Homeland Security. Management Challenges Facing Federal Leadership
2002-12-01
Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future
2004-05-03
A special thanks to all of these folks (Glenn Starnes, Lee Gutierrez, Bill Rapp, Joel Hillison, Carlos Gomez, Steve Fraunfelter, Janie Hopkins, Dave ...DiClemente, Joe Nunez, John Bonin , and Steve Nerheim). viii INFORMATION TECHNOLOGY CHALLENGES FACING THE STRATEGIC LEADERS OF HOMELAND SECURITY IN THE 21ST
Privacy, security and access with sensitive health information.
Croll, Peter
2010-01-01
This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
Practical challenges in quantum key distribution
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...
2016-11-08
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Practical challenges in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Reforming a Breadwinner Welfare State: Gender, Race, Class, and Social Security Reform
ERIC Educational Resources Information Center
Herd, Pamela
2005-01-01
A key challenge facing western welfare states is that they offset income risks faced by those in breadwinner families. Social Security is an excellent example. It best protects individuals with lengthy work histories or individuals who get married, stay married, and are never employed. Most women fit neither model. Thus, I analyze…
AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges
2002-07-25
circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify
Challenges and Security in Cloud Computing
NASA Astrophysics Data System (ADS)
Chang, Hyokyung; Choi, Euiin
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
2010-11-30
legislature should help the government secure approval of its policy agenda, the political crisis left the new President with daunting challenges...The Lobo government faces significant challenges in fostering economic development in one of the hemisphere’s poorest countries; securing...indicators. The government has little room to address these issues as the country’s fiscal balance has deteriorated in recent years despite benefiting
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
2014-12-12
and military doctrines , all contribute to slowing down the process of military integration in Southeast Asia. This thesis will argue for the...prevented Cambodia from playing a more constructive part in the ASEAN security stage. Indonesia, an archipelagic state with a thousand islands, is the...second largest archipelagic state in Southeast Asia, faces many security challenges. As a “typhoon-torn” country, it will benefit from a stronger
Shared Electronic Health Record Systems: Key Legal and Security Challenges.
Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M
2017-11-01
Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.
Tyfield, David
2011-07-01
There is a growing consensus that we are facing epochal challenges in global food security. Moreover, these challenges are multiple and complex. Meeting these challenges will involve nothing less than a wholesale socio-technical transition of the agri-food system. Optimizing the efficacy of the contribution of research to such a food security agenda will probably also need new institutional mechanisms and career structures to facilitate new kinds of collaborations and ongoing, longer-term projects. In short, the multiple challenges of food security demand a different political economy of research for effective intervention by science. In making this argument, the paper summarizes the major findings of a recent report regarding the potential impact of so-called 'disruptive' low-carbon innovations in China.
Threats to US energy security: the challenge of Arab oil
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.
1979-08-13
Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.
National Security Policy and Security Challenges of Maldives
2014-06-13
creates the true problems the Maldivians are currently facing. Hidden agendas, unprofessionalism, and low ethical standards of politicians and...based on sharia law. The theories of cultural relativism and democracy strongly advocate the freedoms of societies, thus the Maldivian decision as a
DOT National Transportation Integrated Search
1997-03-06
This testimony discusses key resource management issues and performance challenges facing the Department of Transportation in 1998 and beyond. 1. Increased safety and security concerns prompted by accidents and maintenance issues. 2. Important manage...
Risk in the Clouds?: Security Issues Facing Government Use of Cloud Computing
NASA Astrophysics Data System (ADS)
Wyld, David C.
Cloud computing is poised to become one of the most important and fundamental shifts in how computing is consumed and used. Forecasts show that government will play a lead role in adopting cloud computing - for data storage, applications, and processing power, as IT executives seek to maximize their returns on limited procurement budgets in these challenging economic times. After an overview of the cloud computing concept, this article explores the security issues facing public sector use of cloud computing and looks to the risk and benefits of shifting to cloud-based models. It concludes with an analysis of the challenges that lie ahead for government use of cloud resources.
2011-10-01
said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most
National Security and Global Climate Change
2008-01-01
The uncertainty, confusion, and speculation about the causes, effects, and implications of global climate change (GCC) often paralyze serious...against scientific indications of global climate change , but to consider how it would pose challenges to national security, explore options for facing...generals and admirals, released a report concluding that projected climate change poses a serious threat to America’s national security. This article
King, Laura; Rukh-Kamaa, Aneer
2013-01-01
Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.
Lawlis, Tanya; Islam, Wasima; Upton, Penney
2018-04-01
Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.
Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011
2011-01-01
the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional
Joint Schemes for Physical Layer Security and Error Correction
ERIC Educational Resources Information Center
Adamo, Oluwayomi
2011-01-01
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
78 FR 28707 - National Defense Transportation Day and National Transportation Week, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-15
... challenges we face. We need to restore our roads, bridges, and ports-- transportation networks that are... security. At a time when our cities face unprecedented threats and hazards, we must do more to ensure our... infrastructure. In recognition of the importance of our Nation's transportation infrastructure, and of the men...
Government Certification and Accreditation: Make a Choice
ERIC Educational Resources Information Center
Miles, Tracy L.
2009-01-01
One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…
Issues and Challenges Facing the Minority Woman Dentist.
ERIC Educational Resources Information Center
Sinkford, Jeanne C.
1992-01-01
The status of minority women dentists is reviewed, and initiatives to improve it are noted. Issues and challenges for African-American female dentists are outlined, including negative racial/gender stereotypes, lack of advancement opportunities, difficulties in starting practices and securing professional and social support systems, lack of…
Efficient live face detection to counter spoof attack in face recognition systems
NASA Astrophysics Data System (ADS)
Biswas, Bikram Kumar; Alam, Mohammad S.
2015-03-01
Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.
He, Ying; Johnson, Chris
2017-12-01
Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.
Let's talk conflict: using mediation in healthcare security disputes.
Armstrong, Brad
2013-01-01
Healthcare security administrators face weekly, if not daily challenges and conflict. This article considers that security leaders must anticipate disputes in highly complex healthcare systems. When disputes cannot be resolved by organizational efforts, security administrators may be in a position to recommend or participate in mediation. Here the concept of mediation is introduced to healthcare security leaders as a viable means to resolve disputes with patients, visitors, and the community. This includes a description of the facilitative versus evaluative mediation processes, as well as pragmatic guidance when preparing for mediation.
Learning That Makes a Difference: Pedagogy and Practice for Learning Abroad
ERIC Educational Resources Information Center
Benham Rennick, Joanne
2015-01-01
Society faces significant new challenges surrounding issues in human health; global security; environmental devastation; human rights violations; economic uncertainty; population explosion and regression; recognition of diversity, difference and special populations at home and abroad. In light of these challenges, there is a great opportunity, and…
Diverting the Radicalization Track
ERIC Educational Resources Information Center
Cohen, Jared A.
2009-01-01
The struggle against violent extremism is the most significant national-security challenge of the 21st century. It is the challenge that makes all the threats Americans face that much more dangerous. The ungoverned spaces, urban slums, and impoverished regions of the Middle East, Asia, and Africa, along with the poorly integrated immigrant…
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
NASA Astrophysics Data System (ADS)
Fleischmann, Kenneth R.
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
ERIC Educational Resources Information Center
Hess, Cynthia; Krohn, Sylvia; Reichlin, Lindsey; Román, Stephanie; Gault, Barbara
2014-01-01
Community colleges are a critical resource for women seeking to achieve economic security and stability, yet many women who are community college students face challenges that make it difficult to persist in their education and complete their degrees. To understand the circumstances and experiences of female community college students in…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
...: Background Ensuring cargo security as it flows through supply chains is a challenge faced by industry and... into the supply chain while facilitating the flow of legal commerce. A solution that provides greater security and facilitation of legal commerce is tracking the cargo conveyance as it moves through the supply...
What We Can Learn from the Suits
ERIC Educational Resources Information Center
Panettieri, Joseph C.
2006-01-01
This article discusses what colleges and universities can learn from Uncle Sam and corporate America when it comes to designing secure networks and ensuring privacy. After all, schools face many of the same privacy and information security challenges seen in the business and government sectors. The fact of the matter is, in the age of cyber crime…
Web Server Security on Open Source Environments
NASA Astrophysics Data System (ADS)
Gkoutzelis, Dimitrios X.; Sardis, Manolis S.
Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.
Small-Scale Farming in Semi-Arid Areas: Livelihood Dynamics between 1997 and 2010 in Laikipia, Kenya
ERIC Educational Resources Information Center
Ulrich, Anne; Speranza, Chinwe Ifejika; Roden, Paul; Kiteme, Boniface; Wiesmann, Urs; Nusser, Marcus
2012-01-01
The rural population of semi-arid lands in Kenya face multiple challenges that result from population growth, poor markets, land use and climatic changes. In particular, subsistence oriented farmers face various risks and opportunities in their attempt to secure their livelihoods. This paper presents an analysis on how livelihood assets and…
3 CFR 8977 - Proclamation 8977 of May 10, 2013. National Defense Transportation Day and National...
Code of Federal Regulations, 2014 CFR
2014-01-01
... resilient to the challenges we face. We need to restore our roads, bridges, and ports—transportation...—it is about security. At a time when our cities face unprecedented threats and hazards, we must do... infrastructure. In recognition of the importance of our Nation's transportation infrastructure, and of the men...
Economic performance of water storage capacity expansion for food security
NASA Astrophysics Data System (ADS)
Gohar, Abdelaziz A.; Ward, Frank A.; Amer, Saud A.
2013-03-01
SummaryContinued climate variability, population growth, and rising food prices present ongoing challenges for achieving food and water security in poor countries that lack adequate water infrastructure. Undeveloped storage infrastructure presents a special challenge in northern Afghanistan, where food security is undermined by highly variable water supplies, inefficient water allocation rules, and a damaged irrigation system due three decades of war and conflict. Little peer-reviewed research to date has analyzed the economic benefits of water storage capacity expansions as a mechanism to sustain food security over long periods of variable climate and growing food demands needed to feed growing populations. This paper develops and applies an integrated water resources management framework that analyzes impacts of storage capacity expansions for sustaining farm income and food security in the face of highly fluctuating water supplies. Findings illustrate that in Afghanistan's Balkh Basin, total farm income and food security from crop irrigation increase, but at a declining rate as water storage capacity increases from zero to an amount equal to six times the basin's long term water supply. Total farm income increases by 21%, 41%, and 42% for small, medium, and large reservoir capacity, respectively, compared to the existing irrigation system unassisted by reservoir storage capacity. Results provide a framework to target water infrastructure investments that improve food security for river basins in the world's dry regions with low existing storage capacity that face ongoing climate variability and increased demands for food security for growing populations.
Challenges and Responses to Asian Food Security
NASA Astrophysics Data System (ADS)
Teng, Paul P. S.; Oliveros, Jurise A. P.
2015-10-01
Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.
Ekeoduru, Rhashedah A; Greives, Matthew R; Nesrsta, Eric A
2017-02-15
A former 25-week-old neonate presented at 34 weeks postconceptual age with necrotizing fasciitis and purpura fulminans because of Group B Streptococcus infection. He was septic and coagulopathic when he was intubated, and the endotracheal tube was secured with adhesives. When he subsequently developed large purpuric, bullous lesions on the face and neck, he presented to the operating room for excision and debridement of his facial lesions. No change was made in how the endotracheal tube was secured. Midprocedure, an unintentional extubation occurred. We describe how we subsequently secured the airway and make recommendations on how to avoid this problem in the future and for rescue preparation before the procedure.
Aligning Postsecondary Education with Regional Workforce Needs: A Tale of Two States
ERIC Educational Resources Information Center
Barkanic, Stephen
2016-01-01
The United States faces a pressing national security and competitiveness challenge rooted in a shortage of a diverse, highly skilled workforce, particularly in vital cross-disciplinary fields such as data science and analytics, cybersecurity, and information technology. To address this challenge, Business-Higher Education Forum (BHEF) launched the…
Remote sensing applications of wildland fire and air quality in China
John J. Qu; Xianjun Hao; Yongqiang Liu; Allen R. Riebau; Haoruo Yi; Xianlin Qin
2009-01-01
As one of the most populous and geographically largest countries, China faces many problems including industrial growth, economic sustainability, food security, climate change, and air pollution. Interwoven with these challenges,...
Maddali, Madan Mohan; Al Balushi, Faisal Khalfan Ahmed; Waje, Niranjan Dilip
2016-02-01
Large head and neck teratomas are very rare. Depending on their site of origin, they can produce varying degrees of airway compromise and can interfere with the conduct of general anesthesia. Large space-occupying lesions of the face may even interfere with the simple task of mask ventilation rendering inhaled induction of general anesthesia and maintenance of spontaneous ventilation difficult. If these neoplasms coexist with cardiac lesions necessitating corrective or palliative procedures, the task of oxygenation, ventilation, and securing a definitive airway becomes challenging especially in the presence of underlying unstable hemodynamics. We report on the anesthetic management of a female infant with a facial teratoma and single-ventricle physiology undergoing a cardiac palliative procedure where securing a definitive airway with minimal hemodynamic instability was the immediate requirement.
PRISM, Volume 6, Number 1, 2016: Women, Peace and Inclusive Security
2016-03-01
Operations. PRISM is a security studies journal chartered to inform members of U.S. Federal agencies, allies, and other partners on complex and...thrown the national security community into disarray. Faced with such diverse challenges, the U.S. and its allies must step up with a response equally...pool? PRISM is not a journal of advocacy, but rather a venue for informed and rational discourse. The Editors’ goal is to further American and
Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven
2013-08-01
Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that addresses multiple objectives is required now more than ever. © 2013 John Wiley & Sons Ltd.
90 Seconds of Discovery: Fast Pyrolysis
Weber, Robert; Elliot, Douglas
2018-01-16
Fossil fuels have provided a time-proven, energy-dense fuel for more than a century. The challenge facing America today is developing alternatives that work within our existing infrastructure; to decrease environmental impact; and to increase energy security.
Medical cyber-physical systems: A survey.
Dey, Nilanjan; Ashour, Amira S; Shi, Fuqian; Fong, Simon James; Tavares, João Manuel R S
2018-03-10
Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD) systems to increase the efficiency and safety of the healthcare. It also can assist the specialists of medical device to overcome crucial issues related to medical devices, and the challenges facing the design of the medical device's network. The concept of the social networking and its security along with the concept of the wireless sensor networks (WSNs) are addressed. Afterward, the CPS systems and platforms have been established, where more focus was directed toward CPS-based healthcare. The big data framework of CPSs is also included.
A Sort of Homecoming: Incarceration and the housing security of urban men
Curtis, Marah A.
2011-01-01
While individuals returning from prison face many barriers to successful re-entry, among the most serious are the challenges they face in securing housing. Housing has long been recognized as a prerequisite for stable employment, access to social services, and other aspects of individual and family functioning. The formerly incarcerated face several administrative and de facto restrictions on their housing options; however, little is known about the unique instabilities that they face. We use a longitudinal survey of urban families to examine housing insecurity among nearly 3,000 urban men, including over 1,000 with incarceration histories. We find that men recently incarcerated face greater housing insecurity, including both serious hardships such as homelessness, and precursors to homelessness such as residential turnover and relying on others for housing expenses. Their increased risk is tied both to diminished annual earnings and other factors, including, potentially, evictions from public housing supported by Federal “one-strike” policies. PMID:21927519
Reaching out to take on TB in Somalia.
Moore, David A J; Granat, Simo M
2014-01-01
Among the many challenges facing populations disrupted by complex emergencies, personal security and food security rank much higher than access to healthcare. However, over time health needs assume increasing importance. Many complex crises occur in settings where the background incidence of TB is already high; social and economic conditions in crises are then highly conducive to amplification of the existing TB problem. Innovative approaches to delivery of diagnostic and treatment services, transition planning and integration with other healthcare providers and services are vital. In the extremely challenging environment of Somalia, multiple partners are making headway though collaboration and innovation.
Protecting water and wastewater infrastructure from cyber attacks
NASA Astrophysics Data System (ADS)
Panguluri, Srinivas; Phillips, William; Cusimano, John
2011-12-01
Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.
Safe and Secure Virtualization: Answers for IMA next Generation and Beyond
NASA Astrophysics Data System (ADS)
Almeida, Jose; Vatrinet, Francis
2010-08-01
This paper presents some of the challenges the aerospace industry is facing for the future and explains why and how a safe and secured virtualization technology can help solving these challenges Efforts around the next generation of IMA have already started, like the European FP7 funded project SCARLETT or the IDEE5 project and many avionics players and working groupware focused on how the new technologies like SMP capabilities introduced in latest CPU architectures, can help increasing system performances in future avionics system. We present PikeOS, a separation micro-kernel, which applies the state-of-the-art techniques and widely recognized standards such as ARINC 653 and MILS in order to guarantee safety and security properties, and still improve overall performance.
Retailing and Shopping on the Internet.
ERIC Educational Resources Information Center
Rowley, Jennifer
1996-01-01
Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)
Hydrogen applications for Lambert-St. Louis International Airport
DOT National Transportation Integrated Search
2009-01-01
Today, major airports are facing challenges related to pollution, energy efficiency, and safety and security. Hydrogen and fuel cell technologies, regarded as one of the key energy solutions of the 21st century are more energy efficient and reliable ...
Threats to cross-border wildlife linkages in the Sky Islands Wildlands Network
Kim Vacariu
2005-01-01
One of the greatest challenges facing conservationists in the Sky Islands region is finding a realistic means to maintain historic travel routes for wide-ranging species crossing the United States-Mexico border. This challenge is made difficult due to the ongoing efforts by the Federal government to install additional security infrastructure to stem the flood of...
Taking Action for America: A CEO Plan for Jobs and Economic Growth
ERIC Educational Resources Information Center
Business Roundtable, 2012
2012-01-01
America faces many challenges in working together to restore the promise of economic growth and security for the country, U.S. families and the American worker. The challenges are both real and serious. Despite hopeful signs of economic recovery, America remains mired in the deepest jobs crisis since the 1930s. One out of every 12 Americans who…
Suggestions for Strategic Planning for the Office of Nonproliferation Research and Engineering
2002-01-01
The Office of Nonproliferation Research and Engineering, part of the recently formed National Nuclear Security Administration within the Department...of Energy, conducts wide-ranging research for diverse end users at the federal and local level. As such, the Office faces a number of challenges in...planning methods. This report grew out of support provided to an advisory committee for the Office of Nonproliferation and National Security, an
Electronic health systems: challenges faced by hospital-based providers.
Agno, Christina Farala; Guo, Kristina L
2013-01-01
The purpose of this article is to discuss specific challenges faced by hospitals adopting the use of electronic medical records and implementing electronic health record (EHR) systems. Challenges include user and information technology support; ease of technical use and software interface capabilities; compliance; and financial, legal, workforce training, and development issues. Electronic health records are essential to preventing medical errors, increasing consumer trust and use of the health system, and improving quality and overall efficiency. Government efforts are focused on ways to accelerate the adoption and use of EHRs as a means of facilitating data sharing, protecting health information privacy and security, quickly identifying emerging public health threats, and reducing medical errors and health care costs and increasing quality of care. This article will discuss physician and nonphysician staff training before, during, and after implementation; the effective use of EHR systems' technical features; the selection of a capable and secure EHR system; and the development of collaborative system implementation. Strategies that are necessary to help health care providers achieve successful implementation of EHR systems will be addressed.
MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran
2014-01-01
As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.
A secure medical data exchange protocol based on cloud environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn
2014-09-01
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.
Human Reliability Program Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, John; Rogers, Erin; Gerke, Gretchen
A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less
Video face recognition against a watch list
NASA Astrophysics Data System (ADS)
Abbas, Jehanzeb; Dagli, Charlie K.; Huang, Thomas S.
2007-10-01
Due to a large increase in the video surveillance data recently in an effort to maintain high security at public places, we need more robust systems to analyze this data and make tasks like face recognition a realistic possibility in challenging environments. In this paper we explore a watch-list scenario where we use an appearance based model to classify query faces from low resolution videos into either a watch-list or a non-watch-list face. We then use our simple yet a powerful face recognition system to recognize the faces classified as watch-list faces. Where the watch-list includes those people that we are interested in recognizing. Our system uses simple feature machine algorithms from our previous work to match video faces against still images. To test our approach, we match video faces against a large database of still images obtained from a previous work in the field from Yahoo News over a period of time. We do this matching in an efficient manner to come up with a faster and nearly real-time system. This system can be incorporated into a larger surveillance system equipped with advanced algorithms involving anomalous event detection and activity recognition. This is a step towards more secure and robust surveillance systems and efficient video data analysis.
Crops and food security--experiences and perspectives from Taiwan.
Huang, Chen-Te; Fu, Tzu-Yu Richard; Chang, Su-San
2009-01-01
Food security is an important issue that is of concern for all countries around the world. There are many factors which may cause food insecurity including increasing demand, shortage of supply, trade condition, another countries' food policy, lack of money, high food and oil prices, decelerating productivity, speculation, etc. The food self-sufficiency ratio of Taiwan is only 30.6% weighted by energy in 2007. Total agriculture imports and cereals have increased significantly due to the expansion of livestock and fishery industries and improve living standard. The agriculture sector of Taiwan is facing many challenges, such as: low level of food self-sufficiency, aging farmers, large acreage of set-aside farmlands, small scale farming, soaring price of fertilizers, natural disasters accelerated by climate change, and rapid changes in the world food economy. To cope with these challenges, the present agricultural policy is based on three guidelines: "Healthfulness, Efficiency, and Sustainability." A program entitled "Turning Small Landlords into Large Tenants" was launched to make effective use of idle lands. Facing globalization and the food crisis, Taiwan will secure stable food supply through revitalization of its set-aside farmlands and international markets, and provide technical assistance to developing countries, in particular for staple food crops.
An Agile Enterprise Regulation Architecture for Health Information Security Management
Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie
2010-01-01
Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748
An agile enterprise regulation architecture for health information security management.
Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie
2010-09-01
Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.
Fox, Steven J; Schick, Vadim
2010-01-01
In this economic climate, healthcare providers may face extraordinary challenges securing financing for health IT projects, especially ones required to capitalize on the incentives in ARRA. Vendor financing may be the best option for many such providers. While such arrangements may often seem a win-win for both parties, providers should be aware of the many potential pitfalls inherent in vendorfinanced deals, including: 1.) additional pressure from vendors to accept their standard contractual terms and conditions because vendors have much more leverage if they are also the creditor in the transaction; 2.) failing to obtain necessary warranties and representations from vendors that their systems will comply with all relevant requirements under ARRA and will permit the provider to achieve meaningful use; and 3.) dealing with problems arising if the vendors' product fails to achieve certification, or the provider fails to achieve "meaningful use" in a timely manner.
The Psychology of Working Theory.
Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L
2016-03-01
In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).
Global Warming: Its Implications for U.S. National Security Policy
2009-03-19
The approach to this topic will be to look at the science behind anthropogenic global warming . Is man largely responsible for causing global warming due...paper will then investigate the nexus between global warming and U.S. national security policy. It will address the challenges facing U.S. leaders and...policy makers as they tackle the issue of global warming and its implications for U.S. policy. Finally it will conclude with recommendations for those
ViNEL: A Virtual Networking Lab for Cyber Defense Education
ERIC Educational Resources Information Center
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie
2018-01-01
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Security analysis of cyber-physical system
NASA Astrophysics Data System (ADS)
Li, Bo; Zhang, Lichen
2017-05-01
In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.
Key challenges in the development and implementation of telehealth projects.
Joseph, Victor; West, Robert M; Shickle, Darren; Keen, Justin; Clamp, Susan
2011-01-01
A literature review was carried out to identify the key challenges in the implementation of telehealth. This was followed by a survey of organisations in England involved in telehealth projects in order to understand the challenges they faced. Ten of the 13 health or local authority organisations surveyed had telehealth projects and three were at the planning stage. The analysis revealed seven key challenges facing implementers of telehealth in England. Based on the findings from the literature review and the survey, a model was constructed and a checklist drawn up. The model contained the following elements: identifying issues, needs and partners; producing a strategy; securing funding; implementing changes; and monitoring and evaluating a telehealth project. The checklist was validated by using key informants from the organisations originally surveyed. The checklist may be useful to guide telehealth development and implementation in the future.
Inland capture fishery contributions to global food security and threats to their future
Youn, So-Jung; Taylor, William W.; Lynch, Abigail J.; Cowx, Ian G.; Beard, T. Douglas; Bartley, Devin; Wu, Felicia
2014-01-01
Inland fish and fisheries play important roles in ensuring global food security. They provide a crucial source of animal protein and essential micronutrients for local communities, especially in the developing world. Data concerning fisheries production and consumption of freshwater fish are generally inadequately assessed, often leading decision makers to undervalue their importance. Modification of inland waterways for alternative uses of freshwater (particularly dams for hydropower and water diversions for human use) negatively impacts the productivity of inland fisheries for food security at local and regional levels. This paper highlights the importance of inland fisheries to global food security, the challenges they face due to competing demands for freshwater, and possible solutions.
ASEAN and Its Security Offspring: Facing New Challenges
2007-08-01
by demanding Suu Kyi’s release. Malaysian Prime Minister Mahathir summarized the members’ dismay when he stated: “We don’t criticize members states...11 Mahathir went on to say that even Burma’s expulsion from ASEAN was a possibility, since ASEAN has a right to demand standards of behavior from
Libya After Qaddafi: Lessons and Implications for the Future
2014-01-01
research findings and objective analysis that address the challenges facing the public and private sectors . All RAND reports undergo rigorous peer...8 The Need for Far-Reaching Security Sector Reform...World Bank , International Monetary Fund, IHS, Inter- national Foundation for Electoral Systems, Dartmouth College, the National Endowment for
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-09
... emerging challenges facing the power grid? b. Do the CIP standards assure cyber security, including... Smart Grid applications have non-cyber reliability implications that need to be addressed? d. What steps... (NERC). Ronald L. Litzinger, President, Southern California Edison Company. Stephen J. Wright...
Opportunity Texas[TM]: Learn. Earn. Save.
ERIC Educational Resources Information Center
Center for Public Policy Priorities, 2010
2010-01-01
Texas faces numerous challenges but also has abundant opportunities to build the middle class and increase prosperity. Unfortunately, too many Texans are on the sideline, lacking access to opportunities to learn, earn, and save to secure a more prosperous future for themselves and their families. To create jobs, increase income, and promote…
Internet/Web-based administration of benefits.
Vitiello, J
2001-09-01
Most funds will face the challenge of deploying at least some Web-based functionality in the near future, if they have not already done so. Clear objectives and careful planning will help ensure success. Issues that must be considered include support requirements, security concerns, functional business objectives, and employer and member Web access.
Designing Ensemble Based Security Framework for M-Learning System
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Mohd Faizal; bin Sahibuddin, Shahrin
2014-01-01
Mobile Learning has a potential to improve efficiency in the education sector and expand educational opportunities to underserved remote area in higher learning institutions. However there are multi challenges in different altitude faced when introducing and implementing m-learning. Despite the evolution of technology changes in education,…
Preparation of biobased sponges from un-tanned hides
USDA-ARS?s Scientific Manuscript database
One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...
Waldman, H Barry; Perlman, Steven P
2003-01-01
The difficulties faced by individuals with mental retardation, developmental and other disabilities in securing dental services are reviewed. The need for social workers to stimulate family members and other health care providers to collaborate with and challenge dental practitioners is emphasized.
THE POTENTIAL MID-TERM ROLE OF NUCLEAR POWER IN THE UNITED STATES: A SCENARIO ANALYSIS USING MARKAL
With all nations facing enormous challenges related to energy security, sustainability and environmental quality, nuclear power is likely to play an increasingly important role in the future. In particular, the life-cycle emissions of criteria pollutants and greenhouse gases (GHG...
Optimizing Institutional Approaches to Enable Research
ERIC Educational Resources Information Center
Grieb, Teri; Horon, Jeffrey R.; Wong, Cassandra; Durkin, Jessica; Kunkel, Steven L.
2014-01-01
Challenges that face the academic research enterprise are numerous. These concerns include, but are not limited to: declines in extramural funding for investigatorinitiated research, an aging faculty workforce (the average age of securing a faculty's first R01 is over 42), insufficient funds to support faculty laboratories, and limited access to…
Reflections on Developing an Employment Mentoring Program for College Students Who Are Blind
ERIC Educational Resources Information Center
O'Mally, Jamie; Steverson, Anne
2017-01-01
In a competitive employment climate, college graduates with visual impairments (that is, those who are blind or have low vision) face challenges securing work. Employment barriers among visually impaired individuals include: limited early work experience, negative employer attitudes, transportation issues, lack of exposure to successful role…
After the Election: Fundamental Security Challenges Nigeria Must Face
2015-07-01
the reopening of shops , and instructed its fighters to pay for goods. In prac- tice, however, there is little indication that Boko Haram...Anchorage Area (SAA) around Lagos Port—an area clogged with hundreds of vulnerable ves- sels waiting for days to offload cargo due to the antiquated
Kierans, Ciara; Padilla-Altamira, Cesar; Garcia-Garcia, Guillermo; Ibarra-Hernandez, Margarita; Mercado, Francisco J
2013-01-01
Chronic Kidney Disease disproportionately affects the poor in Low and Middle Income Countries (LMICs). Mexico exemplifies the difficulties faced in supporting Renal Replacement Therapy (RRT) and providing equitable patient care, despite recent attempts at health reform. The objective of this study is to document the challenges faced by uninsured, poor Mexican families when attempting to access RRT. The article takes an ethnographic approach, using interviewing and observation to generate detailed accounts of the problems that accompany attempts to secure care. The study, based in the state of Jalisco, comprised interviews with patients, their caregivers, health and social care professionals, among others. Observations were carried out in both clinical and social settings. In the absence of organised health information and stable pathways to renal care, patients and their families work extraordinarily hard and at great expense to secure care in a mixed public-private healthcare system. As part of this work, they must navigate challenging health and social care environments, negotiate treatments and costs, resource and finance healthcare and manage a wide range of formal and informal health information. Examining commonalities across pathways to adequate healthcare reveals major failings in the Mexican system. These systemic problems serve to reproduce and deepen health inequalities. A system, in which the costs of renal care are disproportionately borne by those who can least afford them, faces major difficulties around the sustainability and resourcing of RRTs. Attempts to increase access to renal therapies, therefore, need to take into account the complex social and economic demands this places on those who need access most. This paper further shows that ethnographic studies of the concrete ways in which healthcare is accessed in practice provide important insights into the plight of CKD patients and so constitute an important source of evidence in that effort.
FACE-IT. A Science Gateway for Food Security Research
DOE Office of Scientific and Technical Information (OSTI.GOV)
Montella, Raffaele; Kelly, David; Xiong, Wei
Progress in sustainability science is hindered by challenges in creating and managing complex data acquisition, processing, simulation, post-processing, and intercomparison pipelines. To address these challenges, we developed the Framework to Advance Climate, Economic, and Impact Investigations with Information Technology (FACE-IT) for crop and climate impact assessments. This integrated data processing and simulation framework enables data ingest from geospatial archives; data regridding, aggregation, and other processing prior to simulation; large-scale climate impact simulations with agricultural and other models, leveraging high-performance and cloud computing; and post-processing to produce aggregated yields and ensemble variables needed for statistics, for model intercomparison, and to connectmore » biophysical models to global and regional economic models. FACE-IT leverages the capabilities of the Globus Galaxies platform to enable the capture of workflows and outputs in well-defined, reusable, and comparable forms. We describe FACE-IT and applications within the Agricultural Model Intercomparison and Improvement Project and the Center for Robust Decision-making on Climate and Energy Policy.« less
One Health in food safety and security education: Subject matter outline for a curricular framework.
Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I
2017-06-01
Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.
Challenge and Opportunity: Educating Liberia's War Affected Children in Primary Grades
ERIC Educational Resources Information Center
Weah, Wokie
2004-01-01
Liberia's emergence from 15 years of tremendous upheaval has left it with an unsettled domestic security situation, a disrupted formal economy and a virtually destroyed national infrastructure. Faced with a burgeoning school-age population and the growing demand for education, Liberia's new National Transitional Government--composed of rebel,…
ERIC Educational Resources Information Center
Buerle, Stephen
2017-01-01
This dissertation explores some of the fundamental challenges facing the information assurance community as it relates to knowledge categorization, organization and representation within the field of information security and more specifically within the domain of biometric authentication. A primary objective of this research is the development of…
Advanced Education and Technology Business Plan, 2007-10
ERIC Educational Resources Information Center
Alberta Enterprise and Advanced Education, 2007
2007-01-01
The Government of Alberta Strategic Business Plan addresses significant opportunities and challenges facing Alberta over the next three years and positions Alberta to make the most of its economic, social and natural advantages. It is a plan to strategically manage growth and plan for a sustainable and secure future. Advanced Education and…
Ready, Steady, Go! Strategies to Improve Texans' Financial Readiness to Pay for College
ERIC Educational Resources Information Center
Helmcamp, Leslie
2011-01-01
Texas faces numerous challenges, but also abundant opportunities to build the middle class and increase prosperity. Unfortunately, too many Texans are sidelined, lacking access to opportunities to learn, earn, and save to secure a prosperous future for themselves and their families. A college education provides opportunities for Texans to obtain…
The Value of Tourism Degrees: A Luton-Based Case Study
ERIC Educational Resources Information Center
Petrova, Petia; Mason, Peter
2004-01-01
Travel and tourism graduates are facing challenges in securing jobs within the travel and tourism industry, as their degrees have low recognition among travel and tourism employers. Yet there are growing numbers of tourism courses provided by universities, and these are increasingly popular among students. This paper attempts an informed…
Identifying and Eliminating Barriers Faced by Nontraditional Department of Defense Suppliers
2014-01-01
organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more...Commands, the Department of the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community . For more information on the RAND...17 Lack of Access to and Communication
Promoting Inter-Professional Teamwork and Learning--The Case of a Surgical Operating Theatre
ERIC Educational Resources Information Center
Collin, Kaija; Paloniemi, Susanna; Mecklin, Jukka-Pekka
2010-01-01
Hospitals, and surgical operating theatres (OTs) in particular, are environments in which inter-professional teamwork and learning are essential to secure patient safety and effective practice. However, it has been revealed in many studies that inter-professional collaborative work in hospital organisations faces many challenges and constraints.…
USDA-ARS?s Scientific Manuscript database
One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...
USDA-ARS?s Scientific Manuscript database
Aflatoxin contamination of crops is frequent in warm regions across the globe, including large areas in sub-Saharan Africa. Crop contamination with these dangerous toxins transcends health, food security, and trade sectors. It cuts across the value chain, affecting farmers, traders, markets, and fin...
A Model for Establishing a Cybersecurity Center of Excellence
ERIC Educational Resources Information Center
Moskal, Edward J.
2015-01-01
In order to effectively ensure our continued technical advantage and future cybersecurity, we need a technologically skilled and cyber savvy workforce and an effective pipeline of future employees. Our Government has identified Cybersecurity as one of the most serious economic and national security challenges we face as a nation and has ear-marked…
Citizenship for a Changing Global Climate: Learning from New Zealand and Norway
ERIC Educational Resources Information Center
Hayward, Bronwyn; Selboe, Elin; Plew, Elizabeth
2015-01-01
Young citizens under the age of 25?years make up just under half of the world's population. Globally, they face new, interrelated problems of dangerous environmental change, including increasing incidence of severe storms associated with a changing climate, and related new threats to human security. Addressing the complex challenge of climate…
Parcher, Jean W.; Page, William R.
2013-01-01
Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.
Asian Security Challenges-Planning in the Face of Strategic Uncertainties. Volume 2. Appendices
1994-10-01
suited to the company’s own strengths." In addition, the authors argue, U.S. firms should emulate the Japanese and South Koreans by setting up global ... marketing franchises and sharing core competencies where it makes sense to do so. Finally, they take a swipe at traditional strategic planning, criticizing
The Effect of Career Mentoring on Employment Outcomes for College Students Who Are Legally Blind
ERIC Educational Resources Information Center
O'Mally, Jamie; Antonelli, Karla
2016-01-01
Introduction: College graduates with visual impairments (that is, those who are blind or have low vision) often face challenges in securing competitive employment after graduation. Working with a mentor who is also visually impaired, and working in the same field, can provide important benefits to overcome these barriers. Methods: A nationwide…
Facing tomorrow's challenges: U.S. Geological Survey science in the decade 2007-2017
,
2007-01-01
- A National Hazards, Risk, and Resilience Assessment Program: Ensuring the Long-Term Health and Wealth of the Nation - The Role of Environment and Wildlife in Human Health: A System that Identifies Environmental Risk to Public Health in America - A Water Census of the United States: Quantifying, Forecasting, and Securing Freshwater for America's Future
Low-Income Children, Their Families and the Great Recession: What Next in Policy?
ERIC Educational Resources Information Center
Aber, Lawrence; Chaudry, Ajay
2010-01-01
Children and youth vary in their developmental health due to differences in family economic security and exposure to toxic stress. The economic downturn has increased the challenges facing low-income children. The American Recovery and Reinvestment Act of 2009 (ARRA) and the President's first budget made significant down-payments on investments in…
A Case Study: Applying Critical Thinking Skills to Computer Science and Technology
ERIC Educational Resources Information Center
Shannon, Li-Jen; Bennett, Judith
2012-01-01
A majority of incoming college freshmen and sophomores have not applied their critical thinking skills as part of their learning process. This paper investigates how students acquire their critical thinking skills while facing the copyright, fair use, and internet security challenges in this contemporary digital society. The findings show that 90…
Venturing beyond the Gates: Facilitating Successful Reentry with Entrepreneurship. Summer 2007
ERIC Educational Resources Information Center
Lindahl, Nicole
2007-01-01
The rising number of individuals returning to communities from prison and jail represents one of the defining issues of time. Individuals reentering society face myriad challenges, not the least of which is securing viable employment; in addition, each individual has a unique set of experiences, needs and resources. This project stems from the…
National Synchrotron Light Source II
Hill, John; Dooryhee, Eric; Wilkins, Stuart; Miller, Lisa; Chu, Yong
2018-01-16
NSLS-II is a synchrotron light source helping researchers explore solutions to the grand energy challenges faced by the nation, and open up new regimes of scientific discovery that will pave the way to discoveries in physics, chemistry, and biology â advances that will ultimately enhance national security and help drive the development of abundant, safe, and clean energy technologies.
The Intersectionality of Educational Inequalities and Child Poverty in Africa: A Deconstruction
ERIC Educational Resources Information Center
Tshabangu, Icarbord
2018-01-01
The developing world has continually faced tremendous challenges in providing social security and safety nets for its vast populations culminating in wider educational inequalities and extreme poverty. It is not uncommon in Sub-Saharan Africa to find rapacious wealth in the hands of a few co-existing with mass poverty. As a consequence, the…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anadon, Laura Diaz; Gallagher, Kelly Sims; Bunn, Matthew
2009-02-18
The report offers preliminary recommendations for near-term actions to strengthen the U.S. effort to develop and deploy advanced energy technologies. The report comes as the Obama Administration and the 111th U.S. Congress face enormous challenges and opportunities in tackling the pressing security, economic, and environmental problems posed by the energy sector. Improving the technologies of energy supply and end-use is a prerequisite for surmounting these challenges in a timely and cost-effective way, and this report elaborates on how policy can support develop of these important energy technologies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Food security in a changing climate
Pulwarty, Roger; Eilerts, Gary; Verdin, James
2012-01-01
By 2080 the effects of climate change—on heat waves, floods, sea level rise, and drought—could push an additional 600 million people into malnutrition and increase the number of people facing water scarcity by 1.8 billion. The precise impacts will, however, strongly depend on socioeconomic conditions such as local markets and food import dependence. In the near term, two factors are also changing the nature of food security: (1) rapid urbanization, with the proportion of the global population living in urban areas expanding from 13 percent in 1975 to greater than 50 percent at present, and (2) trade and domestic market liberalization since 1993, which has promoted removal of import controls, deregulation of prices, and the loss of preferential markets for many small economies. Over the last two years, the worst drought in decades has devastated eastern Africa. The resulting food-security crisis has affected roughly 13 million people and has reminded us that there is still a long way to go in addressing current climate-related risks. In the face of such profound changes and uncertainties, our approaches to food security must evolve. In this article, we describe four key elements that, in our view, will be essential to the success of efforts to address the linked challenges of food security and climate change.
Implementing HIPAA security in a membership organization.
Hillabrant, L P; Gaignard, K E
2000-01-01
The upcoming HIPAA security regulations are forcing a change in business and operating procedures that many, if not most, healthcare organizations are ill-prepared to tackle. Of all healthcare organizational structures, membership organizations will most likely face the greatest number of obstacles in preparing for and implementing the HIPAA security regulations. This is because the membership organization as a whole must find a way to accommodate the disparate technologies, business and operating methodologies and processes, and available, limited resources of its individual member organizations, and integrate these into a uniform implementation plan. Compounding these obvious difficulties is the unique challenge of enforcement authority. The individual member organizations are autonomous business entities, whereas the membership organization as a whole merely acts as an advisor or consultant, and has only limited enforcement authority over any individual member organization. This article explores this unique situation in depth. We focus on PROMINA Health System, a nonprofit healthcare membership organization that consists of five disparate member healthcare organizations. We examine the challenges PROMINA has encountered in its quest to institute an organization-wide HIPAA security program and its methodology for accomplishing program implementation.
A European Perspective on Security Research
NASA Astrophysics Data System (ADS)
Liem, Khoen; Hiller, Daniel; Castex, Christoph
Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.
Bangladesh Midlife Women's Health Study (BMWHS): methods, challenges and experiences.
Islam, Rakibul M; Bell, Robin J; Hossain, Mohammad B; Davis, Susan R
2015-01-01
To understand the challenges and experiences encountered during data collection for Bangladesh Midlife Women's Health Study (BMWHS) that investigated the low uptake of cervical cancer (CCa) screening barriers, understanding of breast cancer (BCa) knowledge and practices, the prevalence of urinary and fecal incontinence and menopausal symptoms. A multistage cluster sampling technique was used to recruit women from the 32 districts of Bangladesh that had offered CCa screening. Female interviewers were trained to undertake structured face-to-face interviews that incorporated both non-validated and several validated questionnaires, such as Question for Urinary Incontinence Diagnosis, Pelvic Organ Prolapse Distress Inventory, Colorectal-Anal Distress Inventory and Menopause-Specific Quality of Life. We completed surveys of 1590 women, estimated age 30-59 years, between September 2013 and March 2014. We implemented several strategies to deal with low literacy and used the temporal relationship between marriage and childbirth, and the average age of onset of menarche, to estimate age. Cultural and religious sensitivities and personal security were managed by engaging community leaders, limiting activities to daylight hours, adopting local codes of dress, such as the wearing of head scarves. Our major challenges and experiences included difficulties in age determination, selection of and access to households, interview privacy, lack of basic and health literacy, transportation, political unrest and security of the interviewers. By anticipating challenges, we have been able to comprehensively survey a representative sample of Bangladeshi women. Disseminating information about the field challenges and experiences from the BMWHS should assist other researchers planning to conduct surveys about women's health issues in similar context. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Modernization of the Cassini Ground System
NASA Technical Reports Server (NTRS)
Razo, Gus; Fujii, Tammy J.
2014-01-01
The Cassini Spacecraft and its ground system have been operational for over 16 years. Modernization presents several challenges due to the personnel, processes, and tools already invested and embedded into the current ground system structure. Every mission's ground system has its own unique complexities and challenges, involving various organizational units. As any mission from its inception to its execution, schedules are always tight. This forces GDS engineers to implement a working ground system that is not necessarily fully optimized. Ground system challenges increase as technology evolves and cyber threats become more sophisticated. Cassini's main challenges were due to its ground system existing before many security requirements were levied on the multi-mission tools and networks. This caused a domino effect on Cassini GDS tools that relied on outdated technological features. In the aerospace industry reliable and established technology is preferred over innovative yet less proven technology. Loss of data for a spacecraft mission can be catastrophic; therefore, there is a reluctance to make changes and updates to the ground system. Nevertheless, all missions and associated teams face the need to modernize their processes and tools. Systems development methods from well-known system analysis and design principles can be applied to many missions' ground systems. Modernization should always be considered, but should be done in such a way that it does not affect flexibility nor interfere with established practices. Cassini has accomplished a secure and efficient ground data system through periodic updates. The obstacles faced while performing the modernization of the Cassini ground system will be outlined, as well as the advantages and challenges that were encountered.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stewart, John; Halbgewachs, Ron; Chavez, Adrian
The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relatingmore » to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.« less
USGS Science: Addressing Our Nation's Challenges
Larson, Tania M.
2009-01-01
With 6.6 billion people already living on Earth, and that number increasing every day, human influence on our planet is ever more apparent. Changes to the natural world combined with increasing human demands threaten our health and safety, our national security, our economy, and our quality of life. As a planet and a Nation, we face unprecedented challenges: loss of critical and unique ecosystems, the effects of climate change, increasing demand for limited energy and mineral resources, increasing vulnerability to natural hazards, the effects of emerging diseases on wildlife and human health, and growing needs for clean water. The time to respond to these challenges is now, but policymakers and decisionmakers face difficult choices. With competing priorities to balance, and potentially serious - perhaps irreversible - consequences at stake, our leaders need reliable scientific information to guide their decisions. As the Nation's earth and natural science agency, the USGS monitors and conducts scientific research on natural hazards and resources and how these elements and human activities influence our environment. Because the challenges we face are complex, the science needed to better understand and deal with these challenges must reflect the complex interplay among natural and human systems. With world-class expertise in biology, geology, geography, hydrology, geospatial information, and remote sensing, the USGS is uniquely capable of conducting the comprehensive scientific research needed to better understand the interdependent interactions of Earth's systems. Every day, the USGS helps decisionmakers to minimize loss of life and property, manage our natural resources, and protect and enhance our quality of life. This brochure provides examples of the challenges we face and how USGS science helps decisionmakers to address these challenges.
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2015-01-01
This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.
Solution for Data Security Challenges Faced by Smart Grid Evolution - Video
the same utility - different business units that are dealing with generation, transmission, and smart grid, the consumers now also have access to information about zero utilization and the different alive to sense what's going on. And then there's certainly variety with the various different elements
2001-04-01
that a force able to fight two nearly simultaneous major theater wars of the DESERT STORM type would be capable of dealing with the full gamut of...full gamut of security challenges that the United States is likely to face. Now nearly every expert on U.S. military strategy agrees that this force
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin
2014-01-01
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…
ERIC Educational Resources Information Center
Thorman, Abby; Otto, Jessica; Gunn-Wright, Rhiana
2012-01-01
Parents with dependent children now make up almost one in four students pursuing higher education in the United States (Miller, Gault, and Thorman 2011). Single parents face particular challenges pursuing higher education, including securing safe and affordable housing. Single mothers often must spend over half of their income on housing expenses,…
Kierans, Ciara; Padilla-Altamira, Cesar; Garcia-Garcia, Guillermo; Ibarra-Hernandez, Margarita; Mercado, Francisco J.
2013-01-01
Background Chronic Kidney Disease disproportionately affects the poor in Low and Middle Income Countries (LMICs). Mexico exemplifies the difficulties faced in supporting Renal Replacement Therapy (RRT) and providing equitable patient care, despite recent attempts at health reform. The objective of this study is to document the challenges faced by uninsured, poor Mexican families when attempting to access RRT. Methods The article takes an ethnographic approach, using interviewing and observation to generate detailed accounts of the problems that accompany attempts to secure care. The study, based in the state of Jalisco, comprised interviews with patients, their caregivers, health and social care professionals, among others. Observations were carried out in both clinical and social settings. Results In the absence of organised health information and stable pathways to renal care, patients and their families work extraordinarily hard and at great expense to secure care in a mixed public-private healthcare system. As part of this work, they must navigate challenging health and social care environments, negotiate treatments and costs, resource and finance healthcare and manage a wide range of formal and informal health information. Conclusions Examining commonalities across pathways to adequate healthcare reveals major failings in the Mexican system. These systemic problems serve to reproduce and deepen health inequalities. A system, in which the costs of renal care are disproportionately borne by those who can least afford them, faces major difficulties around the sustainability and resourcing of RRTs. Attempts to increase access to renal therapies, therefore, need to take into account the complex social and economic demands this places on those who need access most. This paper further shows that ethnographic studies of the concrete ways in which healthcare is accessed in practice provide important insights into the plight of CKD patients and so constitute an important source of evidence in that effort. PMID:23349868
The Regulatory Framework for Privacy and Security
NASA Astrophysics Data System (ADS)
Hiller, Janine S.
The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.
2012-05-17
the national security strategy? Liddell Hart describes this difficult challenge faced by all socially conservative states. They must find the type of... challenges and circumstances while working within an economic framework that necessitates choice.”23 TTCP describes the CBP process as a method that involves...a capability gap. Then the Army purchased quick solutions and fielded them for immediate deployment to theatre. Their generation satisfied an urgent
New challenges for palliative nursing.
Aranda, Sanchia
1997-05-02
Editorials by Jeanette Webber and Libby White (IJPN 2(3)) explored threats to both the nursing profession and palliative nursing as the health system faces the reality of limited resources and expanding client needs. I wish to pick up on these issues in the light of changes proposed for palliative care in one Australian state, Victoria. My central argument is that to secure the future of palliative nursing, efforts must focus on demonstrating clearly the value and contribution of nurses to client and family outcomes. Why do I think we are challenged to do this?
Buchanan, Neil H
The Social Security system has come under attack for having illegitimately transferred wealth from younger generations to the Baby Boom generation. This attack is unfounded, because it fails to understand how the system was altered in order to force the Baby Boomers to finance their own benefits in retirement. Any challenges that Social Security now faces are not caused by the pay-as-you-go structure of the system but by Baby Boomers' other policy errors, especially the emergence of extreme economic inequality since 1980. Attempting to fix the wrong problem all but guarantees a solution that will make matters worse. Generational justice and distributive justice go hand in hand.
NASA Astrophysics Data System (ADS)
El-Saba, Aed; Alsharif, Salim; Jagapathi, Rajendarreddy
2011-04-01
Fingerprint recognition is one of the first techniques used for automatically identifying people and today it is still one of the most popular and effective biometric techniques. With this increase in fingerprint biometric uses, issues related to accuracy, security and processing time are major challenges facing the fingerprint recognition systems. Previous work has shown that polarization enhancementencoding of fingerprint patterns increase the accuracy and security of fingerprint systems without burdening the processing time. This is mainly due to the fact that polarization enhancementencoding is inherently a hardware process and does not have detrimental time delay effect on the overall process. Unpolarized images, however, posses a high visual contrast and when fused (without digital enhancement) properly with polarized ones, is shown to increase the recognition accuracy and security of the biometric system without any significant processing time delay.
Method for secure electronic voting system: face recognition based approach
NASA Astrophysics Data System (ADS)
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
2017-06-01
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
Sustainable development: challenges and opportunities for the natural sciences (Invited)
NASA Astrophysics Data System (ADS)
Mutter, J. C.; Fishman, R.; Anttila-Hughes, J. K.; Hsiang, S. M.
2009-12-01
The challenges of sustainable development -- equitably improving global human welfare while ensuring that the environment is preserved for future generations - demand research at the nexus of the social and natural sciences. Massive and inevitable changes in climate, ecosystem functions, and human interaction with the environment will perturb societies throughout the world in different ways over the coming century. The changes faced by poor societies and their ability to cope differs markedly from those that face the richest. Yet in all regions the dynamic interaction of social and natural drivers will govern the prospects for human welfare and its improvement. Developing an understanding of these phenomena will require field research together with analytical and modeling capabilities that couple physical and social phenomena, allowing feedback between the two to manifest and permit forecasting over long time scales. Heterogeneous income and population growth further complicate this need through their consequences for food security, migration, resource allocation, and conflict. In this contribution, we identify some key concepts of sustainable development, open research questions and outline how scientific research might engage this emerging discipline. Using recent examples of interaction, we discuss the opportunities and challenges facing the further development of this dialogue.
da Silva, Ana Carolina Feldenheimer; Recine, Elisabetta; Johns, Paula; Gomes, Fabio da Silva; Ferraz, Mariana de Araújo; Faerstein, Eduardo
2018-03-01
The historical struggles that Brazil faced to overcome malnutrition coincided with the empowerment of civil society and social movements which played a crucial role in the affirmation of health and food as social rights. After two decades under military dictatorship, Brazil went through a redemocratization process in the 1980s when activism emerged to demand spaces to participate in policy-making regarding the social agenda, including food and nutrition security (FNS). From 1988 onward institutional structures were established: the National Council of FNS (CONSEA) convenes government and civil society sectors to develop and monitor the implementation of policies, systems and actions. Social participation has been at the heart of structural changes achieved since then. Nevertheless, the country faces multiple challenges regarding FNS such as the double burden of disease, increasing use of pesticides and genetically modified seeds, weak regulation of ultra-processed products, and marketing practices that affect the environment, population health, and food sovereignty. This article aims at examining the development of the participatory political system and the role played by Brazilian social movements in the country's policies on FNS, in addition to outlining challenges faced by those policies.
Zarea, Kourosh; Nikbakht-Nasrabadi, Alireza; Abbaszadeh, Abbas; Mohammadpour, Ali
2012-10-01
Psychiatric nurses play an important role in the process of caring for mentally ill patients and are continually faced with the numerous challenges and complex issues related to this field. This study aimed to understand the perspectives of psychiatric nurses regarding the issues they face while providing care and examine the possible solutions for improvement of inpatient care in clinical settings. The study adopted a qualitative approach that utilized a content analysis of audio taped, semi-structured interviews that had been conducted with 24 nurses. Two main themes emerged from the data. The first, Challenges in Providing Care within Psychiatric Wards, had the following subthemes: Politics and Rules of Organization, Safety and Security Issues, Uncertainty about the Role, Lack of Trained Staff, and Sociocultural Issues. The second theme, Solutions for Improving Psychiatric Care, had the subthemes of Empowerment across four domains: Psychiatric Nurses, Mentally Ill Patients and their Families, The Psychiatric Mental Health System, and the Cultural Context. The results indicated that if nurses are expected to provide optimal nursing care within a psychiatric ward, then there is a need for a stable and responsible organizational structure, skilled psychiatric nurses, and community-based care along with an anti-stigma program.
Venture Capital Investments for Life Sciences Start-ups in Switzerland.
Gantenbein, Pascal; Herold, Nils
2014-12-01
Despite its economic and technological importance, the Swiss life sciences sector faces severe challenges in attracting enough venture capital for its own development. Although biotechnology and medical technology have been the most important areas of venture financing from 1999 through 2012 according to our own data, average investment volumes nevertheless remain on a low level of only 0.05 percent of Swiss GDP. After 2008, there was a pronounced shift away from early-stage financing. While business angels still play an important role at the early stage, venture capitalists are the most important investor type by volumes having their main focus on expansion financing. The industry faces predominant challenges in securing capital availability for entrepreneurs, in transforming the highly skewed and back-loaded payoff profile of investments into a more stable return stream, and in defining appropriate business and collaboration models.
Performance Evaluation of High Speed Multicarrier System for Optical Wireless Communication
NASA Astrophysics Data System (ADS)
Mathur, Harshita; Deepa, T.; Bartalwar, Sophiya
2018-04-01
Optical wireless communication (OWC) in the infrared and visible range is quite impressive solution, especially where radio communication face challenges. Visible light communication (VLC) uses visible light over a range of 400 and 800 THz and is a subdivision of OWC technologies. With an increasing demand for use of wireless communications, wireless access via Wi-Fi is facing many challenges especially in terms of capacity, availability, security and efficiency. VLC uses intensity modulation and direct detection (IM/DD) techniques and hence they require the signals to certainly be real valued positive sequences. These constraints pose limitation on digital modulation techniques. These limitations result in spectrum-efficiency or power-efficiency losses. In this paper, we investigate an amplitude shift keying (ASK) based orthogonal frequency division multiplexing (OFDM) signal transmission scheme using LabVIEW for VLC technology.
Deteriorating food security in India
NASA Astrophysics Data System (ADS)
Milesi, C.; Samanta, A.; Hashimoto, H.; Kumar, K.; Ganguly, S.; Thenkabail, P. S.; Srivastava, A. N.; Nemani, R. R.; Myneni, R. B.
2009-12-01
One of the major challenges we face on our planet is increasing agricultural production to meet the dietary requirements of an additional 2.5 billion people by the mid of the century while limiting cropland expansion and other damages to natural resources. This problem is even more so challenging given that nearly all the population growth will take place where the majority of the hungry live today and where ongoing and future climate changes are projected to most negatively impact agricultural production, the semi-arid tropics (SAT). The SAT contain 40% of the global irrigated and rainfed croplands in over 50 developing countries and a growing population of over a billion and half people, many of which live in absolute poverty and strongly depend on agriculture that is constrained by chronic water shortages. Rates of food grain production in many of the countries of the SAT have progressively increased since the mid 1960s aided by the Green Revolution and relatively favourable climatic conditions. However, aggregated agricultural production statistics indicate that the rate of food grain production has recently stalled or declined in several of the countries in this region, escalating the concerns over matters of food security, that is availability of food and one’s access to it, in a region where many people live in extreme poverty, depend on an agrarian economy and are expected to face increasingly worse climatic conditions in the near future. In this paper we analyze the agricultural deceleration and its drivers over the country of India, which faces the daunting challenge of needing a 50-100% increase in yields of major crops by the middle to the 21st century to feed its growing population. We analyze the long term (1982-2006) record of the Normalized Difference Vegetation Index (NDVI) from the National Oceanic and Atmospheric Administration’s Advanced Very High Resolution Radiometer (NOAA/AVHRR) together with climate, land use, and crop production statistics. We show that while there are no significant changes in long-term precipitation, there are geographically matching patterns of enhanced crop production and irrigation expansion with groundwater, initially, but both of which have levelled off in the past decade. In addition to increasing pressure on water resources, a decline in expansion of cropland area, a warming climate and increasing air pollution compound to challenging long term food security in India.
Lange, Ansgar; Prenzler, Anne; Zuchandke, Andy
2012-01-01
There is a lack of research regarding the subjective perception of financial security in the event of illness of insured persons. Therefore, the aim of our study was to analyze the subjective perception of financial security in the event of illness in the German setting over time and to identify major determinants of that perception. We applied a probit-adapted ordinary least squares estimation procedure including fixed effects to a balanced data set from the German Socio-Economic Panel. After correcting our data set, we included approximately 23,500 observations in our analyses. We show that higher income and the existence of private health insurance have a positive and significant impact on the perception of financial security. Furthermore, private supplementary health insurance has a positive and significant effect on this perception; however, this is solely true for policies that cover special features during hospital stays. Experience with the health care system is also positively related to the individual's perception. Finally, our regression results illustrate that the overall perception is declining over time. The results indicate that political decision makers are facing challenges regarding the declining subjective perception in the German health care system. Because of the positive correlation between experience and subjective perception, it can be assumed that the health care system and especially statutory health insurance are better than their presentation in the media. Hence, there is a problem of communication and information, and political decision makers face challenges in presenting the system objectively and handling the media in a proper way. Copyright © 2012 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.
Information Assurance and Forensic Readiness
NASA Astrophysics Data System (ADS)
Pangalos, Georgios; Katos, Vasilios
Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.
Integrated Cyber Defenses: Towards Cyber Defense Doctrine
2007-12-01
National Security Affairs Department) Professor Dorothy Denning (Defense Analysis Department) To select NPS Instructors for teaching me how to...asymmetric battlefield advantage to get inside adversary decision cycles to shorten the “kill chain.” As a force multiplier, NCW continues to...the] number of [network] events is increasing.6 Therefore, the DoD and each U.S. military service faces the daunting challenge of determining how
ERIC Educational Resources Information Center
Dworsky, Amy; Smithgall, Cheryl; Courtney, Mark E.
2014-01-01
Youth transitioning out of foster care and into adulthood need many supports to navigate the challenges they face. Over the past three decades, federal child welfare policy has significantly increased the availability of those supports. In 1999, the Foster Care Independence Act amended Title IV-E of the Social Security Act to create the Chafee…
ERIC Educational Resources Information Center
Lingenfelter, Paul E.
2012-01-01
The nation's next President will face a host of challenges, among them the economy, health care, an aging population, energy, the environment, and security at home and aboard. In this open letter, the leaders of higher education coordinating and governing boards across the country urge the 2012 presidential candidates to make improving the…
On the Water-Food Nexus: an Optimization Approach for Water and Food Security
NASA Astrophysics Data System (ADS)
Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem
2016-04-01
Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.
Can we match ultraviolet face images against their visible counterparts?
NASA Astrophysics Data System (ADS)
Narang, Neeru; Bourlai, Thirimachos; Hornak, Lawrence A.
2015-05-01
In law enforcement and security applications, the acquisition of face images is critical in producing key trace evidence for the successful identification of potential threats. However, face recognition (FR) for face images captured using different camera sensors, and under variable illumination conditions, and expressions is very challenging. In this paper, we investigate the advantages and limitations of the heterogeneous problem of matching ultra violet (from 100 nm to 400 nm in wavelength) or UV, face images against their visible (VIS) counterparts, when all face images are captured under controlled conditions. The contributions of our work are three-fold; (i) We used a camera sensor designed with the capability to acquire UV images at short-ranges, and generated a dual-band (VIS and UV) database that is composed of multiple, full frontal, face images of 50 subjects. Two sessions were collected that span over the period of 2 months. (ii) For each dataset, we determined which set of face image pre-processing algorithms are more suitable for face matching, and, finally, (iii) we determined which FR algorithm better matches cross-band face images, resulting in high rank-1 identification rates. Experimental results show that our cross spectral matching (the heterogeneous problem, where gallery and probe sets consist of face images acquired in different spectral bands) algorithms achieve sufficient identification performance. However, we also conclude that the problem under study, is very challenging, and it requires further investigation to address real-world law enforcement or military applications. To the best of our knowledge, this is first time in the open literature the problem of cross-spectral matching of UV against VIS band face images is being investigated.
Roles for international military medical services in stability operations (security sector reform).
Bricknell, M C M; Thompson, D
2007-06-01
This is the second in a series of three papers that examine the role of international military medical services in stability operations in unstable countries. The paper discusses security sector reform in general terms and highlights the interdependency of the armed forces, police, judiciary and penal systems in creating a 'secure environment'. The paper then looks at components of a local military medical system for a counter-insurgency campaign operating on interior lines and the contribution and challenges faced by the international military medical community in supporting the development of this system. Finally the paper highlights the importance of planning the medical support of the international military personnel who will be supporting wider aspects of security sector reform. The paper is based on background research and my personal experience as Medical Director in the Headquarters of the NATO International Stability Assistance Force in Afghanistan in 2006.
Lyons, Peter B
2011-01-01
The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. Copyright © 2010 Health Physics Society
"Something good can grow here": chicago urban agriculture food projects.
Hatchett, Lena; Brown, Loretta; Hopkins, Joan; Larsen, Kelly; Fournier, Eliza
2015-01-01
Food security is a challenge facing many African-American low-income communities nationally. Community and university partners have established urban agriculture programs to improve access to high quality affordable fruits and vegetables by growing, distributing, and selling food in urban neighborhoods. While the challenge of food security is within communities of color, few studies have described these urban agriculture programs and documented their impact on the crew members who work in the programs and live in the low-income communities. More information is needed on the program impact for crew and community health promotion. Using a survey and focus group discussion from the crew and staff we describe the program and activities of four Chicago Urban Agriculture programs. We summarized the impact these programs have on crew members' perception of urban agriculture, health habits, community engagement, and community health promotion in low-income African-American neighborhoods.
Addressing global change challenges for Central Asian socio-ecosystems
NASA Astrophysics Data System (ADS)
Qi, Jiaguo; Bobushev, Temirbek S.; Kulmatov, Rashid; Groisman, Pavel; Gutman, Garik
2012-06-01
Central Asia is one of the most vulnerable regions on the planet earth to global climate change, depending on very fragile natural resources. The Soviet legacy has left the five countries (Kazakhstan, Tajikistan, Kyrgyzstan, Turkmenistan, and Uzbekistan) with a highly integrated system but they are facing great challenges with tensions that hinder regional coordination of food and water resources. With increasing climate variability and warming trend in the region, food and water security issues become even more crucial now and, if not addressed properly, could affect the regional stability. The long-term drivers of these two most critical elements, food and water, are climate change; the immediate and probably more drastic factors affecting the food and water security are land uses driven by institutional change and economic incentives. As a feedback, changes in land use and land cover have directly implications on water uses, food production, and lifestyles of the rural community in the region. Regional and international efforts have been made to holistically understand the cause, extent, rate and societal implications of land use changes in the region. Much of these have been understood, or under investigation by various projects, but solutions or research effort to develop solutions, to these urgent regional issues are lacking. This article, serves as an introduction to the special issue, provides a brief overview of the challenges facing the Central Asian countries and various international efforts in place that resulted in the publications of this special issue.
Diaz, Javier; Arrizabalaga, Saioa; Bustamante, Paul; Mesa, Iker; Añorga, Javier; Goya, Jon
2013-01-01
Portable systems and global communications open a broad spectrum for new health applications. In the framework of electrophysiological applications, several challenges are faced when developing portable systems embedded in Cloud computing services. In order to facilitate new developers in this area based on our experience, five areas of interest are presented in this paper where strategies can be applied for improving the performance of portable systems: transducer and conditioning, processing, wireless communications, battery and power management. Likewise, for Cloud services, scalability, portability, privacy and security guidelines have been highlighted.
Bugs and gas: Agreements banning chemical and biological weapons
NASA Astrophysics Data System (ADS)
Mikulak, Robert P.
2017-11-01
The use of chemical or biological weapons, whether by a State or terrorists, continues to be a serious security concern. Both types of weapons are prohibited by multilateral treaties that have very broad membership, but both the Biological Weapons Convention and the Chemical Weapons Convention are facing major challenges. In particular, the continued use of chemical weapons in the Syrian civil war by government forces risks eroding the norm against the use of such weapons. This paper briefly explore the recent history of efforts to constrain chemical and biological weapons and outlines challenges for the future.
2017-03-01
daunt- ing security challenges facing the United States and the North Atlantic Treaty Organization (NATO). Project 1721 would not be possible without...America’s Commitment to the North Atlantic Treaty Organization (NATO) Alliance..................................................xix Russia’s...43 Chapter 5: The North Atlantic Treaty Organization (NATO) and the New Russian Strategic Environment
2011-03-09
effective oversight of federal government programs and policies. Over the years, certain material weaknesses in internal control over...ineffective process for preparing the consolidated financial statements. In addition to the material weaknesses underlying these major impediments, GAO...noted material weaknesses involving billions of dollars in improper payments, information security, and tax collection activities. With regard to the
ERIC Educational Resources Information Center
Duderstadt, James J.
2009-01-01
Today higher education faces the challenge of reconsidering and realigning its public agenda to serve better an era in which educated people, the knowledge they produce, and the innovation and entrepreneurial skills they possess have become the keys to economic prosperity, national security, and social well-being. The imperatives of expanding…
Chemical Sniffing Instrumentation for Security Applications.
Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F
2016-07-27
Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).
Food Security Status is Related to Mental Health Quality of Life Among Persons Living with HIV.
Hatsu, Irene; Hade, Erinn; Campa, Adriana
2017-03-01
This study evaluated the association between health related quality of life and food security among persons living with HIV (PLHIV). We studied 167 PLHIV who completed questionnaires assessing food security, disease symptomatology, and several domains of the SF-36 health related quality of life survey. HIV disease state was assessed from medical records. Associations between independent and outcome variables were determined through linear regression models. Compared to food security, very low food security was significantly associated with lower mental component summary scores, [average difference -4.98 (95 % CI -9.85, -0.10)]; mental health, [average difference -5.44 (95 % CI -10.08, -0.81)]; and general health, [average difference -5.13 (95 % CI -9.65, -0.65)] after adjusting for covariates. About a fourth of participants experienced severe food insecurity, which negatively influenced their mental health and general wellbeing. The inclusion of resources for food assistance in HIV treatment programs may help ameliorate mental health challenges faced by PLHIV.
Summary Report for the Radiation Detection for Nuclear Security Summer School 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Runkle, Robert C.; Baciak, James E.; Stave, Jean A.
The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; themore » second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.« less
77 FR 2293 - Federal Open Market Committee; Domestic Policy Directive of December 13, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policies... mortgage-backed securities in order to maintain the total face value of domestic securities at...
Technologies to counter aviation security threats
NASA Astrophysics Data System (ADS)
Karoly, Steve
2017-11-01
The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
77 FR 31015 - Federal Open Market Committee; Domestic Policy Directive of April 24-25, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-24
..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policies... mortgage-backed securities in order to maintain the total face value of domestic securities at...
77 FR 22577 - Federal Open Market Committee; Domestic Policy Directive of March 13, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... with remaining maturities of approximately 6 years to 30 years with a total face value of $400 billion, and to sell Treasury securities with remaining maturities of 3 years or less with a total face value... securities in order to maintain the total face value of domestic securities at approximately $2.6 trillion...
What Are the Professional, Political, and Ethical Challenges of Co-Creating Health Care Systems?
Singh, Guddi; Owens, John; Cribb, Alan
2017-11-01
Co-creation is seen by many as a means of meeting the multiple challenges facing contemporary health care systems by involving institutions, professionals, patients, and stakeholders in new roles, relationships, and collaborative practices. While co-creation has the potential to positively transform health care systems, it generates a number of political and ethical challenges that should not be overlooked. We suggest that those involved in envisioning and implementing co-creation initiatives pay close attention to significant questions of equity, power, and justice and to the fundamental challenge of securing a common vision of the aims of and agendas for health care systems. While such initiatives present significant opportunities for improvement, they need to be viewed in light of their accompanying professional, political, and ethical challenges. © 2017 American Medical Association. All Rights Reserved.
NASA Astrophysics Data System (ADS)
Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.
2014-12-01
The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been achieved in all critical components that are presented here. The success in the process now poses a series of new challenges, most importantly: how to implement and monitor the evolution of the adaptation process.
Climate Change and Risks to National Security
NASA Astrophysics Data System (ADS)
Titley, D.
2017-12-01
Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.
Summary Report for the Radiation Detection for Nuclear Security Summer School 2014
DOE Office of Scientific and Technical Information (OSTI.GOV)
Runkle, Robert C.; Baciak, James E.; Woodring, Mitchell L.
Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectivesmore » of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.« less
Benson, Suzanne G; Dundis, Stephen P
2003-09-01
This paper applies Maslow's Hierarchy of Needs Model to the challenges of understanding and motivating employees in a rapidly changing health care industry. The perspective that Maslow's Model brings is an essential element that should be considered as the health care arena is faced with reorganization, re-engineering, mergers, acquisitions, increases in learning demands, and the escalating role of technology in training. This paper offers a new perspective related to how Maslow's Model, as used in business/organizational settings, can be directly related to current workforce concerns: the need for security and freedom from stress, social belongingness, self-esteem, self-actualization, altered work/social environments, and new opportunities for learning and self-definition. Changes in health care will continue at an accelerated pace and with these changes will come the need for more and more training. The use of technology in training has heightened access, faster distribution, innovation and increased collaboration. However, with this technology come attendant challenges including keeping up with the technology, the increased pace of training, depersonalization, and fear of the unknown. The Maslow model provides a means for understanding these challenges in terms of universal individual needs. How does one motivate employees in the face of increased demands, particularly when they are being asked to meet these demands with fewer resources? The answer is, in large part, to make the employee feel secure, needed, and appreciated. This is not at all easy, but if leaders take into consideration the needs of the individual, the new technology that provides challenges and opportunities for meeting those needs, and provides the training to meet both sets of needs, enhanced employee motivation and commitment is possible.
Medical information security in the era of artificial intelligence.
Wang, Yufeng; Wang, Liwei; Xue, Chang-Ao
2018-06-01
In recent years, biometric technologies, such as iris, facial, and finger vein recognition, have reached consumers and are being increasingly applied. However, it remains unknown whether these highly specific biometric technologies are as safe as declared by their manufacturers. As three-dimensional (3D) reconstruction based on medical imaging and 3D printing are being developed, these biometric technologies may face severe challenges. Copyright © 2018 Elsevier Ltd. All rights reserved.
NASA's Microgravity Science Research Program
NASA Technical Reports Server (NTRS)
1996-01-01
The ongoing challenge faced by NASA's Microgravity Science Research Program is to work with the scientific and engineering communities to secure the maximum return from our Nation's investments by: assuring that the best possible science emerges from the science community for microgravity investigations; ensuring the maximum scientific return from each investigation in the most timely and cost-effective manner; and enhancing the distribution of data and applications of results acquired through completed investigations to maximize their benefits.
Humanitarian assistance and disaster relief: changing the face of defense.
Laraby, Patrick R; Bourdeaux, Margaret; Casscells, S Ward; Smith, David J; Lawry, Lynn
2009-01-01
The US Department of Defense (DOD) is evolving to meet new security challenges in the twenty-first century. Today's challenges result from growing political, environmental, and economic instability in important areas of the globe that threaten national and global security. Immediate outreach to foreign nations in times of violent instability or natural disaster fosters security and stability both for the affected country and for the United States. Foreign humanitarian assistance (FHA) is a rapidly evolving military mission that addresses conflict prevention, conflict, postconflict, and natural disasters. With DOD's extensive global medical resources, it is often uniquely qualified to execute a critical role in relief and/or public health efforts. When and how the American military will act in FHA and disaster relief is a still evolving doctrine with three issues deserving particular attention: aligning operations with host government leadership, preserving humanitarian space, and tailoring the US military's unique resources to the specific political and medical situation at hand. The DOD's response to a large-scale earthquake in Peru suggests useful approaches to these three issues, provides a template for future FHA mission, and points to strategic decisions and operational capabilities that need further development to establish the FHA mission firmly within DOD's repertoire of security engagement activities.
Performance evaluation of wavelet-based face verification on a PDA recorded database
NASA Astrophysics Data System (ADS)
Sellahewa, Harin; Jassim, Sabah A.
2006-05-01
The rise of international terrorism and the rapid increase in fraud and identity theft has added urgency to the task of developing biometric-based person identification as a reliable alternative to conventional authentication methods. Human Identification based on face images is a tough challenge in comparison to identification based on fingerprints or Iris recognition. Yet, due to its unobtrusive nature, face recognition is the preferred method of identification for security related applications. The success of such systems will depend on the support of massive infrastructures. Current mobile communication devices (3G smart phones) and PDA's are equipped with a camera which can capture both still and streaming video clips and a touch sensitive display panel. Beside convenience, such devices provide an adequate secure infrastructure for sensitive & financial transactions, by protecting against fraud and repudiation while ensuring accountability. Biometric authentication systems for mobile devices would have obvious advantages in conflict scenarios when communication from beyond enemy lines is essential to save soldier and civilian life. In areas of conflict or disaster the luxury of fixed infrastructure is not available or destroyed. In this paper, we present a wavelet-based face verification scheme that have been specifically designed and implemented on a currently available PDA. We shall report on its performance on the benchmark audio-visual BANCA database and on a newly developed PDA recorded audio-visual database that take include indoor and outdoor recordings.
76 FR 67731 - Federal Open Market Committee; Domestic Policy Directive of September 20 and 21, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-02
..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policy of...- backed securities in order to maintain the total face value of domestic securities at approximately $2.6...
77 FR 42730 - Federal Open Market Committee; Domestic Policy Directive of June 19-20, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-20
..., Treasury securities with remaining maturities of 6 years to 30 years with a total face value of $400 billion, and to sell Treasury securities with remaining maturities of 3 years or less with a total face... purchase Treasury securities with remaining maturities of 6 years to 30 years with a total face value of...
Age synthesis and estimation via faces: a survey.
Fu, Yun; Guo, Guodong; Huang, Thomas S
2010-11-01
Human age, as an important personal trait, can be directly inferred by distinct patterns emerging from the facial appearance. Derived from rapid advances in computer graphics and machine vision, computer-based age synthesis and estimation via faces have become particularly prevalent topics recently because of their explosively emerging real-world applications, such as forensic art, electronic customer relationship management, security control and surveillance monitoring, biometrics, entertainment, and cosmetology. Age synthesis is defined to rerender a face image aesthetically with natural aging and rejuvenating effects on the individual face. Age estimation is defined to label a face image automatically with the exact age (year) or the age group (year range) of the individual face. Because of their particularity and complexity, both problems are attractive yet challenging to computer-based application system designers. Large efforts from both academia and industry have been devoted in the last a few decades. In this paper, we survey the complete state-of-the-art techniques in the face image-based age synthesis and estimation topics. Existing models, popular algorithms, system performances, technical difficulties, popular face aging databases, evaluation protocols, and promising future directions are also provided with systematic discussions.
2010 Panel on the Biomaterials Grand Challenges
Reichert, William “Monty”; Ratner, Buddy D.; Anderson, James; Coury, Art; Hoffman, Allan S.; Laurencin, Cato T.; Tirrell, David
2014-01-01
In 2009, the National Academy for Engineering issued the Grand Challenges for Engineering in the 21st Century comprised of 14 technical challenges that must be addressed to build a healthy, profitable, sustainable, and secure global community (http://www.engineeringchallenges.org). Although crucial, none of the NEA Grand Challenges adequately addressed the challenges that face the biomaterials community. In response to the NAE Grand Challenges, Monty Reichert of Duke University organized a panel entitled Grand Challenges in Biomaterials at the at the 2010 Society for Biomaterials Annual Meeting in Seattle. Six members of the National Academies—Buddy Ratner, James Anderson, Allan Hoffman, Art Coury, Cato Laurencin, and David Tirrell—were asked to propose a grand challenge to the audience that, if met, would significantly impact the future of biomaterials and medical devices. Successfully meeting these challenges will speed the 60-plus year transition from commodity, off-the-shelf biomaterials to bioengineered chemistries, and biomaterial devices that will significantly advance our ability to address patient needs and also to create new market opportunities. PMID:21171147
Face liveness detection using shearlet-based feature descriptors
NASA Astrophysics Data System (ADS)
Feng, Litong; Po, Lai-Man; Li, Yuming; Yuan, Fang
2016-07-01
Face recognition is a widely used biometric technology due to its convenience but it is vulnerable to spoofing attacks made by nonreal faces such as photographs or videos of valid users. The antispoof problem must be well resolved before widely applying face recognition in our daily life. Face liveness detection is a core technology to make sure that the input face is a live person. However, this is still very challenging using conventional liveness detection approaches of texture analysis and motion detection. The aim of this paper is to propose a feature descriptor and an efficient framework that can be used to effectively deal with the face liveness detection problem. In this framework, new feature descriptors are defined using a multiscale directional transform (shearlet transform). Then, stacked autoencoders and a softmax classifier are concatenated to detect face liveness. We evaluated this approach using the CASIA Face antispoofing database and replay-attack database. The experimental results show that our approach performs better than the state-of-the-art techniques following the provided protocols of these databases, and it is possible to significantly enhance the security of the face recognition biometric system. In addition, the experimental results also demonstrate that this framework can be easily extended to classify different spoofing attacks.
The Awareness and Challenges of Cloud Computing Adoption on Tertiary Education in Malaysia
NASA Astrophysics Data System (ADS)
Hazreeni Hamzah, Nor; Mahmud, Maziah; Zukri, Shamsunarnie Mohamed; Yaacob, Wan Fairos Wan; Yacob, Jusoh
2017-09-01
This preliminary study aims to investigate the awareness of the adoption of cloud computing among the academicians in tertiary education in Malaysia. Besides, this study also want to explore the possible challenges faced by the academician while adopting this new technology. The pilot study was done on 40 lecturers in Universiti Teknologi MARA Kampus Kota Bharu (UiTMKB) by using self administered questionnaire. The results found that almost half (40 percent) were not aware on the existing of cloud computing in teaching and learning (T&L) process. The challenges confronting the adoption of cloud computing are data insecurity, data insecurity, unsolicited advertisement, lock-in, reluctance to eliminate staff positions, privacy concerns, reliability challenge, regulatory compliance concerns/user control and institutional culture/resistance to change in technology. This possible challenges can be factorized in two major factors which were security and dependency factor and user control and mentality factor.
Plant genetics, sustainable agriculture and global food security.
Ronald, Pamela
2011-05-01
The United States and the world face serious societal challenges in the areas of food, environment, energy, and health. Historically, advances in plant genetics have provided new knowledge and technologies needed to address these challenges. Plant genetics remains a key component of global food security, peace, and prosperity for the foreseeable future. Millions of lives depend upon the extent to which crop genetic improvement can keep pace with the growing global population, changing climate, and shrinking environmental resources. While there is still much to be learned about the biology of plant-environment interactions, the fundamental technologies of plant genetic improvement, including crop genetic engineering, are in place, and are expected to play crucial roles in meeting the chronic demands of global food security. However, genetically improved seed is only part of the solution. Such seed must be integrated into ecologically based farming systems and evaluated in light of their environmental, economic, and social impacts-the three pillars of sustainable agriculture. In this review, I describe some lessons learned, over the last decade, of how genetically engineered crops have been integrated into agricultural practices around the world and discuss their current and future contribution to sustainable agricultural systems.
Wireless sensors and sensor networks for homeland security applications.
Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R
2012-11-01
New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.
Food security: contributions from science to a new and greener revolution
Beddington, John
2010-01-01
There is an intrinsic link between the challenge we face to ensure food security through the twenty-first century and other global issues, most notably climate change, population growth and the need to sustainably manage the world's rapidly growing demand for energy and water. Our progress in reducing global poverty and achieving the Millennium Development Goals will be determined to a great extent by how coherently these long-term challenges are tackled. A key question is whether we can feed a future nine billion people equitably, healthily and sustainably. Science and technology can make a major contribution, by providing practical solutions. Securing this contribution requires that high priority be attached both to research and to facilitating the real world deployment of existing and emergent technologies. Put simply, we need a new, ‘greener revolution’. Important areas for focus include: crop improvement; smarter use of water and fertilizers; new pesticides and their effective management to avoid resistance problems; introduction of novel non-chemical approaches to crop protection; reduction of post-harvest losses; and more sustainable livestock and marine production. Techniques and technologies from many disciplines, ranging from biotechnology and engineering to newer fields such as nanotechnology, will be needed. PMID:20008386
NASA Astrophysics Data System (ADS)
Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful
2017-09-01
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.
Food Security Status is related to Mental Health Quality of Life among Persons Living with HIV
Hatsu, Irene; Hade, Erinn; Campa, Adriana
2016-01-01
This study evaluated the association between health related quality of life and food security among persons living with HIV (PLHIV). We studied 167 PLHIV who completed questionnaires assessing food security, disease symptomatology, and several domains of the SF-36 health related quality of life survey. HIV disease state was assessed from medical records. Associations between independent and outcome variables were determined through linear regression models. Compared to food security, very low food security was significantly associated with lower mental component summary scores, [average difference: −4.98 (95% CI: −9.85, −0.10; mental health, [average difference: −5.44 (95% CI: −10.08, −0.81); and general health, [average difference: −5.13 (95% CI: −9.65, −0.65)] after adjusting for covariates. About a fourth of participants experienced severe food insecurity, which negatively influenced their mental health and general wellbeing. The inclusion of resources for food assistance in HIV treatment programs may help ameliorate mental health challenges faced by PLHIV. PMID:27699597
NASA Astrophysics Data System (ADS)
Devineni, N.; Lall, U.
2014-12-01
Where will the food for the 9 billion people we expect on Earth by 2050 come from? The answer to this question depends on where the water and the energy for agriculture will come from. This assumes of course, that our primary food source will continue to be based on production on land, and that irrigation and the use of fertilizers to improve production are needed to address climate shocks and deteriorating soil health. Given this, establishing an economically, environmentally and physically feasible pathway to achieve water, energy and food security in the face of a changing climate is crucial to planetary well-being. A central hypothesis of the proposed paper is that innovation towards agricultural sustainability in countries such as India and China, that have large populations relative to their water, energy and arable land endowment, and yet have opportunity for improvement in productivity metrics such as crop yield per unit water or energy use, can show us the way to achieve global water-food-energy sustainability. These countries experience a monsoonal climate, which has a high frequency of climate extremes (more floods and droughts, and a short rainy season) relative to the developed countries in temperate climates. Global climate change projections indicate that the frequency and severity of extremes may pose a challenge in the future. Thus, strategies that are resilient to such extremes in monsoonal climates may be of global value in a warmer, more variable world. Much of the future population growth is expected to occur in Africa, S. America and S. Asia. Targeting these regions for higher productivity and resilience is consequently important from a national security perspective as well. Through this paper, we propose to (a) layout in detail, the challenges faced by the water, energy and food sectors in emerging countries, with specific focus on India and China and (b) provide the scientific background for an integrated systems analytic approach to formulate solutions at varying scales that can be employed globally. Such coordinated analyses is important for an examination of the future water sustainability in the face of changing climate, agricultural trends, environmental impacts and new energy choices.
Water-energy-food security nexus: the road map
NASA Astrophysics Data System (ADS)
Hamdy, Atef
2015-04-01
The world's growing population and increased prosperity will increase global demand for energy, as well as food and water supplies in the coming decades. In the arid and semi arid regions as in most of the world water and energy have historically been managed separately, with little consideration of cross sectoral interactions, yet in reality, water and energy are closely interconnected. By addressing water and energy together planners can identify crucial interactions, conflicting demands and potential synergies. For many countries around the world it is needed to establish a road map on: (i) how to implement nexus policies to increase efficiency of natural resources management? (ii) how to bridge science with policy and business? (iii) how governments be inspired by business? (iv) how can be business be inspired by science? (v) how can we learn from each other and how collaborate to address the challenges ahead? Such road map should seek to bring together stakeholders involved in the nexus implementation approach over the coming years to develop nexus tools for decision making to quantify water energy food resources on both national and regional level. However, experiences gained and learned lessons indicate clearly that numerous countries are facing several barriers in putting in action their nexus road map due to the lack of integrated resource management, lack of capacity for research development, lack of knowledge sharing across sectors, and not enough interaction between policy makers and scientists. Those are major challenges to be faced to achieve the water, energy and food security nexus. Furthermore, such goal cannot be reached without building and strengthening the synergy between education, research and innovation for sustainable resource management. Those issues beside others will be fully discussed in this paper. Keywords: water-energy-food security; nexus
Technosocial Predictive Analytics for Security Informatics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanfilippo, Antonio P.; Gilbert, Nigel; Greaves, Mark
2012-08-22
Challenges to the security, health, and sustainable growth of our society keep escalating asymmetrically due to the growing pace of globalization and global change. The increasing velocity of information sharing, social networking, economic forces, and environmental change has resulted in a rapid increase in the number and frequency of “game-changing moments” that a community can face. Social movements that once took a decade to build now take a year; shifts in public opinion that once took a year to take root now take a couple of months. More and more frequently, these critical moments occur too suddenly for the affectedmore » communities to succeed in countering the consequent adversities or seizing the emerging opportunities. Now more than ever, we need anticipatory reasoning technologies to forecast and manage change in order to secure and improve our way of life and the environment we inhabit.« less
Establishment of CDC Global Rapid Response Team to Ensure Global Health Security.
Stehling-Ariza, Tasha; Lefevre, Adrienne; Calles, Dinorah; Djawe, Kpandja; Garfield, Richard; Gerber, Michael; Ghiselli, Margherita; Giese, Coralie; Greiner, Ashley L; Hoffman, Adela; Miller, Leigh Ann; Moorhouse, Lisa; Navarro-Colorado, Carlos; Walsh, James; Bugli, Dante; Shahpar, Cyrus
2017-12-01
The 2014-2016 Ebola virus disease epidemic in West Africa highlighted challenges faced by the global response to a large public health emergency. Consequently, the US Centers for Disease Control and Prevention established the Global Rapid Response Team (GRRT) to strengthen emergency response capacity to global health threats, thereby ensuring global health security. Dedicated GRRT staff can be rapidly mobilized for extended missions, improving partner coordination and the continuity of response operations. A large, agencywide roster of surge staff enables rapid mobilization of qualified responders with wide-ranging experience and expertise. Team members are offered emergency response training, technical training, foreign language training, and responder readiness support. Recent response missions illustrate the breadth of support the team provides. GRRT serves as a model for other countries and is committed to strengthening emergency response capacity to respond to outbreaks and emergencies worldwide, thereby enhancing global health security.
Nuclear energy related capabilities at Sandia National Laboratories
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pickering, Susan Y.
2014-02-01
Sandia National Laboratories' technology solutions are depended on to solve national and global threats to peace and freedom. Through science and technology, people, infrastructure, and partnerships, part of Sandia's mission is to meet the national needs in the areas of energy, climate and infrastructure security. Within this mission to ensure clean, abundant, and affordable energy and water is the Nuclear Energy and Fuel Cycle Programs. The Nuclear Energy and Fuel Cycle Programs have a broad range of capabilities, with both physical facilities and intellectual expertise. These resources are brought to bear upon the key scientific and engineering challenges facing themore » nation and can be made available to address the research needs of others. Sandia can support the safe, secure, reliable, and sustainable use of nuclear power worldwide by incorporating state-of-the-art technologies in safety, security, nonproliferation, transportation, modeling, repository science, and system demonstrations.« less
Zhang, G H; Poon, Carmen C Y; Zhang, Y T
2010-01-01
Body sensor networks (BSNs) have emerged as a new technology for healthcare applications, but the security of communication in BSNs remains a formidable challenge yet to be resolved. The paper discusses the typical attacks faced by BSNs and proposes a fast biometric based approach to generate keys for ensuing confidentiality and authentication in BSN communications. The approach was tested on 900 segments of electrocardiogram. Each segment was 4 seconds long and used to generate a 128-bit key. The results of the study found that entropy of 96% of the keys were above 0.95 and 99% of the hamming distances calculated from any two keys were above 50 bits. Based on the randomness and distinctiveness of these keys, it is concluded that the fast biometric based approach has great potential to be used to secure communication in BSNs for health applications.
Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.
Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K
2011-09-01
Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.
Gray, Heather M; Nelson, Sarah E; Shaffer, Howard J; Stebbins, Patricia; Farina, Andrea Ryan
2017-09-01
Among people experiencing homelessness, difficulty securing housing is often compounded by concurrent challenges including unemployment, chronic illness, criminal justice involvement, and victimization. The Moving Ahead Program (MAP) is a vocational rehabilitation program that seeks to help adults facing these challenges to secure competitive employment. We prospectively studied how MAP graduates (N = 97) changed from the beginning of MAP to about six months after graduation. We observed a variety of positive outcomes not just in employment and housing but also in health, substance use, and criminal justice involvement. However, these gains were not universal; for instance, participants were less likely to report positive outcomes at follow-up if they started MAP with a serious mental illness, made relatively small gains in work skills, or did not seek mental health treatment during the six months after they completed MAP. These findings might encourage program staff to devote additional resources toward supporting at-risk students.
Survey of business process management: challenges and solutions
NASA Astrophysics Data System (ADS)
Alotaibi, Youseef; Liu, Fei
2017-09-01
The current literature shows that creating a good framework on business process model (PM) is not an easy task. A successful business PM should have the ability to ensure accurate alignment between business processes (BPs) and information technology (IT) designs, provide security protection, manage the rapidly changing business environment and BPs, manage customer power, be flexible for reengineering and ensure that IT goals can be easily derived from business goals and hence an information system (IS) can be easily implemented. This article presents an overview of research in the business PM domain. We have presented a review of the challenges facing business PMs, such as misalignment between business and IT, difficulty of deriving IT goals from business goals, creating secured business PM, reengineering BPs, managing the rapidly changing BP and business environment and managing customer power. Also, it presents the limitations of existing business PM frameworks. Finally, we outline several guidelines to create good business PM and the possible further research directions in the business PM domain.
Finding and Keeping a Job: The Value and Meaning of Employment for Parolees.
Cherney, Adrian; Fitzgerald, Robin
2016-01-01
Finding stable employment has been identified as one of the best predictors of post-release success among prisoners. However, offenders face a number of challenges in securing employment when released from prison. This article examines processes that shape the abilities and motivations of parolees to secure gainful employment by examining interview data collected from parolees in Queensland, Australia (n = 50). We explore the role of social networks and commercial employment providers in helping parolees find work, the perceived value of institutional work and training, and the meanings, challenges, and impact of managing the disclosure of one's criminal past to employers. Findings highlight that the role and influence of employment on a parolee's reintegration is conditional on his or her supportive social networks, ability to manage stigma, and personal changes in identity, which elevate the importance of work in a parolee's life. Our findings also show how employment provides opportunities for offenders to self-construct and articulate new identities. © The Author(s) 2014.
State of Science: ergonomics and global issues.
Thatcher, Andrew; Waterson, Patrick; Todd, Andrew; Moray, Neville
2018-02-01
In his 1993 IEA keynote address, Neville Moray urged the ergonomics discipline to face up to the global problems facing humanity and consider how ergonomics might help find some of the solutions. In this State of Science article we critically evaluate what the ergonomics discipline has achieved in the last two and a half decades to help create a secure future for humanity. Moray's challenges for ergonomics included deriving a value structure that moves us beyond a Westernised view of worker-organisation-technology fit, taking a multidisciplinary approach which engages with other social and biological sciences, considering the gross cross-cultural factors that determine how different societies function, paying more attention to mindful consumption, and embracing the complexity of our interconnected world. This article takes a socio-historical approach by considering the factors that influence what has been achieved since Moray's keynote address. We conclude with our own set of predictions for the future and priorities for addressing the challenges that we are likely to face. Practitioner Summary: We critically reflect on what has been achieved by the ergonomics profession in addressing the global challenges raised by Moray's 1993 keynote address to the International Ergonomics Association. Apart from healthcare, the response has largely been weak and disorganised. We make suggestions for priority research and practice that is required to facilitate a sustainable future for humanity.
The changing face of Hanford security 1990--1994
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thielman, J.
The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less
Legal issues affecting children with preexisting conditions during public health emergencies.
Rutkow, Lainie; Vernick, Jon S; Wissow, Lawrence S; Tung, Gregory J; Marum, Felicity; Barnett, Daniel J
2013-06-01
Among the millions of children in the United States exposed to public health emergencies in recent years, those with preexisting health conditions face particular challenges. A public health emergency may, for example, disrupt treatment regimens or cause children to be separated from caregivers. Ongoing shortages of pediatricians and pediatric subspecialists may further exacerbate the risks that children with preexisting conditions face in disaster circumstances. The US Department of Homeland Security recently called for better integration of children's needs into all preparedness activities. To aid in this process, multiple legal concerns relevant to pediatricians and pediatric policymakers must be identified and addressed. Obtaining informed consent from children and parents may be particularly challenging during certain public health emergencies. States may need to invoke legal protections for children who are separated from caregivers during emergencies. Maintaining access to prescription medications may also require pediatricians to use specific legal mechanisms. In addition to practitioners, recommendations are given for policymakers to promote effective pediatric response to public health emergencies.
Ngowi, Aiwerasia; Mrema, Ezra; Kishinhi, Stephen
2016-08-01
The Tanzania informal sector is growing fast, with precarious working conditions and particular hazards for women and children in agriculture. Hazardous agricultural chemicals including pesticides are mostly imported and have been used for many years. Despite the role played by pesticides in food security and vector control, these chemicals are responsible for acute and chronic illnesses among communities. The availability of obsolete persistent organic pesticides on the open market indicates existence of an inadequate regulatory system. People who get injured or ill in the agriculture sector in Tanzania receive health services in primary health care facilities where professionals have little or no knowledge of pesticides. We are presenting the pesticide health and safety challenges faced by small-scale farmers who fall in the informal sector. Achievements that have been made by the government and other players to reduce and prevent pesticide exposures and poisoning are also outlined. © The Author(s) 2016.
A privacy authentication scheme based on cloud for medical environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn
2014-11-01
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Young, Helen
2007-03-01
The humanitarian crisis in Darfur remains extremely serious. The optimism that followed the signing of the Abuja Peace Accord was followed by a rapid deterioration in security on the ground in part associated with increasing factionalism in various rebel movements. This paper briefly reviews the evolution of the crisis, its impact on lives and livelihoods and the response by the World Food Programme (WFP) to June 2006. The major challenges and issues facing the food aid programme in the previous 18 months included: dealing with insecurity while maintaining or even extending programme outreach; the need to link protection with assistance more explicitly; and determining the wider impact of food aid programming on the processes and institutions linked with the conflict. The paper discusses the main strategic issues facing WFP in the future such as: integrating security and protection with needs assessments and operational decisions, broadening response strategies beyond food aid and bringing livelihoods to the fore, the need to review cost-efficiency, promoting partnerships and strengthening national and regional capacities.
The study on privacy preserving data mining for information security
NASA Astrophysics Data System (ADS)
Li, Xiaohui
2012-04-01
Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.
MTR STACK, TRA710, CONTEXTUAL VIEW, CAMERA FACING SOUTH. PERIMETER SECURITY ...
MTR STACK, TRA-710, CONTEXTUAL VIEW, CAMERA FACING SOUTH. PERIMETER SECURITY FENCE AND SECURITY LIGHTING IN VIEW AT LEFT. INL NEGATIVE NO. HD52-1-1. Mike Crane, Photographer, 5/2005 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Opportunities and challenges of cloud computing to improve health care services.
Kuo, Alex Mu-Hsing
2011-09-21
Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects (management, technology, security, and legal) to evaluate the opportunities and challenges of this computing model. Strategic planning that could be used by a health organization to determine its direction, strategy, and resource allocation when it has decided to migrate from traditional to cloud-based health services is also discussed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shin, Dongwan; Claycomb, William R.; Urias, Vincent E.
Cloud computing is a paradigm rapidly being embraced by government and industry as a solution for cost-savings, scalability, and collaboration. While a multitude of applications and services are available commercially for cloud-based solutions, research in this area has yet to fully embrace the full spectrum of potential challenges facing cloud computing. This tutorial aims to provide researchers with a fundamental understanding of cloud computing, with the goals of identifying a broad range of potential research topics, and inspiring a new surge in research to address current issues. We will also discuss real implementations of research-oriented cloud computing systems for bothmore » academia and government, including configuration options, hardware issues, challenges, and solutions.« less
Food security for community-living elderly people in Beijing, China.
Cheng, Yang; Rosenberg, Mark; Yu, Jie; Zhang, Hua
2016-11-01
Food security has been identified as an important issue for elderly people's quality of life and ageing in place. A food security index composed of three indicators (food intake, food quality and food affordability) was developed to measure the food security status of community-living elderly people. Food security was then examined among community-living elderly in the central urban districts of Beijing, China. Data were collected by a questionnaire survey in the summer of 2013 and the response rate was 78.5%. Descriptive statistics and binary logistic regression were applied to analyse food security and the associations between food security and demographic and socioeconomic factors. The results showed that 54.2% of the surveyed elderly experienced food security. Participants with better education (OR = 1.68) and better health (OR = 1.47) were more likely to experience food security. The young-old were less likely to experience food security than the older old (OR = 0.94). Elderly people who lived with their children were less likely to experience food security than those who lived alone (OR = 0.43). The results of impact factors on food security highlight both similarities with studies from more developed countries and the unique challenges faced in a rapidly changing China with its unique social, cultural and political systems. The food security index we developed in this study is a simple and effective measure of food security status, which can be used in surveys for evaluating the food security status of elderly people in the future. © 2015 John Wiley & Sons Ltd.
Food and Nutrition Security Trends, Determinants and Challenges in the Ganges-Brahmaputra Delta
NASA Astrophysics Data System (ADS)
Nilsen, K.; van Soesbergen, A.; Matthews, Z.; Burgess, N.
2016-12-01
In the last 20 years many developing countries have made considerable progress towards improving food security and nutrition. However, progress across countries and dimensions of food security have been uneven. While challenges to food security in the context of environmental and climate changes have been studied widely, limited evidence exists for their implications for food and nutrition security in tropical deltaic regions. Delta areas are particularly vulnerable to food insecurity and malnutrition due the specific environmental, climatic and human development factors affecting agricultural production and fisheries. These include coastal flooding and storm surges, deforestation, changes to river flow patterns and water tables, increased soil salinity and water quality degradation. Due to the large number of people living in deltaic regions and their importance in regional food production, there is a pressing need for a better understanding on how environmental factors affect food security and malnutrition. This study explores the potential impacts and challenges posed by environmental and climate change on food and nutrition security in the Ganges-Brahmaputra delta. This delta is one of the world's largest delta's draining land from Bangladesh, Bhutan, China, India and Nepal. The delta makes up around two thirds of the country of Bangladesh, a country facing high levels of child undernutrition, child mortality and a high number of people living under extreme poverty. By combining spatially explicit data from the 2007 and 2011 Demographic and Health Surveys (DHS) for Bangladesh with satellite remote sensing data (Normalised Difference Vegetation Index) for relevant growing seasons of rice, the strength of association between this climate related environmental variable and indicators of child nutrition (wasting and stunting) in the delta were evaluated. Our results show that NDVI for the growing season of rice can be used to determine trends in rice production, picking up on environmental shocks (e.g. floods and cyclones) in the period 2002-2011. Furthermore, we show that NDVI can be used to explain impacts on child nutrition in this delta, even when controlling for background variables such as household wealth, geography and mother's health and education.
Door Security using Face Detection and Raspberry Pi
NASA Astrophysics Data System (ADS)
Bhutra, Venkatesh; Kumar, Harshav; Jangid, Santosh; Solanki, L.
2018-03-01
With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of Engineering and Technology, Pilani, Rajasthan, India.
Climate change and sustainable food production.
Smith, Pete; Gregory, Peter J
2013-02-01
One of the greatest challenges we face in the twenty-first century is to sustainably feed nine to ten billion people by 2050 while at the same time reducing environmental impact (e.g. greenhouse gas (GHG) emissions, biodiversity loss, land use change and loss of ecosystem services). To this end, food security must be delivered. According to the United Nations definition, 'food security exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life'. At the same time as delivering food security, we must also reduce the environmental impact of food production. Future climate change will make an impact upon food production. On the other hand, agriculture contributes up to about 30% of the anthropogenic GHG emissions that drive climate change. The aim of this review is to outline some of the likely impacts of climate change on agriculture, the mitigation measures available within agriculture to reduce GHG emissions and outlines the very significant challenge of feeding nine to ten billion people sustainably under a future climate, with reduced emissions of GHG. Each challenge is in itself enormous, requiring solutions that co-deliver on all aspects. We conclude that the status quo is not an option, and tinkering with the current production systems is unlikely to deliver the food and ecosystems services we need in the future; radical changes in production and consumption are likely to be required over the coming decades.
78 FR 20960 - Face Up Entertainment Group, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
... Suspension of Trading April 4, 2013. It appears to the Securities and Exchange Commission that there is a... business operations, and trading in its securities. Face Up is a Florida corporation based in Valley Stream... interest and the protection of investors require a suspension of trading in the securities of the above...
Addressing the Economic Security Issues Facing Same-Sex Couples.
ERIC Educational Resources Information Center
Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael
1999-01-01
Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)
Kobayashi, Norio; Ishii, Manabu; Takahashi, Satoshi; Mochizuki, Yoshiki; Matsushima, Akihiro; Toyoda, Tetsuro
2011-07-01
Global cloud frameworks for bioinformatics research databases become huge and heterogeneous; solutions face various diametric challenges comprising cross-integration, retrieval, security and openness. To address this, as of March 2011 organizations including RIKEN published 192 mammalian, plant and protein life sciences databases having 8.2 million data records, integrated as Linked Open or Private Data (LOD/LPD) using SciNetS.org, the Scientists' Networking System. The huge quantity of linked data this database integration framework covers is based on the Semantic Web, where researchers collaborate by managing metadata across public and private databases in a secured data space. This outstripped the data query capacity of existing interface tools like SPARQL. Actual research also requires specialized tools for data analysis using raw original data. To solve these challenges, in December 2009 we developed the lightweight Semantic-JSON interface to access each fragment of linked and raw life sciences data securely under the control of programming languages popularly used by bioinformaticians such as Perl and Ruby. Researchers successfully used the interface across 28 million semantic relationships for biological applications including genome design, sequence processing, inference over phenotype databases, full-text search indexing and human-readable contents like ontology and LOD tree viewers. Semantic-JSON services of SciNetS.org are provided at http://semanticjson.org.
Soil science. Soil and human security in the 21st century.
Amundson, Ronald; Berhe, Asmeret Asefaw; Hopmans, Jan W; Olson, Carolyn; Sztein, A Ester; Sparks, Donald L
2015-05-08
Human security has and will continue to rely on Earth's diverse soil resources. Yet we have now exploited the planet's most productive soils. Soil erosion greatly exceeds rates of production in many agricultural regions. Nitrogen produced by fossil fuel and geological reservoirs of other fertilizers are headed toward possible scarcity, increased cost, and/or geopolitical conflict. Climate change is accelerating the microbial release of greenhouse gases from soil organic matter and will likely play a large role in our near-term climate future. In this Review, we highlight challenges facing Earth's soil resources in the coming century. The direct and indirect response of soils to past and future human activities will play a major role in human prosperity and survival. Copyright © 2015, American Association for the Advancement of Science.
A malicious pattern detection engine for embedded security systems in the Internet of Things.
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
2014-12-16
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.
Cyber Safety and Security for Reduced Crew Operations (RCO)
NASA Technical Reports Server (NTRS)
Driscoll, Kevin R.; Roy, Aloke; Ponchak, Denise S.; Downey, Alan N.
2017-01-01
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified.
Harding, David J.; Wyse, Jessica J.B.; Dobson, Cheyney; Morenoff, Jeffrey D.
2014-01-01
Former prisoners are at high risk of economic insecurity due to the challenges they face in finding employment and to the difficulties of securing and maintaining public assistance while incarcerated. This study examines the processes through which former prisoners attain economic security, examining how they meet basic material needs and achieve upward mobility over time. It draws on unique qualitative data from in-depth, unstructured interviews with a sample of former prisoners followed over a two to three year period to assess how subjects draw upon a combination of employment, social supports, and public benefits to make ends meet. Findings reveal considerable struggle among our subjects to meet even minimal needs for shelter and food, although economic security and stability could be attained when employment or public benefits were coupled with familial social support. Sustained economic security was rarely achieved absent either strong social support or access to long-term public benefits. However, a select few were able to leverage material support and social networks into trajectories of upward mobility and economic independence. Policy implications are discussed. PMID:25584015
NASA Technical Reports Server (NTRS)
Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.
2018-01-01
River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.
Elements of ESA's policy on space and security
NASA Astrophysics Data System (ADS)
Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe
2018-06-01
In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.
Field-Richards, Sarah E; Arthur, Antony
2012-12-01
To explore the nurse-volunteer relationship in a day hospice. Underpinned by an interpretive approach, face-to-face semistructured interviews were conducted with 12 day hospice volunteers. The nature and dynamics of the relationship between nursing staff and volunteers within the day hospice were characterized by increasing formality and changes in the division of labor, which challenged smooth working relationships. Volunteers see their role as becoming increasingly formalized partly as a response to increasing administrative demands on hospice nurses. The willingness of volunteers to take on new roles is variable. For volunteers to feel secure and valued and working relationships to remain strong, the process of how boundaries between paid and unpaid workers are negotiated needs to be transparent.
77 FR 53201 - Federal Open Market Committee; Domestic Policy Directive of July 31-August 1, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-31
... Treasury securities with remaining maturities of 6 years to 30 years with a total face value of about $267... of approximately 3 years or less with a total face value of about $267 billion. For the duration of... Market Account in agency mortgage-backed securities. These actions should maintain the total face value...
76 FR 76162 - Federal Open Market Committee; Domestic Policy Directive of November 1-2, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-06
... approximately 6 years to 30 years with a total face value of $400 billion, and to sell Treasury securities with remaining maturities of 3 years or less with a total face value of $400 billion. The Committee also directs... face value of domestic securities at approximately $2.6 trillion. The Committee directs the Desk to...
NASA Astrophysics Data System (ADS)
Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor
Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.
Opportunities and Challenges of Cloud Computing to Improve Health Care Services
2011-01-01
Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects (management, technology, security, and legal) to evaluate the opportunities and challenges of this computing model. Strategic planning that could be used by a health organization to determine its direction, strategy, and resource allocation when it has decided to migrate from traditional to cloud-based health services is also discussed. PMID:21937354
Fernandes, Horst Monken; Recio, Manuel Santamaria; Forsstrom, Hans; Carson, Philip Michael
2013-05-01
The challenges faced by states seeking to implement Environmental Remediation works are many. To this end, the International Atomic Energy Agency attempts to provide assistance and guidance to Member States wherever possible. This review article provides a brief overview of these challenges and highlights the international sources of financial and implementation support discussed at an international conference on the topic in Astana, Kazakhstan in 2009. The conference concluded the importance of institutional structures as a pre-requisite for remediation work, recognized privatization as a useful but limited financing tool for remediation and illustrated the need for better coordination between international funding organizations to reduce overlap and optimization of resources to secure the best outcomes. Copyright © 2011 Elsevier Ltd. All rights reserved.
How is cyber threat evolving and what do organisations need to consider?
Borrett, Martin; Carter, Roger; Wespi, Andreas
Organisations and members of the public are becoming accustomed to the increasing velocity, frequency and variety of cyber-attacks that they have been facing over the last few years. In response to this challenge, it is important to explore what can be done to offer commercial and private users a reliable and functioning environment. This paper discusses how cyber threats might evolve in the future and seeks to explore these threats more fully. Attention is paid to the changing nature of cyber-attackers and their motivations and what this means for organisations. Finally, useful and actionable steps are provided, which practitioners can use to understand how they can start to address the future challenges of cyber security.
Materials for Sustainable Energy
NASA Astrophysics Data System (ADS)
Crabtree, George
2009-03-01
The global dependence on fossil fuels for energy is among the greatest challenges facing our economic, social and political future. The uncertainty in the cost and supply of oil threatens the global economy and energy security, the pollution of fossil combustion threatens human health, and the emission of greenhouse gases threatens global climate. Meeting the demand for double the current global energy use in the next 50 years without damaging our economy, security, environment or climate requires finding alternative sources of energy that are clean, abundant, accessible and sustainable. The transition to greater sustainability involves tapping unused energy flows such as sunlight and wind, producing electricity without carbon emissions from clean coal and high efficiency nuclear power plants, and using energy more efficiently in solid-state lighting, fuel cells and transportation based on plug-in hybrid and electric cars. Achieving these goals requires creating materials of increasing complexity and functionality to control the transformation of energy between light, electrons and chemical bonds. Challenges and opportunities for developing the complex materials and controlling the chemical changes that enable greater sustainability will be presented.
Generating unique IDs from patient identification data using security models.
Mohammed, Emad A; Slack, Jonathan C; Naugler, Christopher T
2016-01-01
The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.
Weird Project: E-Health Service Improvement Using WiMAX
NASA Astrophysics Data System (ADS)
Cimmino, Antonio; Casali, Fulvio; Mambretti, Cinzia
Today the major obstacle to massive deployment of telemedicine applications are the security issues related to the exchange of real time information between different elements that are not at fixed locations. WiMAX, the new standard for wireless communications, is one of the most promising technologies for broadband access in a fixed and mobile environment and it is expected to overcome the above mentioned obstacle. The FP6-WEIRD [1] (WiMax Extension to Isolated Remote Data networks) project has: analysed how this technology can guarantee secure real time data transmission between mobile elements, built some successful demonstrations and paved the way to future commercial applications. This paper in particular describes: main promising e-health applications that WiMax would enable; the technological highlights and the main challenges that WiMax has to face in e-health applications such as accounting, privacy, security, data integrity; the way in which the WEIRD project 0 has studied the wireless access to medical communities and equipment in remote or impervious areas. 0 0; some envisaged implementations.
Trade and commerce in improved crops and food: an essay on food security.
Kershen, Drew L
2010-11-30
Agricultural trade between nations is a significant proportion of total international trade. Agricultural trade in transgenic crops faces extra complications due to the existence of domestic and international regimes that focus specifically on agricultural biotechnology. These specialized regimes create legal and commercial challenges for trade in transgenic crops that have significant implications for the food security of the nations of the world. By food security, one should understand not just the available supply of food, but also the quality of the food and the environmental impact of agricultural production systems. These specialized regimes for transgenic crops can either encourage or hinder the adoption of agricultural biotechnology as a sustainable intensive agriculture. Sustainable intensive agriculture offers hope for agronomic improvements for agricultural production, socio-economic betterment for farmers and environmental benefits for societies. Sustainable intensive agriculture offers particular hope for the poorest farmers of the world because agricultural biotechnology is a technology in the seed. Copyright © 2010 Elsevier B.V. All rights reserved.
Subject Matter Expert Workshop to Identify Cybersecurity ...
Report In recognition of the growing need to better address cyber risk and cyber management, the U.S. Environmental Protection Agency’s (EPA) National Homeland Security Research Center (NHSRC) held a Subject Matter Expert Workshop to Identify Cybersecurity Research Gaps and Needs of the Nation’s Water and Wastewater Systems Sector on March 30th and 31st, 2016, at the Ronald Reagan Building in Washington, D.C. The workshop was designed to create a forum for subject matter experts (SMEs) to exchange ideas and address important cybersecurity challenges facing the water sector.
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
Sustainable Development and Energy Geotechnology Potential Roles for Geotechnical Engineering
DOE Office of Scientific and Technical Information (OSTI.GOV)
FragaszyProgram Dire, Dr. R. J.; Santamarina, Carlos; Espinoza, N.
2011-01-01
The world is facing unprecedented challenges related to energy resources, global climate change, material use, and waste generation. Failure to address these challenges will inhibit the growth of the developing world and will negatively impact the standard of living and security of future generations in all nations. The solutions to these challenges will require multidisciplinary research across the social and physical sciences and engineering. Although perhaps not always recognized, geotechnical engineering expertise is critical to the solution of many energy and sustainability-related problems. Hence, geotechnical engineers and academicians have opportunity and responsibility to contribute to the solution of these worldwidemore » problems. Research will need to be extended to non-standard issues such as thermal properties of soils; sediment and rock response to extreme conditions and at very long time scales; coupled hydro-chemo-thermo-bio-mechanical processes; positive feedback systems; the development of discontinuities; biological modification of soil properties; spatial variability; and emergent phenomena. Clearly, the challenges facing geotechnical engineering in the future will require a much broader knowledge base than our traditional educational programs provide. The geotechnical engineering curricula, from undergraduate education through continuing professional education, must address the changing needs of a profession that will increasingly be engaged in alternative/renewable energy production; energy efficiency; sustainable design, enhanced and more efficient use of natural resources, waste management, and underground utilization.« less
Co-Simulation for Advanced Process Design and Optimization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stephen E. Zitney
2009-01-01
Meeting the increasing demand for clean, affordable, and secure energy is arguably the most important challenge facing the world today. Fossil fuels can play a central role in a portfolio of carbon-neutral energy options provided CO{sub 2} emissions can be dramatically reduced by capturing CO{sub 2} and storing it safely and effectively. Fossil energy industry faces the challenge of meeting aggressive design goals for next-generation power plants with CCS. Process designs will involve large, highly-integrated, and multipurpose systems with advanced equipment items with complex geometries and multiphysics. APECS is enabling software to facilitate effective integration, solution, and analysis of high-fidelitymore » process/equipment (CFD) co-simulations. APECS helps to optimize fluid flow and related phenomena that impact overall power plant performance. APECS offers many advanced capabilities including ROMs, design optimization, parallel execution, stochastic analysis, and virtual plant co-simulations. NETL and its collaborative R&D partners are using APECS to reduce the time, cost, and technical risk of developing high-efficiency, zero-emission power plants with CCS.« less
[Face replantation using labial artery for revascularization. Case report].
de la Parra-Márquez, Miguel; Mondragón-González, Sergio; López-Palazuelos, Jaime; Naal-Mendoza, Norberto; Rangel-Flores, Jesús María
2013-01-01
Restoration of the face function and cosmetic appearance after a traumatic complex wound is a challenge for the plastic surgeon. Worldwide, few cases have been reported about face replantation. To present the case of the first partial face replantation reported in the national bibliography, using the labial artery for revascularization. On June 19th 2011, a 7 years old male presented to the emergency room of the Mexican Institute of Social Security at Monterrey, Mexico, 4 hours after a partial face amputation secondary to a dog bite. The amputated segment was composed of 75% of the upper lip, 33% of the lower lip, oral commissure and 75% of the left cheek. The labial coronary artery and vein were anastomosed with 11-0 nylon sutures and the miorraphy of the orbicularis oris, the depressor anguli oris and the depressor labii inferioris with 4-0 vycril sutures. Six months after the surgery, the functional and aesthetic outcomes were excellent with reestablishment of total labial continence and total recovery of articulation of words. amputations of any facial component should be initially managed with replantation. The function and cosmetics are better than any other technique of reconstruction. The labial coronary artery is an excellent choice for revascularization up to 25% of the face (lips and cheek).
13 CFR 107.1240 - Funding of Licensee's draw request through sale to short-term investor.
Code of Federal Regulations, 2010 CFR
2010-01-01
... which will be established at the time of the pooling of your security; (2) The purchase of your security... SBA sells your Debenture to a short-term investor: (1) The sale price will be the face amount. (2) At... Participating Security to a short-term investor, the sale price will be the face amount. (d) Licensee's right to...
Contemporary United States Foreign Policy Towards Indonesia
2004-01-01
regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national
Multi-factor challenge/response approach for remote biometric authentication
NASA Astrophysics Data System (ADS)
Al-Assam, Hisham; Jassim, Sabah A.
2011-06-01
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.
A&M. Radioactive parts security storage area. camera facing northwest. Outdoor ...
A&M. Radioactive parts security storage area. camera facing northwest. Outdoor storage of concrete storage casks. Photographer: M. Holmes. Date: November 21, 1959. INEEL negative no. 59-6081 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
Beyond Fossil Fuels: Options and Challenges
NASA Astrophysics Data System (ADS)
Thompson, Levi T.
2007-05-01
Securing our nationâÂÂs energy supply is arguably the most important challenge we face. The source and amount of energy that is available impacts nearly every aspect of our lives including our mobility, health and welfare. Presently, the U.S. depends heavily on foreign energy resources. For example, in 2006, nearly 60 percent of the crude oil consumed in the U.S. was imported; approximately one-quarter of this oil comes from the Persian Gulf. With growing demands from emerging economies, declining environmental quality and potential for global conflict, there is a pressing need to develop a more sustainable energy strategy. This presentation will review options for a sustainable energy economy including the use of hydrogen and fuel cells, and describe some of the key challenges To cite this abstract, use the following reference: http://meetings.aps.org/link/BAPS.2007.OSS07.A1.2
Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na
2017-01-01
Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver's sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment.
Biometrics: Facing Up to Terrorism
2001-10-01
ment committee appointed by Secretary of Trans- portation Norman Y. Mineta to review airport security measures will recommend that facial recogni- tion...on the Role Facial Recognition Technology Can Play in Enhancing Airport Security .” Joseph Atick, the CEO of Visionics, testified before the government...system at a U.S. air- port. This deployment is believed to be the first-in-the-nation use of face-recognition technology for airport security . The sys
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
Kobayashi, Norio; Ishii, Manabu; Takahashi, Satoshi; Mochizuki, Yoshiki; Matsushima, Akihiro; Toyoda, Tetsuro
2011-01-01
Global cloud frameworks for bioinformatics research databases become huge and heterogeneous; solutions face various diametric challenges comprising cross-integration, retrieval, security and openness. To address this, as of March 2011 organizations including RIKEN published 192 mammalian, plant and protein life sciences databases having 8.2 million data records, integrated as Linked Open or Private Data (LOD/LPD) using SciNetS.org, the Scientists' Networking System. The huge quantity of linked data this database integration framework covers is based on the Semantic Web, where researchers collaborate by managing metadata across public and private databases in a secured data space. This outstripped the data query capacity of existing interface tools like SPARQL. Actual research also requires specialized tools for data analysis using raw original data. To solve these challenges, in December 2009 we developed the lightweight Semantic-JSON interface to access each fragment of linked and raw life sciences data securely under the control of programming languages popularly used by bioinformaticians such as Perl and Ruby. Researchers successfully used the interface across 28 million semantic relationships for biological applications including genome design, sequence processing, inference over phenotype databases, full-text search indexing and human-readable contents like ontology and LOD tree viewers. Semantic-JSON services of SciNetS.org are provided at http://semanticjson.org. PMID:21632604
Privacy and anonymity in the information society - challenges for the European Union.
Tsoukalas, Ioannis A; Siozos, Panagiotis D
2011-03-01
Electronic information is challenging traditional views on property and privacy. The explosion of digital data, driven by novel web applications, social networking, and mobile devices makes data security and the protection of privacy increasingly difficult. Furthermore, biometric data and radiofrequency identification applications enable correlations that are able to trace our cultural, behavioral, and emotional states. The concept of privacy in the digital realm is transformed and emerges as one of the biggest risks facing today's Information Society. In this context, the European Union (EU) policy-making procedures strive to adapt to the pace of technological advancement. The EU needs to improve the existing legal frameworks for privacy and data protection. It needs to work towards a "privacy by education" approach for the empowerment of "privacy-literate" European digital citizens.
Cooperative Vehicular Networking: A Survey
Ahmed, Ejaz
2018-01-01
With the remarkable progress of cooperative communication technology in recent years, its transformation to vehicular networking is gaining momentum. Such a transformation has brought a new research challenge in facing the realization of cooperative vehicular networking (CVN). This paper presents a comprehensive survey of recent advances in the field of CVN. We cover important aspects of CVN research, including physical, medium access control, and routing protocols, as well as link scheduling and security. We also classify these research efforts in a taxonomy of cooperative vehicular networks. A set of key requirements for realizing the vision of cooperative vehicular networks is then identified and discussed. We also discuss open research challenges in enabling CVN. Lastly, the paper concludes by highlighting key points of research and future directions in the domain of CVN. PMID:29881331
A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
2014-01-01
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na
2017-01-01
Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver’s sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment. PMID:28484415
Biosensors for Sustainable Food Engineering: Challenges and Perspectives.
Neethirajan, Suresh; Ragavan, Vasanth; Weng, Xuan; Chand, Rohit
2018-03-12
Current food production faces tremendous challenges from growing human population, maintaining clean resources and food qualities, and protecting climate and environment. Food sustainability is mostly a cooperative effort resulting in technology development supported by both governments and enterprises. Multiple attempts have been promoted in tackling challenges and enhancing drivers in food production. Biosensors and biosensing technologies with their applications, are being widely applied to tackling top challenges in food production and its sustainability. Consequently, a growing demand in biosensing technologies exists in food sustainability. Microfluidics represents a technological system integrating multiple technologies. Nanomaterials, with its technology in biosensing, is thought to be the most promising tool in dealing with health, energy, and environmental issues closely related to world populations. The demand of point of care (POC) technologies in this area focus on rapid, simple, accurate, portable, and low-cost analytical instruments. This review provides current viewpoints from the literature on biosensing in food production, food processing, safety and security, food packaging and supply chain, food waste processing, food quality assurance, and food engineering. The current understanding of progress, solution, and future challenges, as well as the commercialization of biosensors are summarized.
NASA Astrophysics Data System (ADS)
Cui, Chen; Asari, Vijayan K.
2014-03-01
Biometric features such as fingerprints, iris patterns, and face features help to identify people and restrict access to secure areas by performing advanced pattern analysis and matching. Face recognition is one of the most promising biometric methodologies for human identification in a non-cooperative security environment. However, the recognition results obtained by face recognition systems are a affected by several variations that may happen to the patterns in an unrestricted environment. As a result, several algorithms have been developed for extracting different facial features for face recognition. Due to the various possible challenges of data captured at different lighting conditions, viewing angles, facial expressions, and partial occlusions in natural environmental conditions, automatic facial recognition still remains as a difficult issue that needs to be resolved. In this paper, we propose a novel approach to tackling some of these issues by analyzing the local textural descriptions for facial feature representation. The textural information is extracted by an enhanced local binary pattern (ELBP) description of all the local regions of the face. The relationship of each pixel with respect to its neighborhood is extracted and employed to calculate the new representation. ELBP reconstructs a much better textural feature extraction vector from an original gray level image in different lighting conditions. The dimensionality of the texture image is reduced by principal component analysis performed on each local face region. Each low dimensional vector representing a local region is now weighted based on the significance of the sub-region. The weight of each sub-region is determined by employing the local variance estimate of the respective region, which represents the significance of the region. The final facial textural feature vector is obtained by concatenating the reduced dimensional weight sets of all the modules (sub-regions) of the face image. Experiments conducted on various popular face databases show promising performance of the proposed algorithm in varying lighting, expression, and partial occlusion conditions. Four databases were used for testing the performance of the proposed system: Yale Face database, Extended Yale Face database B, Japanese Female Facial Expression database, and CMU AMP Facial Expression database. The experimental results in all four databases show the effectiveness of the proposed system. Also, the computation cost is lower because of the simplified calculation steps. Research work is progressing to investigate the effectiveness of the proposed face recognition method on pose-varying conditions as well. It is envisaged that a multilane approach of trained frameworks at different pose bins and an appropriate voting strategy would lead to a good recognition rate in such situation.
Facing the terror of nuclear terrorism.
Johnson, Raymond H
2003-05-01
As America prepares for homeland security and the response to terrorism, more occupational safety professionals may find themselves called upon to deal with terror in their own neighborhoods. While thousands of safety professionals are well trained technically to deal with many types of terrorism, they may not be well prepared to deal with the greater challenge, namely the terror of terrorism. Dealing with terror requires hearing and responding to people's feelings before providing technical answers. For safety professionals to be most effective in dealing with terrorism, they can benefit from more training on how to deal with terror.
Redefining the U.S. Agenda for Nuclear Disarmament, Analysis and Reflections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dunn, Lewis A.
With Lewis Dunn’s paper on nuclear disarmament diplomacy, we are inaugurating a new monograph series under the auspices of the Center for Global Security Research at Lawrence Livermore National Laboratory. The series will explore complex emerging challenges in the emerging security environment as they bear on issues of deterrence, assurance, and strategic stability. Our goal is to explore these issues deeply enough to provide significant new understanding that is technically informed and policy relevant. Our premise is that thoughtful students of international security affairs continue to value such in-depth analysis as a way to help make sense of the largemore » flow of data and opinion that reaches all of us on a daily basis. Our ambition is to generate four to six such papers per year on especially salient topics. The views expressed in these papers are those of the author and should not be attributed to the Center, the Laboratory, or the U.S. government. This inaugural paper addresses one of the key questions facing national leadership seven to eight years after President Obama’s April 2009 remarks in Prague and his commitment to take practical steps towards the long-term goal of the elimination of nuclear weapons. In the interim, some important steps have been taken. But there have also been many disappointments. The new presidential administration will face a security landscape quite different from that of eight years ago and must reassess U.S. priorities and approaches. As Lewis Dunn argues, some will be tempted to walk away entirely from the disarmament agenda, while others will advocate even more forcefully for unilateral U.S. steps to further reduce the role and number of nuclear weapons in its posture. Dr. Dunn sets out his own vision of how to adapt and carry forward the disarmament agenda, in a manner informed by developments in the security environment that point to a continuing role for nuclear deterrence. The result is both fresh and compelling.« less
Learning Competitive Intelligence from a Bunch of Screwballs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Troy Hiltbrand
Idaho National Laboratory is the Department of Energy’s (DOE) lead lab for nuclear energy research and is dedicated to supporting the advancement of missions in nuclear energy research, energy and environment, and national security. The laboratory is operated by Battelle Energy Alliance (BEA) and participates both independently and jointly with other labs in the support of work for the DOE and other government organizations. The Information Management department is a key support organization whose purpose is to enable the three key areas supporting the Laboratory mission, Nuclear Energy, National and Homeland Security, and Energy and Environment, are successful. The challengemore » that we face is having relevant information about what these key areas of the Laboratory are working on and how we can best support them in achieving overall mission success. In addition, one of the major challenges that they face comes with knowing their customers and their customer’s needs so that they can successfully execute on their mission. Technology Application Organizations today are dependent on understanding their customers and competitors so that they can respond accordingly, but this can be a difficult and vexing challenge. Customers do not always reveal all of their needs and competitors rarely come out and reveal what they are doing, but this does not mean that hints about their plans are not abundant in information that is readily available. The challenge has always been how to keep track of all that is happening and converting that into useful information. Taking the lead from the “Screwball Division” from World War II, we have the tools available to automate this process and start to mine the Internet to get clues of what our customers and competitors are actively working on. By looking at what is being said and relating that to what else is being said, we can build competitive intelligence and act upon this to further our organizational objectives.« less
Patients with mental problems - the most defenseless travellers.
Felkai, Peter; Kurimay, Tamas
2017-09-01
Severe mental illness occurring abroad is a difficult situation for patients, their families, and for the local medical community. Patients with mental problem are doublely stigmatized due to their mental illness and because they are foreigners in an unfamiliar country. The appropriate treatment is often delayed, while patients are often dealt with in a manner that violates their human rights. Moreover, repatriation - which is vital in this case - is often delayed due to the lack of international protocols for the transportation and treatment of mentally ill travelers. Authors analyzed several factors related to acute mental health problems during travel: the etiology of symptoms, the appropriate treatment possibilities abroad, and medical evacuation and repatriation of the psychotic patient. The article presents a brief review of travel-related mental disorders, the epidemiology of mental health issues faced by travelers, and the significance of pre-travel advice for these patients. The first problem is to recognize (and redress) the particular challenges faced by a psychotic patient in a strange country. The second challenge is to prepare the patients, often in a poor psychiatric state, for medical evacuation by commercial aircraft. Another important question is the best way to take the patient through customs and security control. All of these, as yet unresolved, issues can make the mental patient virtually defenseless. Although timely repatriation of a mentally ill patient is vital and urgent, most travel insurance policies exclude treatment and repatriation costs incurred due to acute mental illness. The high cost of treatment and repatriation must be paid by the patient or their family, which could lead to severe financial strain or insolvency. Changing the approaches taken by the local mental health care community, police, airport security, and insurance companies remain a challenge for psychiatrists. © International Society of Travel Medicine, 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com
NASA Astrophysics Data System (ADS)
Brown, Willie L., Jr.
Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.
Abisa, Michael
2017-01-01
To explore the challenges Health Information Technology (HIT) vendors face to satisfy the requirements for Meaningful Use (MU) and Electronic Laboratory Reporting (ELR) of reportable diseases to the public health departments in Kentucky. A survey was conducted of Health Information Exchange (HIE) vendors in Kentucky through the Kentucky Health Information Exchange (KHIE). The survey was cross-sectional. Data were collected between February and March 2014. Participants were recruited from KHIE vendors. Participants received online survey link and by email and asked to submit their responses. Vendors' feedback were summarized and analyzed to identify their challenges. Out of the 55 vendors who received the survey, 35(63.64%) responded. Of the seven transport protocol options for ELR, vendors selected virtual private network (VPN) as the most difficult to implement (31.7%). Secure File Transfer Protocol (SFTP) was selected as preferred ELR transport protocol (31.4%). Most of the respondents, 80% responded that they do not have any challenge with the Health Level 7 (HL7) standard implementation guide required by MU for 2014 ELR certification. The study found that the most difficult transport protocol to implement for ELR is VPN and if vendors have preference, they would use SFTP for ELR over KHIE choice of VPN and Simple Object Access Protocol (SOAP). KHIE vendors do not see any variability in what is reportable by different jurisdiction and also it is not difficult for them to detect what is reportable from one jurisdiction verse the other.
Powell, A E; Davies, H T O; Bannister, J; Macrae, W A
2009-06-01
Previous national survey research has shown significant deficits in routine postoperative pain management in the UK. This study used an organizational change perspective to explore in detail the organizational challenges faced by three acute pain services in improving postoperative pain management. Case studies were conducted comprising documentary review and semi-structured interviews (71) with anaesthetists, surgeons, nurses, other health professionals, and managers working in and around three broadly typical acute pain services. Although the precise details differed to some degree, the three acute pain services all faced the same broad range of inter-related challenges identified in the organizational change literature (i.e. structural, political, cultural, educational, emotional, and physical/technological challenges). The services were largely isolated from wider organizational objectives and activities and struggled to engage other health professionals in improving postoperative pain management against a background of limited resources, turbulent organizational change, and inter- and intra-professional politics. Despite considerable efforts they struggled to address these challenges effectively. The literature on organizational change and quality improvement in health care suggests that it is only by addressing the multiple challenges in a comprehensive way across all levels of the organization and health-care system that sustained improvements in patient care can be secured. This helps to explain why the hard work and commitment of acute pain services over the years have not always resulted in significant improvements in routine postoperative pain management for all surgical patients. Using this literature and adopting a whole-organization quality improvement approach tailored to local circumstances may produce a step-change in the quality of routine postoperative pain management.
NASA Technical Reports Server (NTRS)
Sinderson, Elias; Magapu, Vish; Mak, Ronald
2004-01-01
We describe the design and deployment of the middleware for the Collaborative Information Portal (CIP), a mission critical J2EE application developed for NASA's 2003 Mars Exploration Rover mission. CIP enabled mission personnel to access data and images sent back from Mars, staff and event schedules, broadcast messages and clocks displaying various Earth and Mars time zones. We developed the CIP middleware in less than two years time usins cutting-edge technologies, including EJBs, servlets, JDBC, JNDI and JMS. The middleware was designed as a collection of independent, hot-deployable web services, providing secure access to back end file systems and databases. Throughout the middleware we enabled crosscutting capabilities such as runtime service configuration, security, logging and remote monitoring. This paper presents our approach to mitigating the challenges we faced, concluding with a review of the lessons we learned from this project and noting what we'd do differently and why.
Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.
Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin
2017-11-01
Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.
ASCR Cybersecurity for Scientific Computing Integrity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piesert, Sean
The Department of Energy (DOE) has the responsibility to address the energy, environmental, and nuclear security challenges that face our nation. Much of DOE’s enterprise involves distributed, collaborative teams; a signi¬cant fraction involves “open science,” which depends on multi-institutional, often international collaborations that must access or share signi¬cant amounts of information between institutions and over networks around the world. The mission of the Office of Science is the delivery of scienti¬c discoveries and major scienti¬c tools to transform our understanding of nature and to advance the energy, economic, and national security of the United States. The ability of DOE tomore » execute its responsibilities depends critically on its ability to assure the integrity and availability of scienti¬c facilities and computer systems, and of the scienti¬c, engineering, and operational software and data that support its mission.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Tornado Gold International Corp., Twin Faces East Entertainment Corp., Universal Ice Blast, Inc., US Farms, Inc., US Microbics... concerning the securities of Tornado Gold International Corp. because it has not filed any periodic reports...
NASA Astrophysics Data System (ADS)
Rose, Jake; Martin, Michael; Bourlai, Thirimachos
2014-06-01
In law enforcement and security applications, the acquisition of face images is critical in producing key trace evidence for the successful identification of potential threats. The goal of the study is to demonstrate that steroid usage significantly affects human facial appearance and hence, the performance of commercial and academic face recognition (FR) algorithms. In this work, we evaluate the performance of state-of-the-art FR algorithms on two unique face image datasets of subjects before (gallery set) and after (probe set) steroid (or human growth hormone) usage. For the purpose of this study, datasets of 73 subjects were created from multiple sources found on the Internet, containing images of men and women before and after steroid usage. Next, we geometrically pre-processed all images of both face datasets. Then, we applied image restoration techniques on the same face datasets, and finally, we applied FR algorithms in order to match the pre-processed face images of our probe datasets against the face images of the gallery set. Experimental results demonstrate that only a specific set of FR algorithms obtain the most accurate results (in terms of the rank-1 identification rate). This is because there are several factors that influence the efficiency of face matchers including (i) the time lapse between the before and after image pre-processing and restoration face photos, (ii) the usage of different drugs (e.g. Dianabol, Winstrol, and Decabolan), (iii) the usage of different cameras to capture face images, and finally, (iv) the variability of standoff distance, illumination and other noise factors (e.g. motion noise). All of the previously mentioned complicated scenarios make clear that cross-scenario matching is a very challenging problem and, thus, further investigation is required.
Genomic Selection Improves Heat Tolerance in Dairy Cattle
Garner, J. B.; Douglas, M. L.; Williams, S. R. O; Wales, W. J.; Marett, L. C.; Nguyen, T. T. T.; Reich, C. M.; Hayes, B. J.
2016-01-01
Dairy products are a key source of valuable proteins and fats for many millions of people worldwide. Dairy cattle are highly susceptible to heat-stress induced decline in milk production, and as the frequency and duration of heat-stress events increases, the long term security of nutrition from dairy products is threatened. Identification of dairy cattle more tolerant of heat stress conditions would be an important progression towards breeding better adapted dairy herds to future climates. Breeding for heat tolerance could be accelerated with genomic selection, using genome wide DNA markers that predict tolerance to heat stress. Here we demonstrate the value of genomic predictions for heat tolerance in cohorts of Holstein cows predicted to be heat tolerant and heat susceptible using controlled-climate chambers simulating a moderate heatwave event. Not only was the heat challenge stimulated decline in milk production less in cows genomically predicted to be heat-tolerant, physiological indicators such as rectal and intra-vaginal temperatures had reduced increases over the 4 day heat challenge. This demonstrates that genomic selection for heat tolerance in dairy cattle is a step towards securing a valuable source of nutrition and improving animal welfare facing a future with predicted increases in heat stress events. PMID:27682591
Eagleson, Roy; Altamirano-Diaz, Luis; McInnis, Alex; Welisch, Eva; De Jesus, Stefanie; Prapavessis, Harry; Rombeek, Meghan; Seabrook, Jamie A; Park, Teresa; Norozi, Kambiz
2017-03-17
With the increasing implementation of web-based, mobile health interventions in clinical trials, it is crucial for researchers to address the security and privacy concerns of patient information according to high ethical standards. The full process of meeting these standards is often made more complicated due to the use of internet-based technology and smartphones for treatment, telecommunication, and data collection; however, this process is not well-documented in the literature. The Smart Heart Trial is a single-arm feasibility study that is currently assessing the effects of a web-based, mobile lifestyle intervention for overweight and obese children and youth with congenital heart disease in Southwestern Ontario. Participants receive telephone counseling regarding nutrition and fitness; and complete goal-setting activities on a web-based application. This paper provides a detailed overview of the challenges the study faced in meeting the high standards of our Research Ethics Board, specifically regarding patient privacy. We outline our solutions, successes, limitations, and lessons learned to inform future similar studies; and model much needed transparency in ensuring high quality security and protection of patient privacy when using web-based and mobile devices for telecommunication and data collection in clinical research.
48 CFR 1480.903 - Award in the face of challenge.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Award in the face of challenge. 1480.903 Section 1480.903 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR... Award in the face of challenge. (a) Award of a contract in the face of challenge may be made on the...
48 CFR 1480.903 - Award in the face of challenge.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Award in the face of challenge. 1480.903 Section 1480.903 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR... Award in the face of challenge. (a) Award of a contract in the face of challenge may be made on the...
The Many Faces of a Software Engineer in a Research Community
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marinovici, Maria C.; Kirkham, Harold
2013-10-14
The ability to gather, analyze and make decisions based on real world data is changing nearly every field of human endeavor. These changes are particularly challenging for software engineers working in a scientific community, designing and developing large, complex systems. To avoid the creation of a communications gap (almost a language barrier), the software engineers should possess an ‘adaptive’ skill. In the science and engineering research community, the software engineers must be responsible for more than creating mechanisms for storing and analyzing data. They must also develop a fundamental scientific and engineering understanding of the data. This paper looks atmore » the many faces that a software engineer should have: developer, domain expert, business analyst, security expert, project manager, tester, user experience professional, etc. Observations made during work on a power-systems scientific software development are analyzed and extended to describe more generic software development projects.« less
The welfare state, pensions, privatization: the case of Social Security in the United States.
Du Boff, R B
1997-01-01
In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.
Using ESB and BPEL for Evolving Healthcare Systems Towards Pervasive, Grid-Enabled SOA
NASA Astrophysics Data System (ADS)
Koufi, V.; Malamateniou, F.; Papakonstantinou, D.; Vassilacopoulos, G.
Healthcare organizations often face the challenge of integrating diverse and geographically disparate information technology systems to respond to changing requirements and to exploit the capabilities of modern technologies. Hence, systems evolution, through modification and extension of the existing information technology infrastructure, becomes a necessity. Moreover, the availability of these systems at the point of care when needed is a vital issue for the quality of healthcare provided to patients. This chapter takes a process perspective of healthcare delivery within and across organizational boundaries and presents a disciplined approach for evolving healthcare systems towards a pervasive, grid-enabled service-oriented architecture using the enterprise system bus middleware technology for resolving integration issues, the business process execution language for supporting collaboration requirements and grid middleware technology for both addressing common SOA scalability requirements and complementing existing system functionality. In such an environment, appropriate security mechanisms must ensure authorized access to integrated healthcare services and data. To this end, a security framework addressing security aspects such as authorization and access control is also presented.
Generating unique IDs from patient identification data using security models
Mohammed, Emad A.; Slack, Jonathan C.; Naugler, Christopher T.
2016-01-01
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. Method: We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. Results: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. Conclusion: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data. PMID:28163977
[Regional ecological construction and mission of landscape ecology].
Xiao, Duning; Xie, Fuju; Wei, Jianbing
2004-10-01
The eco-construction on regional and landscape scale is the one which can be used to specific landscape and intercrossing ecosystem in specific region including performing scientific administration of ecosystem and optimizing environmental function. Recently, the government has taken a series of significant projects into action, such as national forest protection item, partly forest restoration, and adjustment of water, etc. Enforcing regional eco-construction and maintaining the ecology security of the nation have become the strategic requisition. In various regions, different eco-construction should be applied, for example, performing ecological safeguard measure in ecological sensitive zone, accommodating the ecological load in ecological fragile zone, etc., which can control the activities of human being, so that, sustainable development can be reached. Facing opportunity and challenge in the development of landscape ecology, we have some key topics: landscape pattern of ecological security, land use and ecological process, landscape changes under human activity stress, quantitative evaluation of the influence on human being activities, evaluation of zonal ecological security and advance warning of ecological risk, and planning and optimizing of model in landscape eco-construction.
3D Face Generation Tool Candide for Better Face Matching in Surveillance Video
2014-07-01
Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale... public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal activity – e.g. smuggling
Ashley, L; Jones, H; Thomas, J; Forman, D; Newsham, A; Morris, E; Johnson, O; Velikova, G; Wright, P
2011-01-01
Background: Understanding the psychosocial challenges of cancer survivorship, and identifying which patients experience ongoing difficulties, is a key priority. The ePOCS (electronic patient-reported outcomes from cancer survivors) project aims to develop and evaluate a cost-efficient, UK-scalable electronic system for collecting patient-reported outcome measures (PROMs), at regular post-diagnostic timepoints, and linking these with clinical data in cancer registries. Methods: A multidisciplinary team developed the system using agile methods. Design entailed process mapping the system's constituent parts, data flows and involved human activities, and undertaking usability testing. Informatics specialists built new technical components, including a web-based questionnaire tool and tracking database, and established component-connecting data flows. Development challenges were overcome, including patient usability and data linkage and security. Results: We have developed a system in which PROMs are completed online, using a secure questionnaire administration tool, accessed via a public-facing website, and the responses are linked and stored with clinical registry data. Patient monitoring and communications are semiautomated via a tracker database, and patient correspondence is primarily Email-based. The system is currently honed for clinician-led hospital-based patient recruitment. Conclusions: A feasibility test study is underway. Although there are possible challenges to sustaining and scaling up ePOCS, the system has potential to support UK epidemiological PROMs collection and clinical data linkage. PMID:22048035
Verifying the secure setup of Unix client/servers and detection of network intrusion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feingold, R.; Bruestle, H.R.; Bartoletti, T.
1995-07-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less
ERIC Educational Resources Information Center
O'Day, Bonnie; Stapleton, David
2009-01-01
The transition to adulthood can be difficult for youth, particularly those who have disabilities severe enough that they receive Supplemental Security Income (SSI), Social Security Disability Insurance (DI), or other disability program benefits. Besides the issues facing all transition-age youth, young people with disabilities face a host of…
ARPA-E: Celebrating the Energy Entrepreneur
Williams, Ellen; Henshall, Dave; Babinec, Sue; Wessells, Colin; Zakhor, Avideh; Mockler, Todd
2018-01-16
The world faces urgent energy challenges brought on by projected population increases, aging infrastructure and the global threat of climate change. ARPA-E is investing in some of the countryâs brightest energy entrepreneurs that are developing innovative technological options to help meet future energy needs. Featuring remarks from ARPA-E Director Dr. Ellen D. Williams, as well as interviews with the Deputy Director of Commercialization Dave Henshall, Senior Technology-to-Market Advisor Sue Babinec, and a number of ARPA-E awardees, this video highlights the energy entrepreneur, and the critical role they play in creating solutions to address future energy challenges and ensure a secure energy future. The video also incorporates footage shot on site with several ARPA-E awardees who are spurring innovation, much of which will be highlighted in other videos shown throughout the Summit.
Social security reform in Latin America: policy challenges.
Kay, Stephen J; Kritzer, Barbara E
2002-01-01
Over the last decade Latin American countries have served as the world's laboratory for pension systems based on individual retirement savings accounts. Some countries have adopted defined-contribution individual accounts as a replacement for state-run pension systems; other countries have embraced mixed systems of have made individual accounts optional and supplementary. This article outlines some of the most significant elements of recent Latin American pension reforms and examines some of the most serious policy challenges faced by governments implementing the new systems of individual accounts, including the need to reduce administrative costs, limit evasion, incorporate new categories of workers into the system, and improve competition in the pension fund industry. The authors conclude that there is no single Latin America model, and that reform itself has been and will continue to be an incremental process.
From Online Student to Online Instructor: Assistive Strategies
ERIC Educational Resources Information Center
McKnight, Jodi
2012-01-01
With the influx of online learning opportunities, online students and instructors are faced with a variety of challenges. Online students face the same challenges as do face-to-face learners, but by facing them in an online context, the interpretations of those challenges can lead to the success or failure of their overall educational experience.…
Cyber Safety and Security for Reduced Crew Operations (RCO)
NASA Technical Reports Server (NTRS)
Driscoll, Kevin
2017-01-01
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.
A human rights approach to the health implications of food and nutrition insecurity.
Ayala, Ana; Meier, Benjamin Mason
2017-01-01
Food and nutrition insecurity continues to pose a serious global challenge, reflecting government shortcomings in meeting international obligations to ensure the availability, accessibility, and quality of food and to ensure the highest attainable standard of health of their peoples. With global drivers like climate change, urbanization, greater armed conflict, and the globalization of unhealthy diet, particularly in under-resourced countries, food insecurity is rapidly becoming an even greater challenge for those living in poverty. International human rights law can serve a critical role in guiding governments that are struggling to protect the health of their populations, particularly among the most susceptible groups, in responding to food and nutrition insecurity. This article explores and advocates for a human rights approach to food and nutrition security, specifically identifying legal mechanisms to "domesticate" relevant international human rights standards through national policy. Recognizing nutrition security as a determinant of public health, this article recognizes the important links between the four main elements of food security (i.e., availability, stability, utilization, and access) and the normative attributes of the right to health and the right to food (i.e., availability, accessibility, affordability, and quality). In drawing from the evolution of international human rights instruments, official documents issued by international human rights treaty bodies, as well as past scholarship at the intersection of the right to health and right to food, this article interprets and articulates the intersectional rights-based obligations of national governments in the face of food and nutrition insecurity.
Challenges of a community based pragmatic, randomised controlled trial of weight loss maintenance.
Randell, Elizabeth; McNamara, Rachel; Shaw, Christine; Espinasse, Aude; Simpson, Sharon Anne
2015-12-18
Randomised controlled trials (RCTs) have a reputation for being inherently difficult to deliver as planned and often face unforeseen challenges and delays, particularly in relation to organisational and governance difficulties, participant interest, constraints due to allocation of costs, local investigator interest and lengthy bureaucracy. Recruitment is often difficult and the challenges faced often impact on the cost and delivery of a successful trial within the funded period. This paper reflects upon the challenges faced in delivering a pragmatic RCT of weight loss maintenance in a community setting and suggests some potential solutions. The weight loss maintenance in adults trial aimed to evaluate the impact of a 12 month, individually tailored weight maintenance intervention on BMI 3 years from randomisation. Participants were recruited primarily from participant identification centres (PICs)-GP surgeries, exercise on referral schemes and slimming world. The intervention was delivered in community settings. A recruitment strategy implementation plan was drafted to address and monitor poor recruitment. Delays in opening and recruitment were experienced early on. Some were beyond the control of the study team such as; disagreement over allocation of national health service costs and PIC classification as well as difficulties in securing support from research networks. That the intervention was delivered in community settings was often at the root of these issues. Key items to address at the design stage of future trials include feasibility of eligibility criteria. The most effective element of the recruitment implementation plan was to refocus sources of recruitment and target only those who could fulfil the eligibility criteria immediately. Learnings from this trial should be kept in mind by those designing similar studies in the future. Considering potential governance, cost and research network support implications at the design stage of pragmatic trials of any community-based complex intervention is paramount. The appropriateness and viability of inclusion criteria also require careful consideration as does use of a targeted advertising strategy. ISRCTN35774128, 12/01/2010.
NASA Astrophysics Data System (ADS)
Bamiah, Mervat Adib; Brohi, Sarfraz Nawaz; Chuprat, Suriayati
2012-01-01
Virtualization is one of the hottest research topics nowadays. Several academic researchers and developers from IT industry are designing approaches for solving security and manageability issues of Virtual Machines (VMs) residing on virtualized cloud infrastructures. Moving the application from a physical to a virtual platform increases the efficiency, flexibility and reduces management cost as well as effort. Cloud computing is adopting the paradigm of virtualization, using this technique, memory, CPU and computational power is provided to clients' VMs by utilizing the underlying physical hardware. Beside these advantages there are few challenges faced by adopting virtualization such as management of VMs and network traffic, unexpected additional cost and resource allocation. Virtual Machine Monitor (VMM) or hypervisor is the tool used by cloud providers to manage the VMs on cloud. There are several heterogeneous hypervisors provided by various vendors that include VMware, Hyper-V, Xen and Kernel Virtual Machine (KVM). Considering the challenge of VM management, this paper describes several techniques to monitor and manage virtualized cloud infrastructures.
Trestman, Robert L
2014-09-01
Restricting a person's liberty presents society with many inherent ethical challenges. The historical purposes of confinement have included punishment, penitence, containment, rehabilitation, and habilitation. While the purposes are indeed complex, multifaceted, and at times ambiguous or contradictory, the fact of incarceration intrinsically creates many ethical challenges for psychiatrists working in correctional settings. Role definition of a psychiatrist may be ambiguous, with potential tensions between forensic and therapeutic demands. Privacy may be limited or absent and confidentiality may be compromised. Patient autonomy may be threatened to address real or perceived security concerns. Care delivery may actually have harmful consequences in court cases for pretrial detainees or lethal consequences for those under a death sentence. An absence of data and targeted research hampers the development of evidence-based care delivery for the disenfranchised, understudied, and disproportionately ill prisoner population. In this review paper, I discuss a few of the challenges and dilemmas routinely faced and present a series of questions. Where feasible, proposed resolutions are offered.
Enabling SDN in VANETs: What is the Impact on Security?
Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas
2016-01-01
The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers’ behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture. PMID:27929443
Enabling SDN in VANETs: What is the Impact on Security?
Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas
2016-12-06
The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens' quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers' behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture.
Schukat, M; McCaldin, D; Wang, K; Schreier, G; Lovell, N H; Marschollek, M; Redmond, S J
2016-11-10
As wearable sensors take the consumer market by storm, and medical device manufacturers move to make their devices wireless and appropriate for ambulatory use, this revolution brings with it some unintended consequences, which we aim to discuss in this paper. We discuss some important unintended consequences, both beneficial and unwanted, which relate to: modifications of behavior; creation and use of big data sets; new security vulnerabilities; and unforeseen challenges faced by regulatory authorities, struggling to keep pace with recent innovations. Where possible, we proposed potential solutions to unwanted consequences. Intelligent and inclusive design processes may mitigate unintended modifications in behavior. For big data, legislating access to and use of these data will be a legal and political challenge in the years ahead, as we trade the health benefits of wearable sensors against the risk to our privacy. The wireless and personal nature of wearable sensors also exposes them to a number of unique security vulnerabilities. Regulation plays an important role in managing these security risks, but also has the dual responsibility of ensuring that wearable devices are fit for purpose. However, the burden of validating the function and security of medical devices is becoming infeasible for regulators, given the many software apps and wearable sensors entering the market each year, which are only a subset of an even larger 'internet of things'. Wearable sensors may serve to improve wellbeing, but we must be vigilant against the occurrence of unintended consequences. With collaboration between device manufacturers, regulators, and end-users, we balance the risk of unintended consequences occurring against the incredible benefit that wearable sensors promise to bring to the world.
Unintended Consequences of Wearable Sensor Use in Healthcare
McCaldin, D.; Wang, K.; Schreier, G.; Lovell, N. H.; Marschollek, M.; Redmond, S. J.
2016-01-01
Summary Objectives As wearable sensors take the consumer market by storm, and medical device manufacturers move to make their devices wireless and appropriate for ambulatory use, this revolution brings with it some unintended consequences, which we aim to discuss in this paper. Methods We discuss some important unintended consequences, both beneficial and unwanted, which relate to: modifications of behavior; creation and use of big data sets; new security vulnerabilities; and unforeseen challenges faced by regulatory authorities, struggling to keep pace with recent innovations. Where possible, we proposed potential solutions to unwanted consequences. Results Intelligent and inclusive design processes may mitigate unintended modifications in behavior. For big data, legislating access to and use of these data will be a legal and political challenge in the years ahead, as we trade the health benefits of wearable sensors against the risk to our privacy. The wireless and personal nature of wearable sensors also exposes them to a number of unique security vulnerabilities. Regulation plays an important role in managing these security risks, but also has the dual responsibility of ensuring that wearable devices are fit for purpose. However, the burden of validating the function and security of medical devices is becoming infeasible for regulators, given the many software apps and wearable sensors entering the market each year, which are only a subset of an even larger ‘internet of things’. Conclusion Wearable sensors may serve to improve wellbeing, but we must be vigilant against the occurrence of unintended consequences. With collaboration between device manufacturers, regulators, and end-users, we balance the risk of unintended consequences occurring against the incredible benefit that wearable sensors promise to bring to the world. PMID:27830234
ERIC Educational Resources Information Center
Okolo, Nkiru Benjamin
2016-01-01
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks.
Alshinina, Remah; Elleithy, Khaled
2017-03-08
Wireless Sensor Networks (WSNs) have become essential components for a variety of environmental, surveillance, military, traffic control, and healthcare applications. These applications face critical challenges such as communication, security, power consumption, data aggregation, heterogeneities of sensor hardware, and Quality of Service (QoS) issues. Service-Oriented Architecture (SOA) is a software architecture that can be integrated with WSN applications to address those challenges. The SOA middleware bridges the gap between the high-level requirements of different applications and the hardware constraints of WSNs. This survey explores state-of-the-art approaches based on SOA and Service-Oriented Middleware (SOM) architecture that provide solutions for WSN challenges. The categories of this paper are based on approaches of SOA with and without middleware for WSNs. Additionally, features of SOA and middleware architectures for WSNs are compared to achieve more robust and efficient network performance. Design issues of SOA middleware for WSNs and its characteristics are also highlighted. The paper concludes with future research directions in SOM architecture to meet all requirements of emerging application of WSNs.
Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks
Alshinina, Remah; Elleithy, Khaled
2017-01-01
Wireless Sensor Networks (WSNs) have become essential components for a variety of environmental, surveillance, military, traffic control, and healthcare applications. These applications face critical challenges such as communication, security, power consumption, data aggregation, heterogeneities of sensor hardware, and Quality of Service (QoS) issues. Service-Oriented Architecture (SOA) is a software architecture that can be integrated with WSN applications to address those challenges. The SOA middleware bridges the gap between the high-level requirements of different applications and the hardware constraints of WSNs. This survey explores state-of-the-art approaches based on SOA and Service-Oriented Middleware (SOM) architecture that provide solutions for WSN challenges. The categories of this paper are based on approaches of SOA with and without middleware for WSNs. Additionally, features of SOA and middleware architectures for WSNs are compared to achieve more robust and efficient network performance. Design issues of SOA middleware for WSNs and its characteristics are also highlighted. The paper concludes with future research directions in SOM architecture to meet all requirements of emerging application of WSNs. PMID:28282896
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Eco Global Corporation, Execute Sports, Inc., FacePrint Global Solutions, Inc., FinancialContent, Inc., and Firstgold Corp.; Order of Suspension of Trading January 16, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning...
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
Research on the information security system in electrical gis system in mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
2017-05-01
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
EPA's Sustainable Port Communities: Anticipating Changes in ...
Port Communities Face Many Challenges: • Climate change – Sea Level Rise, Extreme Events: “Assets” become Vulnerabilities; Nuisance flooding; Changes in waste water and stormwater capacity; Changes in near-shore ecology and water quality • Port Expansion: Increasing multi-modal cargo transport, bigger ships; Energy use, transport; Invasive species; Homeland security; Increased development pressure (land use); Population growth • EJ Communities: Hazardous waste, cargo; Changes in emissions (amount, type, distribution) Changes in demographics, real estate values Disproportionately impacted by climate change • Competing Economic Interests Tourism and historical resources Protection of ecosystem services To make other federal agencies involved in resilience research aware of our study and to solicit collaboration.
Service-oriented Software Defined Optical Networks for Cloud Computing
NASA Astrophysics Data System (ADS)
Liu, Yuze; Li, Hui; Ji, Yuefeng
2017-10-01
With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.g., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). This paper proposes a new service-oriented software defined optical network architecture, including a resource layer, a service abstract layer, a control layer and an application layer. We then dwell on the corresponding service providing method. Different service ID is used to identify the service a device can offer. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit different services based on the service ID in the service-oriented software defined optical network.
Braathen, Stine Hellum; Sanudi, Lifah; Swartz, Leslie; Jürgens, Thomas; Banda, Hastings T; Eide, Arne Henning
2016-04-01
Equitable access to health care is a challenge in many low-income countries. The most vulnerable segments of any population face increased challenges, as their vulnerability amplifies problems of the general population. This implies a heavy burden on informal care-givers in their immediate and extended households. However, research falls short of explaining the particular challenges experienced by these individuals and households. To build an evidence base from the ground, we present a single case study to explore and understand the individual experience, to honour what is distinctive about the story, but also to use the individual story to raise questions about the larger context. We use a single qualitative case study approach to provide an in-depth, contextual and household perspective on barriers, facilitators, and consequences of care provided to persons with disability and HIV. The results from this study emphasise the burden that caring for an HIV positive and disabled family member places on an already impoverished household, and the need for support, not just for the HIV positive and disabled person, but for the entire household. Disability and HIV do not only affect the individual, but the whole household, immediate and extended. It is crucial to consider the interconnectedness of the challenges faced by an individual and a household. Issues of health (physical and mental), disability, employment, education, infrastructure (transport/terrain) and poverty are all related and interconnected, and should be addressed as a whole in order to secure equity in health.
Norris, S A; Anuar, H; Matzen, P; Cheah, J C H; Jensen, B B; Hanson, M
2014-01-01
Malaysia faces burgeoning obesity and diabetes epidemics with a 250% and 88% increase respectively between 1996 and 2006. Identifying the health challenges of young adults in Malaysia, who constitute 27.5 % of the population, is critical for NCD prevention. The aim of the study was two-fold: (1) to achieve consensus amongst stakeholders on the most important challenge impacting the health of young adults, and (2) to engage with stakeholders to formulate a NCD prevention framework. The Delphi Technique was utilised to achieve group consensus around the most important life and health challenges that young adults face in Malaysia. Subsequently, the results of the consensus component were shared with the stakeholders in an engagement workshop to obtain input on a NCD prevention framework. We found that life stress was a significant concern. It would seem that the apathy towards pursuing or maintaining a healthy lifestyle among young adults may be significantly influenced by the broader distal determinant of life stress. The high cost of living is suggested to be the main push factor for young working adults towards attaining better financial security to improve their livelihood. In turn, this leads to a more stressful lifestyle with less time to focus on healthier lifestyle choices. The findings highlight a pivotal barrier to healthier lifestyles. By assisting young adults to cope with daily living coupled with realistic opportunities to make healthier dietary choices, be more active, and less sedentary could assist in the development of NCD health promotion strategies.
2014-01-01
Background Malaysia faces burgeoning obesity and diabetes epidemics with a 250% and 88% increase respectively between 1996 and 2006. Identifying the health challenges of young adults in Malaysia, who constitute 27.5 % of the population, is critical for NCD prevention. The aim of the study was two-fold: (1) to achieve consensus amongst stakeholders on the most important challenge impacting the health of young adults, and (2) to engage with stakeholders to formulate a NCD prevention framework. Methods The Delphi Technique was utilised to achieve group consensus around the most important life and health challenges that young adults face in Malaysia. Subsequently, the results of the consensus component were shared with the stakeholders in an engagement workshop to obtain input on a NCD prevention framework. Results We found that life stress was a significant concern. It would seem that the apathy towards pursuing or maintaining a healthy lifestyle among young adults may be significantly influenced by the broader distal determinant of life stress. The high cost of living is suggested to be the main push factor for young working adults towards attaining better financial security to improve their livelihood. In turn, this leads to a more stressful lifestyle with less time to focus on healthier lifestyle choices. Conclusions The findings highlight a pivotal barrier to healthier lifestyles. By assisting young adults to cope with daily living coupled with realistic opportunities to make healthier dietary choices, be more active, and less sedentary could assist in the development of NCD health promotion strategies. PMID:25080995
2017-01-01
Objectives To explore the challenges Health Information Technology (HIT) vendors face to satisfy the requirements for Meaningful Use (MU) and Electronic Laboratory Reporting (ELR) of reportable diseases to the public health departments in Kentucky. Methodology A survey was conducted of Health Information Exchange (HIE) vendors in Kentucky through the Kentucky Health Information Exchange (KHIE). The survey was cross-sectional. Data were collected between February and March 2014. Participants were recruited from KHIE vendors. Participants received online survey link and by email and asked to submit their responses. Vendors’ feedback were summarized and analyzed to identify their challenges. Out of the 55 vendors who received the survey, 35(63.64%) responded. Results Of the seven transport protocol options for ELR, vendors selected virtual private network (VPN) as the most difficult to implement (31.7%). Secure File Transfer Protocol (SFTP) was selected as preferred ELR transport protocol (31.4%). Most of the respondents, 80% responded that they do not have any challenge with the Health Level 7 (HL7) standard implementation guide required by MU for 2014 ELR certification. Conclusion The study found that the most difficult transport protocol to implement for ELR is VPN and if vendors have preference, they would use SFTP for ELR over KHIE choice of VPN and Simple Object Access Protocol (SOAP). KHIE vendors do not see any variability in what is reportable by different jurisdiction and also it is not difficult for them to detect what is reportable from one jurisdiction verse the other PMID:29403575
Biosensors for Sustainable Food Engineering: Challenges and Perspectives
Ragavan, Vasanth; Weng, Xuan; Chand, Rohit
2018-01-01
Current food production faces tremendous challenges from growing human population, maintaining clean resources and food qualities, and protecting climate and environment. Food sustainability is mostly a cooperative effort resulting in technology development supported by both governments and enterprises. Multiple attempts have been promoted in tackling challenges and enhancing drivers in food production. Biosensors and biosensing technologies with their applications, are being widely applied to tackling top challenges in food production and its sustainability. Consequently, a growing demand in biosensing technologies exists in food sustainability. Microfluidics represents a technological system integrating multiple technologies. Nanomaterials, with its technology in biosensing, is thought to be the most promising tool in dealing with health, energy, and environmental issues closely related to world populations. The demand of point of care (POC) technologies in this area focus on rapid, simple, accurate, portable, and low-cost analytical instruments. This review provides current viewpoints from the literature on biosensing in food production, food processing, safety and security, food packaging and supply chain, food waste processing, food quality assurance, and food engineering. The current understanding of progress, solution, and future challenges, as well as the commercialization of biosensors are summarized. PMID:29534552
Psychosocial health challenges of the elderly in Nigeria: a narrative review.
Animasahun, Victor J; Chapman, Helena J
2017-06-01
Globally, national health systems are challenged to build successful aging models to prepare for biomedical, psychological and social changes. The integral component of psychosocial health in overall quality of life and well-being, however, is underscored and requires greater focus. Changing demographics in Nigeria, in addition to cultural considerations and absence of a social security system, present unique challenges to elderly. We aimed to review the literature that describes the current situation and challenges in psychosocial health status in the elderly in Nigeria and provide recommendations that promote health and well-being during the aging process. Four primary factors affect psychosocial health status of elderly Nigerians, namely: changes in family dynamics, increased demand for healthcare services, increased economic stress, and decreased functional independence. Like other developing countries, the Nigerian national system faces similar challenges in preparing a national framework that can maximize coverage to citizens in the midst of demographic changes in aging. By focusing on five target areas such as the educational system, health services, community-based initiatives, local or regional policies and national strategies, current framework in Nigeria can be modified to prepare for changing demographics in aging.
NASA Astrophysics Data System (ADS)
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam
2016-08-01
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Austin, Robert D; Darby, Christopher A
2003-06-01
Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.
Illicit Drug Trade-Impact on United States National Health Care
2013-03-01
pobreza en Mexico sube a 52 milliones,” CNN Expansion, July 29, 2011, http://www.cnnexpansion.com/ economia /2011/07/29/pobreza- mexico -2010 (accessed...Unlimited. 13. SUPPLEMENTARY NOTES Word Count: 5,569 14. ABSTRACT The United States and Mexico face a myriad of threats to national security...Policy Classification: Unclassified The United States and Mexico face a myriad of threats to national security
Lessons learned: mobile device encryption in the academic medical center.
Kusche, Kristopher P
2009-01-01
The academic medical center is faced with the unique challenge of meeting the multi-faceted needs of both a modern healthcare organization and an academic institution, The need for security to protect patient information must be balanced by the academic freedoms expected in the college setting. The Albany Medical Center, consisting of the Albany Medical College and the Albany Medical Center Hospital, was challenged with implementing a solution that would preserve the availability, integrity and confidentiality of business, patient and research data stored on mobile devices. To solve this problem, Albany Medical Center implemented a mobile encryption suite across the enterprise. Such an implementation comes with complexities, from performance across multiple generations of computers and operating systems, to diversity of application use mode and end user adoption, all of which requires thoughtful policy and standards creation, understanding of regulations, and a willingness and ability to work through such diverse needs.
Jaff, Jennifer C; Arnold, Janis; Bousvaros, Athos
2006-08-01
In addition to their physical challenges, children and adolescents with inflammatory bowel disease (IBD) living in the United States face a number of administrative and regulatory hurdles that affect their quality of life. This article, written by a physician, attorney/patient advocate, and social worker, discusses a number of these challenges and describes how the provider can help his or her patient overcome them. Specifically, the article discusses 4 areas in detail: appeals of denials of coverage from insurance companies and third party payors; assisting children with IBD with classroom and school accommodations; assisting uninsured children in obtaining Social Security benefits; and aiding a parent to care for their child using the Family and Medical Leave Act. Although this article has a pediatric focus, adults have similar advocacy needs. Case examples and sample letters to third-party payors, schools, and employers are included in this article.
Successful public-private partnerships: The NYPD shield model.
Amadeo, Vincent; Iannone, Stephen
2017-12-01
This article will identify the challenges that post 9/11 law enforcement faces regarding privatepublic partnerships and describe in detail the NYPD Shield programme, created to combat those challenges. Recommendations made by the 911 Commission included the incorporation of the private sector into future homeland security strategies. One such strategy is NYPD Shield. This programme is a nationally recognized award-winning public-private partnership dedicated to providing counterterrorism training and information sharing with government agencies, non-government organizations, private businesses, and the community. Information is shared through several platforms that include a dedicated website, instruction of counterterrorism training curricula, e-mail alerts, intelligence assessments and the hosting of quarterly conferences. This article also details how the NYPD Shield is providing its successful template to other law enforcement agencies enabling them to initiate similar programmes in their respective jurisdictions, and in doing so joining a National Shield Network.
ERIC Educational Resources Information Center
Mmbwanga, Daniel M.; Matemba, Collins K.; Bota, Kennedy N.
2015-01-01
The mentally challenged child (MC) can achieve a lot if the right environment and curriculum are designed for him/her. However, the realization of the desirable outcomes faces many challenges. The objective of the study was to examine institutional and personnel-related challenges facing education programs for the MC persons at Kaimosi Special…
ERIC Educational Resources Information Center
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler
2018-01-01
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Addressing security issues related to virtual institute distributed activities
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2008-03-01
One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.
McMahon, Catherine; Huber, Anna; Kohlhoff, Jane; Camberis, Anna-Lisa
2017-09-01
This article evaluated whether attendance at Circle of Security training workshops resulted in attendees showing greater empathy and attachment-related knowledge and understanding, and fewer judgmental responses to viewing a stressful parent-child interaction. Participants were 202 practitioners who attended and completed a 2-day (n = 70), 4-day (n = 105), or 10-day (n = 27) COS training workshop in Australia or New Zealand in 2015. In a pre/post design, participant reactions to a video clip of a challenging parent-child interaction were coded for empathic, judgmental, or attachment-focused language. Attachment understanding was coded in response to questions about the greatest challenge that the dyad faced. In all training conditions, participants provided significantly more attachment-focused descriptors and showed significantly greater attachment understanding after training, but significantly fewer empathic descriptors. While participants at the longer workshops provided significantly fewer judgmental/critical descriptors, there was no change for those attending the 2-day workshop. Irrespective of workshop duration or professional background, participants took a more relational perspective on the vignette after the training workshops. More detailed research is required to establish the extent to which this increased knowledge and understanding is retained and integrated into infant mental health practice with parents and young children. © 2017 Michigan Association for Infant Mental Health.
Use of Emerging Grid Computing Technologies for the Analysis of LIGO Data
NASA Astrophysics Data System (ADS)
Koranda, Scott
2004-03-01
The LIGO Scientific Collaboration (LSC) today faces the challenge of enabling analysis of terabytes of LIGO data by hundreds of scientists from institutions all around the world. To meet this challenge the LSC is developing tools, infrastructure, applications, and expertise leveraging Grid Computing technologies available today, and making available to LSC scientists compute resources at sites across the United States and Europe. We use digital credentials for strong and secure authentication and authorization to compute resources and data. Building on top of products from the Globus project for high-speed data transfer and information discovery we have created the Lightweight Data Replicator (LDR) to securely and robustly replicate data to resource sites. We have deployed at our computing sites the Virtual Data Toolkit (VDT) Server and Client packages, developed in collaboration with our partners in the GriPhyN and iVDGL projects, providing uniform access to distributed resources for users and their applications. Taken together these Grid Computing technologies and infrastructure have formed the LSC DataGrid--a coherent and uniform environment across two continents for the analysis of gravitational-wave detector data. Much work, however, remains in order to scale current analyses and recent lessons learned need to be integrated into the next generation of Grid middleware.
Corvol, A; Balard, F; Moutel, G; Somme, D
2014-01-01
Case management is a new professional field in France. It is addressed to elderly persons living in community whose situation is regarded as particularly complex. Case managers have to assess needs and coordinate necessary services. One common criteria of complexity is refusal of care. The objective of this study is to compare the words of users with those of case managers about refusal of care, in order to understand its meaning, professionals' attitudes and ethical challenges. Two researchers have cooperated on this qualitative research: the first one, anthropologist, interviewed 19 individuals, and 11 of their caregivers. The second one, geriatrician and researcher in medical ethics, lead four focus groups gathering a total of 18 case managers. Refusal of care often is the result of the will of preserving one's identity, compromised by illness. Individuals seek control on their life. Facing this behaviour, case managers try to secure the individual, by establishing a personal relationship that respects their choices, even if care has to be delayed. Refusal of care may sometimes disclose a desire to vanish, in front of which professionals meet their own limits. To recognise an elderly person that refuses care as a unique individual who can make choices secure his identity, and allow him to change. Copyright © 2013 Société nationale française de médecine interne (SNFMI). Published by Elsevier SAS. All rights reserved.
NASA Astrophysics Data System (ADS)
Ward, Frank A.; Crawford, Terry L.
2016-09-01
Growing demands for food security to feed increasing populations worldwide have intensified the search for improved performance of irrigation, the world's largest water user. These challenges are raised in the face of climate variability and from growing environmental demands. Adaptation measures in irrigated agriculture include fallowing land, shifting cropping patterns, increased groundwater pumping, reservoir storage capacity expansion, and increased production of risk-averse crops. Water users in the Gila Basin headwaters of the U.S. Lower Colorado Basin have faced a long history of high water supply fluctuations producing low-valued defensive cropping patterns. To date, little research grade analysis has investigated economically viable measures for irrigation development to adjust to variable climate. This gap has made it hard to inform water resource policy decisions on workable measures to adapt to climate in the world's dry rural areas. This paper's contribution is to illustrate, formulate, develop, and apply a new methodology to examine the economic performance from irrigation capacity improvements in the Gila Basin of the American Southwest. An integrated empirical optimization model using mathematical programming is developed to forecast cropping patterns and farm income under two scenarios (1) status quo without added storage capacity and (2) with added storage capacity in which existing barriers to development of higher valued crops are dissolved. We find that storage capacity development can lead to a higher valued portfolio of irrigation production systems as well as more sustained and higher valued farm livelihoods. Results show that compared to scenario (1), scenario (2) increases regional farm income by 30%, in which some sub regions secure income gains exceeding 900% compared to base levels. Additional storage is most economically productive when institutional and technical constraints facing irrigated agriculture are dissolved. Along with additional storage, removal of constraints on weak transportation capacity, limited production scale, poor information access, weak risk-bearing capacity, limited management skills, scarce labor supply, low food processing capacity, and absolute scale constraints, all can raise the economic value of additional irrigation capacity development. Our results light a path forward to policy makers, water administrators, and farm managers, who bear the burden of protecting farm income, food and water security, and rural economic development in the world's dry regions faced by the need to adapt to climate variability.
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Dentistry in the 21st century: challenges of a globalising world.
Hayashi, Mikako; Haapasalo, Markus; Imazato, Satoshi; Lee, Jae Il; Momoi, Yasuko; Murakami, Shinya; Whelton, Helen; Wilson, Nairn
2014-12-01
Oral health is - literally - vital to good general health, not least because the mouth is the sentinel of the body. Dentistry, the Cinderella of health care, faces immense challenges of globalisation. Governments, having spent freely on everything from defence to social security, face mountains of debts which make budget cutbacks essential. Simultaneously, most developed countries have to pay increasing costs of caring for rapidly ageing populations. Dentistry is being pulled two ways: wealthy members of society demand high-end expensive treatment, much of it cosmetic rather than necessary to deal with disease, whereas many millions of poor people in developing countries cannot afford basic dental treatment and may never see a dentist. Too many governments and dentists persist with the expensive and destructive regime of 'drill and fill (and bill)'. International advances in care may not reach the clinician's chair because treatment guidelines and payments are set locally. An international symposium to celebrate Mikako Hayashi becoming Professor of Restorative Dentistry and Endodontology at Osaka University concluded that dentistry should move from an increasingly un-affordable curative model to a cost-effective evidence-based preventive model. The goal is to help people retain healthy natural teeth throughout their lives, as an essential part of enhancing their general health. © 2014 FDI World Dental Federation.
2017-06-09
full ability to inhibit ANS and limbic response are prone to be impulsive, 25 unintentional, or hesitant when faced with high -threat decisions...graduate degrees in Criminal Justice, a Graduate Certificate in Organizational Leadership, and a current American Society for Industrial Security...experience and full ability to inhibit ANS and limbic response are prone to be impulsive, unintentional, or hesitant when faced with high -threat
Understanding Leadership in Schools Facing Challenging Circumstances: A Chilean Case Study
ERIC Educational Resources Information Center
Ahumada, Luis; Galdames, Sergio; Clarke, Simon
2016-01-01
During the last 10 years, research into schools facing challenging circumstances has attracted the attention of researchers around the world. The aim of this study was to understand the challenges that school leaders face as they per form their work, the nature of the context in which these challenges arise, the strategies school leaders adopt to…
Defense.gov Special Report: 2016 Fiscal Budget
: America's Army Facing Sequestration 'Enemy' at Home Not only does the U.S. Army face rapid, unpredictable told Congress. Story Navy Secretary Explains Significance of Sea Power National security interests face America today, while positioning the U.S. military to face the threats of tomorrow, said Mike McCord
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2011 CFR
2011-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2012 CFR
2012-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2013 CFR
2013-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2014 CFR
2014-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2010 CFR
2010-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
Weigel, M Margaret; Armijos, Rodrigo X; Hall, Yolanda Posada; Ramirez, Yolanda; Orozco, Rubi
2007-07-01
Emerging evidence suggests chronic household food insecurity has an adverse effect on health. This study examined the prevalence, predictors and health outcomes associated with food insecurity in 100 migrant and seasonal farmworker (MSFW) households living on the U.S.-Mexico border. Data were collected using the U.S. Food Security Scale, California Agricultural Worker's Health Survey, and objective anthropometric, clinical and biochemical indicators. Food insecurity affected 82% of households; 49% also had hunger. Household food insecurity was predicted by the presence of minor children in the home and low maternal education. Food insecure households were more likely to have at least one member affected by symptoms of depression (deprimido), nervios (an ethnospecific condition), learning disorders, and symptoms suggestive of gastrointestinal infection. Although not directly associated with food insecurity, adult obesity, central body adiposity, elevated blood pressure, and blood lipid and glucose disturbances were common. These findings highlight the significant food security and health challenges faced by border area MSFW families.
TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks
NASA Astrophysics Data System (ADS)
Wang, Zhiliang; Yin, Xia; Xiang, Yang; Zhu, Ruiping; Gao, Shirui; Wu, Xin; Liu, Shijian; Gao, Song; Zhou, Li; Li, Peng
Mobile broadcast service is one of the emerging most important new services in 3G networks. To better operate and manage mobile broadcast services, mobile broadcast business management system (MBBMS) should be designed and developed. Such a system, with its distributed nature, complicated XML data and security mechanism, faces many challenges in testing technology. In this paper, we study the conformance testing methodology of MBBMS, and design and implement a MBBMS protocol conformance testing tool based on TTCN-3, a standardized test description language that can be used in black-box testing of reactive and distributed system. In this methodology and testing tool, we present a semi-automatic XML test data generation method of TTCN-3 test suite and use HMSC model to help the design of test suite. In addition, we also propose an integrated testing method for hierarchical MBBMS security architecture. This testing tool has been used in industrial level’s testing.
Challenges Facing a Deaf Family Member Concerning a Loved One’s Dying
Kehl, Karen A.; Gartner, Constance M.
2010-01-01
Individuals who are Deaf face challenges both similar and unique from those faced by hearing individuals when a family member is dying. This study was guided by the question “What are the challenges faced by a Deaf family member when a loved one is dying?” Methods - This qualitative study is guided by critical theory and an interpretive perspective. Robert, a college-educated older adult who has been Deaf from birth was interviewed in American Sign Language using a death history format. Results – There are challenges for Deaf family members that affect communication with both the dying person and health care professionals. Patient-family communication issues included physical challenges and financial challenges. Lack of cultural competence concerning the Deaf community created challenges communicating with professionals. Decision-making was also a challenge. Conclusions These findings provide a framework for future research concerning the needs of Deaf individuals facing the end of life and provide guidance for clinicians. PMID:19910395
Emergency management and homeland security: Exploring the relationship.
Kahan, Jerome H
2015-01-01
In the years after the 9/11 tragedy, the United States continues to face risks from all forms of major disasters, from potentially dangerous terrorist attacks to catastrophic acts of nature. Professionals in the fields of emergency management and homeland security have responsibilities for ensuring that all levels of government, urban areas and communities, nongovernmental organizations, businesses, and individual citizens are prepared to deal with such hazards though actions that reduce risks to lives and property. Regrettably, the overall efficiency and effectiveness of the nation's ability to deal with disasters is unnecessarily challenged by the absence of a common understanding on how these fields are related in the workforce and educational arenas. Complicating matters further is the fact that neither of these fields has developed agreed definitions. In many ways, homeland security and emergency management have come to represent two different worlds and cultures. These conditions can have a deleterious effect on preparedness planning for public and private stakeholders across the nation when coordinated responses among federal, state, and local activities are essential for dealing with consequential hazards. This article demonstrates that the fields of emergency management and homeland security share many responsibilities but are not identical in scope or skills. It argues that emergency management should be considered a critical subset of the far broader and more strategic field of homeland security. From analytically based conclusions, it recommends five steps that be taken to bring these fields closer together to benefit more from their synergist relationship as well as from their individual contributions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-08-01
Offshore Europe 95 - which will be held September 5-8, 1995, in Aberdeen, Scotland - was designed to generate interest across the oil and gas industry and to be relevant to everyone from CEOs to trainee engineers. While the European offshore oil and gas industry has had some remarkable success in reducing its costs, it faces difficult and growing challenges, and Offshore Eurpoe is the perfect opportunity for companies to learn from each other how to successfully face these hurdles. Sessions will be held on every aspect of the oil and gas industry and are organized under eight technical categories:more » drilling; exploration; management and economics; development and abandonment; well intervention; health, safety, and environment; production; and reservoir management. Much greater operating effectiveness and striking technological advances have enabled us to maintain reserves, prolong the lives of mature producing fields, and continue the pace of new development.« less
Telepsychiatry in the 21st Century: Transforming Healthcare with Technology
Deslich, Stacie; Stec, Bruce; Tomblin, Shane; Coustasse, Alberto
2013-01-01
This article describes the benefits and constraints of telemedicine, focusing primarily on the field of psychiatry in the United States with the current system of healthcare. Telepsychiatry is believed to provide better access and higher-quality care to patients who need psychiatric care and cost savings to providers of such care. Telemedicine has been successfully integrated into psychiatric facilities reaching rural areas, prisons, and urban facilities. It has increased the volume of patients that physicians can reach and diagnose, as well as allowing them to treat patients with limitations in mobility. While telepsychiatry has been shown to be beneficial, this technology does have some limitations. Concerns about reimbursement, licensure, privacy, security, patient safety, and interoperability have been identified and present current challenges that providers using telepsychiatry must overcome in order to provide the most effective patient care. As more insurance companies start to reimburse for telepsychiatry treatments at the same rate as for face-to-face visits, this evolving medical field has the potential to grow exponentially. PMID:23861676
Heyworth, Leonie; Clark, Justice; Marcello, Thomas B; Paquin, Allison M; Stewart, Max; Archambeault, Cliona; Simon, Steven R
2013-12-02
Virtual (non-face-to-face) medication reconciliation strategies may reduce adverse drug events (ADEs) among vulnerable ambulatory patients. Understanding provider perspectives on the use of technology for medication reconciliation can inform the design of patient-centered solutions to improve ambulatory medication safety. The aim of the study was to describe primary care providers' experiences of ambulatory medication reconciliation and secure messaging (secure email between patients and providers), and to elicit perceptions of a virtual medication reconciliation system using secure messaging (SM). This was a qualitative study using semi-structured interviews. From January 2012 to May 2012, we conducted structured observations of primary care clinical activities and interviewed 15 primary care providers within a Veterans Affairs Healthcare System in Boston, Massachusetts (USA). We carried out content analysis informed by the grounded theory. Of the 15 participating providers, 12 were female and 11 saw 10 or fewer patients in a typical workday. Experiences and perceptions elicited from providers during in-depth interviews were organized into 12 overarching themes: 4 themes for experiences with medication reconciliation, 3 themes for perceptions on how to improve ambulatory medication reconciliation, and 5 themes for experiences with SM. Providers generally recognized medication reconciliation as a valuable component of primary care delivery and all agreed that medication reconciliation following hospital discharge is a key priority. Most providers favored delegating the responsibility for medication reconciliation to another member of the staff, such as a nurse or a pharmacist. The 4 themes related to ambulatory medication reconciliation were (1) the approach to complex patients, (2) the effectiveness of medication reconciliation in preventing ADEs, (3) challenges to completing medication reconciliation, and (4) medication reconciliation during transitions of care. Specifically, providers emphasized the importance of medication reconciliation at the post-hospital visit. Providers indicated that assistance from a caregiver (eg, a family member) for medication reconciliation was helpful for complex or elderly patients and that patients' social or cognitive factors often made medication reconciliation challenging. Regarding providers' use of SM, about half reported using SM frequently, but all felt that it improved their clinical workflow and nearly all providers were enthusiastic about a virtual medication reconciliation system, such as one using SM. All providers thought that such a system could reduce ADEs. Although providers recognize the importance and value of ambulatory medication reconciliation, various factors make it difficult to execute this task effectively, particularly among complex or elderly patients and patients with complicated social circumstances. Many providers favor enlisting the support of pharmacists or nurses to perform medication reconciliation in the outpatient setting. In general, providers are enthusiastic about the prospect of using secure messaging for medication reconciliation, particularly during transitions of care, and believe a system of virtual medication reconciliation could reduce ADEs.
ERIC Educational Resources Information Center
Hungerford, Thomas L.
2006-01-01
The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Minimum Requirements for Taxicab Security Cameras.
Zeng, Shengke; Amandus, Harlan E; Amendola, Alfred A; Newbraugh, Bradley H; Cantis, Douglas M; Weaver, Darlene
2014-07-01
The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability.
Composite multilobe descriptors for cross-spectral recognition of full and partial face
NASA Astrophysics Data System (ADS)
Cao, Zhicheng; Schmid, Natalia A.; Bourlai, Thirimachos
2016-08-01
Cross-spectral image matching is a challenging research problem motivated by various applications, including surveillance, security, and identity management in general. An example of this problem includes cross-spectral matching of active infrared (IR) or thermal IR face images against a dataset of visible light images. A summary of recent developments in the field of cross-spectral face recognition by the authors is presented. In particular, it describes the original form and two variants of a local operator named composite multilobe descriptor (CMLD) for facial feature extraction with the purpose of cross-spectral matching of near-IR, short-wave IR, mid-wave IR, and long-wave IR to a gallery of visible light images. The experiments demonstrate that the variants of CMLD outperform the original CMLD and other recently developed composite operators used for comparison. In addition to different IR spectra, various standoff distances from close-up (1.5 m) to intermediate (50 m) and long (106 m) are also investigated. Performance of CMLD I to III is evaluated for each of the three cases of distances. The newly developed operators, CMLD I to III, are further utilized to conduct a study on cross-spectral partial face recognition where different facial regions are compared in terms of the amount of useful information they contain for the purpose of conducting cross-spectral face recognition. The experimental results show that among three facial regions considered in the experiments the eye region is the most informative for all IR spectra at all standoff distances.
Partners in public health law: elected officials, health directors, and attorneys.
Benjamin, Georges; Lopez, Wilfredo; Monson, Angela Zoe
2002-01-01
The partnership that has developed over the years between elected officials, health directors, and attorneys came about through necessity and practicality. This article examines this partnership and some of the conflicts and problems it contains. The article discusses the problems of overlap of authority between public health departments and elected officials. It also emphasizes that existing laws and regulations often provide sufficiently flexible authority, and that such laws and regulations can be exercised in new ways to address current public health problems. The article concludes with a discussion of the challenges faced by public health officials and legislators in forming a partnership to secure necessary financial support and legal authority for public health activities.
Challenges and potential solutions for big data implementations in developing countries.
Luna, D; Mayan, J C; García, M J; Almerares, A A; Househ, M
2014-08-15
The volume of data, the velocity with which they are generated, and their variety and lack of structure hinder their use. This creates the need to change the way information is captured, stored, processed, and analyzed, leading to the paradigm shift called Big Data. To describe the challenges and possible solutions for developing countries when implementing Big Data projects in the health sector. A non-systematic review of the literature was performed in PubMed and Google Scholar. The following keywords were used: "big data", "developing countries", "data mining", "health information systems", and "computing methodologies". A thematic review of selected articles was performed. There are challenges when implementing any Big Data program including exponential growth of data, special infrastructure needs, need for a trained workforce, need to agree on interoperability standards, privacy and security issues, and the need to include people, processes, and policies to ensure their adoption. Developing countries have particular characteristics that hinder further development of these projects. The advent of Big Data promises great opportunities for the healthcare field. In this article, we attempt to describe the challenges developing countries would face and enumerate the options to be used to achieve successful implementations of Big Data programs.
Degaspari, John
2011-08-01
As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.
The National Heart, Lung, and Blood Institute Small Business Program
Marek, Kurt W.
2016-01-01
SUMMARY Small companies working to develop products in the cardiovascular space face numerous challenges, from regulatory, intellectual property, and reimbursement barriers to securing funds to keep the lights on and reach the next development milestone. Most small companies that spin out from universities have the scientific knowledge, but product development expertise and business acumen are also needed to be successful. Other challenges include reduced interest in early stage technologies (Pharma & Biotech 2015 in Review, EP Vantage) and limited deal flow for cardiovascular products (Gormley B., Wall Street Journal, September 15, 2014). The NHLBI small business program is a comprehensive ecosystem designed to address these critical challenges and to provide resources and expertise to assist early stage companies developing cardiovascular and other products within the institute’s mission. This article describes steps that NHLBI has taken to enhance our small business program to more effectively translate basic discoveries into commercial products to benefit patients and public health, including enhancing internal expertise and developing non-financial resources to assist small businesses as they develop their products and seek private sector investment and partnership. PMID:28580435
Marek, Kurt W
2016-12-01
Small companies working to develop products in the cardiovascular space face numerous challenges, from regulatory, intellectual property, and reimbursement barriers to securing funds to keep the lights on and reach the next development milestone. Most small companies that spin out from universities have the scientific knowledge, but product development expertise and business acumen are also needed to be successful. Other challenges include reduced interest in early stage technologies (Pharma & Biotech 2015 in Review, EP Vantage) and limited deal flow for cardiovascular products (Gormley B., Wall Street Journal, September 15, 2014). The NHLBI small business program is a comprehensive ecosystem designed to address these critical challenges and to provide resources and expertise to assist early stage companies developing cardiovascular and other products within the institute's mission. This article describes steps that NHLBI has taken to enhance our small business program to more effectively translate basic discoveries into commercial products to benefit patients and public health, including enhancing internal expertise and developing non-financial resources to assist small businesses as they develop their products and seek private sector investment and partnership.
5 CFR 1312.11 - Challenges to classifications.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...
5 CFR 1312.11 - Challenges to classifications.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...
ERIC Educational Resources Information Center
Black, Ronald
2017-01-01
Faculty who mentor online doctoral candidates face many of the same challenges and opportunities as those mentoring doctoral candidates in traditional, face-to-face modalities. The main difference is that E-Mentoring is based on interacting in the online space rather than interacting face-to-face, which may present challenges for both the…
ERIC Educational Resources Information Center
DuBose, Cheryl O.
2017-01-01
International students face many challenges when pursuing a degree in higher education. Communication and cultural differences are typically cited as the most challenging aspects of any study abroad program. Students attempting to complete a healthcare program face sometimes insurmountable issues, as communication, cultural differences, and…
The Sisters of Mercy in the Crimean War: Lessons for Catholic health care
Paradis, Mary Raphael; Hart, Edith Mary; O’Brien, Mary Judith
2017-01-01
In 1856, an appeal went out to nurses in both England and Ireland, and especially to religious nurses, to care for the troops fighting in the Crimean War. The Sisters of Mercy, founded in 1831 by Venerable Catherine McAuley, answered that call. This article describes the enormous challenges the Sisters faced in that mission, which was a test of their nursing skills, flexibility, organizational ability, and their spirit of mercy. The challenges they faced professionally and as religious Sisters, the manner in which they faced those challenges, and their spiritual lives as religious women shaped their ability to give comprehensive care. Some applications are made to the challenges which religious communities and organizations working in health care face in our country at this time. Summary: This article describes the challenges faced by a group of Sisters of Mercy from England and Ireland who volunteered to serve as nurses in the Crimean War from 1856 to 1858. Applications are made to challenges which are faced by religious communities and organizations in the current secular healthcare environment. PMID:28392597
The Sisters of Mercy in the Crimean War: Lessons for Catholic health care.
Paradis, Mary Raphael; Hart, Edith Mary; O'Brien, Mary Judith
2017-02-01
In 1856, an appeal went out to nurses in both England and Ireland, and especially to religious nurses, to care for the troops fighting in the Crimean War. The Sisters of Mercy, founded in 1831 by Venerable Catherine McAuley, answered that call. This article describes the enormous challenges the Sisters faced in that mission, which was a test of their nursing skills, flexibility, organizational ability, and their spirit of mercy. The challenges they faced professionally and as religious Sisters, the manner in which they faced those challenges, and their spiritual lives as religious women shaped their ability to give comprehensive care. Some applications are made to the challenges which religious communities and organizations working in health care face in our country at this time. Summary: This article describes the challenges faced by a group of Sisters of Mercy from England and Ireland who volunteered to serve as nurses in the Crimean War from 1856 to 1858. Applications are made to challenges which are faced by religious communities and organizations in the current secular healthcare environment.
31 CFR 535.221 - Compliance with directive provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... paragraph. (2) Definitive securities which are in bearer or registered form shall be hand delivered or... prior written notice of such delivery, specifically identifying the sending person, the face or par amount and type of security, and whether the security is in bearer, registered or book-entry form. (Secs...
Community in Online Higher Education: Challenges and Opportunities
ERIC Educational Resources Information Center
Arasaratnam-Smith, Lily A.; Northcote, Maria
2017-01-01
Exploring the challenges and opportunities associated with the concepts of community and communication in online higher education, this paper reconsiders the intention to replicate face-to-face learning and teaching strategies in online learning environments. Rather than beginning with the assumption that face-to-face education is the prototype…
NASA Astrophysics Data System (ADS)
Hemati, A.; Rippy, M.; Grant, S. B.
2015-12-01
As global populations grow, cities in drought prone regions of the world such as California and South East Australia are faced with escalating water scarcity and water security challenges. The management approaches geared towards addressing these challenges are diverse. Given the myriad of possible approaches and the tendency to apply them in combination, successful management actions can be difficult to identify. Background climactic variability further complicates the story, making transfer of management lessons from one drought stressed region to another difficult. Here we use Melbourne, a city of 4.3 million people in South East Australia that recently faced and overcame a > 10 year "Millennium" drought, as a test case for evaluating the relative importance of various management-related and climactic factors in driving reductions in municipal water consumption (~60% in 12 years). Our analysis suggests that Melbourne's declining municipal consumption cannot be explained by potable substitution alone, as reductions in municipal consumption were not matched by increased use of alternative sources (e.g., urban rain or recycled water). Thus, water conservation behavior (not source switching) may be responsible for the majority of demand reduction in Melbourne. Interestingly, while voluntary or mandatory water restrictions appear to have substantially altered the rate of change of consumption near the end of Melbourne's Millennium drought (e.g., forcing a period of intense conservation), overall conservation behavior precedes these restrictions. This suggests that other rapidly implemented (and hither too unquantified) management approaches such as advertising or newspapers may have driven water conservation behavior early in the drought. Climatic factors, particularly precipitation may also have influenced conservation behavior; changes in precipitation were significantly positively correlated with changes in water consumption at a lag of 18 months. Similar correlations with reduced lags were observed between reservoir inflow and consumption (lag = 15 months), and reservoir storage and consumption (lag = 9 months), suggesting that the effects of precipitation on consumption may be indirect, and linked to its effects on reservoir storage and public perception of water security.
NASA Astrophysics Data System (ADS)
Sabonis-Chafee, Theresa Marie
The successor states of Armenia, Lithuania and Ukraine arrived at independence facing extraordinary challenges in their energy sectors. Each state was a net importer, heavily dependent on cheap energy supplies, mostly from Russia. Each state also inherited a nuclear power complex over which it had not previously exercised full control. In the time period 1991--1996, each state attempted to impose coherence on the energy sector, selecting a new course for the pieces it had inherited from a much larger, highly integrated energy structure. Each state attempted to craft national energy policies in the midst of severe supply shocks and price shocks. Each state developed institutions to govern its nuclear power sector. The states' challenges were made even greater by the fact that they had few political or economic structures necessary for energy management, and sought to create those structures at the same time. This dissertation is a systematic, non-quantitative examination of how each state's energy policies developed during the 1991--1996 time period. The theoretical premise of the analysis (drawn from Statist realism) is that systemic variables---regional climate and energy vulnerability---provide the best explanations for the resulting energy policy decisions. The dependent variable is defined as creation and reform of energy institutions. The independent variables include domestic climate, regional climate, energy vulnerability and transnational assistance. All three states adopted rhetoric and legislation declaring energy a strategic sector. The evidence suggests that two of the states, Armenia and Lithuania, which faced tense regional climates and high levels of energy vulnerability, succeeded in actually treating energy strategically, approaching energy as a matter of national security or "high politics." The third state, Ukraine, failed to do so. The evidence presented suggests that the systemic variables (regional climate and energy vulnerability) provided a more favorable environment for Ukraine, one in which the state attempted reform of the sector, but not as a concerted national security issue.
Single Logon: balancing security and healthcare productivity.
Sapp, Margaret J; Behrens, Terrence L
2004-01-01
Mayo Single Logon (MSL) has faced the traditional dilemma that is painful to all IT organizations because it forces the tradeoff between user productivity and security. Recent regulatory initiatives, such as HIPAA, have caused the issue of security to take on more importance, forcing organizations to revisit the balance of security and productivity. MSL is a security application that brokers user credentials and facilitates desktop security. The simple design, functionality and stability have allowed MSL to speed up user productivity, keep satisfaction high and help solve many security initiatives.
Interior view of addition pharmacy showing dutch door and security ...
Interior view of addition pharmacy showing dutch door and security ceiling grate, facing north. - Albrook Air Force Station, Dispensary, East side of Canfield Avenue, Balboa, Former Panama Canal Zone, CZ
Interior view of servant's room showing ornamental iron security grille, ...
Interior view of servant's room showing ornamental iron security grille, facing south. - Albrook Air Force Station, Company Officer's Quarters, East side of Canfield Avenue, Balboa, Former Panama Canal Zone, CZ
The need for agriculture phenotyping: "moving from genotype to phenotype".
Boggess, Mark V; Lippolis, John D; Hurkman, William J; Fagerquist, Clifton K; Briggs, Steve P; Gomes, Aldrin V; Righetti, Pier Giorgio; Bala, Kumar
2013-11-20
Increase in the world population has called for the increased demand for agricultural productivity. Traditional methods to augment crop and animal production are facing exacerbating pressures in keeping up with population growth. This challenge has in turn led to the transformational change in the use of biotechnology tools to meet increased productivity for both plant and animal systems. Although many challenges exist, the use of proteomic techniques to understand agricultural problems is steadily increasing. This review discusses the impact of genomics, proteomics, metabolomics and phenotypes on plant, animal and bacterial systems to achieve global food security and safety and we highlight examples of intra and extra mural research work that is currently being done to increase agricultural productivity. This review focuses on the global demand for increased agricultural productivity arising from population growth and how we can address this challenge using biotechnology. With a population well above seven billion humans, in a very unbalanced nutritional state (20% overweight, 20% risking starvation) drastic measures have to be taken at the political, infrastructure and scientific levels. While we cannot influence politics, it is our duty as scientists to see what can be done to feed humanity. Hence we highlight the transformational change in the use of biotechnology tools over traditional methods to increase agricultural productivity (plant and animal). Specifically, this review deals at length on how a three-pronged attack, namely combined genomics, proteomics and metabolomics, can help to ensure global food security and safety. This article is part of a Special Issue entitled: Translational Plant Proteomics. Copyright © 2013 Elsevier B.V. All rights reserved.
Living with difference: Exploring the social self of adolescents with chronic pain
Forgeron, Paula A; Evans, Joan; McGrath, Patrick J; Stevens, Bonnie; Finley, G Allen
2013-01-01
BACKGROUND: Chronic pain negatively affects an adolescent’s life; however, little is known about the social impact of chronic pain for adolescents. More is known about the general peer relationships of adolescents with chronic pain than their close friendships. Close friendships begin to take on more importance during adolescence as these relationships facilitate the development of an adolescent’s sense of personal identity and increasing independence from family influences. Thus, chronic pain may create friendship challenges for adolescents beyond those typically experienced during this developmental trajectory, which may negatively impact their abilities to secure social support. OBJECTIVES: To better understand the challenges adolescents with chronic pain face with regard to their friendships. METHODS: An interpretative phenomenological study using individual interviews was conducted. RESULTS: Two themes emerged. ‘Rethinking the self with pain’ describes the intrusive nature of chronic pain, challenging the participants to rethink the way they view themselves and their place within their social network. ‘Rethinking friendships’ describes the interpretation of their friends’ reactions to their chronic pain condition, which led to these adolescents spending more time by themselves, and feeling misunderstood and unsupported. CONCLUSIONS: The impact of chronic pain on the adolescent as an individual as well as the responses of close friends and others within their social network resulted in the development of new friendship needs. However, the adolescents were not always able to secure these new friendship needs. Their experiences suggest factors within friendships that may be ameliorated by interventions, thus maintaining and strengthening their close friendships. PMID:24308027
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G
2016-05-01
The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.
2016-01-01
Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842
Code of Federal Regulations, 2010 CFR
2010-01-01
... face, in bold type: “This security is not a savings account or deposit and it is not insured by the... the same priority as savings accounts or a higher priority; (C) State that the security is not secured...) Except as provided in paragraph (c)(4)(ii) of this section, a savings association must use an indenture...
77 FR 62592 - Agency Information Collection Activities: Proposed Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-15
... application process, we conduct a personal interview, either face-to- face or via telephone, and document the interview using Form SSA-7165. The respondents are applicants for Social Security benefits, whose...
Massengale, Kelley E C; Erausquin, Jennifer Toller; Old, Michelle
2017-10-01
Objectives This paper aims to describe low-income recipients of a community-based diaper bank and the multiple daily challenges they face. Our paper seeks to document the health, social, and financial outcomes recipients experienced after receiving assistance. Methods We surveyed families (n = 150) about their experiences receiving diapers from a diaper bank in the southeastern United States. Additionally, we conducted short, focused interviews with families (n = 15) about outcomes after receiving diapers. Results Families experience regularly a range of challenges meeting basic needs. These difficulties include high unmet needs for transportation, food, and nonfood essentials such as personal hygiene items. Families experiencing the greatest difficulty in paying utility or medical bills were significantly more likely to have a high level of diaper need compared to families facing these challenges less often (AORs ranging from 3.40 to 9.39). As a result of receiving diapers, families reported positive health, social, and economic outcomes. Families reported positive changes in parental mood; improved child health and happiness; increased opportunities for childcare, work, and school attendance; and the ability to divert household finances toward other basic needs, including utilities and medical care. Conclusions for Practice The monetary value of the supplemental provision of diapers is a small investment in affected families' economic, social, and health outcomes. The positive effects continue far longer than the diapers provided. We demonstrate the social value of such an operation, and recommend the expansion of federal, state, and local safety net programs to help low-income families secure a steady supply of diapers.
A new method for generating an invariant iris private key based on the fuzzy vault system.
Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie
2008-10-01
Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.
Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler, Andrew B; Fehn, Amy K
2003-01-01
With the passing of the Health Insurance Portability and Accountability Act (HIPAA) privacy rule deadline and the security rule deadline looming, many covered entities are left wondering if they are doing enough to prevent privacy and security breaches and what type of exposure their organization could face in the event of a breach.
Enhancing National Security in Jamaica Through the Development and Employment of Special Forces
2005-06-01
face Jamaica. This study examines the value, utility, and possible roles of such a unit in the Jamaican security landscape, and makes recommendations...and possible roles of such a unit in the Jamaican security landscape, and makes recommendations for the establishment and employment of such a unit...
Minimum Requirements for Taxicab Security Cameras*
Zeng, Shengke; Amandus, Harlan E.; Amendola, Alfred A.; Newbraugh, Bradley H.; Cantis, Douglas M.; Weaver, Darlene
2015-01-01
Problem The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Methods Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Results Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. Practical Applications These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability. PMID:26823992
Climbing social media in medicine's hierarchy of needs.
Chretien, Katherine C; Kind, Terry
2014-10-01
The social media and medicine landscape is evolving rapidly. Early research, social media policies, and educational efforts focused on risk avoidance, while more current efforts have encouraged reflection and explored opportunities. This trajectory has affirmed physicians' professional commitment to maintaining public trust in the face of new challenges in the digital age. In this Commentary, the authors propose viewing physicians' social media use as a hierarchy of needs, similar to Maslow's psychological theory which posits that more basic levels of needs must be met before higher, aspirational levels can be fully attained. The three levels in the social media in medicine's hierarchy of needs are Security, Reflection, and Discovery. Critical to this model is respecting the essential need for Security in order to move towards Reflection and into Discovery. The social media in medicine hierarchy of needs pyramid rests on a foundation of Public Trust. How physicians as a profession have responded to past--and continue to respond to present and future--social media challenges to professionalism reveals what matters most: maintaining public trust and honoring the physicians' contract with society. A victory for online professionalism would be providing trainees with the tools and guidance needed to ascend to Discovery, while ensuring that their basic social media needs are first met. To do this, physician educators need to continue increasing trainees' awareness through designing relevant curricula, encouraging reflection, and providing positive role modeling and effective mentorship.
Kafumbata, Dalitso; Jamu, Daniel; Chiotha, Sosten
2014-04-05
This paper reviews the importance of African lakes and their management challenges. African inland lakes contribute significantly to food security, livelihoods and national economies through direct exploitation of fisheries, water resources for irrigation and hydropower generation. Because of these key contributions, the ecosystem services provided are under significant stress mainly owing to high demand by increasing populations, negative anthropogenic impacts on lake catchments and high levels of poverty which result in unsustainable use. Climate variability exacerbates the stress on these ecosystems. Current research findings show that the lakes cannot sustain further development activities on the scale seen over the past few decades. Millions of people are at risk of losing livelihoods through impacts on livestock and wildlife. The review further shows that the problems facing these lakes are beyond the purview of current management practices. A much better understanding of the interactions and feedbacks between different components of the lake socio-ecological systems is needed to address the complex challenges of managing these ecosystem services. This review suggests that the three small wetlands of Chad, Chilwa and Naivasha provide an opportunity for testing novel ideas that integrate sustainability of natural resource management with livelihoods in order to inform policy on how future land use and climatic variability will affect both food security and the ecosystem services associated with it.
Deatsch-Kratochvil, Amanda N; Pascual, Thomas Neil; Kesner, Adam; Rosenblatt, Eduardo; Chhem, Rethy K
2013-02-01
Global health has been an issue of seemingly low political importance in comparison with issues that have direct bearing on countries' national security. Recently, health has experienced a "political revolution" or a rise in political importance. Today, we face substantial global health challenges, from the spread of infectious disease, gaps in basic maternal and child health care, to the globalization of cancer. A recent estimate states that the "overall lifetime risk of developing cancer (both sexes) is expected to rise from more than one in three to one in two by 2015." These issues pose significant threats to international health security. To successfully combat these grave challenges, the international community must embrace and engage in global health diplomacy, defined by scholars Thomas Novotny and Vicanne Adams as a political activity aimed at improving global health, while at the same time maintaining and strengthening international relations. The IAEA (International Atomic Energy Agency) is an international organization with a unique mandate to "accelerate and enlarge the contribution of atomic energy to peace, health, and prosperity throughout the world." This article discusses global health diplomacy, reviews the IAEA's program activities in human health by focusing on radiation medicine and cancer, and the peaceful applications of atomic energy within the context of global health diplomacy. Copyright © 2013 Canadian Association of Radiologists. Published by Elsevier Inc. All rights reserved.
Food security: crops for people not for cars.
Kullander, Sven
2010-05-01
Humankind is currently faced with the huge challenge of securing a sustainable energy supply and biofuels constitute one of the major options. However, the commercially traded edible crops are barely sufficient to meet food demand of the present world population. Certain regions, for example EU-27, do not even have a sufficient indigenous crop production. Of this follows that motor biofuels based on edible crops should be avoided. To replace more than some percent of the fossil motor fuels, non-edible biomass-rest products and wastes-should instead be considered for conversion to biofuels. In this way, about 10% of the current fossil fuels can be replaced. Feeding a world population expected to grow by some 50% during the next 50 years will be a major challenge. For environmental reasons it seems that agricultural land cannot be expanded very much, maybe not at all. The solution to the increasing food demand seems therefore to be using the present crop production more efficiently and increasing output from present agricultural land, maintaining biodiversity and climate stability within reasonable limits. In the future, agriculture will need more energy and more water irrigation. Food production is, however, already very energy demanding, requiring several times more externally provided energy than the energy content of the food itself. A sufficient energy supply will be a key issue for the future farming!
ERIC Educational Resources Information Center
Sauls, Jeff; Gudigantala, Naveen
2013-01-01
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
SPACE: Vision and Reality: Face to Face. Proceedings Report
NASA Technical Reports Server (NTRS)
1995-01-01
The proceedings of the 11th National Space Symposium entitled 'Vision and Reality: Face to Face' is presented. Technological areas discussed include the following sections: Vision for the future; Positioning for the future; Remote sensing, the emerging era; space opportunities, Competitive vision with acquisition reality; National security requirements in space; The world is into space; and The outlook for space. An appendice is also attached.
NASA Astrophysics Data System (ADS)
Robinson, Nidia; Saafi, Mohamed
2006-03-01
Critical civil infrastructure systems such as bridges, high rises, dams, nuclear power plants and pipelines present a major investment and the health of the United States' economy and the lifestyle of its citizens both depend on their safety and security. The challenge for engineers is to maintain the safety and security of these large structures in the face of terrorism threats, natural disasters and long-term deterioration, as well as to meet the demands of emergency response times. With the significant negative impact that these threats can have on the structural environment, health monitoring of civil infrastructure holds promise as a way to provide information for near real-time condition assessment of the structure's safety and security. This information can be used to assess the integrity of the structure for post-earthquake and terrorist attacks rescue and recovery, and to safely and rapidly remove the debris and to temporary shore specific structural elements. This information can also be used for identification of incipient damage in structures experiencing long-term deterioration. However, one of the major obstacles preventing sensor-based monitoring is the lack of reliable, easy-to-install, cost-effective and harsh environment resistant sensors that can be densely embedded into large-scale civil infrastructure systems. Nanotechnology and MEMS-based systems which have matured in recent years represent an innovative solution to current damage detection systems, leading to wireless, inexpensive, durable, compact, and high-density information collection. In this paper, ongoing research activities at Alabama A&M University (AAMU) Center for Transportation Infrastructure Safety and Security on the application of nanotechnology and MEMS to Civil Infrastructure for health monitoring will presented. To date, research showed that nanotechnology and MEMS-based systems can be used to wirelessly detect and monitor different damage mechanisms in concrete structures as well as monitor critical structures' stability during floods and barge impact. However, some technical issues that needs to be addressed before full implementation of these new systems and will also be discussed in this paper.
Moyer, April M.; Kinkler, Lori A.; Richardson, Hannah B.
2012-01-01
Foster-to-adopt families can be viewed as systems that are influenced by many other systems (e.g., the legal system, the social service agency, and the birth family). The current qualitative study of 84 foster-to-adopt parents (members of 42 lesbian, gay, and heterosexual couples) examined the types of challenges that parents faced as they navigated multiple systems during the initial post-placement period. Some participants described the legal insecurity associated with their role as foster-to-adopt parents as impacting their personal well-being and their attachment to their children. Lack of support services and disorganization within social service agencies, as well as strained relationships with birth parents, were also identified as stressors for foster-to-adopt parents. Importantly, lesbian and gay participants faced additional concerns regarding the security of their placement, due to the possibility for discrimination within the various systems involved with the foster-to-adopt process. Participants as a whole also identified positive aspects of their experiences within various systems; for example, they appreciated child care subsidies, state-provided health insurance, and supportive social workers. Our findings provide insights into foster-to-adopt parents’ experiences during the initial post-placement period, and have implications for adoption services aimed to improve placement stability and enhance family functioning in foster-to-adopt families. PMID:23226935
Viability assessment of regional biomass pre-processing center based bioethanol value chains
NASA Astrophysics Data System (ADS)
Carolan, Joseph E.
Petroleum accounts for 94% of all liquid fuels and 36% of the total of all energy consumed in the United States. Petroleum dependence is problematic because global petroleum reserves are estimated to last only for 40 to 60 years at current consumption rates; global supplies are often located in politically unstable or unfriendly regions; and fossil fuels have negative environmental footprints. Domestic policies have aimed at promoting alternative, renewable liquid fuels, specifically bio-fuels derived from organic matter. Cellulosic bio-ethanol is one promising alternative fuel that has featured prominently in federal bio-fuel mandates under the Energy Independence and Security Act, 2007. However, the cellulosic bio-ethanol industry faces several technical, physical and industrial organization challenges. This dissertation examines the concept of a network of regional biomass pre-treatment centers (RBPC) that form an extended biomass supply chain feeding into a simplified biorefinery as a way to overcome these challenges. The analyses conducted address the structural and transactional issues facing bio-ethanol value chain establishment; the technical and financial feasibility of a stand alone pre-treatment center (RBPC); the impact of distributed pre-treatment on biomass transport costs; a comparative systems cost evaluation of the performance of the RBPC chain versus a fully integrated biorefinery (gIBRh), followed by application of the analytical framework to three case study regions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Necefer, Len Edward; Jones, Thomas Elisha
American Indian tribes possess lands rich with renewable energy (RE) resources. Tribes have great potential and need to develop these resources, yet face a host of barriers that continue to impede development. Understanding these challenges as well as the pathways that can be taken to overcome them may facilitate more economic development to meet community needs and better position tribes to play a role in securing a low-carbon energy future for the United States. This paper presents the results of an expert elicitation of 24 tribal energy experts from federal, tribal, academic, and private industry backgrounds to identify barriers andmore » opportunities for federally recognized tribes in the lower 48 states. Experts identified a number of unique challenges facing tribes including financing and funding, infrastructure, tribal leadership and staff, state-level influence, and partnerships. Cultural factors were seen only to be of concern with large-scale development. Tribal sovereignty is a significant motivation for RE development and has yet to be fully realized. Cultural considerations are critical to the success of future projects; smaller residential and community-scale projects may be a better fit. Improving partnerships between tribes and the private sector can increase RE deployment and overcome historical distrust. States can have a double-ended influence on projects within tribal lands through taxation.« less
The Enterprise 2.0 Concept: Challenges on Data and Information Security
NASA Astrophysics Data System (ADS)
Silva, Ana; Moreira, Fernando; Varajão, João
The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.
Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel
2018-06-12
Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.
Challenges of Virtual School Leadership
ERIC Educational Resources Information Center
Richardson, Jayson W.; LaFrance, Jason; Beck, Dennis
2015-01-01
The purpose of this case study was to examine challenges faced by virtual school leaders in the United States. Through semistructured interviews, the researchers explored challenges faced by eighteen leaders of fully online or blended online programs. Analysis revealed six main challenges: funding, staff, accountability, time, parents, and…
NASA Astrophysics Data System (ADS)
Foster, I.; Elliott, J. W.; Jones, J.; Montella, R.
2013-12-01
Issues relating to climate change and food security require an understanding of the interaction between the natural world and human society over long time scales. Understanding climate change, its impacts on the natural world and society, and the tradeoffs inherent in societal responses demands an unprecedented degree of cooperation across academic fields. New data sources on expected future climate, soil characteristics, economic activity, historical weather, population, and land cover, provide a potential basis for this cooperation. New methods are needed for sharing within and across communities not only data but the software used to generate, synthesize, and analyze it. Progress on these research challenges is hindered by the extreme difficulties that researchers, collaborators, and the community experiences when they collaborate around data. Multiplicity of data formats; inadequate computational tools; difficulty in sharing data and programs, lack of incentives for pro-social behavior and large data volumes are among the technology barriers. The FACE-IT project at the University of Chicago, NASA, and University of Florida employs an integrated approach to cyberinfrastructure to advance the characterization of vulnerabilities, impacts, mitigation, and adaptation to climate change in human and environmental systems. Leveraging existing research cyberinfrastructure the project is creating a full-featured FACE-IT Platform prototype with new capabilities for ingesting, organizing, managing, analyzing and using large quantities of diverse data. The project team collaborates with two distinct interdisciplinary communities to create community specific FACE-IT Instances to both advance their research and enable at-scale evaluation of the utility of the FACE-IT approach. In this talk I will introduce the FACE-IT system and discuss early applications.
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee.
During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…
Reentry challenges facing women with mental health problems.
Visher, Christy A; Bakken, Nicholas W
2014-01-01
Women entering the correctional system represent a population at high risk for mental health and the body of research on the mental health needs of women offenders is growing. These mental health problems pose challenges for women at every stage of the criminal justice process, from arrest to incarceration to community reentry and reintegration. In this article, we examined mental health status among a sample of 142 women leaving confinement and the role that mental health problems played in shaping their reentry outcomes using data collected between 2002 and 2005 in Houston, Texas. In the year after leaving prison, women with mental health problems reported poorer health, more hospitalizations, more suicidal thoughts, greater difficulties securing housing and employment, more involvement in criminal behavior, and less financial support from family than women with no indication of mental health problems. However, mental health status did not increase the likelihood of substance use relapse or reincarceration. The article concludes with a discussion of recommendations for improved policy and practice.
Adaptation to climate change--exploring the potential of locally adapted breeds.
Hoffmann, Irene
2013-06-01
The livestock sector and agriculture as a whole face unprecedented challenges to increase production while improving the environment. On the basis of a literature review, the paper first discusses challenges related to climate change, food security and other drivers of change in livestock production. On the basis of a recent discourse in ecology, a framework for assessing livestock species' and breeds' vulnerability to climate change is presented. The second part of the paper draws on an analysis of data on breed qualities obtained from the Food and Agriculture Organization's Domestic Animal Diversity Information System (DAD-IS) to explore the range of adaptation traits present in today's breed diversity. The analysis produced a first mapping of a range of ascribed adaptation traits of national breed populations. It allowed to explore what National Coordinators understand by 'locally adapted' and other terms that describe general adaptation, to better understand the habitat, fodder and temperature range of each species and to shed light on the environments in which targeted search for adaptation traits could focus.
Technosocial Predictive Analytics in Support of Naturalistic Decision Making
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanfilippo, Antonio P.; Cowell, Andrew J.; Malone, Elizabeth L.
2009-06-23
A main challenge we face in fostering sustainable growth is to anticipate outcomes through predictive and proactive across domains as diverse as energy, security, the environment, health and finance in order to maximize opportunities, influence outcomes and counter adversities. The goal of this paper is to present new methods for anticipatory analytical thinking which address this challenge through the development of a multi-perspective approach to predictive modeling as a core to a creative decision making process. This approach is uniquely multidisciplinary in that it strives to create decision advantage through the integration of human and physical models, and leverages knowledgemore » management and visual analytics to support creative thinking by facilitating the achievement of interoperable knowledge inputs and enhancing the user’s cognitive access. We describe a prototype system which implements this approach and exemplify its functionality with reference to a use case in which predictive modeling is paired with analytic gaming to support collaborative decision-making in the domain of agricultural land management.« less
Invisible water, visible impact: groundwater use and Indian agriculture under climate change
Zaveri, Esha; Grogan, Danielle S.; Fisher-Vanden, Karen; ...
2016-08-03
India is one of the world's largest food producers, making the sustainability of its agricultural system of global significance. Groundwater irrigation underpins India's agriculture, currently boosting crop production by enough to feed 170 million people. Groundwater overexploitation has led to drastic declines in groundwater levels, threatening to push this vital resource out of reach for millions of small-scale farmers who are the backbone of India's food security. Historically, losing access to groundwater has decreased agricultural production and increased poverty. We take a multidisciplinary approach to assess climate change challenges facing India's agricultural system, and to assess the effectiveness of large-scalemore » water infrastructure projects designed to meet these challenges. We find that even in areas that experience climate change induced precipitation increases, expansion of irrigated agriculture will require increasing amounts of unsustainable groundwater. Finally, the large proposed national river linking project has limited capacity to alleviate groundwater stress. Thus, without intervention, poverty and food insecurity in rural India is likely to worsen.« less
Invisible water, visible impact: groundwater use and Indian agriculture under climate change
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zaveri, Esha; Grogan, Danielle S.; Fisher-Vanden, Karen
India is one of the world's largest food producers, making the sustainability of its agricultural system of global significance. Groundwater irrigation underpins India's agriculture, currently boosting crop production by enough to feed 170 million people. Groundwater overexploitation has led to drastic declines in groundwater levels, threatening to push this vital resource out of reach for millions of small-scale farmers who are the backbone of India's food security. Historically, losing access to groundwater has decreased agricultural production and increased poverty. We take a multidisciplinary approach to assess climate change challenges facing India's agricultural system, and to assess the effectiveness of large-scalemore » water infrastructure projects designed to meet these challenges. We find that even in areas that experience climate change induced precipitation increases, expansion of irrigated agriculture will require increasing amounts of unsustainable groundwater. Finally, the large proposed national river linking project has limited capacity to alleviate groundwater stress. Thus, without intervention, poverty and food insecurity in rural India is likely to worsen.« less
Biologics industry challenges for developing diagnostic tests for the National Veterinary Stockpile.
Hardham, J M; Lamichhane, C M
2013-01-01
Veterinary diagnostic products generated ~$3 billion US dollars in global sales in 2010. This industry is poised to undergo tremendous changes in the next decade as technological advances move diagnostic products from the traditional laboratory-based and handheld immunologic assays towards highly technical, point of care devices with increased sensitivity, specificity, and complexity. Despite these opportunities for advancing diagnostic products, the industry continues to face numerous challenges in developing diagnostic products for emerging and foreign animal diseases. Because of the need to deliver a return on the investment, research and development dollars continue to be focused on infectious diseases that have a negative impact on current domestic herd health, production systems, or companion animal health. Overcoming the administrative, legal, fiscal, and technological barriers to provide veterinary diagnostic products for the National Veterinary Stockpile will reduce the threat of natural or intentional spread of foreign diseases and increase the security of the food supply in the US.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mills, James Ignatius; Zounar Harbour, Elda D
2001-08-01
The Idaho National Engineering and Environmental Laboratory (INEEL) is dedicated to finding solutions to problems related to the environment, energy, economic competitiveness, and national security. In an effort to attract and retain the expertise needed to accomplish these challenges, the INEEL is developing a program of broad educational opportunities that makes continuing education readily available to all laboratory employees, beginning in the K–12 environment and progressing through post-graduate education and beyond. One of the most innovative educational approaches being implemented at the laboratory is the application of STELLA© dynamic learning environments, which facilitate captivating K–12 introductions to the complex energymore » and environmental challenges faced by global societies. These simulations are integrated into lesson plans developed by teachers in collaboration with INEEL scientists and engineers. This approach results in an enjoyable and involved learning experience, and an especially positive introduction to the application of science to emerging problems of great social and environmental consequence.« less
Overview and challenges of molecular technologies in the veterinary microbiology laboratory.
Cunha, Mónica V; Inácio, João
2015-01-01
Terrestrial, aquatic, and aerial animals, either domestic or wild, humans, and plants all face similar health threats caused by infectious agents. Multifaceted anthropic pressure caused by an increasingly growing and resource-demanding human population has affected biodiversity at all scales, from the DNA molecule to the pathogen, to the ecosystem level, leading to species declines and extinctions and, also, to host-pathogen coevolution processes. Technological developments over the last century have also led to quantic jumps in laboratorial testing that have highly impacted animal health and welfare, ameliorated animal management and animal trade, safeguarded public health, and ultimately helped to "secure" biodiversity. In particular, the field of molecular diagnostics experienced tremendous technical progresses over the last two decades that significantly have contributed to our ability to study microbial pathogens in the clinical and research laboratories. This chapter highlights the strengths, weaknesses, opportunities, and threats (or challenges) of molecular technologies in the framework of a veterinary microbiology laboratory, in view of the latest advances.
Invisible water, visible impact: groundwater use and Indian agriculture under climate change
NASA Astrophysics Data System (ADS)
Zaveri, Esha; Grogan, Danielle S.; Fisher-Vanden, Karen; Frolking, Steve; Lammers, Richard B.; Wrenn, Douglas H.; Prusevich, Alexander; Nicholas, Robert E.
2016-08-01
India is one of the world’s largest food producers, making the sustainability of its agricultural system of global significance. Groundwater irrigation underpins India’s agriculture, currently boosting crop production by enough to feed 170 million people. Groundwater overexploitation has led to drastic declines in groundwater levels, threatening to push this vital resource out of reach for millions of small-scale farmers who are the backbone of India’s food security. Historically, losing access to groundwater has decreased agricultural production and increased poverty. We take a multidisciplinary approach to assess climate change challenges facing India’s agricultural system, and to assess the effectiveness of large-scale water infrastructure projects designed to meet these challenges. We find that even in areas that experience climate change induced precipitation increases, expansion of irrigated agriculture will require increasing amounts of unsustainable groundwater. The large proposed national river linking project has limited capacity to alleviate groundwater stress. Thus, without intervention, poverty and food insecurity in rural India is likely to worsen.
Hussain, Shoaib Fahad; Boyle, Peter; Patel, Preeti; Sullivan, Richard
2016-10-12
Since the launch of the Global Polio Eradication Initiative (GPEI) in 1988 the global incidence of poliomyelitis has fallen by nearly 99 %. From a situation where wild type poliovirus was endemic in 125 countries across five continents, transmission is now limited to regions of just three countries - Pakistan, Afghanistan and Nigeria. A sharp increase in Pakistan's poliomyelitis cases in 2014 prompted the International Health Regulations Emergency Committee to declare the situation a 'public health emergency of international concern'. Global polio eradication hinges on Pakistan's ability to address the religious, political and socioeconomic barriers to immunisation; including discrepancies in vaccine coverage, a poor health infrastructure, and conflict in polio-endemic regions of the country. This analysis provides an overview of the GPEI, focusing on the historical and contemporary challenges facing Pakistan's polio eradication programme and the impact of conflict and insecurity, and sheds light on strategies to combat vaccine hesitancy, engage local communities and build on recent progress towards polio eradication in Pakistan.
The application of genomics and bioinformatics to accelerate crop improvement in a changing climate.
Batley, Jacqueline; Edwards, David
2016-04-01
The changing climate and growing global population will increase pressure on our ability to produce sufficient food. The breeding of novel crops and the adaptation of current crops to the new environment are required to ensure continued food production. Advances in genomics offer the potential to accelerate the genomics based breeding of crop plants. However, relating genomic data to climate related agronomic traits for use in breeding remains a huge challenge, and one which will require coordination of diverse skills and expertise. Bioinformatics, when combined with genomics has the potential to help maintain food security in the face of climate change through the accelerated production of climate ready crops. Copyright © 2016 Elsevier Ltd. All rights reserved.
Engineering aids for the design of survivable defense communications transmission capability
NASA Astrophysics Data System (ADS)
Stover, H. A.
1984-01-01
Adequate military communications are essential to the security of the United States, especially in the various stages of major wars. Enough communications must survive to make effective use of our military forces and weaponry, even in the face of a concerted enemy effort to destroy those communications. An evolutionary approach to provide survivability is recommended. It must be provided by the design engineer. Afterthought and modification must be replaced with foresight and design. The engineer must make survivability a criterion in every design decision. The design engineer needs help with the challenges and associated details of successfully accomplishing this. The author discusses and recommends development of convenient-to-use survivability engineering design tools to provide this help.
Nuclear safeguards in Brazil and Argentina: 25 years of ABACC
NASA Astrophysics Data System (ADS)
Kassenova, Togzhan
2017-11-01
As possessors of advanced nuclear technology, Brazil and Argentina bear special responsibility for helping the international community and neighbors in their region feel confident that their nuclear programs are peaceful, secure, and safe. Over the past 25 years, the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC) has played an indispensable role in strengthening such confidence by implementing nuclear safeguards in the two countries. Today, ABACC carries out safeguards inspections at a total of 76 nuclear facilities in Brazil and Argentina. This article describes how Brazil and Argentina view trends in the global nonproliferation regime and international nuclear safeguards, and explains how these trends relate to unique challenges and opportunities facing Brazil, Argentina, and ABACC.
Challenges Faced by Female-Students in Engineering-Education
ERIC Educational Resources Information Center
Madara, Diana Starovoytova; Cherotich, Sharon
2016-01-01
Gender-related challenges in learning technical courses are universal phenomenon. These challenges could restrain female students from achieving their fullest potential. The main focus of this study, therefore, is to examine self-recognized challenges faced by undergraduate female students in pursuing engineering at the School of Engineering…
[Facing the HIV/AIDS epidemic in Mexico: the response of the health sector].
Gutiérrez, Juan Pablo; López-Zaragoza, José Luis; Valencia-Mendoza, Atanacio; Pesqueira, Eduardo; Ponce-de-León, Samuel; Bertozzi, Stefano M
2004-01-01
To analyze the challenges and accomplishments of the Mexican health system as it faced the HIV/AIDS epidemic over the 20 years since discovery of the virus. A review of the relevant literature was done. The topics revised were: HIV/AIDS epidemiology, the early response of the health system and civil society, prevention and risk behaviors, care and treatment, and financing and resources allocation. In Mexico a rapid initial public response surely contributed to containing any early spread of the epidemic to select populations; whether that spread will continue to be contained is an open question. Sexual risk practices remain high not only among traditional risk populations but also among youth. Even though the epidemic remains concentrated in Mexico, principally among MSM and IDU, only 13% of public HIV prevention funds are directed to key populations at especially high risk of becoming infected or infecting others. In recent years antiretroviral coverage has increased rapidly with funding increasing from 30 to 367 million pesos from 2001 to 2003 and coverage now approaching 100%. Of all health spending on HIV/AIDS in the public sector, 82.4% is spent by the social security institutes and 17.6% by the Ministry of Health. The former provides medical care to about half of PLHA while the latter, in addition to caring for the other half, supports the large majority of prevention expenses. One of the challenges faced by the health system which has largely achieved universal antiretroviral coverage is how to provide quality care with appropriate monitoring, promotion of adherence and recognition and treatment of resistance and adverse effects--without dramatically increasing costs.
Akre, Christina; Polvinen, Julie; Ullrich, Nicole J; Rich, Michael
2018-04-01
The aim of this pilot study was to evaluate Children's at Home (C@H), a dedicated social media website for parents of adolescents with neurofibromatosis type 1 (NF1). The interventional study included two phases: (1) creating video intervention/prevention assessment (VIA) visual narratives about having an adolescent with NF1 and (2) interacting on C@H, a secure, medically moderated social media website. C@H was evaluated qualitatively at three time points. At enrollment (T0, N = 17), participants reported needing C@H to break their isolation, connect with other families, and receive accurate information, advice, and support from others facing similar challenges. At T1, after creating VIA during 6 months (N = 13, 145 videos), participants mostly valued the opportunity to speak about the challenges they face with NF1 and their journey since diagnosis. At T2, after interacting on C@H for 7 weeks (N = 10, two sign-ins/week/parent), participants reported connecting with other parents of children with NF1 for the first time, valuing the "real faces" and emotions of other parents with shared experiences providing a sense of normalcy. Qualitative analysis suggested that C@H decreased feelings of isolation, provided relief to talk about NF1 without having to explain it, provided new knowledge about NF1 and the opportunity to address non-medical issues of NF1 never discussed in clinic, and helped participants with putting their lives into perspective. C@H allowed parents of adolescents with NF1 to overcome previous isolation and connect for the first time. Innovative applications of social media dedicated to those who care for children with chronic conditions can provide peer-to-peer support, shared experience, and reliable medical information.
The new risk paradigm for chemical process security and safety.
Moore, David A
2004-11-11
The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.
Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges
2010-07-01
the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity
EU Failing FAO Challenge to Improve Global Food Security.
Smyth, Stuart J; Phillips, Peter W B; Kerr, William A
2016-07-01
The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.
2011-05-04
evolving security challenges. Issues such as terrorism, proliferation of weapons of mass destruction, impacts of climate change , and the ever...impacts of climate change , and the ever-growing competition for valuable natural resources are a few of the these challenges. As an integral part...destruction, impacts of climate change , and the ever-growing competition for valuable natural resources have resulted in a new set of security
NASA Astrophysics Data System (ADS)
Watanabe, Eriko; Ishikawa, Mami; Ohta, Maiko; Murakami, Yasuo; Kodate, Kashiko
2006-01-01
Medical errors and patient safety have always received a great deal of attention, as they can be critically life-threatening and significant matters. Hospitals and medical personnel are trying their utmost to avoid these errors. Currently in the medical field, patients' record is identified through their PIN numbers and ID cards. However, for patients who cannot speak or move, or who suffer from memory disturbances, alternative methods would be more desirable, and necessary in some cases. The authors previously proposed and fabricated a specially-designed correlator called FARCO (Fast Face Recognition Optical Correlator) based on the Vanderlugt Correlator1, which operates at the speed of 1000 faces/s 2,3,4. Combined with high-speed display devices, the four-channel processing could achieve such high operational speed as 4000 faces/s. Running trial experiments on a 1-to-N identification basis using the optical parallel correlator, we succeeded in acquiring low error rates of 1 % FMR and 2.3 % FNMR. In this paper, we propose a robust face recognition system using the FARCO for focusing on the safety and security of the medical field. We apply our face recognition system to registration of inpatients, in particular children and infants, before and after medical treatments or operations. The proposed system has recorded a higher recognition rate by multiplexing both input and database facial images from moving images. The system was also tested and evaluated for further practical use, leaving excellent results. Hence, our face recognition system could function effectively as an integral part of medical system, meeting these essential requirements of safety, security and privacy.
Enhanced Facial Symmetry Assessment in Orthodontists
Jackson, Tate H.; Clark, Kait; Mitroff, Stephen R.
2013-01-01
Assessing facial symmetry is an evolutionarily important process, which suggests that individual differences in this ability should exist. As existing data are inconclusive, the current study explored whether a group trained in facial symmetry assessment, orthodontists, possessed enhanced abilities. Symmetry assessment was measured using face and non-face stimuli among orthodontic residents and two control groups: university participants with no symmetry training and airport security luggage screeners, a group previously shown to possess expert visual search skills unrelated to facial symmetry. Orthodontic residents were more accurate at assessing symmetry in both upright and inverted faces compared to both control groups, but not for non-face stimuli. These differences are not likely due to motivational biases or a speed-accuracy tradeoff—orthodontic residents were slower than the university participants but not the security screeners. Understanding such individual differences in facial symmetry assessment may inform the perception of facial attractiveness. PMID:24319342
ERIC Educational Resources Information Center
Silvernail, David L.; Linet, Sarah R.
2014-01-01
The goal of this study was to: (1) identify challenges faced by Maine school districts in providing high quality public education; (2) describe the magnitude of the challenges; and (3) identify areas where school districts were experiencing some success in meeting these challenges. The School Districts Challenge Survey was distributed online to…
A Seasoned Instructor's New Look at Fixed-Income Securities: An Exercise Using Discounted Bonds
ERIC Educational Resources Information Center
Secrest, Thomas W.
2012-01-01
Having returned to teaching the basics of pricing fixed-income securities after several years, the author recalls the difficulty students have in understanding the total return provided by fixed-income securities that are purchased at either a discount or premium from face value. This teaching note attempts to clarify the concept by suggesting…
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2013 CFR
2013-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2010 CFR
2010-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2011 CFR
2011-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2014 CFR
2014-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2012 CFR
2012-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
ERIC Educational Resources Information Center
Thompson, Eleanor Elizabeth
2014-01-01
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…
Ebert, Todd A [West Palm Beach, FL; Carella, John A [Jupiter, FL
2012-03-13
A triple acting radial seal used as an interstage seal assembly in a gas turbine engine, where the seal assembly includes an interstage seal support extending from a stationary inner shroud of a vane ring, the interstage seal support includes a larger annular radial inward facing groove in which an outer annular floating seal assembly is secured for radial displacement, and the outer annular floating seal assembly includes a smaller annular radial inward facing groove in which an inner annular floating seal assembly is secured also for radial displacement. A compliant seal is secured to the inner annular floating seal assembly. The outer annular floating seal assembly encapsulates the inner annular floating seal assembly which is made from a very low alpha material in order to reduce thermal stress.
Ying, Liu; Bashir, Muhammad Khalid; Abid, Muhammad; Zulfiqar, Farhad
2017-01-01
In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households’ food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households’ perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost) do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure. PMID:29077719
Ahmed, Umar Ijaz; Ying, Liu; Bashir, Muhammad Khalid; Abid, Muhammad; Zulfiqar, Farhad
2017-01-01
In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost) do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.
ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marra, J.
2010-09-29
Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less
Assessing uncertainties in surface water security: An empirical multimodel approach
NASA Astrophysics Data System (ADS)
Rodrigues, Dulce B. B.; Gupta, Hoshin V.; Mendiondo, Eduardo M.; Oliveira, Paulo Tarso S.
2015-11-01
Various uncertainties are involved in the representation of processes that characterize interactions among societal needs, ecosystem functioning, and hydrological conditions. Here we develop an empirical uncertainty assessment of water security indicators that characterize scarcity and vulnerability, based on a multimodel and resampling framework. We consider several uncertainty sources including those related to (i) observed streamflow data; (ii) hydrological model structure; (iii) residual analysis; (iv) the method for defining Environmental Flow Requirement; (v) the definition of critical conditions for water provision; and (vi) the critical demand imposed by human activities. We estimate the overall hydrological model uncertainty by means of a residual bootstrap resampling approach, and by uncertainty propagation through different methodological arrangements applied to a 291 km2 agricultural basin within the Cantareira water supply system in Brazil. Together, the two-component hydrograph residual analysis and the block bootstrap resampling approach result in a more accurate and precise estimate of the uncertainty (95% confidence intervals) in the simulated time series. We then compare the uncertainty estimates associated with water security indicators using a multimodel framework and the uncertainty estimates provided by each model uncertainty estimation approach. The range of values obtained for the water security indicators suggests that the models/methods are robust and performs well in a range of plausible situations. The method is general and can be easily extended, thereby forming the basis for meaningful support to end-users facing water resource challenges by enabling them to incorporate a viable uncertainty analysis into a robust decision-making process.
Intrusion Prevention and Detection in Grid Computing - The ALICE Case
NASA Astrophysics Data System (ADS)
Gomez, Andres; Lara, Camilo; Kebschull, Udo
2015-12-01
Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.
Political experiences of changing the focus in elderly care in one municipality.
Evertsson, Paula; Rosengren, Kristina
2015-11-01
To describe local politicians' experiences of an ongoing planning process for elderly care for the future in a medium-sized municipality in western Sweden. Elderly care is facing challenges because of an ageing population. The study comprised a total of eight semi-structured interviews with politicians. The interviews were analysed using manifest qualitative content analysis. One category (political consensus) and three subcategories (involvement generates security, trust in change management and confidence to create visions) were identified. Political consensus across elderly care organisations could establish a sense of security for old people, their relatives and the staff in particular. Continuous information and support from different managerial levels is one way of implementing changes within large organisations. However, further research is needed to describe how to develop future elderly care. An ageing population requires cooperation across provider boundaries to further develop high-quality elderly care services. Nursing leadership during a change process is crucial to implement political decisions in care organisations. Furthermore, active marketing of the health care profession for elderly care is needed as well as new knowledge regarding old people. © 2014 John Wiley & Sons Ltd.
[The Mexican health system: does it require a transformation?].
Chertorivski Woldenberg, Salomón; Fajardo Dolci, German
2012-01-01
National health systems represent an organized social response that enables countries to improve, maintain and enhance the health status of their citizens. These evolve and are transformed according to changes in the biological, economic, political and social components of health. In Mexico there is currently a segmented health system, consisting of a bismarckian model of social security and a social protection in health model. The latter developed to comply with the fourth constitutional article by which health is no longer described as a right linked to the employment status of the individual. Given this reality at least three alternatives seem to emerge for the future: the permanence of a mixed health system with social security and social protection institutions with a similar weight within the national health system, or its opposite, the extension of social protection as a mechanism for widespread access. Given the challenges we face, it is desirable to establish a unified health system, the aim should be that health care is universally protected, as currently happens, but is guaranteed through a much more efficient and based in primary care health care system.
The Water-Energy-Food Nexus in Kazakhstan: Trends and Analyses
NASA Astrophysics Data System (ADS)
Karatayev, Marat; Rivotti, Pedro; Sobral Mourão, Zenaida; Konadu, D. Dennis; Clarke, Michèle
2017-04-01
The concept of the water, energy and food nexus is extremely relevant to Kazakhstan as the country faces population growth, economic progress and environmental challenges such as water scarcity, desertification, and climate change. Furthermore, poor sectoral coordination and institutional fragmentation have caused an unsustainable resource use and threaten the long-term sustainability of water, energy and food security in Kazakhstan. Specifically, low tariffs in the water and electricity sectors have led to under-investment in water and energy efficiency measures, leading to extensive water losses, soil salinity, as well as degradation of agricultural land. Using the nexus approach, this study aims to investigate and map the linkages between water resources, energy production and food security in Kazakhstan, with an emphasis on the current coordination framework. This will enable the identification of critical interdependency issues in the management of these resources. The results will provide a better understanding of the current interconnectedness of the sectors, and support the coordination of decision-making at various levels of governance and research of land, water and energy to meet sustainable development goals.
A Value Measure for Public-Sector Enterprise Risk Management: A TSA Case Study.
Fletcher, Kenneth C; Abbas, Ali E
2018-05-01
This article presents a public value measure that can be used to aid executives in the public sector to better assess policy decisions and maximize value to the American people. Using Transportation Security Administration (TSA) programs as an example, we first identify the basic components of public value. We then propose a public value account to quantify the outcomes of various risk scenarios, and we determine the certain equivalent of several important TSA programs. We illustrate how this proposed measure can quantify the effects of two main challenges that government organizations face when conducting enterprise risk management: (1) short-term versus long-term incentives and (2) avoiding potential negative consequences even if they occur with low probability. Finally, we illustrate how this measure enables the use of various tools from decision analysis to be applied in government settings, such as stochastic dominance arguments and certain equivalent calculations. Regarding the TSA case study, our analysis demonstrates the value of continued expansion of the TSA trusted traveler initiative and increasing the background vetting for passengers who are afforded expedited security screening. © 2017 Society for Risk Analysis.
Clark, Justice; Marcello, Thomas B; Paquin, Allison M; Stewart, Max; Archambeault, Cliona; Simon, Steven R
2013-01-01
Background Virtual (non-face-to-face) medication reconciliation strategies may reduce adverse drug events (ADEs) among vulnerable ambulatory patients. Understanding provider perspectives on the use of technology for medication reconciliation can inform the design of patient-centered solutions to improve ambulatory medication safety. Objective The aim of the study was to describe primary care providers’ experiences of ambulatory medication reconciliation and secure messaging (secure email between patients and providers), and to elicit perceptions of a virtual medication reconciliation system using secure messaging (SM). Methods This was a qualitative study using semi-structured interviews. From January 2012 to May 2012, we conducted structured observations of primary care clinical activities and interviewed 15 primary care providers within a Veterans Affairs Healthcare System in Boston, Massachusetts (USA). We carried out content analysis informed by the grounded theory. Results Of the 15 participating providers, 12 were female and 11 saw 10 or fewer patients in a typical workday. Experiences and perceptions elicited from providers during in-depth interviews were organized into 12 overarching themes: 4 themes for experiences with medication reconciliation, 3 themes for perceptions on how to improve ambulatory medication reconciliation, and 5 themes for experiences with SM. Providers generally recognized medication reconciliation as a valuable component of primary care delivery and all agreed that medication reconciliation following hospital discharge is a key priority. Most providers favored delegating the responsibility for medication reconciliation to another member of the staff, such as a nurse or a pharmacist. The 4 themes related to ambulatory medication reconciliation were (1) the approach to complex patients, (2) the effectiveness of medication reconciliation in preventing ADEs, (3) challenges to completing medication reconciliation, and (4) medication reconciliation during transitions of care. Specifically, providers emphasized the importance of medication reconciliation at the post-hospital visit. Providers indicated that assistance from a caregiver (eg, a family member) for medication reconciliation was helpful for complex or elderly patients and that patients’ social or cognitive factors often made medication reconciliation challenging. Regarding providers’ use of SM, about half reported using SM frequently, but all felt that it improved their clinical workflow and nearly all providers were enthusiastic about a virtual medication reconciliation system, such as one using SM. All providers thought that such a system could reduce ADEs. Conclusions Although providers recognize the importance and value of ambulatory medication reconciliation, various factors make it difficult to execute this task effectively, particularly among complex or elderly patients and patients with complicated social circumstances. Many providers favor enlisting the support of pharmacists or nurses to perform medication reconciliation in the outpatient setting. In general, providers are enthusiastic about the prospect of using secure messaging for medication reconciliation, particularly during transitions of care, and believe a system of virtual medication reconciliation could reduce ADEs. PMID:24297865
3. VIEW OF WEST AND SOUTH FACES OF VEHICLE SUPPORT ...
3. VIEW OF WEST AND SOUTH FACES OF VEHICLE SUPPORT BUILDING. NOTE BLAST-PROTECTION WALL SURROUNDING DOOR TO ROOM 106 (PYROTECHNIC STORAGE ROOM) NEAR SOUTHWEST CORNER. East face not accesible for photography due to proximity of security fence. - Vandenberg Air Force Base, Space Launch Complex 3, Vehicle Support Building, Napa & Alden Roads, Lompoc, Santa Barbara County, CA
Secure Fingerprint Identification of High Accuracy
2014-01-01
secure ) solution of complexity O(n3) based on Gaussian elimination. When it is applied to biometrics X and Y with mX and mY minutiae, respectively...collections of biometric data in use today include, for example, fingerprint, face, and iris images collected by the US Department of Homeland Security ...work we focus on fingerprint data due to popularity and good accuracy of this type of biometry. We formulate the problem of private, or secure , finger
Climate Change Adaptation Challenges and EO Business Opportunities
NASA Astrophysics Data System (ADS)
Lopez-Baeza, Ernesto; Mathieu, Pierre-Philippe; Bansal, Rahul; Del Rey, Maria; Mohamed, Ebrahim; Ruiz, Paz; Signes, Marcos
Climate change is one of the defining challenges of the 21st century, but is no longer a matter of just scientific concern. It encompasses economics, sociology, global politics as well as national and local politics, law, health and environmental security, etc. The challenge of facing the impacts of climate change is often framed in terms of two potential paths that civilization might take: mitigation and adaptation. On the one hand, mitigation involves reducing the magnitude of climate change itself and is composed of emissions reductions and geoengineering. On the other hand and by contrast, adaptation involves efforts to limit our vulnerability to climate change impacts through various measures. It refers to our ability to adjust ourselves to climate change -including climate variability and extremes, to moderate potential damage, to take advantage of opportunities, or to cope with the consequences. Therefore, we are now faced with a double challenge: next to deep cuts in greenhouse gas emissions, we also need to adapt to the changing climate conditions. The use of satellites to monitor processes and trends at the global scale is essential in the context of climate change. Earth Observation has the potential to improve our predictive vision and to advance climate models. Space sciences and technologies constitute a significant issue in Education and Public Awareness of Science. Space missions face the probably largest scientific and industrial challenges of humanity. It is thus a fact that space drives innovation in the major breakthrough and cutting edge technological advances of mankind (techniques, processes, new products, … as well as in markets and business models). Technology and innovation is the basis of all space activities. Space agencies offer an entire range of space-related activities - from space science and environmental monitoring to industrial competitiveness and end-user services. More specifically, Earth Observation satellites have a unique global view of planet Earth, providing us -with better data- with consistent and frequent information on the state of our environment at the regional and global scale, also in important but remote areas. Climate Knowledge and Innovation Communities (Climate-KIC), a relatively new initiative from the European Institute of Innovation & Technology (EIT), provides the innovations, entrepreneurship, education and expert guidance needed to shape Europe's climate change agenda. This paper shows some initiatives that the University of Valencia Climate-KIC Education Group is carrying out in collaboration with the Climate-KIC Central Education Lead in the field of space education to foster and encourage students and entrepreneurs to endevour in these new space business opportunities offered by this step forward towards climate change adaptation challenges.
7 Key Challenges for Visualization in Cyber Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Best, Daniel M.; Endert, Alexander; Kidwell, Dan
In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.
Playful biometrics: controversial technology through the lens of play.
Ellerbrok, Ariane
2011-01-01
This article considers the role of play in the context of technological emergence and expansion, particularly as it relates to recently emerging surveillance technologies. As a case study, I consider the trajectory of automated face recognition—a biometric technology of numerous applications, from its more controversial manifestations under the rubric of national security to a clearly emerging orientation toward play. This shift toward “playful” biometrics—or from a technology traditionally coded as “hard” to one now increasingly coded as “soft”—is critical insofar as it renders problematic the traditional modes of critique that have, up until this point, challenged the expansion of biometric systems into increasingly ubiquitous realms of everyday life. In response to this dynamic, I propose theorizing the expansion of face recognition specifically in relation to “play,” a step that allows us to broaden the critical space around newly emerging playful biometrics, as well as playful surveillance more generally. In addition, play may also have relevance for theorizing other forms of controversial technology, particularly given its potential role in processes of obfuscation, normalization, and marginalization.
Enhancing international collaboration among early career researchers.
Carroll, Jennifer K; Albada, Akke; Farahani, Mansoureh; Lithner, Maria; Neumann, Melanie; Sandhu, Harbinder; Shepherd, Heather L
2010-09-01
The European Association of Communication in Healthcare (EACH) Early Career Researchers Network (ECRN) aims are to (1) promote international collaboration among young investigators and (2) provide a support network for future innovative communication research projects. In October 2009, Miami, USA at a workshop facilitated by the ECRN at the International Conference on Communication in Healthcare (ICCH) hosted by the American Academy of Communication in Healthcare we explored common facilitators and challenges faced by early career researchers in health communication research. Attendees introduced themselves, their research area(s) of interest, and listed one facilitator and one barrier for their career development. EACH ECRN members then led a discussion of facilitators and challenges encountered in communication research projects and career development. We discussed potential collaboration opportunities, future goals, and activities. Having supportive collegial relationships, institutional support, job security, and funding are critical facilitators for early career investigators. Key challenges include difficulty with time management and prioritizing, limited resources, and contacts. International collaboration among early career researchers is a feasible and effective means to address important challenges, by increasing opportunities for professional support and networking, problem-solving, discussion of data, and ultimately publishing. Future AACH-EACH Early Career Researcher Networks should continue to build collaborations by developing shared research projects, papers, and other scholarly products. Copyright (c) 2010. Published by Elsevier Ireland Ltd.
Challenges and Potential Solutions for Big Data Implementations in Developing Countries
Mayan, J.C; García, M.J.; Almerares, A.A.; Househ, M.
2014-01-01
Summary Background The volume of data, the velocity with which they are generated, and their variety and lack of structure hinder their use. This creates the need to change the way information is captured, stored, processed, and analyzed, leading to the paradigm shift called Big Data. Objectives To describe the challenges and possible solutions for developing countries when implementing Big Data projects in the health sector. Methods A non-systematic review of the literature was performed in PubMed and Google Scholar. The following keywords were used: “big data”, “developing countries”, “data mining”, “health information systems”, and “computing methodologies”. A thematic review of selected articles was performed. Results There are challenges when implementing any Big Data program including exponential growth of data, special infrastructure needs, need for a trained workforce, need to agree on interoperability standards, privacy and security issues, and the need to include people, processes, and policies to ensure their adoption. Developing countries have particular characteristics that hinder further development of these projects. Conclusions The advent of Big Data promises great opportunities for the healthcare field. In this article, we attempt to describe the challenges developing countries would face and enumerate the options to be used to achieve successful implementations of Big Data programs. PMID:25123719
Challenges and Opportunities of Big Data in Health Care: A Systematic Review
Goswamy, Rishi; Raval, Yesha; Marawi, Sarah
2016-01-01
Background Big data analytics offers promise in many business sectors, and health care is looking at big data to provide answers to many age-related issues, particularly dementia and chronic disease management. Objective The purpose of this review was to summarize the challenges faced by big data analytics and the opportunities that big data opens in health care. Methods A total of 3 searches were performed for publications between January 1, 2010 and January 1, 2016 (PubMed/MEDLINE, CINAHL, and Google Scholar), and an assessment was made on content germane to big data in health care. From the results of the searches in research databases and Google Scholar (N=28), the authors summarized content and identified 9 and 14 themes under the categories Challenges and Opportunities, respectively. We rank-ordered and analyzed the themes based on the frequency of occurrence. Results The top challenges were issues of data structure, security, data standardization, storage and transfers, and managerial skills such as data governance. The top opportunities revealed were quality improvement, population management and health, early detection of disease, data quality, structure, and accessibility, improved decision making, and cost reduction. Conclusions Big data analytics has the potential for positive impact and global implications; however, it must overcome some legitimate obstacles. PMID:27872036
Enhancing international collaboration among early-career researchers
Carroll, Jennifer K; Albada, Akke; Farahani, Mansoureh; Lithner, Maria; Neumann, Melanie; Sandhu, Harbinder; Shepherd, Heather L
2010-01-01
Objective The European Association of Communication in Healthcare (EACH) Early Career Researchers Network (ECRN) aims are to (1) promote international collaboration among young investigators and (2) provide a support network for future innovative communication research projects. In October 2009, Miami, USA at a workshop facilitated by the ECRN at the International Conference on Communication in Healthcare (ICCH) hosted by the American Academy of Communication in Healthcare we explored common facilitators and challenges faced by early career researchers in health communication research. Methods Attendees introduced themselves, their research area(s) of interest, and listed one facilitator and one barrier for their career development. EACH ECRN members then led a discussion of facilitators and challenges encountered in communication research projects and career development. We discussed potential collaboration opportunities, future goals, and activities. Results Having supportive collegial relationships, institutional support, job security, and funding are critical facilitators for early career investigators. Key challenges include difficulty with time management and prioritizing, limited resources, and contacts. Conclusion International collaboration among early career researchers is a feasible and effective means to address important challenges, by increasing opportunities for professional support and networking, problem-solving, discussion of data, and ultimately publishing. Practice Implications Future AACH-EACH Early Career Researcher Networks should continue to build collaborations by developing shared research projects, papers, and other scholarly products. PMID:20663630
Challenges Facing Teachers New to Working in Schools Overseas
ERIC Educational Resources Information Center
Halicioglu, Margaret L.
2015-01-01
This article considers the potential challenges facing teachers moving abroad for the first time, both professional challenges in their school and personal challenges in their private life. It suggests that such teachers embarking on a professional adventure overseas would benefit from careful consideration of the kind of school they will thrive…
An Exploration of Challenges Facing Division III Athletic Directors
ERIC Educational Resources Information Center
Engbers, Jeffrey L.
2011-01-01
The purpose of this study was to establish a basic understanding of the challenges associated with directing athletic programs at NCAA Division III Institutions. Specifically, this study identified the frequency, intensity, and time allocated to common challenges facing the position of the NCAA Division III AD. The challenges were examined using…
The Challenges Facing School Governing Bodies in England: A "Perfect Storm"?
ERIC Educational Resources Information Center
James, Chris; Brammer, Steve; Connolly, Michael; Spicer, David Eddy; James, Jane; Jones, Jeff
2013-01-01
The governing bodies of publicly funded schools in England are currently facing a number of substantive challenges of various kinds. Many of the challenges are long-standing, while others relate to the current context for governing wrought by recent education policy developments initiated by central government. A number of the challenges are…
2016-07-13
adequate security testing , and segment their networks and systems into separate defended enclaves. Finally, cyber defenders should posi- tion themselves...explicitly tied to following security practices, and there should be consequences for security failures that are regularly tested via a continuing testing ...program. Users should be routinely tested and probed, and those who do not perform well should face escalating consequences. For example, cyber
ERIC Educational Resources Information Center
Buckman, Joel; Gold, Stephanie
2012-01-01
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.
Big Data: the challenge for small research groups in the era of cancer genomics
Noor, Aisyah Mohd; Holmberg, Lars; Gillett, Cheryl; Grigoriadis, Anita
2015-01-01
In the past decade, cancer research has seen an increasing trend towards high-throughput techniques and translational approaches. The increasing availability of assays that utilise smaller quantities of source material and produce higher volumes of data output have resulted in the necessity for data storage solutions beyond those previously used. Multifactorial data, both large in sample size and heterogeneous in context, needs to be integrated in a standardised, cost-effective and secure manner. This requires technical solutions and administrative support not normally financially accounted for in small- to moderate-sized research groups. In this review, we highlight the Big Data challenges faced by translational research groups in the precision medicine era; an era in which the genomes of over 75 000 patients will be sequenced by the National Health Service over the next 3 years to advance healthcare. In particular, we have looked at three main themes of data management in relation to cancer research, namely (1) cancer ontology management, (2) IT infrastructures that have been developed to support data management and (3) the unique ethical challenges introduced by utilising Big Data in research. PMID:26492224
Skarpaas, Lisebet Skeie; Ramvi, Ellen; Løvereide, Lise; Aas, Randi Wågø
2015-01-01
Many people confronting mental health problems are excluded from participation in paid work. Supervisor engagement is essential for successful job placement. To elicit supervisor perspectives on the challenges involved in fostering integration to support individuals with mental health problems (trainees) in their job placement at ordinary companies. Explorative, qualitative designed study with a phenomenological approach, based on semi-structured interviews with 15 supervisors involved in job placements for a total of 105 trainees (mean 7, min-max. 1-30, SD 8). Data were analysed using qualitative content analysis. Superviors experience two interrelated dilemmas concerning knowledge of the trainee and degree of preferential treatment. Challenges to obtaining successful integration were; motivational: 1) Supervisors previous experience with trainees encourages future engagement, 2) Developing a realistic picture of the situation, and 3) Disclosure and knowledge of mental health problems, and continuity challenges: 4) Sustaining trainee cooperation throughout the placement process, 5) Building and maintaining a good relationship between supervisor and trainee, and 6) Ensuring continuous cooperation with the social security system and other stakeholders. Supervisors experience relational dilemmas regarding pre-judgment, privacy and equality. Job placement seem to be maximized when the stakeholders are motivated and recognize that cooperation must be a continuous process.
Health policy and the community safety net for individuals with intellectual disability.
Pollack, Harold A
2011-01-01
This article explores social policy developments in the arena of intellectual and developmental disabilities. It begins by summarizing the challenges facing persons with intellectual disabilities and their caregivers in 1945. Families depended on a patchwork of over-crowded and under-funded large state institutions. Children with intellectual disabilities were marginalized from education and public services. Shame and stigma, along with the lack of community-based services, led many parents to institutionalize a child. The federal government provided almost no specific assistance for disabled individuals or to their families. Postwar America provided fertile ground for parents to act collectively through the emergence of the National Association of Retarded Children (NARC). Partly as a consequence of such organizing, the 1950s marked a surprising turning-point, in which the federal government expanded income support to disabled persons through measures such as Social Security's "Disabled Adult Child" program and, by the early 1970s, the advent of Supplemental Security Income (SSI). It also reviews the growth of Medicaid as the dominant payer of medical and social services at the boundaries between personal medical services, case management, education, and other social services. The article ends by summarizing current challenges in intellectual disability policy. It notes that the size, complexity, and expense of I/DD services poses inherent challenges, particularly to state and local governments in the current recession. Adjusting for inflation, 23 states actually reduced real spending on I/DD services between 2008 and 2009. Controlling for local conditions, politically conservative states enacted deeper cuts and spent a smaller fraction of state income on intellectual disability services than other states. Copyright © 2012 Wiley Periodicals, Inc.
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
Li, Shancang; Tryfonas, Theo; Russell, Gordon; Andriotis, Panagiotis
2016-08-01
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire system.
2015-05-21
bandwagon , that is, ally with the state that poses the major threat in order to protect their own security. If balancing, then states are more secure...because aggressors face combined opposition. If bandwagoning , then security is scarce because aggression is rewarded.4 Balance of power theorists...Transformed: Complexity Theory and European Security (Lanham, MD: Rowman and Littlefield Publishers, 2001), 6. 10 establish an effective Baltic
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... as ``remaining principal balance'' or ``RPB'') to (2) the original face value of the ABS. Such... to report the original face value of the security; in (B)(ii), for a transaction in an amortizing ABS, other than a TBA transaction, a member would be required to report the original face value of the...
The burden of terrorism in Malaysia.
Abul Aziz, Azhar
2003-01-01
In the peace-loving, moderate and progressive country of Muslim-dominated Malaysia, violence generally is alien to the culture. Terrorism initially took shape during the post-independence, communist era by jungle recalcitrant actions. In recent years, this has been superceded by a more internationally related trend of violence. Only very few incidents were based locally, while the majority were linked to international groups or organizations abroad, including the Kumpulan Mujahidin Malaysia (KMM), Jemaah Islamiyah (JI), and the Abu Sayyaf Group (ASG). Kidnapping with ransom seemed to have been the most commone modus operandi, while killing and robbery accounted for very few of these incidents. The number of victims in each event so far has been small, and smaller for those physically harmed or killed. This pattern of terrorist attacks suggests that the current level of provision of emergency medical services is sufficient to handle such incidents. Recent advances in local emergency medicine also have witnessed the establishment of various teaching and training modules, a pivotal role played by university hospitals and supported by the Ministry of Health. However, the spate of ongoing events of mass destruction such as the conflict in Israel/Palestine, wars in Afghanistan and Iraq, the World Trade Center and Pentagon tragedies of 11 September 2001, and the Bali bombing in Indonesia, remain as great concerns to Malaysians. Both the government and the people of Malaysia abhor such unjustified uses of terror, and take every measure to curtail them. The National Security Council policies of Arahan No. 18 and Arahan No. 20 detail specific roles and responsibilities of various agencies in managing terrorism and disasters respectively, while the use of the stern Internal Security Act that allows indefinite detention without trial, evidently has been an efficient intelligence and security apparatus. With more recent developments of terrorist events regionally and globally, Malaysia continues to face an ongoing threat from such activities. Various measures have been and will be actively undertaken both by government and non-governmental agencies in facing these challenges.
Challenges of International Students in a Japanese University: Ethnographic Perspectives
ERIC Educational Resources Information Center
Lee, Ju Seong
2017-01-01
The author investigates what challenges four international students (Vietnamese, Filipino, Brazilian, and Chinese) faced and how they coped with these dilemmas in a Japanese language program during the first semester in 2014. Multiple apparatuses (e.g., field notes, face-to-face oral interviews, focal group conversations, and semi-structured…
2009-01-01
The United States needs a new model of “globalized” national security for this changing world: we must realign longstanding policies away from go...at the center of our approach to ensuring our future security. … Now, when we most need to re-examine our Transatlantic security model, this new two...address the globalized threats we face, our gov- ernment is already reorienting the capabilities of our national security forces to a new bal- ance
A qualitative study of the current situation of elderly care in Iran: what can we do for the future?
Goharinezhad, Salime; Maleki, Mohammadreza; Baradaran, Hamid Reza; Ravaghi, Hamid
2016-01-01
With the successful improvement of global health systems and social security in societies, the world is now advancing toward aging. All countries have to face the phenomenon of population aging sooner or later depending on their degree of development; however, elderly care is predicted to soon become a major concern for developing countries such as Iran. This study was conducted to identify the challenges of elderly care in Iran and to help policymakers develop roadmaps for the future through providing a clearer image of the current state of affairs in this area of healthcare. This study has adopted a framework approach to qualitative data analysis. For this purpose, 37 semi-structured interviews were conducted in 2015 with a number of key informants in elderly care who were familiar with the process at macro-, meso-, and micro-levels. Maximum variation purposive sampling was performed to select the study samples. A conceptual framework was designed using a review of the literature, and key issues were then identified for data analysis. The elderly care process yielded five major challenges, including policymaking, access, technical infrastructure, integrity and coordination, and health-based care services. According to the stakeholders of elderly care in Iran, the current care system is not well-suited for meeting the needs of the elderly, as the elderly tend to receive the services they need sporadically and in a non-coherent manner. Given the rapid growth of the elderly population in the coming decades, it is the authorities' job to concentrate on the challenges faced by the health system and to use foresight methods for the comprehensive and systematical management of the issue.
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
76 FR 69301 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-08
... management companies (``mutual funds''), unit investment trusts (``UITs'') or face-amount certificate companies (collectively, ``funds'') deemed to have registered an indefinite amount of securities to file... sold by funds that accompanies the payment of registration fees with respect to the securities sold...
Muslims in America: Identity, Diversity and the Challenge of Understanding. 2001 Carnegie Challenge.
ERIC Educational Resources Information Center
Afridi, Sam
This paper discusses challenges and opportunities facing Muslims in the United States, where between 5 to 8 million Muslims live (the fastest growing religion in the country). American Muslims face many challenges, and the public has little understanding of the teachings and practice of Islam. Muslims are prone to negative stereotypes, ethnic…
Abubakar, Amina; Van de Vijver, Fons J R; Fischer, Ronald; Hassan, Amin S; K Gona, Joseph; Dzombo, Judith Tumaini; Bomu, Grace; Katana, Khamis; Newton, Charles R
2016-02-29
The upsurge in the uptake of antiretroviral therapy (ART) has led to a significant increase in the survival of vertically acquired HIV infected children, many of whom are currently living into adolescence and early adulthood. However little if anything is known of the lived experiences and the challenges faced by HIV positive adolescents in the African context. We set out to investigate psychosocial challenges faced by HIV infected adolescents on the Kenyan coast. A total of 44 participants (12 HIV-infected adolescents, 7 HIV uninfected adolescents, and 25 key informants) took part in this qualitative study, using individually administered in-depth interviews. A framework approach was used to analyze the data using NVIVO software. We observed that the challenges faced by adolescents in rural Kenya could be placed into six major themes: poverty, poor mental and physical health, the lack of a school system that is responsive to their needs, challenges in how to disclose to peers and family members, high levels of stigma in its various forms, and challenges of medical adherence leading to the need for close monitoring. In this African community, vertically acquired HIV-infected adolescents face a complex set of social, economic and medical challenges. Our study points to the urgent need to develop multisectorial intervention support programmes to fully address these challenges.
Army Communicator. Volume 32, Number 3, Summer 2007
2007-01-01
goal of bringing people from across the Army together to talk about the issues and challenges they are experiencing in the field and try to work out...actually facing the challenges . Each work- shop had a mediator who collected information on issues being faced and suggested solutions to these problems...these possible items that Signal Center actions may be put forth to bring about resolutions to the challenges facing the warfighter in the field. “I
Analysis for Non-Traditional Security Challenges: Methods and Tools
2006-11-20
PMESII Modeling Challenges modeling or where data is not available to support the model, would aid decision Domain is large, nebulous, complex, and...traditional challenges . This includes enlisting the aid of the inter-agency and alliance/coalition communities. Second, we need to realize this...20 November 2006 MILITARY OPERATIONS RESEARCH SOCIETY MIFh MORS Workshop Analysis for Non-Traditional Security Challenges : Methods and Tools 21-23
Facial detection using deep learning
NASA Astrophysics Data System (ADS)
Sharma, Manik; Anuradha, J.; Manne, H. K.; Kashyap, G. S. C.
2017-11-01
In the recent past, we have observed that Facebook has developed an uncanny ability to recognize people in photographs. Previously, we had to tag people in photos by clicking on them and typing their name. Now as soon as we upload a photo, Facebook tags everyone on its own. Facebook can recognize faces with 98% accuracy which is pretty much as good as humans can do. This technology is called Face Detection. Face detection is a popular topic in biometrics. We have surveillance cameras in public places for video capture as well as security purposes. The main advantages of this algorithm over other are uniqueness and approval. We need speed and accuracy to identify. But face detection is really a series of several related problems: First, look at a picture and find all the faces in it. Second, focus on each face and understand that even if a face is turned in a weird direction or in bad lighting, it is still the same person. Third select features which can be used to identify each face uniquely like size of the eyes, face etc. Finally, compare these features to data we have to find the person name. As a human, your brain is wired to do all of this automatically and instantly. In fact, humans are too good at recognizing faces. Computers are not capable of this kind of high-level generalization, so we must teach them how to do each step in this process separately. The growth of face detection is largely driven by growing applications such as credit card verification, surveillance video images, authentication for banking and security system access.
Comparison of commercial and noncommercial endotracheal tube-securing devices.
Fisher, Daniel F; Chenelle, Christopher T; Marchese, Andrew D; Kratohvil, Joseph P; Kacmarek, Robert M
2014-09-01
Tracheal intubation is used to establish a secure airway in patients who require mechanical ventilation. Unexpected extubation can have serious complications, including airway trauma and death. Various methods and devices have been developed to maintain endotracheal tube (ETT) security. Associated complications include pressure ulcers due to decreased tissue perfusion. Device consideration includes ease of use, rapid application, and low exerted pressure around the airway. Sixteen ETT holders were evaluated under a series of simulated clinical conditions. ETT security was tested by measuring distance displaced after a tug. Nine of the 16 methods could be evaluated for speed of moving the ETT to the opposite side of the mouth. Sensors located on a mannequin measured applied forces when the head was rotated vertically or horizontally. Data were analyzed using multivariate analysis of variance, with P < .05. Median displacement of the ETT by the tug test was 0 cm (interquartile range of 0.0-0.10 cm, P < .001). The mean time to move the ETT from one side of the mouth to the other ranged from 1.25 ± 0.2 s to 34.4 ± 3.4 s (P < .001). Forces applied to the face with a vertical head lift ranged from < 0.2 newtons (N) to a maximum of 3.52 N (P < .001). Forces applied to the face with a horizontal rotation ranged from < 0.2 N to 3.52 N (P < .001). Commercial devices produced greater force than noncommercial devices. Noncommercial airway holders exert less force on a patient's face than commercial devices. Airway stability is affected by the type of securing method. Many commercial holders allow for rapid but secure movement of the artificial airway from one side of the mouth to the other. Copyright © 2014 by Daedalus Enterprises.
Exploring the challenges faced by polytechnic students
NASA Astrophysics Data System (ADS)
Matore, Mohd Effendi @ Ewan Mohd; Khairani, Ahmad Zamri
2015-02-01
This study aims to identify other challenges besides those already faced by students, in seven polytechnics in Malaysia as a continuation to the previous research that had identified 52 main challenges faced by students using the Rasch Model. The explorative study focuses on the challenges that are not included in the Mooney Problem Checklist (MPCL). A total of 121 polytechnic students submitted 183 written responses through the open questions provided. Two hundred fifty two students had responded from a students' perspective on the dichotomous questions regarding their view on the challenges faced. The data was analysed qualitatively using the NVivo 8.0. The findings showed that students from Politeknik Seberang Perai (PSP) gave the highest response, which was 56 (30.6%) and Politeknik Metro Kuala Lumpur (PMKL) had the lowest response of 2 (1.09%). Five dominant challenges were identified, which were the English language (32, 17.5%), learning (14, 7.7%), vehicles (13, 7.1%), information technology and communication (ICT) (13, 7.1%), and peers (11, 6.0%). This article, however, focus on three apparent challenges, namely, English language, vehicles, as well as computer and ICT, as the challenges of learning and peers had been analysed in the previous MPCL. The challenge of English language that had been raised was regarding the weakness in commanding the aspects of speech and fluency. The computer and ICT challenge covered the weakness in mastering ICT and computers, as well as computer breakdowns and low-performance computers. The challenge of vehicles emphasized the unavailability of vehicles to attend lectures and go elsewhere, lack of transportation service in the polytechnic and not having a valid driving license. These challenges are very relevant and need to be discussed in an effort to prepare polytechnics in facing the transformational process of polytechnics.
The changing face of crises and aid in the Asia-Pacific.
Gursky, Elin A; Burkle, Frederick M; Hamon, David W; Walker, Peter; Benjamin, Georges C
2014-01-01
Both US foreign policy and global attention attest to the strategic, economic, and political importance of Asia. Yet, the region faces urgent challenges that must be addressed if it is to remain stable and prosperous. The densely populated countries of the Asia-Pacific are beleaguered by poverty, population displacement, decreasing access to potable water and adequate sanitation, and high rates of disease morbidity and mortality. New and reemerging diseases known to have originated in Asia over the past decades have spread globally by international trade, tourism, worker migration, and agricultural exportation. Unremitting naturally occurring and man-made disasters have strained Southeast Asia's already fragile disaster and public health response infrastructures and the essential services they provide (eg, surveillance, vaccination, maternal and child health, and mental health programs). Following disasters, governments often contract with the broader humanitarian community (eg, indigenous and international NGOs) and seek the assistance of militaries to provide essential services. Yet, their roles and capabilities in addressing acute and chronic health issues in the wake of complex disasters remain unclear. Current mechanisms of nation-state and outside organization interaction, including dissimilar operational platforms, may limit true partnership on behalf of the health security mission. Additionally, concerns regarding skill sets and the lack of standards-based training raise questions about the balance between developing internal response capabilities and professionalizing external, deployable resources. Both the mega-disasters that are forecast for the region and the global health security threats that are expected to emanate from them require an increased focus on improving the Asia-Pacific's emergency preparedness and response posture.
The Changing Face of Crises and Aid in the Asia-Pacific
Burkle, Frederick M.; Hamon, David W.; Walker, Peter; Benjamin, Georges C.
2014-01-01
Both US foreign policy and global attention attest to the strategic, economic, and political importance of Asia. Yet, the region faces urgent challenges that must be addressed if it is to remain stable and prosperous. The densely populated countries of the Asia-Pacific are beleaguered by poverty, population displacement, decreasing access to potable water and adequate sanitation, and high rates of disease morbidity and mortality. New and reemerging diseases known to have originated in Asia over the past decades have spread globally by international trade, tourism, worker migration, and agricultural exportation. Unremitting naturally occurring and man-made disasters have strained Southeast Asia's already fragile disaster and public health response infrastructures and the essential services they provide (eg, surveillance, vaccination, maternal and child health, and mental health programs). Following disasters, governments often contract with the broader humanitarian community (eg, indigenous and international NGOs) and seek the assistance of militaries to provide essential services. Yet, their roles and capabilities in addressing acute and chronic health issues in the wake of complex disasters remain unclear. Current mechanisms of nation-state and outside organization interaction, including dissimilar operational platforms, may limit true partnership on behalf of the health security mission. Additionally, concerns regarding skill sets and the lack of standards-based training raise questions about the balance between developing internal response capabilities and professionalizing external, deployable resources. Both the mega-disasters that are forecast for the region and the global health security threats that are expected to emanate from them require an increased focus on improving the Asia-Pacific's emergency preparedness and response posture. PMID:25268048
Preparing for War Moscow Facing an Arc of Crisis
2016-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Challenges and Changes Faced by Rural Superintendents
ERIC Educational Resources Information Center
Lamkin, Marcia L.
2006-01-01
This research study was designed to build grounded theory about the challenges faced by rural superintendents. Participating rural superintendents identified five areas that presented a challenge but that also applied to superintendents in other settings: school law, finance, personnel, government mandates, and district or board policies. Further,…
Dickey, Lore M; Singh, Anneliese A
2017-08-01
This article explores some of the challenges faced by trans and gender diverse (TGD) individuals who not only are attempting to access trans-affirmative care, but who are also members of the very profession from which they are seeking services. The authors explore challenges related to finding supervision, accessing care for assessment services, and finding a provider for personal counseling. With each example, the authors unpack the challenges and also address the implications for training for all involved. Based on these challenges that TGD psychologists and trainees face in attempting to access care, the authors provide recommendations related to trans-affirmative training for psychologists. © 2017 Wiley Periodicals, Inc.
Using Satellite Data to Unpack Causes of Yield Gaps in India's Wheat Belt
NASA Astrophysics Data System (ADS)
Jain, M.; Singh, B.; Srivastava, A.; Malik, R. K.; McDonald, A.; Lobell, D. B.
2016-12-01
India will face significant food security challenges in the coming decades due to climate change, natural resource degradation, and population growth. Yields of wheat, one of India's staple crops, are already stagnating and will be significantly impacted by warming temperatures. Despite these challenges, wheat yields can be enhanced by implementing improved management in regions with existing yield gaps. To identify the magnitude and causes of current yield gaps, we produced 30 m resolution yield maps across India's main wheat belt, the Indo-Gangetic Plains (IGP), from 2000 to 2015. Yield maps were derived using a new method that translates satellite vegetation indices to yield estimates using crop model simulations, bypassing the need for ground calibration data that rarely exist in smallholder systems. We find that yields can be increased by 5% on average and up to 16% in the eastern IGP by improving management to current best practices within a given district. However, if policies and technologies are put in place to improve management to current best practices in Punjab, the highest yielding state, yields can be increased by 29% in the eastern IGP. Considering which factors most influence wheat yields, we find that later sow dates and warmer temperatures are most associated with low yields across the IGP. This suggests that strategies that reduce the negative effects of heat stress, like earlier sowing and planting heat-tolerant wheat varieties, are critical to India's current and future food security.
Protocol independent transmission method in software defined optical network
NASA Astrophysics Data System (ADS)
Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng
2016-10-01
With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.
2017-01-01
ABSTRACT The “invisible army” of clinical microbiologists is facing major changes and challenges. The rate of change in both the science and technology is accelerating with no end in sight, putting pressure on our army to learn and adapt as never before. Health care funding in the United States is undergoing dramatic change which will require a new set of assumptions about how clinical microbiology is practiced here. A major challenge facing the discipline is the replacement of a generation of clinical microbiologists. In my opinion, it is incumbent on us in the invisible army to continue to work with the American Society for Microbiology (ASM) in meeting the future challenges faced by our discipline. In this commentary, I will first discuss some recent history of clinical microbiology within ASM and then some current challenges we face. PMID:28659316
Children at Risk: Global Views on Challenges Facing Children
ERIC Educational Resources Information Center
Neugebauer, Roger
2011-01-01
Members of the World Forum community were invited to respond to the question: "What is the most urgent challenge facing young children in your country?" Here are some of their responses. Jamils Richard Achunji Anguaseh mentions that in Cameroon, young children face lots of insecurity, both from health hazards and poor parenting practices. There…
Challenges in the management of community pharmacies in Malaysia
2017-01-01
Background: The provision of professional pharmacy services by community pharmacists continues to be limited, particularly in low and middle income countries. It was postulated that multiple management challenges faced by community pharmacists contribute to this situation. Objective: The primary aim of the research was to determine the challenges faced in the management of community pharmacies in Sarawak (the largest state in Malaysia), and practical strategies to cope and overcome the challenges. Methods: Semi-structured interviews were carried out with community pharmacists practising in Sarawak. Purposive and snowball sampling were employed to ensure a diverse group of informants. The interviews were audio-recorded and transcribed verbatim, with the resultant data analysed using thematic analysis. Data collection, coding, interpretation were carried out iteratively until theoretical saturation. Results: Twenty respondents from different demographic characteristics were recruited. Six major themes were identified. Management challenges faced by community pharmacists traverse five major domains: market competition, legislative issues, customers’ knowledge and expectations, macroeconomic impacts and operational challenges. Most of these challenges require government intervention to be resolved. In the meantime, improving customer service and expanding the range of professional services were seen as the most viable strategies to cope with existing challenges. The main concern is that current legislative and economic landscape may hinder these strategies. Enactment of dispensing separation and more protective measures against market competition were suggested to alleviate the challenges faced. Conclusion: Numerous management challenges faced by community pharmacists that distract them from delivering professional pharmacy services have been highlighted. Urgent affirmative actions by the government are warranted in supporting community pharmacists to realise and maximise their potentials. PMID:28690697
ARPA-E: Accelerating U.S. Energy Innovation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manser, Joseph S.; Rollin, Joseph A.; Brown, Kristen E.
ARPA-E is charged with addressing the most pressing issues facing the U.S. energy sector today, as well as those projected to impact national energy security in the future. The agency’s mission is clearly elucidated in its authorizing statute:2 “To overcome long-term and high-risk technological barriers in the development of energy technologies.” The three principal thrusts of the agency’s mission are (i) reducing energy imports, (ii) reducing energy-related emissions and greenhouse gases, and (iii) improving energy efficiency in all sectors of the U.S. economy. Meeting these ambitious challenges requires focused, interdisciplinary effort on a national scale that will help ensure themore » United States maintains a competitive lead in developing and deploying advanced energy technologies.« less
Housing and Health in Ghana: The Psychosocial Impacts of Renting a Home
Luginaah, Isaac; Arku, Godwin; Baiden, Philip
2010-01-01
This paper reports the findings of a qualitative study investigating the impacts of renting a home on the psychosocial health of tenants in the Accra Metropolitan Area (AMA) in Ghana. In-depth interviews (n = 33) were conducted with private renters in Adabraka, Accra. The findings show that private renters in the AMA face serious problems in finding appropriate and affordable rental units, as well as a persistent threat of eviction by homeowners. These challenges tend to predispose renters to psychosocial distress and diminishing ontological security. Findings are relevant to a range of pluralistic policy options that emphasize both formal and informal housing provision, together with the reorganization and decentralization of the Rent Control Board to the district level to facilitate easy access by the citizenry. PMID:20616989
Authentication and Authorization of End User in Microservice Architecture
NASA Astrophysics Data System (ADS)
He, Xiuyu; Yang, Xudong
2017-10-01
As the market and business continues to expand; the traditional single monolithic architecture is facing more and more challenges. The development of cloud computing and container technology promote microservice architecture became more popular. While the low coupling, fine granularity, scalability, flexibility and independence of the microservice architecture bring convenience, the inherent complexity of the distributed system make the security of microservice architecture important and difficult. This paper aims to study the authentication and authorization of the end user under the microservice architecture. By comparing with the traditional measures and researching on existing technology, this paper put forward a set of authentication and authorization strategies suitable for microservice architecture, such as distributed session, SSO solutions, client-side JSON web token and JWT + API Gateway, and summarize the advantages and disadvantages of each method.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ball, T.; Brandt, C.; Calfee, J.
1994-03-01
The Data Management Plan and Functional System Design supports the Clinch River Remedial Investigation (CRRI) and Waste Area Grouping (WAG) 6 Environmental Monitoring Program. The objective of the Data Management Plan and Functional System Design is to provide organization, integrity, security, traceability, and consistency of the data generated during the CRRI and WAG 6 projects. Proper organization will ensure that the data are consistent with the procedures and requirements of the projects. The Information Management Groups (IMGs) for these two programs face similar challenges and share many common objectives. By teaming together, the IMGs have expedited the development and implementationmore » of a common information management strategy that benefits each program.« less
Romania and the New Cold War Security Challenges
2017-06-09
social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic , political...and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... course of the two challenge months, satisfy the requirements described above for receiving assignment of... Qualified Security, the assignment of Qualified Securities to a Group will be based on factors that include... become the LMM for such Qualified Security, it may initiate a challenge by notifying the Exchange of its...
Kungl, Melanie T; Bovenschen, Ina; Spangler, Gottfried
2017-01-01
When being placed into more benign environments like foster care, children from adverse rearing backgrounds are capable of forming attachment relationships to new caregivers within the first year of placement, while certain problematic social behaviors appear to be more persistent. Assuming that early averse experiences shape neural circuits underlying social behavior, neurophysiological studies on individual differences in early social-information processing have great informative value. More precisely, ERP studies have repeatedly shown face processing to be sensitive to experience especially regarding the caregiving background. However, studies on effects of early adverse caregiving experiences are restricted to children with a history of institutionalization. Also, no study has investigated effects of attachment security as a marker of the quality of the caregiver-child relationship. Thus, the current study asks how adverse caregiving experiences and attachment security to (new) caregivers affect early- and mid-latency ERPs sensitive to facial familiarity processing. Therefore, pre-school aged foster children during their second year within the foster home were compared to an age matched control group. Attachment was assessed using the AQS and neurophysiological data was collected during a passive viewing task presenting (foster) mother and stranger faces. Foster children were comparable to the control group with regard to attachment security. On a neurophysiological level, however, the foster group showed dampened N170 amplitudes for both face types. In both foster and control children, dampened N170 amplitudes were also found for stranger as compared to (foster) mother faces, and, for insecurely attached children as compared to securely attached children. This neural pattern may be viewed as a result of poorer social interactions earlier in life. Still, there was no effect on P1 amplitudes. Indicating heightened attentional processing, Nc amplitude responses to stranger faces were found to be enhanced in foster as compared to control children. Also, insecurely attached children allocated more attentional resources for the neural processing of mother faces. The study further confirms that early brain development is highly sensitive to the quality of caregiving. The findings are also relevant from a developmental perspective as miswiring of neural circuits may possibly play a critical role in children's psycho-social adjustment.
Protecting food security when facing uncertain climate: Opportunities for Afghan communities
NASA Astrophysics Data System (ADS)
Salman, Dina; Amer, Saud A.; Ward, Frank A.
2017-11-01
Climate change, population growth, and weakly developed water management institutions in many of the world's dry communities have raised the importance of designing innovative water allocation methods that adapt to water supply fluctuations while respecting cultural sensitivities. For example, Afghanistan faces an ancient history of water supply fluctuations that have contributed to periodic food shortage and famine. Poorly designed and weakly enforced water allocation methods continue to result in agriculture sector underperformance and periodic food shortages when water shortfalls occur. To date, little research has examined alternative water sharing rules on a multi-basin scale to protect food security for a subsistence irrigation society when the community faces water shortage. This paper's contribution examines the economic performance of three water-sharing mechanisms for three basins in Afghanistan with the goal of protecting food security for crop irrigation under ongoing threats of drought, while meeting growing demands for food in the face of anticipated population growth. We achieved this by formulating an integrated empirical optimization model to identify water-sharing measures that minimize economic losses while protecting food security when water shortages occur. Findings show that implementation of either a water trading policy or a proportional shortage policy that respects cultural sensitivities has the potential to raise economic welfare in each basin. Such a policy can reduce food insecurity risks for all trading provinces within each basin, thus being a productive institution for adapting to water shortage when it occurs. Total economic welfare gains are highest when drought is the most severe for which suffering would otherwise be greatest. Gains would be considerably higher if water storage reservoirs were built to store wet year flows for use in dry years. Our results light a path for policy makers, donors, water administrators, and farm managers, who shoulder the burden of protecting food security and rural livelihoods in the world's poor dry communities.
Issues and special features of animal health research
2011-01-01
In the rapidly changing context of research on animal health, INRA launched a collective discussion on the challenges facing the field, its distinguishing features, and synergies with biomedical research. As has been declared forcibly by the heads of WHO, FAO and OIE, the challenges facing animal health, beyond diseases transmissible to humans, are critically important and involve food security, agriculture economics, and the ensemble of economic activities associated with agriculture. There are in addition issues related to public health (zoonoses, xenobiotics, antimicrobial resistance), the environment, and animal welfare. Animal health research is distinguished by particular methodologies and scientific questions that stem from the specific biological features of domestic species and from animal husbandry practices. It generally does not explore the same scientific questions as research on human biology, even when the same pathogens are being studied, and the discipline is rooted in a very specific agricultural and economic context. Generic and methodological synergies nevertheless exist with biomedical research, particularly with regard to tools and biological models. Certain domestic species furthermore present more functional similarities with humans than laboratory rodents. The singularity of animal health research in relation to biomedical research should be taken into account in the organization, evaluation, and funding of the field through a policy that clearly recognizes the specific issues at stake. At the same time, the One Health approach should facilitate closer collaboration between biomedical and animal health research at the level of research teams and programmes. PMID:21864344
Issues and special features of animal health research.
Ducrot, Christian; Bed'hom, Bertrand; Béringue, Vincent; Coulon, Jean-Baptiste; Fourichon, Christine; Guérin, Jean-Luc; Krebs, Stéphane; Rainard, Pascal; Schwartz-Cornil, Isabelle; Torny, Didier; Vayssier-Taussat, Muriel; Zientara, Stephan; Zundel, Etienne; Pineau, Thierry
2011-08-24
In the rapidly changing context of research on animal health, INRA launched a collective discussion on the challenges facing the field, its distinguishing features, and synergies with biomedical research. As has been declared forcibly by the heads of WHO, FAO and OIE, the challenges facing animal health, beyond diseases transmissible to humans, are critically important and involve food security, agriculture economics, and the ensemble of economic activities associated with agriculture. There are in addition issues related to public health (zoonoses, xenobiotics, antimicrobial resistance), the environment, and animal welfare.Animal health research is distinguished by particular methodologies and scientific questions that stem from the specific biological features of domestic species and from animal husbandry practices. It generally does not explore the same scientific questions as research on human biology, even when the same pathogens are being studied, and the discipline is rooted in a very specific agricultural and economic context.Generic and methodological synergies nevertheless exist with biomedical research, particularly with regard to tools and biological models. Certain domestic species furthermore present more functional similarities with humans than laboratory rodents.The singularity of animal health research in relation to biomedical research should be taken into account in the organization, evaluation, and funding of the field through a policy that clearly recognizes the specific issues at stake. At the same time, the One Health approach should facilitate closer collaboration between biomedical and animal health research at the level of research teams and programmes.
Minapadi Development Strategy in Supporting National Food Security
NASA Astrophysics Data System (ADS)
Lestari, Sri; Bambang, Azis Nur
2018-02-01
Efforts to achieve food security, especially food self-sufficiency, face severe challenges. Intensification needs to be done in optimizing the existing land by applying integrated agriculture. One of them is by integrating agriculture and fishery aspect with implementation of minapadi. Minapadi cultivation has actually grown since a long time, but in the course of time this system Began displaced because of pesticides and chemical fertilizers. Become flagship Minapadi back in line with the increasing public awareness of the importance of sustainable environment, health, increasing demand for organic products that are free from pesticide residues which means safe for consumption. Minapadi is the answer to the fulfillment of people's need for carbohydrate and protein food. Blending the fulfillment of carbohydrates is rice as the staple food of most people with the fulfillment of animal protein from fish commodities to add nutritional value. In realizing the food security strategy is required Minapadi development. This descriptive research aims to find out various minapadi development strategies in several regions with different methods based on the literature and previous studies. The result is the formulation of minapadi development strategy in an area not necessarily can be applied in other areas.This occurs because of differences in setting criteria/ variables based on the characteristics and potential of a region, the strengths and opportunities, as well as the weaknesses and threats that the area may encounter.
Assessing Uncertainties in Surface Water Security: A Probabilistic Multi-model Resampling approach
NASA Astrophysics Data System (ADS)
Rodrigues, D. B. B.
2015-12-01
Various uncertainties are involved in the representation of processes that characterize interactions between societal needs, ecosystem functioning, and hydrological conditions. Here, we develop an empirical uncertainty assessment of water security indicators that characterize scarcity and vulnerability, based on a multi-model and resampling framework. We consider several uncertainty sources including those related to: i) observed streamflow data; ii) hydrological model structure; iii) residual analysis; iv) the definition of Environmental Flow Requirement method; v) the definition of critical conditions for water provision; and vi) the critical demand imposed by human activities. We estimate the overall uncertainty coming from the hydrological model by means of a residual bootstrap resampling approach, and by uncertainty propagation through different methodological arrangements applied to a 291 km² agricultural basin within the Cantareira water supply system in Brazil. Together, the two-component hydrograph residual analysis and the block bootstrap resampling approach result in a more accurate and precise estimate of the uncertainty (95% confidence intervals) in the simulated time series. We then compare the uncertainty estimates associated with water security indicators using a multi-model framework and provided by each model uncertainty estimation approach. The method is general and can be easily extended forming the basis for meaningful support to end-users facing water resource challenges by enabling them to incorporate a viable uncertainty analysis into a robust decision making process.
Guo, Xiamei
2018-01-01
The crude divorce rate has been increasing steadily for over a decade in China. Consequently, more and more children have to face the challenge of growing up in single parent families. The current study investigated the mediating effects of problem-oriented and emotion-oriented coping on the relationship between parental attachment and psychological resilience among a sample of Chinese adolescents from single parent families and intact families. Participants were 975 high school students (44.30% males; aged 15-19 years, M = 16.32 years, SD = 0.74), 871 from intact families and 104 from single parent families. Structural equation modeling showed that security in maternal attachment was positively associated with resilience through the indirect effect of reduced emotion-oriented coping among adolescents from single parent families. Among adolescents from intact families, security in maternal attachment was both directly associated with resilience and indirectly through enhanced problem-oriented and reduced emotion-oriented coping. Security in paternal attachment was associated with resilience both directly and indirectly through enhanced problem-oriented coping as well among those from intact families. Female adolescents exhibited significantly lower levels of resilience than male adolescents did regardless of the marital status of their parents. Limitations and suggestions for future research are discussed.
Challenges When Introducing Electronic Exam
ERIC Educational Resources Information Center
Kuikka, Matti; Kitola, Markus; Laakso, Mikko-Jussi
2014-01-01
Time pressures often necessitate the use of more efficient exam tools, such as electronic exams (e-exams), instead of traditional paper exams. However, teachers may face challenges when introducing e-exams in a higher education context. This paper describes what kinds of challenges teachers may face when introducing e-exams, based on experiences…
Bridging the Gap: The Challenges of Employing Entrepreneurial Processes within University Settings
ERIC Educational Resources Information Center
Wardale, Dorothy; Lord, Linley
2016-01-01
In Australia and elsewhere, universities face increasing pressure to improve research output and quality, particularly through partnerships with industry. This raises interesting challenges for academic staff with considerable industry experience who are "new" to academe. Some of these challenges were faced by the authors who have been…
Confronting Unsuccessful Practices: Repositioning Teacher Identities in English Education
ERIC Educational Resources Information Center
Vetter, Amy; Hartman, Shana V.; Reynolds, Jeanie M.
2016-01-01
Teacher education programs attempt to prepare preservice teachers for the various challenges faced in the classroom. One particular challenge new teachers face is how to handle unsuccessful practices. This paper argues that confronting ineffective practices require that teachers respond to complex and dynamic challenges, making change difficult…
Challenges Faced by Project Competition Participants and Recommended Solutions
ERIC Educational Resources Information Center
Demirel, Turgay; Baydas, Ozlem; Yilmaz, Rabia M.; Goktas, Yuksel
2013-01-01
The numbers of project competitions and interest in this kind of competition have been steadily increasing in Turkey. Accordingly, it is important to determine what challenges teachers and students may face while preparing themselves for project competitions, so that recommendations may be made to overcome these challenges. This study investigated…
A security/safety survey of long term care facilities.
Acorn, Jonathan R
2010-01-01
What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
76 FR 54819 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-02
... (``mutual funds''), unit investment trusts (``UITs'') or face-amount certificate companies (collectively, ``funds'') deemed to have registered an indefinite amount of securities to file, not later than 90 days... 274.24) with the Commission. Form 24F-2 is the annual notice of securities sold by funds that...
ERIC Educational Resources Information Center
Paquette, Paige Fuller
2009-01-01
There is much literature addressing challenges face-to-face freshman composition instructors encounter in developing college courses that foster critical thinking skills crucial to developing written argument. Composition instructors may face challenges in teaching students that writing is a means of making meaning, there are many different…