pursuit. The institute is financed by local donations, is staffed mostly by parents, and serves approximately 70 children four days a week after school and on Saturday. (BR)
Piburn, Jesse; Morton, April
2018-01-16
Jesse Piburn and April Morton of Oak Ridge National Laboratory's Geographic Information Science & Technology Group discuss the science and technology Pokémon GO and how it is used every day to solve real-world problems. (Pokémon GO photos/videos courtesy of Pokémon/Nintendo).
Everyday Assessment in the Science Classroom.
ERIC Educational Resources Information Center
Atkin, J. Myron, Ed.; Coffey, Janet E., Ed.
The assessment that occurs each day in the science classroom is often overlooked amidst calls for accountability in education and renewed debates about external testing. Research points to the positive influence that improved, ongoing classroom assessment can have on learning. Documents that offer visions for science education such as the National…
75 FR 15710 - Submission for OMB Review; Comment Request; Process Evaluation of the NIH's Roadmap...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-30
... the data collection plans and instruments, contact: Sue Hamann, PhD, Science Evaluation Officer, Office of Science Policy Officer and Analysis, National Institute of Dental and Craniofacial Research... days of the date of this publication. Dated: March 24, 2010. Sue Hamann, Science Evaluation Officer...
Precision agricultural systems: a model of integrative science and technology
USDA-ARS?s Scientific Manuscript database
In the world of science research, long gone are the days when investigations are done in isolation. More often than not, science funding starts with one or more well-defined challenges or problems, judged by society as high-priority and needing immediate attention. As such, problems are not defined...
ERIC Educational Resources Information Center
Colley, Kabba E.
2006-01-01
This activity discusses a two-day unit on ecology implemented during the summer of 2004 using the project-based science instructional (PBSI) approach. Through collaborative fieldwork, group discussions, presentations, and reflections, students planned, implemented, and reported their own scientific investigations on the environmental health of…
Bridging EO Research, Operations and Collaborative Learning
NASA Astrophysics Data System (ADS)
Scarth, Peter
2016-04-01
Building flexible and responsive processing and delivery systems is key to getting EO information used by researchers, policy agents and the public. There are typically three distinct processes we tackle to get product uptake: undertake research, operationalise the validated research, and deliver information and garner feedback in an appropriate way. In many cases however, the gaps between these process elements are large and lead to poor outcomes. Good research may be "lost" and not adopted, there may be resistance to uptake by government or NGOs of significantly better operational products based on EO data, and lack of accessibility means that there is no use of interactive science outputs to improve cross disciplinary science or to start a dialog with citizens. So one of the the most important tasks, if we wish to have broad uptake of EO information and accelerate further research, is to link these processes together in a formal but flexible way. One of the ways to operationalize research output is by building a platform that can take research code and scale it across much larger areas. In remote sensing, this is typically a system that has access to current and historical corrected imagery with a processing pipeline built over the top. To reduce the demand on high level scientific programmers and allowing cross disciplinary researchers to hack and play and refine, this pipeline needs to be easy to use, collaborative and link to existing tools to encourage code experimentation and reuse. It is also critical to have efficient, tight integration with information delivery and extension components so that the science relevant to your user is available quickly and efficiently. The rapid expansion of open data licensing has helped this process, but building top-down web portals and tools without flexibility and regard for end user needs has limited the use of EO information in many areas. This research reports on the operalization of a scale independent time series query API that allows the interrogation of the entire current processed Australian Landsat archive in web time. The system containerises data interrogation and time series tasks to allow easy scaling and expansion and is currently in operational use by several land management portals across the country to deliver EO land information products to government agents, NGOs and individual farmers. Plans to ingest and process the Sentinel 2 archive are well underway, and the logistics of scaling this globally using an open source project based on the Earth Engine Platform will be discussed.
Özdemir, Vural; Hekim, Nezih
2018-01-01
Driverless cars with artificial intelligence (AI) and automated supermarkets run by collaborative robots (cobots) working without human supervision have sparked off new debates: what will be the impacts of extreme automation, turbocharged by the Internet of Things (IoT), AI, and the Industry 4.0, on Big Data and omics implementation science? The IoT builds on (1) broadband wireless internet connectivity, (2) miniaturized sensors embedded in animate and inanimate objects ranging from the house cat to the milk carton in your smart fridge, and (3) AI and cobots making sense of Big Data collected by sensors. Industry 4.0 is a high-tech strategy for manufacturing automation that employs the IoT, thus creating the Smart Factory. Extreme automation until "everything is connected to everything else" poses, however, vulnerabilities that have been little considered to date. First, highly integrated systems are vulnerable to systemic risks such as total network collapse in the event of failure of one of its parts, for example, by hacking or Internet viruses that can fully invade integrated systems. Second, extreme connectivity creates new social and political power structures. If left unchecked, they might lead to authoritarian governance by one person in total control of network power, directly or through her/his connected surrogates. We propose Industry 5.0 that can democratize knowledge coproduction from Big Data, building on the new concept of symmetrical innovation. Industry 5.0 utilizes IoT, but differs from predecessor automation systems by having three-dimensional (3D) symmetry in innovation ecosystem design: (1) a built-in safe exit strategy in case of demise of hyperconnected entrenched digital knowledge networks. Importantly, such safe exists are orthogonal-in that they allow "digital detox" by employing pathways unrelated/unaffected by automated networks, for example, electronic patient records versus material/article trails on vital medical information; (2) equal emphasis on both acceleration and deceleration of innovation if diminishing returns become apparent; and (3) next generation social science and humanities (SSH) research for global governance of emerging technologies: "Post-ELSI Technology Evaluation Research" (PETER). Importantly, PETER considers the technology opportunity costs, ethics, ethics-of-ethics, framings (epistemology), independence, and reflexivity of SSH research in technology policymaking. Industry 5.0 is poised to harness extreme automation and Big Data with safety, innovative technology policy, and responsible implementation science, enabled by 3D symmetry in innovation ecosystem design.
Using a Family Science Day Event to Engage Youth in Climate Change Issues
NASA Astrophysics Data System (ADS)
Brevik, C.; Brevik, E. C.
2015-12-01
Each fall, Dickinson State University organizes four Family Science Day events for elementary-aged children to increase their engagement in the sciences. Offered on Saturday afternoons, each event focuses on a different science-related theme. Families can attend these events free of charge, and the kids participate in a large variety of hands-on activities which center around the event's theme. This year, the November event focused on climate change and the roles soil plays in the climate system. The timing of this topic was carefully chosen. 2015 has been declared the International Year of Soil by the United Nations, and the Soil Science Society of America theme for the month of November was Soils and Climate. This public outreach event was an amazing opportunity to help the youth in our community learn about climate change and soil in a fun, interactive environment. The activities also helped the children learn how science is a process of discovery that allows them to better understand the world they live in. In addition to the hands-on activities, a planetarium show focusing on climate change was also offered during the event. The fully immersive, 360-degree show allowed the kids and their parents to personally observe phenomena that are otherwise difficult to visualize. All of the activities at the Family Science Day event were staffed by university students, and this proved to be a very valuable experience for them as well. Some of the students who helped are majoring in a science field, and for them, the experience taught public communication. They learned to break complicated concepts down into simpler terms that young kids can understand. Education majors who participated practiced communicating science concepts to children, and students in other majors who helped with this event gained experiences that reinforced various concepts they had learned in their general education science courses.
ERIC Educational Resources Information Center
Marle, Peter D.; Decker, Lisa; Taylor, Victoria; Fitzpatrick, Kathleen; Khaliqi, David; Owens, Janel E.; Henry, Renee M.
2014-01-01
This paper discusses a K-12/university collaboration in which students participated in a four-day scenario-based summer STEM (science, technology, engineering, and mathematics) camp aimed at making difficult scientific concepts salient. This scenario, Jumpstart STEM-CSI: Chocolate Science Investigation (JSCSI), used open- and guided-inquiry…
ERIC Educational Resources Information Center
Faruqi, Yasmeen Mahnaz
2007-01-01
This paper discusses the basic tenets of Islam and the Islamic view of nature that were influential in the development of science in the so-called "Golden Age of Islam". These findings have been the catalyst for present day Muslim scholars, who have emphasized the importance of Islamic science, as the means of understanding Western…
ERIC Educational Resources Information Center
Aflalo, Ester
2014-01-01
Background: Understanding the nature of science (NOS) has been a key objective in teaching sciences for many years. Despite the importance of this goal it is, until this day, a complex challenge that we are far from achieving. Purpose: The study was conducted in order to further the understanding of the NOS amongst preservice teachers. It explores…
ERIC Educational Resources Information Center
Çetin, Nagihan Imer
2016-01-01
The purpose of this study was to examine science teachers' level of using computers in teaching and the impact of a teacher professional development program (TPDP) on their views regarding utilizing computers in science education. Forty-three in-service science teachers from different regions of Turkey attended a 5 day TPDP. The TPDP was…
Michaud, Jean-Philippe; Moreau, Gaétan
2011-01-01
Using pig carcasses exposed over 3 years in rural fields during spring, summer, and fall, we studied the relationship between decomposition stages and degree-day accumulation (i) to verify the predictability of the decomposition stages used in forensic entomology to document carcass decomposition and (ii) to build a degree-day accumulation model applicable to various decomposition-related processes. Results indicate that the decomposition stages can be predicted with accuracy from temperature records and that a reliable degree-day index can be developed to study decomposition-related processes. The development of degree-day indices opens new doors for researchers and allows for the application of inferential tools unaffected by climatic variability, as well as for the inclusion of statistics in a science that is primarily descriptive and in need of validation methods in courtroom proceedings. © 2010 American Academy of Forensic Sciences.
Teaching Planetary Sciences in Bilingual Classrooms
NASA Astrophysics Data System (ADS)
Lebofsky, L. A.; Lebofsky, N. R.
1993-05-01
Planetary sciences can be used to introduce students to the natural world which is a part of their lives. Even children in an urban environment are aware of such phenomena as day and night, shadows, and the seasons. It is a science that transcends cultures, has been prominent in the news in recent years, and can generate excitement in young minds as no other science can. It also provides a useful tool for understanding other sciences and mathematics, and for developing problem solving skills which are important in our technological world. However, only 15 percent of elementary school teachers feel very well qualified to teach earth/space science, while better than 80% feel well qualified to teach reading; many teachers avoid teaching science; very little time is actually spent teaching science in the elementary school: 19 minutes per day in K--3 and 38 minutes per day in 4--6. While very little science is taught in elementary and middle school, earth/space science is taught at the elementary level in less than half of the states. Therefore in order to teach earth/space science to our youth, we must empower our teachers, making them familiar and comfortable with existing materials. Tucson has another, but not unique, problem. The largest public school district, the Tucson Unified School District (TUSD), provides a neighborhood school system enhanced with magnet, bilingual and special needs schools for a school population of 57,000 students that is 4.1% Native American, 6.0% Black, and 36.0% Hispanic (1991). This makes TUSD and the other school districts in and around Tucson ideal for a program that reaches students of diverse ethnic backgrounds. However, few space sciences materials exist in Spanish; most materials could not be used effectively in the classroom. To address this issue, we have translated NASA materials into Spanish and are conducting a series of workshops for bilingual classroom teachers. We will discuss in detail our bilingual classroom workshops and how they address the needs of elementary school teachers in Arizona.
Using Family Science Day Events to Inspire Future Scientists
NASA Astrophysics Data System (ADS)
Brevik, Corinne
2015-04-01
Dickinson State University organizes four Family Science Day events each fall to increase student engagement in the sciences. Offered on Saturday afternoons, each event focuses on a different science-related theme. Families can attend these events free of charge, and the kids participate in a large-variety of hands-on activities which center around the event's theme. Previous themes include The Amazing Telescope, Night of the Titanic, Dinosaur Prophecy, and Space Exploration. These events are amazing opportunities to show young children how much fun science can be. Many of the kids come from schools where science is neither interactive nor engaging. The activities help the children learn that science is a process of discovery that helps us better understand the world around us. University students staff all of the activity booths at these events, and this has proven to be a very valuable experience for them as well. Some of the students who help are majoring in a science field, and for them, the experience teaches public communication. They learn to break complicated concepts down into simpler terms that young kids can understand. Other students who help with these events are not science majors but may be taking a science course as part of their college curriculum. For these students, the experience reinforces various concepts that they are learning in their science class. For many of them, it also opens their eyes to the idea that science can be engaging. Some of them even discover that they have a true gift for teaching.
1994-07-20
KENNEDY SPACE CENTER, FLA. -- Dr. Irene Duhart Long is the director, Biomedical Operations and Research Office, at the Kennedy Space Center effective July 24, 1994. She is responsible for the program management of the center's aerospace and occupational medicine, life sciences research, environmental health programs and the operations management of the life sciences support facilities. Dr. Long also is responsible for providing the coordinating medical, environmental monitoring and environmental health support to launch and landing activities and day-to-day institutional functions.
Fusion/Astrophysics Teacher Research Academy
NASA Astrophysics Data System (ADS)
Correll, Donald
2005-10-01
In order to engage California high school science teachers in the area of plasma physics and fusion research, LLNL's Fusion Energy Program has partnered with the UC Davis Edward Teller Education Center, ETEC (http://etec.ucdavis.edu), the Stanford University Solar Center (http://solar-center.stanford.edu) and LLNL's Science / Technology Education Program, STEP (http://education.llnl.gov). A four-level ``Fusion & Astrophysics Research Academy'' has been designed to give teachers experience in conducting research using spectroscopy with their students. Spectroscopy, and its relationship to atomic physics and electromagnetism, provides for an ideal plasma `bridge' to the CA Science Education Standards (http://www.cde.ca.gov/be/st/ss/scphysics.asp). Teachers attend multiple-day professional development workshops to explore new research activities for use in the high school science classroom. A Level I, 3-day program consists of two days where teachers learn how plasma researchers use spectrometers followed by instructions on how to use a research grade spectrometer for their own investigations. A 3rd day includes touring LLNL's SSPX (http://www.mfescience.org/sspx/) facility to see spectrometry being used to measure plasma properties. Spectrometry classroom kits are made available for loaning to participating teachers. Level I workshop results (http://education.llnl.gov/fusion&_slash;astro/) will be presented along with plans being developed for Level II (one week advanced SKA's), Level III (pre-internship), and Level IV (summer internship) research academies.
Life science payload definition and integration study, task C and D. Volume 3: Appendices
NASA Technical Reports Server (NTRS)
1973-01-01
Research equipment requirements were based on the Mini-7 and Mini-30 laboratory concepts defined in Tasks A and B of the intial LSPD contract. Modified versions of these laboratories and the research equipment within them were to be used in three missions of Shuttle/Sortie Module. These were designated (1) the shared 7-day laboratory (a mission with the life sciences laboratory sharing the sortie module with another scientific laboratory), (2) the dedicated 7-day laboratory (full use of the sortie module), and (3) the dedicated 30-day laboratory (full sortie module use with a 30-day mission duration). In defining the research equipment requirements of these laboratories, the equipment was grouped according to its function, and equipment unit data packages were prepared.
ERIC Educational Resources Information Center
American Political Science Association (NJ1), 2005
2005-01-01
In March 2004, the National Science Foundation funded a two-day workshop by the American Political Science Association (APSA) on the advancement of women in academic political science in the United States. The workshop was prompted by an alarming stall in the number of women entering the discipline and persisting through early years of faculty…
Penny Pettigrew in the Payload Operations Integration Center
2017-11-09
Penny Pettigrew chats in real time with a space station crew member conducting an experiment in microgravity some 250 miles overhead. The Payload Operations Integration Center cadre monitor science communications on station 24 hours a day, seven days a week, 365 days per year.
The transfer of learning process: From an elementary science methods course to classroom instruction
NASA Astrophysics Data System (ADS)
Carter, Nina Leann
The purpose of this qualitative multiple-case study was to explore the transfer of learning process in student teachers. This was carried out by focusing on information learned from an elementary science methods and how it was transferred into classroom instruction during student teaching. Participants were a purposeful sampling of twelve elementary education student teachers attending a public university in north Mississippi. Factors that impacted the transfer of learning during lesson planning and implementation were sought. The process of planning and implementing a ten-day science instructional unit during student teaching was examined through lesson plan documentation, in-depth individual interviews, and two focus group interviews. Narratives were created to describe the participants' experiences as well as how they plan for instruction and consider science pedagogical content knowledge (PCK). Categories and themes were then used to build explanations applying to the research questions. The themes identified were Understanding of Science PCK, Minimalism, Consistency in the Teacher Education Program, and Emphasis on Science Content. The data suggested that the participants lack in their understanding of science PCK, took a minimalistic approach to incorporating science into their ten-day instructional units, experienced inconsistencies in the teacher education program, and encountered a lack of emphasis on science content in their field experience placements. The themes assisted in recognizing areas in the elementary science methods courses, student teaching field placements, and university supervision in need of modification.
Sun-Earth Day: Exposing the Public to Sun-Earth Connection Science
NASA Astrophysics Data System (ADS)
Thieman, J. R.; Lewis, E.; Cline, T.
2001-12-01
The year 2001 marked the first observance of Sun-Earth Day as an event to celebrate the strong interconnection of the life we have on Earth and the dependence of it on the dynamic influence of the Sun. The science of the Sun-Earth Connection has grown dramatically with new satellite and ground-based studies of the Sun and the Sun's extended "atmosphere" in which we live. Space weather is becoming a more common concept that people know can affect their lives. An understanding of the importance of the Sun's dynamic behavior and how this shapes the solar system and especially the Earth is the aim of Sun-Earth Day. The first Sun-Earth event actually took place over two days, April 27 and 28, 2001, in order to accommodate all the events which were planned both in the classroom on Friday the 27th and in more informal settings on Saturday the 28th. The Sun-Earth Connection Education Forum (SECEF) organized the creation of ten thousand packets of educational materials about Sun-Earth Day and distributed them mostly to teachers who were trained to use them in the classroom. Many packets, however, went to science centers, museums, and planetariums as resource materials for programs associated with Sun-Earth Day. Over a hundred scientists used the event as an opportunity to communicate their love of science to audiences in these informal settings. Sun-Earth Day was also greatly assisted by the Amateur Astronomical Society which used the event as a theme for their annual promotion of astronomy in programs given around the country. The Solar and Heliospheric Observatory (SOHO), a satellite mission jointly sponsored by NASA and the European Space Agency (ESA), used Sun-Earth Day in conjunction with the fifth anniversary celebration of SOHO as a basis for many programs and events, especially a large number of happenings in Europe. These included observing parties, art exhibits, demonstrations, etc. Examples of some of the innovative ways that Sun-Earth Day was brought into people's lives will be shown. Next year, 2002, Sun-Earth Day is planned for March 20, the solar equinox. Many arrangements have already been made and a variety of new approaches will be used to make the events of the day even more widespread and visible. The number of packets of materials will be increased. There will be TV programs and webcasts created specifically for Sun-Earth Day. Native American relationships and interactions with the Sun will be an underlying theme. As always, the involvement of AGU scientists is the highlight of many of the planned programs. Come listen to the variety of ways that you can get involved, many requiring very little in time commitment or preparation, yet providing a major boost to keeping the value of science in the minds of the general public.
78 FR 62315 - International Day of the Girl, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-16
... careers in science, technology, engineering, and mathematics--fields that will allow them to drive... the world to pursue careers in science and technology. And because child marriage is a threat to...
NASA Technical Reports Server (NTRS)
Green, Robert O.; Hook, Simon J.; Middleton, Elizabeth; Turner, Woody; Ungar, Stephen; Knox, Robert
2012-01-01
The NASA HyspIRI mission is planned to provide global solar reflected energy spectroscopic measurement of the terrestrial and shallow water regions of the Earth every 19 days will all measurements downlinked. In addition, HyspIRI will provide multi-spectral thermal measurements with a single band in the 4 micron region and seven bands in the 8 to 12 micron region with 5 day day/night coverage. A direct broadcast capability for measurement subsets is also planned. This HyspIRI mission is one of those designated in the 2007 National Research Council (NRC) Decadal Survey: Earth Science and Applications from Space. In the Decadal Survey, HyspIRI was recognized as relevant to a range of Earth science and science applications, including climate: "A hyperspectral sensor (e.g., FLORA) combined with a multispectral thermal sensor (e.g., SAVII) in low Earth orbit (LEO) is part of an integrated mission concept [described in Parts I and II] that is relevant to several panels, especially the climate variability panel." The HyspIRI science study group was formed in 2008 to evaluate and refine the mission concept. This group has developed a series of HyspIRI science objectives: (1) Climate: Ecosystem biochemistry, condition & feedback; spectral albedo; carbon/dust on snow/ice; biomass burning; evapotranspiration (2) Ecosystems: Global plant functional types, physiological condition, and biochemistry including agricultural lands (3) Fires: Fuel status, fire frequency, severity, emissions, and patterns of recovery globally (4) Coral reef and coastal habitats: Global composition and status (5) Volcanoes: Eruptions, emissions, regional and global impact (6) Geology and resources: Global distributions of surface mineral resources and improved understanding of geology and related hazards These objectives are achieved with the following measurement capabilities. The HyspIRI imaging spectrometer provides: full spectral coverage from 380 to 2500 at 10 nm sampling; 60 m spatial sampling with a 150 km swath; and fully downlinked coverage of the Earth's terrestrial and shallow water regions every 19 days to provide seasonal cloud-free coverage of the terrestrial surface. The HyspIRI Multi-Spectral Thermal instrument provides: 8 spectral bands from 4 to 12 microns; 60 m spatial sampling with a 600 km swath; and fully downlinked coverage of the Earth's terrestrial shallow water regions every 5 days (day/night) to provide nominally cloud-free monthly coverage. The HyspIRI mission also includes an on-board processing and direct broadcast capability, referred to as the Intelligent Payload Module (IPM), which will allow users with the appropriate antenna to download a subset of the HyspIRI data stream to a local ground station. These science and science application objectives are critical today and uniquely addressed by the combined imaging spectroscopy, thermal infrared measurements, and IPM direct broadcast capability of HyspIRI. Two key objectives are: (1) The global HyspIRI spectroscopic measurements of the terrestrial biosphere including vegetation composition and function to constrain and reduce the uncertainty in climate-carbon interactions and terrestrial biosphere feedback. (2) The global 8 band thermal measurements to provide improved constraint of fire related emissions. In this paper the current HyspIRI mission concept that has been reviewed and refined to its current level of maturity with a Data Products Symposium, Science Workshop and NASA HWorkshop is presented including traceability between the measurements and the science and science application objectives.
Teaching Scientists to Communicate: Evidence-Based Assessment for Undergraduate Science Education
ERIC Educational Resources Information Center
Mercer-Mapstone, Lucy; Kuchel, Louise
2015-01-01
Communication skills are one of five nationally recognised learning outcomes for an Australian Bachelor of Science (BSc) degree. Previous evidence indicates that communication skills taught in Australian undergraduate science degrees are not developed sufficiently to meet the requirements of the modern-day workplace--a problem faced in the UK and…
Oregon's Agricultural Progress | | Oregon State University
Education All in a Day's (and Night's) Work Science in the Midst of Conflict The Future of Agriculture: a future of agriculture The Future of Agricultural Science Education The Future of Agricultural Science of Agriculture: a Panel Discussion The Future of Agriculture: a Panel Discussion Five views of the
The Effectiveness of a Project Day to Introduce Sixth Grade Students to Science Competitions
ERIC Educational Resources Information Center
Blankenburg, Janet S.; Höffler, Tim N.; Peters, Heide; Parchmann, Ilka
2016-01-01
Background: Science Olympiads and science fairs are effective instruments to foster interested and talented students. However, at most schools competitions are not systematically integrated into the school mission statement so that students are unaware of these opportunities. Purpose: The purpose of this study was to investigate the effectiveness…
Bureau of Indian Affairs Outstanding Programs in Math, Science and Technology, 1995.
ERIC Educational Resources Information Center
Bureau of Indian Affairs (Dept. of Interior), Washington, DC. Office of Indian Education Programs.
This booklet describes the goals and activities of 20 exemplary programs in mathematics, science and technology for students and teachers in schools operated or funded by the Bureau of Indian Affairs. The programs are: "Computer Home Improvement Reading Program," Beclabito Day School (New Mexico); "Cherokee High School Science:…
Using Inquiry-Based Interventions to Improve Secondary Students' Interest in Science and Technology
ERIC Educational Resources Information Center
Potvin, Patrice; Hasni, Abdelkrim; Sy, Ousmane
2017-01-01
Nine secondary school teachers participated in a five day training program where they developed inquiry-based pedagogical interventions for their science classes. Student interest and self-concept in school science and technology were measured before and after the interventions. Increases in interest and self-concept were compared with the results…
Levers and Mixtures: An Integrated Science and Mathematics Activity to Solve Problems
ERIC Educational Resources Information Center
Alpaslan, Muhammet Mustafa
2017-01-01
In recent years, the integration of science and mathematics has become popular among educators because of its potential benefits for student learning. The purpose of this study is to introduce a two-day interdisciplinary lesson that brings science and mathematics concepts together, actively engaging students in working with percentages of the…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-21
... Research and Collecting Permit: Application for a Science Education Permit; Investigator's Annual Report... Science Education Permit: 10-741b, Investigator's Annual Report: 10-226. OMB Control Number: 1024-0236... businesses, other scientific parties seeking an NPS research and collecting or science education permit...
Two nominated for Science Board
NASA Astrophysics Data System (ADS)
President Ronald Reagan plans to nominate Thomas B. Day and James J. Duderstadt to the National Science Board (NSB), according to an announcement by the National Science Foundation (NSF). Day, a theoretical and experimental high-energy physicist, is president of San Diego State University, San Diego, Calif. Duderstadt is a nuclear engineer and is dean of the College of Engineering of the University of Michigan, Ann Arbor.The 24-member NSB is the policy-making body of the NSF. Current members of the NSB include Peter T. Flawn, a geologist who is president of the University of Texas at Austin, and William A. Nierenberg, director of the Scripps Institution of Oceanography at the University of California, San Diego.