48 CFR 1816.405-274 - Award fee evaluation factors.
Code of Federal Regulations, 2010 CFR
2010-10-01
... factor, if used, must include consideration of risk management (including mission success, safety... above the contracting officer, with the concurrence of the project manager. The rationale for any waiver shall be documented in the contract file. When safety, export control, or security are considered under...
Code of Federal Regulations, 2010 CFR
2010-04-01
... payment if they had concurrent railroad and social security earnings within the period 1951 through 1974. The combined earnings from the railroad retirement and social security systems in any of those years...
Processing multilevel secure test and evaluation information
NASA Astrophysics Data System (ADS)
Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa
1994-07-01
The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr.
1990-01-01
Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
A privacy preserving protocol for tracking participants in phase I clinical trials.
El Emam, Khaled; Farah, Hanna; Samet, Saeed; Essex, Aleksander; Jonker, Elizabeth; Kantarcioglu, Murat; Earle, Craig C
2015-10-01
Some phase 1 clinical trials offer strong financial incentives for healthy individuals to participate in their studies. There is evidence that some individuals enroll in multiple trials concurrently. This creates safety risks and introduces data quality problems into the trials. Our objective was to construct a privacy preserving protocol to track phase 1 participants to detect concurrent enrollment. A protocol using secure probabilistic querying against a database of trial participants that allows for screening during telephone interviews and on-site enrollment was developed. The match variables consisted of demographic information. The accuracy (sensitivity, precision, and negative predictive value) of the matching and its computational performance in seconds were measured under simulated environments. Accuracy was also compared to non-secure matching methods. The protocol performance scales linearly with the database size. At the largest database size of 20,000 participants, a query takes under 20s on a 64 cores machine. Sensitivity, precision, and negative predictive value of the queries were consistently at or above 0.9, and were very similar to non-secure versions of the protocol. The protocol provides a reasonable solution to the concurrent enrollment problems in phase 1 clinical trials, and is able to ensure that personal information about participants is kept secure. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.
2017-08-27
release. Distributibn is unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF~ 17. LIMITATION OF 18 ...chronic pain, there are high rates ( 18 -38%) of concurrent opioid and benzo prescribing. These high-risk prescribing patterns have contributed to the
Effectiveness of Taxicab Security Equipment in Reducing Driver Homicide Rates
Menéndez, Cammie K.C.; Amandus, Harlan E.; Damadi, Parisa; Wu, Nan; Konda, Srinivas; Hendricks, Scott A.
2015-01-01
Background Taxicab drivers historically have had one of the highest work-related homicide rates of any occupation. In 2010 the taxicab driver homicide rate was 7.4 per 100,000 drivers, compared to the overall rate of 0.37 per 100,000 workers. Purpose Evaluate the effectiveness of taxicab security cameras and partitions on citywide taxicab driver homicide rates. Methods Taxicab driver homicide rates were compared in 26 major cities in the U.S. licensing taxicabs with security cameras (n=8); bullet-resistant partitions (n=7); and cities where taxicabs were not equipped with either security cameras or partitions (n=11). News clippings of taxicab driver homicides and the number of licensed taxicabs by city were used to construct taxicab driver homicide rates spanning 15 years (1996–2010). Generalized estimating equations were constructed to model the Poisson-distributed homicide rates on city-specific safety equipment installation status, controlling for city homicide rate and the concurrent decline of homicide rates over time. Data were analyzed in 2012. Results Cities with cameras experienced a threefold reduction in taxicab driver homicides compared with control cities (RR=0.27; 95% CI=0.12, 0.61; p=0.002). There was no difference in homicide rates for cities with partitions compared with control cities (RR=1.15; 95% CI=0.80, 1.64; p=0.575). Conclusions Municipal ordinances and company policies mandating security cameras appear to be highly effective in reducing taxicab driver deaths due to workplace violence. PMID:23790983
Wide Area Security Region Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin
2010-03-31
This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less
Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).
Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang
2003-01-01
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-08
... reporting requirements. Thus, concurrently with the elimination of the intermediate dealer reporting...-Time Transaction Reporting System February 2, 2012. Pursuant to Section 19(b)(1) of the Securities... the Real-Time Transaction Reporting System (``RTRS'') information system and subscription service (the...
An Authentication Protocol for Future Sensor Networks.
Bilal, Muhammad; Kang, Shin-Gak
2017-04-28
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
An Authentication Protocol for Future Sensor Networks
Bilal, Muhammad; Kang, Shin-Gak
2017-01-01
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937
Davies, Patrick T; Cummings, E Mark; Winter, Marcia A
2004-01-01
This study was designed to delineate pathways between systems profiles of family functioning, children's emotional insecurity in the interparental relationship, and their psychological adjustment in a sample of 221 children and their parents. Consistent with family systems theory, cluster analyses conducted with assessments of marital, coparental, and parent-child functioning indicated that families fit into one of four profiles: (a) cohesive families, characterized by warmth, affection, and flexible well-defined boundaries in family relationships; (b) disengaged families, reflected in high levels of adversity and low levels of support across family subsystems; (c) enmeshed families, evidenced by high levels of discord and weak maintenance of relationship boundaries in the family unit; and (d) adequate families, defined by elevated parental psychological control within a larger family context of low discord and high warmth. In comparison to children in cohesive families, children in enmeshed and disengaged families exhibited greater signs of insecurity in the interparental relationship concurrently and internalizing and externalizing symptoms both concurrently and 1 year later. Structural equation models revealed that a latent, multimethod measure of insecurity in the interparental relationship partially mediated associations between family enmeshment and disengagement and children's psychological symptoms 1 year later. Results are discussed in relation to how they inform and refine a family-wide model of the emotional security hypothesis.
Fransson, Mari; Granqvist, Pehr; Bohlin, Gunilla; Hagekull, Berit
2013-01-01
In this paper, we examine concurrent and prospective links between attachment and the Five-Factor Model (FFM) of personality from middle childhood to young adulthood (n = 66). At age 8.5 years, attachment was measured with the Separation Anxiety Test and at 21 years with the Adult Attachment Interview, whereas the personality dimensions were assessed with questionnaires at both time points. The results showed that attachment and personality dimensions are meaningfully related, concurrently and longitudinally. Attachment security in middle childhood was positively related to extraversion and openness, both concurrently and prospectively. Unresolved/disorganized (U/d) attachment was negatively related to conscientiousness and positively related to openness in young adulthood. U/d attachment showed a unique contribution to openness above the observed temporal stability of openness. As attachment security was also associated with openness, the duality of this factor is discussed together with other theoretical considerations regarding attachment theory in relation to the FFM.
77 FR 33206 - Combined Notice of Filings #1
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-05
... Reliability Standard CIP- 006--Cyber Security--Physical Security of Critical Cyber Assets. Filed Date: 5/23/12... Company, LLC. Description: Certificate of Concurrence to be effective 7/12/2012. Filed Date: 5/24/12.... Comments Due: 5 p.m. ET 6/14/12. Docket Numbers: ER12-1845-000. Applicants: AEP Texas North Company...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security is giving concurrent notice of a newly established system of records pursuant... System of Records and this proposed rulemaking. In this proposed rulemaking, the Department proposes to...
NASA Astrophysics Data System (ADS)
Metcalfe, Jason S.; Alban, Jillyn; Cosenzo, Keryl; Johnson, Tony; Capstick, Erin
2010-04-01
Those applying autonomous technologies to military systems strive to enhance human-robot and robot-robot performance. Beyond performance, the military must be concerned with local area security. Characterized as "secure mobility", military systems must enable safe and effective terrain traversal concurrent with maintenance of situational awareness (SA). One approach to interleaving these objectives is supervisory control, with popular options being shared and traded control. Yet, with the scale and expense of military assets, common technical issues such as transition time and safeguarding become critical; especially as they interact with Soldier capabilities. Study is required to enable selection of control methods that optimize Soldier-system performance while safeguarding both individually. The current report describes a study utilizing experimental military vehicles and simulation systems enabling teleoperation and supervisory control. Automated triggering of SA demands was interspersed with a set of challenging driving maneuvers in a 'teleoperation-like' context to examine the influence of supervisory control on Soldier-system performance. Results indicated that direct application of supervisory control, while beneficial under particular demands, requires continued development to be perceived by Soldiers as useful. Future efforts should more tightly couple the information exchanged between the Soldier and system to overcome current challenges not addressed by standard control methods.
Sen. Rockefeller, John D., IV [D-WV
2012-08-02
Senate - 08/29/2012 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Individual Differences in Infants' Joint Attention Behaviors with Mother and a New Social Partner
ERIC Educational Resources Information Center
Meins, Elizabeth; Fernyhough, Charles; Arnott, Bronia; Vittorini, Lucia; Turner, Michelle; Leekam, Susan R.; Parkinson, Kathryn
2011-01-01
Relations between infant-mother attachment security at 15 months and infants' (N = 206) joint attention behaviors (a) with an experimenter at 8 and 15 months, and (b) with their mothers at 15 months were investigated. No concurrent or longitudinal relations were observed between attachment security and infants' tendency to respond to an…
Sen. Burris, Roland [D-IL
2010-01-26
Senate - 03/26/2010 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
40 CFR 798.5460 - Rodent heritable translocation assays.
Code of Federal Regulations, 2010 CFR
2010-07-01
... treatment and control groups. (4) Control groups—(i) Concurrent controls. No concurrent positive or negative... control groups. Historical or concurrent controls shall be specified, as well as the randomization... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5460 Rodent...
40 CFR 798.5460 - Rodent heritable translocation assays.
Code of Federal Regulations, 2013 CFR
2013-07-01
... treatment and control groups. (4) Control groups—(i) Concurrent controls. No concurrent positive or negative... control groups. Historical or concurrent controls shall be specified, as well as the randomization... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5460 Rodent...
40 CFR 798.5460 - Rodent heritable translocation assays.
Code of Federal Regulations, 2012 CFR
2012-07-01
... treatment and control groups. (4) Control groups—(i) Concurrent controls. No concurrent positive or negative... control groups. Historical or concurrent controls shall be specified, as well as the randomization... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5460 Rodent...
40 CFR 798.5460 - Rodent heritable translocation assays.
Code of Federal Regulations, 2011 CFR
2011-07-01
... treatment and control groups. (4) Control groups—(i) Concurrent controls. No concurrent positive or negative... control groups. Historical or concurrent controls shall be specified, as well as the randomization... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5460 Rodent...
40 CFR 798.5460 - Rodent heritable translocation assays.
Code of Federal Regulations, 2014 CFR
2014-07-01
... treatment and control groups. (4) Control groups—(i) Concurrent controls. No concurrent positive or negative... control groups. Historical or concurrent controls shall be specified, as well as the randomization... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5460 Rodent...
Specification and Verification of Secure Concurrent and Distributed Software Systems
1992-02-01
primitive search strategies work for operating systems that contain relatively few operations . As the number of operations increases, so does the the...others have granted him access to, etc . The burden of security falls on the operating system , although appropriate hardware support can minimize the...Guttag, J. Horning, and R. Levin. Synchronization primitives for a multiprocessor: a formal specification. Symposium on Operating System Principles
ERIC Educational Resources Information Center
Holland, Ashley S.; Roisman, Glenn I.
2010-01-01
This study examined the developmental significance of adult attachment security--as measured by the Adult Attachment Interview--for romantic relationship functioning concurrently and approximately 1 year later in a sample of heterosexual dating couples between the ages of 18 and 25 (115 dyads at Time 1 [T1] and 57 dyads at T2, 74% White). The…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-02
...The Department of Homeland Security is giving concurrent notice of a newly established system of records pursuant to the Privacy Act of 1974 for the ``Department of Homeland Security/U.S. Customs and Border Protection-003 Credit/Debit Care Data System of Records'' and this proposed rulemaking. In this proposed rulemaking, the Department proposes to exempt portions of the system of records from one or more provisions of the Privacy Act because of criminal, civil, and administrative enforcement requirements.
Safety Versus Passenger Service: The Flight Attendants’ Dilemma
Damos, Diane L.; Boyett, Kimberly S.; Gibbs, Patt
2013-01-01
After 9/11, new security duties were instituted at many U.S. air carriers and existing safety and security duties received increased emphasis. Concurrently, in-flight services were changed and in many cases, cabin crews were reduced. This article examines the post-9/11 conflict between passenger service and the timely performance of safety and security duties at 1 major U.S. air carrier. In-flight data were obtained on both international and domestic flights. The data suggest that the prompt performance of the safety and security duties is adversely affected by the number of service duties occurring in the later part of both international and domestic flights. PMID:23667300
Sen. Burris, Roland [D-IL
2009-07-22
Senate - 09/08/2009 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Sen. Burris, Roland [D-IL
2009-07-21
Senate - 09/08/2009 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Design, Development and Utilization Perspectives on Database Management Systems
ERIC Educational Resources Information Center
Shneiderman, Ben
1977-01-01
This paper reviews the historical development of integrated data base management systems and examines competing approaches. Topics include management and utilization, implementation and design, query languages, security, integrity, privacy and concurrency. (Author/KP)
23 CFR 751.23 - Concurrent junkyard control and right-of-way projects.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 23 Highways 1 2014-04-01 2014-04-01 false Concurrent junkyard control and right-of-way projects. 751.23 Section 751.23 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RIGHT-OF-WAY AND ENVIRONMENT JUNKYARD CONTROL AND ACQUISITION § 751.23 Concurrent junkyard control and right-of...
23 CFR 751.23 - Concurrent junkyard control and right-of-way projects.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 23 Highways 1 2011-04-01 2011-04-01 false Concurrent junkyard control and right-of-way projects. 751.23 Section 751.23 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RIGHT-OF-WAY AND ENVIRONMENT JUNKYARD CONTROL AND ACQUISITION § 751.23 Concurrent junkyard control and right-of...
23 CFR 751.23 - Concurrent junkyard control and right-of-way projects.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 23 Highways 1 2012-04-01 2012-04-01 false Concurrent junkyard control and right-of-way projects. 751.23 Section 751.23 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RIGHT-OF-WAY AND ENVIRONMENT JUNKYARD CONTROL AND ACQUISITION § 751.23 Concurrent junkyard control and right-of...
23 CFR 751.23 - Concurrent junkyard control and right-of-way projects.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 23 Highways 1 2013-04-01 2013-04-01 false Concurrent junkyard control and right-of-way projects. 751.23 Section 751.23 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RIGHT-OF-WAY AND ENVIRONMENT JUNKYARD CONTROL AND ACQUISITION § 751.23 Concurrent junkyard control and right-of...
Sen. Levin, Carl [D-MI
2009-10-05
Senate - 10/19/2009 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
A novel approach to quality improvement in a safety-net practice: concurrent peer review visits.
Fiscella, Kevin; Volpe, Ellen; Winters, Paul; Brown, Melissa; Idris, Amna; Harren, Tricia
2010-12-01
Concurrent peer review visits are structured office visits conducted by clinician peers of the primary care clinician that are specifically designed to reduce competing demands, clinical inertia, and bias. We assessed whether a single concurrent peer review visit reduced clinical inertia and improved control of hypertension, hyperlipidemia, and diabetes control among underserved patients. We conducted a randomized encouragement trial to evaluate concurrent peer review visits with a community health center. Seven hundred twenty-seven patients with hypertension, hyperlipidemia, and/or diabetes who were not at goal for systolic blood pressure (SBP), low-density lipoprotein cholesterol (LDL-C), and/or glycated hemoglobin (A1c) were randomly assigned to an invitation to participate in a concurrent peer review visit or to usual care. We compared change in these measures using mixed models and rates of therapeutic intensification during concurrent peer review visits with control visits. One hundred seventy-one patients completed a concurrent peer review visit. SBP improved significantly (p < .01) more among those completing concurrent peer review visits than among those who failed to respond to a concurrent peer review invitation or those randomized to usual care. There were no differences seen for changes in LDL-C or A1c. Concurrent peer review visits were associated with statistically significant greater clinician intensification of blood pressure (p < .001), lipid (p < .001), and diabetes (p < .005) treatment than either for control visits for patients in either the nonresponse group or usual care group. Concurrent peer review visits represent a promising strategy for improving blood pressure control and improving therapeutic intensification in community health centers.
23 CFR 751.23 - Concurrent junkyard control and right-of-way projects.
Code of Federal Regulations, 2010 CFR
2010-04-01
...-way projects. The State is encouraged to coordinate junkyard control and highway right-of-way projects. Expenses incurred in furtherance of concurrent projects shall be prorated between projects. ... 23 Highways 1 2010-04-01 2010-04-01 false Concurrent junkyard control and right-of-way projects...
High-throughput state-machine replication using software transactional memory.
Zhao, Wenbing; Yang, William; Zhang, Honglei; Yang, Jack; Luo, Xiong; Zhu, Yueqin; Yang, Mary; Luo, Chaomin
2016-11-01
State-machine replication is a common way of constructing general purpose fault tolerance systems. To ensure replica consistency, requests must be executed sequentially according to some total order at all non-faulty replicas. Unfortunately, this could severely limit the system throughput. This issue has been partially addressed by identifying non-conflicting requests based on application semantics and executing these requests concurrently. However, identifying and tracking non-conflicting requests require intimate knowledge of application design and implementation, and a custom fault tolerance solution developed for one application cannot be easily adopted by other applications. Software transactional memory offers a new way of constructing concurrent programs. In this article, we present the mechanisms needed to retrofit existing concurrency control algorithms designed for software transactional memory for state-machine replication. The main benefit for using software transactional memory in state-machine replication is that general purpose concurrency control mechanisms can be designed without deep knowledge of application semantics. As such, new fault tolerance systems based on state-machine replications with excellent throughput can be easily designed and maintained. In this article, we introduce three different concurrency control mechanisms for state-machine replication using software transactional memory, namely, ordered strong strict two-phase locking, conventional timestamp-based multiversion concurrency control, and speculative timestamp-based multiversion concurrency control. Our experiments show that speculative timestamp-based multiversion concurrency control mechanism has the best performance in all types of workload, the conventional timestamp-based multiversion concurrency control offers the worst performance due to high abort rate in the presence of even moderate contention between transactions. The ordered strong strict two-phase locking mechanism offers the simplest solution with excellent performance in low contention workload, and fairly good performance in high contention workload.
High-throughput state-machine replication using software transactional memory
Yang, William; Zhang, Honglei; Yang, Jack; Luo, Xiong; Zhu, Yueqin; Yang, Mary; Luo, Chaomin
2017-01-01
State-machine replication is a common way of constructing general purpose fault tolerance systems. To ensure replica consistency, requests must be executed sequentially according to some total order at all non-faulty replicas. Unfortunately, this could severely limit the system throughput. This issue has been partially addressed by identifying non-conflicting requests based on application semantics and executing these requests concurrently. However, identifying and tracking non-conflicting requests require intimate knowledge of application design and implementation, and a custom fault tolerance solution developed for one application cannot be easily adopted by other applications. Software transactional memory offers a new way of constructing concurrent programs. In this article, we present the mechanisms needed to retrofit existing concurrency control algorithms designed for software transactional memory for state-machine replication. The main benefit for using software transactional memory in state-machine replication is that general purpose concurrency control mechanisms can be designed without deep knowledge of application semantics. As such, new fault tolerance systems based on state-machine replications with excellent throughput can be easily designed and maintained. In this article, we introduce three different concurrency control mechanisms for state-machine replication using software transactional memory, namely, ordered strong strict two-phase locking, conventional timestamp-based multiversion concurrency control, and speculative timestamp-based multiversion concurrency control. Our experiments show that speculative timestamp-based multiversion concurrency control mechanism has the best performance in all types of workload, the conventional timestamp-based multiversion concurrency control offers the worst performance due to high abort rate in the presence of even moderate contention between transactions. The ordered strong strict two-phase locking mechanism offers the simplest solution with excellent performance in low contention workload, and fairly good performance in high contention workload. PMID:29075049
Concurrence control for transactions with priorities
NASA Technical Reports Server (NTRS)
Marzullo, Keith
1989-01-01
Priority inversion occurs when a process is delayed by the actions of another process with less priority. With atomic transactions, the concurrency control mechanism can cause delays, and without taking priorities into account can be a source of priority inversion. Three traditional concurrency control algorithms are extended so that they are free from unbounded priority inversion.
Provably secure identity-based identification and signature schemes from code assumptions
Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940
Provably secure identity-based identification and signature schemes from code assumptions.
Song, Bo; Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.
Concurrency control for transactions with priorities
NASA Technical Reports Server (NTRS)
Marzullo, Keith
1989-01-01
Priority inversion occurs when a process is delayed by the actions of another process with less priority. With atomic transations, the concurrency control mechanism can cause delays, and without taking priorities into account can be a source of priority inversion. In this paper, three traditional concurrency control algorithms are extended so that they are free from unbounded priority inversion.
Code of Federal Regulations, 2010 CFR
2010-10-01
... component of DOT and includes the Under Secretary for Security, the Commandant of the Coast Guard, the Inspector General, and the Director of the Bureau of Transportation Statistics. Concurrence means that the... preserved. The term also includes any such documentary material stored by computer. Responsible DOT official...
Code of Federal Regulations, 2013 CFR
2013-10-01
... component of DOT and includes the Under Secretary for Security, the Commandant of the Coast Guard, the Inspector General, and the Director of the Bureau of Transportation Statistics. Concurrence means that the... preserved. The term also includes any such documentary material stored by computer. Responsible DOT official...
Code of Federal Regulations, 2012 CFR
2012-10-01
... component of DOT and includes the Under Secretary for Security, the Commandant of the Coast Guard, the Inspector General, and the Director of the Bureau of Transportation Statistics. Concurrence means that the... preserved. The term also includes any such documentary material stored by computer. Responsible DOT official...
Issues in Real-Time Data Management.
1991-07-01
2. Multiversion concurrency control [5] interprets write operations as the creation of new ver- sions of the items (in contrast to the update-in...features of optimistic (deferred writing, celayed selection of serialization order) and multiversion concurrency control. They do not present any...34 Multiversion Concurrency Control - Theory and Algorithms". ACM Transactions on Database Systems 8, 4 (December 1983), 465-484. 6. Buchman, A. P
7 CFR 3560.71 - Construction financing.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 15 2014-01-01 2014-01-01 false Construction financing. 3560.71 Section 3560.71... Construction financing. (a) Construction financing plan. Prior to loan approval, applicants must submit to the Agency for its concurrence a plan for the construction financing and securing of the loan. (b) Interim...
7 CFR 3560.71 - Construction financing.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 15 2011-01-01 2011-01-01 false Construction financing. 3560.71 Section 3560.71... Construction financing. (a) Construction financing plan. Prior to loan approval, applicants must submit to the Agency for its concurrence a plan for the construction financing and securing of the loan. (b) Interim...
Measurement-Driven Characterization of the Mobile Environment
ERIC Educational Resources Information Center
Soroush, Hamed
2013-01-01
The concurrent deployment of high-quality wireless networks and large-scale cloud services offers the promise of secure ubiquitous access to seemingly limitless amount of content. However, as users' expectations have grown more demanding, the performance and connectivity failures endemic to the existing networking infrastructure have become more…
7 CFR 3560.71 - Construction financing.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Construction financing. 3560.71 Section 3560.71... Construction financing. (a) Construction financing plan. Prior to loan approval, applicants must submit to the Agency for its concurrence a plan for the construction financing and securing of the loan. (b) Interim...
Security of attachment and quality of mother-toddler social interaction in a high-risk sample.
Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S
2012-02-01
The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.
Will you accept the government's friend request? Social networks and privacy concerns.
Siegel, David A
2013-01-01
Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.
Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns
Siegel, David A.
2013-01-01
Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236
The relation of attachment security status to effortful self-regulation: A meta-analysis.
Pallini, Susanna; Chirumbolo, Antonio; Morelli, Mara; Baiocco, Roberto; Laghi, Fiorenzo; Eisenberg, Nancy
2018-05-01
Secure attachment relationships have been described as having a regulatory function in regard to children's emotions, social cognition, and behavior. Although some theorists and researchers have argued that attachment affects children's self-regulation, most attachment theorists have not strongly emphasized this association. The goal of the current meta-analysis was to determine the magnitude of the relation between attachment security status and effortful control (EC)/top-down self-regulation in children up to 18 years of age. One hundred six papers met the inclusion criteria and 101 independent samples were used in analyses. When secure attachment status was compared with insecure attachment status, a significant relation (effect size [ES]) with EC favoring children with a secure attachment was found (100 studies; 20,350 participants; r = .20). A stronger relation was found when the same coder evaluated attachment than when the coder was different and when the measure of attachment was continuous; other moderators were not significant. Securely attached children were higher in EC than their avoidant (r = .10) or resistant (r = .17) counterparts. Children with organized attachments were higher in EC than those with disorganized attachments (r = .17), although this finding could be due to publication bias. For some comparisons of subgroups (B vs. A, B vs. C, and/or D vs. all others), moderation was found by source of information (higher ES for same reporter), age at assessment of EC and/or attachment (higher ES at older ages), method of attachment (lower ES for observational measures), time difference between assessments or research design (higher ESs for smaller time differences and concurrent findings), and published versus unpublished studies (higher ES for unpublished studies for A vs. B). (PsycINFO Database Record (c) 2018 APA, all rights reserved).
48 CFR 28.203-3 - Acceptance of real property.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Acceptance of real... Acceptance of real property. (a) Whenever a bond with a security interest in real property is submitted, the... concurrent owners; whether any real estate taxes are due and payable; and any recorded encumbrances against...
48 CFR 28.203-3 - Acceptance of real property.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Acceptance of real... Acceptance of real property. (a) Whenever a bond with a security interest in real property is submitted, the... concurrent owners; whether any real estate taxes are due and payable; and any recorded encumbrances against...
19 CFR 127.41 - Government title to unclaimed and abandoned merchandise.
Code of Federal Regulations, 2010 CFR
2010-04-01
... SECURITY; DEPARTMENT OF THE TREASURY GENERAL ORDER, UNCLAIMED, AND ABANDONED MERCHANDISE Title to Unclaimed... part, at which time merchandise having thus remained in Customs custody is considered as unclaimed and abandoned, the port director, with the concurrence of the Assistant Commissioner, Office of Field Operations...
Sen. Schumer, Charles E. [D-NY
2010-07-12
Senate - 07/15/2010 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application
NASA Technical Reports Server (NTRS)
McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.
2010-01-01
The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.
40 CFR 798.5275 - Sex-linked recessive lethal test in drosophila melanogaster.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be... the negative (vehicle) control group shall be determined by the availability of appropriate laboratory... the appropriate control group will strongly influence the number of treated chromosomes that must be...
40 CFR 798.5275 - Sex-linked recessive lethal test in drosophila melanogaster.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be... the negative (vehicle) control group shall be determined by the availability of appropriate laboratory... the appropriate control group will strongly influence the number of treated chromosomes that must be...
40 CFR 798.5275 - Sex-linked recessive lethal test in drosophila melanogaster.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be... the negative (vehicle) control group shall be determined by the availability of appropriate laboratory... the appropriate control group will strongly influence the number of treated chromosomes that must be...
40 CFR 798.5275 - Sex-linked recessive lethal test in drosophila melanogaster.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be... the negative (vehicle) control group shall be determined by the availability of appropriate laboratory... the appropriate control group will strongly influence the number of treated chromosomes that must be...
40 CFR 798.5275 - Sex-linked recessive lethal test in drosophila melanogaster.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be... the negative (vehicle) control group shall be determined by the availability of appropriate laboratory... the appropriate control group will strongly influence the number of treated chromosomes that must be...
McCaig, Cassandra M; Adams, Scott G; Dykstra, Allyson D; Jog, Mandar
2016-01-01
Previous studies have demonstrated a negative effect of concurrent walking and talking on gait in Parkinson's disease (PD) but there is limited information about the effect of concurrent walking on speech production. The present study examined the effect of sitting, standing, and three concurrent walking tasks (slow, normal, fast) on conversational speech intensity and speech rate in fifteen individuals with hypophonia related to idiopathic Parkinson's disease (PD) and fourteen age-equivalent controls. Interlocuter (talker-to-talker) distance effects and walking speed were also examined. Concurrent walking was found to produce a significant increase in speech intensity, relative to standing and sitting, in both the control and PD groups. Faster walking produced significantly greater speech intensity than slower walking. Concurrent walking had no effect on speech rate. Concurrent walking and talking produced significant reductions in walking speed in both the control and PD groups. In general, the results of the present study indicate that concurrent walking tasks and the speed of concurrent walking can have a significant positive effect on conversational speech intensity. These positive, "energizing" effects need to be given consideration in future attempts to develop a comprehensive model of speech intensity regulation and they may have important implications for the development of new evaluation and treatment procedures for individuals with hypophonia related to PD. Crown Copyright © 2015. Published by Elsevier B.V. All rights reserved.
Yan, W M; Li, X Z; Yu, Z L; Zhang, J; Sun, X G
2015-04-17
Herein, we investigated the clinical value of concurrent radiochemotherapy for patients with advanced cervical cancer and its effects on adverse clinical symptoms. Forty patients with cervical cancer were recruited from January 2011 to January 2014 for this study. Participants were randomly allocated into a test or control group, with 20 patients in each group. Patients in the test group were treated with concurrent radiochemotherapy, whereas patients in the control group received only traditional radiotherapy. At the end of the observation period, clinical efficacy in the two groups was compared. Patients were followed up for 2 years, and the rates of recurrence, survival, and complications were compared; ultrasonographic findings before and after radiotherapy were also correlated. Patients in the test group who received concurrent radiochemotherapy showed significantly higher clinical efficacy than the control group at the end of treatment cycles. After 2 years of follow-up, the rates of recurrence, mortality, and complications were all significantly lower in the test group than in the control group (P < 0.05). Comparison of ultrasonographic findings before and after radiochemotherapy showed that the size of the tumor was significantly smaller in patients after concurrent radiochemotherapy. Compared with traditional radiotherapy, concurrent radiochemotherapy significantly improved clinical outcomes in patients with advanced cervical cancer. Concurrent radiochemotherapy also enhanced the rate of survival and decreased the rate of relapse, with enhanced clinical safety and no significant side effects. Thus, concurrent radiochemotherapy can be more broadly applied in the treatment of advanced cervical cancer.
Allen, Joseph P.; Porter, Maryfrances R.; McFarland, F. Christy; Marsh, Penny; McElhaney, Kathleen Boykin
2006-01-01
This study assessed the hypothesis that popularity in adolescence takes on a twofold role, both marking high levels of concurrent psychosocial adaptation, but also predicting increases over time in both positive and negative behaviors sanctioned by peer norms. This hypothesis was tested with multi-method, longitudinal data obtained on a diverse community sample of 185 adolescents. Sociometric popularity data were examined in relation to data from interview-based assessments of attachment security and ego development, observations of mother-adolescent interactions, and repeated self- and peer-report assessments of delinquency and alcohol use. Results indicated that popular adolescents displayed higher concurrent levels of ego development, secure attachment and more adaptive interactions with mothers and best friends. Longitudinal analyses supported a “popularity-socialization” hypothesis, however, in which popular adolescents were more likely to increase in behaviors that receive approval in the peer group (e.g., minor levels of drug use and delinquency) and decrease in behaviors unlikely to be well-received by peers (e.g., hostile behavior with peers). PMID:15892790
Code of Federal Regulations, 2012 CFR
2012-07-01
..., tissues or techniques may also be appropriate. (6) Control groups—(i) Concurrent controls. Concurrent positive, negative, and vehicle controls should be included in each assay. (ii) Negative controls. The... CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5500 Differential growth...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., tissues or techniques may also be appropriate. (6) Control groups—(i) Concurrent controls. Concurrent positive, negative, and vehicle controls should be included in each assay. (ii) Negative controls. The... CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5500 Differential growth...
40 CFR 798.5395 - In vivo mammalian bone marrow cytogenetics tests: Micronucleus assay.
Code of Federal Regulations, 2011 CFR
2011-07-01
... five female and five male animals per experimental and control group shall be used. Thus, 10 animals...) Assignment to groups. Animals shall be randomized and assigned to treatment and control groups. (4) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be included in...
40 CFR 798.5395 - In vivo mammalian bone marrow cytogenetics tests: Micronucleus assay.
Code of Federal Regulations, 2012 CFR
2012-07-01
... five female and five male animals per experimental and control group shall be used. Thus, 10 animals...) Assignment to groups. Animals shall be randomized and assigned to treatment and control groups. (4) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be included in...
40 CFR 798.5395 - In vivo mammalian bone marrow cytogenetics tests: Micronucleus assay.
Code of Federal Regulations, 2014 CFR
2014-07-01
... five female and five male animals per experimental and control group shall be used. Thus, 10 animals...) Assignment to groups. Animals shall be randomized and assigned to treatment and control groups. (4) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be included in...
Code of Federal Regulations, 2011 CFR
2011-07-01
..., tissues or techniques may also be appropriate. (6) Control groups—(i) Concurrent controls. Concurrent positive, negative, and vehicle controls should be included in each assay. (ii) Negative controls. The... CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5500 Differential growth...
Code of Federal Regulations, 2014 CFR
2014-07-01
..., tissues or techniques may also be appropriate. (6) Control groups—(i) Concurrent controls. Concurrent positive, negative, and vehicle controls should be included in each assay. (ii) Negative controls. The... CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5500 Differential growth...
40 CFR 798.5395 - In vivo mammalian bone marrow cytogenetics tests: Micronucleus assay.
Code of Federal Regulations, 2010 CFR
2010-07-01
... five female and five male animals per experimental and control group shall be used. Thus, 10 animals...) Assignment to groups. Animals shall be randomized and assigned to treatment and control groups. (4) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be included in...
40 CFR 798.5395 - In vivo mammalian bone marrow cytogenetics tests: Micronucleus assay.
Code of Federal Regulations, 2013 CFR
2013-07-01
... five female and five male animals per experimental and control group shall be used. Thus, 10 animals...) Assignment to groups. Animals shall be randomized and assigned to treatment and control groups. (4) Control groups—(i) Concurrent controls. Concurrent positive and negative (vehicle) controls shall be included in...
Drew, S J; Perpiñán, D; Baily, J
2016-01-01
The Scottish wildcat (Felis silvestris) is an iconic and endangered subpopulation of the European wildcat (F. silvestris silvestris). There is much research devoted to the ecology, genetics and conservation of this animal, but little published information on pathology and disease. The investigation and reporting of such information is vital to furthering understanding of the effects of hybridization, a factor that is crucial if we are to secure a future for the Scottish wildcat. This report describes the clinical presentation, gross post-mortem and histological findings in an elderly Scottish wildcat hybrid with concurrent transitional meningioma and ceruminous gland adenocarcinoma. Copyright © 2015 Elsevier Ltd. All rights reserved.
40 CFR 798.3320 - Combined chronic toxicity/oncogenicity.
Code of Federal Regulations, 2013 CFR
2013-07-01
... concurrent control for those groups not intended for early sacrifice. At least 40 rodents (20 females and 20 males) should be used for satellite dose group(s) and the satellite control group. The purpose of the... percent at the time of termination. (2) Control groups. (i) A concurrent control group (50 females and 50...
40 CFR 798.3320 - Combined chronic toxicity/oncogenicity.
Code of Federal Regulations, 2014 CFR
2014-07-01
... concurrent control for those groups not intended for early sacrifice. At least 40 rodents (20 females and 20 males) should be used for satellite dose group(s) and the satellite control group. The purpose of the... percent at the time of termination. (2) Control groups. (i) A concurrent control group (50 females and 50...
40 CFR 798.3320 - Combined chronic toxicity/oncogenicity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... concurrent control for those groups not intended for early sacrifice. At least 40 rodents (20 females and 20 males) should be used for satellite dose group(s) and the satellite control group. The purpose of the... percent at the time of termination. (2) Control groups. (i) A concurrent control group (50 females and 50...
40 CFR 798.3320 - Combined chronic toxicity/oncogenicity.
Code of Federal Regulations, 2011 CFR
2011-07-01
... concurrent control for those groups not intended for early sacrifice. At least 40 rodents (20 females and 20 males) should be used for satellite dose group(s) and the satellite control group. The purpose of the... percent at the time of termination. (2) Control groups. (i) A concurrent control group (50 females and 50...
40 CFR 798.3320 - Combined chronic toxicity/oncogenicity.
Code of Federal Regulations, 2012 CFR
2012-07-01
... concurrent control for those groups not intended for early sacrifice. At least 40 rodents (20 females and 20 males) should be used for satellite dose group(s) and the satellite control group. The purpose of the... percent at the time of termination. (2) Control groups. (i) A concurrent control group (50 females and 50...
Risk factors for concurrent bacteremia in adult patients with dengue.
Thein, Tun-Linn; Ng, Ee-Ling; Yeang, Ming S; Leo, Yee-Sin; Lye, David C
2017-06-01
Bacteremia in dengue may occur with common exposure to pathogens in association with severe organ impairment or severe dengue, which may result in death. Cohort studies identifying risk factors for concurrent bacteremia among patients with dengue are rare. We conducted a retrospective case-control study of adult patients with dengue who were admitted to the Department of Infectious Diseases at Tan Tock Seng Hospital, Singapore from 2004 to 2008. For each case of dengue with concurrent bacteremia (within the first 72 hours of admission), we selected four controls without bacteremia, who were matched on year of infection and dengue confirmation method. Conditional logistic regression was performed to identify risk factors for concurrent bacteremia. Among 9,553 patients with dengue, 29 (0.3%) had bacteremia. Eighteen of these patients (62.1%) had concurrent bacteremia. The predominant bacteria were Staphylococcus aureus, one of which was a methicillin-resistant strain. Dengue shock syndrome occurred more frequently and hospital stay was longer among cases than among controls. Three cases did not survive, whereas none of the controls died. In multivariate analysis, being critically ill at hospital presentation was independently associated with 15 times the likelihood of a patient with dengue having concurrent bacteremia. Concurrent bacteremia in adult patients with dengue is uncommon but presents atypically and results in more deaths and longer hospital stay. Given the associated mortality, collection of blood cultures and empiric antibiotic therapy may be considered in patients who are critically ill. Copyright © 2015. Published by Elsevier B.V.
Brown, Geoffrey L.; Mangelsdorf, Sarah C.; Neff, Cynthia
2014-01-01
To reach a greater understanding of the early father-child attachment relationship, this study examined concurrent and longitudinal associations among father involvement, paternal sensitivity, and father-child attachment security at 13 months and 3 years of age. Analyses revealed few associations among these variables at 13 months of age, but involvement and sensitivity independently predicted father-child attachment security at age 3. Moreover, sensitivity moderated the association between involvement and attachment security at 3 years. Specifically, involvement was unrelated to attachment security when fathers were highly sensitive, but positively related to attachment security when fathers were relatively less sensitive. Father involvement was also moderately stable across the two timepoints, but paternal sensitivity was not. Furthermore, there was significant stability in father-child attachment security from 13 months to 3 years. Secure attachment at 13 months also predicted greater levels of paternal sensitivity at 3 years, with sensitivity at age 3 mediating the association between 13 month and 3 year attachment security. In sum, a secure father-child attachment relationship a) was related to both quantity and quality of fathering behavior, b) remained relatively stable across early childhood, and c) predicted increased paternal sensitivity over time. These findings further our understanding of the correlates of early father-child attachment, and underscore the need to consider multiple domains of fathers’ parenting and reciprocal relations between fathering behavior and father-child attachment security. PMID:22468691
A short-term longitudinal study of correlates and sequelae of attachment security in autism
Rozga, Agata; Hesse, Erik; Main, Mary; Duschinsky, Robbie; Beckwith, Leila; Sigman, Marian
2018-01-01
ABSTRACT In this short-term longitudinal study, 30 preschool-aged children with autism were first observed in Ainsworth’s Strange Situation Procedure and, separately, interacting with the primary caregiver in the home. One year later, each child completed both a developmental assessment and an observational assessment of empathic responding. Behaviors typical for children with autism were distinguished from behaviors suggestive of relationally based attachment disorganization. Forty-five percent of the children were classified as securely attached. The secure group demonstrated language skills superior to those of the insecurely attached group, concurrently and during the follow-up. Compared to parents of children who were insecurely attached, parents of securely attached children were rated as more sensitive. Compared to both organized insecure and disorganized children, secure children were rated as more responsive to an examiner’s apparent distress during the follow-up relative to their ratings at intake, whereas empathy ratings of children with insecure classifications did not increase. Importantly, attachment security was associated with empathy above and beyond the contribution of children’s language level. These results indicate that the sequelae of attachment security in autism may be similar to those documented for typically developing children. PMID:28959921
Chmielewski, Witold X; Mückschel, Moritz; Dippel, Gabriel; Beste, Christian
2016-11-01
Inhibiting responses is a challenge, where the outcome (partly) depends on the situational context. In everyday situations, response inhibition performance might be altered when irrelevant input is presented simultaneously with the information relevant for response inhibition. More specifically, irrelevant concurrent information may either brace or interfere with response-relevant information, depending on whether these inputs are redundant or conflicting. The aim of this study is to investigate neurophysiological mechanisms and the network underlying such modulations using EEG beamforming as method. The results show that in comparison to a baseline condition without concurrent information, response inhibition performance can be aggravated or facilitated by manipulating the extent of conflict via concurrent input. This depends on whether the requirement for cognitive control is high, as in conflicting trials, or whether it is low, as in redundant trials. In line with this, the total theta frequency power decreases in a right hemispheric orbitofrontal response inhibition network including the SFG, MFG, and SMA, when concurrent redundant information facilitates response inhibition processes. Vice versa, theta activity in a left-hemispheric response inhibition network (i.e., SFG, MFG, and IFG) increases, when conflicting concurrent information compromises response inhibition processes. We conclude that concurrent information bi-directionally shifts response inhibition performance and modulates the network architecture underlying theta oscillations which are signaling different levels of the need for cognitive control.
Capodieci, Agnese; Serafini, Alice; Dessuki, Alice; Cornoldi, Cesare
2018-02-20
The writing abilities of children with ADHD symptoms were examined in a simple dictation task, and then in two conditions with concurrent verbal or visuospatial working memory (WM) loads. The children with ADHD symptoms generally made more spelling mistakes than controls, and the concurrent loads impaired their performance, but with partly different effects. The concurrent verbal WM task prompted an increase in the phonological errors, while the concurrent visuospatial WM task prompted more non-phonological errors, matching the Italian phonology, but not the Italian orthography. In the ADHD group, the children proving better able to cope with a concurrent verbal WM load had a better spelling performance too. The ADHD and control groups had a similar handwriting speed, but the former group's writing quality was poorer. Our results suggest that WM supports writing skills, and that children with ADHD symptoms have general writing difficulties, but strength in coping with concurrent verbal information may support their spelling performance.
Europe Report, Science and Technology.
1986-11-17
fallout, bio- technology, stimulation, BRITE [Basic Research in Industrial Technologies for Europe] and non-nuclear energy ); -Overall assessment of...must make more use of new technologies," Narjes says. The new program will also pay particular attention to public health, environment, and energy ...nuclear fission and fusion). Concurrently subjects such as security, waste, and energy saving will get more attention. It is evident that the
Concurrent Learning of Control in Multi agent Sequential Decision Tasks
2018-04-17
Concurrent Learning of Control in Multi-agent Sequential Decision Tasks The overall objective of this project was to develop multi-agent reinforcement...learning (MARL) approaches for intelligent agents to autonomously learn distributed control policies in decentral- ized partially observable...shall be subject to any oenalty for failing to comply with a collection of information if it does not display a currently valid OMB control number
Concurrent simulation of a parallel jaw end effector
NASA Technical Reports Server (NTRS)
Bynum, Bill
1985-01-01
A system of programs developed to aid in the design and development of the command/response protocol between a parallel jaw end effector and the strategic planner program controlling it are presented. The system executes concurrently with the LISP controlling program to generate a graphical image of the end effector that moves in approximately real time in response to commands sent from the controlling program. Concurrent execution of the simulation program is useful for revealing flaws in the communication command structure arising from the asynchronous nature of the message traffic between the end effector and the strategic planner. Software simulation helps to minimize the number of hardware changes necessary to the microprocessor driving the end effector because of changes in the communication protocol. The simulation of other actuator devices can be easily incorporated into the system of programs by using the underlying support that was developed for the concurrent execution of the simulation process and the communication between it and the controlling program.
Achieving food security in times of crisis.
Swaminathan, M S
2010-11-30
In spite of several World Food Summits during the past decade, the number of people going to bed hungry is increasing and now exceeds one billion. Food security strategies should therefore be revisited. Food security systems should begin with local communities who can develop and manage community gene, seed, grain and water banks. At the national level, access to balanced diet and clean drinking water should become a basic human right. Implementation of the right to food will involve concurrent attention to production, procurement, preservation and public distribution. Higher production in perpetuity should be achieved through an ever-green revolution based on the principles of conservation and climate-resilient farming. This will call for a blend of traditional ecological prudence with frontier technologies, particularly biotechnology and information communication technologies. Copyright © 2010. Published by Elsevier B.V.
Huet, Michaël; Jacobs, David M; Camachon, Cyril; Goulon, Cedric; Montagne, Gilles
2009-12-01
This study (a) compares the effectiveness of different types of feedback for novices who learn to land a virtual aircraft in a fixed-base flight simulator and (b) analyzes the informational variables that learners come to use after practice. An extensive body of research exists concerning the informational variables that allow successful landing. In contrast, few studies have examined how the attention of pilots can be directed toward these sources of information. In this study, 15 participants were asked to land a virtual Cessna 172 on 245 trials while trying to follow the glide-slope area as accurately as possible. Three groups of participants practiced under different feedback conditions: with self-controlled concurrent feedback (the self-controlled group), with imposed concurrent feedback (the yoked group), or without concurrent feedback (the control group). The self-controlled group outperformed the yoked group, which in turn outperformed the control group. Removing or manipulating specific sources of information during transfer tests had different effects for different individuals. However, removing the cockpit from the visual scene had a detrimental effect on the performance of the majority of the participants. Self-controlled concurrent feedback helps learners to more quickly attune to the informational variables that allow them to control the aircraft during the approach phase. Knowledge concerning feedback schedules can be used for the design of optimal practice methods for student pilots, and knowledge about the informational variables used by expert performers has implications for the design of cockpits and runways that facilitate the detection of these variables.
Father involvement, paternal sensitivity, and father-child attachment security in the first 3 years.
Brown, Geoffrey L; Mangelsdorf, Sarah C; Neff, Cynthia
2012-06-01
To reach a greater understanding of the early father-child attachment relationship, this study examined concurrent and longitudinal associations among father involvement, paternal sensitivity, and father-child attachment security at 13 months and 3 years of age. Analyses revealed few associations among these variables at 13 months of age, but involvement and sensitivity independently predicted father-child attachment security at age 3. Moreover, sensitivity moderated the association between involvement and attachment security at 3 years. Specifically, involvement was unrelated to attachment security when fathers were highly sensitive, but positively related to attachment security when fathers were relatively less sensitive. Father involvement was also moderately stable across the two time points, but paternal sensitivity was not. Furthermore, there was significant stability in father-child attachment security from 13 months to 3 years. Secure attachment at 13 months also predicted greater levels of paternal sensitivity at 3 years, with sensitivity at age 3 mediating the association between 13 month and 3 year attachment security. In sum, a secure father-child attachment relationship (a) was related to both quantity and quality of fathering behavior, (b) remained relatively stable across early childhood, and (c) predicted increased paternal sensitivity over time. These findings further our understanding of the correlates of early father-child attachment, and underscore the need to consider multiple domains of fathers' parenting and reciprocal relations between fathering behavior and father-child attachment security. PsycINFO Database Record (c) 2012 APA, all rights reserved.
Eby, Chas
2014-01-01
The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.
Widespread mosquito net fishing in the Barotse floodplain: Evidence from qualitative interviews.
Larsen, David A; Welsh, Rick; Mulenga, Angela; Reid, Robert
2018-01-01
The insecticide-treated mosquito net (ITN) is a crucial component of malaria control programs, and has prevented many malaria cases and deaths due to scale up. ITNs also serve effectively as fishing nets and various sources have reported use of ITNs for fishing. This article examines how widespread the practice of mosquito net fishing with ITNs is. We conducted in-depth interviews with fishery personnel and traditional leadership from the Barotse Royal Establishment in Western Province, Zambia, to better understand the presence or absence of the use of ITNs as fishing nets. We then coded the interviews for themes through content analysis. Additionally we conducted a desk review of survey data to show trends in malaria indicators, nutritional status of the population and fish consumption. All those interviewed reported that ITNs are regularly used for fishing in Western Zambia and the misuse is widespread. Concurrently those interviewed reported declines in fish catches both in terms of quantity and quality leading to threatened food security in the area. In addition to unsustainable fishing practices those interviewed referenced drought and population pressure as reasons for fishery decline. Malaria indicators do not show a trend in declining malaria transmission, fish consumption has dropped dramatically and nutritional status has not improved over time. Despite the misuse of the ITNs for fishing all those interviewed maintained that ITN distribution should continue. Donors, control programs and scientists should realize that misuse of ITNs as fishing nets is a current problem for malaria control and potentially for food security that needs to be addressed.
Widespread mosquito net fishing in the Barotse floodplain: Evidence from qualitative interviews
Mulenga, Angela; Reid, Robert
2018-01-01
Background The insecticide-treated mosquito net (ITN) is a crucial component of malaria control programs, and has prevented many malaria cases and deaths due to scale up. ITNs also serve effectively as fishing nets and various sources have reported use of ITNs for fishing. This article examines how widespread the practice of mosquito net fishing with ITNs is. Methods We conducted in-depth interviews with fishery personnel and traditional leadership from the Barotse Royal Establishment in Western Province, Zambia, to better understand the presence or absence of the use of ITNs as fishing nets. We then coded the interviews for themes through content analysis. Additionally we conducted a desk review of survey data to show trends in malaria indicators, nutritional status of the population and fish consumption. Results All those interviewed reported that ITNs are regularly used for fishing in Western Zambia and the misuse is widespread. Concurrently those interviewed reported declines in fish catches both in terms of quantity and quality leading to threatened food security in the area. In addition to unsustainable fishing practices those interviewed referenced drought and population pressure as reasons for fishery decline. Malaria indicators do not show a trend in declining malaria transmission, fish consumption has dropped dramatically and nutritional status has not improved over time. Conclusions Despite the misuse of the ITNs for fishing all those interviewed maintained that ITN distribution should continue. Donors, control programs and scientists should realize that misuse of ITNs as fishing nets is a current problem for malaria control and potentially for food security that needs to be addressed. PMID:29719003
Miko, Benjamin A.; Befus, Montina; Herzig, Carolyn T. A.; Mukherjee, Dhritiman V.; Apa, Zoltan L.; Bai, Ruo Yu; Tanner, Joshua P.; Gage, Dana; Genovese, Maryann; Koenigsmann, Carl J.; Larson, Elaine L.; Lowy, Franklin D.
2015-01-01
Background. Large outbreaks of Staphylococcus aureus (SA) infections have occurred in correctional facilities across the country. We aimed to define the epidemiological and microbiological determinants of SA infection in prisons to facilitate development of prevention strategies for this underserved population. Methods. We conducted a case-control study of SA infection at 2 New York State maximum security prisons. SA-infected inmates were matched with 3 uninfected controls. Subjects had cultures taken from sites of infection and colonization (nose and throat) and were interviewed via structured questionnaire. SA isolates were characterized by spa typing. Bivariate and multivariable analyses were conducted using conditional logistic regression. Results. Between March 2011 and January 2013, 82 cases were enrolled and matched with 246 controls. On bivariate analysis, the use of oral and topical antibiotics over the preceding 6 months was strongly associated with clinical infection (OR, 2.52; P < .001 and 4.38, P < .001, respectively). Inmates with clinical infection had 3.16 times the odds of being diabetic compared with inmates who did not have clinical infection (P < .001). Concurrent nasal and/or oropharyngeal colonization was also associated with an increased odds of infection (OR, 1.46; P = .002). Among colonized inmates, cases were significantly more likely to carry the SA clone spa t008 (usually representing the epidemic strain USA300) compared to controls (OR, 2.52; P = .01). Conclusions. Several inmate characteristics were strongly associated with SA infection in the prison setting. Although many of these factors were likely present prior to incarceration, they may help medical staff identify prisoners for targeted prevention strategies. PMID:25810281
Miko, Benjamin A; Befus, Montina; Herzig, Carolyn T A; Mukherjee, Dhritiman V; Apa, Zoltan L; Bai, Ruo Yu; Tanner, Joshua P; Gage, Dana; Genovese, Maryann; Koenigsmann, Carl J; Larson, Elaine L; Lowy, Franklin D
2015-07-15
Large outbreaks of Staphylococcus aureus (SA) infections have occurred in correctional facilities across the country. We aimed to define the epidemiological and microbiological determinants of SA infection in prisons to facilitate development of prevention strategies for this underserved population. We conducted a case-control study of SA infection at 2 New York State maximum security prisons. SA-infected inmates were matched with 3 uninfected controls. Subjects had cultures taken from sites of infection and colonization (nose and throat) and were interviewed via structured questionnaire. SA isolates were characterized by spa typing. Bivariate and multivariable analyses were conducted using conditional logistic regression. Between March 2011 and January 2013, 82 cases were enrolled and matched with 246 controls. On bivariate analysis, the use of oral and topical antibiotics over the preceding 6 months was strongly associated with clinical infection (OR, 2.52; P < .001 and 4.38, P < .001, respectively). Inmates with clinical infection had 3.16 times the odds of being diabetic compared with inmates who did not have clinical infection (P < .001). Concurrent nasal and/or oropharyngeal colonization was also associated with an increased odds of infection (OR, 1.46; P = .002). Among colonized inmates, cases were significantly more likely to carry the SA clone spa t008 (usually representing the epidemic strain USA300) compared to controls (OR, 2.52; P = .01). Several inmate characteristics were strongly associated with SA infection in the prison setting. Although many of these factors were likely present prior to incarceration, they may help medical staff identify prisoners for targeted prevention strategies. © The Author 2015. Published by Oxford University Press on behalf of the Infectious Diseases Society of America. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Das, Prajnan; Lin, Edward H.; Bhatia, Sumita
2006-12-01
Purpose: To retrospectively compare the acute toxicity, pathologic response, relapse rates, and survival in rectal cancer patients treated with preoperative radiotherapy (RT) and either concurrent capecitabine or concurrent protracted infusion 5-fluorouracil (5-FU). Methods: Between June 2001 and February 2004, 89 patients with nonmetastatic rectal adenocarcinoma were treated with preoperative RT and concurrent capecitabine, followed by mesorectal excision. These patients were individually matched by clinical T and N stage (as determined by endoscopic ultrasound and CT scans) with 89 control patients treated with preoperative RT and concurrent protracted infusion 5-FU between September 1997 and August 2002. Results: In each group, 5more » patients (6%) had Grade 3-4 toxicity during chemoradiotherapy. The pathologic complete response rate was 21% with capecitabine and 12% with protracted infusion 5-FU (p = 0.19). Of the 89 patients in the capecitabine group and 89 in the 5-FU group, 46 (52%) and 55 (62%), respectively, had downstaging of the T stage after chemoradiotherapy (p = 0.20). The estimated 3-year local control (p = 0.15), distant control (p = 0.86), and overall survival (p = 0.12) rate was 94.4%, 86.3%, and 89.8% for patients treated with capecitabine and 98.6%, 86.6%, and 96.4% for patients treated with protracted infusion 5-FU, respectively. Conclusion: Preoperative concurrent capecitabine and concurrent protracted infusion 5-FU were both well tolerated, with similar, low rates of Grade 3-4 acute toxicity. No significant differences were seen in the pathologic response, local and distant recurrence, or overall survival among patients treated with preoperative RT and concurrent capecitabine compared with those treated with RT and concurrent protracted infusion 5-FU.« less
Temporally Aware Reactive Systems
2005-03-01
programming language , as does O’Haskell. However, there are signi cant di erences. In Ocaml , state, objects and concurrency are orthogonal aspects. They...dif- ference between the two languages is that Ocaml is strict, while expression evaluation in O’Haskell is lazy. That dif- ference, however, is not... languages ; Static Checking; Overload tolerance; Graceful degradation 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON (Monitor) a
Relative Reinforcer Rates and Magnitudes Do Not Control Concurrent Choice Independently
ERIC Educational Resources Information Center
Elliffe, Douglas; Davison, Michael; Landon, Jason
2008-01-01
One assumption of the matching approach to choice is that different independent variables control choice independently of each other. We tested this assumption for reinforcer rate and magnitude in an extensive parametric experiment. Five pigeons responded for food reinforcement on switching-key concurrent variable-interval variable-interval…
Data breach locations, types, and associated characteristics among US hospitals.
Gabriel, Meghan Hufstader; Noblin, Alice; Rutherford, Ashley; Walden, Amanda; Cortelyou-Ward, Kendall
2018-02-01
The objectives of this study were to describe the locations in hospitals where data are breached, the types of breaches that occur most often at hospitals, and hospital characteristics, including health information technology (IT) sophistication and biometric security capabilities, that may be predicting factors of large data breaches that affect 500 or more patients. The Office of Civil Rights breach data from healthcare providers regarding breaches that affected 500 or more individuals from 2009 to 2016 were linked with hospital characteristics from the Health Information Management Systems Society and the American Hospital Association Health IT Supplement databases. Descriptive statistics were used to characterize hospitals with and without breaches, data breach type, and location/mode of data breaches in hospitals. Multivariate logistic regression analysis explored hospital characteristics that were predicting factors of a data breach affecting at least 500 patients, including area characteristics, region, health system membership, size, type, biometric security use, health IT sophistication, and ownership. Of all types of healthcare providers, hospitals accounted for approximately one-third of all data breaches and hospital breaches affected the largest number of individuals. Paper and films were the most frequent location of breached data, occurring in 65 hospitals during the study period, whereas network servers were the least common location but their breaches affected the most patients overall. Adjusted multivariate results showed significant associations among data breach occurrences and some hospital characteristics, including type and size, but not others, including health IT sophistication or biometric use for security. Hospitals should conduct routine audits to allow them to see their vulnerabilities before a breach occurs. Additionally, information security systems should be implemented concurrently with health information technologies. Improving access control and prioritizing patient privacy will be important steps in minimizing future breaches.
Does political ideology moderate stress: the special case of soldiers conducting forced evacuation.
Shechner, Tomer; Slone, Michelle; Bialik, Gadi
2007-04-01
This study examined the moderating role of political ideology on psychological outcomes for Israeli soldiers participating in the forced evacuation of Jewish settlements from Gaza. Change in psychopathology and well-being was assessed for 3 concurrent mission groups differing in their political ideological contentiousness--forced evacuation, Gaza security, and Northern border security. After soldiers in each mission group were classified on the basis of relatively left- or right-wing political ideological tendencies, the authors examined differential impact of each mission on soldiers of differing political ideology. Results confirmed strong moderation effects of political ideology on psychological outcomes in these extreme contexts. Implications for research, prevention, and treatment are discussed. 2007 APA, all rights reserved
NASA Astrophysics Data System (ADS)
Tkacz, J.; Bukowiec, A.; Doligalski, M.
2017-08-01
The paper presentes the method of modeling and implementation of concurrent controllers. Concurrent controllers are specified by Petri nets. Then Petri nets are decomposed using symbolic deduction method of analysis. Formal methods like sequent calculus system with considered elements of Thelen's algorithm have been used here. As a result, linked state machines (LSMs) are received. Each FSM is implemented using methods of structural decomposition during process of logic synthesis. The method of multiple encoding of microinstruction has been applied. It leads to decreased number of Boolean function realized by combinational part of FSM. The additional decoder could be implemented with the use of memory blocks.
Control Synthesis for a Class of Hybrid Systems Subject to Configuration-Based Safety Constraints
NASA Technical Reports Server (NTRS)
Heymann, Michael; Lin, Feng; Meyer, George
1997-01-01
We examine a class of hybrid systems which we call Composite Hybrid Machines (CHM's) that consists of the concurrent (and partially synchronized) operation of Elementary Hybrid Machines (EHM's). Legal behavior, specified by a set of illegal configurations that the CHM may not enter, is to be achieved by the concurrent operation of the CHM with a suitably designed legal controller. In the present paper we focus on the problem of synthesizing a legal controller, whenever such a controller exists. More specifically, we address the problem of synthesizing the minimally restrictive legal controller. A controller is minimally restrictive if, when composed to operate concurrently with another legal controller, it will never interfere with the operation of the other controller and, therefore, can be composed to operate concurrently with any other controller that may be designed to achieve liveness specifications or optimality requirements without the need to reinvestigate or reverify legality of the composite controller. We confine our attention to a special class of CHM's where system dynamics is rate-limited and legal guards are conjunctions or disjunctions of atomic formulas in the dynamic variables (of the type x less than or equal to x(sub 0), or x greater than or equal to x(sub 0)). We present an algorithm for synthesis of the minimally restrictive legal controller. We demonstrate our approach by synthesizing a minimally restrictive controller for a steam boiler (the verification of which recently received a great deal of attention).
Concurrent alcohol and tobacco use among a middle-aged and elderly population in Mumbai.
Gupta, Prakash C; Maulik, Pallab K; Pednekar, Mangesh S; Saxena, Shekhar
2005-01-01
The concurrent use of alcohol and tobacco and its deleterious effects have been reported in the western literature. However, studies on the relationship between concurrent alcohol and tobacco use in India are limited. This study outlines the association between concurrent alcohol and tobacco use among a middle-aged and elderly population in a western Indian cohort after controlling for various sociodemographic factors. A total of 35 102 men, 45 years of age and above were interviewed for concurrent alcohol and tobacco use. The sample was part of an earlier cohort drawn from the general population. The data were analysed after controlling for age, education, religion and mother-tongue. Among alcohol users, 51.1% smoked tobacco and 35.6% used smokeless tobacco. The relative risk of alcohol use was highest among those smoking cigarettes or beedis and among those using mishri with betel quid and tobacco. The risk of alcohol use increased with the frequency of tobacco use. The risk also increased with higher amounts of alcohol consumption, but peaked at around 100-150 ml of absolute alcohol use. The study highlights the association between concurrent alcohol and tobacco use among the Indian population. This has important public health implications since concurrent use of these is synergistic for increased risk of oropharyngeal cancers.
Automatic Verification of Serializers.
1980-03-01
31 2.5 Using semaphores to implement sei ;alizers ......................... 32 2.6 A comparison of...of concurrency control, while Hewitt has concentrated on more primitive control of concurrency in a context where programs communicate by passing...translation oflserializers into clusters and semaphores is given as a possible implementation strategy. Chapter 3 presents a simple semantic model that supl
ERIC Educational Resources Information Center
Whitall, Jill
1991-01-01
Presents research on the effects of concurrent verbal cognition on locomotor skills. Results revealed no interference with coordination variables across age, but some interference with control variables, particularly in younger subjects. Coordination of gait required less attention than setting of control parameters. This coordination was in place…
Aging and Concurrent Task Performance: Cognitive Demand and Motor Control
ERIC Educational Resources Information Center
Albinet, Cedric; Tomporowski, Phillip D.; Beasman, Kathryn
2006-01-01
A motor task that requires fine control of upper limb movements and a cognitive task that requires executive processing--first performing them separately and then concurrently--was performed by 18 young and 18 older adults. The motor task required participants to tap alternatively on two targets, the sizes of which varied systematically. The…
Improving generalized inverted index lock wait times
NASA Astrophysics Data System (ADS)
Borodin, A.; Mirvoda, S.; Porshnev, S.; Ponomareva, O.
2018-01-01
Concurrent operations on tree like data structures is a cornerstone of any database system. Concurrent operations intended for improving read\\write performance and usually implemented via some way of locking. Deadlock-free methods of concurrency control are known as tree locking protocols. These protocols provide basic operations(verbs) and algorithm (ways of operation invocations) for applying it to any tree-like data structure. These algorithms operate on data, managed by storage engine which are very different among RDBMS implementations. In this paper, we discuss tree locking protocol implementation for General inverted index (Gin) applied to multiversion concurrency control (MVCC) storage engine inside PostgreSQL RDBMS. After that we introduce improvements to locking protocol and provide usage statistics about evaluation of our improvement in very high load environment in one of the world’s largest IT company.
Language Issues in Mobile Program Security
1998-01-01
primitives for instance synchronous operations Nondeterminism and Privacy Now suppose we introduce nondeterminism via a simple concurrent language...code setting is that the only observable events are those that can be observed from within a mobile program using language primitives and any host...Possibilistic NI is given in It uses a main thread and two triggered threads each with a busy wait loop implementing a semaphore to copy every bit of
Mohammadianpanah, Mohammad; Razmjou-Ghalaei, Sasan; Shafizad, Amin; Ashouri-Taziani, Yaghoub; Khademi, Bijan; Ahmadloo, Niloofar; Ansari, Mansour; Omidvari, Shapour; Mosalaei, Ahmad; Mosleh-Shirazi, Mohammad Amin
2011-01-01
This is the first study that aimed to determine the efficacy and safety of concurrent chemoradiation with weekly cisplatin ± celecoxib 100 mg twice daily in locally advanced undifferentiated nasopharyngeal carcinoma. Eligible patients had newly diagnosed locally advanced (T3-T4, and/or N2-N3, M0) undifferentiated nasopharyngeal carcinoma, no prior therapy, Karnofsky performance status ≥ 70, and normal organ function. The patients were assigned to receive 7 weeks concurrent chemoradiation (70 Gy) with weekly cisplatin 30 mg/m 2 with either celecoxib 100 mg twice daily, (study group, n = 26) or placebo (control group, n = 27) followed by adjuvant combined chemotherapy with cisplatin 70 mg/m 2 on day 1 plus 5-fluorouracil 750 mg/m 2 /d with 8-h infusion on days 1-3, 3-weekly for 3 cycles. Overall clinical response rate was 100% in both groups. Complete and partial clinical response rates were 64% and 36% in the study group and 44% and 56% in the control group, respectively (P > 0.25). The addition of celecoxib to concurrent chemoradiation was associated with improved 2-year locoregional control rate from 84% to 100% (P = 0.039). The addition of celecoxib 100 mg twice daily to concurrent chemoradiation improved 2-year locoregional control rate.
Effortful Control and Impulsivity as Concurrent and Longitudinal Predictors of Academic Achievement
ERIC Educational Resources Information Center
Valiente, Carlos; Eisenberg, Nancy; Spinrad, Tracy L.; Haugen, Rg; Thompson, Marilyn S.; Kupfer, Anne
2013-01-01
The goal of this study was to test if both effortful control (EC) and impulsivity, a reactive index of temperament, uniquely predict adolescents' academic achievement, concurrently and longitudinally (Time 1: "N" = 168, X-bar[subscript age] = 12 years). At Time 1, parents and teachers reported on students' EC and impulsivity.…
The Effects of a Concurrent Task on Human Optimization and Self Control
ERIC Educational Resources Information Center
Reed, Phil; Thompson, Caitlin; Osborne, Lisa A.; McHugh, Louise
2011-01-01
Memory deficits have been shown to hamper decision making in a number of populations. In two experiments, participants were required to select one of three alternatives that varied in reinforcer amount and delay, and the effect of a concurrent task on a behavioral choice task that involved making either an impulsive, self-controlled, or optimal…
Attachment in middle childhood: predictors, correlates, and implications for adaptation.
Boldt, Lea J; Kochanska, Grazyna; Grekin, Rebecca; Brock, Rebecca L
2016-01-01
Middle childhood is a relative lacuna in behavioral attachment research. We examined antecedents, correlates, and implications of parent-child attachment at age 10 in a longitudinal study of community families from a Midwestern US state (N = 102, mothers, fathers, and children). Dimensions of security, avoidance, ambivalence, and disorganization of children's attachment to each parent were observed in lengthy naturalistic interactions and assessed using Iowa Attachment Behavioral Coding (IABC). IABC scores were meaningfully associated with history of parental responsiveness (7-80 months) and with earlier and concurrent attachment security, assessed with other established instruments (parent- and observer-rated Attachment Q-Set at 25 months, children's reports at age 8 and 10). Structural equation modeling analyses revealed that the overall history of responsive care was meaningfully associated with Security, Avoidance, and Disorganization at age 10, in both mother-child and father-child relationships, and that most recent care uniquely predicted Security. IABC scores were also meaningfully related to a broad range of measures of child adaptation at ages 10-12. Cumulative history of children's security from infancy to middle childhood, integrating measures across relationships and methodologies, also predicted child adaptation at ages 10-12.
Attachment in Middle Childhood: Predictors, Correlates, and Implications for Adaptation
Boldt, Lea J.; Kochanska, Grazyna; Grekin, Rebecca; Brock, Rebecca L.
2016-01-01
Middle childhood is a relative lacuna in behavioral attachment research. We examined antecedents, correlates, and implications of parent-child attachment at age 10 in a longitudinal study of community families from a Midwestern US state (N=102, mothers, fathers, and children). Dimensions of security, avoidance, ambivalence, and disorganization of children’s attachment to each parent were observed in lengthy naturalistic interactions and assessed using Iowa Attachment Behavioral Coding (IABC). IABC scores were meaningfully associated with history of parental responsiveness (7–80 months) and with earlier and concurrent attachment security, assessed with other established instruments (parent- and observer-rated Attachment Q-Set at 25 months, children’s reports at age 8 and 10). Structural equation modeling analyses revealed that the overall history of responsive care was meaningfully associated with Security, Avoidance, and Disorganization at age 10, in both mother-child and father-child relationships, and that most recent care uniquely predicted Security. IABC scores were also meaningfully related to a broad range of measures of child adaptation at ages 10–12. Cumulative history of children’s security from infancy to middle childhood, integrating measures across relationships and methodologies, also predicted child adaptation at ages 10–12. PMID:26673686
VanTieghem, Michelle R.; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L.; Telzer, Eva H.; Caldera, Christina; Louie, Jennifer Y.; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2018-01-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e. positive valence bias) and family-level protective factors (i.e. secure parent-child relationships) moderate risk for internalizing symptoms in Previously Institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving. PMID:28401841
Vantieghem, Michelle R; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L; Telzer, Eva H; Caldera, Christina; Louie, Jennifer Y; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2017-05-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e., positive valence bias) and family-level protective factors (i.e., secure parent-child relationships) moderate risk for internalizing symptoms in previously institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving.
Reasoning about Probabilistic Security Using Task-PIOAs
NASA Astrophysics Data System (ADS)
Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto
Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.
Is It Really Self-Control? Examining the Predictive Power of the Delay of Gratification Task
Duckworth, Angela L.; Tsukayama, Eli; Kirby, Teri A.
2013-01-01
This investigation tests whether the predictive power of the delay of gratification task (colloquially known as the “marshmallow test”) derives from its assessment of self-control or of theoretically unrelated traits. Among 56 school-age children in Study 1, delay time was associated with concurrent teacher ratings of self-control and Big Five conscientiousness—but not with other personality traits, intelligence, or reward-related impulses. Likewise, among 966 preschool children in Study 2, delay time was consistently associated with concurrent parent and caregiver ratings of self-control but not with reward-related impulses. While delay time in Study 2 was also related to concurrently measured intelligence, predictive relations with academic, health, and social outcomes in adolescence were more consistently explained by ratings of effortful control. Collectively, these findings suggest that delay task performance may be influenced by extraneous traits, but its predictive power derives primarily from its assessment of self-control. PMID:23813422
Ringhof, Steffen; Leibold, Timo; Hellmann, Daniel; Stein, Thorsten
2015-10-01
Recent studies reported on the potential benefits of submaximum clenching of the jaw on human postural control in upright unperturbed stance. However, it remained unclear whether these effects might also be observed among active controls. The purpose of the present study, therefore, was to comparatively examine the influence of concurrent muscle activation in terms of submaximum clenching of the jaw and submaximum clenching of the fists on postural stability. Posturographic analyses were conducted with 17 healthy young adults on firm and foam surfaces while either clenching the jaw (JAW) or clenching the fists (FIST), whereas habitual standing served as the control condition (CON). Both submaximum tasks were performed at 25% maximum voluntary contraction, assessed, and visualized in real time by means of electromyography. Statistical analyses revealed that center of pressure (COP) displacements were significantly reduced during JAW and FIST, but with no differences between both concurrent clenching activities. Further, a significant increase in COP displacements was observed for the foam as compared to the firm condition. The results showed that concurrent muscle activation significantly improved postural stability compared with habitual standing, and thus emphasize the beneficial effects of jaw and fist clenching for static postural control. It is suggested that concurrent activities contribute to the facilitation of human motor excitability, finally increasing the neural drive to the distal muscles. Future studies should evaluate whether elderly or patients with compromised postural control might benefit from these physiological responses, e.g., in the form of a reduced risk of falling. Copyright © 2015 Elsevier B.V. All rights reserved.
2017-03-01
overseas. Concurrently, time to market and complex system requirements are increasingly outside the budget range of standalone DoD projects. This paper...expense and delay to market concerns, a major FPGA vendor has offered an FPGA specifically targeting the A&D market . Architecturally, this offering...time-to- market Such services could individually be engaged, each spanning commercial to Trusted handling levels, as appropriate for balancing
Keytsman, Charly; Hansen, Dominique; Wens, Inez; O Eijnde, Bert
2017-10-27
High-intensity concurrent training positively affects cardiovascular risk factors. Because this was never investigated in multiple sclerosis, the present pilot study explored the impact of this training on cardiovascular risk factors in this population. Before and after 12 weeks of high-intense concurrent training (interval and strength training, 5 sessions per 2 weeks, n = 16) body composition, resting blood pressure and heart rate, 2-h oral glucose tolerance (insulin sensitivity, glycosylated hemoglobin, blood glucose and insulin concentrations), blood lipids (high- and low-density lipoprotein, total cholesterol, triglyceride levels) and C-reactive protein were analyzed. Twelve weeks of high-intense concurrent training significantly improved resting heart rate (-6%), 2-h blood glucose concentrations (-13%) and insulin sensitivity (-24%). Blood pressure, body composition, blood lipids and C-reactive protein did not seem to be affected. Under the conditions of this pilot study, 12 weeks of concurrent high-intense interval and strength training improved resting heart rate, 2-h glucose and insulin sensitivity in multiple sclerosis but did not affect blood C-reactive protein levels, blood pressure, body composition and blood lipid profiles. Further, larger and controlled research investigating the effects of high-intense concurrent training on cardiovascular risk factors in multiple sclerosis is warranted. Implications for rehabilitation High-intensity concurrent training improves cardiovascular fitness. This pilot study explores the impact of this training on cardiovascular risk factors in multiple sclerosis. Despite the lack of a control group, high-intense concurrent training does not seem to improve cardiovascular risk factors in multiple sclerosis.
An algebra of discrete event processes
NASA Technical Reports Server (NTRS)
Heymann, Michael; Meyer, George
1991-01-01
This report deals with an algebraic framework for modeling and control of discrete event processes. The report consists of two parts. The first part is introductory, and consists of a tutorial survey of the theory of concurrency in the spirit of Hoare's CSP, and an examination of the suitability of such an algebraic framework for dealing with various aspects of discrete event control. To this end a new concurrency operator is introduced and it is shown how the resulting framework can be applied. It is further shown that a suitable theory that deals with the new concurrency operator must be developed. In the second part of the report the formal algebra of discrete event control is developed. At the present time the second part of the report is still an incomplete and occasionally tentative working paper.
Burmazovic, Snezana; Henzen, Christoph; Brander, Lukas; Cioccari, Luca
2018-01-01
The combination of hyperosmolar hyperglycaemic state and central diabetes insipidus is unusual and poses unique diagnostic and therapeutic challenges for clinicians. In a patient with diabetes mellitus presenting with polyuria and polydipsia, poor glycaemic control is usually the first aetiology that is considered, and achieving glycaemic control remains the first course of action. However, severe hypernatraemia, hyperglycaemia and discordance between urine-specific gravity and urine osmolality suggest concurrent symptomatic diabetes insipidus. We report a rare case of concurrent manifestation of hyperosmolar hyperglycaemic state and central diabetes insipidus in a patient with a history of craniopharyngioma. In patients with diabetes mellitus presenting with polyuria and polydipsia, poor glycaemic control is usually the first aetiology to be considered.However, a history of craniopharyngioma, severe hypernatraemia, hyperglycaemia and discordance between urine-specific gravity and osmolality provide evidence of concurrent diabetes insipidus.Therefore, if a patient with diabetes mellitus presents with severe hypernatraemia, hyperglycaemia, a low or low normal urinary-specific gravity and worsening polyuria despite correction of hyperglycaemia, concurrent diabetes insipidus should be sought.
Burmazovic, Snezana; Henzen, Christoph; Brander, Lukas; Cioccari, Luca
2018-01-01
Summary The combination of hyperosmolar hyperglycaemic state and central diabetes insipidus is unusual and poses unique diagnostic and therapeutic challenges for clinicians. In a patient with diabetes mellitus presenting with polyuria and polydipsia, poor glycaemic control is usually the first aetiology that is considered, and achieving glycaemic control remains the first course of action. However, severe hypernatraemia, hyperglycaemia and discordance between urine-specific gravity and urine osmolality suggest concurrent symptomatic diabetes insipidus. We report a rare case of concurrent manifestation of hyperosmolar hyperglycaemic state and central diabetes insipidus in a patient with a history of craniopharyngioma. Learning points: In patients with diabetes mellitus presenting with polyuria and polydipsia, poor glycaemic control is usually the first aetiology to be considered. However, a history of craniopharyngioma, severe hypernatraemia, hyperglycaemia and discordance between urine-specific gravity and osmolality provide evidence of concurrent diabetes insipidus. Therefore, if a patient with diabetes mellitus presents with severe hypernatraemia, hyperglycaemia, a low or low normal urinary-specific gravity and worsening polyuria despite correction of hyperglycaemia, concurrent diabetes insipidus should be sought. PMID:29675260
Mattos-Guaraldi, A L; Damasco, P V; Gomes, D L R; Melendez, M G; Santos, L S; Marinelli, R S; Napoleão, F; Sabbadini, P S; Santos, C S; Moreira, L O; Hirata, R
2011-11-01
We report a case of concurrent diphtheria and infectious mononucleosis in an 11-year-old Brazilian child. Two days after specific treatment for diphtheria was started the patient was discharged following clinical recovery. This case highlights the difficulties in the clinical diagnosis of diphtheria in partially immunized individuals, and for the management and control of diphtheria in developing countries.
1983-10-01
Concurrency Control Algorithms Computer Corporation of America Wente K. Lin, Philip A. Bernstein, Nathan Goodman and Jerry Nolte APPROVED FOR PUBLIC ...84 03 IZ 004 ’KV This report has been reviewed by the RADC Public Affairs Office (PA) an is releasable to the National Technical Information Service...NTIS). At NTIS it will be releasable to the general public , including foreign na~ions. RADC-TR-83-226, Vol II (of three) has been reviewed and is
Lindberg, Marc A; Fugett, April; Thomas, Stuart W
2012-01-01
The Attachment and Clinical Issues Questionnaire (ACIQ; M. A. Lindberg & S. W. Thomas, 2011), was developed over an 18-year period containing 29 scales. The purpose of the present study was to test (a) the validity of the attachment scales in terms of how they predict to whom one turns in times of stress and for affective sharing, and (b) how the attachment scales compared with the Experiences in Close Relationship Questionnaire (ECR) in terms of concurrent, convergent, and discriminant evidence. The relevant secure scales of the ACIQ predicted to whom one turned in study 1, and study 2 demonstrated good convergent evidence with the ECR, but superior concurrent evidence in predicting partner satisfaction, and superior discriminant evidence in differentially correlating with mother and father warmth. Thus, the ACIQ passed essential validity and psychometric tests and was a more robust measure than the ECR with these defining characteristics of attachment.
Is overall similarity classification less effortful than single-dimension classification?
Wills, Andy J; Milton, Fraser; Longmore, Christopher A; Hester, Sarah; Robinson, Jo
2013-01-01
It is sometimes argued that the implementation of an overall similarity classification is less effortful than the implementation of a single-dimension classification. In the current article, we argue that the evidence securely in support of this view is limited, and report additional evidence in support of the opposite proposition--overall similarity classification is more effortful than single-dimension classification. Using a match-to-standards procedure, Experiments 1A, 1B and 2 demonstrate that concurrent load reduces the prevalence of overall similarity classification, and that this effect is robust to changes in the concurrent load task employed, the level of time pressure experienced, and the short-term memory requirements of the classification task. Experiment 3 demonstrates that participants who produced overall similarity classifications from the outset have larger working memory capacities than those who produced single-dimension classifications initially, and Experiment 4 demonstrates that instructions to respond meticulously increase the prevalence of overall similarity classification.
Goldmann, Louis H.
1986-01-01
A dump assembly having a fixed conduit and a rotatable conduit provided with overlapping plates, respectively, at their adjacent ends. The plates are formed with openings, respectively, normally offset from each other to block flow. The other end of the rotatable conduit is provided with means for securing the open end of a filled container thereto. Rotation of the rotatable conduit raises and inverts the container to empty the contents while concurrently aligning the conduit openings to permit flow of material therethrough.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-24
... Rule Change To Permit Concurrent Listing of $3.50 and $4 Strikes for Classes in the $0.50 Strike and $1... ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on March 10, 2010, the... interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. \\3\\ 15 U.S.C. 78s(b)(3)(A). \\4\\ 17 CFR 240...
Starting Strong: Talent-based Branching of Newly Commissioned U.S. Army Officers
2016-04-01
i The United States Army War College U.S. ARMY WAR COLLEGE CENTER for STRATEGIC LEADERSHIP The United States Army War College educates and develops...Army War College is to produce graduates who are skilled critical thinkers and complex problem solvers. Concurrently, it is our duty to the U.S. Army...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
Executive control of stimulus-driven and goal-directed attention in visual working memory.
Hu, Yanmei; Allen, Richard J; Baddeley, Alan D; Hitch, Graham J
2016-10-01
We examined the role of executive control in stimulus-driven and goal-directed attention in visual working memory using probed recall of a series of objects, a task that allows study of the dynamics of storage through analysis of serial position data. Experiment 1 examined whether executive control underlies goal-directed prioritization of certain items within the sequence. Instructing participants to prioritize either the first or final item resulted in improved recall for these items, and an increase in concurrent task difficulty reduced or abolished these gains, consistent with their dependence on executive control. Experiment 2 examined whether executive control is also involved in the disruption caused by a post-series visual distractor (suffix). A demanding concurrent task disrupted memory for all items except the most recent, whereas a suffix disrupted only the most recent items. There was no interaction when concurrent load and suffix were combined, suggesting that deploying selective attention to ignore the distractor did not draw upon executive resources. A final experiment replicated the independent interfering effects of suffix and concurrent load while ruling out possible artifacts. We discuss the results in terms of a domain-general episodic buffer in which information is retained in a transient, limited capacity privileged state, influenced by both stimulus-driven and goal-directed processes. The privileged state contains the most recent environmental input together with goal-relevant representations being actively maintained using executive resources.
Stroop proactive control and task conflict are modulated by concurrent working memory load.
Kalanthroff, Eyal; Avnit, Amir; Henik, Avishai; Davelaar, Eddy J; Usher, Marius
2015-06-01
Performance on the Stroop task reflects two types of conflict-informational (between the incongruent word and font color) and task (between the contextually relevant color-naming task and the irrelevant, but automatic, word-reading task). According to the dual mechanisms of control theory (DMC; Braver, 2012), variability in Stroop performance can result from variability in the deployment of a proactive task-demand control mechanism. Previous research has shown that when proactive control (PC) is diminished, both increased Stroop interference and a reversed Stroop facilitation (RF) are observed. Although the current DMC model accounts for the former effect, it does not predict the observed RF, which is considered to be behavioral evidence for task conflict in the Stroop task. Here we expanded the DMC model to account for Stroop RF. Assuming that a concurrent working memory (WM) task reduces PC, we predicted both increased interference and an RF. Nineteen participants performed a standard Stroop task combined with a concurrent n-back task, which was aimed at reducing available WM resources, and thus overloading PC. Although the results indicated common Stroop interference and facilitation in the low-load condition (zero-back), in the high-load condition (two-back), both increased Stroop interference and RF were observed, consistent with the model's prediction. These findings indicate that PC is modulated by concurrent WM load and serves as a common control mechanism for both informational and task Stroop conflicts.
Requiem for a Data Base System.
1979-01-18
were defined -- - 2) the final syntax and semantics of QUEL were defined 3) protection was figured out 14) EQUEL was designed 5) concurrency control and...features which were not thought about in the initial design (such as concurrency control and recovery) and began worrying about distributed data...made in progress rather than on eventual corrections. Some attention is also given to the role of structured design in a data base system implementation
Concurrent design of an RTP chamber and advanced control system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Spence, P.; Schaper, C.; Kermani, A.
1995-12-31
A concurrent-engineering approach is applied to the development of an axisymmetric rapid-thermal-processing (RTP) reactor and its associated temperature controller. Using a detailed finite-element thermal model as a surrogate for actual hardware, the authors have developed and tested a multi-input multi-output (MIMO) controller. Closed-loop simulations are performed by linking the control algorithm with the finite-element code. Simulations show that good temperature uniformity is maintained on the wafer during both steady and transient conditions. A numerical study shows the effect of ramp rate, feedback gain, sensor placement, and wafer-emissivity patterns on system performance.
NASA Astrophysics Data System (ADS)
Pomares, Jorge; Felicetti, Leonard; Pérez, Javier; Emami, M. Reza
2018-02-01
An image-based servo controller for the guidance of a spacecraft during non-cooperative rendezvous is presented in this paper. The controller directly utilizes the visual features from image frames of a target spacecraft for computing both attitude and orbital maneuvers concurrently. The utilization of adaptive optics, such as zooming cameras, is also addressed through developing an invariant-image servo controller. The controller allows for performing rendezvous maneuvers independently from the adjustments of the camera focal length, improving the performance and versatility of maneuvers. The stability of the proposed control scheme is proven analytically in the invariant space, and its viability is explored through numerical simulations.
Nutation control during precession of a spin-stabilized spacecraft
NASA Technical Reports Server (NTRS)
1974-01-01
Precession maneuver control laws for single-spin spacecraft are investigated so that nutation is concurrently controlled. Analysis has led to the development of two types of control laws employing precession modulation for concurrent nutation control. Results were verified through digital simulation of a Synchronous Meteorological Satellite (SMS) configuration. An addition research effort was undertaken to investigate the cause and elimination of nutation anomalies in dual-spin spacecraft. A literature search was conducted and a dual-spin configuration was simulated to verify that nutational anomalies are not predicted by the existing nonlinear model. No conclusions were drawn as to the cause of the observed nutational anomalies in dual-spin spacecraft.
Concurrent planning and execution for a walking robot
NASA Astrophysics Data System (ADS)
Simmons, Reid
1990-07-01
The Planetary Rover project is developing the Ambler, a novel legged robot, and an autonomous software system for walking the Ambler over rough terrain. As part of the project, we have developed a system that integrates perception, planning, and real-time control to navigate a single leg of the robot through complex obstacle courses. The system is integrated using the Task Control Architecture (TCA), a general-purpose set of utilities for building and controlling distributed mobile robot systems. The walking system, as originally implemented, utilized a sequential sense-plan-act control cycle. This report describes efforts to improve the performance of the system by concurrently planning and executing steps. Concurrency was achieved by modifying the existing sequential system to utilize TCA features such as resource management, monitors, temporal constraints, and hierarchical task trees. Performance was increased in excess of 30 percent with only a relatively modest effort to convert and test the system. The results lend support to the utility of using TCA to develop complex mobile robot systems.
Sussman, Steve; McCuller, William J; Dent, Clyde W
2003-08-01
A 10-item self-report measure of social self-control was examined for its association with substance use, controlling for its associations with 12 personality disorder indices and 4 demographic variables among a sample of 1050 high-risk youth. Social self-control was found to be associated with 30-day cigarette smoking, alcohol use, marijuana use, and hard drug use, controlling for these other variables. The most consistent concurrent predictors of substance use were male gender, antisocial personality disorder, and social self-control. These results highlight the importance of social self-control as a unique concurrent predictor of substance use and suggest that social self-control skill training is relevant in substance abuse prevention programming.
ERIC Educational Resources Information Center
Muller, Ulrich; Liebermann-Finestone, Dana P.; Carpendale, Jeremy I. M.; Hammond, Stuart I.; Bibok, Maximilian B.
2012-01-01
This longitudinal study examined the concurrent and predictive relations between executive function (EF) and theory of mind (ToM) in 82 preschoolers who were assessed when they were 2, 3, and 4 years old. The results showed that the concurrent relation between EF and ToM, after controlling for age, verbal ability, and sex, was significant at 3 and…
The Application of Security Concepts to the Personnel Database for the Indonesian Navy.
1983-09-01
Postgraduate School, lionterey, California, June 1982. Since 1977, the Indonesian Navy Data Center (DISPULAHTAL) has collected and processed pa-sonnel data to...zel dlta Processing in the Indonesian Navy. 4 -a "o ’% ’." 5. ’S 1 1’S~. . . II. THE _IIIT_ IPR2ES1D PERSONSEL DATABASE SYSTEM The present Database...LEVEL *USER PROCESSING :CONCURRENT MULTI USER/LEVEL Ulf, U 3 , U 3 . . . users S. .. ...... secret C. .. ...... classified U .. .. ..... unclassified
2016-06-10
national objectives that will be pursued through the implementation of the NSS. It is now prudent to focus arguments on the NDS. Formulating the...interests through foreign policy development ) in the region and abroad. 83 The fundamental purpose of Botswana’s NSS is principally based on a...notion. This will also be shown in subsequent arguments when discussing the Foreign Policy; Formulation and Implementation Model . But it is equally
1983-01-01
changes. Concurrently, CIA formed and AD HOC esting to step back and look at the U.S. security Intelligence Community Working Group to re...administrative error; to prevent embarrassment to expected damage will be. If you foresee the dam- a person, organization, or agency; to restrain com- age...the decision will be to classify the informa- petition; or to pTevent or delay the public release of tion. But note that in this thought process, you
Goldmann, L.H.
1984-12-06
This is a claim for a dump assembly having a fixed conduit and a rotatable conduit provided with overlapping plates, respectively, at their adjacent ends. The plates are formed with openings, respectively, normally offset from each other to block flow. The other end of the rotatable conduit is provided with means for securing the open end of a filled container thereto. Rotation of the rotatable conduit raises and inverts the container to empty the contents while concurrently aligning the conduit openings to permit flow of material therethrough. 4 figs.
Pericardium Plug in the Repair of the Corneoscleral Fistula After Ahmed Glaucoma Valve Explantation
Yoo, Chungkwon; Kwon, Sung Wook
2008-01-01
We report four cases in which a pericardium (Tutoplast®) plug was used to repair a corneoscleral fistula after Ahmed Glaucoma Valve (AGV) explantation. In four cases in which the AGV tube had been exposed, AGV explantation was performed using a pericardium (Tutoplast®) plug to seal the defect previously occupied by the tube. After debridement of the fistula, a piece of processed pericardium (Tutoplast®), measured 1 mm in width, was plugged into the fistula and secured with two interrupted 10-0 nylon sutures. To control intraocular pressure, a new AGV was implanted elsewhere in case 1, phaco-trabeculectomy was performed concurrently in case 2, cyclophotocoagulation was performed postoperatively in case 3 and anti-glaucomatous medication was added in case 4. No complication related to the fistula developed at the latest follow-up (range: 12~26 months). The pericardium (Tutoplast®) plug seems to be an effective method in the repair of corneoscleral fistulas resulting from explantation of glaucoma drainage implants. PMID:19096247
Licata, Maria; Zietlow, Anna-Lena; Träuble, Birgit; Sodian, Beate; Reck, Corinna
High maternal emotional availability (EA) positively affects various domains of child development. However, the question of which factors promote or hinder maternal EA has not been investigated systematically. The present study investigated several maternal characteristics, namely maternal psychopathology, maternal attachment style insecurity, and theory of mind (ToM) as possible factors that influence maternal EA. The sample was comprised of 56 mothers and their preschool-aged children. Half of the mothers were diagnosed with postpartum depression and or anxiety disorders according to DSM-IV, and the other half were healthy controls. The results showed that both low maternal attachment style insecurity and high ToM skills significantly predicted maternal EA sensitivity, independently from maternal postpartum and concurrent psychopathology and education. Moreover, maternal attachment style insecurity fully mediated the link between maternal postpartum psychopathology and sensitivity. The findings suggest that maternal attachment style security can buffer negative effects of maternal psychopathology on maternal sensitivity in the mother-child interaction. © 2016 S. Karger AG, Basel.
Multiprocessor smalltalk: Implementation, performance, and analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pallas, J.I.
1990-01-01
Multiprocessor Smalltalk demonstrates the value of object-oriented programming on a multiprocessor. Its implementation and analysis shed light on three areas: concurrent programming in an object oriented language without special extensions, implementation techniques for adapting to multiprocessors, and performance factors in the resulting system. Adding parallelism to Smalltalk code is easy, because programs already use control abstractions like iterators. Smalltalk's basic control and concurrency primitives (lambda expressions, processes and semaphores) can be used to build parallel control abstractions, including parallel iterators, parallel objects, atomic objects, and futures. Language extensions for concurrency are not required. This implementation demonstrates that it is possiblemore » to build an efficient parallel object-oriented programming system and illustrates techniques for doing so. Three modification tools-serialization, replication, and reorganization-adapted the Berkeley Smalltalk interpreter to the Firefly multiprocessor. Multiprocessor Smalltalk's performance shows that the combination of multiprocessing and object-oriented programming can be effective: speedups (relative to the original serial version) exceed 2.0 for five processors on all the benchmarks; the median efficiency is 48%. Analysis shows both where performance is lost and how to improve and generalize the experimental results. Changes in the interpreter to support concurrency add at most 12% overhead; better access to per-process variables could eliminate much of that. Changes in the user code to express concurrency add as much as 70% overhead; this overhead could be reduced to 54% if blocks (lambda expressions) were reentrant. Performance is also lost when the program cannot keep all five processors busy.« less
Effects of concurrent and aerobic exercises on postexercise hypotension in elderly hypertensive men.
Ferrari, Rodrigo; Umpierre, Daniel; Vogel, Guilherme; Vieira, Paulo J C; Santos, Lucas P; de Mello, Renato Bandeira; Tanaka, Hirofumi; Fuchs, Sandra C
2017-11-01
Despite the fact that simultaneous performance of resistance and aerobic exercises (i.e., concurrent exercise) has become a standard exercise prescription for the elderly, no information is available on its effects on post-exercise hypotension (PEH) in elderly men with hypertension. To compare the effects of different types of exercise on PEH in elderly men with hypertension. Twenty elderly men with essential hypertension participated in three crossover interventions, in random order, and on separate days: a non-exercise control session at seated rest, aerobic exercise performed for 45min, and 45min of concurrent resistance and aerobic exercise consisted of 4 sets of 8 repetitions at 70% 1RM of resistance exercise followed by aerobic exercise on treadmill. After each session, blood pressure (BP) was measured continuously for 1h in the laboratory and for 24h under ambulatory conditions. During the first hour in laboratory, diastolic BP was lower after aerobic (-5mmHg) and concurrent exercise (-6mmHg) in comparison with Control. Day-time diastolic BP was significantly lower after aerobic exercise (-7mmHg) when compared to the control. No significant differences were found among the three experimental sessions for night-time and 24-hour diastolic BP, as well as day-time, night-time and 24-hour systolic BP. Concurrent exercise produced acute PEH similar to aerobic exercise but such effect did not last as long as aerobic exercise in elderly patients with essential hypertension. Copyright © 2017 Elsevier Inc. All rights reserved.
Ghosh, Saptarshi; Rao, Pamidimukkala Brahmananda; Kumar, P Ravindra; Manam, Surendra
2015-01-01
The organ preservation approach of choice for the treatment of locally advanced head and neck cancers is concurrent chemoradiation with three weekly high doses of cisplatin. Although this is an efficacious treatment policy, it has high acute systemic and mucosal toxicities, which lead to frequent treatment breaks and increased overall treatment time. Hence, the current study was undertaken to evaluate the efficacy of concurrent chemoradiation using 40 mg/m2 weekly cisplatin. This is a single institutional retrospective study including the data of 266 locally advanced head and neck cancer patients who were treated with concurrent chemoradiation using 40 mg/m2 weekly cisplatin from January 2012 to January 2014. A p-value of < 0.05 was taken to be significant statistically for all purposes in the study. The mean age of the study patients was 48.8 years. Some 36.1% of the patients had oral cavity primary tumors. The mean overall treatment time was 57.2 days. With a mean follow up of 15.2 months for all study patients and 17.5 months for survivors, 3 year local control, locoregional control and disease free survival were seen in 62.8%, 42.8% and 42.1% of the study patients. Primary tumor site, nodal stage of disease, AJCC stage of the disease and number of cycles of weekly cisplatin demonstrated statistically significant correlations with 3 year local control, locoregional control and disease free survival. Concurrent chemoradiotherapy with moderate dose weekly cisplatin is an efficacious treatment regime for locally advanced head and neck cancers with tolerable toxicity which can be used in developing countries with limited resources.
Skowron, Elizabeth A.; Cipriano-Essel, Elizabeth; Benjamin, Lorna Smith; Pincus, Aaron L.; Van Ryzin, Mark J.
2014-01-01
Concurrent and lagged maternal respiratory sinus arrhythmia (RSA) was monitored in the context of parenting. One hundred and forty-one preschooler-mother dyads—involved with child welfare as documented perpetrators of child abuse or neglect, or non-maltreating (non-CM)—were observed completing a resting baseline and joint challenge task. Parenting behaviors were coded using SASB (Benjamin, 1996) and maternal RSA was simultaneously monitored, longitudinally-nested within-person (WP), and subjected to MLM. Abusive and neglectful mothers displayed less positive parenting and more strict/hostile control, relative to non-CM mothers. Non-CM mothers displayed greater WP heterogeneity in variance over time in their RSA scores, and greater consistency over time in their parenting behaviors, relative to abusive or neglectful mothers. CM group also moderated concurrent and lagged WP associations in RSA and positive parenting. When abusive mothers displayed lower RSA in a given epoch, relative to their task average, they showed concurrent increases in positive parenting, and higher subsequent levels of hostile control in the following epoch, suggesting that it is physiologically taxing for abusive mothers to parent in positive ways. In contrast, lagged effects for non-CM mothers were observed in which RSA decreases led to subsequent WP increases in positive parenting and decreases in control. Reversed models were significant only for neglectful mothers: Increases in positive parenting led to subsequent increases in RSA levels, and increases in strict, hostile control led to subsequent RSA decreases. These results provide new evidence that concurrent and time-ordered coupling in maternal physiology and behavior during parenting vary in theoretically meaningful ways across CM and non-CM mothers. Implications for intervention and study limitations are discussed. PMID:24729945
NSTX-U Control System Upgrades
Erickson, K. G.; Gates, D. A.; Gerhardt, S. P.; ...
2014-06-01
The National Spherical Tokamak Experiment (NSTX) is undergoing a wealth of upgrades (NSTX-U). These upgrades, especially including an elongated pulse length, require broad changes to the control system that has served NSTX well. A new fiber serial Front Panel Data Port input and output (I/O) stream will supersede the aging copper parallel version. Driver support for the new I/O and cyber security concerns require updating the operating system from Redhat Enterprise Linux (RHEL) v4 to RedHawk (based on RHEL) v6. While the basic control system continues to use the General Atomics Plasma Control System (GA PCS), the effort to forwardmore » port the entire software package to run under 64-bit Linux instead of 32-bit Linux included PCS modifications subsequently shared with GA and other PCS users. Software updates focused on three key areas: (1) code modernization through coding standards (C99/C11), (2) code portability and maintainability through use of the GA PCS code generator, and (3) support of 64-bit platforms. Central to the control system upgrade is the use of a complete real time (RT) Linux platform provided by Concurrent Computer Corporation, consisting of a computer (iHawk), an operating system and drivers (RedHawk), and RT tools (NightStar). Strong vendor support coupled with an extensive RT toolset influenced this decision. The new real-time Linux platform, I/O, and software engineering will foster enhanced capability and performance for NSTX-U plasma control.« less
Concurrent partnerships and HIV: an inconvenient truth
2011-01-01
The strength of the evidence linking concurrency to HIV epidemic severity in southern and eastern Africa led the Joint United Nations Programme on HIV/AIDS and the Southern African Development Community in 2006 to conclude that high rates of concurrent sexual partnerships, combined with low rates of male circumcision and infrequent condom use, are major drivers of the AIDS epidemic in southern Africa. In a recent article in the Journal of the International AIDS Society, Larry Sawers and Eileen Stillwaggon attempt to challenge the evidence for the importance of concurrency and call for an end to research on the topic. However, their "systematic review of the evidence" is not an accurate summary of the research on concurrent partnerships and HIV, and it contains factual errors concerning the measurement and mathematical modelling of concurrency. Practical prevention-oriented research on concurrency is only just beginning. Most interventions to raise awareness about the risks of concurrency are less than two years old; few evaluations and no randomized-controlled trials of these programmes have been conducted. Determining whether these interventions can help people better assess their own risks and take steps to reduce them remains an important task for research. This kind of research is indeed the only way to obtain conclusive evidence on the role of concurrency, the programmes needed for effective prevention, the willingness of people to change behaviour, and the obstacles to change. PMID:21406080
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security Requirements § 1301.73 Physical security... adequate security for the area or building. If such security requires an alarm, such alarm, upon...
Beaton, Elliott A; Schmidt, Louis A; Ashbaugh, Andrea R; Santesso, Diane L; Antony, Martin M; McCabe, Randi E
2008-01-01
A number of studies have noted that the pattern of resting frontal brain electrical activity (EEG) is related to individual differences in affective style in healthy infants, children, and adults and some clinical populations when symptoms are reduced or in remission. We measured self-reported trait shyness and sociability, concurrent depressive mood, and frontal brain electrical activity (EEG) at rest and in anticipation of a speech task in a non-clinical sample of healthy young adults selected for high and low social anxiety. Although the patterns of resting and reactive frontal EEG asymmetry did not distinguish among individual differences in social anxiety, the pattern of resting frontal EEG asymmetry was related to trait shyness after controlling for concurrent depressive mood. Individuals who reported a higher degree of shyness were likely to exhibit greater relative right frontal EEG activity at rest. However, trait shyness was not related to frontal EEG asymmetry measured during the speech-preparation task, even after controlling for concurrent depressive mood. These findings replicate and extend prior work on resting frontal EEG asymmetry and individual differences in affective style in adults. Findings also highlight the importance of considering concurrent emotional states of participants when examining psychophysiological correlates of personality. PMID:18728822
Liu, Jason B; Berian, Julia R; Ban, Kristen A; Liu, Yaoming; Cohen, Mark E; Angelos, Peter; Matthews, Jeffrey B; Hoyt, David B; Hall, Bruce L; Ko, Clifford Y
2017-09-01
To determine whether concurrently performed operations are associated with an increased risk for adverse events. Concurrent operations occur when a surgeon is simultaneously responsible for critical portions of 2 or more operations. How this practice affects patient outcomes is unknown. Using American College of Surgeons' National Surgical Quality Improvement Program data from 2014 to 2015, operations were considered concurrent if they overlapped by ≥60 minutes or in their entirety. Propensity-score-matched cohorts were constructed to compare death or serious morbidity (DSM), unplanned reoperation, and unplanned readmission in concurrent versus non-concurrent operations. Multilevel hierarchical regression was used to account for the clustered nature of the data while controlling for procedure and case mix. There were 1430 (32.3%) surgeons from 390 (77.7%) hospitals who performed 12,010 (2.3%) concurrent operations. Plastic surgery (n = 393 [13.7%]), otolaryngology (n = 470 [11.2%]), and neurosurgery (n = 2067 [8.4%]) were specialties with the highest proportion of concurrent operations. Spine procedures were the most frequent concurrent procedures overall (n = 2059/12,010 [17.1%]). Unadjusted rates of DSM (9.0% vs 7.1%; P < 0.001), reoperation (3.6% vs 2.7%; P < 0.001), and readmission (6.9% vs 5.1%; P < 0.001) were greater in the concurrent operation cohort versus the non-concurrent. After propensity score matching and risk-adjustment, there was no significant association of concurrence with DSM (odds ratio [OR] 1.08; 95% confidence interval [CI] 0.96-1.21), reoperation (OR 1.16; 95% CI 0.96-1.40), or readmission (OR 1.14; 95% CI 0.99-1.29). In these analyses, concurrent operations were not detected to increase the risk for adverse outcomes. These results do not lessen the need for further studies, continuous self-regulation and proactive disclosure to patients.
Retrospective Cost Adaptive Control with Concurrent Closed-Loop Identification
NASA Astrophysics Data System (ADS)
Sobolic, Frantisek M.
Retrospective cost adaptive control (RCAC) is a discrete-time direct adaptive control algorithm for stabilization, command following, and disturbance rejection. RCAC is known to work on systems given minimal modeling information which is the leading numerator coefficient and any nonminimum-phase (NMP) zeros of the plant transfer function. This information is normally needed a priori and is key in the development of the filter, also known as the target model, within the retrospective performance variable. A novel approach to alleviate the need for prior modeling of both the leading coefficient of the plant transfer function as well as any NMP zeros is developed. The extension to the RCAC algorithm is the use of concurrent optimization of both the target model and the controller coefficients. Concurrent optimization of the target model and controller coefficients is a quadratic optimization problem in the target model and controller coefficients separately. However, this optimization problem is not convex as a joint function of both variables, and therefore nonconvex optimization methods are needed. Finally, insights within RCAC that include intercalated injection between the controller numerator and the denominator, unveil the workings of RCAC fitting a specific closed-loop transfer function to the target model. We exploit this interpretation by investigating several closed-loop identification architectures in order to extract this information for use in the target model.
Uneke, C J
2008-06-01
Malaria and typhoid fever still remain diseases of major public health importance in the tropics. Individuals in areas endemic for both the diseases are at substantial risk of contracting both these diseases, either concurrently or an acute infection superimposed on a chronic one. The objective of this report was to systematically review scientific data from studies conducted in the tropics on concurrent malaria and typhoid fever within the last two decades (1987-2007), to highlight the diagnostic challenges and the public health implications. Using the MedLine Entrez-PubMed search, relevant publications were identified for the review via the key words Malaria and Typhoid fever, which yielded 287 entries as of January 2008. Most of the studies reviewed expressed concern that poor diagnosis continues to hinder effective control of concurrent malaria and typhoid fever in the tropics due to: non-specific clinical presentation of the diseases; high prevalence of asymptomatic infections; lack of resources and insufficient access to trained health care providers and facilities; and widespread practice of self-treatment for clinically suspected malaria or typhoid fever. There were considerably higher rates of concurrent malaria and typhoid fever by Widal test compared to the bacteriological culture technique. Although culture technique remains the gold standard in typhoid fever diagnosis, Widal test is still of significant diagnostic value provided judicious interpretation of the test is made against a background of pertinent information. Malaria could be controlled through interventions to minimize human-vector contact, while improved personal hygiene, targeted vaccination campaigns and intensive community health education could help to control typhoid fever in the tropics.
Lotfi, Younes; Rezazadeh, Nima; Moossavi, Abdollah; Haghgoo, Hojjat Allah; Rostami, Reza; Bakhshi, Enayatollah; Badfar, Faride; Moghadam, Sedigheh Farokhi; Sadeghi-Firoozabadi, Vahid; Khodabandelou, Yousef
2017-12-01
Balance function has been reported to be worse in ADHD children than in their normal peers. The present study hypothesized that an improvement in balance could result in better cognitive performance in children with ADHD and concurrent vestibular impairment. This study was designed to evaluate the effects of comprehensive vestibular rehabilitation therapy on the cognitive performance of children with combined ADHD and concurrent vestibular impairment. Subject were 54 children with combined ADHD. Those with severe vestibular impairment (n=33) were randomly assigned to two groups that were matched for age. A rehabilitation program comprising overall balance and gate, postural stability, and eye movement exercises was assigned to the intervention group. Subjects in the control group received no intervention for the same time period. Intervention was administered twice weekly for 12 weeks. Choice reaction time (CRT) and spatial working memory (SWM) subtypes of the Cambridge Neuropsychological Test Automated Battery (CANTAB) were completed pre- and post-intervention to determine the effects of vestibular rehabilitation on the cognitive performance of the subjects with ADHD and concurrent vestibular impairment. ANCOVA was used to compare the test results of the intervention and control group post-test. The percentage of correct trial scores for the CRT achieved by the intervention group post-test increased significantly compared to those of the control group (p=0.029). The CRT mean latency scores were significantly prolonged in the intervention group following intervention (p=0.007) compared to the control group. No significant change was found in spatial functioning of the subjects with ADHD following 12 weeks of intervention (p>0.05). The study highlights the effect of vestibular rehabilitation on the cognitive performance of children with combined ADHD and concurrent vestibular disorder. The findings indicate that attention can be affected by early vestibular rehabilitation, which is a basic program for improving memory function in such children. Appropriate vestibular rehabilitation programs based on the type of vestibular impairment of children can improve their cognitive ability to some extent in children with ADHD and concurrent vestibular impairment (p>0.05). Copyright © 2017 Elsevier B.V. All rights reserved.
Energy drinks and alcohol-related risk among young adults.
Caviness, Celeste M; Anderson, Bradley J; Stein, Michael D
2017-01-01
Energy drink consumption, with or without concurrent alcohol use, is common among young adults. This study sought to clarify risk for negative alcohol outcomes related to the timing of energy drink use. The authors interviewed a community sample of 481 young adults, aged 18-25, who drank alcohol in the last month. Past-30-day energy drink use was operationalized as no-use, use without concurrent alcohol, and concurrent use of energy drinks with alcohol ("within a couple of hours"). Negative alcohol outcomes included past-30-day binge drinking, past-30-day alcohol use disorder, and drinking-related consequences. Just over half (50.5%) reported no use of energy drinks,18.3% reported using energy drinks without concurrent alcohol use, and 31.2% reported concurrent use of energy drinks and alcohol. Relative to those who reported concurrent use of energy drinks with alcohol, and controlling for background characteristics and frequency of alcohol consumption, those who didn't use energy drinks and those who used without concurrent alcohol use had significantly lower binge drinking, negative consequences, and rates of alcohol use disorder (P < .05 for all outcomes). There were no significant differences between the no-use and energy drink without concurrent alcohol groups on any alcohol-related measure (P > .10 for all outcomes). Concurrent energy drink and alcohol use is associated with increased risk for negative alcohol consequences in young adults. Clinicians providing care to young adults could consider asking patients about concurrent energy drink and alcohol use as a way to begin a conversation about risky alcohol consumption while addressing 2 substances commonly used by this population.
Lerner, Amy M; Eakin, Hallie
2011-01-01
The global food system is coming under increasing strain in the face of urban population growth. The recent spike in global food prices (2007–08) provoked consumer protests, and raised questions about food sovereignty and how and where food will be produced. Concurrently, for the first time in history the majority of the global population is urban, with the bulk of urban growth occurring in smaller-tiered cities and urban peripheries, or ‘peri-urban’ areas of the developing world. This paper discusses the new emerging spaces that incorporate a mosaic of urban and rural worlds, and reviews the implications of these spaces for livelihoods and food security. We propose a modified livelihoods framework to evaluate the contexts in which food production persists within broader processes of landscape and livelihood transformation in peri-urban locations. Where and how food production persists are central questions for the future of food security in an urbanising world. Our proposed framework provides directions for future research and highlights the role of policy and planning in reconciling food production with urban growth.
Susceptibility of South Korea to hydrologic extremes affecting the global food system
NASA Astrophysics Data System (ADS)
Puma, M. J.; Chon, S. Y.
2015-12-01
Food security in South Korea is closely linked to trade in the global food system. The country's production of major grains declined from 5.8 million metric tons (mmt) in 1998 to 4.8 mmt in 2014, which coincided with a shift in grain self sufficiency from 43% down to 24% over this same period. Many factors led to these changes, including reductions in domestic agricultural land, governmental policies supporting industry over agriculture, and a push towards trade liberalization. South Korea's self sufficiency is now one of the lowest among Organisation for Economic Co-operation and Development (OECD) countries, leaving it vulnerable to disruptions in the global food system. Here we explore this vulnerability by assessing how global trade disruptions would affect Korea's food security. We impose historical extreme drought and flood events that would possibly affect today's major food producing regions concurrently. Next we compute food supply deficits in South Korea that might result from these events. Our analyses provide a framework for formulating domestic food policies to enhance South Korea's food security in the increasingly fragile global food system.
NASA Astrophysics Data System (ADS)
Rohlfing, J.; Gardonio, P.
2014-02-01
This paper presents theoretical and experimental work on concurrent active noise and vibration control for a ventilation duct. The active noise control system is used to reduce the air-borne noise radiated via the duct outlet whereas the active vibration control system is used to both reduce the structure-borne noise radiated by the duct wall and to minimise the structural feed-through effect that reduces the effectiveness of the active noise control system. An elemental model based on structural mobility functions and acoustic impedance functions has been developed to investigate the principal effects and limitations of feed-forward active noise control and decentralised velocity feedback vibration control. The principal simulation results have been contrasted and validated with measurements taken on a laboratory duct set-up, equipped with an active noise control system and a decentralised vibration control system. Both simulations and experimental results show that the air-borne noise radiated from the duct outlet can be significantly attenuated using the feed-forward active noise control. In the presence of structure-borne noise the performance of the active noise control system is impaired by a structure-borne feed-through effect. Also the sound radiation from the duct wall is increased. In this case, if the active noise control is combined with a concurrent active vibration control system, the sound radiation by the duct outlet is further reduced and the sound radiation from the duct wall at low frequencies reduces noticeably.
Mahanaxar: quality of service guarantees in high-bandwidth, real-time streaming data storage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bigelow, David; Bent, John; Chen, Hsing-Bung
2010-04-05
Large radio telescopes, cyber-security systems monitoring real-time network traffic, and others have specialized data storage needs: guaranteed capture of an ultra-high-bandwidth data stream, retention of the data long enough to determine what is 'interesting,' retention of interesting data indefinitely, and concurrent read/write access to determine what data is interesting, without interrupting the ongoing capture of incoming data. Mahanaxar addresses this problem. Mahanaxar guarantees streaming real-time data capture at (nearly) the full rate of the raw device, allows concurrent read and write access to the device on a best-effort basis without interrupting the data capture, and retains data as long asmore » possible given the available storage. It has built in mechanisms for reliability and indexing, can scale to meet arbitrary bandwidth requirements, and handles both small and large data elements equally well. Results from our prototype implementation shows that Mahanaxar provides both better guarantees and better performance than traditional file systems.« less
Factors influencing warfarin control in Australia and Singapore.
Bernaitis, Nijole; Ching, Chi Keong; Teo, Siew Chong; Chen, Liping; Badrick, Tony; Davey, Andrew K; Crilly, Julia; Anoopkumar-Dukie, Shailendra
2017-09-01
Warfarin is widely used for patients with non-valvular atrial fibrillation (NVAF). Variations in warfarin control, as measured by time in therapeutic range (TTR), have been reported across different regions and ethnicities, particularly between Western and Asian countries. However, there is limited data on comparative factors influencing warfarin control in Caucasian and Asian patients. Therefore, the aim of this study was to determine warfarin control and potential factors influencing this in patients with NVAF in Australia and Singapore. Retrospective data was collected for patients receiving warfarin for January to June 2014 in Australia and Singapore. TTR was calculated for individuals with mean patient TTR used for analysis. Possible influential factors on TTR were analysed including age, gender, concurrent co-morbidities, and concurrent medication. The mean TTR was significantly higher in Australia (82%) than Singapore (58%). At both sites, chronic kidney disease significantly lowered this TTR. Further factors influencing control were anaemia and age<60years in Australia, and vascular disease, CHA 2 DS 2 -VASc score of 6, and concurrent platelet inhibitor therapy in Singapore. Warfarin control was significantly higher in Australia compared to Singapore, however chronic kidney disease reduced control at both sites. The different levels of control in these two countries, together with patient factors further reducing control may impact on anticoagulant choice in these countries with better outcomes from warfarin in Australia compared to Singapore. Copyright © 2017 Elsevier Ltd. All rights reserved.
Gender asymmetry in concurrent partnerships and HIV prevalence.
Leung, Ka Yin; Powers, Kimberly A; Kretzschmar, Mirjam
2017-06-01
The structure of the sexual network of a population plays an essential role in the transmission of HIV. Concurrent partnerships, i.e. partnerships that overlap in time, are important in determining this network structure. Men and women may differ in their concurrent behavior, e.g. in the case of polygyny where women are monogamous while men may have concurrent partnerships. Polygyny has been shown empirically to be negatively associated with HIV prevalence, but the epidemiological impacts of other forms of gender-asymmetric concurrency have not been formally explored. Here we investigate how gender asymmetry in concurrency, including polygyny, can affect the disease dynamics. We use a model for a dynamic network where individuals may have concurrent partners. The maximum possible number of simultaneous partnerships can differ for men and women, e.g. in the case of polygyny. We control for mean partnership duration, mean lifetime number of partners, mean degree, and sexually active lifespan. We assess the effects of gender asymmetry in concurrency on two epidemic phase quantities (R 0 and the contribution of the acute HIV stage to R 0 ) and on the endemic HIV prevalence. We find that gender asymmetry in concurrent partnerships is associated with lower levels of all three epidemiological quantities, especially in the polygynous case. This effect on disease transmission can be attributed to changes in network structure, where increasing asymmetry leads to decreasing network connectivity. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.
Flame Spread and Extinction Over a Thick Solid Fuel in Low-Velocity Opposed and Concurrent Flows
NASA Astrophysics Data System (ADS)
Zhu, Feng; Lu, Zhanbin; Wang, Shuangfeng
2016-05-01
Flame spread and extinction phenomena over a thick PMMA in purely opposed and concurrent flows are investigated by conducting systematical experiments in a narrow channel apparatus. The present tests focus on low-velocity flow regime and hence complement experimental data previously reported for high and moderate velocity regimes. In the flow velocity range tested, the opposed flame is found to spread much faster than the concurrent flame at a given flow velocity. The measured spread rates for opposed and concurrent flames can be correlated by corresponding theoretical models of flame spread, indicating that existing models capture the main mechanisms controlling the flame spread. In low-velocity gas flows, however, the experimental results are observed to deviate from theoretical predictions. This may be attributed to the neglect of radiative heat loss in the theoretical models, whereas radiation becomes important for low-intensity flame spread. Flammability limits using oxygen concentration and flow velocity as coordinates are presented for both opposed and concurrent flame spread configurations. It is found that concurrent spread has a wider flammable range than opposed case. Beyond the flammability boundary of opposed spread, there is an additional flammable area for concurrent spread, where the spreading flame is sustainable in concurrent mode only. The lowest oxygen concentration allowing concurrent flame spread in forced flow is estimated to be approximately 14 % O2, substantially below that for opposed spread (18.5 % O2).
Infection with parasitic nematodes confounds vaccination efficacy
Urban, Joseph F.; Steenhard, Nina R.; Solano-Aguilar, Gloria I.; Dawson, Harry D.; Iweala, Onyinye I.; Nagler, Cathryn R.; Noland, Gregory S.; Kumar, Nirbhay; Anthony, Robert M.; Shea-Donohue, Terez; Weinstock, Joel; Gause, William C.
2007-01-01
T helper (Th) cells produce signature cytokine patterns, induced largely by intracellular versus extracellular pathogens that provide the cellular and molecular basis for counter regulatory expression of protective immunity during concurrent infections. The production of IL-12 and IFN-γ, for example, resulting from exposure to many bacterial, viral, and protozoan pathogens is responsible for Th1-derived protective responses that also can inhibit development of Th2-cells expressing IL-4-dependent immunity to extracellular helminth parasites and vice versa. In a similar manner, concurrent helminth infection alters optimal vaccine-induced responses in humans and livestock; however, the consequences of this condition have not been adequately studied especially in the context of a challenge infection following vaccination. Demands for new and effective vaccines to control chronic and emerging diseases, and the need for rapid deployment of vaccines for bio security concerns requires a systematic evaluation of confounding factors that limit vaccine efficacy. One common albeit overlooked confounder is the presence of gastrointestinal nematode parasites in populations of humans and livestock targeted for vaccination. This is particularly important in areas of the world were helminth infections are prevalent, but the interplay between parasites and emerging diseases that can be transmitted worldwide make this a global issue. In addition, it is not clear if the epidemic in allergic disease in industrialized countries substitutes for geohelminth infection to interfere with effective vaccination regimens. This presentation will focus on recent vaccination studies in mice experimentally infected with Heligmosomoides polygyrus to model the condition of gastrointestinal parasite infestation in mammalian populations targeted for vaccination. In addition, a large animal vaccination and challenge model against Mycoplasma hyopneumonia in swine exposed to Ascaris suum will provide a specific example of the need for further work in this area, and for controlled field studies to assess the impact of other similar scenarios. PMID:17587500
Hess, Rebecka S; Kass, Philip H; Van Winkle, Thomas J
2003-01-01
The objective of this study was to determine whether dogs with atherosclerosis are more likely to have concurrent diabetes mellitus, hypothyroidism, or hyperadrenocorticism than dogs that do not have atherosclerosis. A retrospective mortality prevalence case-control study was performed. The study group included 30 dogs with histopathological evidence of atherosclerosis. The control group included 142 dogs with results of a complete postmortem examination, a final postmortem examination diagnosis of neoplasia, and no histopathological evidence of atherosclerosis. Control dogs were frequency matched for age and year in which the postmortem examination was performed. Proportionate changes in the prevalence of diabetes mellitus, hypothyroidism, and hyperadrenocorticism were calculated by exact prevalence odds ratios (POR), 95% confidence intervals (95% CI), and P values. Multiple logistic regression analysis was used to examine the combined effects of prevalence determinants while controlling for age and year of postmortem examination. Dogs with atherosclerosis were over 53 times more likely to have concurrent diabetes mellitus than dogs without atherosclerosis (POR = 53.6; 95% CI, 4.6-627.5; P = .002) and over 51 times more likely to have concurrent hypothyroidism than dogs without atherosclerosis (POR = 51.1; 95% CI, 14.5-180.1; P < .001). Dogs with atherosclerosis were not found to be more likely to have concurrent hyperadrenocorticism than dogs that did not have atherosclerosis (POR = 1.8; 95% CI, 0.2-17.6; P = .59). Diabetes mellitus and hypothyroidism, but not hyperadrenocorticism, are more prevalent in dogs with atherosclerosis compared to dogs without atherosclerosis on postmortem examination.
Cong, Minghua; Song, Chenxin; Zou, Baohua; Deng, Yingbing; Li, Shuluan; Liu, Xuehui; Liu, Weiwei; Liu, Jinying; Yu, Lei; Xu, Binghe
2015-03-17
To explore the effects of glutamine, eicosapntemacnioc acid (EPA) and branched-chain amino acids supplements in esophageal cancer patients on concurrent chemoradiotherapy and gastric cancer patients on chemotherapy. From April 2013 to April 2014, a total of 104 esophageal and gastric carcinoma patients on chemotherapy or concurrent chemoradiotherapy were recruited and randomly divided into experimental and control groups. Both groups received dietary counseling and routine nutritional supports while only experimental group received supplements of glutamine (20 g/d), EPA (3.3 g/d) and branched-chain amino acids (8 g/d). And body compositions, blood indicators, incidence of complications and completion rates of therapy were compared between two groups. After treatment, free fat mass and muscle weight increased significantly in experiment group while decreased in control group (P < 0.05). And albumin, red blood cell count, white blood cell count and blood platelet count remained stable in experiment group while declined significantly in control group. During treatment, compared to control group, the incidences of infection-associated complication were lower (6% vs 19%, P < 0.05) and the completion rates of therapy were significantly higher in experiment group (96% vs 83%, P < 0.05). Supplements of glutamine, EPA and branched-chain amino acids can help maintain nutrition status, decrease the complications and improve compliance for esophageal cancer patients on concurrent chemo-radiotherapy and gastric cancer patients on postoperative adjuvant chemotherapy.
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
Chen, Allen M; Farwell, D Gregory; Lau, Derick H; Li, Bao-Qing; Luu, Quang; Donald, Paul J
2011-10-01
To determine how the addition of cisplatin-based concurrent chemotherapy to radiation therapy influences outcomes among a cohort of patients treated for head-and-neck cancer of unknown primary origin. The medical records of 60 consecutive patients treated by radiation therapy for squamous cell carcinoma of the head and neck presenting as cervical lymph node metastasis of occult primary origin were reviewed. Thirty-two patients (53%) were treated by concurrent chemoradiation, and 28 patients (47%) were treated by radiation therapy alone. Forty-five patients (75%) received radiation therapy after surgical resection, and 15 patients (25%) received primary radiation therapy. Thirty-five patients (58%) were treated by intensity-modulated radiotherapy. The 2-year estimates of overall survival, local-regional control, and progression-free survival were 89%, 89%, and 79%, respectively, among patients treated by chemoradiation, compared to 90%, 92%, and 83%, respectively, among patients treated by radiation therapy alone (p > 0.05, for all). Exploratory analysis failed to identify any subset of patients who benefited from the addition of concurrent chemotherapy to radiation therapy. The use of concurrent chemotherapy was associated with a significantly increased incidence of Grade 3+ acute and late toxicity (p < 0.001, for both). Concurrent chemoradiation is associated with significant toxicity without a clear advantage to overall survival, local-regional control, and progression-free survival in the treatment of head-and-neck cancer of unknown primary origin. Although selection bias cannot be ignored, prospective data are needed to further address this question. Copyright © 2011 Elsevier Inc. All rights reserved.
Adaptive adjustment of the randomization ratio using historical control data
Hobbs, Brian P.; Carlin, Bradley P.; Sargent, Daniel J.
2013-01-01
Background Prospective trial design often occurs in the presence of “acceptable” [1] historical control data. Typically this data is only utilized for treatment comparison in a posteriori retrospective analysis to estimate population-averaged effects in a random-effects meta-analysis. Purpose We propose and investigate an adaptive trial design in the context of an actual randomized controlled colorectal cancer trial. This trial, originally reported by Goldberg et al. [2], succeeded a similar trial reported by Saltz et al. [3], and used a control therapy identical to that tested (and found beneficial) in the Saltz trial. Methods The proposed trial implements an adaptive randomization procedure for allocating patients aimed at balancing total information (concurrent and historical) among the study arms. This is accomplished by assigning more patients to receive the novel therapy in the absence of strong evidence for heterogeneity among the concurrent and historical controls. Allocation probabilities adapt as a function of the effective historical sample size (EHSS) characterizing relative informativeness defined in the context of a piecewise exponential model for evaluating time to disease progression. Commensurate priors [4] are utilized to assess historical and concurrent heterogeneity at interim analyses and to borrow strength from the historical data in the final analysis. The adaptive trial’s frequentist properties are simulated using the actual patient-level historical control data from the Saltz trial and the actual enrollment dates for patients enrolled into the Goldberg trial. Results Assessing concurrent and historical heterogeneity at interim analyses and balancing total information with the adaptive randomization procedure leads to trials that on average assign more new patients to the novel treatment when the historical controls are unbiased or slightly biased compared to the concurrent controls. Large magnitudes of bias lead to approximately equal allocation of patients among the treatment arms. Using the proposed commensurate prior model to borrow strength from the historical data, after balancing total information with the adaptive randomization procedure, provides admissible estimators of the novel treatment effect with desirable bias-variance trade-offs. Limitations Adaptive randomization methods in general are sensitive to population drift and more suitable for trials that initiate with gradual enrollment. Balancing information among study arms in time-to-event analyses is difficult in the presence of informative right-censoring. Conclusions The proposed design could prove important in trials that follow recent evaluations of a control therapy. Efficient use of the historical controls is especially important in contexts where reliance on pre-existing information is unavoidable because the control therapy is exceptionally hazardous, expensive, or the disease is rare. PMID:23690095
Adaptive adjustment of the randomization ratio using historical control data.
Hobbs, Brian P; Carlin, Bradley P; Sargent, Daniel J
2013-01-01
Prospective trial design often occurs in the presence of 'acceptable' historical control data. Typically, these data are only utilized for treatment comparison in a posteriori retrospective analysis to estimate population-averaged effects in a random-effects meta-analysis. We propose and investigate an adaptive trial design in the context of an actual randomized controlled colorectal cancer trial. This trial, originally reported by Goldberg et al., succeeded a similar trial reported by Saltz et al., and used a control therapy identical to that tested (and found beneficial) in the Saltz trial. The proposed trial implements an adaptive randomization procedure for allocating patients aimed at balancing total information (concurrent and historical) among the study arms. This is accomplished by assigning more patients to receive the novel therapy in the absence of strong evidence for heterogeneity among the concurrent and historical controls. Allocation probabilities adapt as a function of the effective historical sample size (EHSS), characterizing relative informativeness defined in the context of a piecewise exponential model for evaluating time to disease progression. Commensurate priors are utilized to assess historical and concurrent heterogeneity at interim analyses and to borrow strength from the historical data in the final analysis. The adaptive trial's frequentist properties are simulated using the actual patient-level historical control data from the Saltz trial and the actual enrollment dates for patients enrolled into the Goldberg trial. Assessing concurrent and historical heterogeneity at interim analyses and balancing total information with the adaptive randomization procedure lead to trials that on average assign more new patients to the novel treatment when the historical controls are unbiased or slightly biased compared to the concurrent controls. Large magnitudes of bias lead to approximately equal allocation of patients among the treatment arms. Using the proposed commensurate prior model to borrow strength from the historical data, after balancing total information with the adaptive randomization procedure, provides admissible estimators of the novel treatment effect with desirable bias-variance trade-offs. Adaptive randomization methods in general are sensitive to population drift and more suitable for trials that initiate with gradual enrollment. Balancing information among study arms in time-to-event analyses is difficult in the presence of informative right-censoring. The proposed design could prove important in trials that follow recent evaluations of a control therapy. Efficient use of the historical controls is especially important in contexts where reliance on preexisting information is unavoidable because the control therapy is exceptionally hazardous, expensive, or the disease is rare.
High-capacity quantum key distribution via hyperentangled degrees of freedom
NASA Astrophysics Data System (ADS)
Simon, David S.; Sergienko, Alexander V.
2014-06-01
Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical.
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-01-01
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller. PMID:28430155
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-04-21
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.
ERIC Educational Resources Information Center
Weatherly, Jeffrey N.; Thompson, Bradley J.; Hodny, Marisa; Meier, Ellen
2009-01-01
In a simulated casino environment, 6 nonpathological women played concurrently available commercial slot machines programmed to pay out at different rates. Participants did not always demonstrate preferences for the higher paying machine. The data suggest that factors other than programmed or obtained rate of reinforcement may control gambling…
ERIC Educational Resources Information Center
DeLisi, Matt; Walters, Glenn D.
2011-01-01
Prisonization (as measured by number of prior incarcerations) and concurrent instrumental offending (as measured by contemporaneous kidnapping, rape, robbery, and burglary offenses) were found to interact in 160 multiple-homicide offenders and 494 single-homicide offenders. Controlling for age, gender, race, criminal history, prior incarcerations,…
Edmonds, M D; Vatta, A F; Marchiondo, A A; Vanimisetti, H B; Edmonds, J D
2018-03-15
In 2013, a 118-day study was initiated to investigate the efficacy of concurrent treatment at pasture turnout with an injectable macrocyclic lactone with activity up to 28 days and an oral benzimidazole, referred to as "conventional" anthelmintics, when compared to treatment with conventional macrocyclic lactone alone or an injectable macrocyclic lactone with extended activity of 100 days or longer. A group of 210 steers were obtained from a ranch in California and transported to Idaho, USA. A total of 176 steers with the highest fecal egg counts were blocked by pre-treatment body weights and pasture location. A total of 44 pasture paddocks were assigned with 4 steers per paddock with 12 paddocks per therapeutic treatment group and 8 paddocks per controls. The four treatments were injectable doramectin (Dectomax ® , Zoetis Inc., 0.2 mg kg -1 BW, SC), injectable doramectin concurrently with oral albendazole (Valbazen ® , Zoetis Inc., 10 mg kg -1 BW, PO), extended release injectable eprinomectin (LongRange™, Merial Limited, 1 mg kg -1 BW, SC) or saline. Cattle were individually weighed and sampled for fecal egg count on Days 0, 31/32, 61, 88, and 117/118 with an additional fecal sample on Day 14. At conclusion, one steer per paddock was euthanized for nematode recovery. The results from the first 32 days found evidence of macrocyclic lactone resistance against injectable doramectin and extended release eprinomectin. During this period the concurrent therapy provided nearly 100% efficacy based on fecal egg count reduction and a 19.98% improvement in total weight gain compared to controls (P = 0.039). At the conclusion of the 118-day study and past the approved efficacy for the conventional anthelmintics, the concurrent therapy with conventional anthelmintics provided a 22.98% improvement in total weight gain compared to controls (P = 0.004). The 118-day improvement in weight gain for the extended release eprinomectin group (29.06% compared to control) was not statistically different from the concurrent therapy with conventional anthelmintics. The results indicate that concurrent treatment with a conventional macrocyclic lactone and benzimidazole may provide production benefits early in the grazing period that continue throughout the entire period for cattle harboring macrocyclic lactone resistant nematodes. By using two different anthelmintic classes together, macrocyclic lactone resistant parasites were effectively controlled early in the period. Furthermore, the use of an effective conventional anthelmintic treatment regimen without an extended period of drug release may help to promote refugia and decrease the further selection for anthelmintic resistant parasites. Copyright © 2018 Elsevier B.V. All rights reserved.
Multidisciplinary Concurrent Design Optimization via the Internet
NASA Technical Reports Server (NTRS)
Woodard, Stanley E.; Kelkar, Atul G.; Koganti, Gopichand
2001-01-01
A methodology is presented which uses commercial design and analysis software and the Internet to perform concurrent multidisciplinary optimization. The methodology provides a means to develop multidisciplinary designs without requiring that all software be accessible from the same local network. The procedures are amenable to design and development teams whose members, expertise and respective software are not geographically located together. This methodology facilitates multidisciplinary teams working concurrently on a design problem of common interest. Partition of design software to different machines allows each constituent software to be used on the machine that provides the most economy and efficiency. The methodology is demonstrated on the concurrent design of a spacecraft structure and attitude control system. Results are compared to those derived from performing the design with an autonomous FORTRAN program.
Recovering from conflict in romantic relationships: a developmental perspective.
Salvatore, Jessica E; Kuo, Sally I-Chun; Steele, Ryan D; Simpson, Jeffry A; Collins, W Andrew
2011-03-01
This study adopted a developmental perspective on recovery from conflict in romantic relationships. Participants were 73 young adults (target participants), studied since birth, and their romantic partners. A novel observational coding scheme was used to evaluate each participant's degree of conflict recovery, operationalized as the extent to which the participant disengaged from conflict during a 4-min "cool-down" task immediately following a 10-min conflict discussion. Conflict recovery was systematically associated with developmental and dyadic processes. Targets who were rated as securely attached more times in infancy recovered from conflict better, as did their romantic partners. Concurrently, having a romantic partner who displayed better recovery predicted more positive relationship emotions and greater relationship satisfaction. Prospectively, target participants' early attachment security and their partners' degree of conflict recovery interacted to predict relationship stability 2 years later, such that having a partner who recovered from conflict better buffered targets with insecure histories.
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
Lee, O-Sung; Ahn, Soyeon; Ahn, Jin Hwan; Teo, Seow Hui; Lee, Yong Seuk
2018-02-01
The purpose of this systematic review and meta-analysis was to evaluate the efficacy of concurrent cartilage procedures during high tibial osteotomy (HTO) for medial compartment osteoarthritis (OA) by comparing the outcomes of studies that directly compared the use of HTO plus concurrent cartilage procedures versus HTO alone. Results that are possible to be compared in more than two articles were presented as forest plots. A 95% confidence interval was calculated for each effect size, and we calculated the I 2 statistic, which presents the percentage of total variation attributable to the heterogeneity among studies. The random effects model was used to calculate the effect size. Seven articles were included to the final analysis. Case groups were composed of HTO without concurrent procedures and control groups were composed of HTO with concurrent procedures such as marrow stimulation procedure, mesenchymal stem cell transplantation, and injection. The case group showed a higher hospital for special surgery score and mean difference was 4.10 [I 2 80.8%, 95% confidence interval (CI) - 9.02 to 4.82]. Mean difference of the mechanical femorotibial angle in five studies was 0.08° (I 2 0%, 95% CI - 0.26 to 0.43). However, improved arthroscopic, histologic, and MRI results were reported in the control group. Our analysis support that concurrent procedures during HTO for medial compartment OA have little beneficial effect regarding clinical and radiological outcomes. However, they might have some beneficial effects in terms of arthroscopic, histologic, and MRI findings even though the quality of healed cartilage is not good as that of original cartilage. Therefore, until now, concurrent procedures for medial compartment OA have been considered optional. Nevertheless, no conclusions can be drawn for younger patients with focal cartilage defects and concomitant varus deformity. This question needs to be addressed separately.
ERIC Educational Resources Information Center
Ta, Wei-Min; Pitts, Raymond C.; Hughes, Christine E.; McLean, Anthony P.; Grace, Randolph C.
2008-01-01
The purpose of this study was to examine effects of "d"-amphetamine on choice controlled by reinforcement delay. Eight pigeons responded under a concurrent-chains procedure in which one terminal-link schedule was always fixed- interval 8 s, and the other terminal-link schedule changed from session to session between fixed-interval 4 s and…
Preference as a Function of Active Interresponse Times: A Test of the Active Time Model
ERIC Educational Resources Information Center
Misak, Paul; Cleaveland, J. Mark
2011-01-01
In this article, we describe a test of the active time model for concurrent variable interval (VI) choice. The active time model (ATM) suggests that the time since the most recent response is one of the variables controlling choice in concurrent VI VI schedules of reinforcement. In our experiment, pigeons were trained in a multiple concurrent…
Analyzing Cases of Resilience Success and Failure - A Research Study
2012-12-01
controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring
Winter, Randolph L; Budke, Christine M
2017-08-15
OBJECTIVE To assess signalment and concurrent disease processes in dogs with aortic thrombotic disease (ATD). DESIGN Retrospective case-control study. ANIMALS Dogs examined at North American veterinary teaching hospitals from 1985 through 2011 with medical records submitted to the Veterinary Medical Database. PROCEDURES Medical records were reviewed to identify dogs with a diagnosis of ATD (case dogs). Five control dogs without a diagnosis of ATD were then identified for every case dog. Data were collected regarding dog age, sex, breed, body weight, and concurrent disease processes. RESULTS ATD was diagnosed in 291 of the 984,973 (0.03%) dogs included in the database. The odds of a dog having ATD did not differ significantly by sex, age, or body weight. Compared with mixed-breed dogs, Shetland Sheepdogs had a significantly higher odds of ATD (OR, 2.59). Protein-losing nephropathy (64/291 [22%]) was the most commonly recorded concurrent disease in dogs with ATD. CONCLUSIONS AND CLINICAL RELEVANCE Dogs with ATD did not differ significantly from dogs without ATD in most signalment variables. Contrary to previous reports, cardiac disease was not a common concurrent diagnosis in dogs with ATD.
Interaction of attentional and motor control processes in handwriting.
Brown, T L; Donnenwirth, E E
1990-01-01
The interaction between attentional capacity, motor control processes, and strategic adaptations to changing task demands was investigated in handwriting, a continuous (rather than discrete) skilled performance. Twenty-four subjects completed 12 two-minute handwriting samples under instructions stressing speeded handwriting, normal handwriting, or highly legible handwriting. For half of the writing samples, a concurrent auditory monitoring task was imposed. Subjects copied either familiar (English) or unfamiliar (Latin) passages. Writing speed, legibility ratings, errors in writing and in the secondary auditory task, and a derived measure of the average number of characters held in short-term memory during each sample ("planning unit size") were the dependent variables. The results indicated that the ability to adapt to instructions stressing speed or legibility was substantially constrained by the concurrent listening task and by text familiarity. Interactions between instructions, task concurrence, and text familiarity in the legibility ratings, combined with further analyses of planning unit size, indicated that information throughput from temporary storage mechanisms to motor processes mediated the loss of flexibility effect. Overall, the results suggest that strategic adaptations of a skilled performance to changing task circumstances are sensitive to concurrent attentional demands and that departures from "normal" or "modal" performance require attention.
Bastien, Maude; Moffet, Hélène; Bouyer, Laurent; Perron, Marc; Hébert, Luc J; Leblond, Jean
2014-02-01
The Star Excursion Balance Test (SEBT) has frequently been used to measure motor control and residual functional deficits at different stages of recovery from lateral ankle sprain (LAS) in various populations. However, the validity of the measure used to characterize performance--the maximal reach distance (MRD) measured by visual estimation--is still unknown. To evaluate the concurrent validity of the MRD in the SEBT estimated visually vs the MRD measured with a 3D motion-capture system and evaluate and compare the discriminant validity of 2 MRD-normalization methods (by height or by lower-limb length) in participants with or without LAS (n = 10 per group). There is a high concurrent validity and a good degree of accuracy between the visual estimation measurement and the MRD gold-standard measurement for both groups and under all conditions. The Cohen d ratios between groups and MANOVA products were higher when computed from MRD data normalized by height. The results support the concurrent validity of visual estimation of the MRD and the use of the SEBT to evaluate motor control. Moreover, normalization of MRD data by height appears to increase the discriminant validity of this test.
Magoon, Michael A; Critchfield, Thomas S
2008-01-01
Considerable evidence from outside of operant psychology suggests that aversive events exert greater influence over behavior than equal-sized positive-reinforcement events. Operant theory is largely moot on this point, and most operant research is uninformative because of a scaling problem that prevents aversive events and those based on positive reinforcement from being directly compared. In the present investigation, humans' mouse-click responses were maintained on similarly structured, concurrent schedules of positive (money gain) and negative (avoidance of money loss) reinforcement. Because gains and losses were of equal magnitude, according to the analytical conventions of the generalized matching law, bias (log b ≠ 0) would indicate differential impact by one type of consequence; however, no systematic bias was observed. Further research is needed to reconcile this outcome with apparently robust findings in other literatures of superior behavior control by aversive events. In an incidental finding, the linear function relating log behavior ratio and log reinforcement ratio was steeper for concurrent negative and positive reinforcement than for control conditions involving concurrent positive reinforcement. This may represent the first empirical confirmation of a free-operant differential-outcomes effect predicted by contingency-discriminability theories of choice. PMID:18683609
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Allen M., E-mail: allen.chen@ucdmc.ucdavis.edu; Farwell, D. Gregory; Lau, Derick H.
2011-10-01
Purpose: To determine how the addition of cisplatin-based concurrent chemotherapy to radiation therapy influences outcomes among a cohort of patients treated for head-and-neck cancer of unknown primary origin. Methods and Materials: The medical records of 60 consecutive patients treated by radiation therapy for squamous cell carcinoma of the head and neck presenting as cervical lymph node metastasis of occult primary origin were reviewed. Thirty-two patients (53%) were treated by concurrent chemoradiation, and 28 patients (47%) were treated by radiation therapy alone. Forty-five patients (75%) received radiation therapy after surgical resection, and 15 patients (25%) received primary radiation therapy. Thirty-five patientsmore » (58%) were treated by intensity-modulated radiotherapy. Results: The 2-year estimates of overall survival, local-regional control, and progression-free survival were 89%, 89%, and 79%, respectively, among patients treated by chemoradiation, compared to 90%, 92%, and 83%, respectively, among patients treated by radiation therapy alone (p > 0.05, for all). Exploratory analysis failed to identify any subset of patients who benefited from the addition of concurrent chemotherapy to radiation therapy. The use of concurrent chemotherapy was associated with a significantly increased incidence of Grade 3+ acute and late toxicity (p < 0.001, for both). Conclusions: Concurrent chemoradiation is associated with significant toxicity without a clear advantage to overall survival, local-regional control, and progression-free survival in the treatment of head-and-neck cancer of unknown primary origin. Although selection bias cannot be ignored, prospective data are needed to further address this question.« less
Generalized concurrence in boson sampling.
Chin, Seungbeom; Huh, Joonsuk
2018-04-17
A fundamental question in linear optical quantum computing is to understand the origin of the quantum supremacy in the physical system. It is found that the multimode linear optical transition amplitudes are calculated through the permanents of transition operator matrices, which is a hard problem for classical simulations (boson sampling problem). We can understand this problem by considering a quantum measure that directly determines the runtime for computing the transition amplitudes. In this paper, we suggest a quantum measure named "Fock state concurrence sum" C S , which is the summation over all the members of "the generalized Fock state concurrence" (a measure analogous to the generalized concurrences of entanglement and coherence). By introducing generalized algorithms for computing the transition amplitudes of the Fock state boson sampling with an arbitrary number of photons per mode, we show that the minimal classical runtime for all the known algorithms directly depends on C S . Therefore, we can state that the Fock state concurrence sum C S behaves as a collective measure that controls the computational complexity of Fock state BS. We expect that our observation on the role of the Fock state concurrence in the generalized algorithm for permanents would provide a unified viewpoint to interpret the quantum computing power of linear optics.
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
32 CFR 2800.4 - General information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... STATES SECURITY PROCEDURES § 2800.4 General information. (a) Staff Security Officer/Top Secret Control... Staff Security Officer will serve as Top Secret Control Officer and Assistant Top Secret Control Officer... responsible for the overall supervision of the Top Secret Control program. They will maintain positive control...
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.
2015-01-01
NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.
Reversal of the toxic effects of cachectin by concurrent insulin administration.
Fraker, D L; Merino, M J; Norton, J A
1989-06-01
Rats treated with recombinant human tumor necrosis factor-cachectin, 100 micrograms/kg ip twice daily for 5 consecutive days, had a 56% decrease in food intake, a 54% decrease in nitrogen balance, and a 23-g decrease in body weight gain vs. saline-treated controls. Concurrent neutral protamine hagedorn insulin administration of 2 U/100 g sc twice daily reversed all of these changes to control levels without causing any treatment deaths. The improvement seen with insulin was dose independent. Five days of cachectin treatment caused a severe interstitial pneumonitis, periportal inflammation in the liver, and an increase in wet organ weight in the heart, lungs, kidney, and spleen. Concurrent insulin treatment led to near total reversal of these histopathologic changes. Cachectin treatment did not significantly change blood glucose levels from control values of 130-140 mg/dl, but insulin plus cachectin caused a significant decrease in blood glucose from 1 through 12 h after injection. Administration of high-dose insulin can near totally reverse the nutritional and histopathologic toxicity of sublethal doses of cachectin in rats.
A method of evaluating efficiency during space-suited work in a neutral buoyancy environment
NASA Technical Reports Server (NTRS)
Greenisen, Michael C.; West, Phillip; Newton, Frederick K.; Gilbert, John H.; Squires, William G.
1991-01-01
The purpose was to investigate efficiency as related to the work transmission and the metabolic cost of various extravehicular activity (EVA) tasks during simulated microgravity (whole body water immersion) using three space suits. Two new prototype space station suits, AX-5 and MKIII, are pressurized at 57.2 kPa and were tested concurrently with the operationally used 29.6 kPa shuttle suit. Four male astronauts were asked to perform a fatigue trial on four upper extremity exercises during which metabolic rate and work output were measured and efficiency was calculated in each suit. The activities were selected to simulate actual EVA tasks. The test article was an underwater dynamometry system to which the astronauts were secured by foot restraints. All metabolic data was acquired, calculated, and stored using a computerized indirect calorimetry system connected to the suit ventilation/gas supply control console. During the efficiency testing, steady state metabolic rate could be evaluated as well as work transmitted to the dynamometer. Mechanical efficiency could then be calculated for each astronaut in each suit performing each movement.
40 CFR 798.5200 - Mouse visible specific locus test.
Code of Federal Regulations, 2010 CFR
2010-07-01
... control groups. (4) Control groups—(i) Concurrent controls. The use of positive or spontaneous controls is... control groups. (ii) Test chemical vehicle, doses used and rationale for dose selection, toxicity data... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5200 Mouse...
40 CFR 798.5200 - Mouse visible specific locus test.
Code of Federal Regulations, 2013 CFR
2013-07-01
... control groups. (4) Control groups—(i) Concurrent controls. The use of positive or spontaneous controls is... control groups. (ii) Test chemical vehicle, doses used and rationale for dose selection, toxicity data... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5200 Mouse...
40 CFR 798.5200 - Mouse visible specific locus test.
Code of Federal Regulations, 2012 CFR
2012-07-01
... control groups. (4) Control groups—(i) Concurrent controls. The use of positive or spontaneous controls is... control groups. (ii) Test chemical vehicle, doses used and rationale for dose selection, toxicity data... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5200 Mouse...
40 CFR 798.5200 - Mouse visible specific locus test.
Code of Federal Regulations, 2014 CFR
2014-07-01
... control groups. (4) Control groups—(i) Concurrent controls. The use of positive or spontaneous controls is... control groups. (ii) Test chemical vehicle, doses used and rationale for dose selection, toxicity data... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5200 Mouse...
40 CFR 798.5200 - Mouse visible specific locus test.
Code of Federal Regulations, 2011 CFR
2011-07-01
... control groups. (4) Control groups—(i) Concurrent controls. The use of positive or spontaneous controls is... control groups. (ii) Test chemical vehicle, doses used and rationale for dose selection, toxicity data... SUBSTANCES CONTROL ACT (CONTINUED) HEALTH EFFECTS TESTING GUIDELINES Genetic Toxicity § 798.5200 Mouse...
The efficacy of protein supplementation during recovery from muscle-damaging concurrent exercise.
Eddens, Lee; Browne, Sarah; Stevenson, Emma J; Sanderson, Brad; van Someren, Ken; Howatson, Glyn
2017-07-01
This study investigated the effect of protein supplementation on recovery following muscle-damaging exercise, which was induced with a concurrent exercise design. Twenty-four well-trained male cyclists were randomised to 3 independent groups receiving 20 g protein hydrolysate, iso-caloric carbohydrate, or low-calorific placebo supplementation, per serve. Supplement serves were provided twice daily, from the onset of the muscle-damaging exercise, for a total of 4 days and in addition to a controlled diet (6 g·kg -1 ·day -1 carbohydrate, 1.2 g·kg -1 ·day -1 protein, remainder from fat). Following the concurrent exercise session at time-point 0 h, comprising a simulated high-intensity road cycling trial and 100 drop-jumps, recovery of outcome measures was assessed at 24, 48, and 72 h. The concurrent exercise protocol was deemed to have caused exercise-induced muscle damage (EIMD), owing to time effects (p < 0.001), confirming decrements in maximal voluntary contraction (peaking at 15% ± 10%) and countermovement jump performance (peaking at 8% ± 7%), along with increased muscle soreness, creatine kinase, and C-reactive protein concentrations. No group or interaction effects (p > 0.05) were observed for any of the outcome measures. The present results indicate that protein supplementation does not attenuate any of the indirect indices of EIMD imposed by concurrent exercise, when employing great rigour around the provision of a quality habitual diet and the provision of appropriate supplemental controls.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...
Prediction of concurrent endometrial carcinoma in women with endometrial hyperplasia.
Matsuo, Koji; Ramzan, Amin A; Gualtieri, Marc R; Mhawech-Fauceglia, Paulette; Machida, Hiroko; Moeini, Aida; Dancz, Christina E; Ueda, Yutaka; Roman, Lynda D
2015-11-01
Although a fraction of endometrial hyperplasia cases have concurrent endometrial carcinoma, patient characteristics associated with concurrent malignancy are not well described. The aim of our study was to identify predictive clinico-pathologic factors for concurrent endometrial carcinoma among patients with endometrial hyperplasia. A case-control study was conducted to compare endometrial hyperplasia in both preoperative endometrial biopsy and hysterectomy specimens (n=168) and endometrial carcinoma in hysterectomy specimen but endometrial hyperplasia in preoperative endometrial biopsy (n=43). Clinico-pathologic factors were examined to identify independent risk factors of concurrent endometrial carcinoma in a multivariate logistic regression model. The most common histologic subtype in preoperative endometrial biopsy was complex hyperplasia with atypia [CAH] (n=129) followed by complex hyperplasia without atypia (n=58) and simple hyperplasia with or without atypia (n=24). The majority of endometrial carcinomas were grade 1 (86.0%) and stage I (83.7%). In multivariate analysis, age 40-59 (odds ratio [OR] 3.07, p=0.021), age≥60 (OR 6.65, p=0.005), BMI≥35kg/m(2) (OR 2.32, p=0.029), diabetes mellitus (OR 2.51, p=0.019), and CAH (OR 9.01, p=0.042) were independent predictors of concurrent endometrial carcinoma. The risk of concurrent endometrial carcinoma rose dramatically with increasing number of risk factors identified in multivariate model (none 0%, 1 risk factor 7.0%, 2 risk factors 17.6%, 3 risk factors 35.8%, and 4 risk factors 45.5%, p<0.001). Hormonal treatment was associated with decreased risk of concurrent endometrial cancer in those with ≥3 risk factors. Older age, obesity, diabetes mellitus, and CAH are predictive of concurrent endometrial carcinoma in endometrial hyperplasia patients. Copyright © 2015 Elsevier Inc. All rights reserved.
Research and realization of info-net security controlling system
NASA Astrophysics Data System (ADS)
Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-03-01
The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO ...
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO EAST. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in Weapons Storage Area, Plattsburgh, Clinton County, NY
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO ...
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO NORTH. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in SAC Alert Area, Plattsburgh, Clinton County, NY
MYSEA: The Monterey Security Architecture
2009-01-01
Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized
ERIC Educational Resources Information Center
Rice, Mabel L.; Redmond, Sean M.; Hoffman, Lesa
2006-01-01
Purpose: Although mean length of utterance (MLU) is a useful benchmark in studies of children with specific language impairment (SLI), some empirical and interpretive issues are unresolved. The authors report on 2 studies examining, respectively, the concurrent validity and temporal stability of MLU equivalency between children with SLI and…
A security architecture for health information networks.
Kailar, Rajashekar; Muralidhar, Vinod
2007-10-11
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.
A Security Architecture for Health Information Networks
Kailar, Rajashekar
2007-01-01
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
Purdue University graduate certificate program in Veterinary Homeland Security.
Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E
2008-01-01
Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.
Zarrinkalam, Ebrahim; Heidarianpour, Ali; Salehi, Iraj; Ranjbar, Kamal; Komaki, Alireza
2016-07-15
Continuous morphine consumption contributes to the development of cognitive disorders. This work investigates the impacts of different types of exercise on learning and memory in morphine-dependent rats. Forty morphine-dependent rats were randomly divided into five groups: sedentary-dependent (Sed-D), endurance exercise-dependent (En-D), strength exercise-dependent (St-D), and combined (concurrent) exercise-dependent (Co-D). Healthy rats were used as controls (Con). After 10weeks of regular exercise (endurance, strength, and concurrent; each five days per week), spatial and aversive learning and memory were assessed using the Morris water maze and shuttle box tests. The results showed that morphine addiction contributes to deficits in spatial learning and memory. Furthermore, each form of exercise training restored spatial learning and memory performance in morphine-dependent rats to levels similar to those of healthy controls. Aversive learning and memory during the acquisition phase were not affected by morphine addiction or exercise, but were significantly decreased by morphine dependence. Only concurrent training returned the time spent in the dark compartment in the shuttle box test to control levels. These findings show that different types of exercise exert similar effects on spatial learning and memory, but show distinct effects on aversive learning and memory. Further, morphine dependence-induced deficits in cognitive function were blocked by exercise. Therefore, different exercise regimens may represent practical treatment methods for cognitive and behavioral impairments associated with morphine-related disease. Copyright © 2016 Elsevier Inc. All rights reserved.
Scheifele, David W; Ward, Brian J; Dionne, Marc; Vanderkooi, Otto G; Loeb, Mark; Coleman, Brenda L; Li, Yan
2012-07-06
When Canada chose a novel adjuvanted vaccine to combat the 2009 influenza pandemic, seasonal trivalent inactivated vaccine (TIV) was also available but compatibility of the two had not been assessed. To compare responses after concurrent or sequential administration of these vaccines, adults 20-59 years old were randomly assigned (1:1) to receive ASO3-adjuvanted H1N1pdm09 vaccine (Arepanrix, GSK, Quebec City, Quebec), with TIV (Vaxigrip, Sanofi Pasteur, Toronto) given concurrently or 21 days later. Blood was obtained at baseline and 21 days after each vaccination to measure hemagglutination inhibition (HAI) titers. Adverse effects were assessed using symptom diaries and personal interviews. 282 participants completed the study (concurrent vaccines 145, sequential vaccines 137). HAI titers to H1N1pdm09 were ≥ 40 at baseline in 15-18% of participants and following vaccination in 91-92%. Initially seropositive subjects (titer ≥ 10) had lower H1N1pdm09 geometric mean HAI titers (GMT) after concurrent than separate vaccinations (320.0 vs 476.5, p=0.039) but both exceeded GM responses of initially naïve participants, which were unaffected by concurrent TIV. Responses to TIV were not lower after concurrent than separate vaccination. Adverse event rates were not increased by concurrent vaccinations above those with H1N1pdm09 vaccine alone. This adjuvanted H1N1pdm09 vaccine was immunogenic and compatible with concurrently administered TIV. Copyright © 2012 Elsevier Ltd. All rights reserved.
40 CFR 798.2450 - Inhalation toxicity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group. Except for treatment with the test substance, animals in the control group... generate an appropriate concentration of the substance in the atmosphere, a vehicle control group shall be...
40 CFR 798.2450 - Inhalation toxicity.
Code of Federal Regulations, 2011 CFR
2011-07-01
... study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group. Except for treatment with the test substance, animals in the control group... generate an appropriate concentration of the substance in the atmosphere, a vehicle control group shall be...
40 CFR 798.2450 - Inhalation toxicity.
Code of Federal Regulations, 2013 CFR
2013-07-01
... study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group. Except for treatment with the test substance, animals in the control group... generate an appropriate concentration of the substance in the atmosphere, a vehicle control group shall be...
40 CFR 798.2450 - Inhalation toxicity.
Code of Federal Regulations, 2014 CFR
2014-07-01
... study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group. Except for treatment with the test substance, animals in the control group... generate an appropriate concentration of the substance in the atmosphere, a vehicle control group shall be...
40 CFR 798.2450 - Inhalation toxicity.
Code of Federal Regulations, 2012 CFR
2012-07-01
... study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group. Except for treatment with the test substance, animals in the control group... generate an appropriate concentration of the substance in the atmosphere, a vehicle control group shall be...
[Concurrent chemoradiation in lung cancer].
Girard, Nicolas; Mornex, Françoise
2005-12-01
Concurrent chemoradiation has become for the 15 last years the standard treatment for locally advanced non-small cell lung cancer, either as a definite therapy in non resectable tumors, or in a neoadjuvant setting in potentially resectable tumors. Associating sequential and concurrent schedules, by administering chemotherapy before or after concurrent chemoradiation, has been recently investigated, but the best sequence remains a matter of controversy. Increasing local control and survival after definite chemoradiation seems possible not only by using optimized radiation fractionation schedules and escalated total doses, but also by associating more convenient and less toxic chemotherapy agents at the right cytotoxic or radio-sensitizing dose. Moreover, recent data have suggested that surgery following induction chemoradiation is feasible and effective in selected patients without mediastinal nodes involvement, if a complete resection can be performed. In patients with localized small cell lung cancer, early concurrent chemoradiation with platinium and etoposide has been recognized as the state-of-the-art treatment. The increasing number of ongoing trials including modern radiation schedules combined with newer chemotherapy agents shows that chemoradiation is one of the most promising therapeutic strategies in thoracic oncology.
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
21 CFR 1301.75 - Physical security controls for practitioners.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...
21 CFR 1301.75 - Physical security controls for practitioners.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...
21 CFR 1301.75 - Physical security controls for practitioners.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...
21 CFR 1301.75 - Physical security controls for practitioners.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...
21 CFR 1301.75 - Physical security controls for practitioners.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
Zapolski, Tamika C. B.; Smith, Gregory T.
2013-01-01
Five personality traits that dispose individuals to rash or ill-advised action (i.e., sensation seeking, negative urgency, positive urgency, lack of planning, and lack of perseverance), can be reliably and validly assessed in children. This paper reports on the first test of parental reports of these traits. In a sample of 94 children (ages 7–13, mean age 10.6), the authors found the following. First, parental reports of the five traits in their children appeared to be reliable. Second, there was moderate convergent validity: parent and child reports of the same traits had a median correlation of r = .30. Third, there was adequate discriminant validity: within-parent reports on different traits had a median correlation of r = .11. Fourth, concurrent prediction of child behavior from parental reports generally was inconsistent with prior findings. Fifth, discrepancies between the two reporters did predict dysfunctional child behavior. There are advantages to securing both child self-report and parental report of personality dispositions to rash action, although there is limited evidence for the concurrent validity of parental reports. PMID:24039341
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
Morgan, Sara J; Hafner, Brian J; Kelly, Valerie E
2016-08-01
Many people with lower limb loss report the need to concentrate on walking. This may indicate increased reliance on cognitive resources when walking compared to individuals without limb loss. This study quantified changes in walking associated with addition of a concurrent cognitive task in persons with transfemoral amputation using microprocessor knees compared to age- and sex-matched controls. Observational, cross-sectional study. Quantitative motion analysis was used to assess walking under both single-task (walking alone) and dual-task (walking while performing a cognitive task) conditions. Primary outcomes were walking speed, step width, step time asymmetry, and cognitive task response latency and accuracy. Repeated-measures analysis of variance was used to examine the effects of task (single-task and dual-task) and group (transfemoral amputation and control) for each outcome. No significant interactions between task and group were observed (all p > 0.11) indicating that a cognitive task did not differentially affect walking between groups. However, walking was slower with wider steps and more asymmetry in people with transfemoral amputation compared to controls under both conditions. Although there were significant differences in walking between people with transfemoral amputation and matched controls, the effects of a concurrent cognitive task on walking were similar between groups. The addition of a concurrent task did not differentially affect walking outcomes in people with and without transfemoral amputation. However, compared to people without limb loss, people with transfemoral amputation adopted a conservative walking strategy. This strategy may reduce the need to concentrate on walking but also contributed to notable gait deviations. © The International Society for Prosthetics and Orthotics 2015.
Suh, Yang-Gun; Lee, Ik Jae; Koom, Wong Sub; Cha, Jihye; Lee, Jong Young; Kim, Soo Kon; Lee, Chang Geol
2014-06-01
In this study, we investigated the effects of radiotherapy ≥60 Gy in the setting of concurrent chemo-radiotherapy for treating patients with Stages II-III esophageal cancer. A total of 126 patients treated with 5-fluorouracilbased concurrent chemo-radiotherapy between January 1998 and February 2008 were retrospectively reviewed. Among these patients, 49 received a total radiation dose of <60 Gy (standard-dose group), while 77 received a total radiation dose of ≥60 Gy (high-dose group). The median doses in the standard- and high-dose groups were 54 Gy (range, 45-59.4 Gy) and 63 Gy (range, 60-81 Gy), respectively. The high-dose group showed significantly improved locoregional control (2-year locoregional control rate, 69 versus 32%, P < 0.01) and progression-free survival (2-year progression-free survival, 47 versus 20%, P = 0.01) than the standard-dose group. Median overall survival in the high- and the standard-dose groups was 28 and 18 months, respectively (P = 0.26). In multivariate analysis, 60 Gy or higher radiotherapy was a significant prognostic factor for improved locoregional control, progression-free survival and overall survival. No significant differences were found in frequencies of late radiation pneumonitis, post-treatment esophageal stricture or treatment-related mortality between the two groups. High-dose radiotherapy of 60 Gy or higher with concurrent chemotherapy improved locoregional control and progression-free survival without a significant increase of in treatment-related toxicity in patients with Stages II-III esophageal cancer. Our study could provide the basis for future randomized clinical trials. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
46 CFR 62.30-5 - Independence.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Reliability and Safety Criteria, All Automated Vital Systems § 62.30-5 Independence. (a) Single non-concurrent failures in control, alarm, or instrumentation systems, and their logical consequences, must not prevent...)(2) and (b)(3) of this section, primary control, alternate control, safety control, and alarm and...
46 CFR 62.30-5 - Independence.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Reliability and Safety Criteria, All Automated Vital Systems § 62.30-5 Independence. (a) Single non-concurrent failures in control, alarm, or instrumentation systems, and their logical consequences, must not prevent...)(2) and (b)(3) of this section, primary control, alternate control, safety control, and alarm and...
46 CFR 62.30-5 - Independence.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Reliability and Safety Criteria, All Automated Vital Systems § 62.30-5 Independence. (a) Single non-concurrent failures in control, alarm, or instrumentation systems, and their logical consequences, must not prevent...)(2) and (b)(3) of this section, primary control, alternate control, safety control, and alarm and...
46 CFR 62.30-5 - Independence.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Reliability and Safety Criteria, All Automated Vital Systems § 62.30-5 Independence. (a) Single non-concurrent failures in control, alarm, or instrumentation systems, and their logical consequences, must not prevent...)(2) and (b)(3) of this section, primary control, alternate control, safety control, and alarm and...
46 CFR 62.30-5 - Independence.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Reliability and Safety Criteria, All Automated Vital Systems § 62.30-5 Independence. (a) Single non-concurrent failures in control, alarm, or instrumentation systems, and their logical consequences, must not prevent...)(2) and (b)(3) of this section, primary control, alternate control, safety control, and alarm and...
40 CFR 798.2650 - Oral toxicity.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If... vehicle control groups are required. (3) Satellite group. (Rodent) A satellite group of 20 animals (10...
40 CFR 798.2650 - Oral toxicity.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If... vehicle control groups are required. (3) Satellite group. (Rodent) A satellite group of 20 animals (10...
40 CFR 798.2650 - Oral toxicity.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If... vehicle control groups are required. (3) Satellite group. (Rodent) A satellite group of 20 animals (10...
40 CFR 798.2650 - Oral toxicity.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If... vehicle control groups are required. (3) Satellite group. (Rodent) A satellite group of 20 animals (10...
40 CFR 798.2650 - Oral toxicity.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If... vehicle control groups are required. (3) Satellite group. (Rodent) A satellite group of 20 animals (10...
Petri net model for analysis of concurrently processed complex algorithms
NASA Technical Reports Server (NTRS)
Stoughton, John W.; Mielke, Roland R.
1986-01-01
This paper presents a Petri-net model suitable for analyzing the concurrent processing of computationally complex algorithms. The decomposed operations are to be processed in a multiple processor, data driven architecture. Of particular interest is the application of the model to both the description of the data/control flow of a particular algorithm, and to the general specification of the data driven architecture. A candidate architecture is also presented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li Gang; Hu Wei; Wang Jianhua
Purpose: To investigate the feasibility and efficacy of concurrent chemoradiation in combination with erlotinib for locally advanced esophageal carcinoma. Methods and Materials: Twenty-four patients with locally advanced esophageal carcinoma were treated with concurrent chemoradiotherapy. A daily fraction of 2.0 Gy was prescribed to a total dose of 60 Gy over 6 weeks. Concurrent paclitaxel (135 mg/m{sup 2}, d{sub 1}) and cisplatin (20 mg/m{sup 2}, d{sub 1-3}) were administered on Day 1 and Day 29 of the radiotherapy. Erlotinib, an oral epidermal growth factor receptor-tyrosine kinase inhibitor, was taken by every patient at the dose of 150 mg daily during themore » chemoradiotherapy. Results: The median follow-up of the 24 patients was 18.6 months (range, 7.1-29.6 months). The 2-year overall survival, local-regional control, and relapse-free survival were 70.1% (95% CI, 50.4-90%), 87.5% (95% CI, 73.5-100%), and 57.4% (95% CI, 36.3-78.7%), respectively. During the chemoradiotheapy, the incidences of acute toxicities of Grade 3 or greater, such as leucopenia and thrombocytopenia, were 16.7 % (4/24) and 8.3% (2/24). Conclusions: Application of concurrent chemoradiotherapy in combination with erlotinib for locally advanced esophageal carcinoma yielded satisfactory 2-year overall survival and local-regional control. The toxicities were well tolerated.« less
Racial-ethnic differences in all-cause and HIV mortality, Florida, 2000–2011
Trepka, Mary Jo; Fennie, Kristopher P.; Sheehan, Diana M.; Niyonsenga, Theophile; Lieb, Spencer; Maddox, Lorene M.
2016-01-01
Purpose We compared all-cause and human immunodeficiency virus (HIV) mortality in a population-based, HIV-infected cohort. Methods Using records of people diagnosed with HIV during 2000–2009 from the Florida Enhanced HIV/Acquired Immunodeficiency Syndrome (AIDS) Reporting System, we conducted a proportional hazards analysis for all-cause mortality and a competing risk analysis for HIV mortality through 2011 controlling for individual level factors, neighborhood poverty, and rural/urban status and stratifying by concurrent AIDS status (AIDS within 3 months of HIV diagnosis). Results Of 59,880 HIV-infected people, 32.2% had concurrent AIDS, and 19.3% died. Adjusting for period of diagnosis, age group, sex, country of birth, HIV transmission mode, area level poverty and rural/urban status, non-Hispanic Black (NHB) and Hispanic people had an elevated adjusted hazards ratio (aHR) for HIV mortality relative to non-Hispanic whites (NHB concurrent AIDS: aHR 1.34, 95% CI 1.23–1.47; NHB without concurrent AIDS: aHR 1.41, 95% CI 1.26–1.57; Hispanic concurrent AIDS: aHR 1.18, 95% CI 1.05–1.32; Hispanic without concurrent AIDS: aHR 1.18, 95% CI 1.03–1.36). Conclusions Considering competing causes of death, NHB and Hispanic people had a higher risk of HIV mortality even among those without concurrent AIDS, indicating a need to identify and address barriers to HIV care in these populations. PMID:26948103
A cognitive approach to classifying perceived behaviors
NASA Astrophysics Data System (ADS)
Benjamin, Dale Paul; Lyons, Damian
2010-04-01
This paper describes our work on integrating distributed, concurrent control in a cognitive architecture, and using it to classify perceived behaviors. We are implementing the Robot Schemas (RS) language in Soar. RS is a CSP-type programming language for robotics that controls a hierarchy of concurrently executing schemas. The behavior of every RS schema is defined using port automata. This provides precision to the semantics and also a constructive means of reasoning about the behavior and meaning of schemas. Our implementation uses Soar operators to build, instantiate and connect port automata as needed. Our approach is to use comprehension through generation (similar to NLSoar) to search for ways to construct port automata that model perceived behaviors. The generality of RS permits us to model dynamic, concurrent behaviors. A virtual world (Ogre) is used to test the accuracy of these automata. Soar's chunking mechanism is used to generalize and save these automata. In this way, the robot learns to recognize new behaviors.
Expected Reachability-Time Games
NASA Astrophysics Data System (ADS)
Forejt, Vojtěch; Kwiatkowska, Marta; Norman, Gethin; Trivedi, Ashutosh
In an expected reachability-time game (ERTG) two players, Min and Max, move a token along the transitions of a probabilistic timed automaton, so as to minimise and maximise, respectively, the expected time to reach a target. These games are concurrent since at each step of the game both players choose a timed move (a time delay and action under their control), and the transition of the game is determined by the timed move of the player who proposes the shorter delay. A game is turn-based if at any step of the game, all available actions are under the control of precisely one player. We show that while concurrent ERTGs are not always determined, turn-based ERTGs are positionally determined. Using the boundary region graph abstraction, and a generalisation of Asarin and Maler's simple function, we show that the decision problems related to computing the upper/lower values of concurrent ERTGs, and computing the value of turn-based ERTGs are decidable and their complexity is in NEXPTIME ∩ co-NEXPTIME.
Song, Guo-Min; Tian, Xu; Liu, Xiao-Ling; Chen, Hui; Zhou, Jian-Guo; Bian, Wei; Chen, Wei-Qing
2017-06-06
This systematic review and meta-analysis aims to systematically assess the effects of concurrent chemo-radiotherapy (CRT) compared with radiotherapy (RT) alone for elderly Chinese patients with non-metastatic esophageal squamous cancer. We searched PubMed, EMBASE, Cochrane Central Register of Controlled Trials (CENTRAL), China Biomedical Literature Database (CBM), and China National Knowledge Infrastructure (CNKI) databases. We retrieved randomized controlled trials on concurrent CRT with Gimeraciland Oteracil Porassium (S-1) compared with RT alone for aged Chinese patients with non-metastatic esophageal squamous cancer performed until August 2016. Eight eligible studies involving 536 patients were subjected to meta-analysis. As a response rate measure, a relative risk (RR) of 1.37 [95% confidence intervals (CIs): 1.24, 1.53; P = 0.00], which reached statistical significance, was estimated when concurrent CRT with S-1 was performed compared with RT alone. Sensitivity analysis on response rate confirmed the robustness of the pooled result. The RR values of 1.44 (95% CIs: 1.22, 1.70; P = 0.00) and 1.77 (95% CIs: 1.26, 2.48; P = 0.00) estimated for 1- and 2-year survival rate indices, respectively, were also statistically significant. The incidence of adverse events was similar in both groups. This review concluded that concurrent CRT with S-1 can improve the efficacy and prolong the survival period of elderly Chinese patients with non-metastatic esophageal squamous cancer and does not significantly increase the acute adverse effects of RT alone.
Monteiro, Paula Alves; Chen, Kong Y; Lira, Fabio Santos; Saraiva, Bruna Thamyres Cicotti; Antunes, Barbara Moura Mello; Campos, Eduardo Zapaterra; Freitas, Ismael Forte
2015-11-26
The prevalence of obesity in pediatric population is increasing at an accelerated rate in many countries, and has become a major public health concern. Physical activity, particularly exercise training, remains to be a cornerstone of pediatric obesity interventions. The purpose of our current randomized intervention trial was to compare the effects of two types of training matched for training volume, aerobic and concurrent, on body composition and metabolic profile in obese adolescents. Thus the aim of the study was compare the effects of two types of training matched for training volume, aerobic and concurrent, on body composition and metabolic profile in obese adolescents. 32 obese adolescents participated in two randomized training groups, concurrent or aerobic, for 20 weeks (50 mins x 3 per week, supervised), and were compared to a 16-subject control group. We measured the percentage body fat (%BF, primary outcome), fat-free mass, percentage of android fat by dual energy x-ray absorptiometry, and others metabolic profiles at baseline and after interventions, and compared them between groups using the Intent-to-treat design. In 20 weeks, both exercise training groups significantly reduced %BF by 2.9-3.6% as compare to no change in the control group (p = 0.042). There were also positive changes in lipid levels in exercise groups. No noticeable changes were found between aerobic and concurrent training groups. The benefits of exercise in reducing body fat and metabolic risk profiles can be achieved by performing either type of training in obese adolescents. RBR-4HN597.
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
Outcome of dialectical behaviour therapy for concurrent eating and substance use disorders.
Courbasson, Christine; Nishikawa, Yasunori; Dixon, Lauren
2012-09-01
The current study examined the preliminary efficacy of dialectical behaviour therapy (DBT) adapted for concurrent eating disorders (EDs) and substance use disorders (SUDs). A matched randomized controlled trial was carried out with 25 female outpatients diagnosed with concurrent ED and SUD. Participants randomized to the intervention condition received DBT, whereas those randomized to the control condition received treatment as usual (TAU), both for a period of 1 year. A series of measures related to disordered eating, substance use and depression were administered to the participants at the beginning of treatment and at 3, 6, 9 and 12 months into treatment, followed by 3-month and 6-month follow-up assessments. Participants randomized to the DBT condition evidenced a superior retention rate relative to their counterparts in the TAU condition at various study time points, including post-treatment (80% versus 20%) and follow-up (60% versus 20%). Due to the unexpected elevated dropout rates and the worsening of ED-SUD symptomatology in the TAU condition, recruitment efforts were terminated early. Results from the DBT condition revealed that the intervention had a significant positive effect on behavioural and attitudinal features of disordered eating, substance use severity and use, negative mood regulation and depressive symptoms. Finally, increases in participants' perceived ability to regulate and cope with negative emotional states were significantly associated with decreases in emotional eating and increases in levels of confidence in ability to resist urges for substance use. Results suggest that the adapted DBT might hold promise for treating individuals with concurrent ED and SUD. The current study is the first study to report positive effects of DBT on individuals with concurrent eating and substance use disorders. Although the results require replication and extension, they suggest that the DBT may be promising for this population. The results suggest that clinicians treating individuals with concurrent eating and substance use problems should be particularly cautious of poor treatment retention and treatment complications. The results bear upon the highly salient and important issue of whether individuals with concurrent substance use need to be excluded from research studies and treatment programmes. Copyright © 2011 John Wiley & Sons, Ltd.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
Delayed matching to sample and concurrent learning in nonamnesic humans with alcohol dependence.
Bowden, S C; Benedikt, R; Ritter, A J
1992-05-01
Small samples of alcohol-dependent subjects who showed no clinical signs of Wernicke-Korsakoff syndrome were compared with nonalcohol-dependent controls on two animal memory tests which are performed poorly by human amnesics. Compared to the control subjects, the alcohol-dependent subjects' performance was impaired on a version of the delayed matching to sample task. On concurrent discrimination learning the overall group difference just failed to reach significance. The results are interpreted as suggesting that behavioural impairment may occur in alcohol-dependent subjects who are not clinically amnesic, and that the impairment is similar in type to that observed in cases of severe Wernicke-Korsakoff syndrome.
Franken, Ingmar H A; Hendriksa, Vincent M; van den Brink, Wim
2002-01-01
In the present study, the factor structure, internal consistency, and the concurrent validity of two heroin craving questionnaires are examined. The Desires for Drug Questionnaire (DDQ) measures three factors: desire and intention, negative reinforcement, and control. The Obsessive Compulsive Drug Use Scale (OCDUS) also measures three factors: thoughts about heroin and interference, desire and control, and resistance to thoughts and intention. Subjects were 102 Dutch patients who were currently in treatment for drug dependency. All proposed scales have good reliability and concurrent validity. Implementation of these instruments in both clinical and research field is advocated.
Modeling of dialogue regimes of distance robot control
NASA Astrophysics Data System (ADS)
Larkin, E. V.; Privalov, A. N.
2017-02-01
Process of distance control of mobile robots is investigated. Petri-Markov net for modeling of dialogue regime is worked out. It is shown, that sequence of operations of next subjects: a human operator, a dialogue computer and an onboard computer may be simulated with use the theory of semi-Markov processes. From the semi-Markov process of the general form Markov process was obtained, which includes only states of transaction generation. It is shown, that a real transaction flow is the result of «concurrency» in states of Markov process. Iteration procedure for evaluation of transaction flow parameters, which takes into account effect of «concurrency», is proposed.
Guedes, Bruno Fukelmann; Gonçalves, Marcia Rubia; Cury, Rubens Gisbert
2016-01-01
Psychosis, impulse control disorders (e.g., pathological gambling and hypersexuality) and repetitive behaviors such as punding are known psychiatric complications of Parkinson's disease (PD). Impulsive, compulsive and repetitive behaviors are strongly associated with dopamine-replacement therapy. We present the case of a 58-year-old man with PD and a myriad of psychiatric symptoms. Concurrent psychosis, punding and pathological gambling developed more than six years after the introduction of pramipexole and ceased shortly after the addition of quetiapine and discontinuation of pramipexole. This report emphasizes the importance of monitoring for a wide array of psychiatric symptoms in patients on dopamine replacement therapy.
Effect of helminth-induced immunity on infections with microbial pathogens
2016-01-01
Helminth infections are ubiquitous worldwide and can trigger potent immune responses that differ from and potentially antagonize host protective responses to microbial pathogens. In this Review we focus on the three main killers in infectious disease—AIDS, tuberculosis and malaria—and critically assesses whether helminths adversely influence host control of these diseases. We also discuss emerging concepts for how M2 macrophages and helminth-modulated dendritic cells can potentially influence the protective immune response to concurrent infections. Finally, we present evidence advocating for more efforts to determine how and to what extent helminths interfere with the successful control of specific concurrent coinfections. PMID:24145791
Jones, Andrew D; Mundo-Rosas, Verónica; Cantoral, Alejandra; Levy, Teresa Shamah
2017-10-01
We aimed to determine the association between household food insecurity (HFI) and the co-occurrence of overweight and anemia among women of reproductive age in the Mexican population. We analyzed data on 4,039 nonpregnant female adolescents (15-19 years) and 10,760 nonpregnant adult women of reproductive age (20-49 years) from the 2012 National Health and Nutrition Survey of Mexico. The survey uses a two-stage sampling design, stratified by rural and urban regions. The Latin American and Caribbean Food Security Scale was used to assess HFI. We assessed overweight and obesity in women based on World Health Organization classifications for body mass index, and BMI-for-age Z-scores for female adolescents, and defined anemia as an altitude-adjusted hemoglobin (Hb) concentration < 120 g/L based on measurement of capillary Hb concentrations. In multiple logistic regression models adjusting for potential confounding covariates, HFI was not associated with the co-occurrence of anemia and overweight among female adolescents. The adjusted odds of women of reproductive age from mildly and moderately food-insecure households, respectively, experiencing concurrent anemia and overweight were 48% (OR: 1.48; 95% CI: 1.15, 1.91) and 49% (OR: 1.49; 95% CI: 1.08, 2.06) higher than among women from food-secure households. Severe HFI was not associated with concurrent overweight and anemia among female adolescents or women. HFI may be a shared mechanism for dual forms of malnutrition within the same individual, simultaneously contributing to overconsumption and dietary inadequacy. © 2016 John Wiley & Sons Ltd.
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
33 CFR 106.265 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...
36 CFR 1256.70 - What controls access to national security-classified information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...
Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
Gray, Heather M; Nelson, Sarah E; Shaffer, Howard J; Stebbins, Patricia; Farina, Andrea Ryan
2017-09-01
Among people experiencing homelessness, difficulty securing housing is often compounded by concurrent challenges including unemployment, chronic illness, criminal justice involvement, and victimization. The Moving Ahead Program (MAP) is a vocational rehabilitation program that seeks to help adults facing these challenges to secure competitive employment. We prospectively studied how MAP graduates (N = 97) changed from the beginning of MAP to about six months after graduation. We observed a variety of positive outcomes not just in employment and housing but also in health, substance use, and criminal justice involvement. However, these gains were not universal; for instance, participants were less likely to report positive outcomes at follow-up if they started MAP with a serious mental illness, made relatively small gains in work skills, or did not seek mental health treatment during the six months after they completed MAP. These findings might encourage program staff to devote additional resources toward supporting at-risk students.
A network monitor for HTTPS protocol based on proxy
NASA Astrophysics Data System (ADS)
Liu, Yangxin; Zhang, Lingcui; Zhou, Shuguang; Li, Fenghua
2016-10-01
With the explosive growth of harmful Internet information such as pornography, violence, and hate messages, network monitoring is essential. Traditional network monitors is based mainly on bypass monitoring. However, we can't filter network traffic using bypass monitoring. Meanwhile, only few studies focus on the network monitoring for HTTPS protocol. That is because HTTPS data is in the encrypted traffic, which makes it difficult to monitor. This paper proposes a network monitor for HTTPS protocol based on proxy. We adopt OpenSSL to establish TLS secure tunes between clients and servers. Epoll is used to handle a large number of concurrent client connections. We also adopt Knuth- Morris-Pratt string searching algorithm (or KMP algorithm) to speed up the search process. Besides, we modify request packets to reduce the risk of errors and modify response packets to improve security. Experiments show that our proxy can monitor the content of all tested HTTPS websites efficiently with little loss of network performance.
40 CFR 798.3260 - Chronic toxicity.
Code of Federal Regulations, 2011 CFR
2011-07-01
... dose groups and in the controls should be low to permit a meaningful evaluation of the results. For non... meaningful and valid statistical evaluation of chronic effects. (2) Control groups. (i) A concurrent control group is suggested. This group should be an untreated or sham treated control group or, if a vehicle is...
40 CFR 798.2250 - Dermal toxicity.
Code of Federal Regulations, 2011 CFR
2011-07-01
... animals scheduled to be sacrificed before completion of the study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If the toxic properties of the...
40 CFR 798.3260 - Chronic toxicity.
Code of Federal Regulations, 2012 CFR
2012-07-01
... dose groups and in the controls should be low to permit a meaningful evaluation of the results. For non... meaningful and valid statistical evaluation of chronic effects. (2) Control groups. (i) A concurrent control group is suggested. This group should be an untreated or sham treated control group or, if a vehicle is...
40 CFR 798.2250 - Dermal toxicity.
Code of Federal Regulations, 2012 CFR
2012-07-01
... animals scheduled to be sacrificed before completion of the study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If the toxic properties of the...
40 CFR 798.2250 - Dermal toxicity.
Code of Federal Regulations, 2014 CFR
2014-07-01
... animals scheduled to be sacrificed before completion of the study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If the toxic properties of the...
40 CFR 798.2250 - Dermal toxicity.
Code of Federal Regulations, 2013 CFR
2013-07-01
... animals scheduled to be sacrificed before completion of the study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If the toxic properties of the...
40 CFR 798.2250 - Dermal toxicity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... animals scheduled to be sacrificed before completion of the study. (2) Control groups. A concurrent control group is required. This group shall be an untreated or sham-treated control group or, if a vehicle is used in administering the test substance, a vehicle control group. If the toxic properties of the...
40 CFR 798.3260 - Chronic toxicity.
Code of Federal Regulations, 2013 CFR
2013-07-01
... dose groups and in the controls should be low to permit a meaningful evaluation of the results. For non... meaningful and valid statistical evaluation of chronic effects. (2) Control groups. (i) A concurrent control group is suggested. This group should be an untreated or sham treated control group or, if a vehicle is...
40 CFR 798.3260 - Chronic toxicity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... dose groups and in the controls should be low to permit a meaningful evaluation of the results. For non... meaningful and valid statistical evaluation of chronic effects. (2) Control groups. (i) A concurrent control group is suggested. This group should be an untreated or sham treated control group or, if a vehicle is...
40 CFR 798.3260 - Chronic toxicity.
Code of Federal Regulations, 2014 CFR
2014-07-01
... dose groups and in the controls should be low to permit a meaningful evaluation of the results. For non... meaningful and valid statistical evaluation of chronic effects. (2) Control groups. (i) A concurrent control group is suggested. This group should be an untreated or sham treated control group or, if a vehicle is...
40 CFR 799.9630 - TSCA developmental neurotoxicity.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... (2) Control group. A concurrent control group is required. This group must be a sham-treated group or, if a vehicle is used in administering the test substance, a vehicle control group. The vehicle must neither be developmentally toxic nor have effects on reproduction. Animals in the control group must be...
40 CFR 799.9630 - TSCA developmental neurotoxicity.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... (2) Control group. A concurrent control group is required. This group must be a sham-treated group or, if a vehicle is used in administering the test substance, a vehicle control group. The vehicle must neither be developmentally toxic nor have effects on reproduction. Animals in the control group must be...
40 CFR 799.9630 - TSCA developmental neurotoxicity.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... (2) Control group. A concurrent control group is required. This group must be a sham-treated group or, if a vehicle is used in administering the test substance, a vehicle control group. The vehicle must neither be developmentally toxic nor have effects on reproduction. Animals in the control group must be...
Appraisal and coping styles account for the effects of temperament on preadolescent adjustment
Thompson, Stephanie F.; Zalewski, Maureen; Lengua, Liliana J.
2014-01-01
Temperament, appraisal, and coping are known to underlie emotion regulation, yet less is known about how these processes relate to each other across time. We examined temperamental fear, frustration, effortful control, and impulsivity, positive and threat appraisals, and active and avoidant coping as processes underpinning the emotion regulation of pre-adolescent children managing stressful events. Appraisal and coping styles were tested as mediators of the longitudinal effects of temperamental emotionality and self-regulation on adjustment using a community sample (N=316) of preadolescent children (8–12 years at T1) studied across one year. High threat appraisals were concurrently related to high fear and impulsivity, whereas effortful control predicted relative decreases in threat appraisal. High fear was concurrently related to high positive appraisal, and impulsivity predicted increases in positive appraisal. Fear was concurrently related to greater avoidant coping, and impulsivity predicted increases in avoidance. Frustration predicted decreases in active coping. These findings suggest temperament, or dispositional aspects of reactivity and regulation, relates to concurrent appraisal and coping processes and additionally predicts change in these processes. Significant indirect effects indicated that appraisal and coping mediated the effects of temperament on adjustment. Threat appraisal mediated the effects of fear and effortful control on internalizing and externalizing problems, and avoidant coping mediated the effect of impulsivity on internalizing problems. These mediated effects suggest that one pathway through which temperament influences adjustment is pre-adolescents’ appraisal and coping. Findings highlight temperament, appraisal and coping as emotion regulation processes relevant to children’s adjustment in response to stress. PMID:25821237
Fox, Mark C; Ericsson, K Anders; Best, Ryan
2011-03-01
Since its establishment, psychology has struggled to find valid methods for studying thoughts and subjective experiences. Thirty years ago, Ericsson and Simon (1980) proposed that participants can give concurrent verbal expression to their thoughts (think aloud) while completing tasks without changing objectively measurable performance (accuracy). In contrast, directed requests for concurrent verbal reports, such as explanations or directions to describe particular kinds of information, were predicted to change thought processes as a consequence of the need to generate this information, thus altering performance. By comparing performance of concurrent verbal reporting conditions with their matching silent control condition, Ericsson and Simon found several studies demonstrating that directed verbalization was associated with changes in performance. In contrast, the lack of effects of thinking aloud was merely suggested by a handful of experimental studies. In this article, Ericsson and Simon's model is tested by a meta-analysis of 94 studies comparing performance while giving concurrent verbalizations to a matching condition without verbalization. Findings based on nearly 3,500 participants show that the "think-aloud" effect size is indistinguishable from zero (r = -.03) and that this procedure remains nonreactive even after statistically controlling additional factors such as task type (primarily visual or nonvisual). In contrast, procedures that entail describing or explaining thoughts and actions are significantly reactive, leading to higher performance than silent control conditions. All verbal reporting procedures tend to increase times to complete tasks. These results suggest that think-aloud should be distinguished from other methods in future studies. Theoretical and practical implications are discussed. (c) 2011 APA, all rights reserved.
The adoption of IT security standards in a healthcare environment.
Gomes, Rui; Lapão, Luís Velez
2008-01-01
Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.
Individual and Work Factors Related to Perceived Work Ability and Labor Force Outcomes
McGonagle, Alyssa K.; Fisher, Gwenith G.; Barnes-Farrell, Janet L.; Grosch, James W.
2015-01-01
Perceived work ability refers to a worker's assessment of his or her ability to continue working in his or her job, given characteristics of the job along with his or her personal resources. Perceived work ability is a critical variable to study in the U.S., given an aging workforce, trends to delay retirement, and U.S. policy considerations to delay the age at which full Social Security retirement benefits may be obtained. Based on the Job Demands-Resources Model, cognitive appraisal theory of stress and push/pull factors related to retirement, we proposed and tested a conceptual model of antecedents and outcomes of perceived work ability using three independent samples of U.S. working adults. Data regarding workers’ job characteristics were from self-report and O*NET measures. Results from relative importance analysis indicated that health and sense of control were consistently and most strongly related to work ability perceptions relative to other job demands and job resources when perceived work ability was measured concurrently or two weeks later in samples with varying occupations. Job demands (along with health and sense of control) were most strongly related to work ability perceptions when perceived work ability was measured in a manufacturing worker sample 1.6 years later. Perceived work ability also predicted lagged labor force outcomes (absence, retirement, and disability leave) while controlling for other known predictors of each. Consistent indirect effects were observed from health status and sense of control to all three of these outcomes via perceived work ability. PMID:25314364
Individual and work factors related to perceived work ability and labor force outcomes.
McGonagle, Alyssa K; Fisher, Gwenith G; Barnes-Farrell, Janet L; Grosch, James W
2015-03-01
Perceived work ability refers to a worker's assessment of his or her ability to continue working in his or her job, given characteristics of the job along with his or her resources. Perceived work ability is a critical variable to study in the United States, given an aging workforce, trends to delay retirement, and U.S. policy considerations to delay the age at which full Social Security retirement benefits may be obtained. Based on the job demands-resources model, cognitive appraisal theory of stress, and push/pull factors related to retirement, we proposed and tested a conceptual model of antecedents and outcomes of perceived work ability using 3 independent samples of U.S. working adults. Data regarding workers' job characteristics were from self-report and Occupational Information Network measures. Results from relative importance analysis indicated that health and sense of control were consistently and most strongly related to work ability perceptions relative to other job demands and job and personal resources when perceived work ability was measured concurrently or 2 weeks later in samples with varying occupations. Job demands (along with health and sense of control) were most strongly related to work ability perceptions when perceived work ability was measured in a manufacturing worker sample 1.6 years later. Perceived work ability also predicted lagged labor force outcomes (absence, retirement, and disability leave) while controlling for other known predictors of each. Consistent indirect effects were observed from health status and sense of control to all 3 of these outcomes via perceived work ability. PsycINFO Database Record (c) 2015 APA, all rights reserved.
Human papillomavirus infection and spontaneous abortion: a case-control study performed in Mexico.
Conde-Ferráez, Laura; Chan May, Alberto de A; Carrillo-Martínez, Jorge R; Ayora-Talavera, Guadalupe; González-Losa, María del Refugio
2013-10-01
To investigate if HPV cervical infection is associated with spontaneous abortion in a Mexican population. Case control study including 281 women from two Social Security Hospitals in Merida, Mexico. Cases were women with spontaneous abortion attending for curettage, and controls were pregnant women at term who attended for delivery. HPV molecular detection and typing of HPV 16, 18, 58 and 6/11 was performed on cervical samples, and TORCH serology IgM tests (against T. gondii, CMV, HSV) were performed on cases. Data were analyzed using Chi square, odds ratio and linear regression tests. HPV global prevalence was 19.8% (24.4% in cases and 15.2% in controls). HPV types 16 and 58 were the most frequently detected in both groups. Multiple HPV types concurrent infection were found in 31.4% of typified samples. Amongst cases 27.3% of HPV positive women reported at least one previous pregnancy loss; compared to 17.43% amongst HPV negative women. Nevertheless, HPV was not significantly associated with spontaneous or to repetitive abortion. Cases were 60.2% positive to any TORCH agent, although it was not significantly associated to referred miscarriage history. Spontaneous abortion was associated to a previous pregnancy loss and to women's age older than 35 years old. HPV infection was significantly associated to alcohol intake before pregnancy and to multiple sexual partners. HPV cervical infection was not associated with spontaneous abortion. HPV in spontaneous abortion and other adverse pregnancy outcomes merits further study. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Safety effects of exclusive and concurrent signal phasing for pedestrian crossing.
Zhang, Yaohua; Mamun, Sha A; Ivan, John N; Ravishanker, Nalini; Haque, Khademul
2015-10-01
This paper describes the estimation of pedestrian crash count and vehicle interaction severity prediction models for a sample of signalized intersections in Connecticut with either concurrent or exclusive pedestrian phasing. With concurrent phasing, pedestrians cross at the same time as motor vehicle traffic in the same direction receives a green phase, while with exclusive phasing, pedestrians cross during their own phase when all motor vehicle traffic on all approaches is stopped. Pedestrians crossing at each intersection were observed and classified according to the severity of interactions with motor vehicles. Observation intersections were selected to represent both types of signal phasing while controlling for other physical characteristics. In the nonlinear mixed models for interaction severity, pedestrians crossing on the walk signal at an exclusive signal experienced lower interaction severity compared to those crossing on the green light with concurrent phasing; however, pedestrians crossing on a green light where an exclusive phase was available experienced higher interaction severity. Intersections with concurrent phasing have fewer total pedestrian crashes than those with exclusive phasing but more crashes at higher severity levels. It is recommended that exclusive pedestrian phasing only be used at locations where pedestrians are more likely to comply. Copyright © 2015. Published by Elsevier Ltd.
40 CFR 798.5955 - Heritable translocation test in drosophila melanogaster.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Drosophila stocks may also be used. (4) Control groups. (i) Concurrent positive and negative (vehicle... size of the negative (vehicle) control group should be determined by the availability of appropriate... defined parameters. The spontaneous mutant frequency observed in the appropriate control group will...
40 CFR 798.5955 - Heritable translocation test in drosophila melanogaster.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Drosophila stocks may also be used. (4) Control groups. (i) Concurrent positive and negative (vehicle... size of the negative (vehicle) control group should be determined by the availability of appropriate... defined parameters. The spontaneous mutant frequency observed in the appropriate control group will...
40 CFR 798.5955 - Heritable translocation test in drosophila melanogaster.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Drosophila stocks may also be used. (4) Control groups. (i) Concurrent positive and negative (vehicle... size of the negative (vehicle) control group should be determined by the availability of appropriate... defined parameters. The spontaneous mutant frequency observed in the appropriate control group will...
40 CFR 798.5955 - Heritable translocation test in drosophila melanogaster.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Drosophila stocks may also be used. (4) Control groups. (i) Concurrent positive and negative (vehicle... size of the negative (vehicle) control group should be determined by the availability of appropriate... defined parameters. The spontaneous mutant frequency observed in the appropriate control group will...
40 CFR 798.5955 - Heritable translocation test in drosophila melanogaster.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Drosophila stocks may also be used. (4) Control groups. (i) Concurrent positive and negative (vehicle... size of the negative (vehicle) control group should be determined by the availability of appropriate... defined parameters. The spontaneous mutant frequency observed in the appropriate control group will...
Arms Control and National Security: An Introduction. Advance Edition.
ERIC Educational Resources Information Center
Arms Control Association, Washington, DC.
Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…
Security Controls Hurt Research, NAS Warns.
ERIC Educational Resources Information Center
Kolata, Gina
1982-01-01
A National Academy of Sciences (NAS) report found no evidence that leaks of technical information from universities or other research centers have damaged national security. However, in areas where control is warranted, decisions should be based on criteria. These criteria and issues related to security control and technological transfer are…
Spring, Bonnie; Doran, Neal; Pagoto, Sherry; Schneider, Kristin; Pingitore, Regina; Hedeker, Don
2014-01-01
Prospects for changing multiple health behaviors conjointly remain controversial. We compared effects on tobacco abstinence and weight gain of adding diet and exercise concurrently or after smoking treatment. Female regular smokers (n=315) randomized to 3 conditions received 16 weeks of behavioral smoking treatment, quit at week 5, and were followed for 9 months after the quit date. Weight management was added to the first 8 weeks for Early Diet (ED), the final 8 weeks for Late Diet (LD), and omitted for Control. Both Diet groups tended to show greater bio-verified abstinence than Control although differences were nonsignificant. Compared to Control, ED initially suppressed weight gain but lost that effect over time, whereas LD initially lacked but gradually acquired a weight suppression effect that stabilized [p = .004]. Behavioral weight control did not undermine smoking cessation and slowed the rate of weight gain when initiated after the smoking quit date, supporting a sequential approach to multiple behavior change. PMID:15482037
Humphries, Debbie L; Dearden, Kirk A; Crookston, Benjamin T; Fernald, Lia C; Stein, Aryeh D; Woldehanna, Tassew; Penny, Mary E; Behrman, Jere R
2015-01-01
Background: Poor childhood nutritional status has lifetime effects and food insecurity is associated with dietary practices that can impair nutritional status. Objectives: We assessed concurrent and subsequent associations between food insecurity and height-for-age z scores (HAZs) and body mass index–for-age z scores (BMI-Zs); evaluated associations with transitory and chronic food insecurity; and tested whether dietary diversity mediates associations between food insecurity and nutritional status. Methods: We used data from the Young Lives younger cohort composed of children in Ethiopia (n = 1757), India (n = 1825), Peru (n = 1844), and Vietnam (n = 1828) recruited in 2002 (round 1) at ∼1 y old, with subsequent data collection at 5 y in 2006 (round 2) and 8 y in 2009 (round 3). Results: Children from food-insecure households had significantly lower HAZs in all countries at 5 y (Ethiopia, −0.33; India, −0.53; Peru, −0.31; and Vietnam, −0.68 HAZ; all P < 0.001), although results were attenuated after controlling for potential confounders (Ethiopia, −0.21; India, −0.32; Peru, −0.14; and Vietnam, −0.27 HAZ; P < 0.01). Age 5 y food insecurity predicted the age 8 y HAZ, but did not add predictive power beyond HAZ at age 5 y in Ethiopia, India, or Peru. Age 5 y food insecurity predicted the age 8 y BMI-Z even after controlling for the 5 y BMI-Z, although associations were not significant after the inclusion of additional confounding variables (Ethiopia, P = 0.12; India, P = 0.29; Peru, P = 0.16; and Vietnam, P = 0.51). Chronically food-insecure households had significantly lower HAZs than households that were consistently food-secure, although BMI-Zs did not differ by chronic food-insecurity status. Dietary diversity mediated 18.8–30.5% of the association between food security and anthropometry in Vietnam, but mediated to a lesser degree (8.4–19.3%) in other countries. Conclusions: In 4 countries, food insecurity at 5 y of age was associated with both HAZ and BMI-Z at age 8 y, although the association was attenuated after adjusting for other household factors and anthropometry at age 5 y, and remained significant only for the HAZ in Vietnam. PMID:26084361
Humphries, Debbie L; Dearden, Kirk A; Crookston, Benjamin T; Fernald, Lia C; Stein, Aryeh D; Woldehanna, Tassew; Penny, Mary E; Behrman, Jere R
2015-08-01
Poor childhood nutritional status has lifetime effects and food insecurity is associated with dietary practices that can impair nutritional status. We assessed concurrent and subsequent associations between food insecurity and height-for-age z scores (HAZs) and body mass index-for-age z scores (BMI-Zs); evaluated associations with transitory and chronic food insecurity; and tested whether dietary diversity mediates associations between food insecurity and nutritional status. We used data from the Young Lives younger cohort composed of children in Ethiopia (n = 1757), India (n = 1825), Peru (n = 1844), and Vietnam (n = 1828) recruited in 2002 (round 1) at ∼1 y old, with subsequent data collection at 5 y in 2006 (round 2) and 8 y in 2009 (round 3). Children from food-insecure households had significantly lower HAZs in all countries at 5 y (Ethiopia, -0.33; India, -0.53; Peru, -0.31; and Vietnam, -0.68 HAZ; all P < 0.001), although results were attenuated after controlling for potential confounders (Ethiopia, -0.21; India, -0.32; Peru, -0.14; and Vietnam, -0.27 HAZ; P < 0.01). Age 5 y food insecurity predicted the age 8 y HAZ, but did not add predictive power beyond HAZ at age 5 y in Ethiopia, India, or Peru. Age 5 y food insecurity predicted the age 8 y BMI-Z even after controlling for the 5 y BMI-Z, although associations were not significant after the inclusion of additional confounding variables (Ethiopia, P = 0.12; India, P = 0.29; Peru, P = 0.16; and Vietnam, P = 0.51). Chronically food-insecure households had significantly lower HAZs than households that were consistently food-secure, although BMI-Zs did not differ by chronic food-insecurity status. Dietary diversity mediated 18.8-30.5% of the association between food security and anthropometry in Vietnam, but mediated to a lesser degree (8.4-19.3%) in other countries. In 4 countries, food insecurity at 5 y of age was associated with both HAZ and BMI-Z at age 8 y, although the association was attenuated after adjusting for other household factors and anthropometry at age 5 y, and remained significant only for the HAZ in Vietnam. © 2015 American Society for Nutrition.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
33 CFR 104.265 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices...
Xue, Wentao; Wang, Jie; Wen, Ming; Chen, Gaojian; Zhang, Weidong
2017-03-01
The successful chain-growth copper(I)-catalyzed azide-alkyne cycloaddition (CuAAC) polymerization employing Cu(0)/pentamethyldiethylenetriamine (PMDETA) and alkyl halide as catalyst is first investigated by a combination of nuclear magnetic resonance, gel-permeation chromatography, and matrix-assisted laser desorption/ionization time-of-flight mass spectrometry. In addition, the electron transfer mediated "click-radical" concurrent polymerization utilizing Cu(0)/PMDETA as catalyst is successfully employed to generate well-defined copolymers, where controlled CuAAC polymerization of clickable ester monomer is progressed in the main chain acting as the polymer backbone, the controlled radical polymerization (CRP) of acrylic monomer is carried out in the side chain. Furthermore, it is found that there is strong collaborative effect and compatibility between CRP and CuAAC polymerization to improve the controllability. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Williams, J.V.
1984-04-26
Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.
Graphs for information security control in software defined networks
NASA Astrophysics Data System (ADS)
Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.
2017-07-01
Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.
Yam, Felix K.
2017-01-01
Despite the evidence that some commonly used Chinese medications (CMs) have antiplatelet/anticoagulant effects, many patients still used antiplatelets combined with CMs. We conducted a nested case-crossover study to examine the associations between the concomitant use of antiplatelets and CMs and major bleeding using population-based health database in Taiwan. Among the cohort of 79,463 outpatients prescribed antiplatelets (e.g., aspirin and clopidogrel) continuously, 1,209 patients hospitalized with new occurring bleeding in 2012 and 2013 were included. Those recruited patients served as their own controls to compare different times of exposure to prespecified CMs (e.g., Asian ginseng and dong quai) and antiplatelet agents. The periods of case, control 1, and control 2 were defined as 1–4 weeks, 6–9 weeks, and 13–16 weeks before hospitalization, respectively. Conditional logistic regression analyses found that concurrent use of antiplatelet drugs with any of the prespecified CMs in the case period might not significantly increase the risks of bleeding over that in the control periods (OR = 1.00, 95% CI 0.51 to 1.95 and OR = 1.13, 95% CI 0.65 to 1.97). The study showed no strong relationships between hospitalization for major bleeding events and concurrent use of antiplatelet drugs with the prespecified CMs. PMID:28831288
33 CFR 105.255 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...
Clark, Ross A; Pua, Yong-Hao; Oliveira, Cristino C; Bower, Kelly J; Thilarajah, Shamala; McGaw, Rebekah; Hasanki, Ksaniel; Mentiplay, Benjamin F
2015-07-01
The Microsoft Kinect V2 for Windows, also known as the Xbox One Kinect, includes new and potentially far improved depth and image sensors which may increase its accuracy for assessing postural control and balance. The aim of this study was to assess the concurrent validity and reliability of kinematic data recorded using a marker-based three dimensional motion analysis (3DMA) system and the Kinect V2 during a variety of static and dynamic balance assessments. Thirty healthy adults performed two sessions, separated by one week, consisting of static standing balance tests under different visual (eyes open vs. closed) and supportive (single limb vs. double limb) conditions, and dynamic balance tests consisting of forward and lateral reach and an assessment of limits of stability. Marker coordinate and joint angle data were concurrently recorded using the Kinect V2 skeletal tracking algorithm and the 3DMA system. Task-specific outcome measures from each system on Day 1 and 2 were compared. Concurrent validity of trunk angle data during the dynamic tasks and anterior-posterior range and path length in the static balance tasks was excellent (Pearson's r>0.75). In contrast, concurrent validity for medial-lateral range and path length was poor to modest for all trials except single leg eyes closed balance. Within device test-retest reliability was variable; however, the results were generally comparable between devices. In conclusion, the Kinect V2 has the potential to be used as a reliable and valid tool for the assessment of some aspects of balance performance. Copyright © 2015 Elsevier B.V. All rights reserved.
Watching TV and Food Intake: The Role of Content
Chapman, Colin D.; Nilsson, Victor C.; Thune, Hanna Å.; Cedernaes, Jonathan; Le Grevès, Madeleine; Hogenkamp, Pleunie S.; Benedict, Christian; Schiöth, Helgi B.
2014-01-01
Obesity is a serious and growing health concern worldwide. Watching television (TV) represents a condition during which many habitually eat, irrespective of hunger level. However, as of yet, little is known about how the content of television programs being watched differentially impacts concurrent eating behavior. In this study, eighteen normal-weight female students participated in three counter-balanced experimental conditions, including a ‘Boring’ TV condition (art lecture), an ‘Engaging’ TV condition (Swedish TV comedy series), and a no TV control condition during which participants read (a text on insects living in Sweden). Throughout each condition participants had access to both high-calorie (M&Ms) and low-calorie (grapes) snacks. We found that, relative to the Engaging TV condition, Boring TV encouraged excessive eating (+52% g, P = 0.009). Additionally, the Engaging TV condition actually resulted in significantly less concurrent intake relative to the control ‘Text’ condition (−35% g, P = 0.05). This intake was driven almost entirely by the healthy snack, grapes; however, this interaction did not reach significance (P = 0.07). Finally, there was a significant correlation between how bored participants were across all conditions, and their concurrent food intake (beta = 0.317, P = 0.02). Intake as measured by kcals was similarly patterned but did not reach significance. These results suggest that, for women, different TV programs elicit different levels of concurrent food intake, and that the degree to which a program is engaging (or alternately, boring) is related to that intake. Additionally, they suggest that emotional content (e.g. boring vs. engaging) may be more associated than modality (e.g. TV vs. text) with concurrent intake. PMID:24983245
The ethical aspects of regulating production.
Swanson, J C
2008-02-01
Polls and surveys conducted within the United States show general agreement that there is public support for the protection of farm livestock and poultry. Concurrent with the growing public sentiment is the recent adoption of socially responsible corporate policies by major food retailers relative to animal welfare. The animal welfare assurance and audit programs developed by the private sector are an attempt to assure consumers that best practice measures and independent oversight result in a reasonable quality of life for food-producing animals. These programs represent voluntary self-regulation and arguably a market-based approach to secure the welfare of food-producing animals. Animal advocacy organizations historically seek regulatory oversight of animal care practice. Legislative routes that require government promulgation and enforcement of animal care regulations represent an involuntary form of animal welfare assurance. There are ethical considerations concerning the employment of voluntary or involuntary regulation of the welfare of food-producing animals. For example, degree of public endangerment, economic impact, viability of small to medium producers, food price, food quality, and food security are prominent among the ethical considerations in deliberating whether to impose regulatory mandates on production. In either regulatory approach, the public must be convinced that the welfare of food-producing animals can be secured in a transparent and convincing manner.
Disposal Of Irradiated Cadmium Control Rods From The Plumbrook Reactor Facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Posivak, E.J.; Berger, S.R.; Freitag, A.A.
2008-07-01
Innovative mixed waste disposition from NASA's Plum Brook Reactor Facility was accomplished without costly repackaging. Irradiated characteristic hardware with contact dose rates as high as 8 Sv/hr was packaged in a HDPE overpack and stored in a Secure Environmental Container during earlier decommissioning efforts, awaiting identification of a suitable pathway. WMG obtained regulatory concurrence that the existing overpack would serve as the macro-encapsulant per 40CFR268.45 Table 1.C. The overpack vent was disabled and the overpack was placed in a stainless steel liner to satisfy overburden slumping requirements. The liner was sealed and placed in shielded shoring for transport to themore » disposal site in a US DOT Type A cask. Disposition via this innovative method avoided cost, risk, and dose associated with repackaging the high dose irradiated characteristic hardware. In conclusion: WMG accomplished what others said could not be done. Large D and D contractors advised NASA that the cadmium control rods could only be shipped to the proposed Yucca mountain repository. NASA management challenged MOTA to find a more realistic alternative. NASA and MOTA turned to WMG to develop a methodology to disposition the 'hot and nasty' waste that presumably had no path forward. Although WMG lead a team that accomplished the 'impossible', the project could not have been completed with out the patient, supportive management by DOE-EM, NASA, and MOTA. (authors)« less
Successful chronic disease care for Aboriginal Australians requires cultural competence.
Liaw, Siaw Teng; Lau, Phyllis; Pyett, Priscilla; Furler, John; Burchill, Marlene; Rowley, Kevin; Kelaher, Margaret
2011-06-01
To review the literature to determine the attributes of culturally appropriate healthcare to inform the design of chronic disease management (CDM) models for Aboriginal patients in urban general practice. A comprehensive conceptual framework, drawing on the Access to Care, Pathway to Care, Chronic Care, Level of Connectedness, and Cultural Security, Cultural Competency and Cultural Respect models, was developed to define the search strategy, inclusion criteria and appraisal methods for the literature review. Selected papers were reviewed in detail if they examined a chronic disease intervention for an Aboriginal population and reported on its evaluation, impacts or outcomes. In the 173 papers examined, only 11 programs met the inclusion criteria. All were programs conducted in rural and remote Aboriginal community-controlled health services. Successful chronic disease care and interventions require adequate Aboriginal community engagement, utilising local knowledge, strong leadership, shared responsibilities, sustainable resources and integrated data and systems. These success factors fitted within the conceptual framework developed. Research and development of culturally appropriate CDM models concurrently in both urban and rural settings will enable more rigorous evaluation, leading to stronger evidence for best practice. A partnership of mainstream and Aboriginal-controlled health services is essential to successfully 'close the gap'. Findings will inform and guide the development, implementation and evaluation of culturally appropriate CDM in mainstream general practice and primary care. © 2011 The Authors. ANZJPH © 2011 Public Health Association of Australia.
Hatting, Justin L; Moore, Sean D; Malan, Antoinette P
2018-02-07
Invertebrate pests pose a significant threat to food security on the African continent. In response, South Africa has become one of the largest importers of chemical pesticides in sub-Saharan Africa, with several hundred active ingredients registered. To address the over-reliance on such chemicals, the South African Department of Agriculture, Forestry and Fisheries (DAFF) has eliminated or restricted several pesticides since the late 1970s. The recent launch of the South African National Bio-Economy Strategy and establishment of the South African Bioproducts Organisation (SABO), together with new guidelines for registration of biopesticides in 2015, also support this endeavour. Concurrently, entomopathogen-related research and bioproduct development has increased over the past decade. Currently, 31 products (seven manufactured locally) are registered under the Fertilizers, Farm Feeds, Agricultural Remedies and Stock Remedies Act 36 of 1947. Commercially important microbes include Beauveria bassiana (Cordycipitaceae), Metarhizium anisopliae (Clavicipitaceae), Cydia pomonella granulovirus, Cryptophlebia leucotreta granulovirus, Helicoverpa armigera nucleopolyhedrovirus (Baculoviridae) and Bacillus thuringiensis subsp. kurstaki and B. thuringiensis subsp. aizawai (Bacillaceae). Both parasitic and entomopathogenic nematodes (EPNs) show potential for development as bioinsecticides with one commercial EPN product, based on Heterorhabditis bacteriophora (Heterorhabditidae), registered under the Act. Rapid scientific progression, supported by a favourable legislative environment, should facilitate further advances in microbial control of phytophagous invertebrate pests in South Africa. Copyright © 2018 Elsevier Inc. All rights reserved.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
40 CFR 799.9130 - TSCA acute inhalation toxicity.
Code of Federal Regulations, 2012 CFR
2012-07-01
... of the substance in the atmosphere, a vehicle control group should be used when historical data are... system to assign animals to test groups and control groups randomly is required. (2) Control groups. A concurrent untreated control group is not necessary. Where a vehicle other than water is used to generate an...
40 CFR 799.9130 - TSCA acute inhalation toxicity.
Code of Federal Regulations, 2013 CFR
2013-07-01
... of the substance in the atmosphere, a vehicle control group should be used when historical data are... system to assign animals to test groups and control groups randomly is required. (2) Control groups. A concurrent untreated control group is not necessary. Where a vehicle other than water is used to generate an...
40 CFR 799.9130 - TSCA acute inhalation toxicity.
Code of Federal Regulations, 2014 CFR
2014-07-01
... of the substance in the atmosphere, a vehicle control group should be used when historical data are... system to assign animals to test groups and control groups randomly is required. (2) Control groups. A concurrent untreated control group is not necessary. Where a vehicle other than water is used to generate an...
40 CFR 798.6560 - Subchronic delayed neuro-toxicity of organophosphorus substances.
Code of Federal Regulations, 2010 CFR
2010-07-01
... employed. (2) Number of animals. Ten hens should be used for each treatment and control group. (3) Control group—(i) General. A concurrent control group should be used. This group should be treated in a manner... control group(s). The highest dose level should result in toxic effects, preferably delayed neurotoxicity...
40 CFR 798.6560 - Subchronic delayed neuro-toxicity of organophosphorus substances.
Code of Federal Regulations, 2013 CFR
2013-07-01
... employed. (2) Number of animals. Ten hens should be used for each treatment and control group. (3) Control group—(i) General. A concurrent control group should be used. This group should be treated in a manner... control group(s). The highest dose level should result in toxic effects, preferably delayed neurotoxicity...
40 CFR 798.6560 - Subchronic delayed neuro-toxicity of organophosphorus substances.
Code of Federal Regulations, 2014 CFR
2014-07-01
... employed. (2) Number of animals. Ten hens should be used for each treatment and control group. (3) Control group—(i) General. A concurrent control group should be used. This group should be treated in a manner... control group(s). The highest dose level should result in toxic effects, preferably delayed neurotoxicity...
40 CFR 798.6560 - Subchronic delayed neuro-toxicity of organophosphorus substances.
Code of Federal Regulations, 2012 CFR
2012-07-01
... employed. (2) Number of animals. Ten hens should be used for each treatment and control group. (3) Control group—(i) General. A concurrent control group should be used. This group should be treated in a manner... control group(s). The highest dose level should result in toxic effects, preferably delayed neurotoxicity...
40 CFR 798.6560 - Subchronic delayed neuro-toxicity of organophosphorus substances.
Code of Federal Regulations, 2011 CFR
2011-07-01
... employed. (2) Number of animals. Ten hens should be used for each treatment and control group. (3) Control group—(i) General. A concurrent control group should be used. This group should be treated in a manner... control group(s). The highest dose level should result in toxic effects, preferably delayed neurotoxicity...
Update of Bisphosphonate Flight Experiment
NASA Technical Reports Server (NTRS)
LeBlanc, A.; Matsumoto, T.; Jones, J.; Shapiro, J.; Lang, T.; Shackelford, L.; Smith, S. M.; Evans, H.; Spector, E.; Snyder, R. P.;
2015-01-01
Elevated bone resorption is a hallmark of human spaceflight and bed rest indicating that elevated remodeling is a major factor in the etiology of space flight bone loss. In a collaborative effort between the NASA and JAXA space agencies, we are testing whether an antiresorptive drug would provide additional benefit to in-flight exercise to ameliorate bone loss and hypercalciuria during long-duration spaceflight. Measurements of bone loss include DXA, QCT, pQCT, urinary and blood biomarkers. We have completed analysis of R+1year data from 7 crewmembers treated with alendronate during flight, as well as immediate post flight (R+<2wks) data from 6 of 10 concurrent controls without treatment. The treated astronauts used the Advanced Resistive Exercise Device (ARED) during their missions. The purpose of this report is twofold: 1) to report the results of inflight, post flight and one year post flight bone measures compared with available controls with and without the use of ARED; and 2) to discuss preliminary data on concurrent controls. The figure below compares the BMD changes in ISS crewmembers exercising with and without the current ARED protocol and the alendronate treated crewmembers also using the ARED. This shows that the use of ARED prevents about half the bone loss seen in early ISS crewmembers and that the addition of an antiresorptive provides additional benefit. Resorption markers and urinary Ca excretion are not impacted by exercise alone but are significantly reduced with antiresorptive treatment. Bone measures for treated subjects, 1 year after return from space remain at or near baseline. DXA data for the 6 concurrent controls using the ARED device are similar to DXA data shown in the figure below. QCT data for these six indicate that the integral data are consistent with the DXA data, i.e., comparing the two control groups suggests significant but incomplete improvement in maintaining BMD using the ARED protocol. Biochemical data of the concurrent control group await sample return and analysis. The preliminary conclusion is that an antiresorptive may be an effective adjunct to exercise during long-duration spaceflight.
Ultra-accelerated natural sunlight exposure testing
Jorgensen, Gary J.; Bingham, Carl; Goggin, Rita; Lewandowski, Allan A.; Netter, Judy C.
2000-06-13
Process and apparatus for providing ultra accelerated natural sunlight exposure testing of samples under controlled weathering without introducing unrealistic failure mechanisms in exposed materials and without breaking reciprocity relationships between flux exposure levels and cumulative dose that includes multiple concurrent levels of temperature and relative humidity at high levels of natural sunlight comprising: a) concentrating solar flux uniformly; b) directing the controlled uniform sunlight onto sample materials in a chamber enclosing multiple concurrent levels of temperature and relative humidity to allow the sample materials to be subjected to accelerated irradiance exposure factors for a sufficient period of time in days to provide a corresponding time of about at least a years worth of representative weathering of the sample materials.
Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety
DOT National Transportation Integrated Search
1998-05-01
Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...
33 CFR 104.405 - Format of the Vessel Security Plan (VSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of the...
Main control computer security model of closed network systems protection against cyber attacks
NASA Astrophysics Data System (ADS)
Seymen, Bilal
2014-06-01
The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.
NASA Astrophysics Data System (ADS)
Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung
According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.
Dissociation of Active Working Memory and Passive Recognition in Rhesus Monkeys
ERIC Educational Resources Information Center
Basile, Benjamin M.; Hampton, Robert R.
2013-01-01
Active cognitive control of working memory is central in most human memory models, but behavioral evidence for such control in nonhuman primates is absent and neurophysiological evidence, while suggestive, is indirect. We present behavioral evidence that monkey memory for familiar images is under active cognitive control. Concurrent cognitive…
Conduct problems, IQ, and household chaos: a longitudinal multi-informant study
Deater-Deckard, Kirby; Mullineaux, Paula Y.; Beekman, Charles; Petrill, Stephen A.; Schatschneider, Chris; Thompson, Lee A.
2010-01-01
Background We tested the hypothesis that household chaos would be associated with lower child IQ and more child conduct problems concurrently and longitudinally over two years while controlling for housing conditions, parent education/IQ, literacy environment, parental warmth/negativity, and stressful events. Methods The sample included 302 families with same-sex twins (58% female) in Kindergarten/1st grade at the first assessment. Parents’ and observers’ ratings were gathered, with some collected over a two-year period. Results Chaos varied widely. There was substantial mother–father agreement and longitudinal stability. Chaos covaried with poorer housing conditions, lower parental education/IQ, poorer home literacy environment, higher stress, higher negativity and lower warmth. Chaos statistically predicted lower IQ and more conduct problems, beyond the effects of other home environment factors. Conclusions Even with other home environment factors controlled, higher levels of chaos were linked concurrently with lower child IQ, and concurrently and longitudinally with more child conduct problems. Parent self-reported chaos represents an important aspect of housing and family functioning, with respect to children’s cognitive and behavioral functioning. PMID:19527431
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Drinking to Cope Motivation as a Prospective Predictor of Negative Affect.
Armeli, Stephen; Sullivan, Tami P; Tennen, Howard
2015-07-01
Consistent with research indicating that drinking to cope (DTC) motivation might exacerbate negative affective states within or immediately proximal to discrete drinking episodes, we examined whether yearly deviations in more global levels of DTC motivation prospectively predicted depressive and anxious affect over several weeks. College students (N = 521, 52% women) completed baseline measures of drinking motives, recent depression and anxiety symptoms, recent alcohol use, and alcohol use disorder symptoms on a secure website. Approximately 2 weeks after completing this survey, participants completed the 30-day daily diary portion of the study in which they reported on their current-day affective states. This yearly assessment burst in which participants completed a baseline survey and a daily diary assessment was repeated for 3 additional years. We found that changes in DTC motivation were positively associated with changes in depressive and anxious affect in the subsequent month, after we controlled for changes in concurrent anxiety and depressive symptoms, drinking level, enhancement drinking motivation, and alcohol use disorder symptoms. Our findings are consistent with the notion that DTC motivation confers a unique vulnerability for emotion dysregulation, and that drinking for such reasons possibly prolongs or exacerbates negative affective states.
The effects of coping on adjustment: Re-examining the goodness of fit model of coping effectiveness.
Masel, C N; Terry, D J; Gribble, M
1996-01-01
Abstract The primary aim of the present study was to examine the extent to which the effects of coping on adjustment are moderated by levels of event controllability. Specifically, the research tested two revisions to the goodness of fit model of coping effectiveness. First, it was hypothesized that the effects of problem management coping (but not problem appraisal coping) would be moderated by levels of event controllability. Second, it was hypothesized that the effects of emotion-focused coping would be moderated by event controllability, but only in the acute phase of a stressful encounter. To test these predictions, a longitudinal study was undertaken (185 undergraduate students participated in all three stages of the research). Measures of initial adjustment (low depression and coping efficacy) were obtained at Time 1. Four weeks later (Time 2), coping responses to a current or a recent stressor were assessed. Based on subjects' descriptions of the event, objective and subjective measures of event controllability were also obtained. Measures of concurrent and subsequent adjustment were obtained at Times 2 and 3 (two weeks later), respectively. There was only weak support for the goodness of fit model of coping effectiveness. The beneficial effects of a high proportion of problem management coping (relative to total coping efforts) on Time 3 perceptions of coping efficacy were more evident in high control than in low control situations. Other results of the research revealed that, irrespective of the controllability of the event, problem appraisal coping strategies and emotion-focused strategies (escapism and self-denigration) were associated with high and low levels of concurrent adjustment, respectively. The effects of these coping responses on subsequent adjustment were mediated through concurrent levels of adjustment.
ICU-acquired candidemia within selective digestive decontamination studies: a meta-analysis.
Hurley, James C
2015-11-01
To estimate the direct and indirect (contextual) effects of the factorized constituents of selective digestive decontamination and selective oropharyngeal decontamination (SDD/SOD), being topical antibiotic (TA) and protocolized antifungal prophylaxis (PAFP), on ICU-acquired candidemia. A broad range of ICU candidemia incidence studies were sourced to serve as points of reference. The candidemia incidence was extracted from component (control and intervention) groups decanted from studies of various designs (concurrent or non-concurrent) and whether investigating SDD/SOD versus non-TA methods of ICU infection prevention. The candidemia incidences were summarized in regression models using generalized estimating equation (GEE) methods. Groups derived from observational studies (no prevention method under study) provided an overarching external benchmark candidemia incidence for calibration. Within studies investigating SDD/SOD, the mean (and 95% confidence interval) candidemia incidence among concurrent component groups (40 control; 2.4%; 1.7-3.2% and 43 intervention groups; 2.4%; 1.6-3.1%), but not non-concurrent control groups (11 groups; 1.6%; 0.1-2.7%), is higher than that of the benchmark candidemia incidence derived from 54 observational groups (1.5%; 1.2-1.9%). The TA constituent within SDD/SOD has significant direct and indirect (contextual) effects in GEE models even after adjusting for the publication year and the group-wide presence of either candidemia risk factors or PAFP use. The TA constituent of SDD/SOD is associated with a contextual effect on candidemia incidence which is similar in magnitude to that of the conventional candidemia risk factors and against which PAFP partially attenuates. This increase is inapparent within individual SDD/SOD studies examined in isolation.
33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...; (9) Security systems and equipment maintenance; (10) Security measures for access control; (11... Facility Security Plan (FSP). 106.405 Section 106.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES...
Secure public cloud platform for medical images sharing.
Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas
2015-01-01
Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.
Network support for turn-taking in multimedia collaboration
NASA Astrophysics Data System (ADS)
Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.
1997-01-01
The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.
The Design of a High Performance Earth Imagery and Raster Data Management and Processing Platform
NASA Astrophysics Data System (ADS)
Xie, Qingyun
2016-06-01
This paper summarizes the general requirements and specific characteristics of both geospatial raster database management system and raster data processing platform from a domain-specific perspective as well as from a computing point of view. It also discusses the need of tight integration between the database system and the processing system. These requirements resulted in Oracle Spatial GeoRaster, a global scale and high performance earth imagery and raster data management and processing platform. The rationale, design, implementation, and benefits of Oracle Spatial GeoRaster are described. Basically, as a database management system, GeoRaster defines an integrated raster data model, supports image compression, data manipulation, general and spatial indices, content and context based queries and updates, versioning, concurrency, security, replication, standby, backup and recovery, multitenancy, and ETL. It provides high scalability using computer and storage clustering. As a raster data processing platform, GeoRaster provides basic operations, image processing, raster analytics, and data distribution featuring high performance computing (HPC). Specifically, HPC features include locality computing, concurrent processing, parallel processing, and in-memory computing. In addition, the APIs and the plug-in architecture are discussed.
1997-12-01
Fracture Analysis of the F-5, 15%-Spar Bolt DR Devendra Kumar SAALC/LD 6- 16 CUNY-City College, New York, NY A Simple, Multiversion Concurrency Control...Program, University of Dayton, Dayton, OH. [3]AFGROW, Air Force Crack Propagation Analysis Program, Version 3.82 (1997) 15-8 A SIMPLE, MULTIVERSION ...Office of Scientific Research Boiling Air Force Base, DC and San Antonio Air Logistic Center August 1997 16-1 A SIMPLE, MULTIVERSION CONCURRENCY
NASA Astrophysics Data System (ADS)
Zhang, D. C.; Xue, Q.; Lei, J. F.; Ma, Y. J.; Yang, R.; Wang, C.
2018-06-01
Metastable β Ti-12Mo wt pct alloys with controllable grain sizes are successfully produced, and the effect of grain size on mechanical responses has been thoroughly investigated. It is found that target alloys possess concurrent twinning-induced plasticity (TWIP) and transformation-induced plasticity (TRIP) features. Mechanisms governing mechanical properties through well-manipulated tensile experiments, detailed microstructure analysis, as well as strong correlations between triggering stress and twinning/phase transformation are offered.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
Nordling, Jamie Koenig; Boldt, Lea J.; O'Bleness, Jessica; Kochanska, Grazyna
2015-01-01
Although attachment security has been associated with children's rule-compatible conduct, the mechanism through which attachment influences early regard for rules is not well established. We hypothesized that effortful control would mediate the link between security and indicators of children's emerging regard for rules (discomfort following rule violations, internalization of parents' and experimenter's rules, few externalizing behaviors). In a longitudinal study, the Attachment Q-Set was completed by parents, effortful control was observed, and Regard for Rules was observed and rated by parents. The proposed model fit the data well: Children's security to mothers predicted their effortful control, which in turn had a direct link to a greater Regard for Rules. Children's security with fathers did not predict effortful control. The mother-child relationship appears particularly important for positive developmental cascades of self-regulation and socialization. PMID:27158193
Development and evaluation of a radar air traffic control research task.
DOT National Transportation Integrated Search
1965-12-01
A system is described in which various elements of the radar air traffic controller's task can be presented repeatedly, reliably, and concurrently to each of six experimental subjects seated at separate task consoles. Programming of display condition...
Chemtob, C M; Roitblat, H L; Hamada, R S; Muraoka, M Y; Carlson, J G; Bauer, G B
1999-04-01
We examined the ability of Vietnam veterans with PTSD to focus attention on a primary digit detection task while concurrently viewing neutral or Vietnam-related picture and word distractors. Controlling for combat exposure, military service, and psychopathology, veterans with PTSD took longer to detect the target when Vietnam-related pictures were distractors. There were no reaction time differences when word stimuli were distractors. The latency effect was specific to trials with trauma-related pictures and did not spread to neutral trials interleaved within a mixed block of trauma and neutral pictures. Individuals with PTSD recalled proportionally more Vietnam-related words than other groups, implying differential attention to Vietnam-related words. Attending to trauma-related pictures interferes with performance of a concurrent task by individuals with PTSD.
Auditing Albaha University Network Security using in-house Developed Penetration Tool
NASA Astrophysics Data System (ADS)
Alzahrani, M. E.
2018-03-01
Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.
40 CFR 798.4700 - Reproduction and fertility effects.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... (iv) Number of animals. Each test and control group shall contain at least 20 males and a sufficient number of females to yield at least 20 pregnant females at or near term. (2) Control groups. (i) A concurrent control group shall be used. This group shall be an untreated or sham treated control group or if...
40 CFR 798.4700 - Reproduction and fertility effects.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... (iv) Number of animals. Each test and control group shall contain at least 20 males and a sufficient number of females to yield at least 20 pregnant females at or near term. (2) Control groups. (i) A concurrent control group shall be used. This group shall be an untreated or sham treated control group or if...
40 CFR 798.4700 - Reproduction and fertility effects.
Code of Federal Regulations, 2011 CFR
2011-07-01
.... (iv) Number of animals. Each test and control group shall contain at least 20 males and a sufficient number of females to yield at least 20 pregnant females at or near term. (2) Control groups. (i) A concurrent control group shall be used. This group shall be an untreated or sham treated control group or if...
40 CFR 798.4700 - Reproduction and fertility effects.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... (iv) Number of animals. Each test and control group shall contain at least 20 males and a sufficient number of females to yield at least 20 pregnant females at or near term. (2) Control groups. (i) A concurrent control group shall be used. This group shall be an untreated or sham treated control group or if...
40 CFR 798.4700 - Reproduction and fertility effects.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... (iv) Number of animals. Each test and control group shall contain at least 20 males and a sufficient number of females to yield at least 20 pregnant females at or near term. (2) Control groups. (i) A concurrent control group shall be used. This group shall be an untreated or sham treated control group or if...
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
Code of Federal Regulations, 2012 CFR
2012-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2014 CFR
2014-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2013 CFR
2013-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2011 CFR
2011-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2010 CFR
2010-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Santner, Antonia; Kopp, Martin; Federolf, Peter
2018-05-24
Physical training may play a prominent role in the development of preadolescent brains, but it is yet to be determined what type of exercise may generate higher cognitive effects, and if concurrent mental engagement provides further efficacy. The aim of this study is to investigate motor and cognitive effects of a 9-week exercise intervention in children aged 6-10 years. Trainings include the automatisation of challenging coordination exercises with concurrent mental tasks (intervention group) and multisport exercises with and without mental tasks (two control groups). It is hypothesised that all groups gain motor and cognitive effects, but highest benefits are expected for the combination of automatised coordination exercises with mental tasks. Two elementary schools (∼500 students) take part in the study. Data are generated by using the German Motor Performance Test 6-18 (Deutscher Motorik-Test 6-18), TDS (Match 4 Point), d2-R test of attention and Kasel-Concentration-Task for Children Aged 3-8 Years; test-duration: 6-7 min. After pretesting in September 2017 and a 9-week training intervention, post-testing takes place in December 2017 and March 2018 (long-term effects). Training interventions consist of coordination exercises with concurrent mental tasks (intervention group) and multimotor exercises with and without concurrent mental tasks (control groups). Shapiro-Wilk test will be used to test for normal distribution and the Levene test for variance homogeneity. The appropriate multivariate statistical methods (multivariate analysis of variance or Kruskal-Wallis test) will be used for analysing differences among the groups and for comparing preintervention with postintervention performances. All procedures have been approved by the board for ethical questions in science of the University of Innsbruck. Findings will be published in 2018 in international journals and presented at conferences. Schools will be informed of key results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
Communication Security for Control Systems in Smart Grid
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Internal risk management control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
Han, Jihua; Zhu, Weiguo; Yu, Changhua; Zhou, Xilei; Li, Tao; Zhang, Xiaoye
2012-01-01
Esophageal cancer patients with pathologic lymph node involvement generally have a poor prognosis. Many randomized controlled trials have not achieved consistent results similar to those of the RTOG8501 trial, and the long-term survival rate has not increased. The present study aimed to compare the efficacy and toxic side effects of concurrent chemoradiotherapy and radiotherapy alone to treat N1 esophageal carcinoma. A total of 130 N1 esophageal carcinoma patients were enrolled and randomly divided into two groups: concurrent chemoradiotherapy group (n = 65) and radiotherapy group (n = 65). Both groups received three-dimensional conformal radiotherapy with a total dose of 64-66 Gy. Meanwhile, to the concurrent chemoradiotherapy group, an additional chemotherapy protocol (nedaplatin, 20 mg/m²/d, 5-FU, 500 mg/m²/d for four days) was given from day 1, and such treatment was repeated until day 29. From day 21 after radiotherapy, two cycles of a consolidated chemotherapy protocol were given at an interval of 28 days. The survival rates at one, two, and three years were 72.3%, 55.3%, and 40% in the concurrent chemoradiotherapy group, respectively, and 75.3%, 38.5%, and 18.5% in the radiotheray group (P = 0.007), respectively. The survival rates of the patients in the concurrent chemoradiotherapy group who completed one to two cycles and three to four cycles at one, two, and three years were 70%, 53.3%, and 30%, and 74.2%, 57.1%, 48.6% (P = 0.128), respectively. Three-year distant metastasis rates were 10.7% in the concurrent chemoradiotherapy group and 16.9% in the radiotherapy group. Acute toxicity in the concurrent chemoradiotherapy group was higher than in the radiotherapy group. Late toxic side effects were similar in the two groups. Compared with radiotherapy alone, concurrent chemoradiotherapy in the treatment of esophageal carcinoma with local lymph node enlargement can improve the three-year survival rate. Moreover, completion of three to four cycles of chemotherapy may have better efficacy than one to two cycles.
2010-01-01
Background Approximately 55,000 children in New Zealand do not eat breakfast on any given day. Regular breakfast skipping has been associated with poor diets, higher body mass index, and adverse effects on children's behaviour and academic performance. Research suggests that regular breakfast consumption can improve academic performance, nutrition and behaviour. This paper describes the protocol for a stepped wedge cluster randomised trial of a free school breakfast programme. The aim of the trial is to determine the effects of the breakfast intervention on school attendance, achievement, psychosocial function, dietary habits and food security. Methods/Design Sixteen primary schools in the North Island of New Zealand will be randomised in a sequential stepped wedge design to a free before-school breakfast programme consisting of non-sugar coated breakfast cereal, milk products, and/or toast and spreads. Four hundred children aged 5-13 years (approximately 25 per school) will be recruited. Data collection will be undertaken once each school term over the 2010 school year (February to December). The primary trial outcome is school attendance, defined as the proportion of students achieving an attendance rate of 95% or higher. Secondary outcomes are academic achievement (literacy, numeracy, self-reported grades), sense of belonging at school, psychosocial function, dietary habits, and food security. A concurrent process evaluation seeks information on parents', schools' and providers' perspectives of the breakfast programme. Discussion This randomised controlled trial will provide robust evidence of the effects of a school breakfast programme on students' attendance, achievement and nutrition. Furthermore the study provides an excellent example of the feasibility and value of the stepped wedge trial design in evaluating pragmatic public health intervention programmes. Trial Registration Number Australian New Zealand Clinical Trials Registry (ANZCTR) - ACTRN12609000854235 PMID:21114862
Desai, Arti D; Jacob-Files, Elizabeth A; Wignall, Julia; Wang, Grace; Pratt, Wanda; Mangione-Smith, Rita; Britto, Maria T
2018-06-05
Shared care plans play an essential role in coordinating care across health care providers and settings for children with medical complexity (CMC). However, existing care plans often lack shared ownership, are out-of-date, and lack universal accessibility. In this study, we aimed to establish requirements for shared care plans to meet the information needs of caregivers and providers and to mitigate current information barriers when caring for CMC. We followed a user-centered design methodology and conducted in-depth semistructured interviews with caregivers and providers of CMC who receive care at a tertiary care children's hospital. We applied inductive, thematic analysis to identify salient themes. Analysis occurred concurrently with data collection; therefore, the interview guide was iteratively revised as new questions and themes emerged. Interviews were conducted with 17 caregivers and 22 providers. On the basis of participant perspectives, we identified 4 requirements for shared care plans that would help meet information needs and mitigate current information barriers when caring for CMC. These requirements included the following: (1) supporting the accessibility of care plans from multiple locations (eg, cloud-based) and from multiple devices, with alert and search features; (2) ensuring the organization is tailored to the specific user; (3) including collaborative functionality such as real-time, multiuser content management and secure messaging; and (4) storing care plans on a secure platform with caregiver-controlled permission settings. Although further studies are needed to understand the optimal design and implementation strategies, shared care plans that meet these specified requirements could mitigate perceived information barriers and improve care for CMC. Copyright © 2018 by the American Academy of Pediatrics.
Okamoto, Eiji; Kato, Yoshikuni; Seino, Kazuyuki; Miura, Hidekazu; Shiraishi, Yasuyuki; Yambe, Tomoyuki; Mitamura, Yoshinori
2012-10-01
A transcutaneous communication system (TCS) is a key technology for monitoring and controlling artificial hearts and other artificial organs in the body. In this study, we developed a new TCS that uses the human body as a conductive medium. Direct data exchange provides a higher level of communication security compared to that of wireless methods without physical constraints such as an external wire. The external and internal units of the new TCS each consist mainly of a data transmitter and a data receiver. The data transmitter has an amplitude shift keying (ASK) modulator (carrier frequencies: 4 and 10 MHz) and an electrode. The ASK-modulated data current is led into the body through the electrode, and it flows back to the energy source through the body, the data receiver, and the earth ground that includes all conductors and dielectrics in the environment that are in close proximity to the patient. Performance of the TCS was evaluated by a communication test on the surface of the human body and in an animal experiment using a goat. The TCS was able to transmit data concurrently for 4 weeks between everywhere on the surface of the body and everywhere inside the body under full-duplex communication at a transmission rate of 115 kbps. The power consumption of each TCS unit was 125 mW with an ASK-modulated current of 7 mA (root-mean-square). While further study is required to secure its safety, the newly developed TCS has promise to be a next-generation transcutaneous communication device. © 2012, Copyright the Authors. Artificial Organs © 2012, International Center for Artificial Organs and Transplantation and Wiley Periodicals, Inc.
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.
2015-01-01
NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.
Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.
Feng, Zhi; Wen, Guanghui; Hu, Guoqiang
2017-05-01
This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.
Rauter, Georg; Sigrist, Roland; Riener, Robert; Wolf, Peter
2015-01-01
In literature, the effectiveness of haptics for motor learning is controversially discussed. Haptics is believed to be effective for motor learning in general; however, different types of haptic control enhance different movement aspects. Thus, in dependence on the movement aspects of interest, one type of haptic control may be effective whereas another one is not. Therefore, in the current work, it was investigated if and how different types of haptic controllers affect learning of spatial and temporal movement aspects. In particular, haptic controllers that enforce active participation of the participants were expected to improve spatial aspects. Only haptic controllers that provide feedback about the task's velocity profile were expected to improve temporal aspects. In a study on learning a complex trunk-arm rowing task, the effect of training with four different types of haptic control was investigated: position control, path control, adaptive path control, and reactive path control. A fifth group (control) trained with visual concurrent augmented feedback. As hypothesized, the position controller was most effective for learning of temporal movement aspects, while the path controller was most effective in teaching spatial movement aspects of the rowing task. Visual feedback was also effective for learning temporal and spatial movement aspects.
40 CFR 79.61 - Vehicle emissions inhalation exposure guideline.
Code of Federal Regulations, 2013 CFR
2013-07-01
... of the mean weight for each sex. Animals shall be randomly assigned to treatment and control groups... the control group(s) depends on the type of study, number of biological end points used in the... evaluation of chronic effects. (v) A concurrent control group is required. This group shall be exposed to...
40 CFR 79.61 - Vehicle emissions inhalation exposure guideline.
Code of Federal Regulations, 2012 CFR
2012-07-01
... of the mean weight for each sex. Animals shall be randomly assigned to treatment and control groups... the control group(s) depends on the type of study, number of biological end points used in the... evaluation of chronic effects. (v) A concurrent control group is required. This group shall be exposed to...
43 CFR 6304.22 - What special provisions apply to control of fire, insects, and diseases?
Code of Federal Regulations, 2011 CFR
2011-10-01
... of fire, insects, and diseases? 6304.22 Section 6304.22 Public Lands: Interior Regulations Relating... apply to control of fire, insects, and diseases? BLM may prescribe measures to control fire, noxious weeds, non-native invasive plants, insects, and diseases. BLM may require restoration concurrent with or...
43 CFR 6304.22 - What special provisions apply to control of fire, insects, and diseases?
Code of Federal Regulations, 2013 CFR
2013-10-01
... of fire, insects, and diseases? 6304.22 Section 6304.22 Public Lands: Interior Regulations Relating... apply to control of fire, insects, and diseases? BLM may prescribe measures to control fire, noxious weeds, non-native invasive plants, insects, and diseases. BLM may require restoration concurrent with or...
43 CFR 6304.22 - What special provisions apply to control of fire, insects, and diseases?
Code of Federal Regulations, 2014 CFR
2014-10-01
... of fire, insects, and diseases? 6304.22 Section 6304.22 Public Lands: Interior Regulations Relating... apply to control of fire, insects, and diseases? BLM may prescribe measures to control fire, noxious weeds, non-native invasive plants, insects, and diseases. BLM may require restoration concurrent with or...
43 CFR 6304.22 - What special provisions apply to control of fire, insects, and diseases?
Code of Federal Regulations, 2012 CFR
2012-10-01
... of fire, insects, and diseases? 6304.22 Section 6304.22 Public Lands: Interior Regulations Relating... apply to control of fire, insects, and diseases? BLM may prescribe measures to control fire, noxious weeds, non-native invasive plants, insects, and diseases. BLM may require restoration concurrent with or...
21 CFR 573.640 - Methyl esters of higher fatty acids.
Code of Federal Regulations, 2012 CFR
2012-04-01
... test group and of a concurrent negative control group. The significance of the difference in pericardial fluid volumes between the test group and the negative control group is determined by calculating a... pericardial fluid volumes of the test and control groups, respectively; n t and n c are the number of chicks...
40 CFR 799.9380 - TSCA reproduction and fertility effects.
Code of Federal Regulations, 2011 CFR
2011-07-01
... nonpregnant. (iv) Number of animals. Each control group shall contain a sufficient number of mating pairs to... should be randomly assigned to the control and treatment groups, in a manner which results in comparable... group. (A) A concurrent control group shall be used. This group shall be an untreated or sham treated...
21 CFR 573.640 - Methyl esters of higher fatty acids.
Code of Federal Regulations, 2013 CFR
2013-04-01
... test group and of a concurrent negative control group. The significance of the difference in pericardial fluid volumes between the test group and the negative control group is determined by calculating a... pericardial fluid volumes of the test and control groups, respectively; n t and n c are the number of chicks...
21 CFR 573.640 - Methyl esters of higher fatty acids.
Code of Federal Regulations, 2010 CFR
2010-04-01
... test group and of a concurrent negative control group. The significance of the difference in pericardial fluid volumes between the test group and the negative control group is determined by calculating a... pericardial fluid volumes of the test and control groups, respectively; n t and n c are the number of chicks...
21 CFR 573.640 - Methyl esters of higher fatty acids.
Code of Federal Regulations, 2014 CFR
2014-04-01
... test group and of a concurrent negative control group. The significance of the difference in pericardial fluid volumes between the test group and the negative control group is determined by calculating a... pericardial fluid volumes of the test and control groups, respectively; n t and n c are the number of chicks...
40 CFR 799.9380 - TSCA reproduction and fertility effects.
Code of Federal Regulations, 2012 CFR
2012-07-01
... nonpregnant. (iv) Number of animals. Each control group shall contain a sufficient number of mating pairs to... should be randomly assigned to the control and treatment groups, in a manner which results in comparable... group. (A) A concurrent control group shall be used. This group shall be an untreated or sham treated...
40 CFR 799.9380 - TSCA reproduction and fertility effects.
Code of Federal Regulations, 2014 CFR
2014-07-01
... nonpregnant. (iv) Number of animals. Each control group shall contain a sufficient number of mating pairs to... should be randomly assigned to the control and treatment groups, in a manner which results in comparable... group. (A) A concurrent control group shall be used. This group shall be an untreated or sham treated...
21 CFR 573.640 - Methyl esters of higher fatty acids.
Code of Federal Regulations, 2011 CFR
2011-04-01
... test group and of a concurrent negative control group. The significance of the difference in pericardial fluid volumes between the test group and the negative control group is determined by calculating a... pericardial fluid volumes of the test and control groups, respectively; n t and n c are the number of chicks...
40 CFR 799.9380 - TSCA reproduction and fertility effects.
Code of Federal Regulations, 2013 CFR
2013-07-01
... nonpregnant. (iv) Number of animals. Each control group shall contain a sufficient number of mating pairs to... should be randomly assigned to the control and treatment groups, in a manner which results in comparable... group. (A) A concurrent control group shall be used. This group shall be an untreated or sham treated...
Evaluation of the USDA Northeast Area-wide Tick Control Project by Meta-analysis
USDA-ARS?s Scientific Manuscript database
As part of the Northeast Area-wide Tick Control Project (NEATCP), meta-analyses were performed using pooled data on the extent of tick-vector control achieved through seven concurrent studies, conducted within five states, using USDA ‘4-Poster’ devices to deliver targeted-acaricide to white-tailed d...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
Agostini, Deborah; Vallorani, Luciana; Gioacchini, Annamaria; Guescini, Michele; Casadei, Lucia; Passalia, Annunziata; Del Sal, Marta; Piccoli, Giovanni; Andreani, Mauro; Federici, Ario; Stocchi, Vilberto
2017-01-01
Type 2 diabetes (T2D) is an age-related chronic disease associated with metabolic dysregulation, chronic inflammation, and activation of peripheral blood mononuclear cells (PBMC). The aim of this study was to assess the effects of a concurrent exercise training program on inflammatory status and metabolic parameters of T2D patients. Sixteen male patients (age range 55–70) were randomly assigned to an intervention group (n = 8), which underwent a concurrent aerobic and resistance training program (3 times a week; 16 weeks), or to a control group, which followed physicians' usual diabetes care advices. Training intervention significantly improved patients' body composition, blood pressure, total cholesterol, and overall fitness level. After training, plasma levels of adipokines leptin (−33.9%) and RBP4 (−21.3%), and proinflammatory markers IL-6 (−25.3%), TNF-α (−19.8%) and MCP-1 (−15.3%) decreased, whereas anabolic hormone IGF-1 level increased (+16.4%). All improvements were significantly greater than those of control patients. Plasma proteomic profile of exercised patients showed a reduction of immunoglobulin K light chain and fibrinogen as well. Training also induced a modulation of IL-6, IGF-1, and IGFBP-3 mRNAs in the PBMCs. These findings confirm that concurrent aerobic and resistance training improves T2D-related metabolic abnormalities and has the potential to reduce the deleterious health effects of diabetes-related inflammation. PMID:28713486
Mehta, Ranjana K; Agnew, Michael J
2012-08-01
Most occupational tasks involve some level of mental/cognitive processing in addition to physical work; however, the etiology of work-related musculoskeletal disorders (WMSDs) due to these demands remains unclear. The aim of this study was to quantify the interactive effects of physical and mental workload on muscle endurance, fatigue, and recovery during intermittent work. Twelve participants, balanced by gender, performed intermittent static shoulder abductions to exhaustion at 15, 35, and 55% of individual maximal voluntary contraction (MVC), in the absence (control) and presence (concurrent) of a mental arithmetic task. Changes in muscular capacity were determined using endurance time, strength decline, electromyographic (EMG) fatigue indicators, muscle oxygenation, and heart rate measures. Muscular recovery was quantified through changes in strength and physiological responses. Mental workload was associated with shorter endurance times, specifically at 35% MVC, and greater strength decline. EMG and oxygenation measures showed similar changes during fatigue manifestation during concurrent conditions compared to the control, despite shorter endurance times. Moreover, decreased heart rate variability during concurrent demand conditions indicated increased mental stress. Although strength recovery was not influenced by mental workload, a slower heart rate recovery was observed after concurrent demand conditions. The findings from this study provide fundamental evidence that physical capacity (fatigability and recovery) is adversely affected by mental workload. Thus, it is critical to determine or evaluate occupational demands based on modified muscular capacity (due to mental workload) to reduce risk of WMSD development.
Performing concurrent operations in academic vascular neurosurgery does not affect patient outcomes.
Zygourakis, Corinna C; Lee, Janelle; Barba, Julio; Lobo, Errol; Lawton, Michael T
2017-11-01
OBJECTIVE Concurrent surgeries, also known as "running two rooms" or simultaneous/overlapping operations, have recently come under intense scrutiny. The goal of this study was to evaluate the operative time and outcomes of concurrent versus nonconcurrent vascular neurosurgical procedures. METHODS The authors retrospectively reviewed 1219 procedures performed by 1 vascular neurosurgeon from 2012 to 2015 at the University of California, San Francisco. Data were collected on patient age, sex, severity of illness, risk of mortality, American Society of Anesthesiologists (ASA) status, procedure type, admission type, insurance, transfer source, procedure time, presence of resident or fellow in operating room (OR), number of co-surgeons, estimated blood loss (EBL), concurrent vs nonconcurrent case, severe sepsis, acute respiratory failure, postoperative stroke causing neurological deficit, unplanned return to OR, 30-day mortality, and 30-day unplanned readmission. For aneurysm clipping cases, data were also obtained on intraoperative aneurysm rupture and postoperative residual aneurysm. Chi-square and t-tests were performed to compare concurrent versus nonconcurrent cases, and then mixed-effects models were created to adjust for different procedure types, patient demographics, and clinical indicators between the 2 groups. RESULTS There was a significant difference in procedure type for concurrent (n = 828) versus nonconcurrent (n = 391) cases. Concurrent cases were more likely to be routine/elective admissions (53% vs 35%, p < 0.001) and physician referrals (59% vs 38%, p < 0.001). This difference in patient/case type was also reflected in the lower severity of illness, risk of death, and ASA class in the concurrent versus nonconcurrent cases (p < 0.01). Concurrent cases had significantly longer procedural times (243 vs 213 minutes) and more unplanned 30-day readmissions (5.7% vs 3.1%), but shorter mean length of hospital stay (11.2 vs 13.7 days), higher rates of discharge to home (66% vs 51%), lower 30-day mortality rates (3.1% vs 6.1%), lower rates of acute respiratory failure (4.3% vs 8.2%), and decreased 30-day unplanned returns to the OR (3.3% vs 6.9%; all p < 0.05). Rates of severe sepsis, postoperative stroke, intraoperative aneurysm rupture, and postoperative aneurysm residual were equivalent between the concurrent and nonconcurrent groups (all p values nonsignificant). Mixed-effects models showed that after controlling for procedure type, patient demographics, and clinical indicators, there was no significant difference in acute respiratory failure, severe sepsis, 30-day readmission, postoperative stroke, EBL, length of stay, discharge status, or intraoperative aneurysm rupture between concurrent and nonconcurrent cases. Unplanned return to the OR and 30-day mortality were significantly lower in concurrent cases (odds ratio 0.55, 95% confidence interval 0.31-0.98, p = 0.0431, and odds ratio 0.81, p < 0.001, respectively), but concurrent cases had significantly longer procedure durations (odds ratio 21.73; p < 0.001). CONCLUSIONS Overall, there was a significant difference in the types of concurrent versus nonconcurrent cases, with more routine/elective cases for less sick patients scheduled in an overlapping fashion. After adjusting for patient demographics, procedure type, and clinical indicators, concurrent cases had longer procedure times, but equivalent patient outcomes, as compared with nonconcurrent vascular neurosurgical procedures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants
2017-02-12
group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research
Wickens, Christopher; Colcombe, Angela
2007-10-01
Performance consequences related to integrating an imperfect alert within a complex task domain were examined in two experiments. Cockpit displays of traffic information (CDTIs) are being designed for use in airplane cockpits as responsibility for safe separation becomes shared between pilots and controllers. Of interest in this work is how characteristics of the alarm system such as threshold, modality, and number of alert levels impact concurrent task (flight control) performance and response to potential conflicts. Student pilots performed a tracking task analogous to flight control while simultaneously monitoring for air traffic conflicts with the aid of a CDTI alert as the threshold, modality, and level of alert was varied. As the alerting system became more prone to false alerts, pilot compliance decreased and concurrent performance improved. There was some evidence of auditory preemption with auditory alerts as the false alarm rate increased. Finally, there was no benefit to a three-level system over a two-level system. There is justification for increased false alarm rates, as miss-prone systems appear to be costly. The 4:1 false alarm to miss ratio employed here improved accuracy and concurrent task performance. More research needs to address the potential benefits of likelihood alerting. The issues addressed in this research can be applied to any imperfect alerting system such as in aviation, driving, or air traffic control. It is crucial to understand the performance consequences of new technology and the efficacy of potential mitigating design features within the specific context desired.
Survey of methods for secure connection to the internet
NASA Astrophysics Data System (ADS)
Matsui, Shouichi
1994-04-01
This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.
Cyber secure systems approach for NPP digital control systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCreary, T. J.; Hsu, A.
2006-07-01
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
32 CFR 245.6 - Abbreviations and acronyms.
Code of Federal Regulations, 2010 CFR
2010-07-01
...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD...) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Explanation of Terms, Acronyms and... Order ESCAT—Emergency Security Control of Air Traffic FAA—Federal Aviation Administration IFR—Instrument...
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-08-09
security and control over nuclear weapons and fissile materials. These projects provided Russia with bullet-proof Kevlar blankets, secure canisters ...U.S. security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early...U.S.-Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and
Digitally Controlled ’Programmable’ Active Filters.
1985-12-01
Advisor: Sherif Michael Approved for public release; distribution is unlimited. U - ~ .%~ ~ % %’.4 ~ -. 4-. " %’ -. .4. z. . 4, ,4°*-4° -o - ’ SECURITY ...CLASSIFICATION O THI PAGE ff ,’- -""" REPORT DOCUMENTATION PAGE Ia REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a SECURITY CLASSIFICATION...ELEMENT NO. NO NO. ACCESSION NO. S 11 TITLE (Include Security ClassWfication) , DIGITALLY CONTROLLED "PROGRAMMABLE" ACTIVE FILTERS 1 PERSONAL AUTHOR
33 CFR 101.405 - Maritime Security (MARSEC) Directives.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
Taking Steps to Protect Against the Insider Threat
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Noah Gale; Williams, Martha; Lewis, Joel
2015-10-16
Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse ofmore » equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.« less
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Zimmermann, Peter; Spangler, Gottfried
2016-01-01
Adolescence is a time of increased emotionality and major changes in emotion regulation often elicited in autonomy-relevant situations. Both genetic as well as social factors may lead to inter-individual differences in emotional processes in adolescence. We investigated whether both 5-HTTLPR and attachment security influence adolescents’ observed emotionality, emotional dysregulation, and their aggressive hostile autonomy while interacting with their mothers. Eighty-eight adolescents at age 12 were observed in interaction with their mothers during a standardized, emotion eliciting computer game task. They were genotyped for the 5-HTTLPR, a repeat polymorphism in the promoter region of the serotonin transporter gene. Concurrent attachment quality was assessed by the Late Childhood Attachment Interview (LCAI). Results revealed a significant gene × attachment effect showing that ss/sl carriers of 5-HTTLPR show increased emotional dysregulation and aggressive hostile autonomy towards their mothers. The results of the study suggest that secure attachment in adolescence moderates the genetically based higher tendency for emotional dysregulation and aggressive reactions to restrictions of autonomy during emotional social interactions with their mothers. PMID:27378877
Cyberspace modernization. An interest protocol planning advisory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.; McLane, Victor N.
A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less
Infant Humor Perception from 3- to 6-months and Attachment at One Year
Mireault, Gina; Sparrow, John; Poutre, Merlin; Perdue, Brittany; Macke, Laura
2012-01-01
Infancy is a critical time for the development of secure attachment, which is facilitated by emotionally synchronous interactions with parents. Humor development, which includes shared laughter and joint attention to an event, emerges concurrently with attachment, but little is known regarding the relationship, if any, between humor development and attachment in the first year. Thirty 3-month-old infants were videoed at home each month until they were 6-months old while their parents attempted to amuse them. Frequency of infants’ smiles and laughs served as a measure of “state humor”, and the smiling/laughing subscale of the Infant Behavior Questionnaire-Revised served as a measure of “trait humor”. State and trait humor were not correlated. Lower trait humor as 6 months predicted higher attachment security on the Attachment Q-sort at 12-months (r=. 46), suggesting that less good-humored infants elicit greater parental engagement, which works to the benefit of attachment, or vice versa. Future studies should examine the importance of smiling and laughter as they relate to other developmental phenomena in the first year. PMID:22982281
Zimmermann, Peter; Spangler, Gottfried
2016-01-01
Adolescence is a time of increased emotionality and major changes in emotion regulation often elicited in autonomy-relevant situations. Both genetic as well as social factors may lead to inter-individual differences in emotional processes in adolescence. We investigated whether both 5-HTTLPR and attachment security influence adolescents' observed emotionality, emotional dysregulation, and their aggressive hostile autonomy while interacting with their mothers. Eighty-eight adolescents at age 12 were observed in interaction with their mothers during a standardized, emotion eliciting computer game task. They were genotyped for the 5-HTTLPR, a repeat polymorphism in the promoter region of the serotonin transporter gene. Concurrent attachment quality was assessed by the Late Childhood Attachment Interview (LCAI). Results revealed a significant gene × attachment effect showing that ss/sl carriers of 5-HTTLPR show increased emotional dysregulation and aggressive hostile autonomy towards their mothers. The results of the study suggest that secure attachment in adolescence moderates the genetically based higher tendency for emotional dysregulation and aggressive reactions to restrictions of autonomy during emotional social interactions with their mothers.
Infant humor perception from 3- to 6-months and attachment at one year.
Mireault, Gina; Sparrow, John; Poutre, Merlin; Perdue, Brittany; Macke, Laura
2012-12-01
Infancy is a critical time for the development of secure attachment, which is facilitated by emotionally synchronous interactions with parents. Humor development, which includes shared laughter and joint attention to an event, emerges concurrently with attachment, but little is known regarding the relationship, if any, between humor development and attachment in the first year. Thirty 3-month-old infants were videoed at home each month until they were 6-months old while their parents attempted to amuse them. Frequency of infants' smiles and laughs served as a measure of "state humor", and the smiling/laughing subscale of the Infant Behavior Questionnaire-Revised served as a measure of "trait humor". State and trait humor were not correlated. Lower trait humor as 6 months predicted higher attachment security on the Attachment Q-sort at 12-months (r=.46), suggesting that less good-humored infants elicit greater parental engagement, which works to the benefit of attachment, or vice versa. Future studies should examine the importance of smiling and laughter as they relate to other developmental phenomena in the first year. Published by Elsevier Inc.
32 CFR 2700.42 - Responsibility for safeguarding classified information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... responsibility. (b) Security and Top Secret Control Officers. The Director, OMSN, and the Status Liaison Officer, Saipan, are assigned specific security responsibilities as Security Officer and Top Secret Control Officer. (c) Handling. All documents bearing the terms “Top Secret,” “Secret” and “Confidential” shall be...
Code of Federal Regulations, 2010 CFR
2010-01-01
... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...
On the road again: concurrency and condom use among Uganda truck drivers.
Costenbader, Elizabeth C; Lancaster, Kathryn; Bufumbo, Leonard; Akol, Angela; Guest, Greg
2015-01-01
Long-distance truck drivers have been shown to be a critical population in the spread of HIV in Africa. In 2009, surveys with 385 Ugandan long-distance truck drivers measured concurrency point prevalence with two methods; it ranged from 37.4% (calendar-method) to 50.1% (direct question). The majority (84%) of relationships reported were long-term resulting in a long duration of overlap (average of 58 months) across concurrent partnerships. Only 7% of these men reported using any condoms with their spouses during the past month. Among all non-spousal relationships, duration of relationship was the factor most strongly associated with engaging in unprotected sex in the past month in a multivariable analyses controlling for partner and relationship characteristics. Innovative intervention programs for these men and their partners are needed that address the realities of truck drivers' lifestyles.
NASA Astrophysics Data System (ADS)
Angang, Zhang; Zifei, Fan; Lun, Zhao; Jincai, Wang; Xiangzhong, Zhang; Heng, Song; Qingying, Hou
2018-06-01
The central layer Yu-III in Akshabulak oilfield is a sandstone reservoir with strong edge water, whose major development characteristics are high oil recovery rate and heterogeneous water invasion. Aiming at this problem, the development policy chart of concurrent displacement of natural water and injected water is established on the basis of material balance principle. Injection-production ratio and oil recovery rate are the main controlling factors for the concurrent displacement of natural water and injected water. Each injection-production ratio corresponds with only one rational oil recovery rate, and the rational oil recovery rate increases with the injection-production ratio. When the actual injection-production ratio of the central Yu-III reservoir is 0.9, the rational oil recovery rate should be 4%.
Time takes space: selective effects of multitasking on concurrent spatial processing.
Mäntylä, Timo; Coni, Valentina; Kubik, Veit; Todorov, Ivo; Del Missier, Fabio
2017-08-01
Many everyday activities require coordination and monitoring of complex relations of future goals and deadlines. Cognitive offloading may provide an efficient strategy for reducing control demands by representing future goals and deadlines as a pattern of spatial relations. We tested the hypothesis that multiple-task monitoring involves time-to-space transformational processes, and that these spatial effects are selective with greater demands on coordinate (metric) than categorical (nonmetric) spatial relation processing. Participants completed a multitasking session in which they monitored four series of deadlines, running on different time scales, while making concurrent coordinate or categorical spatial judgments. We expected and found that multitasking taxes concurrent coordinate, but not categorical, spatial processing. Furthermore, males showed a better multitasking performance than females. These findings provide novel experimental evidence for the hypothesis that efficient multitasking involves metric relational processing.
Fredricks, Jennifer A; Eccles, Jacquelynne S
2006-07-01
The authors examined the relations between participation in a range of high school extracurricular contexts and developmental outcomes in adolescence and young adulthood among an economically diverse sample of African American and European American youths. In general, when some prior self-selection factors were controlled, 11th graders' participation in school clubs and organized sports was associated with concurrent indicators of academic and psychological adjustment and with drug and alcohol use. In addition, participation in 11th grade school clubs and prosocial activities was associated with educational status and civic engagement at 1 year after high school. A few of the concurrent and longitudinal relations between activity participation and development were moderated by race and gender. Finally, breadth of participation, or number of activity contexts, was associated with positive academic, psychological, and behavioral outcomes.
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2013 CFR
2013-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2012 CFR
2012-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2011 CFR
2011-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2014 CFR
2014-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
Information-Flow-Based Access Control for Web Browsers
NASA Astrophysics Data System (ADS)
Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu
The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.
India’s Emerging Security Strategy, Missile Defense, and Arms Control
2004-06-01
and contemplate a security strategy. Starting in July 1998, a series of negotiations between Foreign Minister Jaswant Singh and US envoy Strobe...arms control.46 The Singh -Talbott discussions eventually led to the reaffirmation of civilian command-and-control and a doctrine of “minimum...Council (NSC), including Prime Minister Vajpayee, Minister of Foreign Affairs Singh , and Minister of Defense Fernandes, and appointed a National Security
Controlled Secure Direct Communication with Seven-Qubit Entangled States
NASA Astrophysics Data System (ADS)
Wang, Shu-Kai; Zha, Xin-Wei; Wu, Hao
2018-01-01
In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure.
NASA Astrophysics Data System (ADS)
Semiatin, S. L.; Fagin, P. N.; Goetz, R. L.; Furrer, D. U.; Dutton, R. E.
2015-09-01
The plastic-flow behavior which controls the formation of bulk residual stresses during final heat treatment of powder-metallurgy (PM), nickel-base superalloys was quantified using conventional (isothermal) stress-relaxation (SR) tests and a novel approach which simulates concurrent temperature and strain transients during cooling following solution treatment. The concurrent cooling/straining test involves characterization of the thermal compliance of the test sample. In turn, this information is used to program the ram-displacement- vs-time profile to impose a constant plastic strain rate during cooling. To demonstrate the efficacy of the new approach, SR tests (in both tension and compression) and concurrent cooling/tension-straining experiments were performed on two PM superalloys, LSHR and IN-100. The isothermal SR experiments were conducted at a series of temperatures between 1144 K and 1436 K (871 °C and 1163 °C) on samples that had been supersolvus solution treated and cooled slowly or rapidly to produce starting microstructures comprising coarse gamma grains and coarse or fine secondary gamma-prime precipitates, respectively. The concurrent cooling/straining tests comprised supersolvus solution treatment and various combinations of subsequent cooling rate and plastic strain rate. Comparison of flow-stress data from the SR and concurrent cooling/straining tests showed some similarities and some differences which were explained in the context of the size of the gamma-prime precipitates and the evolution of dislocation substructure. The magnitude of the effect of concurrent deformation during cooling on gamma-prime precipitation was also quantified experimentally and theoretically.
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 3
2009-04-01
international standard for information security management systems like ISO /IEC 27001 :2005 [1] existed. Since that time, the organization has developed control...of ISO /IEC 27001 and the desire to make decisions based on business value and risk has prompted Ford’s IT Security and Controls organi- zation to begin...their conventional application security operation.u References 1. ISO /IEC 27001 :2005. “Information Technology – Security Techniques – Information
How to implement security controls for an information security program at CBRN facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.
This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in anmore » easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.« less
Siemens, Frederike C; van Haaften, Carolien; Kuijpers, Johan C; Helmerhorst, Theo J M; Boon, Mathilde E
2006-01-01
To assess, in a longitudinal study in women diagnosed with high grade squamous epithelial lesion (HSIL), the progression over time of proliferative activity in reserve cells using population screening cervical cytology specimens. Twenty consecutive, unselected patients with HSIL lesions were part of the national cervical screening program. From the archives, for each patient, the last prior normal population screening smear was included in the study. Concurrent sets of cervical smears from 80 age-matched women without pathology formed the controls. The original slides were stained using MIB-1 monoclonal antibody. The fraction of MIB-1-positive reserve cells was assessed using systematic random sampling and running progressive means assessment to ensure a sufficient sample size. The proliferation fraction in reserve cells of HSIL patients was significantly raised (mean, 65.0%; range, 53.5-94.1%; p < 0.01) as compared with that in concurrent controls (mean, 12.8%; range, 1.9-45.4%). Prior smears from HSIL patients, although without morphologic abnormalities, had abnormally high proliferation fractions (mean, 59.1%; range, 1.0-94.7%), significantly raised over those from concurrent controls (mean, 9.4%; range In population-based cervical smear screening, HSIL patients already have abnormally raised proliferation fractions of reserve cells, even without morphologic changes in squamous cells, 1-5 (mean, 3.6) years prior to diagnosis.
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
A game-theoretical approach to multimedia social networks security.
Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong
2014-01-01
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.
A Game-Theoretical Approach to Multimedia Social Networks Security
Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong
2014-01-01
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226
Quek, June; Brauer, Sandra G; Treleaven, Julia; Pua, Yong-Hao; Mentiplay, Benjamin; Clark, Ross Allan
2014-04-17
Concurrent validity and intra-rater reliability using a customized Android phone application to measure cervical-spine range-of-motion (ROM) has not been previously validated against a gold-standard three-dimensional motion analysis (3DMA) system. Twenty-one healthy individuals (age:31 ± 9.1 years, male:11) participated, with 16 re-examined for intra-rater reliability 1-7 days later. An Android phone was fixed on a helmet, which was then securely fastened on the participant's head. Cervical-spine ROM in flexion, extension, lateral flexion and rotation were performed in sitting with concurrent measurements obtained from both a 3DMA system and the phone.The phone demonstrated moderate to excellent (ICC = 0.53-0.98, Spearman ρ = 0.52-0.98) concurrent validity for ROM measurements in cervical flexion, extension, lateral-flexion and rotation. However, cervical rotation demonstrated both proportional and fixed bias. Excellent intra-rater reliability was demonstrated for cervical flexion, extension and lateral flexion (ICC = 0.82-0.90), but poor for right- and left-rotation (ICC = 0.05-0.33) using the phone. Possible reasons for the outcome are that flexion, extension and lateral-flexion measurements are detected by gravity-dependent accelerometers while rotation measurements are detected by the magnetometer which can be adversely affected by surrounding magnetic fields. The results of this study demonstrate that the tested Android phone application is valid and reliable to measure ROM of the cervical-spine in flexion, extension and lateral-flexion but not in rotation likely due to magnetic interference. The clinical implication of this study is that therapists should be mindful of the plane of measurement when using the Android phone to measure ROM of the cervical-spine.
2014-01-01
Background Concurrent validity and intra-rater reliability using a customized Android phone application to measure cervical-spine range-of-motion (ROM) has not been previously validated against a gold-standard three-dimensional motion analysis (3DMA) system. Findings Twenty-one healthy individuals (age:31 ± 9.1 years, male:11) participated, with 16 re-examined for intra-rater reliability 1–7 days later. An Android phone was fixed on a helmet, which was then securely fastened on the participant’s head. Cervical-spine ROM in flexion, extension, lateral flexion and rotation were performed in sitting with concurrent measurements obtained from both a 3DMA system and the phone. The phone demonstrated moderate to excellent (ICC = 0.53-0.98, Spearman ρ = 0.52-0.98) concurrent validity for ROM measurements in cervical flexion, extension, lateral-flexion and rotation. However, cervical rotation demonstrated both proportional and fixed bias. Excellent intra-rater reliability was demonstrated for cervical flexion, extension and lateral flexion (ICC = 0.82-0.90), but poor for right- and left-rotation (ICC = 0.05-0.33) using the phone. Possible reasons for the outcome are that flexion, extension and lateral-flexion measurements are detected by gravity-dependent accelerometers while rotation measurements are detected by the magnetometer which can be adversely affected by surrounding magnetic fields. Conclusion The results of this study demonstrate that the tested Android phone application is valid and reliable to measure ROM of the cervical-spine in flexion, extension and lateral-flexion but not in rotation likely due to magnetic interference. The clinical implication of this study is that therapists should be mindful of the plane of measurement when using the Android phone to measure ROM of the cervical-spine. PMID:24742001
The Contribution of Inhibitory Control to Preschoolers' Social-Emotional Competence
ERIC Educational Resources Information Center
Rhoades, Brittany L.; Greenberg, Mark T.; Domitrovich, Celene E.
2009-01-01
Social-emotional competence is a key developmental task during early childhood. This study examined concurrent relationships between maternal education and employment status, children's sex, ethnicity, age, receptive vocabulary, emotional knowledge, attention skills, inhibitory control and social-emotional competence in a sample of 146 preschool,…
40 CFR 85.2230 - Steady state test dynamometer-EPA 91.
Code of Federal Regulations, 2010 CFR
2010-07-01
... PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Emission Control System Performance... applicability. The requirements of § 85.2229 apply concurrently for tests conducted under Emission Performance... capable of applying a load to the vehicle's driving tire surfaces at the horsepower and speed levels...
Using a Self-Control Training Procedure To Increase Appropriate Behavior.
ERIC Educational Resources Information Center
Dixon, Mark R.; Hayes, Linda J.; Binder, Lisa M.; Manthey, Sharon; Sigman, Connie; Zdanowski, Darlene M.
1998-01-01
A study evaluated teaching a technique for self-control to three adults with developmental disabilities. Concurrent fixed-duration/progressive-duration reinforcement schedules were introduced in which both smaller and larger reinforcers were available immediately. When progressively increasing delays were introduced for the larger reinforcer,…
CAS. Controlled Access Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martinez, B.; Pomeroy, G.
1989-12-01
The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.
IT Security Support for Spaceport Command and Control System
NASA Technical Reports Server (NTRS)
McLain, Jeffrey
2013-01-01
During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.
5 CFR 1312.31 - Security violations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...
6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...
6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO WEST. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO
7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...
7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO NORTH. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO
Mesich, M L L; Mayhew, P D; Paek, M; Holt, D E; Brown, D C
2009-12-01
To investigate the relationship between endocrinopathies and diagnosis of gall bladder mucocele in dogs via a retrospective case-control study. Records of 78 dogs with a surgical or ultrasonographic diagnosis of gall bladder mucocele were examined for the presence or absence of hyperadrenocorticism, hypothyroidism and diabetes mellitus. Two age- and breed-matched controls for each gall bladder mucocele dog (156 total control dogs) were examined for the same concurrent diseases. A matched case-control analysis was performed using conditional logistic regression. The odds of mucocele in dogs with hyperadrenocorticism were 29 times that of dogs without hyperadrenocorticism (P=0.001; 95 per cent CI 3.8, 219.9). No difference was found between dogs with and without diabetes mellitus. Although a significant association was found between gall bladder mucocele and hypothyroidism, potential observation bias was also identifi ed. Hyperadrenocorticoid dogs that were presented for acute illness with laboratory evidence of hepatobiliary disease should undergo evaluation for the presence of a biliary mucocele. Dogs diagnosed with a gall bladder mucocele should be screened for concurrent hyperadrenocorticism if clinical suspicion exists.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-24
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control No. 1615... Employment Eligibility Verification; OMB Control No. 1615- 0112. The Department of Homeland Security, U.S..., should be directed to the Department of Homeland Security (DHS), and to the Office of Management and...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
NASA Astrophysics Data System (ADS)
Tan, Xiaoqing; Zhang, Xiaoqian
2016-05-01
We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.
From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication
NASA Astrophysics Data System (ADS)
Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San
Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Mangum, Kevin
2016-01-01
The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-29
... Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation Security.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Pipeline Corporate Security Review (PCSR) Protocol...
Bedwell, Rebecca M.; Spielvogel, Hilde; Bellido, Diva
2017-01-01
The persistently high prevalence of anemia in rural highland Bolivia argues for targeted iron supplementation. We evaluated the cultural, structural and behavioral factors that may facilitate or impede an anemic woman's decision to secure this biomedical treatment from a rural Bolivian health center. Methods Non-pregnant women from a rural town and its surrounding region were tested for anemia. During phase 1 (n = 181), anemic women received a written recommendation for low-cost purchase of iron pills at the nearest health center. They were subsequently interviewed on their actions and experiences. Results Estimated anemia prevalence among these non-pregnant women was 50% higher than the national average. Despite holding conceptualizations of anemia generally aligned with biomedical concepts, only 40% of anemic women attempted to obtain iron supplements from the health center. Town residents were about twice as likely to attempt to purchase pills as outside-town residents. Town women who were concurrently breastfeeding and menstruating, considered anemia most serious for women, and considered family health the shared responsibility of spouses were most likely to decide to purchase iron pills. Age, education, or native language did not negatively influence this health care behavior. Conclusions Securing iron supplements involves individual trade-offs in the allocation of time, cost and effort. Nonetheless, suitably tailored programs can potentially harness local perceptions in the service of reducing anemia. Because of their comparatively high motivation to obtain iron supplements, targeting concurrently breastfeeding and menstruating women could have a positive cascade effect such that these women continue attending to their iron needs once they stop breastfeeding and if they become pregnant again. Because a sense of shared responsibility for family health appears to encourage women to attend to their own health, programs for women could involve their spouses. Complementing centralized availability, biomedical and traditional healers could distribute iron supplements on rotating visits to outlying areas and/or at highly attended weekly markets. PMID:28125636
Mohammadianpanah, Mohammad; Ashouri, Yaghoub; Hoseini, Sare; Amadloo, Niloofar; Talei, Abdolrasoul; Tahmasebi, Sedigheh; Nasrolahi, Hamid; Mosalaei, Ahmad; Omidvari, Shapour; Ansari, Mansour; Mosleh-Shirazi, Mohammad Amin
2012-04-01
This two-arm randomized clinical study aimed to evaluate the efficacy and safety of neoadjuvant concurrent chemotherapy and letrozole in postmenopausal women with locally advanced breast carcinoma. One hundred and one postmenopausal women aged 50-83 years with pathologically proven locally advanced (clinical stage T3, T4 and/or N2, N3) breast cancer were randomly assigned to receive neoadjuvant chemotherapy alone (control arm, n = 51) or neoadjuvant chemotherapy concurrent with letrozole 2.5 mg (study arm, n = 50). Chemotherapy consisted of a median 4 (range 3-5) cycles of intravenous 5-fluorouracil 600 mg/m(2), doxorubicin 60 mg/m(2), and cyclophosphamide 600 mg/m(2), every three weeks. All patients subsequently underwent modified radical mastectomy approximately two weeks after the last cycle of chemotherapy. Pathologic complete response rates were 25.5% and 10.2% in the study and the control group, respectively (P = 0.049). Similarly, clinical complete response rates were 27.6% and 10.2% in the study and the control group, respectively (P = 0.037). In the subgroup analysis of hormone receptor-positive cases, the complete response rates were more prominent in study group compared with control group. Common treatment-related side effects such as nausea, vomiting, bone marrow suppression, and mucositis were similar in both groups, but hot flush was more prevalent in study group compared with control group (P = 0.023). The addition of letrozole concurrently with neoadjuvant chemotherapy provides a higher clinical and pathologic response rates with acceptable toxicity compared with chemotherapy alone in postmenopausal women with locally advanced sensitive breast cancer.