Sample records for security requirements template

  1. A Hybrid Approach to Protect Palmprint Templates

    PubMed Central

    Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach. PMID:24982977

  2. A hybrid approach to protect palmprint templates.

    PubMed

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach.

  3. Security enhanced BioEncoding for protecting iris codes

    NASA Astrophysics Data System (ADS)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  4. Biometric template transformation: a security analysis

    NASA Astrophysics Data System (ADS)

    Nagar, Abhishek; Nandakumar, Karthik; Jain, Anil K.

    2010-01-01

    One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.

  5. A novel chaotic stream cipher and its application to palmprint template protection

    NASA Astrophysics Data System (ADS)

    Li, Heng-Jian; Zhang, Jia-Shu

    2010-04-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.

  6. Logistic Map for Cancellable Biometrics

    NASA Astrophysics Data System (ADS)

    Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr

    2017-08-01

    This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.

  7. Multimodal biometric approach for cancelable face template generation

    NASA Astrophysics Data System (ADS)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  8. Unimodular sequence design under frequency hopping communication compatibility requirements

    NASA Astrophysics Data System (ADS)

    Ge, Peng; Cui, Guolong; Kong, Lingjiang; Yang, Jianyu

    2016-12-01

    The integrated design for both radar and anonymous communication has drawn more attention recently since wireless communication system appeals to enhance security and reliability. Given the frequency hopping (FH) communication system, an effective way to realize integrated design is to meet the spectrum compatibility between these two systems. The paper deals with a unimodular sequence design technique which considers optimizing both the spectrum compatibility and peak sidelobes levels (PSL) of auto-correlation function (ACF). The spectrum compatibility requirement realizes anonymous communication for the FH system and provides this system lower probability of intercept (LPI) since the spectrum of the FH system is hidden in that of the radar system. The proposed algorithm, named generalized fitting template (GFT) technique, converts the sequence optimization design problem to a iterative fitting process. In this process, the power spectrum density (PSD) and PSL behaviors of the generated sequences fit both PSD and PSL templates progressively. Two templates are established based on the spectrum compatibility requirement and the expected PSL. As noted, in order to ensure the communication security and reliability, spectrum compatibility requirement is given a higher priority to achieve in the GFT algorithm. This algorithm realizes this point by adjusting the weight adaptively between these two terms during the iteration process. The simulation results are analyzed in terms of bit error rate (BER), PSD, PSL, and signal-interference rate (SIR) for both the radar and FH systems. The performance of GFT is compared with SCAN, CAN, FRE, CYC, and MAT algorithms in the above aspects, which shows its good effectiveness.

  9. An Analysis of Data Breach Notifications as Negative News

    ERIC Educational Resources Information Center

    Veltsos, Jennifer R.

    2012-01-01

    Forty-six states require organizations to notify users when personally identifiable information has been exposed or when the organization's data security measures have been breached. This article describes a qualitative document analysis of 13 data breach notification templates from state and federal agencies. The results confirm much of the…

  10. Template protection and its implementation in 3D face recognition systems

    NASA Astrophysics Data System (ADS)

    Zhou, Xuebing

    2007-04-01

    As biometric recognition systems are widely applied in various application areas, security and privacy risks have recently attracted the attention of the biometric community. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometrics systems against attacks such as identity theft and cross matching. This paper concentrates on a template protection algorithm that merges methods from cryptography, error correction coding and biometrics. The key component of the algorithm is to convert biometric templates into binary vectors. It is shown that the binary vectors should be robust, uniformly distributed, statistically independent and collision-free so that authentication performance can be optimized and information leakage can be avoided. Depending on statistical character of the biometric template, different approaches for transforming biometric templates into compact binary vectors are presented. The proposed methods are integrated into a 3D face recognition system and tested on the 3D facial images of the FRGC database. It is shown that the resulting binary vectors provide an authentication performance that is similar to the original 3D face templates. A high security level is achieved with reasonable false acceptance and false rejection rates of the system, based on an efficient statistical analysis. The algorithm estimates the statistical character of biometric templates from a number of biometric samples in the enrollment database. For the FRGC 3D face database, the small distinction of robustness and discriminative power between the classification results under the assumption of uniquely distributed templates and the ones under the assumption of Gaussian distributed templates is shown in our tests.

  11. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    PubMed

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  12. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  13. Modeling IrisCode and its variants as convex polyhedral cones and its security implications.

    PubMed

    Kong, Adams Wai-Kin

    2013-03-01

    IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode or its variants is a convex polyhedral cone in a hyperspace. Its central ray, being a rough representation of the original biometric signal, can be computed by a simple algorithm, which can often be implemented in one Matlab command line. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge (e.g., iris images). The experimental results show that biometric templates, including iris and palmprint templates, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from IrisCode can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring securemore » hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.« less

  15. Alignment and bit extraction for secure fingerprint biometrics

    NASA Astrophysics Data System (ADS)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  16. Iris Cryptography for Security Purpose

    NASA Astrophysics Data System (ADS)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  17. Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing

    NASA Astrophysics Data System (ADS)

    Jin, Zhe; Jin Teoh, Andrew Beng; Ong, Thian Song; Tee, Connie

    Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recently. It is a challenging task to design a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining acceptable performance. Many methods have been proposed to resolve this problem, and cancelable biometrics is one of them. In this paper, we propose a scheme coined as Random Triangle Hashing which follows the concept of cancelable biometrics in the fingerprint domain. In this method, re-alignment of fingerprints is not required as all the minutiae are translated into a pre-defined 2 dimensional space based on a reference minutia. After that, the proposed Random Triangle hashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed method is resistant to minor translation error and rotation distortion. Finally, the hash vectors are converted into bit-strings to be stored in the database. The proposed method is evaluated using the public database FVC2004 DB1. An EER of less than 1% is achieved by using the proposed method.

  18. A lightweight approach for biometric template protection

    NASA Astrophysics Data System (ADS)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  19. Multibiometric Systems: Fusion Strategies and Template Security

    DTIC Science & Technology

    2008-01-01

    Biometric authentication, or simply biometrics, offers a natural and reliable solution to the problem of identity determination by establishing the identity...applications [99]. Therefore, there is no universally best biometric trait and the choice of biometric depends on the nature and requirements of the...result in a significant reduction in the GAR of a biometric system [72,204]. • Non-universality: If every individual in the target population is able

  20. Remote object authentication: confidence model, cryptosystem and protocol

    NASA Astrophysics Data System (ADS)

    Lancrenon, Jean; Gillard, Roland; Fournel, Thierry

    2009-04-01

    This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric authentication to the case of remote morphometric object authentication. We use a different type of encryption technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages received by the server. We also describe the optical technology used to extract the morphometric templates.

  1. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  2. A new method for generating an invariant iris private key based on the fuzzy vault system.

    PubMed

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  3. Exploring Public Health's roles and limitations in advancing food security in British Columbia.

    PubMed

    Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S

    2014-07-22

    This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.

  4. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  5. 78 FR 50436 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-19

    ... Justification Template. Abstract: The TSGP is an important component of the Department of Homeland Security's... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0022... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency...

  6. Comparative study of minutiae selection algorithms for ISO fingerprint templates

    NASA Astrophysics Data System (ADS)

    Vibert, B.; Charrier, C.; Le Bars, J.-M.; Rosenberger, C.

    2015-03-01

    We address the selection of fingerprint minutiae given a fingerprint ISO template. Minutiae selection plays a very important role when a secure element (i.e. a smart-card) is used. Because of the limited capability of computation and memory, the number of minutiae of a stored reference in the secure element is limited. We propose in this paper a comparative study of 6 minutiae selection methods including 2 methods from the literature and 1 like reference (No Selection). Experimental results on 3 fingerprint databases from the Fingerprint Verification Competition show their relative efficiency in terms of performance and computation time.

  7. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  8. An audit of nursing reports for First-Tier Tribunals in a secure inpatient service.

    PubMed

    Haw, C

    2015-08-01

    Very little research has been conducted into the role of nurses in relation to patients' mental health tribunals (known in some countries as review panels). In England nurses are playing an increasingly important role in giving evidence at tribunals and, since October 2013, are required to provide much more detailed written reports than previously. This is the first published study to examine the content of nursing tribunal reports. Overall, the quality of nursing reports was patchy and not as good as those of psychiatrists or social workers, but there was improvement when the audit was repeated. Writing reports for tribunals is a comparatively new and perhaps unfamiliar requirement for nursing staff. Nurses need training in report writing and protected time and a quiet area to write reports. Providing these things is a real challenge on busy inpatient wards. In October 2013, the Tribunals Judiciary of England issued a new practice direction stipulating how tribunal reports should be completed. This paper aimed to study the quality of nursing tribunal reports in a secure inpatient service before and after the introduction of the latest practice direction and the issuing of a local template to aid report writing. A total of 160 reports (80 written in 2013 and 80 in 2014) were scored on the presence of 24 key items derived from the latest practice direction. The quality of nursing reports improved in the re-audit from an average of 36.3% of key items present to 51.3% but still lagged behind that of medical and social circumstances reports. Even in the second audit, few reports were signed or commented on why the patient should remain detained. Report length increased from a mean of 2.9 to 4.0 pages but only 27.5% of reports used the template despite widespread publicity. Use of the template resulted in better quality reports. Among other interventions, a training programme in report writing is now underway to assist nurses with meeting the new practice direction requirements. Nurses also need supervision, protected time and a quiet area for report writing. © 2015 John Wiley & Sons Ltd.

  9. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    EPA Pesticide Factsheets

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  10. Conducting real-time multiplayer experiments on the web.

    PubMed

    Hawkins, Robert X D

    2015-12-01

    Group behavior experiments require potentially large numbers of participants to interact in real time with perfect information about one another. In this paper, we address the methodological challenge of developing and conducting such experiments on the web, thereby broadening access to online labor markets as well as allowing for participation through mobile devices. In particular, we combine a set of recent web development technologies, including Node.js with the Socket.io module, HTML5 canvas, and jQuery, to provide a secure platform for pedagogical demonstrations and scalable, unsupervised experiment administration. Template code is provided for an example real-time behavioral game theory experiment which automatically pairs participants into dyads and places them into a virtual world. In total, this treatment is intended to allow those with a background in non-web-based programming to modify the template, which handles the technical server-client networking details, for their own experiments.

  11. Image Hashes as Templates for Verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Janik, Tadeusz; Jarman, Kenneth D.; Robinson, Sean M.

    2012-07-17

    Imaging systems can provide measurements that confidently assess characteristics of nuclear weapons and dismantled weapon components, and such assessment will be needed in future verification for arms control. Yet imaging is often viewed as too intrusive, raising concern about the ability to protect sensitive information. In particular, the prospect of using image-based templates for verifying the presence or absence of a warhead, or of the declared configuration of fissile material in storage, may be rejected out-of-hand as being too vulnerable to violation of information barrier (IB) principles. Development of a rigorous approach for generating and comparing reduced-information templates from images,more » and assessing the security, sensitivity, and robustness of verification using such templates, are needed to address these concerns. We discuss our efforts to develop such a rigorous approach based on a combination of image-feature extraction and encryption-utilizing hash functions to confirm proffered declarations, providing strong classified data security while maintaining high confidence for verification. The proposed work is focused on developing secure, robust, tamper-sensitive and automatic techniques that may enable the comparison of non-sensitive hashed image data outside an IB. It is rooted in research on so-called perceptual hash functions for image comparison, at the interface of signal/image processing, pattern recognition, cryptography, and information theory. Such perceptual or robust image hashing—which, strictly speaking, is not truly cryptographic hashing—has extensive application in content authentication and information retrieval, database search, and security assurance. Applying and extending the principles of perceptual hashing to imaging for arms control, we propose techniques that are sensitive to altering, forging and tampering of the imaged object yet robust and tolerant to content-preserving image distortions and noise. Ensuring that the information contained in the hashed image data (available out-of-IB) cannot be used to extract sensitive information about the imaged object is of primary concern. Thus the techniques are characterized by high unpredictability to guarantee security. We will present an assessment of the performance of our techniques with respect to security, sensitivity and robustness on the basis of a methodical and mathematically precise framework.« less

  12. Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient.

    PubMed

    Sufi, Fahim; Khalil, Ibrahim; Mahmood, Abdun

    2011-12-01

    Adoption of compression technology is often required for wireless cardiovascular monitoring, due to the enormous size of Electrocardiography (ECG) signal and limited bandwidth of Internet. However, compressed ECG must be decompressed before performing human identification using present research on ECG based biometric techniques. This additional step of decompression creates a significant processing delay for identification task. This becomes an obvious burden on a system, if this needs to be done for a trillion of compressed ECG per hour by the hospital. Even though the hospital might be able to come up with an expensive infrastructure to tame the exuberant processing, for small intermediate nodes in a multihop network identification preceded by decompression is confronting. In this paper, we report a technique by which a person can be identified directly from his / her compressed ECG. This technique completely obviates the step of decompression and therefore upholds biometric identification less intimidating for the smaller nodes in a multihop network. The biometric template created by this new technique is lower in size compared to the existing ECG based biometrics as well as other forms of biometrics like face, finger, retina etc. (up to 8302 times lower than face template and 9 times lower than existing ECG based biometric template). Lower size of the template substantially reduces the one-to-many matching time for biometric recognition, resulting in a faster biometric authentication mechanism.

  13. Development and implementation of clinical trial protocol templates at the National Institute of Allergy and Infectious Diseases.

    PubMed

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-08-01

    A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.

  14. 75 FR 8384 - Agency Information Collection Activities: Proposed Collection; Comment Request, 1660-NEW; FEMA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2010-0006... Preparedness Grants: State Homeland Security Program (SHSP) Tribal AGENCY: Federal Emergency Management Agency...-NEW; FEMA Form 089-22, SHSP-Tribal Investment Justification Template. SUMMARY: The Federal Emergency...

  15. Finding the ’RITE’ Acquisition Environment for Navy C2 Software

    DTIC Science & Technology

    2015-05-01

    Boiler plate contract language - Gov purpose Rights • Adding expectation of quality to contracting language • Template SOW’s created Pr...Debugger MCCABE IQ Static Analysis Cyclomatic Complexity and KSLOC. All Languages HP Fortify Security Scan STIG and Vulnerabilities Security & IA...GSSAT (GOTS) Security Scan STIG and Vulnerabilities AutoIT Automated Test Scripting Engine for Automation Functional Testing TestComplete Automated

  16. Development and Implementation of Clinical Trial Protocol Templates at the National Institute of Allergy and Infectious Diseases

    PubMed Central

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-01-01

    Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static but require frequent revisions. Conclusions: Standard protocol templates that meet applicable regulations can be important tools to assist investigators in the effective conduct of clinical research, but they require dedicated resources and ongoing input from key stakeholders. PMID:19625326

  17. Analysis of microgravity space experiments Space Shuttle programmatic safety requirements

    NASA Technical Reports Server (NTRS)

    Terlep, Judith A.

    1996-01-01

    This report documents the results of an analysis of microgravity space experiments space shuttle programmatic safety requirements and recommends the creation of a Safety Compliance Data Package (SCDP) Template for both flight and ground processes. These templates detail the programmatic requirements necessary to produce a complete SCDP. The templates were developed from various NASA centers' requirement documents, previously written guidelines on safety data packages, and from personal experiences. The templates are included in the back as part of this report.

  18. A biometric access personal optical storage device

    NASA Astrophysics Data System (ADS)

    Davies, David H.; Ray, Steve; Gurkowski, Mark; Lee, Lane

    2007-01-01

    A portable USB2.0 personal storage device that uses built-in encryption and allows data access through biometric scanning of a finger print is described. Biometric image derived templates are stored on the removable 32 mm write once (WO) media. The encrypted templates travel with the disc and allow access to the data providing the biometric feature (e.g. the finger itself) is present. The device also allows for export and import of the templates under secure key exchange protocols. The storage system is built around the small form factor optical engine that uses a tilt arm rotary actuator and front surface media.

  19. Electrical contact of wurtzite GaN mircrodisks on p-type GaN template

    NASA Astrophysics Data System (ADS)

    Tsai, Cheng-Da; Lo, Ikai; Wang, Ying-Chieh; Hsu, Yu-Chi; Shih, Cheng-Hung; Pang, Wen-Yuan; You, Shuo-Ting; Hu, Chia-Hsuan; Chou, Mitch M. C.; Yang, Chen-Chi; Lin, Yu-Chiao

    2015-03-01

    We developed a back processing to fabricate a secure electrical contact of wurtzite GaN microdisk on a transparent p-type GaN template with the orientation, [10-10]disk // [10-10]template. GaN microdisks were grown on LiAlO2 substrate by using plasma-assisted molecular beam epitaxy. In the further study, we analyzed the TEM specimen of a sample with annealed GaN microdisk/p-typed GaN template by selection area diffraction (SAD) to confirm the alignment of the microdisks with the template at the interface. From the I-V measurements performed on the samples, we obtained a threshold voltage of ~ 5.9 V for the current passing through the GaN microdisks with a resistance of ~ 45 K Ω. The electrical contact can be applied to the nanometer-scaled GaN light-emitting diode.

  20. Printable, scannable biometric templates for secure documents and materials

    NASA Astrophysics Data System (ADS)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  1. Secure Image Hash Comparison for Warhead Verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bruillard, Paul J.; Jarman, Kenneth D.; Robinson, Sean M.

    2014-06-06

    The effort to inspect and verify warheads in the context of possible future arms control treaties is rife with security and implementation issues. In this paper we review prior work on perceptual image hashing for template-based warhead verification. Furthermore, we formalize the notion of perceptual hashes and demonstrate that large classes of such functions are likely not cryptographically secure. We close with a brief discussion of fully homomorphic encryption as an alternative technique.

  2. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  3. From scores to face templates: a model-based approach.

    PubMed

    Mohanty, Pranab; Sarkar, Sudeep; Kasturi, Rangachar

    2007-12-01

    Regeneration of templates from match scores has security and privacy implications related to any biometric authentication system. We propose a novel paradigm to reconstruct face templates from match scores using a linear approach. It proceeds by first modeling the behavior of the given face recognition algorithm by an affine transformation. The goal of the modeling is to approximate the distances computed by a face recognition algorithm between two faces by distances between points, representing these faces, in an affine space. Given this space, templates from an independent image set (break-in) are matched only once with the enrolled template of the targeted subject and match scores are recorded. These scores are then used to embed the targeted subject in the approximating affine (non-orthogonal) space. Given the coordinates of the targeted subject in the affine space, the original template of the targeted subject is reconstructed using the inverse of the affine transformation. We demonstrate our ideas using three, fundamentally different, face recognition algorithms: Principal Component Analysis (PCA) with Mahalanobis cosine distance measure, Bayesian intra-extrapersonal classifier (BIC), and a feature-based commercial algorithm. To demonstrate the independence of the break-in set with the gallery set, we select face templates from two different databases: Face Recognition Grand Challenge (FRGC) and Facial Recognition Technology (FERET) Database (FERET). With an operational point set at 1 percent False Acceptance Rate (FAR) and 99 percent True Acceptance Rate (TAR) for 1,196 enrollments (FERET gallery), we show that at most 600 attempts (score computations) are required to achieve a 73 percent chance of breaking in as a randomly chosen target subject for the commercial face recognition system. With similar operational set up, we achieve a 72 percent and 100 percent chance of breaking in for the Bayesian and PCA based face recognition systems, respectively. With three different levels of score quantization, we achieve 69 percent, 68 percent and 49 percent probability of break-in, indicating the robustness of our proposed scheme to score quantization. We also show that the proposed reconstruction scheme has 47 percent more probability of breaking in as a randomly chosen target subject for the commercial system as compared to a hill climbing approach with the same number of attempts. Given that the proposed template reconstruction method uses distinct face templates to reconstruct faces, this work exposes a more severe form of vulnerability than a hill climbing kind of attack where incrementally different versions of the same face are used. Also, the ability of the proposed approach to reconstruct actual face templates of the users increases privacy concerns in biometric systems.

  4. Design of Cancelable Palmprint Templates Based on Look Up Table

    NASA Astrophysics Data System (ADS)

    Qiu, Jian; Li, Hengjian; Dong, Jiwen

    2018-03-01

    A novel cancelable palmprint templates generation scheme is proposed in this paper. Firstly, the Gabor filter and chaotic matrix are used to extract palmprint features. It is then arranged into a row vector and divided into equal size blocks. These blocks are converted to corresponding decimals and mapped to look up tables, forming final cancelable palmprint features based on the selected check bits. Finally, collaborative representation based classification with regularized least square is used for classification. Experimental results on the Hong Kong PolyU Palmprint Database verify that the proposed cancelable templates can achieve very high performance and security levels. Meanwhile, it can also satisfy the needs of real-time applications.

  5. Robust 3D DFT video watermarking

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; O'Ruanaidh, Joseph J.; Pun, Thierry

    1999-04-01

    This paper proposes a new approach for digital watermarking and secure copyright protection of videos, the principal aim being to discourage illicit copying and distribution of copyrighted material. The method presented here is based on the discrete Fourier transform (DFT) of three dimensional chunks of video scene, in contrast with previous works on video watermarking where each video frame was marked separately, or where only intra-frame or motion compensation parameters were marked in MPEG compressed videos. Two kinds of information are hidden in the video: a watermark and a template. Both are encoded using an owner key to ensure the system security and are embedded in the 3D DFT magnitude of video chunks. The watermark is a copyright information encoded in the form of a spread spectrum signal. The template is a key based grid and is used to detect and invert the effect of frame-rate changes, aspect-ratio modification and rescaling of frames. The template search and matching is performed in the log-log-log map of the 3D DFT magnitude. The performance of the presented technique is evaluated experimentally and compared with a frame-by-frame 2D DFT watermarking approach.

  6. 75 FR 38696 - Nectarines and Peaches Grown in California; Changes in Handling Requirements for Fresh Nectarines...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ... Web site: http://www.ams.usda.gov/AMSv1.0/ams.fetchTemplateData.do?template=TemplateN&page=Marketing... DEPARTMENT OF AGRICULTURE Agricultural Marketing Service 7 CFR Parts 916 and 917 [Doc. No. AMS-FV... Requirements for Fresh Nectarines and Peaches AGENCY: Agricultural Marketing Service, USDA. ACTION: Affirmation...

  7. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less

  8. Fumigant Management Plan - Phase 1 Templates

    EPA Pesticide Factsheets

    FMPs are required by pesticide labels, so EPA provides chemical-specific soil fumigant templates and samples in PDF and Word formats. Choose the appropriate template for products containing chloropicrin, dazomet, metam sodium/potassium, or methyl bromide.

  9. Content analysis of physical examination templates in electronic health records using SNOMED CT.

    PubMed

    Gøeg, Kirstine Rosenbeck; Chen, Rong; Højen, Anne Randorff; Elberg, Pia

    2014-10-01

    Most electronic health record (EHR) systems are built on proprietary information models and terminology, which makes achieving semantic interoperability a challenge. Solving interoperability problems requires well-defined standards. In contrast, the need to support clinical work practice requires a local customization of EHR systems. Consequently, contrasting goals may be evident in EHR template design because customization means that local EHR organizations can define their own templates, whereas standardization implies consensus at some level. To explore the complexity of balancing these two goals, this study analyzes the differences and similarities between templates in use today. A similarity analysis was developed on the basis of SNOMED CT. The analysis was performed on four physical examination templates from Denmark and Sweden. The semantic relationships in SNOMED CT were used to quantify similarities and differences. Moreover, the analysis used these identified similarities to investigate the common content of a physical examination template. The analysis showed that there were both similarities and differences in physical examination templates, and the size of the templates varied from 18 to 49 fields. In the SNOMED CT analysis, exact matches and terminology similarities were represented in all template pairs. The number of exact matches ranged from 7 to 24. Moreover, the number of unrelated fields differed a lot from 1/18 to 22/35. Cross-country comparisons tended to have more unrelated content than within-country comparisons. On the basis of identified similarities, it was possible to define the common content of a physical examination. Nevertheless, a complete view on the physical examination required the inclusion of both exact matches and terminology similarities. This study revealed that a core set of items representing the physical examination templates can be generated when the analysis takes into account not only exact matches but also terminology similarities. This core set of items could be a starting point for standardization and semantic interoperability. However, both unmatched terms and terminology matched terms pose a challenge for standardization. Future work will include using local templates as a point of departure in standardization to see if local requirements can be maintained in a standardized framework. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  10. Nucleoside Triphosphate Phosphohydrolase I (NPH I) Functions as a 5′ to 3′ Translocase in Transcription Termination of Vaccinia Early Genes*

    PubMed Central

    Hindman, Ryan; Gollnick, Paul

    2016-01-01

    Vaccinia virus early genes are transcribed immediately upon infection. Nucleoside triphosphate phosphohydrolase I (NPH I) is an essential component of the early gene transcription complex. NPH I hydrolyzes ATP to release transcripts during transcription termination. The ATPase activity of NPH I requires single-stranded (ss) DNA as a cofactor; however, the source of this cofactor within the transcription complex is not known. Based on available structures of transcription complexes it has been hypothesized that the ssDNA cofactor is obtained from the unpaired non-template strand within the transcription bubble. In vitro transcription on templates that lack portions of the non-template strand within the transcription bubble showed that the upstream portion of the transcription bubble is required for efficient NPH I-mediated transcript release. Complementarity between the template and non-template strands in this region is also required for NPH I-mediated transcript release. This observation complicates locating the source of the ssDNA cofactor within the transcription complex because removal of the non-template strand also disrupts transcription bubble reannealing. Prior studies have shown that ssRNA binds to NPH I, but it does not activate ATPase activity. Chimeric transcription templates with RNA in the non-template strand confirm that the source of the ssDNA cofactor for NPH I is the upstream portion of the non-template strand in the transcription bubble. Consistent with this conclusion we also show that isolated NPH I acts as a 5′ to 3′ translocase on single-stranded DNA. PMID:27189950

  11. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NASA Astrophysics Data System (ADS)

    Kelkboom, Emile J. C.; Breebaart, Jeroen; Buhan, Ileana; Veldhuis, Raymond N. J.

    2010-04-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved protection depends on the size of the key and its closeness to being random. In the literature it can be observed that there is a large variation on the reported key lengths at similar classification performance of the same template protection system, even when based on the same biometric modality and database. In this work we determine the analytical relationship between the system performance and the theoretical maximum key size given a biometric source modeled by parallel Gaussian channels. We consider the case where the source capacity is evenly distributed across all channels and the channels are independent. We also determine the effect of the parameters such as the source capacity, the number of enrolment and verification samples, and the operating point selection on the maximum key size. We show that a trade-off exists between the privacy protection of the biometric system and its convenience for its users.

  12. Birds of a Feather: Supporting Secure Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Braswell III, H V

    2006-04-24

    Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less

  13. VieSLAF Framework: Enabling Adaptive and Versatile SLA-Management

    NASA Astrophysics Data System (ADS)

    Brandic, Ivona; Music, Dejan; Leitner, Philipp; Dustdar, Schahram

    Novel computing paradigms like Grid and Cloud computing demand guarantees on non-functional requirements such as application execution time or price. Such requirements are usually negotiated following a specific Quality of Service (QoS) model and are expressed using Service Level Agreements (SLAs). Currently available QoS models assume either that service provider and consumer have matching SLA templates and common understanding of the negotiated terms or provide public templates, which can be downloaded and utilized by the end users. On the one hand, matching SLA templates represent an unrealistic assumption in systems where service consumer and provider meet dynamically and on demand. On the other hand, handling of public templates seems to be a rather challenging issue, especially if the templates do not reflect users’ needs. In this paper we present VieSLAF, a novel framework for the specification and management of SLA mappings. Using VieSLAF users may specify, manage, and apply SLA mapping bridging the gap between non-matching SLA templates. Moreover, based on the predefined learning functions and considering accumulated SLA mappings, domain specific public SLA templates can be derived reflecting users’ needs.

  14. Controlling macro- and mesostructures with hierarchical porosity through combined hard and soft templating.

    PubMed

    Petkovich, Nicholas D; Stein, Andreas

    2013-05-07

    Rigid, porous objects and surfactants serve as powerful templates for the formation of mesoporous and macroporous materials. When both types of template are combined in a single synthesis, materials with intricate architectures and hierarchical porosity can be obtained. In this tutorial review, we explain how to conduct syntheses with both soft and hard templates; moreover, we describe methods to control the final structure present in the templated material. Much of the foundation for multiple templating lies in the study of materials made with only one type of template. To establish a foundation in this area, a description of hard and soft templating is given, delving into the templates available and the steps required for effective templating. This leads into an extended discussion about materials templated with both hard and soft templates. Through the use of recent examples in the literature, we aim to show the diversity of structures possible through multiple templating and the advantages these structures can provide for a wide range of applications. An emphasis is placed on how various factors-such as the type of template, type of precursor, heat-treatment temperature, confinement within a small space, and template-template interactions-impact morphology.

  15. Risk Assessment Methodology for Water utilities (RAM-W) : the foundation for emergency response planning.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Danneels, Jeffrey John

    2005-03-01

    Concerns about acts of terrorism against critical infrastructures have been on the rise for several years. Critical infrastructures are those physical structures and information systems (including cyber) essential to the minimum operations of the economy and government. The President's Commission on Critical Infrastructure Protection (PCCIP) probed the security of the nation's critical infrastructures. The PCCIP determined the water infrastructure is highly vulnerable to a range of potential attacks. In October 1997, the PCCIP proposed a public/private partnership between the federal government and private industry to improve the protection of the nation's critical infrastructures. In early 2000, the EPA partnered withmore » the Awwa Research Foundation (AwwaRF) and Sandia National Laboratories to create the Risk Assessment Methodology for Water Utilities (RAM-W{trademark}). Soon thereafter, they initiated an effort to create a template and minimum requirements for water utility Emergency Response Plans (ERP). All public water utilities in the US serving populations greater than 3,300 are required to undertaken both a vulnerability assessment and the development of an emergency response plan. This paper explains the initial steps of RAM-W{trademark} and then demonstrates how the security risk assessment is fundamental to the ERP. During the development of RAM-W{trademark}, Sandia performed several security risk assessments at large metropolitan water utilities. As part of the scope of that effort, ERPs at each utility were reviewed to determine how well they addressed significant vulnerabilities uncovered during the risk assessment. The ERP will contain responses to other events as well (e.g. natural disasters) but should address all major findings in the security risk assessment.« less

  16. Assessing usefulness and researcher satisfaction with consent form templates.

    PubMed

    Larson, Elaine L; Teller, Alan; Aguirre, Alejandra N; Jackson, Jhia; Meyer, Dodi

    2017-08-01

    We aimed to improve the research consenting process by developing and evaluating simplified consent forms. Four templates written at the eighth-tenth grade reading level were developed and trialed by a group of experts in clinical research, health literacy, national regulatory requirements, and end users. Researchers from protocols which had received expedited review were surveyed at 2 time points regarding their use and assessment of the templates. At baseline 18/86 (20.9%) responding researchers had heard of the templates and 5 (5.8%) reported that they had used them; 2 years later, 54.2% (32/59) had heard of the templates and 87.5% (28/32) had used them ( p <0.001). Consent form templates may be one mechanism to improve patient comprehension of research protocols as well as efficiency of the review process, but require considerable time for development and implementation, and one key to their success is involvement and support from the IRB and technical staff.

  17. Templated and template-free fabrication strategies for zero-dimensional hollow MOF superstructures.

    PubMed

    Kim, Hyehyun; Lah, Myoung Soo

    2017-05-16

    Various fabrication strategies for hollow metal-organic framework (MOF) superstructures are reviewed and classified using various types of external templates and their properties. Hollow MOF superstructures have also been prepared without external templates, wherein unstable intermediates obtained during reactions convert to the final hollow MOF superstructures. Many hollow MOF superstructures have been fabricated using hard templates. After the core-shell core@MOF structure was prepared using a hard template, the core was selectively etched to generate a hollow MOF superstructure. Another approach for generating hollow superstructures is to use a solid reactant as a sacrificial template; this method requires no additional etching process. Soft templates such as discontinuous liquid/emulsion droplets and gas bubbles in a continuous soft phase have also been employed to prepare hollow MOF superstructures.

  18. Making Microscopic Cubes Of Boron

    NASA Technical Reports Server (NTRS)

    Faulkner, Joseph M.

    1993-01-01

    Production of finely divided cubes of boron involves vacuum-deposition technology and requires making of template. Template supports pattern of checkered squares 25 micrometers on side, which are etched 25 micrometers into template material. Template coasted uniformly with paralyene or some similar vacuum coating with low coefficient of adhesion. Intended application to solid rocket fuels, explosives, and pyrotechnics; process used for other applications, from manufacture of pharmaceuticals to processing of nuclear materials.

  19. Development of template and mask replication using jet and flash imprint lithography

    NASA Astrophysics Data System (ADS)

    Brooks, Cynthia; Selinidis, Kosta; Doyle, Gary; Brown, Laura; LaBrake, Dwayne; Resnick, Douglas J.; Sreenivasan, S. V.

    2010-09-01

    The Jet and Flash Imprint Lithography (J-FILTM)1-7 process uses drop dispensing of UV curable resists to assist high resolution patterning for subsequent dry etch pattern transfer. The technology is actively being used to develop solutions for memory markets including Flash memory and patterned media for hard disk drives. It is anticipated that the lifetime of a single template (for patterned media) or mask (for semiconductor) will be on the order of 104 - 105 imprints. This suggests that tens of thousands of templates/masks will be required. It is not feasible to employ electronbeam patterning directly to deliver these volumes. Instead, a "master" template - created by directly patterning with an electron-beam tool - will be replicated many times with an imprint lithography tool to produce the required supply of "working" templates/masks. In this paper, we review the development of the pattern transfer process for both template and mask replicas. Pattern transfer of resolutions down to 25nm has been demonstrated for bit patterned media replication. In addition, final resolution on a semiconductor mask of 28nm has been confirmed. The early results on both etch depth and CD uniformity are promising, but more extensive work is required to characterize the pattern transfer process.

  20. Two Successive Reactions on a DNA Template: A Strategy for Improving Background and Specificity in Nucleic Acid Detection

    PubMed Central

    Franzini, Raphael M.

    2015-01-01

    We report a new strategy for template-mediated fluorogenic chemistry that results in enhanced performance for the fluorescence detection of nucleic acids. In this approach, two successive templated reactions are required to induce a fluorescence signal, rather than only one. These novel fluorescein-labeled oligonucleotide probes, termed 2-STAR probes, contain two quencher groups tethered by separate reductively cleavable linkers. When a 2-STAR quenched probe binds adjacent to either two successive mono triphenyl-phosphine (TPP)-DNAs or a dual TPP-DNA, the two quenchers are released, resulting in a fluorescence signal. Because of the requirement for two consecutive reactions, 2-STAR probes display an unprecedented level of sequence-specificity for template-mediated probe designs. At the same time, background emission generated by off-template reactions or incomplete quenching is among the lowest of any fluorogenic reactive probes for the detection of DNA or RNA. PMID:21294182

  1. Pressure activated diaphragm bonder

    DOEpatents

    Evans, L.B.; Malba, V.

    1997-05-27

    A device is available for bonding one component to another, particularly for bonding electronic components of integrated circuits, such as chips, to a substrate. The bonder device in one embodiment includes a bottom metal block having a machined opening wherein a substrate is located, a template having machined openings which match solder patterns on the substrate, a thin diaphragm placed over the template after the chips have been positioned in the openings therein, and a top metal block positioned over the diaphragm and secured to the bottom block, with the diaphragm retained therebetween. The top block includes a countersink portion which extends over at least the area of the template and an opening through which a high pressure inert gas is supplied to exert uniform pressure distribution over the diaphragm to keep the chips in place during soldering. A heating means is provided to melt the solder patterns on the substrate and thereby solder the chips thereto. 4 figs.

  2. Pressure activated diaphragm bonder

    DOEpatents

    Evans, Leland B.; Malba, Vincent

    1997-01-01

    A device is available for bonding one component to another, particularly for bonding electronic components of integrated circuits, such as chips, to a substrate. The bonder device in one embodiment includes a bottom metal block having a machined opening wherein a substrate is located, a template having machined openings which match solder patterns on the substrate, a thin diaphragm placed over the template after the chips have been positioned in the openings therein, and a top metal block positioned over the diaphragm and secured to the bottom block, with the diaphragm retained therebetween. The top block includes a countersink portion which extends over at least the area of the template and an opening through which a high pressure inert gas is supplied to exert uniform pressure distribution over the diaphragm to keep the chips in place during soldering. A heating means is provided to melt the solder patterns on the substrate and thereby solder the chips thereto.

  3. Using a fingerprint recognition system in a vaccine trial to avoid misclassification

    PubMed Central

    2007-01-01

    Abstract Problem The potential for misidentification of trial participants, leading to misclassification, is a threat to the integrity of randomized controlled trials. The correct identification of study subjects in large trials over prolonged periods is of vital importance to those conducting clinical trials. Currently used means of identifying study participants, such as identity cards and records of name, address, name of household head and demographic characteristics, require large numbers of well-trained personnel, and still leave room for uncertainty. Approach We used fingerprint recognition technology for the identification of trial participants. This technology is already widely used in security and commercial contexts but not so far in clinical trials. Local setting A phase 2 cholera vaccine trial in SonLa, Viet Nam. Relevant changes An optical sensor was used to scan fingerprints. The fingerprint template of each participant was used to verify his or her identity during each of eight follow-up visits. Lessons learned A system consisting of a laptop computer and sensor is small in size, requires minimal training and on average six seconds for scanning and recognition. All participants’ identities were verified in the trial. Fingerprint recognition should become the standard technology for identification of participants in field trials. Fears exist, however, regarding the potential for invasion of privacy. It will therefore be necessary to convince not only trial participants but also investigators that templates of fingerprints stored in databases are less likely to be subject to abuse than currently used information databases. PMID:17242760

  4. Palmprint Based Multidimensional Fuzzy Vault Scheme

    PubMed Central

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  5. Template Authoring Environment for the Automatic Generation of Narrative Content

    ERIC Educational Resources Information Center

    Caropreso, Maria Fernanda; Inkpen, Diana; Keshtkar, Fazel; Khan, Shahzad

    2012-01-01

    Natural Language Generation (NLG) systems can make data accessible in an easily digestible textual form; but using such systems requires sophisticated linguistic and sometimes even programming knowledge. We have designed and implemented an environment for creating and modifying NLG templates that requires no programming knowledge, and can operate…

  6. Use of rapid prototyping drill template for the expansive open door laminoplasty: A cadaveric study.

    PubMed

    Rong, Xin; Wang, Beiyu; Chen, Hua; Ding, Chen; Deng, Yuxiao; Ma, Lipeng; Ma, Yanzhao; Liu, Hao

    2016-11-01

    Trough preparation is a technically demanding yet critical procedure for successful expansive open door laminoplasty (EOLP), requiring both proper position and appropriate bone removal. We aimed to use the specific rapid prototyping drill template to achieve such requirement. The 3D model of the cadaveric cervical spine was reconstructed using the Mimics 17.0 and Geomagic Studio 12.0 software. The drilling template was designed in the 3-Matic software. The trough position was simulated at the medial margin of the facet joint. Two holders were designed on both sides. On the open side, the holder would just allow the drill penetrate the ventral cortex of the lamina. On the hinge side, the holder was designed to keep the ventral cortex of the lamina intact. One orthopedic resident performed the surgery using the rapid prototyping drill template on four cadavers (template group). A control group of four cadavers were operated upon without the use of the template. The deviation of the final trough position from the simulated trough position was 0.18mm±0.51mm in the template group. All the troughs in the template group and 40% of the troughs in the control group were at the medial side of the facet joint. The complete hinge fracture rate was 5% in the template group, significantly lower than that (55%) in the control group (P=0.01). The rapid prototyping drill template could help the surgeon accomplish proper trough position and appropriate bone removal in EOLP on the cadaveric cervical spine. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    NSTec Environmental Restoration

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, includingmore » acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS/ICS construct and Unified Command (UC) for management of a domestic incident. The NRP Nuclear/Radiological Incident Annex (NUC) further provides requirements and protocols for coordinating federal government capabilities to respond to nuclear/radiological Incidents of National Significance (INS) and other radiological incidents. When a FRMAC is established, it operates under the parameters of NIMS as defined in the NRP. FRMAC and its operations have been modified to reflect NIMS/ICS concepts and principles and to facilitate working in a Unified Command structure. FRMAC is established at or near the scene of the incident to coordinate radiological monitoring and assessment and is established in coordination with the U.S. Department of Homeland Security (DHS); the coordinating agency; other federal agencies; and state, local, and tribal authorities. However, regardless of the coordinating agency designation, U.S. Department of Energy (DOE) coordinates radiological monitoring and assessment activities for the initial phases of the offsite federal incident response through the Radiological Assistance Program (RAP) and FRMAC assets. Monitoring and assessment data are managed by FRMAC in an accountable, secure, and retrievable format. Monitoring data interpretations, including exposure rate contours, dose projections, and any requested radiological assessments are to be provided to the DHS; to the coordinating agency; and to state, local, and tribal government agencies.« less

  8. Use of a structured template to facilitate practice-based learning and improvement projects.

    PubMed

    McClain, Elizabeth K; Babbott, Stewart F; Tsue, Terance T; Girod, Douglas A; Clements, Debora; Gilmer, Lisa; Persons, Diane; Unruh, Greg

    2012-06-01

    The Accreditation Council for Graduate Medical Education (ACGME) requires residency programs to meet and demonstrate outcomes across 6 competencies. Measuring residents' competency in practice-based learning and improvement (PBLI) is particularly challenging. We developed an educational tool to meet ACGME requirements for PBLI. The PBLI template helped programs document quality improvement (QI) projects and supported increased scholarly activity surrounding PBLI learning. We reviewed program requirements for 43 residency and fellowship programs and identified specific PBLI requirements for QI activities. We also examined ACGME Program Information Form responses on PBLI core competency questions surrounding QI projects for program sites visited in 2008-2009. Data were integrated by a multidisciplinary committee to develop a peer-protected PBLI template guiding programs through process, documentation, and evaluation of QI projects. All steps were reviewed and approved through our GME Committee structure. An electronic template, companion checklist, and evaluation form were developed using identified project characteristics to guide programs through the PBLI process and facilitate documentation and evaluation of the process. During a 24 month period, 27 programs have completed PBLI projects, and 15 have reviewed the template with their education committees, but have not initiated projects using the template. The development of the tool generated program leaders' support because the tool enhanced the ability to meet program-specific objectives. The peer-protected status of this document for confidentiality and from discovery has been beneficial for program usage. The document aggregates data on PBLI and QI initiatives, offers opportunities to increase scholarship in QI, and meets the ACGME goal of linking measures to outcomes important to meeting accreditation requirements at the program and institutional level.

  9. Use of a Structured Template to Facilitate Practice-Based Learning and Improvement Projects

    PubMed Central

    McClain, Elizabeth K.; Babbott, Stewart F.; Tsue, Terance T.; Girod, Douglas A.; Clements, Debora; Gilmer, Lisa; Persons, Diane; Unruh, Greg

    2012-01-01

    Background The Accreditation Council for Graduate Medical Education (ACGME) requires residency programs to meet and demonstrate outcomes across 6 competencies. Measuring residents' competency in practice-based learning and improvement (PBLI) is particularly challenging. Purpose We developed an educational tool to meet ACGME requirements for PBLI. The PBLI template helped programs document quality improvement (QI) projects and supported increased scholarly activity surrounding PBLI learning. Methods We reviewed program requirements for 43 residency and fellowship programs and identified specific PBLI requirements for QI activities. We also examined ACGME Program Information Form responses on PBLI core competency questions surrounding QI projects for program sites visited in 2008–2009. Data were integrated by a multidisciplinary committee to develop a peer-protected PBLI template guiding programs through process, documentation, and evaluation of QI projects. All steps were reviewed and approved through our GME Committee structure. Results An electronic template, companion checklist, and evaluation form were developed using identified project characteristics to guide programs through the PBLI process and facilitate documentation and evaluation of the process. During a 24 month period, 27 programs have completed PBLI projects, and 15 have reviewed the template with their education committees, but have not initiated projects using the template. Discussion The development of the tool generated program leaders' support because the tool enhanced the ability to meet program-specific objectives. The peer-protected status of this document for confidentiality and from discovery has been beneficial for program usage. The document aggregates data on PBLI and QI initiatives, offers opportunities to increase scholarship in QI, and meets the ACGME goal of linking measures to outcomes important to meeting accreditation requirements at the program and institutional level. PMID:23730444

  10. The Design of a Templated C++ Small Vector Class for Numerical Computing

    NASA Technical Reports Server (NTRS)

    Moran, Patrick J.

    2000-01-01

    We describe the design and implementation of a templated C++ class for vectors. The vector class is templated both for vector length and vector component type; the vector length is fixed at template instantiation time. The vector implementation is such that for a vector of N components of type T, the total number of bytes required by the vector is equal to N * size of (T), where size of is the built-in C operator. The property of having a size no bigger than that required by the components themselves is key in many numerical computing applications, where one may allocate very large arrays of small, fixed-length vectors. In addition to the design trade-offs motivating our fixed-length vector design choice, we review some of the C++ template features essential to an efficient, succinct implementation. In particular, we highlight some of the standard C++ features, such as partial template specialization, that are not supported by all compilers currently. This report provides an inventory listing the relevant support currently provided by some key compilers, as well as test code one can use to verify compiler capabilities.

  11. 75 FR 38115 - Agency Information Collection Activities: Submission for OMB Review; Comment Request, OMB No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-01

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2009-0001... Management Agency, DHS. ACTION: Notice; 30-day notice and request for comments; new information collection; OMB No. 1660-NEW; FEMA Form 089-22, SHSP-Tribal Investment Justification Template. SUMMARY: The...

  12. Lightning Protection System for HE Facilities at LLNL - Certification Template

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clancy, T J; Ong, M M; Brown, C G

    2005-12-08

    This document is meant as a template to assist in the development of your own lighting certification process. Aside from this introduction and the mock representative name of the building (Building A), this document is nearly identical to a lightning certification report issued by the Engineering Directorate at Lawrence Livermore National Laboratory. At the date of this release, we have certified over 70 HE processing and storage cells at our Site 300 facilities. In Chapters 1 and 2 respectively, we address the need and methods of lightning certification for HE processing and storage facilities at LLNL. We present the preferredmore » method of lightning protection in Chapter 3, as well as the likely building modifications that are needed to comply with this method. In Chapter 4, we present the threat assessment and resulting safe work areas within a cell. After certification, there may be changes to operations during a lightning alert, and this is discussed in Chapter 5. Chapter 6 lists the maintenance requirements for the continuation of lighting certification status. Appendices of this document are meant as an aid in developing your own certification process, and they include a bonding list, an inventory of measurement equipment, surge suppressors in use at LLNL, an Integrated Work and Safety form (IWS), and a template certification sign-off sheet. The lightning certification process involves more that what is spelled out in this document. The first steps involve considerable planning, the securing of funds, and management and explosives safety buy-in. Permits must be obtained, measurement equipment must be assembled and tested, and engineers and technicians must be trained in their use. Cursory building inspections are also recommended, and surge suppression for power systems must be addressed. Upon completion of a certification report and its sign-off by management, additional work is required. Training will be needed in order to educate workers and facility managers of the requirements of lightning certification. Operating procedures will need to be generated and/or modified with additional controls. Engineering controls may also be implemented requiring the modification of cells. Careful planning should bring most of these issues to light, making it clear where this document is helpful and were additional assistance may be necessary.« less

  13. Reducing the number of templates for aligned-spin compact binary coalescence gravitational wave searches using metric-agnostic template nudging

    NASA Astrophysics Data System (ADS)

    Indik, Nathaniel; Fehrmann, Henning; Harke, Franz; Krishnan, Badri; Nielsen, Alex B.

    2018-06-01

    Efficient multidimensional template placement is crucial in computationally intensive matched-filtering searches for gravitational waves (GWs). Here, we implement the neighboring cell algorithm (NCA) to improve the detection volume of an existing compact binary coalescence (CBC) template bank. This algorithm has already been successfully applied for a binary millisecond pulsar search in data from the Fermi satellite. It repositions templates from overdense regions to underdense regions and reduces the number of templates that would have been required by a stochastic method to achieve the same detection volume. Our method is readily generalizable to other CBC parameter spaces. Here we apply this method to the aligned-single-spin neutron star-black hole binary coalescence inspiral-merger-ringdown gravitational wave parameter space. We show that the template nudging algorithm can attain the equivalent effectualness of the stochastic method with 12% fewer templates.

  14. Prostate intensity-modulated radiotherapy planning in seven mouse clicks: Development of a class solution for cancer.

    PubMed

    Wood, Maree; Fonseca, Amara; Sampson, David; Kovendy, Andrew; Westhuyzen, Justin; Shakespeare, Thomas; Turnbull, Kirsty

    2016-01-01

    The aim of the retrospective study was to develop a planning class solution for prostate intensity-modulated radiotherapy (IMRT) that achieved target and organs-at-risk (OAR) doses within acceptable departmental protocol criteria using the Monaco treatment planning system (Elekta-CMS Software, MO, USA). Advances in radiation therapy technology have led to a re-evaluation of work practices. Class solutions have the potential to produce highly conformal plans in a time-efficient manner. Using data from intermediate and high risk prostate cancer patients, a stepwise quality improvement model was employed. Stage 1 involved the development of a broadly based treatment template developed across 10 patients. Stage 2 involved template refinement and clinical audit ( n  = 20); Stage 3, template review ( n  = 50) and Stage 4 an assessment of a revised template against the actual treatment plan involving 72 patients. The computer algorithm that comprised the Stage 4 template met clinical treatment criteria for 82% of patients. Minor template changes were required for a further 13% of patients. Major changes were required in 4%; one patient could not be assessed. The average calculation time was 13 min and involved seven mouse clicks by the planner. Thus, the new template met treatment criteria or required only minor changes in 95% of prostate patients; this is an encouraging result suggesting improvements in planning efficiency and consistency. It is feasible to develop a class solution for prostate IMRT using a stepwise quality improvement model which delivers clinically acceptable plans in the great majority of prostate cases.

  15. Construction of population-specific Indian MRI brain template: Morphometric comparison with Chinese and Caucasian templates.

    PubMed

    Bhalerao, Gaurav Vivek; Parlikar, Rujuta; Agrawal, Rimjhim; Shivakumar, Venkataram; Kalmady, Sunil V; Rao, Naren P; Agarwal, Sri Mahavir; Narayanaswamy, Janardhanan C; Reddy, Y C Janardhan; Venkatasubramanian, Ganesan

    2018-06-01

    Spatial normalization of brain MR images is highly dependent on the choice of target brain template. Morphological differences caused by factors like genetic and environmental exposures, generates a necessity to construct population specific brain templates. Brain image analysis performed using brain templates from Caucasian population may not be appropriate for non-Caucasian population. In this study, our objective was to construct an Indian brain template from a large population (N = 157 subjects) and compare the morphometric parameters of this template with that of Chinese-56 and MNI-152 templates. In addition, using an independent MRI data of 15 Indian subjects, we also evaluated the potential registration accuracy differences using these three templates. Indian brain template was constructed using iterative routines as per established procedures. We compared our Indian template with standard MNI-152 template and Chinese template by measuring global brain features. We also examined accuracy of registration by aligning 15 new Indian brains to Indian, Chinese and MNI templates. Furthermore, we supported our measurement protocol with inter-rater and intra-rater reliability analysis. Our results showed that there were significant differences in global brain features of Indian template in comparison with Chinese and MNI brain templates. The results of registration accuracy analysis revealed that fewer deformations are required when Indian brains are registered to Indian template as compared to Chinese and MNI templates. This study concludes that population specific Indian template is likely to be more appropriate for structural and functional image analysis of Indian population. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Effects of cerebellar nuclear inactivation on the learning of a complex forelimb movement in cats.

    PubMed

    Wang, J J; Shimansky, Y; Bracha, V; Bloedel, J R

    1998-05-01

    The purpose of this study was to determine the effects of inactivating concurrently the cerebellar interposed and dentate nuclei on the capacity of cats to acquire and retain a complex, goal-directed forelimb movement. To assess the effects on acquisition, cats were required to learn to move a vertical manipulandum bar through a two-segment template with a shape approximating an inverted "L" after the injection of muscimol (saline for the control group) in the interposed and dentate cerebellar nuclei. During training periods, they were exposed progressively to more difficult templates, which were created by decreasing the angle between the two segments of the template. After determining the most difficult template the injected animals could learn within the specified time and performance constraints, the retraining phase of the experiment was initiated in which the cats were required to execute the same sequence of templates in the absence of any injection. This stage of the experiment assessed retention and determined the extent of any relearning required to execute the task at criterion levels. Next, the animals were overtrained without any injection on the most difficult template they could perform. Finally, to determine the effects of nuclear inactivation on retention after extensive retraining, their capacity to perform the same template was determined after muscimol injection in the interposed and dentate nuclei. The findings show that during the inactivation of the dentate and interposed nuclei the animals could learn to execute the more difficult templates. However, when required to execute the most difficult template learned under muscimol on the day after injections were discontinued, the cats had to "relearn" (reacquire) the movement. Finally, when the cerebellar nuclei were inactivated after the animals learned the task in the absence of any injections during the retraining phase, retention was not blocked. The data indicate that the intermediate and lateral cerebellum are not required either for learning this type of complex voluntary movement or for retaining the capacity to perform the task once it is learned. Nevertheless, when the cerebellum becomes available for executing a task learned in the absence of this structure, reacquisition of the behavior usually is necessary. It is hypothesized that the relearning observed after acquisition during muscimol inactivation reflects the tendency of the system to incorporate the cerebellum into the interactions responsible for the learning and performance of a motor sequence that is optimal for executing the task.

  17. Biometric templates selection and update using quality measures

    NASA Astrophysics Data System (ADS)

    Abboud, Ali J.; Jassim, Sabah A.

    2012-06-01

    To deal with severe variation in recording conditions, most biometric systems acquire multiple biometric samples, at the enrolment stage, for the same person and then extract their individual biometric feature vectors and store them in the gallery in the form of biometric template(s), labelled with the person's identity. The number of samples/templates and the choice of the most appropriate templates influence the performance of the system. The desired biometric template(s) selection technique must aim to control the run time and storage requirements while improving the recognition accuracy of the biometric system. This paper is devoted to elaborating on and discussing a new two stages approach for biometric templates selection and update. This approach uses a quality-based clustering, followed by a special criterion for the selection of an ultimate set of biometric templates from the various clusters. This approach is developed to select adaptively a specific number of templates for each individual. The number of biometric templates depends mainly on the performance of each individual (i.e. gallery size should be optimised to meet the needs of each target individual). These experiments have been conducted on two face image databases and their results will demonstrate the effectiveness of proposed quality-guided approach.

  18. A fingerprint key binding algorithm based on vector quantization and error correction

    NASA Astrophysics Data System (ADS)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  19. In vitro synthesis of minus-strand RNA by an isolated cereal yellow dwarf virus RNA-dependent RNA polymerase requires VPg and a stem-loop structure at the 3' end of the virus RNA.

    PubMed

    Osman, Toba A M; Coutts, Robert H A; Buck, Kenneth W

    2006-11-01

    Cereal yellow dwarf virus (CYDV) RNA has a 5'-terminal genome-linked protein (VPg). We have expressed the VPg region of the CYDV genome in bacteria and used the purified protein (bVPg) to raise an antiserum which was able to detect free VPg in extracts of CYDV-infected oat plants. A template-dependent RNA-dependent RNA polymerase (RdRp) has been produced from a CYDV membrane-bound RNA polymerase by treatment with BAL 31 nuclease. The RdRp was template specific, being able to utilize templates from CYDV plus- and minus-strand RNAs but not those of three unrelated viruses, Red clover necrotic mosaic virus, Cucumber mosaic virus, and Tobacco mosaic virus. RNA synthesis catalyzed by the RdRp required a 3'-terminal GU sequence and the presence of bVPg. Additionally, synthesis of minus-strand RNA on a plus-strand RNA template required the presence of a putative stem-loop structure near the 3' terminus of CYDV RNA. The base-paired stem, a single-nucleotide (A) bulge in the stem, and the sequence of a tetraloop were all required for the template activity. Evidence was produced showing that minus-strand synthesis in vitro was initiated by priming by bVPg at the 3' end of the template. The data are consistent with a model in which the RdRp binds to the stem-loop structure which positions the active site to recognize the 3'-terminal GU sequence for initiation of RNA synthesis by the addition of an A residue to VPg.

  20. In Vitro Synthesis of Minus-Strand RNA by an Isolated Cereal Yellow Dwarf Virus RNA-Dependent RNA Polymerase Requires VPg and a Stem-Loop Structure at the 3′ End of the Virus RNA▿

    PubMed Central

    Osman, Toba A. M.; Coutts, Robert H. A.; Buck, Kenneth W.

    2006-01-01

    Cereal yellow dwarf virus (CYDV) RNA has a 5′-terminal genome-linked protein (VPg). We have expressed the VPg region of the CYDV genome in bacteria and used the purified protein (bVPg) to raise an antiserum which was able to detect free VPg in extracts of CYDV-infected oat plants. A template-dependent RNA-dependent RNA polymerase (RdRp) has been produced from a CYDV membrane-bound RNA polymerase by treatment with BAL 31 nuclease. The RdRp was template specific, being able to utilize templates from CYDV plus- and minus-strand RNAs but not those of three unrelated viruses, Red clover necrotic mosaic virus, Cucumber mosaic virus, and Tobacco mosaic virus. RNA synthesis catalyzed by the RdRp required a 3′-terminal GU sequence and the presence of bVPg. Additionally, synthesis of minus-strand RNA on a plus-strand RNA template required the presence of a putative stem-loop structure near the 3′ terminus of CYDV RNA. The base-paired stem, a single-nucleotide (A) bulge in the stem, and the sequence of a tetraloop were all required for the template activity. Evidence was produced showing that minus-strand synthesis in vitro was initiated by priming by bVPg at the 3′ end of the template. The data are consistent with a model in which the RdRp binds to the stem-loop structure which positions the active site to recognize the 3′-terminal GU sequence for initiation of RNA synthesis by the addition of an A residue to VPg. PMID:16928757

  1. Testing sensory evidence against mnemonic templates

    PubMed Central

    Myers, Nicholas E; Rohenkohl, Gustavo; Wyart, Valentin; Woolrich, Mark W; Nobre, Anna C; Stokes, Mark G

    2015-01-01

    Most perceptual decisions require comparisons between current input and an internal template. Classic studies propose that templates are encoded in sustained activity of sensory neurons. However, stimulus encoding is itself dynamic, tracing a complex trajectory through activity space. Which part of this trajectory is pre-activated to reflect the template? Here we recorded magneto- and electroencephalography during a visual target-detection task, and used pattern analyses to decode template, stimulus, and decision-variable representation. Our findings ran counter to the dominant model of sustained pre-activation. Instead, template information emerged transiently around stimulus onset and quickly subsided. Cross-generalization between stimulus and template coding, indicating a shared neural representation, occurred only briefly. Our results are compatible with the proposal that template representation relies on a matched filter, transforming input into task-appropriate output. This proposal was consistent with a signed difference response at the perceptual decision stage, which can be explained by a simple neural model. DOI: http://dx.doi.org/10.7554/eLife.09000.001 PMID:26653854

  2. Multi-template tensor-based morphometry: Application to analysis of Alzheimer's disease

    PubMed Central

    Koikkalainen, Juha; Lötjönen, Jyrki; Thurfjell, Lennart; Rueckert, Daniel; Waldemar, Gunhild; Soininen, Hilkka

    2012-01-01

    In this paper methods for using multiple templates in tensor-based morphometry (TBM) are presented and comparedtothe conventional single-template approach. TBM analysis requires non-rigid registrations which are often subject to registration errors. When using multiple templates and, therefore, multiple registrations, it can be assumed that the registration errors are averaged and eventually compensated. Four different methods are proposed for multi-template TBM. The methods were evaluated using magnetic resonance (MR) images of healthy controls, patients with stable or progressive mild cognitive impairment (MCI), and patients with Alzheimer's disease (AD) from the ADNI database (N=772). The performance of TBM features in classifying images was evaluated both quantitatively and qualitatively. Classification results show that the multi-template methods are statistically significantly better than the single-template method. The overall classification accuracy was 86.0% for the classification of control and AD subjects, and 72.1%for the classification of stable and progressive MCI subjects. The statistical group-level difference maps produced using multi-template TBM were smoother, formed larger continuous regions, and had larger t-values than the maps obtained with single-template TBM. PMID:21419228

  3. State Indoor Radon Grants Resources

    EPA Pesticide Factsheets

    This guidance explains the standardized state template for SIRG measures,as required by the OMB and answers questions about the template. The Program guidance is intended to reconcile all legal, policy and programmatic changes that affected SIRG.

  4. Metam Sodium and Metam Potassium Fumigant Management Plan Phase 2 Templates

    EPA Pesticide Factsheets

    These templates provide a framework for structuring and reporting a plan for this type of pesticide product. Required data fields include application block size, buffer zone signage, soil conditions, and tarp plans.

  5. Applying secret sharing for HIS backup exchange.

    PubMed

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi

    2013-01-01

    To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.

  6. Improvement of sub-20nm pattern quality with dose modulation technique for NIL template production

    NASA Astrophysics Data System (ADS)

    Yagawa, Keisuke; Ugajin, Kunihiro; Suenaga, Machiko; Kanamitsu, Shingo; Motokawa, Takeharu; Hagihara, Kazuki; Arisawa, Yukiyasu; Kobayashi, Sachiko; Saito, Masato; Ito, Masamitsu

    2016-04-01

    Nanoimprint lithography (NIL) technology is in the spotlight as a next-generation semiconductor manufacturing technique for integrated circuits at 22 nm and beyond. NIL is the unmagnified lithography technique using template which is replicated from master templates. On the other hand, master templates are currently fabricated by electron-beam (EB) lithography[1]. In near future, finer patterns less than 15nm will be required on master template and EB data volume increases exponentially. So, we confront with a difficult challenge. A higher resolution EB mask writer and a high performance fabrication process will be required. In our previous study, we investigated a potential of photomask fabrication process for finer patterning and achieved 15.5nm line and space (L/S) pattern on template by using VSB (Variable Shaped Beam) type EB mask writer and chemically amplified resist. In contrast, we found that a contrast loss by backscattering decreases the performance of finer patterning. For semiconductor devices manufacturing, we must fabricate complicated patterns which includes high and low density simultaneously except for consecutive L/S pattern. Then it's quite important to develop a technique to make various size or coverage patterns all at once. In this study, a small feature pattern was experimentally formed on master template with dose modulation technique. This technique makes it possible to apply the appropriate exposure dose for each pattern size. As a result, we succeed to improve the performance of finer patterning in bright field area. These results show that the performance of current EB lithography process have a potential to fabricate NIL template.

  7. NATIONAL PREPAREDNESS: Technologies to Secure Federal Buildings

    DTIC Science & Technology

    2002-04-25

    Medium, some resistance based on sensitivity of eye Facial recognition Facial features are captured and compared Dependent on lighting, positioning...two primary types of facial recognition technology used to create templates: 1. Local feature analysis—Dozens of images from regions of the face are...an adjacent feature. Attachment I—Access Control Technologies: Biometrics Facial Recognition How the technology works

  8. Development of Total Knee Replacement Digital Templating Software

    NASA Astrophysics Data System (ADS)

    Yusof, Siti Fairuz; Sulaiman, Riza; Thian Seng, Lee; Mohd. Kassim, Abdul Yazid; Abdullah, Suhail; Yusof, Shahril; Omar, Masbah; Abdul Hamid, Hamzaini

    In this study, by taking full advantage of digital X-ray and computer technology, we have developed a semi-automated procedure to template knee implants, by making use of digital templating method. Using this approach, a software system called OrthoKneeTMhas been designed and developed. The system is to be utilities as a study in the Department of Orthopaedic and Traumatology in medical faculty, UKM (FPUKM). OrthoKneeTMtemplating process employs uses a technique similar to those used by many surgeons, using acetate templates over X-ray films. Using template technique makes it easy to template various implant from every Implant manufacturers who have with a comprehensive database of templates. The templating functionality includes, template (knee) and manufactures templates (Smith & Nephew; and Zimmer). From an image of patient x-ray OrthoKneeTMtemplates help in quickly and easily reads to the approximate template size needed. The visual templating features then allow us quickly review multiple template sizes against the X-ray and thus obtain the nearly precise view of the implant size required. The system can assist by templating on one patient image and will generate reports that can accompany patient notes. The software system was implemented in Visual basic 6.0 Pro using the object-oriented techniques to manage the graphics and objects. The approaches for image scaling will be discussed. Several of measurement in orthopedic diagnosis process have been studied and added in this software as measurement tools features using mathematic theorem and equations. The study compared the results of the semi-automated (using digital templating) method to the conventional method to demonstrate the accuracy of the system.

  9. State Indoor Radon Grants Guidance and Tools

    EPA Pesticide Factsheets

    This guidance explains the standardized state template for SIRG measures,as required by the OMB and answers questions about the template. The Program guidance is intended to reconcile all legal, policy and programmatic changes that affected SIRG.

  10. Chromosome Synapsis Alleviates Mek1-Dependent Suppression of Meiotic DNA Repair

    PubMed Central

    Subramanian, Vijayalakshmi V.; MacQueen, Amy J.; Vader, Gerben; Shinohara, Miki; Sanchez, Aurore; Borde, Valérie; Shinohara, Akira; Hochwagen, Andreas

    2016-01-01

    Faithful meiotic chromosome segregation and fertility require meiotic recombination between homologous chromosomes rather than the equally available sister chromatid, a bias that in Saccharomyces cerevisiae depends on the meiotic kinase, Mek1. Mek1 is thought to mediate repair template bias by specifically suppressing sister-directed repair. Instead, we found that when Mek1 persists on closely paired (synapsed) homologues, DNA repair is severely delayed, suggesting that Mek1 suppresses any proximal repair template. Accordingly, Mek1 is excluded from synapsed homologues in wild-type cells. Exclusion requires the AAA+-ATPase Pch2 and is directly coupled to synaptonemal complex assembly. Stage-specific depletion experiments further demonstrate that DNA repair in the context of synapsed homologues requires Rad54, a repair factor inhibited by Mek1. These data indicate that the sister template is distinguished from the homologue primarily by its closer proximity to inhibitory Mek1 activity. We propose that once pairing or synapsis juxtaposes homologues, exclusion of Mek1 is necessary to avoid suppression of all templates and accelerate repair progression. PMID:26870961

  11. Biometrics and smart cards combine to offer high security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. Thesemore » Cards will function only when they are being used by the authorized individuals to whom they are issued.« less

  12. Public Notification Instructions and Templates for the Revised Total Coliform Rule (RTCR)

    EPA Pesticide Factsheets

    EPA has developed public notification (PN) templates to help with implementation of the PN Rule. This document aims to assist water systems with the Public Notification requirements specific to the Revised Total Coliform Rule (RTCR).

  13. Digital templating for THA: a simple computer-assisted application for complex hip arthritis cases.

    PubMed

    Hafez, Mahmoud A; Ragheb, Gad; Hamed, Adel; Ali, Amr; Karim, Said

    2016-10-01

    Total hip arthroplasty (THA) is the standard procedure for end-stage arthritis of the hip. Its technical success relies on preoperative planning of the surgical procedure and virtual setup of the operative performance. Digital hip templating is one methodology of preoperative planning for THA which requires a digital preoperative radiograph and a computer with special software. This is a prospective study involving 23 patients (25 hips) who were candidates for complex THA surgery (unilateral or bilateral). Digital templating is done by radiographic assessment using radiographic magnification correction, leg length discrepancy and correction measurements, acetabular component and femoral component templating as well as neck resection measurement. The overall accuracy for templating the stem implant's exact size is 81%. This percentage increased to 94% when considering sizing within 1 size. Digital templating has proven effective, reliable and essential technique for preoperative planning and accurate prediction of THA sizing and alignment.

  14. Public Notification - RTCR Failure To Perform Level 1 Assessment Template

    EPA Pesticide Factsheets

    When a PWS fails to perform a required Level 1 Assessment, it must issue a public notice to inform the consumers of its water of that failure. You can use this template as a guide to prepare that public notice.

  15. Template for Notification of Intent to Export Cathode Ray Tubes (CRTs) for Reuse

    EPA Pesticide Factsheets

    Exporters of CRTs for reuse are required to submit a notification of intent to export to EPA’s Office of Enforcement and Compliance Assurance. This document serves as a template for exporters to use when submitting the notice.

  16. Sampling and Analysis Plan - Guidance and Template v.4 - General Projects - 04/2014

    EPA Pesticide Factsheets

    This Sampling and Analysis Plan (SAP) guidance and template is intended to assist organizations in documenting the procedural and analytical requirements for one-time, or time-limited, projects involving the collection of water, soil, sediment, or other

  17. A fast template periodogram

    NASA Astrophysics Data System (ADS)

    Hoffman, John; VanderPlas, Jake; Hartman, Joel; Bakos, Gáspár

    2017-09-01

    This proceedings contribution presents a novel, non-linear extension to the Lomb-Scargle periodogram that allows periodograms to be generated for arbitrary signal shapes. Such periodograms are already known as "template periodograms" or "periodic matched filters," but current implementations are computationally inefficient. The "fast template periodogram" presented here improves existing techniques by a factor of ˜a few for small test cases (O(10) observations), and over three orders of magnitude for lightcurves containing O(104) observations. The fast template periodogram scales asymptotically as O(HNf log HNf + H4Nf), where H denotes the number of harmonics required to adequately approximate the template and Nf is the number of trial frequencies. Existing implementations scale as O(NobsNf), where Nobs is the number of observations in the lightcurve. An open source Python implementation is available on GitHub.

  18. Nanowire-templated lateral epitaxial growth of non-polar group III nitrides

    DOEpatents

    Wang, George T [Albuquerque, NM; Li, Qiming [Albuquerque, NM; Creighton, J Randall [Albuquerque, NM

    2010-03-02

    A method for growing high quality, nonpolar Group III nitrides using lateral growth from Group III nitride nanowires. The method of nanowire-templated lateral epitaxial growth (NTLEG) employs crystallographically aligned, substantially vertical Group III nitride nanowire arrays grown by metal-catalyzed metal-organic chemical vapor deposition (MOCVD) as templates for the lateral growth and coalescence of virtually crack-free Group III nitride films. This method requires no patterning or separate nitride growth step.

  19. Base pairing among three cis-acting sequences contributes to template switching during hepadnavirus reverse transcription.

    PubMed

    Liu, Ning; Tian, Ru; Loeb, Daniel D

    2003-02-18

    Synthesis of the relaxed-circular (RC) DNA genome of hepadnaviruses requires two template switches during plus-strand DNA synthesis: primer translocation and circularization. Although primer translocation and circularization use different donor and acceptor sequences, and are distinct temporally, they share the common theme of switching from one end of the minus-strand template to the other end. Studies of duck hepatitis B virus have indicated that, in addition to the donor and acceptor sequences, three other cis-acting sequences, named 3E, M, and 5E, are required for the synthesis of RC DNA by contributing to primer translocation and circularization. The mechanism by which 3E, M, and 5E act was not known. We present evidence that these sequences function by base pairing with each other within the minus-strand template. 3E base-pairs with one portion of M (M3) and 5E base-pairs with an adjacent portion of M (M5). We found that disrupting base pairing between 3E and M3 and between 5E and M5 inhibited primer translocation and circularization. More importantly, restoring base pairing with mutant sequences restored the production of RC DNA. These results are consistent with the model that, within duck hepatitis B virus capsids, the ends of the minus-strand template are juxtaposed via base pairing to facilitate the two template switches during plus-strand DNA synthesis.

  20. Comparative modeling without implicit sequence alignments.

    PubMed

    Kolinski, Andrzej; Gront, Dominik

    2007-10-01

    The number of known protein sequences is about thousand times larger than the number of experimentally solved 3D structures. For more than half of the protein sequences a close or distant structural analog could be identified. The key starting point in a classical comparative modeling is to generate the best possible sequence alignment with a template or templates. With decreasing sequence similarity, the number of errors in the alignments increases and these errors are the main causes of the decreasing accuracy of the molecular models generated. Here we propose a new approach to comparative modeling, which does not require the implicit alignment - the model building phase explores geometric, evolutionary and physical properties of a template (or templates). The proposed method requires prior identification of a template, although the initial sequence alignment is ignored. The model is built using a very efficient reduced representation search engine CABS to find the best possible superposition of the query protein onto the template represented as a 3D multi-featured scaffold. The criteria used include: sequence similarity, predicted secondary structure consistency, local geometric features and hydrophobicity profile. For more difficult cases, the new method qualitatively outperforms existing schemes of comparative modeling. The algorithm unifies de novo modeling, 3D threading and sequence-based methods. The main idea is general and could be easily combined with other efficient modeling tools as Rosetta, UNRES and others.

  1. A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

    PubMed Central

    Yu, Jianping; Zhang, Peng; Wang, Shulan

    2015-01-01

    A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes. PMID:25873989

  2. A fingerprint encryption scheme based on irreversible function and secure authentication.

    PubMed

    Yang, Yijun; Yu, Jianping; Zhang, Peng; Wang, Shulan

    2015-01-01

    A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

  3. Medical record management systems: criticisms and new perspectives.

    PubMed

    Frénot, S; Laforest, F

    1999-06-01

    The first generation of computerized medical records stored the data as text, but these records did not bring any improvement in information manipulation. The use of a relational database management system (DBMS) has largely solved this problem as it allows for data requests by using SQL. However, this requires data structuring which is not very appropriate to medicine. Moreover, the use of templates and icon user interfaces has introduced a deviation from the paper-based record (still existing). The arrival of hypertext user interfaces has proven to be of interest to fill the gap between the paper-based medical record and its electronic version. We think that further improvement can be accomplished by using a fully document-based system. We present the architecture, advantages and disadvantages of classical DBMS-based and Web/DBMS-based solutions. We also present a document-based solution and explain its advantages, which include communication, security, flexibility and genericity.

  4. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  5. Pre-operative digital templating in cemented hip hemiarthroplasty for neck of femur fractures.

    PubMed

    Kwok, Iris H Y; Pallett, Scott J C; Massa, Edward; Cundall-Curry, Duncan; Loeffler, Mark D

    2016-03-01

    Pre-operative digital templating allows the surgeon to foresee any anatomical anomalies which may lead to intra-operative problems, and anticipate appropriate instruments and implants required during surgery. Although its role is well-established in successful elective total hip arthroplasty, little work has been done on its use in hip hemiarthroplasty in neck of femur fractures. We describe our initial experience of digital templating in 40 consecutive patients who have undergone cemented hip hemiarthroplasty, assessing templating accuracy between templated implant sizes to actual implant sizes. 81% of implanted heads were templated to within two head sizes, and 89% of implanted stems were templated to within two sizes. Although there was a moderately strong correlation of 0.52 between templated and actual head sizes, this correlation was not demonstrated in femoral stem sizes. Mean leg length discrepancy was -2.5mm (S.D. 8.5), and the mean difference in femoral offset between the operated and non-operated hip was -1mm (S.D. 4.4). Digital templating is a useful adjunct to the surgeon in pre-operative planning of hip hemiarthroplasty in the restoration of leg length and femoral offset. However, its accuracy is inferior to that of elective total hip arthroplasty. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. The Swedish strategy and method for development of a national healthcare information architecture.

    PubMed

    Rosenälv, Jessica; Lundell, Karl-Henrik

    2012-01-01

    "We need a precise framework of regulations in order to maintain appropriate and structured health care documentation that ensures that the information maintains a sufficient level of quality to be used in treatment, in research and by the actual patient. The users shall be aided by clearly and uniformly defined terms and concepts, and there should be an information structure that clarifies what to document and how to make the information more useful. Most of all, we need to standardize the information, not just the technical systems." (eHälsa - nytta och näring, Riksdag report 2011/12:RFR5, p. 37). In 2010, the Swedish Government adopted the National e-Health - the national strategy for accessible and secure information in healthcare. The strategy is a revision and extension of the previous strategy from 2006, which was used as input for the most recent efforts to develop a national information structure utilizing business-oriented generic models. A national decision on healthcare informatics standards was made by the Swedish County Councils, which decided to follow and use EN/ISO 13606 as a standard for the development of a universally applicable information structure, including archetypes and templates. The overall aim of the Swedish strategy for development of National Healthcare Information Architecture is to achieve high level semantic interoperability for clinical content and clinical contexts. High level semantic interoperability requires consistently structured clinical data and other types of data with coherent traceability to be mapped to reference clinical models. Archetypes that are formal definitions of the clinical and demographic concepts and some administrative data were developed. Each archetype describes the information structure and content of overarching core clinical concepts. Information that is defined in archetypes should be used for different purposes. Generic clinical process model was made concrete and analyzed. For each decision-making step in the process where information is processed, the amount and type of information and its structure were defined in terms of reference templates. Reference templates manage clinical, administrative and demographic types of information in a specific clinical context. Based on a survey of clinical processes at the reference level, the identification of specific clinical processes such as diabetes and congestive heart failure in adults were made. Process-specific templates were defined by using reference templates and populated with information that was relevant to each health problem in a specific clinical context. Throughout this process, medical data for knowledge management were collected for each health problem. Parallel with the efforts to define archetypes and templates, terminology binding work is on-going. Different strategies are used depending on the terminology binding level.

  7. A conceptual model and assessment template for capacity evaluation in adult guardianship.

    PubMed

    Moye, Jennifer; Butz, Steven W; Marson, Daniel C; Wood, Erica

    2007-10-01

    We develop a conceptual model and associated assessment template that is usable across state jurisdictions for evaluating the independent-living capacity of older adults in guardianship proceedings. We used an iterative process in which legal provisions for guardianship and prevailing clinical practices for capacity assessment were integrated, through expert group consensus and external review by legal and health care professionals, to form a conceptual model and template. The model and template provide a structure for conducting and documenting a capacity evaluation in guardianship by using six assessment domains of interest to the courts: (a) medical condition, (b) cognition, (c) functional abilities, (d) values, (e) risk of harm and level of supervision needed, and (f) means to enhance capacity. The template also addresses the participation of the person in the guardianship hearing, confidentiality and privilege issues, and certification by the examiner. An online version of the template can be adapted to address specific jurisdictional requirements. A conceptual model and evaluation template provide a useful cross-jurisdictional format for conducting and documenting capacity assessments of older adults in guardianship proceedings. The template may be particularly useful to clinicians for providing courts with information to support limited guardianship orders.

  8. Managing personal health information in distributed research network environments.

    PubMed

    Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn

    2013-10-08

    Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.

  9. Methods for Multiplex Template Sampling in Digital PCR Assays

    PubMed Central

    Petriv, Oleh I.; Heyries, Kevin A.; VanInsberghe, Michael; Walker, David; Hansen, Carl L.

    2014-01-01

    The efficient use of digital PCR (dPCR) for precision copy number analysis requires high concentrations of target molecules that may be difficult or impossible to obtain from clinical samples. To solve this problem we present a strategy, called Multiplex Template Sampling (MTS), that effectively increases template concentrations by detecting multiple regions of fragmented target molecules. Three alternative assay approaches are presented for implementing MTS analysis of chromosome 21, providing a 10-fold concentration enhancement while preserving assay precision. PMID:24854517

  10. Methods for multiplex template sampling in digital PCR assays.

    PubMed

    Petriv, Oleh I; Heyries, Kevin A; VanInsberghe, Michael; Walker, David; Hansen, Carl L

    2014-01-01

    The efficient use of digital PCR (dPCR) for precision copy number analysis requires high concentrations of target molecules that may be difficult or impossible to obtain from clinical samples. To solve this problem we present a strategy, called Multiplex Template Sampling (MTS), that effectively increases template concentrations by detecting multiple regions of fragmented target molecules. Three alternative assay approaches are presented for implementing MTS analysis of chromosome 21, providing a 10-fold concentration enhancement while preserving assay precision.

  11. Two distinct modes of RecA action are required for DNA polymerase V-catalyzed translesion synthesis.

    PubMed

    Pham, Phuong; Seitz, Erica M; Saveliev, Sergei; Shen, Xuan; Woodgate, Roger; Cox, Michael M; Goodman, Myron F

    2002-08-20

    SOS mutagenesis in Escherichia coli requires DNA polymerase V (pol V) and RecA protein to copy damaged DNA templates. Here we show that two distinct biochemical modes for RecA protein are necessary for pol V-catalyzed translesion synthesis. One RecA mode is characterized by a strong stimulation in nucleotide incorporation either directly opposite a lesion or at undamaged template sites, but by the absence of lesion bypass. A separate RecA mode is necessary for translesion synthesis. The RecA1730 mutant protein, which was identified on the basis of its inability to promote pol V (UmuD'(2)C)-dependent UV-mutagenesis, appears proficient for the first mode of RecA action but is deficient in the second mode. Data are presented suggesting that the two RecA modes are "nonfilamentous". That is, contrary to current models for SOS mutagenesis, formation of a RecA nucleoprotein filament may not be required for copying damaged DNA templates. Instead, SOS mutagenesis occurs when pol V interacts with two RecA molecules, first at a 3' primer end, upstream of a template lesion, where RecA mode 1 stimulates pol V activity, and subsequently at a site immediately downstream of the lesion, where RecA mode 2 cocatalyzes lesion bypass. We posit that in vivo assembly of a RecA nucleoprotein filament may be required principally to target pol V to a site of DNA damage and to stabilize the pol V-RecA interaction at the lesion. However, it is only a RecA molecule located at the 3' filament tip, proximal to a damaged template base, that is directly responsible for translesion synthesis.

  12. Two distinct modes of RecA action are required for DNA polymerase V-catalyzed translesion synthesis

    PubMed Central

    Pham, Phuong; Seitz, Erica M.; Saveliev, Sergei; Shen, Xuan; Woodgate, Roger; Cox, Michael M.; Goodman, Myron F.

    2002-01-01

    SOS mutagenesis in Escherichia coli requires DNA polymerase V (pol V) and RecA protein to copy damaged DNA templates. Here we show that two distinct biochemical modes for RecA protein are necessary for pol V-catalyzed translesion synthesis. One RecA mode is characterized by a strong stimulation in nucleotide incorporation either directly opposite a lesion or at undamaged template sites, but by the absence of lesion bypass. A separate RecA mode is necessary for translesion synthesis. The RecA1730 mutant protein, which was identified on the basis of its inability to promote pol V (UmuD′2C)-dependent UV-mutagenesis, appears proficient for the first mode of RecA action but is deficient in the second mode. Data are presented suggesting that the two RecA modes are “nonfilamentous”. That is, contrary to current models for SOS mutagenesis, formation of a RecA nucleoprotein filament may not be required for copying damaged DNA templates. Instead, SOS mutagenesis occurs when pol V interacts with two RecA molecules, first at a 3′ primer end, upstream of a template lesion, where RecA mode 1 stimulates pol V activity, and subsequently at a site immediately downstream of the lesion, where RecA mode 2 cocatalyzes lesion bypass. We posit that in vivo assembly of a RecA nucleoprotein filament may be required principally to target pol V to a site of DNA damage and to stabilize the pol V-RecA interaction at the lesion. However, it is only a RecA molecule located at the 3′ filament tip, proximal to a damaged template base, that is directly responsible for translesion synthesis. PMID:12177433

  13. Study on the Quality Management of Building Electricity Engineering Construction in the Whole Process

    NASA Astrophysics Data System (ADS)

    Qin, Minwu

    2018-05-01

    With the progress of science and technology, people use more and more types of electrical equipment and the functions are more and more complicated, which put forward higher requirements on the construction quality of electrical construction. If you ignore some of the necessary quality requirements and violate the specification of operation in the process of building electrical construction, that will bring great security risks and resulting in huge economic losses, even endanger personal safety. Manage and control construction quality of building electrical construction must be carried out throughout the whole process of construction. According to the construction characteristics of building electrical construction, this article analyze the construction details that are easy to be ignored but very important in the construction, based on management theory and put forward the methods of quality management in the whole process of building electrical construction. This template explains and demonstrates how to prepare your camera-ready paper for Trans Tech Publications. The best is to read these instructions and follow the outline of this text.

  14. 77 FR 66663 - Agency Information Collection Activities: Proposed Information Collection; Submission for OMB Review

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-06

    ... titled, ``Company-Run Annual Stress Test Reporting Template and Documentation for Covered Institutions... review and clearance. Company-Run Annual Stress Test Reporting Template and Documentation for Covered... savings associations, to conduct annual stress tests \\2\\ and requires the primary financial regulatory...

  15. A robust and non-invertible fingerprint template for fingerprint matching system.

    PubMed

    Trivedi, Amit Kumar; Thounaojam, Dalton Meitei; Pal, Shyamosree

    2018-05-20

    Fingerprint Recognition System is widely deployed in variety of application domain, ranging from forensic to mobile phones. Its widespread deployment in various applications were person authentication are required, has caused concern that a leaked fingerprint template may be used to reconstruct the original fingerprint and the reconstructed fingerprint can be used to circumvent all the applications the person is enrolled. In this paper, a non-invertible fingerprint template that stores only the relative geometric information about the minutiae points is proposed. The spatial location of the minutiae points in original fingerprint and its orientations are not available in the proposed template which makes it impossible to estimate the orientation of fingerprint from the template. The proposed template is invariant to rotation, translation and distortion and immune to reconstruction algorithm. The proposed system is experimented using standard FVC2000 database and yields better results in terms of EER and FMR as compared with latest techniques. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. 49 CFR 579.29 - Manner of reporting.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... identified on NHTSA's Internet homepage (www.nhtsa.dot.gov). A manufacturer must use templates provided at... templates. (2) Each report required under § 579.27 of this part may be submitted to NHTSA's early warning... through 579.26 of this part may be submitted in digital form using a graphic compression protocol...

  17. 49 CFR 579.29 - Manner of reporting.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... identified on NHTSA's Internet homepage (www.nhtsa.dot.gov). A manufacturer must use templates provided at... templates. (2) Each report required under § 579.27 of this part may be submitted to NHTSA's early warning... through 579.26 of this part may be submitted in digital form using a graphic compression protocol...

  18. 49 CFR 579.29 - Manner of reporting.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... identified on NHTSA's Internet homepage (www.nhtsa.dot.gov). A manufacturer must use templates provided at... templates. (2) Each report required under § 579.27 of this part may be submitted to NHTSA's early warning... through 579.26 of this part may be submitted in digital form using a graphic compression protocol...

  19. 49 CFR 579.29 - Manner of reporting.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... identified on NHTSA's Internet homepage (www.nhtsa.dot.gov). A manufacturer must use templates provided at... templates. (2) Each report required under § 579.27 of this part may be submitted to NHTSA's early warning... through 579.26 of this part may be submitted in digital form using a graphic compression protocol...

  20. Base pairing among three cis-acting sequences contributes to template switching during hepadnavirus reverse transcription

    PubMed Central

    Liu, Ning; Tian, Ru; Loeb, Daniel D.

    2003-01-01

    Synthesis of the relaxed-circular (RC) DNA genome of hepadnaviruses requires two template switches during plus-strand DNA synthesis: primer translocation and circularization. Although primer translocation and circularization use different donor and acceptor sequences, and are distinct temporally, they share the common theme of switching from one end of the minus-strand template to the other end. Studies of duck hepatitis B virus have indicated that, in addition to the donor and acceptor sequences, three other cis-acting sequences, named 3E, M, and 5E, are required for the synthesis of RC DNA by contributing to primer translocation and circularization. The mechanism by which 3E, M, and 5E act was not known. We present evidence that these sequences function by base pairing with each other within the minus-strand template. 3E base-pairs with one portion of M (M3) and 5E base-pairs with an adjacent portion of M (M5). We found that disrupting base pairing between 3E and M3 and between 5E and M5 inhibited primer translocation and circularization. More importantly, restoring base pairing with mutant sequences restored the production of RC DNA. These results are consistent with the model that, within duck hepatitis B virus capsids, the ends of the minus-strand template are juxtaposed via base pairing to facilitate the two template switches during plus-strand DNA synthesis. PMID:12578983

  1. Strand displacement by DNA polymerase III occurs through a tau-psi-chi link to single-stranded DNA-binding protein coating the lagging strand template.

    PubMed

    Yuan, Quan; McHenry, Charles S

    2009-11-13

    In addition to the well characterized processive replication reaction catalyzed by the DNA polymerase III holoenzyme on single-stranded DNA templates, the enzyme possesses an intrinsic strand displacement activity on flapped templates. The strand displacement activity is distinguished from the single-stranded DNA-templated reaction by a high dependence upon single-stranded DNA binding protein and an inability of gamma-complex to support the reaction in the absence of tau. However, if gamma-complex is present to load beta(2), a truncated tau protein containing only domains III-V will suffice. This truncated protein is sufficient to bind both the alpha subunit of DNA polymerase (Pol) III and chipsi. This is reminiscent of the minimal requirements for Pol III to replicate short single-stranded DNA-binding protein (SSB)-coated templates where tau is only required to serve as a scaffold to hold Pol III and chi in the same complex (Glover, B., and McHenry, C. (1998) J. Biol. Chem. 273, 23476-23484). We propose a model in which strand displacement by DNA polymerase III holoenzyme depends upon a Pol III-tau-psi-chi-SSB binding network, where SSB is bound to the displaced strand, stabilizing the Pol III-template interaction. The same interaction network is probably important for stabilizing the leading strand polymerase interactions with authentic replication forks. The specificity constant (k(cat)/K(m)) for the strand displacement reaction is approximately 300-fold less favorable than reactions on single-stranded templates and proceeds with a slower rate (150 nucleotides/s) and only moderate processivity (approximately 300 nucleotides). PriA, the initiator of replication restart on collapsed or misassembled replication forks, blocks the strand displacement reaction, even if added to an ongoing reaction.

  2. Ferritin-Templated Quantum-Dots for Quantum Logic Gates

    NASA Technical Reports Server (NTRS)

    Choi, Sang H.; Kim, Jae-Woo; Chu, Sang-Hyon; Park, Yeonjoon; King, Glen C.; Lillehei, Peter T.; Kim, Seon-Jeong; Elliott, James R.

    2005-01-01

    Quantum logic gates (QLGs) or other logic systems are based on quantum-dots (QD) with a stringent requirement of size uniformity. The QD are widely known building units for QLGs. The size control of QD is a critical issue in quantum-dot fabrication. The work presented here offers a new method to develop quantum-dots using a bio-template, called ferritin, that ensures QD production in uniform size of nano-scale proportion. The bio-template for uniform yield of QD is based on a ferritin protein that allows reconstitution of core material through the reduction and chelation processes. One of the biggest challenges for developing QLG is the requirement of ordered and uniform size of QD for arrays on a substrate with nanometer precision. The QD development by bio-template includes the electrochemical/chemical reconsitution of ferritins with different core materials, such as iron, cobalt, manganese, platinum, and nickel. The other bio-template method used in our laboratory is dendrimers, precisely defined chemical structures. With ferritin-templated QD, we fabricated the heptagonshaped patterned array via direct nano manipulation of the ferritin molecules with a tip of atomic force microscope (AFM). We also designed various nanofabrication methods of QD arrays using a wide range manipulation techniques. The precise control of the ferritin-templated QD for a patterned arrangement are offered by various methods, such as a site-specific immobilization of thiolated ferritins through local oxidation using the AFM tip, ferritin arrays induced by gold nanoparticle manipulation, thiolated ferritin positioning by shaving method, etc. In the signal measurements, the current-voltage curve is obtained by measuring the current through the ferritin, between the tip and the substrate for potential sweeping or at constant potential. The measured resistance near zero bias was 1.8 teraohm for single holoferritin and 5.7 teraohm for single apoferritin, respectively.

  3. A template-based approach for responsibility management in executable business processes

    NASA Astrophysics Data System (ADS)

    Cabanillas, Cristina; Resinas, Manuel; Ruiz-Cortés, Antonio

    2018-05-01

    Process-oriented organisations need to manage the different types of responsibilities their employees may have w.r.t. the activities involved in their business processes. Despite several approaches provide support for responsibility modelling, in current Business Process Management Systems (BPMS) the only responsibility considered at runtime is the one related to performing the work required for activity completion. Others like accountability or consultation must be implemented by manually adding activities in the executable process model, which is time-consuming and error-prone. In this paper, we address this limitation by enabling current BPMS to execute processes in which people with different responsibilities interact to complete the activities. We introduce a metamodel based on Responsibility Assignment Matrices (RAM) to model the responsibility assignment for each activity, and a flexible template-based mechanism that automatically transforms such information into BPMN elements, which can be interpreted and executed by a BPMS. Thus, our approach does not enforce any specific behaviour for the different responsibilities but new templates can be modelled to specify the interaction that best suits the activity requirements. Furthermore, libraries of templates can be created and reused in different processes. We provide a reference implementation and build a library of templates for a well-known set of responsibilities.

  4. Design and Fabrication of a Precision Template for Spine Surgery Using Selective Laser Melting (SLM).

    PubMed

    Wang, Di; Wang, Yimeng; Wang, Jianhua; Song, Changhui; Yang, Yongqiang; Zhang, Zimian; Lin, Hui; Zhen, Yongqiang; Liao, Suixiang

    2016-07-22

    In order to meet the clinical requirements of spine surgery, this paper proposes the fabrication of the customized template for spine surgery through computer-aided design. A 3D metal printing-selective laser melting (SLM) technique was employed to directly fabricate the 316L stainless steel template, and the metal template with tiny locating holes was used as an auxiliary tool to insert spinal screws inside the patient's body. To guarantee accurate fabrication of the template for cervical vertebra operation, the contact face was placed upwards to improve the joint quality between the template and the cervical vertebra. The joint surface of the printed template had a roughness of Ra = 13 ± 2 μm. After abrasive blasting, the surface roughness was Ra = 7 ± 0.5 μm. The surgical metal template was bound with the 3D-printed Acrylonitrile Butadiene Styrene (ABS) plastic model. The micro-hardness values determined at the cross-sections of SLM-processed samples varied from HV0.3 250 to HV0.3 280, and the measured tensile strength was in the range of 450 MPa to 560 MPa, which showed that the template had requisite strength. Finally, the metal template was clinically used in the patient's surgical operation, and the screws were inserted precisely as the result of using the auxiliary template. The geometrical parameters of the template hole (e.g., diameter and wall thickness) were optimized, and measures were taken to optimize the key geometrical units (e.g., hole units) in metal 3D printing. Compared to the traditional technology of screw insertion, the use of the surgical metal template enabled the screws to be inserted more easily and accurately during spinal surgery. However, the design of the high-quality template should fully take into account the clinical demands of surgeons, as well as the advice of the designing engineers and operating technicians.

  5. Design and Fabrication of a Precision Template for Spine Surgery Using Selective Laser Melting (SLM)

    PubMed Central

    Wang, Di; Wang, Yimeng; Wang, Jianhua; Song, Changhui; Yang, Yongqiang; Zhang, Zimian; Lin, Hui; Zhen, Yongqiang; Liao, Suixiang

    2016-01-01

    In order to meet the clinical requirements of spine surgery, this paper proposes the fabrication of the customized template for spine surgery through computer-aided design. A 3D metal printing-selective laser melting (SLM) technique was employed to directly fabricate the 316L stainless steel template, and the metal template with tiny locating holes was used as an auxiliary tool to insert spinal screws inside the patient’s body. To guarantee accurate fabrication of the template for cervical vertebra operation, the contact face was placed upwards to improve the joint quality between the template and the cervical vertebra. The joint surface of the printed template had a roughness of Ra = 13 ± 2 μm. After abrasive blasting, the surface roughness was Ra = 7 ± 0.5 μm. The surgical metal template was bound with the 3D-printed Acrylonitrile Butadiene Styrene (ABS) plastic model. The micro-hardness values determined at the cross-sections of SLM-processed samples varied from HV0.3 250 to HV0.3 280, and the measured tensile strength was in the range of 450 MPa to 560 MPa, which showed that the template had requisite strength. Finally, the metal template was clinically used in the patient’s surgical operation, and the screws were inserted precisely as the result of using the auxiliary template. The geometrical parameters of the template hole (e.g., diameter and wall thickness) were optimized, and measures were taken to optimize the key geometrical units (e.g., hole units) in metal 3D printing. Compared to the traditional technology of screw insertion, the use of the surgical metal template enabled the screws to be inserted more easily and accurately during spinal surgery. However, the design of the high-quality template should fully take into account the clinical demands of surgeons, as well as the advice of the designing engineers and operating technicians. PMID:28773730

  6. Face biometrics with renewable templates

    NASA Astrophysics Data System (ADS)

    van der Veen, Michiel; Kevenaar, Tom; Schrijen, Geert-Jan; Akkermans, Ton H.; Zuo, Fei

    2006-02-01

    In recent literature, privacy protection technologies for biometric templates were proposed. Among these is the so-called helper-data system (HDS) based on reliable component selection. In this paper we integrate this approach with face biometrics such that we achieve a system in which the templates are privacy protected, and multiple templates can be derived from the same facial image for the purpose of template renewability. Extracting binary feature vectors forms an essential step in this process. Using the FERET and Caltech databases, we show that this quantization step does not significantly degrade the classification performance compared to, for example, traditional correlation-based classifiers. The binary feature vectors are integrated in the HDS leading to a privacy protected facial recognition algorithm with acceptable FAR and FRR, provided that the intra-class variation is sufficiently small. This suggests that a controlled enrollment procedure with a sufficient number of enrollment measurements is required.

  7. The INIA19 Template and NeuroMaps Atlas for Primate Brain Image Parcellation and Spatial Normalization

    PubMed Central

    Rohlfing, Torsten; Kroenke, Christopher D.; Sullivan, Edith V.; Dubach, Mark F.; Bowden, Douglas M.; Grant, Kathleen A.; Pfefferbaum, Adolf

    2012-01-01

    The INIA19 is a new, high-quality template for imaging-based studies of non-human primate brains, created from high-resolution, T1-weighted magnetic resonance (MR) images of 19 rhesus macaque (Macaca mulatta) animals. Combined with the comprehensive cortical and sub-cortical label map of the NeuroMaps atlas, the INIA19 is equally suitable for studies requiring both spatial normalization and atlas label propagation. Population-averaged template images are provided for both the brain and the whole head, to allow alignment of the atlas with both skull-stripped and unstripped data, and thus to facilitate its use for skull stripping of new images. This article describes the construction of the template using freely available software tools, as well as the template itself, which is being made available to the scientific community (http://nitrc.org/projects/inia19/). PMID:23230398

  8. A general design strategy for block copolymer directed self-assembly patterning of integrated circuits contact holes using an alphabet approach.

    PubMed

    Yi, He; Bao, Xin-Yu; Tiberio, Richard; Wong, H-S Philip

    2015-02-11

    Directed self-assembly (DSA) is a promising lithography candidate for technology nodes beyond 14 nm. Researchers have shown contact hole patterning for random logic circuits using DSA with small physical templates. This paper introduces an alphabet approach that uses a minimal set of small physical templates to pattern all contacts configurations on integrated circuits. We illustrate, through experiments, a general and scalable template design strategy that links the DSA material properties to the technology node requirements.

  9. Mechanism of transcription termination by RNA polymerase III utilizes a nontemplate-strand sequence-specific signal element

    PubMed Central

    Arimbasseri, Aneeshkumar G.; Maraia, Richard J.

    2015-01-01

    SUMMARY Understanding the mechanism of transcription termination by a eukaryotic RNA polymerase (RNAP) has been limited by lack of a characterizable intermediate that reflects transition from an elongation complex to a true termination event. While other multisubunit RNAPs require multipartite cis-signals and/or ancillary factors to mediate pausing and release of the nascent transcript from the clutches of these enzymes, RNAP III does so with precision and efficiency on a simple oligo(dT) tract, independent of other cis-elements or trans-factors. We report a RNAP III pre-termination complex that reveals termination mechanisms controlled by sequence-specific elements in the non-template strand. Furthermore, the TFIIF-like, RNAP III subunit, C37 is required for this function of the non-template strand signal. The results reveal the RNAP III terminator as an information-rich control element. While the template strand promotes destabilization via a weak oligo(rU:dA) hybrid, the non-template strand provides distinct sequence-specific destabilizing information through interactions with the C37 subunit. PMID:25959395

  10. Vocal learning beyond imitation: mechanisms of adaptive vocal development in songbirds and human infants

    PubMed Central

    Tchernichovski, Ofer; Marcus, Gary

    2014-01-01

    Studies of vocal learning in songbirds typically focus on the acquisition of sensory templates for song imitation and on the consequent process of matching song production to templates. However, functional vocal development also requires the capacity to adaptively diverge from sensory templates, and to flexibly assemble vocal units. Examples of adaptive divergence include the corrective imitation of abnormal songs, and the decreased tendency to copy overabundant syllables. Such frequency-dependent effects might mirror tradeoffs between the assimilation of group identity (culture) while establishing individual and flexibly expressive songs. Intriguingly, although the requirements for vocal plasticity vary across songbirds, and more so between birdsong and language, the capacity to flexibly assemble vocal sounds develops in a similar, stepwise manner across species. Therefore, universal features of vocal learning go well beyond the capacity to imitate. PMID:25005823

  11. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  12. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  13. Secure Recognition of Voice-Less Commands Using Videos

    NASA Astrophysics Data System (ADS)

    Yau, Wai Chee; Kumar, Dinesh Kant; Weghorn, Hans

    Interest in voice recognition technologies for internet applications is growing due to the flexibility of speech-based communication. The major drawback with the use of sound for internet access with computers is that the commands will be audible to other people in the vicinity. This paper examines a secure and voice-less method for recognition of speech-based commands using video without evaluating sound signals. The proposed approach represents mouth movements in the video data using 2D spatio-temporal templates (STT). Zernike moments (ZM) are computed from STT and fed into support vector machines (SVM) to be classified into one of the utterances. The experimental results demonstrate that the proposed technique produces a high accuracy of 98% in a phoneme classification task. The proposed technique is demonstrated to be invariant to global variations of illumination level. Such a system is useful for securely interpreting user commands for internet applications on mobile devices.

  14. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    PubMed

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  15. Stochastic Template Bank for Gravitational Wave Searches for Precessing Neutron Star-Black Hole Coalescence Events

    NASA Technical Reports Server (NTRS)

    Indik, Nathaniel; Haris, K.; Dal Canton, Tito; Fehrmann, Henning; Krishnan, Badri; Lundgren, Andrew; Nielsen, Alex B.; Pai, Archana

    2017-01-01

    Gravitational wave searches to date have largely focused on non-precessing systems. Including precession effects greatly increases the number of templates to be searched over. This leads to a corresponding increase in the computational cost and can increase the false alarm rate of a realistic search. On the other hand, there might be astrophysical systems that are entirely missed by non-precessing searches. In this paper we consider the problem of constructing a template bank using stochastic methods for neutron star-black hole binaries allowing for precession, but with the restrictions that the total angular momentum of the binary is pointing toward the detector and that the neutron star spin is negligible relative to that of the black hole. We quantify the number of templates required for the search, and we explicitly construct the template bank. We show that despite the large number of templates, stochastic methods can be adapted to solve the problem. We quantify the parameter space region over which the non-precessing search might miss signals.

  16. Mesoporous silicon oxide films and their uses as templates in obtaining nanostructured conductive polymers

    NASA Astrophysics Data System (ADS)

    Salgado, R.; Arteaga, G. C.; Arias, J. M.

    2018-04-01

    Obtaining conductive polymers (CPs) for the manufacture of OLEDs, solar cells, electrochromic devices, sensors, etc., has been possible through the use of electrochemical techniques that allow obtaining films of controlled thickness with positive results in different applications. Current trends point towards the manufacture of nanomaterials, and therefore it is necessary to develop methods that allow obtaining CPs with nanostructured morphology. This is possible by using a porous template to allow the growth of the polymeric materials. However, prior and subsequent treatments are required to separate the material from the template so that it can be evaluated in the applications mentioned above. This is why mesoporous silicon oxide films (template) are essential for the synthesis of nanostructured polymers since both the template and the polymer are obtained on the electrode surface, and therefore it is not necessary to separate the material from the template. Thus, the material can be evaluated directly in the applications mentioned above. The dimensions of the resulting nanostructures will depend on the power, time and technique used for electropolymerization as well as the monomer and the surfactant of the mesoporous film.

  17. HIT: a new approach for hiding multimedia information in text

    NASA Astrophysics Data System (ADS)

    El-Kwae, Essam A.; Cheng, Li

    2002-04-01

    A new technique for hiding multimedia data in text, called the Hiding in Text (HIT) technique, is introduced. The HIT technique can transform any type of media represented by a long binary string into innocuous text that follows correct grammatical rules. This technique divides English words into types where each word can appear in any number of types. For each type, there is a dictionary, which maps words to binary codes. Marker types are special types whose words do not repeat in any other type. Each generated sentence must include at least one word from the marker type. In the hiding phase, a binary string is input to the HIT encoding algorithm, which then selects sentence templates at random. The output is a set of English sentences according to the selected templates and the dictionaries of types. In the retrieving phase, the HIT technique uses the position of the marker word to identify the template used to build each sentence. The proposed technique greatly improves the efficiency and the security features of previous solutions. Examples for hiding text and image information in a cover text are given to illustrate the HIT technique.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Colbert, C.; Moles, D.R.

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Securitymore » Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.« less

  19. Correlation-coefficient-based fast template matching through partial elimination.

    PubMed

    Mahmood, Arif; Khan, Sohaib

    2012-04-01

    Partial computation elimination techniques are often used for fast template matching. At a particular search location, computations are prematurely terminated as soon as it is found that this location cannot compete with an already known best match location. Due to the nonmonotonic growth pattern of the correlation-based similarity measures, partial computation elimination techniques have been traditionally considered inapplicable to speed up these measures. In this paper, we show that partial elimination techniques may be applied to a correlation coefficient by using a monotonic formulation, and we propose basic-mode and extended-mode partial correlation elimination algorithms for fast template matching. The basic-mode algorithm is more efficient on small template sizes, whereas the extended mode is faster on medium and larger templates. We also propose a strategy to decide which algorithm to use for a given data set. To achieve a high speedup, elimination algorithms require an initial guess of the peak correlation value. We propose two initialization schemes including a coarse-to-fine scheme for larger templates and a two-stage technique for small- and medium-sized templates. Our proposed algorithms are exact, i.e., having exhaustive equivalent accuracy, and are compared with the existing fast techniques using real image data sets on a wide variety of template sizes. While the actual speedups are data dependent, in most cases, our proposed algorithms have been found to be significantly faster than the other algorithms.

  20. I Can Cook!: A Template System for Teaching Meal-Preparation Skills.

    ERIC Educational Resources Information Center

    Schloss, Patrick J.; And Others

    1996-01-01

    Meal preparation skills and recipes for students with disabilities are organized into four types: foods requiring no cooking, stovetop use, baking, and microwave oven use. Templates for each type present frequently occurring words and procedures that can be used to prepare a number of foods, and recipes are presented involving the same set of…

  1. PCR-mediated recombination in amplification products derived from polyploid cotton.

    Treesearch

    Richard C. Cronn; M. Cedroni; T. Haselkorn; C. Grover; Jonathan F. Wendel

    2002-01-01

    PCR recombination describes a process of in vitro chimera formation from non-identical templates. The key requirements of this process is the inclusion of two partially homologous templates in one reaction, a condition met when amplifying any locus from polyploid organisms and members of multigene families from diploid organisms. Because polyploids possess two or more...

  2. A Tool for Determining the Number of Contributors: Interpreting Complex, Compromised Low-Template Dna Samples

    DTIC Science & Technology

    2017-09-28

    SECURITY CLASSIFICATION OF: In forensic DNA analysis, the interpretation of a sample acquired from the environment may be dependent upon the...sample acquired from the environment may be dependent upon the assumption on the number of individuals from which the evidence arose. Degraded and...NOCIt results to those obtained when allele counting or maxiumum likelihood estimator (MLE) methods are employed. NOCIt does not depend upon an AT and

  3. Refighting the Last War: Afghanistan and the Vietnam Template

    DTIC Science & Technology

    2009-12-01

    2 November-December 2009  MILITARY REVIEW Thomas H. Johnson is a research professor for the Department of Na- tional Security Affairs and director...Valley of Afghanistan’s Wardak Province, 19 August 2009. (AP Photo, David Goldman) Thomas H. Johnson and M. Chris Mason IT IS AN oft-cited maxim that...in Afghanistan. President Obama certainly knows, as Presidents Johnson and Nixon did in similar circumstances, that the choice of alter- natives now

  4. Fractionation and reconstitution of factors required for accurate transcription of mammalian ribosomal RNA genes: identification of a species-dependent initiation factor.

    PubMed Central

    Mishima, Y; Financsek, I; Kominami, R; Muramatsu, M

    1982-01-01

    Mouse and human cell extracts (S100) can support an accurate and efficient transcription initiation on homologous ribosomal RNA gene (rDNA) templates. The cell extracts were fractionated with the aid of a phosphocellulose column into four fractions (termed A, B, C and D), including one containing a major part of the RNA polymerase I activity. Various reconstitution experiments indicate that fraction D is an absolute requirement for the correct and efficient transcription initiation by RNA polymerase I on both mouse and human genes. Fraction B effectively suppresses random initiation on these templates. Fraction A appears to further enhance the transcription which takes place with fractions C and D. Although fractions A, B and C are interchangeable between mouse and human extracts, fraction D is not; i.e. initiation of transcription required the presence of a homologous fraction D for both templates. The factor(s) in fraction D, however, is not literally species-specific, since mouse D fraction is capable of supporting accurate transcription initiation on a rat rDNA template in the presence of all the other fractions from human cell extract under the conditions where human D fraction is unable to support it. We conclude from these experiments that a species-dependent factor in fraction D plays an important role in the initiation of rDNA transcription in each animal species. Images PMID:7177852

  5. Mechanical Energy Harvesting Performance of Ferroelectric Polymer Nanowires Grown via Template‐Wetting

    PubMed Central

    Whiter, Richard A.; Boughey, Chess; Smith, Michael

    2018-01-01

    Abstract Nanowires of the ferroelectric co‐polymer poly(vinylidenefluoride‐co‐triufloroethylene) [P(VDF‐TrFE)] are fabricated from solution within nanoporous templates of both “hard” anodic aluminium oxide (AAO) and “soft” polyimide (PI) through a facile and scalable template‐wetting process. The confined geometry afforded by the pores of the templates leads directly to highly crystalline P(VDF‐TrFE) nanowires in a macroscopic “poled” state that precludes the need for external electrical poling procedure typically required for piezoelectric performance. The energy‐harvesting performance of nanogenerators based on these template‐grown nanowires are extensively studied and analyzed in combination with finite element modelling. Both experimental results and computational models probing the role of the templates in determining overall nanogenerator performance, including both materials and device efficiencies, are presented. It is found that although P(VDF‐TrFE) nanowires grown in PI templates exhibit a lower material efficiency due to lower crystallinity as compared to nanowires grown in AAO templates, the overall device efficiency was higher for the PI‐template‐based nanogenerator because of the lower stiffness of the PI template as compared to the AAO template. This work provides a clear framework to assess the energy conversion efficiency of template‐grown piezoelectric nanowires and paves the way towards optimization of template‐based nanogenerator devices.

  6. Understanding the General Packing Rearrangements Required for Successful Template Based Modeling of Protein Structure from a CASP Experiment

    PubMed Central

    Day, Ryan; Joo, Hyun; Chavan, Archana; Lennox, Kristin P.; Chen, Ann; Dahl, David B.; Vannucci, Marina; Tsai, Jerry W.

    2012-01-01

    As an alternative to the common template based protein structure prediction methods based on main-chain position, a novel side-chain centric approach has been developed. Together with a Bayesian loop modeling procedure and a combination scoring function, the Stone Soup algorithm was applied to the CASP9 set of template based modeling targets. Although the method did not generate as large of perturbations to the template structures as necessary, the analysis of the results gives unique insights into the differences in packing between the target structures and their templates. Considerable variation in packing is found between target and template structures even when the structures are close, and this variation is found due to 2 and 3 body packing interactions. Outside the inherent restrictions in packing representation of the PDB, the first steps in correctly defining those regions of variable packing have been mapped primarily to local interactions, as the packing at the secondary and tertiary structure are largely conserved. Of the scoring functions used, a loop scoring function based on water structure exhibited some promise for discrimination. These results present a clear structural path for further development of a side-chain centered approach to template based modeling. PMID:23266765

  7. Understanding the general packing rearrangements required for successful template based modeling of protein structure from a CASP experiment.

    PubMed

    Day, Ryan; Joo, Hyun; Chavan, Archana C; Lennox, Kristin P; Chen, Y Ann; Dahl, David B; Vannucci, Marina; Tsai, Jerry W

    2013-02-01

    As an alternative to the common template based protein structure prediction methods based on main-chain position, a novel side-chain centric approach has been developed. Together with a Bayesian loop modeling procedure and a combination scoring function, the Stone Soup algorithm was applied to the CASP9 set of template based modeling targets. Although the method did not generate as large of perturbations to the template structures as necessary, the analysis of the results gives unique insights into the differences in packing between the target structures and their templates. Considerable variation in packing is found between target and template structures even when the structures are close, and this variation is found due to 2 and 3 body packing interactions. Outside the inherent restrictions in packing representation of the PDB, the first steps in correctly defining those regions of variable packing have been mapped primarily to local interactions, as the packing at the secondary and tertiary structure are largely conserved. Of the scoring functions used, a loop scoring function based on water structure exhibited some promise for discrimination. These results present a clear structural path for further development of a side-chain centered approach to template based modeling. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Telomerase Mechanism of Telomere Synthesis

    PubMed Central

    Wu, R. Alex; Upton, Heather E.; Vogan, Jacob M.; Collins, Kathleen

    2017-01-01

    Telomerase is the essential reverse transcriptase required for linear chromosome maintenance in most eukaryotes. Telomerase supplements the tandem array of simple-sequence repeats at chromosome ends to compensate for the DNA erosion inherent in genome replication. The template for telomerase reverse transcriptase is within the RNA subunit of the ribonucleoprotein complex, which in cells contains additional telomerase holoenzyme proteins that assemble the active ribonucleoprotein and promote its function at telomeres. Telomerase is distinct among polymerases in its reiterative reuse of an internal template. The template is precisely defined, processively copied, and regenerated by release of single-stranded product DNA. New specificities of nucleic acid handling that underlie the catalytic cycle of repeat synthesis derive from both active site specialization and new motif elaborations in protein and RNA subunits. Studies of telomerase provide unique insights into cellular requirements for genome stability, tissue renewal, and tumorigenesis as well as new perspectives on dynamic ribonucleoprotein machines. PMID:28141967

  9. Methodology of the determination of the uncertainties by using the biometric device the broadway 3D

    NASA Astrophysics Data System (ADS)

    Jasek, Roman; Talandova, Hana; Adamek, Milan

    2016-06-01

    The biometric identification by face is among one of the most widely used methods of biometric identification. Due to it provides a faster and more accurate identification; it was implemented into area of security 3D face reader by Broadway manufacturer was used to measure. It is equipped with the 3D camera system, which uses the method of structured light scanning and saves the template into the 3D model of face. The obtained data were evaluated by software Turnstile Enrolment Application (TEA). The measurements were used 3D face reader the Broadway 3D. First, the person was scanned and stored in the database. Thereafter person has already been compared with the stored template in the database for each method. Finally, a measure of reliability was evaluated for the Broadway 3D face reader.

  10. Chromosome rearrangements via template switching between diverged repeated sequences

    PubMed Central

    Anand, Ranjith P.; Tsaponina, Olga; Greenwell, Patricia W.; Lee, Cheng-Sheng; Du, Wei; Petes, Thomas D.

    2014-01-01

    Recent high-resolution genome analyses of cancer and other diseases have revealed the occurrence of microhomology-mediated chromosome rearrangements and copy number changes. Although some of these rearrangements appear to involve nonhomologous end-joining, many must have involved mechanisms requiring new DNA synthesis. Models such as microhomology-mediated break-induced replication (MM-BIR) have been invoked to explain these rearrangements. We examined BIR and template switching between highly diverged sequences in Saccharomyces cerevisiae, induced during repair of a site-specific double-strand break (DSB). Our data show that such template switches are robust mechanisms that give rise to complex rearrangements. Template switches between highly divergent sequences appear to be mechanistically distinct from the initial strand invasions that establish BIR. In particular, such jumps are less constrained by sequence divergence and exhibit a different pattern of microhomology junctions. BIR traversing repeated DNA sequences frequently results in complex translocations analogous to those seen in mammalian cells. These results suggest that template switching among repeated genes is a potent driver of genome instability and evolution. PMID:25367035

  11. Template protocol for clinical trials investigating vaccines—Focus on safety elements☆

    PubMed Central

    Bonhoeffer, Jan; Imoukhuede, Egeruan B.; Aldrovandi, Grace; Bachtiar, Novilia S.; Chan, Eng-Soon; Chang, Soju; Chen, Robert T.; Fernandopulle, Rohini; Goldenthal, Karen L.; Heffelfinger, James D.; Hossain, Shah; Jevaji, Indira; Khamesipour, Ali; Kochhar, Sonali; Makhene, Mamodikoe; Malkin, Elissa; Nalin, David; Prevots, Rebecca; Ramasamy, Ranjan; Sellers, Sarah; Vekemans, Johan; Walker, Kenneth B.; Wilson, Pam; Wong, Virginia; Zaman, Khalequz; Heininger, Ulrich

    2015-01-01

    This document is intended as a guide to the protocol development for trials of prophylactic vaccines. The template may serve phases I–IV clinical trials protocol development to include safety relevant information as required by the regulatory authorities and as deemed useful by the investigators. This document may also be helpful for future site strengthening efforts. PMID:23499603

  12. Stereoselective aminoacylation of RNA

    NASA Technical Reports Server (NTRS)

    Usher, D. A.; Needels, M. C.; Brenner, T.

    1986-01-01

    Prebiotic chemistry is faced with a major problem: how could a controlled and selective reaction occur, when there is present in the same solution a large number of alternative possible coreactants? This problem is solved in the modern cell by the presence of enzymes, which are not only highly efficient and controllable catalysts, but which also can impose on their substrates a precise structural requirement. However, enzymes are the result of billions of years of evolution, and we cannot invoke them as prebiotic catalysts. One approach to solving this problem in the prebiotic context is to make use of template-directed reactions. These reactions increase the number of structural requirements that must be simultaneously present in a molecule for it to be able to react, and thereby increase the selectivity of the reaction. They also can give a large increase in the rate of a reaction, if the template constrains two potential coreactants to lie close together. A third benefit is that information that is present in the template molecule can be passed on to the product molecules. If the earliest organisms were based on proteins and nucleic acids, then the investigation of peptide synthesis on an oligonucleotide template is highly relevant to the study of the origin of life.

  13. A generic rate equation for catalysed, template-directed polymerisation.

    PubMed

    Hofmeyr, Jan-Hendrik S; Gqwaka, Olona P C; Rohwer, Johann M

    2013-09-02

    Biosynthetic networks link to growth and reproduction processes through template-directed synthesis of macromolecules such as polynucleotides and polypeptides. No rate equation exists that captures this link in a way that it can effectively be incorporated into a single computational model of the overall process. This paper describes the derivation of such a generic steady-state rate equation for catalysed, template-directed polymerisation reactions with varying monomer stoichiometry and varying chain length. The derivation is based on a classical Michaelis-Menten mechanism with template binding and an arbitrary number of chain elongation steps that produce a polymer composed of an arbitrary number of monomer types. The rate equation only requires the identity of the first dimer in the polymer sequence; for the remainder only the monomer composition needs be known. Further simplification of a term in the denominator yielded an equation requiring no positional information at all, only the monomer composition of the polymer; this equation still gave an excellent estimate of the reaction rate provided that either the monomer concentrations are at least half-saturating, or the polymer is very long. Copyright © 2013 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  14. Automatic delineation of brain regions on MRI and PET images from the pig.

    PubMed

    Villadsen, Jonas; Hansen, Hanne D; Jørgensen, Louise M; Keller, Sune H; Andersen, Flemming L; Petersen, Ida N; Knudsen, Gitte M; Svarer, Claus

    2018-01-15

    The increasing use of the pig as a research model in neuroimaging requires standardized processing tools. For example, extraction of regional dynamic time series from brain PET images requires parcellation procedures that benefit from being automated. Manual inter-modality spatial normalization to a MRI atlas is operator-dependent, time-consuming, and can be inaccurate with lack of cortical radiotracer binding or skull uptake. A parcellated PET template that allows for automatic spatial normalization to PET images of any radiotracer. MRI and [ 11 C]Cimbi-36 PET scans obtained in sixteen pigs made the basis for the atlas. The high resolution MRI scans allowed for creation of an accurately averaged MRI template. By aligning the within-subject PET scans to their MRI counterparts, an averaged PET template was created in the same space. We developed an automatic procedure for spatial normalization of the averaged PET template to new PET images and hereby facilitated transfer of the atlas regional parcellation. Evaluation of the automatic spatial normalization procedure found the median voxel displacement to be 0.22±0.08mm using the MRI template with individual MRI images and 0.92±0.26mm using the PET template with individual [ 11 C]Cimbi-36 PET images. We tested the automatic procedure by assessing eleven PET radiotracers with different kinetics and spatial distributions by using perfusion-weighted images of early PET time frames. We here present an automatic procedure for accurate and reproducible spatial normalization and parcellation of pig PET images of any radiotracer with reasonable blood-brain barrier penetration. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Security Requirements Management in Software Product Line Engineering

    NASA Astrophysics Data System (ADS)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  16. The role of an occlusal template during the placement of preformed metal crowns in children under general anaesthesia: a randomised control trial.

    PubMed

    Pani, S C; Dimashkieh, M; Mojaleed, F; Al Shammery, F

    2015-12-01

    This aim was to evaluate preformed metal crowns (PMC) placed under general anaesthesia using an occlusal template in comparison to crowns placed without the use of a template. CONSORT protocols were followed in the design of the study. A total of 60 children between 4-7 years requiring pulpotomy and PMC for all primary molars met the inclusion criteria for this study. The control group comprised patients for whom the PMC were placed without the use of an occlusal template, while in the test group crowns were placed using a polyvinyl siloxane occlusal template. Patients were followed up at 24 h, 7 days, 3 and 6 months. The time taken for the placement of crowns, instances of post-operative discomfort, success or failure of the pulp therapy and loss of any crowns were compared between the groups. The mean time taken for completion of the procedure in the control group was significantly greater than the template group (t = 2.566, p = 0.013). Significantly fewer patients in the template group reported symptoms of discomfort or high points at the 24-h recall; however, these differences were not significant at the 1-week, 3- or 6-month recall. The use of an occlusal template for the placement of multiple PMC under general anaesthesia reduces the time taken for their placement and reduces the incidence of immediate post-operative discomfort.

  17. Templates of patient brochures for the preparation, administration and safe-handling of oral chemotherapy.

    PubMed

    Siden, Rivka; Kem, Ravie; Ostrenga, Andrew; Nicksy, Darcy; Bernhardt, Brooke; Bartholomew, Joy

    2014-06-01

    The increased use of oral chemotherapy for the treatment of cancer introduces new challenges for patients and caregivers. Among them are the ability to swallow oral solid dosage forms, the proper administration of the agents and the safe-handling of chemotherapeutic drugs in the home. Since these drugs are hazardous, proper preparation, administration, and disposition introduces a variety of safety issues. The increased toxicity of these drugs coupled with complicated dosing regimens and the occasional need to dilute the drug or measure a liquid dosage form require careful instruction of the patient and/or caregivers. The purpose of this project was to create templates for writing patient instruction brochures. A group of clinicians specializing in oncology from several institutions in the United States and Canada met through a series of conference calls. The group included pharmacists with a specialty in pediatric oncology, investigational drug pharmacists, and an oncology nurse practitioner. National guidelines and practices at each institution were used for the creation of templates to be used in developing templates for medication and formulation-specific instruction brochures. The group developed six templates. The templates ranged in scope from instructions on the administration of intact tablets or capsules to directions on opening capsules or crushing tablets and mixing the content with foods or liquids. Thirty-three drug-specific brochures were developed using the templates. Templates of patient brochures and drug-specific brochures on the safe handling of chemotherapy in the home can be created using a collaborative, multi-institutional approach.

  18. e-Stars Template Builder

    NASA Technical Reports Server (NTRS)

    Cox, Brian

    2003-01-01

    e-Stars Template Builder is a computer program that implements a concept of enabling users to rapidly gain access to information on projects of NASA's Jet Propulsion Laboratory. The information about a given project is not stored in a data base, but rather, in a network that follows the project as it develops. e-Stars Template Builder resides on a server computer, using Practical Extraction and Reporting Language (PERL) scripts to create what are called "e-STARS node templates," which are software constructs that allow for project-specific configurations. The software resides on the server and does not require specific software on the user machine except for an Internet browser. A user's computer need not be equipped with special software (other than an Internet-browser program). e-Stars Template Builder is compatible with Windows, Macintosh, and UNIX operating systems. A user invokes e-Stars Template Builder from a browser window. Operations that can be performed by the user include the creation of child processes and the addition of links and descriptions of documentation to existing pages or nodes. By means of this addition of "child processes" of nodes, a network that reflects the development of a project is generated.

  19. Template identification technology of nuclear warheads and components

    NASA Astrophysics Data System (ADS)

    Liu, Su-Ping; Gong, Jian; Hao, Fan-Hua; Hu, Guang-Chun

    2008-02-01

    Template identification technology (TIT) is designed for the scenarios where a batch of disarmed nuclear weapons or components would be dismantled to observe a nuclear disarmament treaty. The core function played by the TIT is to make a judgment on whether the verified item belongs to a certain kind of nuclear weapons or component (NW/NC) or to which kind the verified item belongs. This paper analyses the functions played by the TIT in the process of NW/NC dismantlement, and proposes that two phases would be followed when applying the TIT: firstly to establish NW/NC templates with a sample of size n drawn from a certain kind of disarmament NW; secondly to authenticate NW/NC by means of the TIT. This paper also expatiates some terms related to the concept of the TIT and investigates on the development status of NW/NC TIT based on radiation signatures. The study concludes that the design of template structure is crucial to the establishment of an effective TIT and that starting from different research angles and aiming at the same goal of classification different template structures and corresponding template identification methods can be built up to meet specific identification requirements.

  20. Estimating B1+ in the breast at 7 T using a generic template.

    PubMed

    van Rijssel, Michael J; Pluim, Josien P W; Luijten, Peter R; Gilhuijs, Kenneth G A; Raaijmakers, Alexander J E; Klomp, Dennis W J

    2018-05-01

    Dynamic contrast-enhanced MRI is the workhorse of breast MRI, where the diagnosis of lesions is largely based on the enhancement curve shape. However, this curve shape is biased by RF transmit (B 1 + ) field inhomogeneities. B 1 + field information is required in order to correct these. The use of a generic, coil-specific B 1 + template is proposed and tested. Finite-difference time-domain simulations for B 1 + were performed for healthy female volunteers with a wide range of breast anatomies. A generic B 1 + template was constructed by averaging simulations based on four volunteers. Three-dimensional B 1 + maps were acquired in 15 other volunteers. Root mean square error (RMSE) metrics were calculated between individual simulations and the template, and between individual measurements and the template. The agreement between the proposed template approach and a B 1 + mapping method was compared against the agreement between acquisition and reacquisition using the same mapping protocol. RMSE values (% of nominal flip angle) comparing individual simulations with the template were in the range 2.00-4.01%, with mean 2.68%. RMSE values comparing individual measurements with the template were in the range8.1-16%, with mean 11.7%. The agreement between the proposed template approach and a B 1 + mapping method was only slightly worse than the agreement between two consecutive acquisitions using the same mapping protocol in one volunteer: the range of agreement increased from ±16% of the nominal angle for repeated measurement to ±22% for the B 1 + template. With local RF transmit coils, intersubject differences in B 1 + fields of the breast are comparable to the accuracy of B 1 + mapping methods, even at 7 T. Consequently, a single generic B 1 + template suits subjects over a wide range of breast anatomies, eliminating the need for a time-consuming B 1 + mapping protocol. © 2018 The Authors. NMR in Biomedicine published by John Wiley & Sons Ltd.

  1. Estimating B 1 + in the breast at 7 T using a generic template

    PubMed Central

    Pluim, Josien P. W.; Luijten, Peter R.; Gilhuijs, Kenneth G. A.; Raaijmakers, Alexander J. E.; Klomp, Dennis W. J.

    2018-01-01

    Dynamic contrast‐enhanced MRI is the workhorse of breast MRI, where the diagnosis of lesions is largely based on the enhancement curve shape. However, this curve shape is biased by RF transmit (B 1 +) field inhomogeneities. B 1 + field information is required in order to correct these. The use of a generic, coil‐specific B 1 + template is proposed and tested. Finite‐difference time‐domain simulations for B 1 + were performed for healthy female volunteers with a wide range of breast anatomies. A generic B 1 + template was constructed by averaging simulations based on four volunteers. Three‐dimensional B 1 + maps were acquired in 15 other volunteers. Root mean square error (RMSE) metrics were calculated between individual simulations and the template, and between individual measurements and the template. The agreement between the proposed template approach and a B 1 + mapping method was compared against the agreement between acquisition and reacquisition using the same mapping protocol. RMSE values (% of nominal flip angle) comparing individual simulations with the template were in the range 2.00‐4.01%, with mean 2.68%. RMSE values comparing individual measurements with the template were in the range8.1‐16%, with mean 11.7%. The agreement between the proposed template approach and a B 1 + mapping method was only slightly worse than the agreement between two consecutive acquisitions using the same mapping protocol in one volunteer: the range of agreement increased from ±16% of the nominal angle for repeated measurement to ±22% for the B 1 + template. With local RF transmit coils, intersubject differences in B 1 + fields of the breast are comparable to the accuracy of B 1 + mapping methods, even at 7 T. Consequently, a single generic B 1 + template suits subjects over a wide range of breast anatomies, eliminating the need for a time‐consuming B 1 + mapping protocol. PMID:29570887

  2. 24/7 security system: 60-FPS color EMCCD camera with integral human recognition

    NASA Astrophysics Data System (ADS)

    Vogelsong, T. L.; Boult, T. E.; Gardner, D. W.; Woodworth, R.; Johnson, R. C.; Heflin, B.

    2007-04-01

    An advanced surveillance/security system is being developed for unattended 24/7 image acquisition and automated detection, discrimination, and tracking of humans and vehicles. The low-light video camera incorporates an electron multiplying CCD sensor with a programmable on-chip gain of up to 1000:1, providing effective noise levels of less than 1 electron. The EMCCD camera operates in full color mode under sunlit and moonlit conditions, and monochrome under quarter-moonlight to overcast starlight illumination. Sixty frame per second operation and progressive scanning minimizes motion artifacts. The acquired image sequences are processed with FPGA-compatible real-time algorithms, to detect/localize/track targets and reject non-targets due to clutter under a broad range of illumination conditions and viewing angles. The object detectors that are used are trained from actual image data. Detectors have been developed and demonstrated for faces, upright humans, crawling humans, large animals, cars and trucks. Detection and tracking of targets too small for template-based detection is achieved. For face and vehicle targets the results of the detection are passed to secondary processing to extract recognition templates, which are then compared with a database for identification. When combined with pan-tilt-zoom (PTZ) optics, the resulting system provides a reliable wide-area 24/7 surveillance system that avoids the high life-cycle cost of infrared cameras and image intensifiers.

  3. Using Semantic Web technologies for the generation of domain-specific templates to support clinical study metadata standards.

    PubMed

    Jiang, Guoqian; Evans, Julie; Endle, Cory M; Solbrig, Harold R; Chute, Christopher G

    2016-01-01

    The Biomedical Research Integrated Domain Group (BRIDG) model is a formal domain analysis model for protocol-driven biomedical research, and serves as a semantic foundation for application and message development in the standards developing organizations (SDOs). The increasing sophistication and complexity of the BRIDG model requires new approaches to the management and utilization of the underlying semantics to harmonize domain-specific standards. The objective of this study is to develop and evaluate a Semantic Web-based approach that integrates the BRIDG model with ISO 21090 data types to generate domain-specific templates to support clinical study metadata standards development. We developed a template generation and visualization system based on an open source Resource Description Framework (RDF) store backend, a SmartGWT-based web user interface, and a "mind map" based tool for the visualization of generated domain-specific templates. We also developed a RESTful Web Service informed by the Clinical Information Modeling Initiative (CIMI) reference model for access to the generated domain-specific templates. A preliminary usability study is performed and all reviewers (n = 3) had very positive responses for the evaluation questions in terms of the usability and the capability of meeting the system requirements (with the average score of 4.6). Semantic Web technologies provide a scalable infrastructure and have great potential to enable computable semantic interoperability of models in the intersection of health care and clinical research.

  4. Using a Lesson Template To Integrate General and Special Education: Teaching Lesson Template Use to Educators of Students with Special Needs.

    ERIC Educational Resources Information Center

    Murry, Francie R.; Murry, G. Brandon

    Teacher preparation programs have recognized their obligation to provide solutions for the dilemmas their teachers face once in the inclusive educational environment. The changing demands required by both general and special education teachers at the K-12 level are being addressed. One of these solutions is to provide access to technological…

  5. Template protocol for clinical trials investigating vaccines--focus on safety elements.

    PubMed

    Bonhoeffer, Jan; Imoukhuede, Egeruan B; Aldrovandi, Grace; Bachtiar, Novilia S; Chan, Eng-Soon; Chang, Soju; Chen, Robert T; Fernandopulle, Rohini; Goldenthal, Karen L; Heffelfinger, James D; Hossain, Shah; Jevaji, Indira; Khamesipour, Ali; Kochhar, Sonali; Makhene, Mamodikoe; Malkin, Elissa; Nalin, David; Prevots, Rebecca; Ramasamy, Ranjan; Sellers, Sarah; Vekemans, Johan; Walker, Kenneth B; Wilson, Pam; Wong, Virginia; Zaman, Khalequz; Heininger, Ulrich

    2013-11-12

    This document is intended as a guide to the protocol development for trials of prophylactic vaccines. The template may serve phases I-IV clinical trials protocol development to include safety relevant information as required by the regulatory authorities and as deemed useful by the investigators. This document may also be helpful for future site strengthening efforts. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Introduction to Soil Fumigant Management Plans

    EPA Pesticide Factsheets

    Soil fumigant pesticide labels require users to prepare a site-specific fumigation management plan (FMP) before the application begins. EPA has developed templates that outline the elements required by the labels.

  7. Attempted nonenzymatic template-directed oligomerizations on a polyadenylic acid template: implications for the nature of the first genetic material

    NASA Technical Reports Server (NTRS)

    Stribling, R.; Miller, S. L.

    1991-01-01

    Previous attempts to produce nonenzymatic template-directed oligomerizations of activated pyrimidines on polypurine templates have been unsuccessful. The only efficient reactions are those where the template is composed primarily of pyrimidines, especially cytosine. Because molecular evolution requires that a synthesized daughter polynucleotide be capable of acting as a template for the synthesis of the original polynucleotide, the one-way replication achieved thus far is inadequate to initiate an evolving system. Several uracil analogs were used in this investigation in order to search for possible replacements for uracil. The monomers used in this investigation were the imidazolides of UMP, xanthosine 5'-monophosphate, the bis-monophosphates of the acyclic nucleosides of uracil, and 2,4-quinazolinedione. The concentrations of various salts, buffers, pH, and temperature were among the different variables investigated in attempts to find conditions that would permit template-directed oligomerizations. Although the different monomers in this study demonstrated varying abilities to form very short oligomers, we were unable to detect any enhancement of this oligomerization that could be attributed to the poly(A) template. Although special conditions might be found that would allow purine-rich templates to work, these reactions cannot be considered robust. The results of our experiments suggest that pyrimidines were not part of the original replicating system on the primitive Earth. It has already been shown that ribose is an unlikely component of the first replicating systems, and we now suggest that phosphate was absent as well. This is due to the low solubility of phosphate in the present ocean (3 x 10(-6) M), as well as the difficulty of prebiotic activation of phosphates.

  8. Readability of patient discharge instructions with and without the use of electronically available disease-specific templates.

    PubMed

    Mueller, Stephanie K; Giannelli, Kyla; Boxer, Robert; Schnipper, Jeffrey L

    2015-07-01

    Low health literacy is common, leading to patient vulnerability during hospital discharge, when patients rely on written health instructions. We aimed to examine the impact of the use of electronic, patient-friendly, templated discharge instructions on the readability of discharge instructions provided to patients at discharge. We performed a retrospective cohort study of 233 patients discharged from a large tertiary care hospital to their homes following the implementation of a web-based "discharge module," which included the optional use of diagnosis-specific templated discharge instructions. We compared the readability of discharge instructions, as measured by the Flesch Reading Ease Level test (FREL, on a 0-100 scale, with higher scores indicating greater readability) and the Flesch-Kincaid Grade Level test (FKGL, measured in grade levels), between discharges that used templated instructions (with or without modification) versus discharges that used clinician-generated instructions (with or without available templated instructions for the specific discharge diagnosis). Templated discharge instructions were provided to patients in 45% of discharges. Of the 55% of patients that received clinician-generated discharge instructions, the majority (78.1%) had no available templated instruction for the specific discharge diagnosis. Templated discharge instructions had higher FREL scores (71 vs. 57, P < .001) and lower FKGL scores (5.6 vs. 7.6, P < .001), compared to clinician-generated discharge instructions. The use of electronically available templated discharge instructions was associated with better readability (a higher FREL score and a lower FKGL score) than the use of clinician-generated discharge instructions. The main reason for clinicians to create discharge instructions was the lack of available templates for the patient's specific discharge diagnosis. Use of electronically available templated discharge instructions may be a viable option to improve the readability of written material provided to patients at discharge, although the library of available templates requires expansion. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Novel techniques for the synthesis of three-way catalytic converter support materials

    NASA Astrophysics Data System (ADS)

    Anyaba, Prince Nwabueze

    Current automobiles use catalytic converters, consisting of noble metals on an oxide support, to convert noxious engine exhaust pollutants into less harmful species. The development of mesoporous oxide supports with optimal pore geometries could enable these devises to decrease in size and weight and significantly reduce the metal loadings required to achieve optimal performance. Thus, in this work, I investigated a wide range of techniques for the synthesis of mesoporous oxides to determine if they could be adapted to ceria-zirconia-yttria mixed oxide (CZY) systems, which are the industry standard for the optimal oxide support for catalytic converter applications. Additionally, I compared and critically evaluated the catalytic performance of the CZY mixed oxides, which were synthesized from the various templating techniques. The catalytic performance test was broken up into two: catalyst activity test which was determined based on the light-off temperatures at which 50% conversion of the reacting species have been converted; and resistance to surface area loss under accelerated aging at heating rate of 20°C/min form 700 to 1000°C, with the final temperature being held fixed for 4 h. To date, the most cost effective methods for preparing mesoporous materials are via techniques that employ templates or structure directing agents. These templates can be divided into two groups: endo-templates (i.e., soft templates, such as surfactants, dendrimers, and block copolymers) and exo-templates (i.e., hard templates, such as porous carbons and resins). The soft templating techniques generally involve both sol-gel and templating methods, while the hard templates required no sol-gel chemistry to achieve the desired templating effect. The precursors for ceria, zirconia, and yttria used were cerium (III) nitrate hexahydrate, zirconyl nitrate, and yttrium nitrate hexahydrate, respectively. The mesoporous CZY materials that were synthesized had surface area values that were between 40 and 120 m2/g and pore diameters that range from 2.2 to 9.0 nm after calcination in air from ambient temperature to 600°C at heating rates varied from 1 to 20°C/min, with the final temperature being maintained for 4 h. The novel CZY oxides that were prepared from the different templating techniques were characterized using nitrogen physisorption to determine the Brunauer--Emmett--Teller (BET) surface area and the Barrett--Joyner--Halenda (BJH) pore size distribution. Samples that showed some promise were further examined by transmission electron microscopy (TEM) to study the morphology of the structure; scanning electron microscopy (SEM) to study the bulk surface structure; thermogravimetric analysis (TGA) and differential scanning calorimetry (DSC) to determine physical and chemical changes occurring during calcination; elemental analysis to determine composition; powder X-ray diffraction (PXD) to determine the existence of crystalline structure; and small angle X-ray diffraction (SAXD) to determine the occurrence of mesoscale ordering of repeating units. Finally, selected samples underwent catalytic testing under simulated exhaust conditions. The results of the tests showed that CZY materials synthesized using sol-gel methods with the Pluronic P123 soft template were the most active (i.e., had the lowest light off temperature), while CZY material with least loss of surface area after accelerated aging from 700 to 1000°C was the polymeric resin templated CZY materials.

  10. Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED

    DOEpatents

    Bradetich, Ryan; Dearien, Jason A; Grussling, Barry Jakob; Remaley, Gavin

    2013-11-05

    The present disclosure provides systems and methods for remote device management. According to various embodiments, a local intelligent electronic device (IED) may be in communication with a remote IED via a limited bandwidth communication link, such as a serial link. The limited bandwidth communication link may not support traditional remote management interfaces. According to one embodiment, a local IED may present an operator with a management interface for a remote IED by rendering locally stored templates. The local IED may render the locally stored templates using sparse data obtained from the remote IED. According to various embodiments, the management interface may be a web client interface and/or an HTML interface. The bandwidth required to present a remote management interface may be significantly reduced by rendering locally stored templates rather than requesting an entire management interface from the remote IED. According to various embodiments, an IED may comprise an encryption transceiver.

  11. Dye-sensitized PS-b-P2VP-templated nickel oxide films for photoelectrochemical applications

    PubMed Central

    Massin, Julien; Bräutigam, Maximilian; Kaeffer, Nicolas; Queyriaux, Nicolas; Field, Martin J.; Schacher, Felix H.; Popp, Jürgen; Chavarot-Kerlidou, Murielle; Dietzek, Benjamin; Artero, Vincent

    2015-01-01

    Moving from homogeneous water-splitting photocatalytic systems to photoelectrochemical devices requires the preparation and evaluation of novel p-type transparent conductive photoelectrode substrates. We report here on the sensitization of polystyrene-block-poly-(2-vinylpyridine) (PS-b-P2VP) diblock copolymer-templated NiO films with an organic push–pull dye. The potential of these new templated NiO film preparations for photoelectrochemical applications is compared with NiO material templated by F108 triblock copolymers. We conclude that NiO films are promising materials for the construction of dye-sensitized photocathodes to be inserted into photoelectrochemical (PEC) cells. However, a combined effort at the interface between materials science and molecular chemistry, ideally funded within a Global Artificial Photosynthesis Project, is still needed to improve the overall performance of the photoelectrodes and progress towards economically viable PEC devices. PMID:26052420

  12. Dye-sensitized PS-b-P2VP-templated nickel oxide films for photoelectrochemical applications.

    PubMed

    Massin, Julien; Bräutigam, Maximilian; Kaeffer, Nicolas; Queyriaux, Nicolas; Field, Martin J; Schacher, Felix H; Popp, Jürgen; Chavarot-Kerlidou, Murielle; Dietzek, Benjamin; Artero, Vincent

    2015-06-06

    Moving from homogeneous water-splitting photocatalytic systems to photoelectrochemical devices requires the preparation and evaluation of novel p-type transparent conductive photoelectrode substrates. We report here on the sensitization of polystyrene-block-poly-(2-vinylpyridine) (PS-b-P2VP) diblock copolymer-templated NiO films with an organic push-pull dye. The potential of these new templated NiO film preparations for photoelectrochemical applications is compared with NiO material templated by F108 triblock copolymers. We conclude that NiO films are promising materials for the construction of dye-sensitized photocathodes to be inserted into photoelectrochemical (PEC) cells. However, a combined effort at the interface between materials science and molecular chemistry, ideally funded within a Global Artificial Photosynthesis Project, is still needed to improve the overall performance of the photoelectrodes and progress towards economically viable PEC devices.

  13. An influenza A virus agglutination test using antibody-like polymers.

    PubMed

    Sukjee, Wannisa; Thitithanyanont, Arunee; Wiboon-Ut, Suwimon; Lieberzeit, Peter A; Paul Gleeson, M; Navakul, Krongkaew; Sangma, Chak

    2017-10-01

    Antibodies are commonly used in diagnostic routines to identify pathogens. The testing protocols are relatively simple, requiring a certain amount of a specific antibody to detect its corresponding pathogen. Antibody functionality can be mimicked by synthesizing molecularly imprinted polymers (MIPs), i.e. polymers that can selectively recognize a given template structure. Thus, MIPs are sometimes termed 'plastic antibody (PA)'. In this study, we have synthesized new granular MIPs using influenza A virus templates by precipitation polymerization. The selective binding of influenza A to the MIP particles was assessed and subsequently contrasted with other viruses. The affinities of influenza A virus towards the MIP was estimated based on an agglutination test by measuring the amount of influenza subtypes absorbed onto the MIPs. The MIPs produced using the H1N1 template showed specific reactivity to H1N1 while those produced using H5N1 and H3N2 templates showed cross-reactivity.

  14. Enhancing requirements engineering for patient registry software systems with evidence-based components.

    PubMed

    Lindoerfer, Doris; Mansmann, Ulrich

    2017-07-01

    Patient registries are instrumental for medical research. Often their structures are complex and their implementations use composite software systems to meet the wide spectrum of challenges. Commercial and open-source systems are available for registry implementation, but many research groups develop their own systems. Methodological approaches in the selection of software as well as the construction of proprietary systems are needed. We propose an evidence-based checklist, summarizing essential items for patient registry software systems (CIPROS), to accelerate the requirements engineering process. Requirements engineering activities for software systems follow traditional software requirements elicitation methods, general software requirements specification (SRS) templates, and standards. We performed a multistep procedure to develop a specific evidence-based CIPROS checklist: (1) A systematic literature review to build a comprehensive collection of technical concepts, (2) a qualitative content analysis to define a catalogue of relevant criteria, and (3) a checklist to construct a minimal appraisal standard. CIPROS is based on 64 publications and covers twelve sections with a total of 72 items. CIPROS also defines software requirements. Comparing CIPROS with traditional software requirements elicitation methods, SRS templates and standards show a broad consensus but differences in issues regarding registry-specific aspects. Using an evidence-based approach to requirements engineering for registry software adds aspects to the traditional methods and accelerates the software engineering process for registry software. The method we used to construct CIPROS serves as a potential template for creating evidence-based checklists in other fields. The CIPROS list supports developers in assessing requirements for existing systems and formulating requirements for their own systems, while strengthening the reporting of patient registry software system descriptions. It may be a first step to create standards for patient registry software system assessments. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Campbell, W; Miften, M; Jones, B

    Purpose: Pancreatic SBRT relies on extremely accurate delivery of ablative radiation doses to the target, and intra-fractional tracking of fiducial markers can facilitate improvements in dose delivery. However, this requires algorithms that are able to find fiducial markers with high speed and accuracy. The purpose of this study was to develop a novel marker tracking algorithm that is robust against many of the common errors seen with traditional template matching techniques. Methods: Using CBCT projection images, a method was developed to create detailed template images of fiducial marker clusters without prior knowledge of the number of markers, their positions, ormore » their orientations. Briefly, the method (i) enhances markers in projection images, (ii) stabilizes the cluster’s position, (iii) reconstructs the cluster in 3D, and (iv) precomputes a set of static template images dependent on gantry angle. Furthermore, breathing data were used to produce 4D reconstructions of clusters, yielding dynamic template images dependent on gantry angle and breathing amplitude. To test these two approaches, static and dynamic templates were used to track the motion of marker clusters in more than 66,000 projection images from 75 CBCT scans of 15 pancreatic SBRT patients. Results: For both static and dynamic templates, the new technique was able to locate marker clusters present in projection images 100% of the time. The algorithm was also able to correctly locate markers in several instances where only some of the markers were visible due to insufficient field-of-view. In cases where clusters exhibited deformation and/or rotation during breathing, dynamic templates resulted in cross-correlation scores up to 70% higher than static templates. Conclusion: Patient-specific templates provided complete tracking of fiducial marker clusters in CBCT scans, and dynamic templates helped to provide higher cross-correlation scores for deforming/rotating clusters. This novel algorithm provides an extremely accurate method to detect fiducial markers during treatment. Research funding provided by Varian Medical Systems to Miften and Jones.« less

  16. Privacy Enhancements for Inexact Biometric Templates

    NASA Astrophysics Data System (ADS)

    Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud

    Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.

  17. Centers for Disease Control and Prevention (CDC) Radiation Hazard Scale Data Product Review Feedback Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Askin, A.; Buddemeier, B.; Alai, M.

    In support of the Department of Energy (DOE) National nuclear Security Administration (NNSA) and the Centers for Disease Control and Prevention (CDC), Lawrence Livermore National Laboratory (LLNL) assisted in the development of new data templates for disseminating and communicating FRMAC1 data products using the CDC Radiation Hazard Scale communication tool. To ensure these data products will be useful to stakeholders during a radiological emergency, LLNL facilitated opportunities for product socialization and review.

  18. Webulous and the Webulous Google Add-On--a web service and application for ontology building from templates.

    PubMed

    Jupp, Simon; Burdett, Tony; Welter, Danielle; Sarntivijai, Sirarat; Parkinson, Helen; Malone, James

    2016-01-01

    Authoring bio-ontologies is a task that has traditionally been undertaken by skilled experts trained in understanding complex languages such as the Web Ontology Language (OWL), in tools designed for such experts. As requests for new terms are made, the need for expert ontologists represents a bottleneck in the development process. Furthermore, the ability to rigorously enforce ontology design patterns in large, collaboratively developed ontologies is difficult with existing ontology authoring software. We present Webulous, an application suite for supporting ontology creation by design patterns. Webulous provides infrastructure to specify templates for populating ontology design patterns that get transformed into OWL assertions in a target ontology. Webulous provides programmatic access to the template server and a client application has been developed for Google Sheets that allows templates to be loaded, populated and resubmitted to the Webulous server for processing. The development and delivery of ontologies to the community requires software support that goes beyond the ontology editor. Building ontologies by design patterns and providing simple mechanisms for the addition of new content helps reduce the overall cost and effort required to develop an ontology. The Webulous system provides support for this process and is used as part of the development of several ontologies at the European Bioinformatics Institute.

  19. Minimalist Approach to Complexity: Templating the Assembly of DNA Tile Structures with Sequentially Grown Input Strands.

    PubMed

    Lau, Kai Lin; Sleiman, Hanadi F

    2016-07-26

    Given its highly predictable self-assembly properties, DNA has proven to be an excellent template toward the design of functional materials. Prominent examples include the remarkable complexity provided by DNA origami and single-stranded tile (SST) assemblies, which require hundreds of unique component strands. However, in many cases, the majority of the DNA assembly is purely structural, and only a small "working area" needs to be aperiodic. On the other hand, extended lattices formed by DNA tile motifs require only a few strands; but they suffer from lack of size control and limited periodic patterning. To overcome these limitations, we adopt a templation strategy, where an input strand of DNA dictates the size and patterning of resultant DNA tile structures. To prepare these templating input strands, a sequential growth technique developed in our lab is used, whereby extended DNA strands of defined sequence and length may be generated simply by controlling their order of addition. With these, we demonstrate the periodic patterning of size-controlled double-crossover (DX) and triple-crossover (TX) tile structures, as well as intentionally designed aperiodicity of a DX tile structure. As such, we are able to prepare size-controlled DNA structures featuring aperiodicity only where necessary with exceptional economy and efficiency.

  20. A digital model individual template and CT-guided 125I seed implants for malignant tumors of the head and neck.

    PubMed

    Huang, Ming-Wei; Liu, Shu-Ming; Zheng, Lei; Shi, Yan; Zhang, Jie; Li, Yan-Sheng; Yu, Guang-Yan; Zhang, Jian-Guo

    2012-11-01

    To enhance the accuracy of radioactive seed implants in the head and neck, a digital model individual template, containing information simultaneously on needle pathway and facial features, was designed to guide implantation with CT imaging. Thirty-one patients with recurrent and local advanced malignant tumors of head and neck after prior surgery and radiotherapy were involved in this study. Before (125)I implants, patients received CT scans based on 0.75mm thickness. And the brachytherapy treatment planning system (BTPS) software was used to make the implantation plan based on the CT images. Mimics software and Geomagic software were used to read the data containing CT images and implantation plan, and to design the individual template. Then the individual template containing the information of needle pathway and face features simultaneously was made through rapid prototyping (RP) technique. All patients received (125)I seeds interstitial implantation under the guide of the individual template and CT. The individual templates were positioned easily and accurately, and were stable. After implants, treatment quality evaluation was made by CT and TPS. The seeds and dosages distribution (D(90),V(100),V(150)) were well meet the treatment requirement. Clinical practice confirms that this approach can facilitate easier and more accurate implantation.

  1. Template-based modeling and ab initio refinement of protein oligomer structures using GALAXY in CAPRI round 30.

    PubMed

    Lee, Hasup; Baek, Minkyung; Lee, Gyu Rie; Park, Sangwoo; Seok, Chaok

    2017-03-01

    Many proteins function as homo- or hetero-oligomers; therefore, attempts to understand and regulate protein functions require knowledge of protein oligomer structures. The number of available experimental protein structures is increasing, and oligomer structures can be predicted using the experimental structures of related proteins as templates. However, template-based models may have errors due to sequence differences between the target and template proteins, which can lead to functional differences. Such structural differences may be predicted by loop modeling of local regions or refinement of the overall structure. In CAPRI (Critical Assessment of PRotein Interactions) round 30, we used recently developed features of the GALAXY protein modeling package, including template-based structure prediction, loop modeling, model refinement, and protein-protein docking to predict protein complex structures from amino acid sequences. Out of the 25 CAPRI targets, medium and acceptable quality models were obtained for 14 and 1 target(s), respectively, for which proper oligomer or monomer templates could be detected. Symmetric interface loop modeling on oligomer model structures successfully improved model quality, while loop modeling on monomer model structures failed. Overall refinement of the predicted oligomer structures consistently improved the model quality, in particular in interface contacts. Proteins 2017; 85:399-407. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  2. Solid-Phase Synthesis of Molecularly Imprinted Polymer Nanoparticles with a Reusable Template - "Plastic Antibodies".

    PubMed

    Poma, Alessandro; Guerreiro, Antonio; Whitcombe, Michael J; Piletska, Elena V; Turner, Anthony P F; Piletsky, Sergey A

    2013-06-13

    Molecularly Imprinted Polymers (MIPs) are generic alternatives to antibodies in sensors, diagnostics and separations. To displace biomolecules without radical changes in infrastructure in device manufacture, MIPs should share their characteristics (solubility, size, specificity and affinity, localized binding domain) whilst maintaining the advantages of MIPs (low-cost, short development time and high stability) hence the interest in MIP nanoparticles. Herein we report a reusable solid-phase template approach (fully compatible with automation) for the synthesis of MIP nanoparticles and their precise manufacture using a prototype automated UV photochemical reactor. Batches of nanoparticles (30-400 nm) with narrow size distributions imprinted with: melamine (d = 60 nm, K d = 6.3 × 10 -8 m), vancomycin (d = 250 nm, K d = 3.4 × 10 -9 m), a peptide (d = 350 nm, K d = 4.8 × 10 -8 m) and proteins have been produced. Our instrument uses a column packed with glass beads, bearing the template. Process parameters are under computer control, requiring minimal manual intervention. For the first time we demonstrate the reliable re-use of molecular templates in the synthesis of MIPs (≥ 30 batches of nanoMIPs without loss of performance). NanoMIPs are produced template-free and the solid-phase acts both as template and affinity separation medium.

  3. Solid-Phase Synthesis of Molecularly Imprinted Polymer Nanoparticles with a Reusable Template – “Plastic Antibodies”

    PubMed Central

    Poma, Alessandro; Guerreiro, Antonio; Whitcombe, Michael J.; Piletska, Elena V.; Turner, Anthony P.F.; Piletsky, Sergey A.

    2016-01-01

    Molecularly Imprinted Polymers (MIPs) are generic alternatives to antibodies in sensors, diagnostics and separations. To displace biomolecules without radical changes in infrastructure in device manufacture, MIPs should share their characteristics (solubility, size, specificity and affinity, localized binding domain) whilst maintaining the advantages of MIPs (low-cost, short development time and high stability) hence the interest in MIP nanoparticles. Herein we report a reusable solid-phase template approach (fully compatible with automation) for the synthesis of MIP nanoparticles and their precise manufacture using a prototype automated UV photochemical reactor. Batches of nanoparticles (30-400 nm) with narrow size distributions imprinted with: melamine (d = 60 nm, Kd = 6.3 × 10−8 m), vancomycin (d = 250 nm, Kd = 3.4 × 10−9 m), a peptide (d = 350 nm, Kd = 4.8 × 10−8 m) and proteins have been produced. Our instrument uses a column packed with glass beads, bearing the template. Process parameters are under computer control, requiring minimal manual intervention. For the first time we demonstrate the reliable re-use of molecular templates in the synthesis of MIPs (≥ 30 batches of nanoMIPs without loss of performance). NanoMIPs are produced template-free and the solid-phase acts both as template and affinity separation medium. PMID:26869870

  4. Jet and flash imprint defectivity: assessment and reduction for semiconductor applications

    NASA Astrophysics Data System (ADS)

    Malloy, Matt; Litt, Lloyd C.; Johnson, Steve; Resnick, Douglas J.; Lovell, David

    2011-04-01

    Defectivity has been historically identified as a leading technical roadblock to the implementation of nanoimprint lithography for semiconductor high volume manufacturing. The lack of confidence in nanoimprint's ability to meet defect requirements originates in part from the industry's past experiences with 1X lithography and the shortage in end-user generated defect data. SEMATECH has therefore initiated a defect assessment aimed at addressing these concerns. The goal is to determine whether nanoimprint, specifically Jet and Flash Imprint Lithography from Molecular Imprints, is capable of meeting semiconductor industry defect requirements. At this time, several cycles of learning have been completed in SEMATECH's defect assessment, with promising results. J-FIL process random defectivity of < 0.1 def/cm2 has been demonstrated using a 120nm half-pitch template, providing proof of concept that a low defect nanoimprint process is possible. Template defectivity has also improved significantly as shown by a pre-production grade template at 80nm pitch. Cycles of learning continue on feature sizes down to 22nm.

  5. Removable polytetrafluoroethylene template based epitaxy of ferroelectric copolymer thin films

    NASA Astrophysics Data System (ADS)

    Xia, Wei; Chen, Qiusong; Zhang, Jian; Wang, Hui; Cheng, Qian; Jiang, Yulong; Zhu, Guodong

    2018-04-01

    In recent years ferroelectric polymers have shown their great potentials in organic and flexible electronics. To meet the requirements of high-performance and low energy consumption of novel electronic devices and systems, structural and electrical properties of ferroelectric polymer thin films are expected to be further optimized. One possible way is to realize epitaxial growth of ferroelectric thin films via removable high-ordered polytetrafluoroethylene (PTFE) templates. Here two key parameters in epitaxy process, annealing temperature and applied pressure, are systematically studied and thus optimized through structural and electrical measurements of ferroelectric copolymer thin films. Experimental results indicate that controlled epitaxial growth is realized via suitable combination of both parameters. Annealing temperature above the melting point of ferroelectric copolymer films is required, and simultaneously moderate pressure (around 2.0 MPa here) should be applied. Over-low pressure (around 1.0 MPa here) usually results in the failure of epitaxy process, while over-high pressure (around 3.0 MPa here) often results in residual of PTFE templates on ferroelectric thin films.

  6. 76 FR 52475 - Summary of Benefits and Coverage and Uniform Glossary-Templates, Instructions, and Related...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-22

    ...The Departments of the Health and Human Services, Labor, and the Treasury (the Departments) are simultaneously publishing in the Federal Register this document and proposed regulations (2011 proposed regulations) under the Patient Protection and Affordable Care Act to implement the disclosure for group health plans and health insurance issuers of the summary of benefits and coverage (SBC) and the uniform glossary. This document proposes a template for an SBC; instructions, sample language, and a guide for coverage examples calculations to be used in completing the template; and a uniform glossary that would satisfy the disclosure requirements under section 2715 of the Public Health Service (PHS) Act. Comments are invited on these materials.

  7. A template-based approach for parallel hexahedral two-refinement

    DOE PAGES

    Owen, Steven J.; Shih, Ryan M.; Ernst, Corey D.

    2016-10-17

    Here, we provide a template-based approach for generating locally refined all-hex meshes. We focus specifically on refinement of initially structured grids utilizing a 2-refinement approach where uniformly refined hexes are subdivided into eight child elements. The refinement algorithm consists of identifying marked nodes that are used as the basis for a set of four simple refinement templates. The target application for 2-refinement is a parallel grid-based all-hex meshing tool for high performance computing in a distributed environment. The result is a parallel consistent locally refined mesh requiring minimal communication and where minimum mesh quality is greater than scaled Jacobian 0.3more » prior to smoothing.« less

  8. A template-based approach for parallel hexahedral two-refinement

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Owen, Steven J.; Shih, Ryan M.; Ernst, Corey D.

    Here, we provide a template-based approach for generating locally refined all-hex meshes. We focus specifically on refinement of initially structured grids utilizing a 2-refinement approach where uniformly refined hexes are subdivided into eight child elements. The refinement algorithm consists of identifying marked nodes that are used as the basis for a set of four simple refinement templates. The target application for 2-refinement is a parallel grid-based all-hex meshing tool for high performance computing in a distributed environment. The result is a parallel consistent locally refined mesh requiring minimal communication and where minimum mesh quality is greater than scaled Jacobian 0.3more » prior to smoothing.« less

  9. RNA connectivity requirements between conserved elements in the core of the yeast telomerase RNP

    PubMed Central

    Mefford, Melissa A; Rafiq, Qundeel; Zappulla, David C

    2013-01-01

    Telomerase is a specialized chromosome end-replicating enzyme required for genome duplication in many eukaryotes. An RNA and reverse transcriptase protein subunit comprise its enzymatic core. Telomerase is evolving rapidly, particularly its RNA component. Nevertheless, nearly all telomerase RNAs, including those of H. sapiens and S. cerevisiae, share four conserved structural elements: a core-enclosing helix (CEH), template-boundary element, template, and pseudoknot, in this order along the RNA. It is not clear how these elements coordinate telomerase activity. We find that although rearranging the order of the four conserved elements in the yeast telomerase RNA subunit, TLC1, disrupts activity, the RNA ends can be moved between the template and pseudoknot in vitro and in vivo. However, the ends disrupt activity when inserted between the other structured elements, defining an Area of Required Connectivity (ARC). Within the ARC, we find that only the junction nucleotides between the pseudoknot and CEH are essential. Integrating all of our findings provides a basic map of functional connections in the core of the yeast telomerase RNP and a framework to understand conserved element coordination in telomerase mechanism. PMID:24129512

  10. A report template for molecular genetic tests designed to improve communication between the clinician and laboratory.

    PubMed

    Scheuner, Maren T; Hilborne, Lee; Brown, Julie; Lubin, Ira M

    2012-07-01

    Errors are most likely to occur during the pre- and postanalytic phases of the genetic testing process, which can contribute to underuse, overuse, and misuse of genetic tests. To mitigate these errors, we created a template for molecular genetic test reports that utilizes the combined features of synoptic reporting and narrative interpretation. A variation of the Delphi consensus process with an expert panel was used to create a draft report template, which was further informed by focus group discussions with primary care physicians. There was agreement that molecular genetic test reports should present information in groupings that flow in a logical manner, and most participants preferred the following order of presentation: patient and physician information, test performed, test results and interpretation, guidance on next steps, and supplemental information. We define data elements for the report as "required," "optional," "possible," and "not necessary"; provide recommendations regarding the grouping of these data elements; and describe the ideal design of the report template, including the preferred order of the report sections, formatting of data, and length of the report. With input from key stakeholders and building upon prior work, we created a template for molecular genetic test reports designed to improve clinical decision making at the point of care. The template design should lead to more effective communication between the laboratory and ordering clinician. Studies are needed to assess the usefulness and effectiveness of molecular genetic test reports generated using this template.

  11. Periodic Two-Dimensional GaAs and InGaAs Quantum Rings Grown on GaAs (001) by Droplet Epitaxy.

    PubMed

    Tung, Kar Hoo Patrick; Huang, Jian; Danner, Aaron

    2016-06-01

    Growth of ordered GaAs and InGaAs quantum rings (QRs) in a patterned SiO2 nanohole template by molecular beam epitaxy (MBE) using droplet epitaxy (DE) process is demonstrated. DE is an MBE growth technique used to fabricate quantum nanostructures of high crystal quality by supplying group III and group V elements in separate phases. In this work, ordered QRs grown on an ordered nanohole template are compared to self-assembled QRs grown with the same DE technique without the nanohole template. This study allows us to understand and compare the surface kinetics of Ga and InGa droplets when a template is present. It is found that template-grown GaAs QRs form clustered rings which can be attributed to low mobility of Ga droplets resulting in multiple nucleation sites for QR formation when As is supplied. However, the case of template-grown InGaAs QRs only one ring is formed per nanohole; no clustering is observed. The outer QR diameter is a close match to the nanohole template diameter. This can be attributed to more mobile InGa droplets, which coalesce from an Ostwald ripening to form a single large droplet before As is supplied. Thus, well-patterned InGaAs QRs are demonstrated and the kinetics of their growth are better understood which could potentially lead to improvements in the future devices that require the unique properties of patterned QRs.

  12. Exemplary design of a DICOM structured report template for CBIR integration into radiological routine

    NASA Astrophysics Data System (ADS)

    Welter, Petra; Deserno, Thomas M.; Gülpers, Ralph; Wein, Berthold B.; Grouls, Christoph; Günther, Rolf W.

    2010-03-01

    The large and continuously growing amount of medical image data demands access methods with regards to content rather than simple text-based queries. The potential benefits of content-based image retrieval (CBIR) systems for computer-aided diagnosis (CAD) are evident and have been approved. Still, CBIR is not a well-established part of daily routine of radiologists. We have already presented a concept of CBIR integration for the radiology workflow in accordance with the Integrating the Healthcare Enterprise (IHE) framework. The retrieval result is composed as a Digital Imaging and Communication in Medicine (DICOM) Structured Reporting (SR) document. The use of DICOM SR provides interchange with PACS archive and image viewer. It offers the possibility of further data mining and automatic interpretation of CBIR results. However, existing standard templates do not address the domain of CBIR. We present a design of a SR template customized for CBIR. Our approach is based on the DICOM standard templates and makes use of the mammography and chest CAD SR templates. Reuse of approved SR sub-trees promises a reliable design which is further adopted to the CBIR domain. We analyze the special CBIR requirements and integrate the new concept of similar images into our template. Our approach also includes the new concept of a set of selected images for defining the processed images for CBIR. A commonly accepted pre-defined template for the presentation and exchange of results in a standardized format promotes the widespread application of CBIR in radiological routine.

  13. Guidelines for computer security in general practice.

    PubMed

    Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan

    2007-01-01

    As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.

  14. Field Encapsulation Library The FEL 2.2 User Guide

    NASA Technical Reports Server (NTRS)

    Moran, Patrick J.; Henze, Chris; Ellsworth, David

    1999-01-01

    This document describes version 2.2 of the Field Encapsulation Library (FEL), a library of mesh and field classes. FEL is a library for programmers - it is a "building block" enabling the rapid development of applications by a user. Since FEL is a library intended for code development, it is essential that enough technical detail be provided so that one can make full use of the code. Providing such detail requires some assumptions with respect to the reader's familiarity with the library implementation language, C++, particularly C++ with templates. We have done our best to make the explanations accessible to those who may not be completely C++ literate. Nevertheless, familiarity with the language will certainly help one's understanding of how and why things work the way they do. One consolation is that the level of understanding essential for using the library is significantly less than the level that one should have in order to modify or extend the library. One more remark on C++ templates: Templates have been a source of both joy and frustration for us. The frustration stems from the lack of mature or complete implementations that one has to work with. Template problems rear their ugly head particularly when porting. When porting C code, successfully compiling to a set of object files typically means that one is almost done. With templated C++ and the current state of the compilers and linkers, generating the object files is often only the beginning of the fun. On the other hand, templates are quite powerful. Used judiciously, templates enable more succinct designs and more efficient code. Templates also help with code maintenance. Designers can avoid creating objects that are the same in many respects, but not exactly the same. For example, FEL fields are templated by node type, thus the code for scalar fields and vector fields is shared. Furthermore, node type templating allows the library user to instantiate fields with data types not provided by the FEL authors. This type of flexibility would be difficult to offer without the support of the language. For users who may be having template-related problems, we offer the consolation that support for C++ templates is destined to improve with time. Efforts such as the Standard Template Library (STL) will inevitably drive vendors to provide more thorough, optimized tools for template code development. Furthermore, the benefits will become harder to resist for those who currently subscribe to the least-common-denominator "code it all in C" strategy. May FEL bring you both increased productivity and aesthetic satisfaction.

  15. 48 CFR 28.201 - Requirements for security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... forms of security include (1) corporate or individual sureties or (2) any of the types of security... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Requirements for security... CONTRACTING REQUIREMENTS BONDS AND INSURANCE Sureties and Other Security for Bonds 28.201 Requirements for...

  16. 48 CFR 28.201 - Requirements for security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... forms of security include (1) corporate or individual sureties or (2) any of the types of security... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Requirements for security... CONTRACTING REQUIREMENTS BONDS AND INSURANCE Sureties and Other Security for Bonds 28.201 Requirements for...

  17. 48 CFR 28.201 - Requirements for security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... forms of security include (1) corporate or individual sureties or (2) any of the types of security... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Requirements for security... CONTRACTING REQUIREMENTS BONDS AND INSURANCE Sureties and Other Security for Bonds 28.201 Requirements for...

  18. 48 CFR 28.201 - Requirements for security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... forms of security include (1) corporate or individual sureties or (2) any of the types of security... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Requirements for security... CONTRACTING REQUIREMENTS BONDS AND INSURANCE Sureties and Other Security for Bonds 28.201 Requirements for...

  19. 48 CFR 28.201 - Requirements for security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... forms of security include (1) corporate or individual sureties or (2) any of the types of security... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Requirements for security... CONTRACTING REQUIREMENTS BONDS AND INSURANCE Sureties and Other Security for Bonds 28.201 Requirements for...

  20. 17 CFR 41.21 - Requirements for underlying securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Requirements for underlying securities. 41.21 Section 41.21 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.21...

  1. Controlling interfacial properties in supported metal oxide catalysts through metal–organic framework templating

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abney, Carter W.; Patterson, Jacob T.; Gilhula, James C.

    Precise control over the chemical structure of hard-matter materials is a grand challenge of basic science and a prerequisite for the development of advanced catalyst systems. In this work we report the application of a sacrificial metal-organic framework (MOF) template for the synthesis of a porous supported metal oxide catalyst, demonstrating proof-of-concept for a highly generalizable approach to the preparation new catalyst materials. Application of 2,2’-bipyridine-5,5’-dicarboxylic acid as the organic strut in the Ce MOF precursor results in chelation of Cu 2+ and affords isolation of the metal oxide precursor. Following pyrolysis of the template, homogeneously dispersed CuO nanoparticles aremore » formed in the resulting porous CeO 2 support. By partially substituting non-chelating 1,1’-biphenyl-4,4’-dicarboxylic acid, the Cu 2+ loading and dispersion can be finely tuned, allowing precise control over the CuO/CeO 2 interface in the final catalyst system. Characterization by x-ray diffraction, x-ray absorption fine structure spectroscopy, and in situ IR spectroscopy/mass spectrometry confirm control over interface formation to be a function of template composition, constituting the first report of a MOF template being used to control interfacial properties in a supported metal oxide. Using CO oxidation as a model reaction, the system with the greatest number of interfaces possessed the lowest activation energy and better activity under differential conditions, but required higher temperature for catalytic onset and displayed inferior efficiency at 100 °C than systems with higher Cu-loading. This finding is attributable to greater CO adsorption in the more heavily-loaded systems, and indicates catalyst performance for these supported oxide systems to be a function of at least two parameters: size of adsorption site and extent of interface. In conclusion, optimization of catalyst materials thus requires precise control over synthesis parameters, such as is demonstrated by this MOF-templating method.« less

  2. Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

    PubMed Central

    Li, Mengxing; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks. PMID:24711729

  3. Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption.

    PubMed

    Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.

  4. 15 CFR Appendix A to Subpart C of... - Certification Application Templates

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... ASSURANCE AND CERTIFICATION REQUIREMENTS FOR NOAA HYDROGRAPHIC PRODUCTS AND SERVICES CERTIFICATION REQUIREMENTS FOR DISTRIBUTORS OF NOAA HYDROGRAPHIC PRODUCTS Requirements for Certified Distributors and Value Added Distributors of NOAA ENC Products Pt. 995, Subpt. C, App. A Appendix A to Subpart C of Part 995...

  5. 15 CFR Appendix A to Subpart C of... - Certification Application Templates

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... ASSURANCE AND CERTIFICATION REQUIREMENTS FOR NOAA HYDROGRAPHIC PRODUCTS AND SERVICES CERTIFICATION REQUIREMENTS FOR DISTRIBUTORS OF NOAA HYDROGRAPHIC PRODUCTS Requirements for Certified Distributors and Value Added Distributors of NOAA ENC Products Pt. 995, Subpt. C, App. A Appendix A to Subpart C of Part 995...

  6. 15 CFR Appendix A to Subpart C of... - Certification Application Templates

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... ASSURANCE AND CERTIFICATION REQUIREMENTS FOR NOAA HYDROGRAPHIC PRODUCTS AND SERVICES CERTIFICATION REQUIREMENTS FOR DISTRIBUTORS OF NOAA HYDROGRAPHIC PRODUCTS Requirements for Certified Distributors and Value Added Distributors of NOAA ENC Products Pt. 995, Subpt. C, App. A Appendix A to Subpart C of Part 995...

  7. Design strategy for integrating DSA via patterning in sub-7 nm interconnects

    NASA Astrophysics Data System (ADS)

    Karageorgos, Ioannis; Ryckaert, Julien; Tung, Maryann C.; Wong, H.-S. P.; Gronheid, Roel; Bekaert, Joost; Karageorgos, Evangelos; Croes, Kris; Vandenberghe, Geert; Stucchi, Michele; Dehaene, Wim

    2016-03-01

    In recent years, major advancements have been made in the directed self-assembly (DSA) of block copolymers (BCPs). As a result, the insertion of DSA for IC fabrication is being actively considered for the sub-7nm nodes. At these nodes the DSA technology could alleviate costs for multiple patterning and limit the number of litho masks that would be required per metal layer. One of the most straightforward approaches for DSA implementation would be for via patterning through templated DSA, where hole patterns are readily accessible through templated confinement of cylindrical phase BCP materials. Our in-house studies show that decomposition of via layers in realistic circuits below the 7nm node would require at least many multi-patterning steps (or colors), using 193nm immersion lithography. Even the use of EUV might require double patterning in these dimensions, since the minimum via distance would be smaller than EUV resolution. The grouping of vias through templated DSA can resolve local conflicts in high density areas. This way, the number of required colors can be significantly reduced. For the implementation of this approach, a DSA-aware mask decomposition is required. In this paper, our design approach for DSA via patterning in sub-7nm nodes is discussed. We propose options to expand the list of DSA-compatible via patterns (DSA letters) and we define matching cost formulas for the optimal DSA-aware layout decomposition. The flowchart of our proposed approach tool is presented.

  8. Attentional Control via Parallel Target-Templates in Dual-Target Search

    PubMed Central

    Barrett, Doug J. K.; Zobay, Oliver

    2014-01-01

    Simultaneous search for two targets has been shown to be slower and less accurate than independent searches for the same two targets. Recent research suggests this ‘dual-target cost’ may be attributable to a limit in the number of target-templates than can guide search at any one time. The current study investigated this possibility by comparing behavioural responses during single- and dual-target searches for targets defined by their orientation. The results revealed an increase in reaction times for dual- compared to single-target searches that was largely independent of the number of items in the display. Response accuracy also decreased on dual- compared to single-target searches: dual-target accuracy was higher than predicted by a model restricting search guidance to a single target-template and lower than predicted by a model simulating two independent single-target searches. These results are consistent with a parallel model of dual-target search in which attentional control is exerted by more than one target-template at a time. The requirement to maintain two target-templates simultaneously, however, appears to impose a reduction in the specificity of the memory representation that guides search for each target. PMID:24489793

  9. Battery Data MI Importer Template Quick Start Guide

    NASA Technical Reports Server (NTRS)

    Levinson, Laurie H.

    2017-01-01

    In order to ensure the persistent availability and reliability of test data generated over the course of the project, the M-SHELLS Project has decided to store acquired test data, as well as associated pedigree information, in the Granta Materials Intelligence (MI) database. To facilitate that effort, an importer template and associated graphical user interface (GUI) software have been developed, with this guide providing the operating instructions for their use. The template and automation software GUI are contained in the BatteryDataImporter.xlsm Excel workbook, and are to be used to import M-SHELLS summary, or pedigree, data and the associated raw test data results into an importer template-based file, formatted in such a way as to be ready for immediate upload to the Test Data: Battery Performance table of the Granta MI database. The provided GUI enables the user to select the appropriate summary data file(s), with each file containing the required information to identify any associated raw test data file(s) to be processed. In addition to describing the setup and operation of the importer template and GUI software, this guide also provides instructions for uploading processed data to the database and for viewing the data following upload.

  10. A difference tracking algorithm based on discrete sine transform

    NASA Astrophysics Data System (ADS)

    Liu, HaoPeng; Yao, Yong; Lei, HeBing; Wu, HaoKun

    2018-04-01

    Target tracking is an important field of computer vision. The template matching tracking algorithm based on squared difference matching (SSD) and standard correlation coefficient (NCC) matching is very sensitive to the gray change of image. When the brightness or gray change, the tracking algorithm will be affected by high-frequency information. Tracking accuracy is reduced, resulting in loss of tracking target. In this paper, a differential tracking algorithm based on discrete sine transform is proposed to reduce the influence of image gray or brightness change. The algorithm that combines the discrete sine transform and the difference algorithm maps the target image into a image digital sequence. The Kalman filter predicts the target position. Using the Hamming distance determines the degree of similarity between the target and the template. The window closest to the template is determined the target to be tracked. The target to be tracked updates the template. Based on the above achieve target tracking. The algorithm is tested in this paper. Compared with SSD and NCC template matching algorithms, the algorithm tracks target stably when image gray or brightness change. And the tracking speed can meet the read-time requirement.

  11. Supercooling of Hydrogen on Template Materials to Deterministically Seed Ignition-Quality Solid Fuel Layers

    DOE PAGES

    Shin, S. J.; Zepeda-Ruiz, L. A.; Lee, J. R. I.; ...

    2016-09-01

    In this study, we explored templating effects of various materials for hydrogen (H 2 and D 2) solidification by measuring the degree of supercooling required for liquid hydrogen to solidify below each triple point. The results show high supercooling (>100 mK) for most metallic, covalent, and ionic solids, and low supercooling (<100 mK) for van der Waals (vdW) solids. We attribute the low supercooling of vdW solids to the weak interaction of the substrate and hydrogen. Highly ordered pyrolytic graphite showed the lowest supercooling among materials that are solid at room temperature, but did not exhibit a templating effect withinmore » a fill-tube and capsule assembly.« less

  12. TiO2 nanowire-templated hierarchical nanowire network as water-repelling coating

    NASA Astrophysics Data System (ADS)

    Hang, Tian; Chen, Hui-Jiuan; Xiao, Shuai; Yang, Chengduan; Chen, Meiwan; Tao, Jun; Shieh, Han-ping; Yang, Bo-ru; Liu, Chuan; Xie, Xi

    2017-12-01

    Extraordinary water-repelling properties of superhydrophobic surfaces make them novel candidates for a great variety of potential applications. A general approach to achieve superhydrophobicity requires low-energy coating on the surface and roughness on nano- and micrometre scale. However, typical construction of superhydrophobic surfaces with micro-nano structure through top-down fabrication is restricted by sophisticated fabrication techniques and limited choices of substrate materials. Micro-nanoscale topographies templated by conventional microparticles through surface coating may produce large variations in roughness and uncontrollable defects, resulting in poorly controlled surface morphology and wettability. In this work, micro-nanoscale hierarchical nanowire network was fabricated to construct self-cleaning coating using one-dimensional TiO2 nanowires as microscale templates. Hierarchical structure with homogeneous morphology was achieved by branching ZnO nanowires on the TiO2 nanowire backbones through hydrothermal reaction. The hierarchical nanowire network displayed homogeneous micro/nano-topography, in contrast to hierarchical structure templated by traditional microparticles. This hierarchical nanowire network film exhibited high repellency to both water and cell culture medium after functionalization with fluorinated organic molecules. The hierarchical structure templated by TiO2 nanowire coating significantly increased the surface superhydrophobicity compared to vertical ZnO nanowires with nanotopography alone. Our results demonstrated a promising strategy of using nanowires as microscale templates for the rational design of hierarchical coatings with desired superhydrophobicity that can also be applied to various substrate materials.

  13. Usefulness of an Osteotomy Template for Skull Tumorectomy and Simultaneous Skull Reconstruction.

    PubMed

    Oji, Tomito; Sakamoto, Yoshiaki; Miwa, Tomoru; Nakagawa, Yu; Yoshida, Kazunari; Kishi, Kazuo

    2016-09-01

    Simultaneous tumor resection and cranioplasty with hydroxyapatite osteosynthesis are sometimes necessary in patients of skull neoplasms or skull-invasive tumors. However, the disadvantage of simultaneous surgery is that mismatches often occur between the skull defect and the hydroxyapatite implant. To solve this problem, the authors developed a customized template for designing the craniotomy line. Before each operation, the craniotomy design was discussed with a neurosurgeon. Based on the discussion, 2 hydroxyapatite implants were customized for each patient on the basis of models prepared using computed tomography data. The first implant was an onlay template for the preoperative cranium, which was customized for designing the osteotomy line. The other implant was used for the skull defect. Using the template, the osteotomy line was drawn along the template edge, osteotomy was performed along this line, and the implant was placed in the skull defect. This technique was performed in 3 patients. No implant or defect trimming was required in any patient, good cosmetic outcomes were noted in all patients, and no complications occurred. Use of predesigned hydroxyapatite templates for craniotomy during simultaneous skull tumor resection and cranioplasty has some clinical advantages: the precise craniotomy line can be designed, the implant and skull defect fit better and show effective osteoconduction, trimming of the implant or defect is minimized, and the operation time is shortened.

  14. TiO2 nanowire-templated hierarchical nanowire network as water-repelling coating

    PubMed Central

    Hang, Tian; Chen, Hui-Jiuan; Xiao, Shuai; Yang, Chengduan; Chen, Meiwan; Tao, Jun; Shieh, Han-ping; Yang, Bo-ru; Liu, Chuan

    2017-01-01

    Extraordinary water-repelling properties of superhydrophobic surfaces make them novel candidates for a great variety of potential applications. A general approach to achieve superhydrophobicity requires low-energy coating on the surface and roughness on nano- and micrometre scale. However, typical construction of superhydrophobic surfaces with micro-nano structure through top-down fabrication is restricted by sophisticated fabrication techniques and limited choices of substrate materials. Micro-nanoscale topographies templated by conventional microparticles through surface coating may produce large variations in roughness and uncontrollable defects, resulting in poorly controlled surface morphology and wettability. In this work, micro-nanoscale hierarchical nanowire network was fabricated to construct self-cleaning coating using one-dimensional TiO2 nanowires as microscale templates. Hierarchical structure with homogeneous morphology was achieved by branching ZnO nanowires on the TiO2 nanowire backbones through hydrothermal reaction. The hierarchical nanowire network displayed homogeneous micro/nano-topography, in contrast to hierarchical structure templated by traditional microparticles. This hierarchical nanowire network film exhibited high repellency to both water and cell culture medium after functionalization with fluorinated organic molecules. The hierarchical structure templated by TiO2 nanowire coating significantly increased the surface superhydrophobicity compared to vertical ZnO nanowires with nanotopography alone. Our results demonstrated a promising strategy of using nanowires as microscale templates for the rational design of hierarchical coatings with desired superhydrophobicity that can also be applied to various substrate materials. PMID:29308265

  15. Structural Brain Atlases: Design, Rationale, and Applications in Normal and Pathological Cohorts

    PubMed Central

    Mandal, Pravat K.; Mahajan, Rashima; Dinov, Ivo D.

    2015-01-01

    Structural magnetic resonance imaging (MRI) provides anatomical information about the brain in healthy as well as in diseased conditions. On the other hand, functional MRI (fMRI) provides information on the brain activity during performance of a specific task. Analysis of fMRI data requires the registration of the data to a reference brain template in order to identify the activated brain regions. Brain templates also find application in other neuroimaging modalities, such as diffusion tensor imaging and multi-voxel spectroscopy. Further, there are certain differences (e.g., brain shape and size) in the brains of populations of different origin and during diseased conditions like in Alzheimer’s disease (AD), population and disease-specific brain templates may be considered crucial for accurate registration and subsequent analysis of fMRI as well as other neuroimaging data. This manuscript provides a comprehensive review of the history, construction and application of brain atlases. A chronological outline of the development of brain template design, starting from the Talairach and Tournoux atlas to the Chinese brain template (to date), along with their respective detailed construction protocols provides the backdrop to this manuscript. The manuscript also provides the automated workflow-based protocol for designing a population-specific brain atlas from structural MRI data using LONI Pipeline graphical workflow environment. We conclude by discussing the scope of brain templates as a research tool and their application in various neuroimaging modalities. PMID:22647262

  16. 3-Dimensional printing guide template assisted percutaneous vertebroplasty: Technical note.

    PubMed

    Li, Jian; Lin, JiSheng; Yang, Yong; Xu, JunChuan; Fei, Qi

    2018-06-01

    Percutaneous vertebroplasty (PVP) is currently considered as an effective treatment for pain caused by acute osteoporotic vertebral compression fracture. Recently, puncture-related complications are increasingly reported. It's important to find a precise technique to reduce the puncture-related complications. We report a case and discussed the novel surgical technique with step-by-step operating procedures, to introduce the precise PVP assisted by a 3-dimensional printing guide template. Based on the preoperative CT scan and infrared scan data, a well-designed individual guide template could be established in a 3-dimensional reconstruction software and printed out by a 3-dimensional printer. In real operation, by matching the guide template to patient's back skin, cement needles' insertion orientation and depth were easily established. Only 14 times C-arm fluoroscopy with HDF mode (total exposure dose was 4.5 mSv) were required during the procedure. The operation took only 17 min. Cement distribution in the vertebral body was very good without any puncture-related complications. Pain was significantly relieved after surgery. In conclusion, the novel precise 3-dimensional printing guide template system may allow (1) comprehensive visualization of the fractured vertebral body and the individual surgical planning, (2) the perfect fitting between skin and guide template to ensure the puncture stability and accuracy, and (3) increased puncture precision and decreased puncture-related complications, surgical time and radiation exposure. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. 78 FR 54720 - Registration and Financial Security Requirements for Brokers of Property and Freight Forwarders

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... Financial Security Requirements for Brokers of Property and Freight Forwarders AGENCY: Federal Motor Carrier... security requirements applicable to property brokers and created new requirements for freight forwarders...., Washington, DC 20590- 0001, (202) 385-2367/2405 regarding financial security requirements or Kenneth Rodgers...

  18. 14 CFR 298.33 - Security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...

  19. 14 CFR 298.33 - Security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...

  20. 14 CFR 298.33 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...

  1. 14 CFR 298.33 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...

  2. Landscape-scale Habitat Templates and Life Histories of Endangered and Invasive Fish Species in Large Rivers of the Mid-Continent USA (Invited)

    NASA Astrophysics Data System (ADS)

    Jacobson, R. B.; Braaten, P. J.; Chapman, D.; DeLonay, A. J.

    2013-12-01

    Many fish species migrate through river systems to complete their life cycles, occupying specific habitats during specific life stages. Regional geomorphology sets a template for their habitat-use patterns and ontogenetic development. In large rivers of the Mid-continent USA, understanding of relations of fish life histories to landscape-scale habitat templates informs recovery of endangered species and prevention of spread of invasive species. The endangered pallid sturgeon has evolved in the Missouri-Mississippi river system over 150 Ma. Its present-day distribution probably results from extensive drainage re-arrangements during the Pleistocene, followed by contemporary fragmentation. The reproductive and early life-stage needs of pallid sturgeon encompass hundreds of km, as adults migrate upstream to spawn and free embryos and larvae disperse downstream. Spawning requires coarse, hard substrate for incubation of adhesive eggs but adult pallid sturgeon are found predominately over sand, indicating that coarse substrate is a critical but transient habitat need. Once hatched, free-embryos initiate 9-17 days of downstream dispersal that distributes them over several hundreds of km. Lotic conditions at the dispersal terminus are required for survival. Persistent recruitment failure has been attributed to dams and channelization, which have fragmented migration and dispersal corridors, altered flow regimes, and diminished rearing habitats. Key elements of the natural history of this species remain poorly understood because adults are rare and difficult to observe, while the earliest life stages are nearly undetectable. Recent understanding has been accelerated using telemetry and hydroacoustics, but such assessments occur in altered systems and may not be indicative of natural behaviors. Restoration activities attempt - within considerable uncertainty -- to restore elements of the habitat template where they are needed. In comparison, invasive Asian carps have been present in large rivers of the Mid-Continent for no more than 40 years and have experienced rapid population growth as they exploit the landscape. Asian carps also spawn in turbulent water over coarse substrate, but in contrast to sturgeon, their eggs are buoyant and drift downstream, hatching in the water column, followed by continued dispersal as free-embryos and larvae. Asian carp eggs and larvae may drift for 4 to 7 days, with dispersal of several hundreds of km, depending on prevailing water velocities. After the drift phase, young Asian carp need lentic habitats in channel margins, floodplains, or lakes, to feed and grow. Hence, Asian carps need a habitat template that combines upstream flowing water and downstream floodplain connectivity. Control strategies for Asian carp seek to minimize access to required template elements. Managing habitat templates for endangered and invasive species on the same landscape may be complementary or conflicting. Understanding of the species' ecology and the landscape-scale habitat template is necessary for effective management.

  3. An In Vitro Translation, Selection, and Amplification System for Peptide Nucleic Acids

    PubMed Central

    Brudno, Yevgeny; Birnbaum, Michael E.; Kleiner, Ralph E.; Liu, David R.

    2009-01-01

    Methods to evolve synthetic, rather than biological, polymers could significantly expand the functional potential of polymers that emerge from in vitro evolution. Requirements for synthetic polymer evolution include: (i) sequence-specific polymerization of synthetic building blocks on an amplifiable template; (ii) display of the newly translated polymer strand in a manner that allows it to adopt folded structures; (iii) selection of synthetic polymer libraries for desired binding or catalytic properties; and (iv) amplification of template sequences surviving selection in a manner that allows subsequent translation. Here we report the development of such a system for peptide nucleic acids (PNAs) using a set of twelve PNA pentamer building blocks. We validated the system by performing six iterated cycles of translation, selection, and amplification on a library of 4.3 × 108 PNA-encoding DNA templates and observed >1,000,000-fold overall enrichment of a template encoding a biotinylated (streptavidin-binding) PNA. These results collectively provide an experimental foundation for PNA evolution in the laboratory. PMID:20081830

  4. Damage free integration of ultralow-k dielectrics by template replacement approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, L.; De Gendt, S.; Department of Chemistry, Katholieke Universiteit Leuven, 3000 Leuven

    2015-08-31

    Cu/low-k integration by conventional damascene approach is becoming increasingly difficult as critical dimensions scale down. An alternative integration scheme is studied based on the replacement of a sacrificial template by ultralow-k dielectric. A metal structure is first formed by patterning a template material. After template removal, a k = 2.31 spin-on type of porous low-k dielectric is deposited onto the patterned metal lines. The chemical and electrical properties of spin-on dielectrics are studied on blanket wafers, indicating that during hard bake, most porogen is removed within few minutes, but 120 min are required to achieve the lowest k-value. The effective dielectric constantmore » of the gap-fill low-k is investigated on a 45 nm ½ pitch Meander-Fork structure, leading to k{sub eff} below 2.4. The proposed approach solves the two major challenges in conventional Cu/low-k damascene integration approach: low-k plasma damage and metal penetration during barrier deposition on porous materials.« less

  5. Self-replication with magnetic dipolar colloids

    NASA Astrophysics Data System (ADS)

    Dempster, Joshua M.; Zhang, Rui; Olvera de la Cruz, Monica

    2015-10-01

    Colloidal self-replication represents an exciting research frontier in soft matter physics. Currently, all reported self-replication schemes involve coating colloidal particles with stimuli-responsive molecules to allow switchable interactions. In this paper, we introduce a scheme using ferromagnetic dipolar colloids and preprogrammed external magnetic fields to create an autonomous self-replication system. Interparticle dipole-dipole forces and periodically varying weak-strong magnetic fields cooperate to drive colloid monomers from the solute onto templates, bind them into replicas, and dissolve template complexes. We present three general design principles for autonomous linear replicators, derived from a focused study of a minimalist sphere-dimer magnetic system in which single binding sites allow formation of dimeric templates. We show via statistical models and computer simulations that our system exhibits nonlinear growth of templates and produces nearly exponential growth (low error rate) upon adding an optimized competing electrostatic potential. We devise experimental strategies for constructing the required magnetic colloids based on documented laboratory techniques. We also present qualitative ideas about building more complex self-replicating structures utilizing magnetic colloids.

  6. High rate sodium ion battery anodes from block copolymer templated mesoporous nickel–cobalt carbonates and oxides

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhaway, Sarang M.; Tangvijitsakul, Pattarasai; Lee, Jeongwoo

    2015-09-16

    Micelle-templated ordered mesoporous nickel–cobalt carbonates and oxides are fabricated using a metal nitrate–citric acid strategy, which avoids the hydrolysis and aging requirements associated with sol–gel chemistry. A series of mesoporous Ni xCo (3-x)(CO 3) y and Ni xCo (3-x)O 4 films with varying Ni–Co compositions and 14 ± 4 nm mesopores are fabricated with the same block copolymer template. AFM and GISAXS analysis indicates that the mesostructure is maintained through the formation of the carbonate and oxide, while GIXD profiles confirm formation of pure spinel phases of semi-crystalline Ni xCo (3-x)O 4. The micelle templated mesopores are interconnected and providemore » transport paths for the electrolyte to minimize the solid-state diffusion requirements associated with battery electrodes. These materials exhibit good performance as sodium ion battery anodes even at high current densities of 4 A g -1. Amongst the mixed-metal oxides, Ni 2CoO 4 exhibits the highest specific capacity of 239 mA h g -1 after galvanostatic cycling at a current density of 1 A g -1 for 10 cycles. We attribute the superior performance of Ni 2CoO 4 at high rates to the high surface area and short ion-diffusion paths of the nanoporous anode architecture, while the higher nickel content in the mixed metal oxide provides enhanced stability during oxide formation along with enhanced electronic conductivity, leading to improved cycling stability of the anode. This micelle template metal nitrate–citric acid method enables new possibilities for fabricating variety of ordered mesoporous mixed-metal carbonates and oxides that could be used in a wide range of applications.« less

  7. Systematic Heuristic Evaluation of Computerized Consultation Order Templates: Clinicians' and Human Factors Engineers' Perspectives.

    PubMed

    Savoy, April; Patel, Himalaya; Flanagan, Mindy E; Weiner, Michael; Russ, Alissa L

    2017-08-01

    We assessed the usability of consultation order templates and identified problems to prioritize in design efforts for improving referral communication. With a sample of 26 consultation order templates, three evaluators performed a usability heuristic evaluation. The evaluation used 14 domain-independent heuristics and the following three supplemental references: 1 new domain-specific heuristic, 6 usability goals, and coded clinicians' statements regarding ease of use for 10 sampled templates. Evaluators found 201 violations, a mean of 7.7 violations per template. Minor violations outnumbered major violations almost twofold, 115 (57%) to 62 (31%). Approximately 68% of violations were linked to 5 heuristics: aesthetic and minimalist design (17%), error prevention (16%), consistency and standards (14%), recognition rather than recall (11%), and meet referrers' information needs (10%). Severe violations were attributed mostly to meet referrers' information needs and recognition rather than recall. Recorded violations yielded potential negative consequences for efficiency, effectiveness, safety, learnability, and utility. Evaluators and clinicians demonstrated 80% agreement in usability assessment. Based on frequency and severity of usability heuristic violations, the consultation order templates reviewed may impede clinical efficiency and risk patient safety. Results support the following design considerations: communicate consultants' requirements, facilitate information seeking, and support communication. While the most frequent heuristic violations involved interaction design and presentation, the most severe violations lacked information desired by referring clinicians. Violations related to templates' inability to support referring clinicians' information needs had the greatest potential negative impact on efficiency and safety usability goals. Heuristics should be prioritized in future design efforts.

  8. Nanometer-Scale Chemistry of a Calcite Biomineralization Template: Implications for Skeletal Composition and Nucleation.

    PubMed

    Branson, Oscar; Bonnin, Elisa A; Perea, Daniel E; Spero, Howard J; Zhu, Zihua; Winters, Maria; Hönisch, Bärbel; Russell, Ann D; Fehrenbacher, Jennifer S; Gagnon, Alexander C

    2016-11-15

    Plankton, corals, and other organisms produce calcium carbonate skeletons that are integral to their survival, form a key component of the global carbon cycle, and record an archive of past oceanographic conditions in their geochemistry. A key aspect of the formation of these biominerals is the interaction between organic templating structures and mineral precipitation processes. Laboratory-based studies have shown that these atomic-scale processes can profoundly influence the architecture and composition of minerals, but their importance in calcifying organisms is poorly understood because it is difficult to measure the chemistry of in vivo biomineral interfaces at spatially relevant scales. Understanding the role of templates in biomineral nucleation, and their importance in skeletal geochemistry requires an integrated, multiscale approach, which can place atom-scale observations of organic-mineral interfaces within a broader structural and geochemical context. Here we map the chemistry of an embedded organic template structure within a carbonate skeleton of the foraminifera Orbulina universa using both atom probe tomography (APT), a 3D chemical imaging technique with Ångström-level spatial resolution, and time-of-flight secondary ionization mass spectrometry (ToF-SIMS), a 2D chemical imaging technique with submicron resolution. We quantitatively link these observations, revealing that the organic template in O. universa is uniquely enriched in both Na and Mg, and contributes to intraskeletal chemical heterogeneity. Our APT analyses reveal the cation composition of the organic surface, offering evidence to suggest that cations other than Ca 2+ , previously considered passive spectator ions in biomineral templating, may be important in defining the energetics of carbonate nucleation on organic templates.

  9. A pilot study to measure marks in children with cerebral palsy using a novel measurement template.

    PubMed

    Bennett, T; Jellinek, D; Bennett, M

    2013-11-01

    The primary aim of this pilot study was to trial a method of assessing bruises in a population of disabled children. If the method was found to be sufficiently robust it would be our intention to undertaking a more extensive observational study. Less is known about normal bruising patterns in children with disability than in those without. It is important that the method used to assess bruising is objective and repeatable. In an effort to define and improve repeatability, we employed a novel bruise measurement template which was printed onto transparent acetate sheets. Twenty primary school age children, the majority of whom were non-ambulant and severely disabled with cerebral palsy, underwent full skin examination. The template was used to assess any bruises seen. A comparison was then made between measurements made by experienced paediatricians using the template and using a standard tape measure on a series of bruise images in 25 photographs. The majority of children in our pilot were found to have bruises, with one child having 6 and one 7 bruises. This comparative study showed that the two techniques had a very similar precision and that the template was easy to use. Greater precision would require a tighter measurement protocol, whether with a template or a tape measure. Further evaluation of the application of such a template would be worthwhile. We would suggest that our finding of some bruising in this population of disabled children is borne in mind whenever bruising is found in a non-ambulant child. © 2012 John Wiley & Sons Ltd.

  10. 48 CFR 52.204-2 - Security Requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 2 2013-10-01 2013-10-01 false Security Requirements. 52....204-2 Security Requirements. As prescribed in 4.404(a), insert the following clauses: Security... classified Confidential, Secret, or Top Secret. (b) The Contractor shall comply with (1) the Security...

  11. 48 CFR 52.204-2 - Security Requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Security Requirements. 52....204-2 Security Requirements. As prescribed in 4.404(a), insert the following clauses: Security... classified Confidential, Secret, or Top Secret. (b) The Contractor shall comply with (1) the Security...

  12. Epitaxy of Ferroelectric P(VDF-TrFE) Films via Removable PTFE Templates and Its Application in Semiconducting/Ferroelectric Blend Resistive Memory.

    PubMed

    Xia, Wei; Peter, Christian; Weng, Junhui; Zhang, Jian; Kliem, Herbert; Jiang, Yulong; Zhu, Guodong

    2017-04-05

    Ferroelectric polymer based devices exhibit great potentials in low-cost and flexible electronics. To meet the requirements of both low voltage operation and low energy consumption, thickness of ferroelectric polymer films is usually required to be less than, for example, 100 nm. However, decrease of film thickness is also accompanied by the degradation of both crystallinity and ferroelectricity and also the increase of current leakage, which surely degrades device performance. Here we report one epitaxy method based on removable poly(tetrafluoroethylene) (PTFE) templates for high-quality fabrication of ordered ferroelectric polymer thin films. Experimental results indicate that such epitaxially grown ferroelectric polymer films exhibit well improved crystallinity, reduced current leakage and good resistance to electrical breakdown, implying their applications in high-performance and low voltage operated ferroelectric devices. On the basis of this removable PTFE template method, we fabricated organic semiconducting/ferroelectric blend resistive films which presented record electrical performance with operation voltage as low as 5 V and ON/OFF ratio up to 10 5 .

  13. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true IT security requirements... security requirements. These IT security requirements cover all NASA contracts in which IT plays a role in...-63, Electronic Authentication Guideline) access to NASA's computer systems, networks, or IT...

  14. 48 CFR 52.204-2 - Security Requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... classified Confidential, Secret, or Top Secret. (b) The Contractor shall comply with (1) the Security..., subsequent to the date of this contract, the security classification or security requirements under this... requirements, as provided in paragraphs (b) and (c), results (1) in a change in the security classification of...

  15. Research on Secure Systems and Automatic Programming. Volume II

    DTIC Science & Technology

    1977-10-14

    X,Ow) X x for all X in the range of w. wr t. * -.- -. . Flowchart:-7 ’pol" f c p and. f hao a uniform Inverse and w is associative, 0 IrI P ARENT (X...CANDO IFD0’IE GDIPENSION -- < ( BINDINGS) (GEN-CLAUSE )<C <IFCANl RULE) <IFCA!|) <DIMENSION) < IFCAIBODY) > SPN-CLAUSE - (GOAL ( GPROPOSITION) > IT MEN ...age, some hobbies,a worth, some at-ribute, a sex, an emotion , a marriage, and may have a wife, or a husband (spouse). The template for this is shown

  16. 7 CFR 764.255 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.255 Section 764.255... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL... operating purposes, loans must be secured by a first lien on farm property or products having a security...

  17. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Security requirements for... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 3052.204-70 Security requirements...

  18. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Security requirements for... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 3052.204-70 Security requirements...

  19. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  20. Clinical application of fully digital Cerec surgical guides made in-house.

    PubMed

    Bindl, A

    2015-01-01

    It is now possible to produce full-digital drilling templates with Cerec Guide 2 (Sirona) in the dental practice relatively quickly, efficiently, and economically. Here, a patient case example is used to present an exemplary description of the procedure and method to do this. The solution described herein shows the advantageous efficiency, compared with other systems presently on the market, of a procedure that does not require the external production of the drilling template in the laboratory or a manufacturing center.

  1. Acoustic transient classification with a template correlation processor.

    PubMed

    Edwards, R T

    1999-10-01

    I present an architecture for acoustic pattern classification using trinary-trinary template correlation. In spite of its computational simplicity, the algorithm and architecture represent a method which greatly reduces bandwidth of the input, storage requirements of the classifier memory, and power consumption of the system without compromising classification accuracy. The linear system should be amenable to training using recently-developed methods such as Independent Component Analysis (ICA), and we predict that behavior will be qualitatively similar to that of structures in the auditory cortex.

  2. 15 maps merged in one data structure - GIS-based template for Dawn at Ceres

    NASA Astrophysics Data System (ADS)

    Naß, A.; Dawn Mapping Team

    2017-09-01

    Derive regional and global valid statements out of the map (quadrangles) is already a very time intensive task. However, another challenge is how individual mappers can generate one homogenous GIS-based project (w.r.t. geometrical and visual character) representing one geologically-consistent final map. Within this contribution a template will be presented which was generated for the process of the interpretative mapping project of Ceres to accomplish the requirement of unifying and merging individual quadrangle.

  3. 7 CFR 764.355 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. (a) EM loans made under § 764.351(a)(1) must comply with the general security requirements established at...

  4. 7 CFR 764.355 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. Link... comply with the general security requirements established at §§ 764.103, 764.104 and 764.155(b). (b) EM...

  5. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  6. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  7. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  8. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  9. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  10. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...

  11. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...

  12. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...

  13. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...

  14. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...

  15. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    PubMed Central

    Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403

  16. Unconstrained and contactless hand geometry biometrics.

    PubMed

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  17. Unconstrained and Contactless Hand Geometry Biometrics

    PubMed Central

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely Support Vector Machines (SVM) and k-Nearest Neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices. PMID:22346634

  18. A PBOM configuration and management method based on templates

    NASA Astrophysics Data System (ADS)

    Guo, Kai; Qiao, Lihong; Qie, Yifan

    2018-03-01

    The design of Process Bill of Materials (PBOM) holds a hinge position in the process of product development. The requirements of PBOM configuration design and management for complex products are analysed in this paper, which include the reuse technique of configuration procedure and urgent management need of huge quantity of product family PBOM data. Based on the analysis, the function framework of PBOM configuration and management has been established. Configuration templates and modules are defined in the framework to support the customization and the reuse of configuration process. The configuration process of a detection sensor PBOM is shown as an illustration case in the end. The rapid and agile PBOM configuration and management can be achieved utilizing template-based method, which has a vital significance to improve the development efficiency for complex products.

  19. 45 CFR 95.621 - ADP reviews.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... Federal review. (f) ADP System Security Requirements and Review Process—(1) ADP System Security Requirement. State agencies are responsible for the security of all ADP projects under development, and...

  20. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2013-10-01 2013-10-01 false Armed security officer requirements. 1562.29...

  1. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2014-10-01 2014-10-01 false Armed security officer requirements. 1562.29...

  2. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2012-10-01 2012-10-01 false Armed security officer requirements. 1562.29...

  3. 17 CFR 242.400 - Customer margin requirements for security futures-authority, purpose, interpretation, and scope.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) Require such member to hold itself out as being willing to buy and sell security futures for its own... for security futures-authority, purpose, interpretation, and scope. 242.400 Section 242.400 Commodity..., AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin Requirements for...

  4. Nanometer-Scale Chemistry of a Calcite Biomineralization Template: Implications for Skeletal Composition and Nucleation

    PubMed Central

    Bonnin, Elisa A.; Perea, Daniel E.; Spero, Howard J.; Zhu, Zihua; Winters, Maria; Hönisch, Bärbel; Russell, Ann D.; Fehrenbacher, Jennifer S.; Gagnon, Alexander C.

    2016-01-01

    Plankton, corals, and other organisms produce calcium carbonate skeletons that are integral to their survival, form a key component of the global carbon cycle, and record an archive of past oceanographic conditions in their geochemistry. A key aspect of the formation of these biominerals is the interaction between organic templating structures and mineral precipitation processes. Laboratory-based studies have shown that these atomic-scale processes can profoundly influence the architecture and composition of minerals, but their importance in calcifying organisms is poorly understood because it is difficult to measure the chemistry of in vivo biomineral interfaces at spatially relevant scales. Understanding the role of templates in biomineral nucleation, and their importance in skeletal geochemistry requires an integrated, multiscale approach, which can place atom-scale observations of organic-mineral interfaces within a broader structural and geochemical context. Here we map the chemistry of an embedded organic template structure within a carbonate skeleton of the foraminifera Orbulina universa using both atom probe tomography (APT), a 3D chemical imaging technique with Ångström-level spatial resolution, and time-of-flight secondary ionization mass spectrometry (ToF-SIMS), a 2D chemical imaging technique with submicron resolution. We quantitatively link these observations, revealing that the organic template in O. universa is uniquely enriched in both Na and Mg, and contributes to intraskeletal chemical heterogeneity. Our APT analyses reveal the cation composition of the organic surface, offering evidence to suggest that cations other than Ca2+, previously considered passive spectator ions in biomineral templating, may be important in defining the energetics of carbonate nucleation on organic templates. PMID:27794119

  5. Electroencephalography leads placed by nontechnologists using a template system produce signals equal in quality to technologist-applied, collodion disk leads.

    PubMed

    Kolls, Brad J; Olson, Daiwai M; Gallentine, William B; Skeen, Mark B; Skidmore, Christopher T; Sinha, Saurabh R

    2012-02-01

    The purpose of this study was to compare the quality of the electroencephalographic (EEG) data obtained with a BraiNet template in a practical use setting, to that obtained with standard 10/20 spaced, technologist-applied, collodion-based disk leads. Pairs of 8-hour blocks of EEG data were prospectively collected from 32 patients with a Glasgow coma score of ≤9 and clinical concern for underlying nonconvulsive status epilepticus over a 6-month period in the Neurocritical Care Unit at the Duke University Medical Center. The studies were initiated with the BraiNet template system applied by critical care nurse practitioners or physicians, followed by standard, collodion leads applied by registered technologists using the 10/20 system of placement. Impedances were measured at the beginning and end of each block recorded and variance in impedance, mean impedance, and the largest differences in impedances found within a given lead set were compared. Physicians experienced in reading EEG performed a masked review of the EEG segments obtained to assess the subjective quality of the recordings obtained with the templates. We found no clinically significant differences in the impedance measures. There was a 3-hour reduction in the time required to initiate EEG recording using the templates (P < 0.001). There was no difference in the overall subjective quality distributions for template-applied versus technologist-applied EEG leads. The templates were also found to be well accepted by the primary users in the intensive care unit. The findings suggest that the EEG data obtained with this approach are comparable with that obtained by registered technologist-applied leads and represents a possible solution to the growing clinical need for continuous EEG recording availability in the critical care setting.

  6. Template-directed instrumentation in total knee arthroplasty: cost savings analysis.

    PubMed

    Hsu, Andrew R; Gross, Christopher E; Bhatia, Sanjeev; Levine, Brett R

    2012-11-01

    The use of digital radiography and templating software in total knee arthroplasty (TKA) continues to become more prevalent as the number of procedures performed increases every year. Template-directed instrumentation (TDI) is a novel approach to surgical planning that combines digital templating with limited intraoperative instruments. The purpose of this study was to evaluate the financial implications and radiographic outcomes of using TDI to direct instrumentation during primary TKA. Over a 1-year period, 82 consecutive TKAs using TDI were retrospectively reviewed. Patient demographics and preoperative templated sizes of predicted components were recorded, and OrthoView digital planning software (OrthoView LLC, Jacksonville, Florida was used to determine the 2 most likely tibial and femoral component sizes for each case. This sizing information was used to direct component vendors to prepare 3 lightweight instrument trays based on these sizes. The sizes of implanted components and the number of total trays required were documented. A cost savings analysis was performed to compare TDI and non-TDI surgical expenses for TKA. In 80 (97%) of 82 cases, the prepared sizes determined by TDI using 3 instrument trays were sufficient. Preoperative templating correctly predicted the size of the tibial and femoral component sizes in 90% and 83% of cases, respectively. The average number of trays used with TDI was 3.0 (range, 3-5 trays) compared with 7.5 (range, 6-9 trays) used in 82 preceding non-TDI TKAs. Based on standard fees to sterilize and package implant trays (approximately $26 based on a survey of 10 orthopedic hospitals performing TKA), approximately $9612 was saved by using TDI over the 1-year study period. Overall, digital templating and TDI were a simple and cost-effective approach when performing primary TKA. Copyright 2012, SLACK Incorporated.

  7. Nucleocapsid Protein Annealing of a Primer-Template Enhances (+)-Strand DNA Synthesis and Fidelity by HIV-1 Reverse Transcriptase†

    PubMed Central

    Kim, Jiae; Roberts, Anne; Yuan, Hua; Xiong, Yong; Anderson, Karen S.

    2012-01-01

    Human immunodeficiency virus type-1 (HIV-1) requires reverse transcriptase (RT) and HIV-1 nucleocapsid protein (NCp7) for proper viral replication. HIV-1 NCp7 has been shown to enhance various steps in reverse transcription including tRNA initiation and strand transfer which may be mediated through interactions with RT as well as RNA and DNA oligonucleotides. With the use of DNA oligonucleotides, we have examined the interaction of NCp7 with RT and the kinetics of reverse transcription during (+)-strand synthesis with an NCp7-facilitated annealed primer-template. Using a pre-steady state kinetics approach, the NCp7-annealed primer-template has a substantial increase (3-7 fold) in the rate of incorporation (kpol) by RT as compared to heat annealed primer-template with single nucleotide incorporation. There was also a 2-fold increase in the binding affinity constant (Kd) of the nucleotide. These differences in kpol and Kd were not through direct interactions between HIV-1 RT and NCp7. When examining extension by RT, the data suggests that the NCp7-annealed primer-template facilitates the formation of a longer product more quickly compared to the heat annealed primer-template. This enhancement in rate is mediated through interactions with NCp7’s zinc fingers and N-terminal domain and nucleic acids. The NCp7-annealed primer-template also enhances the fidelity of RT (3-fold) by slowing the rate of incorporation of an incorrect nucleotide. Taken together, this study elucidates a new role of NCp7 by facilitating DNA-directed DNA synthesis during reverse transcription by HIV-1 RT that may translate into enhanced viral fitness and offers an avenue to exploit for targeted therapeutic intervention against HIV. PMID:22210155

  8. Georeferencing the Large-Scale Aerial Photographs of a Great Lakes Coastal Wetland: A Modified Photogrammetric Method

    USGS Publications Warehouse

    Murphy, Marilyn K.; Kowalski, Kurt P.; Grapentine, Joel L.

    2010-01-01

    The geocontrol template method was developed to georeference multiple, overlapping analog aerial photographs without reliance upon conventionally obtained horizontal ground control. The method was tested as part of a long-term wetland habitat restoration project at a Lake Erie coastal wetland complex in the U.S. Fish and Wildlife Service Ottawa National Wildlife Refuge. As in most coastal wetlands, annually identifiable ground-control features required to georeference photo-interpreted data are difficult to find. The geocontrol template method relies on the following four components: (a) an uncontrolled aerial photo mosaic of the study area, (b) global positioning system (GPS) derived horizontal coordinates of each photo’s principal point, (c) a geocontrol template created by the transfer of fiducial markings and calculated principal points to clear acetate from individual photographs arranged in a mosaic, and (d) the root-mean-square-error testing of the system to ensure an acceptable level of planimetric accuracy. Once created for a study area, the geocontrol template can be registered in geographic information system (GIS) software to facilitate interpretation of multiple images without individual image registration. The geocontrol template enables precise georeferencing of single images within larger blocks of photographs using a repeatable and consistent method.

  9. Short Communication: Analysis of Minor Populations of Human Immunodeficiency Virus by Primer Identification and Insertion-Deletion and Carry Forward Correction Pipelines.

    PubMed

    Hughes, Paul; Deng, Wenjie; Olson, Scott C; Coombs, Robert W; Chung, Michael H; Frenkel, Lisa M

    2016-03-01

    Accurate analysis of minor populations of drug-resistant HIV requires analysis of a sufficient number of viral templates. We assessed the effect of experimental conditions on the analysis of HIV pol 454 pyrosequences generated from plasma using (1) the "Insertion-deletion (indel) and Carry Forward Correction" (ICC) pipeline, which clusters sequence reads using a nonsubstitution approach and can correct for indels and carry forward errors, and (2) the "Primer Identification (ID)" method, which facilitates construction of a consensus sequence to correct for sequencing errors and allelic skewing. The Primer ID and ICC methods produced similar estimates of viral diversity, but differed in the number of sequence variants generated. Sequence preparation for ICC was comparably simple, but was limited by an inability to assess the number of templates analyzed and allelic skewing. The more costly Primer ID method corrected for allelic skewing and provided the number of viral templates analyzed, which revealed that amplifiable HIV templates varied across specimens and did not correlate with clinical viral load. This latter observation highlights the value of the Primer ID method, which by determining the number of templates amplified, enables more accurate assessment of minority species in the virus population, which may be relevant to prescribing effective antiretroviral therapy.

  10. 77 FR 70213 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-23

    ...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities and Exchange Commission (``Commission''), pursuant to the Securities Exchange Act of 1934 (``Exchange Act''), is proposing capital and margin requirements for security-based swap dealers (``SBSDs'') and major security-based swap participants (``MSBSPs''), segregation requirements for SBSDs, and notification requirements with respect to segregation for SBSDs and MSBSPs. The Commission also is proposing to increase the minimum net capital requirements for broker-dealers permitted to use the alternative internal model-based method for computing net capital (``ANC broker-dealers'').

  11. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  12. 77 FR 71369 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-68071; File No. S7-08-12] RIN 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security-Based Swap Participants and Capital Requirements for Broker-Dealers Correction In proposed rule...

  13. Mutational analysis reveals a noncontractile but interactive role of actin and profilin in viral RNA-dependent RNA synthesis.

    PubMed

    Harpen, Mary; Barik, Tiasha; Musiyenko, Alla; Barik, Sailen

    2009-11-01

    As obligatory parasites, viruses co-opt a variety of cellular functions for robust replication. The expression of the nonsegmented negative-strand RNA genome of respiratory syncytial virus (RSV), a significant pediatric pathogen, absolutely requires actin and is stimulated by the actin-regulatory protein profilin. As actin is a major contractile protein, it was important to determine whether the known functional domains of actin and profilin were important for their ability to activate RSV transcription. Analyses of recombinant mutants in a reconstituted RSV transcription system suggested that the divalent-cation-binding domain of actin is critically needed for binding to the RSV genome template and for the activation of viral RNA synthesis. In contrast, the nucleotide-binding domain and the N-terminal acidic domain were needed neither for template binding nor for transcription. Specific surface residues of actin, required for actin-actin contact during filamentation, were also nonessential for viral transcription. Unlike actin, profilin did not directly bind to the viral template but was recruited by actin. Mutation of the interactive residues of actin or profilin, resulting in the loss of actin-profilin binding, also abolished profilin's ability to stimulate viral transcription. Together, these results suggest that actin acts as a classical transcription factor for the virus by divalent-cation-dependent binding to the viral template and that profilin acts as a transcriptional cofactor, in part by associating with actin. This essential viral role of actin is independent of its contractile cellular role.

  14. Synthesis and Evolution of a Threose Nucleic Acid Aptamer Bearing 7-Deaza-7-Substituted Guanosine Residues.

    PubMed

    Mei, Hui; Liao, Jen-Yu; Jimenez, Randi M; Wang, Yajun; Bala, Saikat; McCloskey, Cailen; Switzer, Christopher; Chaput, John C

    2018-05-02

    In vitro selection experiments carried out on artificial genetic polymers require robust and faithful methods for copying genetic information back and forth between DNA and xeno-nucleic acids (XNA). Previously, we have shown that Kod-RI, an engineered polymerase developed to transcribe DNA templates into threose nucleic acid (TNA), can function with high fidelity in the absence of manganese ions. However, the transcriptional efficiency of this enzyme diminishes greatly when individual templates are replaced with libraries of DNA sequences, indicating that manganese ions are still required for in vitro selection. Unfortunately, the presence of manganese ions in the transcription mixture leads to the misincorporation of tGTP nucleotides opposite dG residues in the templating strand, which are detected as G-to-C transversions when the TNA is reverse transcribed back into DNA. Here we report the synthesis and fidelity of TNA replication using 7-deaza-7-modified guanosine base analogues in the DNA template and incoming TNA nucleoside triphosphate. Our findings reveal that tGTP misincorporation occurs via a Hoogsteen base pair in which the incoming tGTP residue adopts a syn conformation with respect to the sugar. Substitution of tGTP for 7-deaza-7-phenyl tGTP enabled the synthesis of TNA polymers with >99% overall fidelity. A TNA library containing the 7-deaza-7-phenyl guanine analogue was used to evolve a biologically stable TNA aptamer that binds to HIV reverse transcriptase with low nanomolar affinity.

  15. 49 CFR 573.9 - Address for submitting required reports and other information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Internet Web page http://www.safercar.gov/Vehicle+Manufacturers. A manufacturer must use the templates provided at this Web page for all submissions required under this section. Defect and noncompliance... at this Web page. [78 FR 51421, Aug. 20, 2013] ...

  16. Guidelines Regarding §16 of the German Transplantation Act - Initial Experiences with Structured Reporting.

    PubMed

    Pinto Dos Santos, Daniel; Arnhold, Gordon; Mildenberger, Peter; Düber, Christoph; Kloeckner, Roman

    2017-12-01

    Purpose  To transfer the report sheet from the guidelines regarding the German Transplantation Act to a standards-compliant report template and to evaluate it in the clinical routine. Materials and Methods  The template was developed using the freely available software brackets.io. It was implemented in the clinical routine using a reporting platform developed in-house. Interfaces to the department RIS and PACS allowed for integration into the usual reporting workflow. The evaluation period was 70 days. Results  Developing the template for implementation of the guidelines was possible without any difficulties. The content of the report sheet provided in the guidelines was transferred one to one. Additionally, a text field was included to allow for further remarks. In the period under review, 7 radiologists performed 44 evaluations in line with § 16 of the German Transplantation Act. Users of the template, referring physicians and the employees of the transplantation office reported a high degree of satisfaction. Conclusion  Implementing report sheets that are required by law (e. g. in the guidelines regarding § 16 of the German Transplantation Act) in the clinical routine electronically is easy and achieves a high degree of acceptance. The standard supported by the German Radiological Society (IHE - "Management of radiology report templates") allows for a quick response to the growing demand for structured and standardized reporting. Key Points   · Report sheets as required by law can easily be incorporated electronically into the clinical routine.. · Templates for structured reporting as supported by the German Radiological Society allow for a quick response to the growing demand for standardized reporting.. · Radiologists as well as referring physicians report a high degree of satisfaction with the electronic version of the report sheet.. Citation Format · Pinto dos Santos D, Arnhold G, Mildenberger P et al. Guidelines Regarding §16 of the German Transplantation Act - Initial Experiences with Structured Reporting. Fortschr Röntgenstr 2017; 189: 1145 - 1151. © Georg Thieme Verlag KG Stuttgart · New York.

  17. 17 CFR 242.403 - Required margin.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Required margin. 242.403 Section 242.403 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...

  18. 48 CFR 1852.204-75 - Security classification requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Security classification... and Clauses 1852.204-75 Security classification requirements. As prescribed in 1804.404-70, insert the following clause: Security Classification Requirements (SEP 1989) Performance under this contract will...

  19. 48 CFR 1852.204-75 - Security classification requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security classification... and Clauses 1852.204-75 Security classification requirements. As prescribed in 1804.404-70, insert the following clause: Security Classification Requirements (SEP 1989) Performance under this contract will...

  20. 24 CFR 201.24 - Security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Security requirements. 201.24....24 Security requirements. (a) Property improvement loans—(1) Property improvement loans in excess of... evidenced by a properly recorded financing statement, a properly recorded security instrument executed by...

  1. 24 CFR 201.24 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Security requirements. 201.24....24 Security requirements. (a) Property improvement loans—(1) Property improvement loans in excess of... evidenced by a properly recorded financing statement, a properly recorded security instrument executed by...

  2. Humanitarian assistance and disaster relief: changing the face of defense.

    PubMed

    Laraby, Patrick R; Bourdeaux, Margaret; Casscells, S Ward; Smith, David J; Lawry, Lynn

    2009-01-01

    The US Department of Defense (DOD) is evolving to meet new security challenges in the twenty-first century. Today's challenges result from growing political, environmental, and economic instability in important areas of the globe that threaten national and global security. Immediate outreach to foreign nations in times of violent instability or natural disaster fosters security and stability both for the affected country and for the United States. Foreign humanitarian assistance (FHA) is a rapidly evolving military mission that addresses conflict prevention, conflict, postconflict, and natural disasters. With DOD's extensive global medical resources, it is often uniquely qualified to execute a critical role in relief and/or public health efforts. When and how the American military will act in FHA and disaster relief is a still evolving doctrine with three issues deserving particular attention: aligning operations with host government leadership, preserving humanitarian space, and tailoring the US military's unique resources to the specific political and medical situation at hand. The DOD's response to a large-scale earthquake in Peru suggests useful approaches to these three issues, provides a template for future FHA mission, and points to strategic decisions and operational capabilities that need further development to establish the FHA mission firmly within DOD's repertoire of security engagement activities.

  3. Liquid foam templating - A route to tailor-made polymer foams.

    PubMed

    Andrieux, Sébastien; Quell, Aggeliki; Stubenrauch, Cosima; Drenckhan, Wiebke

    2018-06-01

    Solid foams with pore sizes between a few micrometres and a few millimetres are heavily exploited in a wide range of established and emerging applications. While the optimisation of foam applications requires a fine control over their structural properties (pore size distribution, pore opening, foam density, …), the great complexity of most foaming processes still defies a sound scientific understanding and therefore explicit control and prediction of these parameters. We therefore need to improve our understanding of existing processes and also develop new fabrication routes which we understand and which we can exploit to tailor-make new porous materials. One of these new routes is liquid templating in general and liquid foam templating in particular, to which this review article is dedicated. While all solid foams are generated from an initially liquid(-like) state, the particular notion of liquid foam templating implies the specific condition that the liquid foam has time to find its "equilibrium structure" before it is solidified. In other words, the characteristic time scales of the liquid foam's stability and its solidification are well separated, allowing to build on the vast know-how on liquid foams established over the last 20 years. The dispersed phase of the liquid foam determines the final pore size and pore size distribution, while the continuous phase contains the precursors of the desired porous scaffold. We review here the three key challenges which need to be addressed by this approach: (1) the control of the structure of the liquid template, (2) the matching of the time scales between the stability of the liquid template and solidification, and (3) the preservation of the structure of the template throughout the process. Focusing on the field of polymer foams, this review gives an overview of recent research on the properties of liquid foam templates and summarises a key set of studies in the emerging field of liquid foam templating. It finishes with an outlook on future developments. Occasional references to non-polymeric foams are given if the analogy provides specific insight into a physical phenomenon. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. RNA 3D Structure Modeling by Combination of Template-Based Method ModeRNA, Template-Free Folding with SimRNA, and Refinement with QRNAS.

    PubMed

    Piatkowski, Pawel; Kasprzak, Joanna M; Kumar, Deepak; Magnus, Marcin; Chojnowski, Grzegorz; Bujnicki, Janusz M

    2016-01-01

    RNA encompasses an essential part of all known forms of life. The functions of many RNA molecules are dependent on their ability to form complex three-dimensional (3D) structures. However, experimental determination of RNA 3D structures is laborious and challenging, and therefore, the majority of known RNAs remain structurally uncharacterized. To address this problem, computational structure prediction methods were developed that either utilize information derived from known structures of other RNA molecules (by way of template-based modeling) or attempt to simulate the physical process of RNA structure formation (by way of template-free modeling). All computational methods suffer from various limitations that make theoretical models less reliable than high-resolution experimentally determined structures. This chapter provides a protocol for computational modeling of RNA 3D structure that overcomes major limitations by combining two complementary approaches: template-based modeling that is capable of predicting global architectures based on similarity to other molecules but often fails to predict local unique features, and template-free modeling that can predict the local folding, but is limited to modeling the structure of relatively small molecules. Here, we combine the use of a template-based method ModeRNA with a template-free method SimRNA. ModeRNA requires a sequence alignment of the target RNA sequence to be modeled with a template of the known structure; it generates a model that predicts the structure of a conserved core and provides a starting point for modeling of variable regions. SimRNA can be used to fold small RNAs (<80 nt) without any additional structural information, and to refold parts of models for larger RNAs that have a correctly modeled core. ModeRNA can be either downloaded, compiled and run locally or run through a web interface at http://genesilico.pl/modernaserver/ . SimRNA is currently available to download for local use as a precompiled software package at http://genesilico.pl/software/stand-alone/simrna and as a web server at http://genesilico.pl/SimRNAweb . For model optimization we use QRNAS, available at http://genesilico.pl/qrnas .

  5. Structure of Hepatitis C Virus Polymerase in Complex with Primer-Template RNA

    PubMed Central

    Murakami, Eisuke; Lam, Angela M.; Grice, Rena L.; Du, Jinfa; Sofia, Michael J.; Furman, Philip A.; Otto, Michael J.

    2012-01-01

    The replication of the hepatitis C viral (HCV) genome is accomplished by the NS5B RNA-dependent RNA polymerase (RdRp), for which mechanistic understanding and structure-guided drug design efforts have been hampered by its propensity to crystallize in a closed, polymerization-incompetent state. The removal of an autoinhibitory β-hairpin loop from genotype 2a HCV NS5B increases de novo RNA synthesis by >100-fold, promotes RNA binding, and facilitated the determination of the first crystallographic structures of HCV polymerase in complex with RNA primer-template pairs. These crystal structures demonstrate the structural realignment required for primer-template recognition and elongation, provide new insights into HCV RNA synthesis at the molecular level, and may prove useful in the structure-based design of novel antiviral compounds. Additionally, our approach for obtaining the RNA primer-template-bound structure of HCV polymerase may be generally applicable to solving RNA-bound complexes for other viral RdRps that contain similar regulatory β-hairpin loops, including bovine viral diarrhea virus, dengue virus, and West Nile virus. PMID:22496223

  6. Efficient Multi-Atlas Registration using an Intermediate Template Image

    PubMed Central

    Dewey, Blake E.; Carass, Aaron; Blitz, Ari M.; Prince, Jerry L.

    2017-01-01

    Multi-atlas label fusion is an accurate but time-consuming method of labeling the human brain. Using an intermediate image as a registration target can allow researchers to reduce time constraints by storing the deformations required of the atlas images. In this paper, we investigate the effect of registration through an intermediate template image on multi-atlas label fusion and propose a novel registration technique to counteract the negative effects of through-template registration. We show that overall computation time can be decreased dramatically with minimal impact on final label accuracy and time can be exchanged for improved results in a predictable manner. We see almost complete recovery of Dice similarity over a simple through-template registration using the corrected method and still maintain a 3–4 times speed increase. Further, we evaluate the effectiveness of this method on brains of patients with normal-pressure hydrocephalus, where abnormal brain shape presents labeling difficulties, specifically the ventricular labels. Our correction method creates substantially better ventricular labeling than traditional methods and maintains the speed increase seen in healthy subjects. PMID:28943702

  7. Using dynamic programming to improve fiducial marker localization

    NASA Astrophysics Data System (ADS)

    Wan, Hanlin; Ge, Jiajia; Parikh, Parag

    2014-04-01

    Fiducial markers are used in a wide range of medical imaging applications. In radiation therapy, they are often implanted near tumors and used as motion surrogates that are tracked with fluoroscopy. We propose a novel and robust method based on dynamic programming (DP) for retrospectively localizing radiopaque fiducial markers in fluoroscopic images. Our method was compared to template matching (TM) algorithms on 407 data sets from 24 patients. We found that the performance of TM varied dramatically depending on the template used (ranging from 47% to 92% of data sets with a mean error <1 mm). DP by itself requires no template and performed as well as the best TM method, localizing the markers in 91% of the data sets with a mean error <1 mm. Finally, by combining DP and TM, we were able to localize the markers in 99% of the data sets with a mean error <1 mm, regardless of the template used. Our results show that DP can be a powerful tool for analyzing tumor motion, capable of accurately locating fiducial markers in fluoroscopic images regardless of marker type, shape, and size.

  8. Efficient multi-atlas registration using an intermediate template image

    NASA Astrophysics Data System (ADS)

    Dewey, Blake E.; Carass, Aaron; Blitz, Ari M.; Prince, Jerry L.

    2017-03-01

    Multi-atlas label fusion is an accurate but time-consuming method of labeling the human brain. Using an intermediate image as a registration target can allow researchers to reduce time constraints by storing the deformations required of the atlas images. In this paper, we investigate the effect of registration through an intermediate template image on multi-atlas label fusion and propose a novel registration technique to counteract the negative effects of through-template registration. We show that overall computation time can be decreased dramatically with minimal impact on final label accuracy and time can be exchanged for improved results in a predictable manner. We see almost complete recovery of Dice similarity over a simple through-template registration using the corrected method and still maintain a 3-4 times speed increase. Further, we evaluate the effectiveness of this method on brains of patients with normal-pressure hydrocephalus, where abnormal brain shape presents labeling difficulties, specifically the ventricular labels. Our correction method creates substantially better ventricular labeling than traditional methods and maintains the speed increase seen in healthy subjects.

  9. 12 CFR 220.12 - Supplement: margin requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security, except for an exempted security, money market mutual fund or exempted securities mutual fund... occurs, whichever is greater. (b) Exempted security, non-equity security, money market mutual fund or exempted securities mutual fund: The margin required by the creditor in good faith or the percentage set by...

  10. Solar Cell Nanotechnology Final Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Das, Biswajit

    2014-05-07

    The objective of this project is to develop a low cost nonlithographic nanofabrication technology for the fabrication of thin film porous templates as well as uniform arrays of semiconductor nanostructures for the implementation of high efficiency solar cells. Solar cells based on semiconductor nanostructures are expected to have very high energy conversion efficiencies due to the increased absorption coefficients of semiconductor nanostructures. In addition, the thin film porous template can be used for optimum surface texturing of solar cells leading to additional enhancement in energy conversion efficiency. An important requirement for these applications is the ability to synthesize nanostructure arraysmore » of different dimensions with good size control. This project employed nanoporous alumina templates created by the anodization of aluminum thin films deposited on glass substrates for the fabrication of the nanostructures and optimized the process parameters to obtain uniform pore diameters. An additional requirement is uniformity or regularity of the nanostructure arrays. While constant current anodization was observed to provide controlled pore diameters, constant voltage anodization was needed for regularity of the nanostructure arrays. Thus a two-step anodization process was investigated and developed in this project for improving the pore size distribution and pore periodicity of the nanoporous alumina templates. CdTe was selected to be the active material for the nanowires, and the process for the successful synthesis of CdTe nanowires was developed in this project. Two different synthesis approaches were investigated in this project, electrochemical and electrophoretic deposition. While electrochemical synthesis was successfully employed for the synthesis of nanowires inside the pores of the alumina templates, the technique was determined to be non-optimum due to the need of elevated temperature that is detrimental to the structural integrity of the nanoporous alumina templates. In order to eliminate this problem, electrophoretic deposition was selected as the more appropriate technique, which involves the guided deposition of semiconductor nanoparticles in the presence of ultrasonic energy to form the crystalline nanowires. Extensive experimental research was carried out to optimize the process parameters for formation of crystalline nanowires. It was observed that the environmental bath temperature plays a critical role in determining the structural integrity of the nanowires and hence their lengths. Investigation was carried out for the formation of semitransparent ohmic contacts on the nanowires to facilitate photocurrent spectroscopy measurements as well as for solar cell implementation. Formation of such ohmic contacts was found to be challenging and a process involving mechanical and electrochemical polishing was developed to facilitate such contacts. The use of nanoporous alumina templates for the surface texturing of mono- and multi-crystalline solar cells was extensively investigated by electrochemical etching of the silicon through the pores of the nanoporous templates. The processes for template formation as well as etching were optimized and the alumina/silicon interface was investigated using capacitance-voltage characterization. The process developed was found to be viable for improving solar cell performance.« less

  11. 7 CFR 762.126 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 762.126 Section 762.126... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.126 Security requirements. (a) General. (1) The lender is responsible for ensuring that proper and adequate security is obtained and maintained to fully...

  12. 17 CFR 242.301 - Requirements for alternative trading systems.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...

  13. 17 CFR 242.301 - Requirements for alternative trading systems.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...

  14. 17 CFR 242.301 - Requirements for alternative trading systems.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...

  15. 17 CFR 242.301 - Requirements for alternative trading systems.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...

  16. 7 CFR 273.12 - Reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... requiring Social Security numbers, the routine uses for Social Security numbers, and the effect of not... paragraph (c) of this section; (x) If the form requests Social Security numbers, include a statement of the State agency's authority to require Social Security numbers (including the statutory citation, the title...

  17. 77 FR 49485 - Agency Information Collection Activities: Proposed Information Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ... requirement for national banks and Federal savings associations titled, ``Company-Run Annual Stress Test... proposed information collection: Title: Company-Run Annual Stress Test Reporting Template and Documentation... stress tests \\2\\ and requires the primary financial regulatory agency \\3\\ of those financial companies to...

  18. ModeRNA: a tool for comparative modeling of RNA 3D structure

    PubMed Central

    Rother, Magdalena; Rother, Kristian; Puton, Tomasz; Bujnicki, Janusz M.

    2011-01-01

    RNA is a large group of functionally important biomacromolecules. In striking analogy to proteins, the function of RNA depends on its structure and dynamics, which in turn is encoded in the linear sequence. However, while there are numerous methods for computational prediction of protein three-dimensional (3D) structure from sequence, with comparative modeling being the most reliable approach, there are very few such methods for RNA. Here, we present ModeRNA, a software tool for comparative modeling of RNA 3D structures. As an input, ModeRNA requires a 3D structure of a template RNA molecule, and a sequence alignment between the target to be modeled and the template. It must be emphasized that a good alignment is required for successful modeling, and for large and complex RNA molecules the development of a good alignment usually requires manual adjustments of the input data based on previous expertise of the respective RNA family. ModeRNA can model post-transcriptional modifications, a functionally important feature analogous to post-translational modifications in proteins. ModeRNA can also model DNA structures or use them as templates. It is equipped with many functions for merging fragments of different nucleic acid structures into a single model and analyzing their geometry. Windows and UNIX implementations of ModeRNA with comprehensive documentation and a tutorial are freely available. PMID:21300639

  19. Cancelable ECG biometrics using GLRT and performance improvement using guided filter with irreversible guide signal.

    PubMed

    Kim, Hanvit; Minh Phuong Nguyen; Se Young Chun

    2017-07-01

    Biometrics such as ECG provides a convenient and powerful security tool to verify or identify an individual. However, one important drawback of biometrics is that it is irrevocable. In other words, biometrics cannot be re-used practically once it is compromised. Cancelable biometrics has been investigated to overcome this drawback. In this paper, we propose a cancelable ECG biometrics by deriving a generalized likelihood ratio test (GLRT) detector from a composite hypothesis testing in randomly projected domain. Since it is common to observe performance degradation for cancelable biometrics, we also propose a guided filtering (GF) with irreversible guide signal that is a non-invertibly transformed signal of ECG authentication template. We evaluated our proposed method using ECG-ID database with 89 subjects. Conventional Euclidean detector with original ECG template yielded 93.9% PD1 (detection probability at 1% FAR) while Euclidean detector with 10% compressed ECG (1/10 of the original data size) yielded 90.8% PD1. Our proposed GLRT detector with 10% compressed ECG yielded 91.4%, which is better than Euclidean with the same compressed ECG. GF with our proposed irreversible ECG template further improved the performance of our GLRT with 10% compressed ECG up to 94.3%, which is higher than Euclidean detector with original ECG. Lastly, we showed that our proposed cancelable ECG biometrics practically met cancelable biometrics criteria such as efficiency, re-usability, diversity and non-invertibility.

  20. Information System through ANIS at CeSAM

    NASA Astrophysics Data System (ADS)

    Moreau, C.; Agneray, F.; Gimenez, S.

    2015-09-01

    ANIS (AstroNomical Information System) is a web generic tool developed at CeSAM to facilitate and standardize the implementation of astronomical data of various kinds through private and/or public dedicated Information Systems. The architecture of ANIS is composed of a database server which contains the project data, a web user interface template which provides high level services (search, extract and display imaging and spectroscopic data using a combination of criteria, an object list, a sql query module or a cone search interfaces), a framework composed of several packages, and a metadata database managed by a web administration entity. The process to implement a new ANIS instance at CeSAM is easy and fast : the scientific project has to submit data or a data secure access, the CeSAM team installs the new instance (web interface template and the metadata database), and the project administrator can configure the instance with the web ANIS-administration entity. Currently, the CeSAM offers through ANIS a web access to VO compliant Information Systems for different projects (HeDaM, HST-COSMOS, CFHTLS-ZPhots, ExoDAT,...).

  1. 78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.

  2. Measuring Use of Evidence-Based Psychotherapy for PTSD in VA Residential Treatment Settings with Clinician Survey and Electronic Medical Record Templates.

    PubMed

    Shiner, Brian; Leonard Westgate, Christine; Simiola, Vanessa; Thompson, Richard; Schnurr, Paula P; Cook, Joan M

    2018-03-14

    Available studies on implementation of evidence-based psychotherapy (EBP) for patients attending Department of Veterans Affairs (VA) residential post-traumatic stress disorder (PTSD) programs rely on therapist self-report of EBP delivery. Patient-level data on receipt of EBP are needed both to corroborate therapist self-report and to understand patient factors that predict receipt of EBPs for PTSD. We identified 159 therapists from 38 VA residential PTSD programs who responded to a survey about EBP implementation during the 2015 fiscal year (FY15). Therapists self-reported their use of two EBPs, including prolonged exposure delivered in an individual format (PE-I) and cognitive processing therapy delivered in individual and group formats (CPT-I and CPT-G). Using electronic medical record (EMR) templates mandated for EBP documentation in FY15, we measured contemporaneous patient-level receipt of EBPs for PTSD. We assessed the degree of correlation between therapist self-reported EBP delivery and patient receipt of EBT as measured by EMR templates using polychoric correlation coefficients. We determined patient and therapist factors that predicted the receipt of EBPs with multivariable logistic regression, using random effects and robust standard error estimation, and controlling for site. The Veterans IRB of Northern New England provided a waiver of informed consent; as this was a retrospective review, no patients or therapists were contacted, and all data were stored, transmitted, and analyzed on secure VA servers. The VA Connecticut Health Care System Human Research Protection Program approved secondary use of therapist survey data for this project. When EMR template use became mandated in FY15, the proportion of patients in residential PTSD programs who received at least one EBP session that was recorded with an EMR template increased dramatically from 8.8% to 33.9%. There was adequate correlation and between survey-based and EMR-based measures of EBP receipt, with polychoric correlation values of 0.77 for PE-I, 0.69 for CPT-I, and 0.82 for CPT-G. Multiple patient factors were positive (e.g., female gender) and negative (e.g., depressive disorders) predictors of receipt of EBPs, even after controlling for site. Among therapist factors, only EBP consultant or trainer status was a positive predictor of EBP provision and only therapist race was a negative predictor of EBT provision after controlling for site. Following a FY15 mandate, EMR templates documenting EBP delivery were widely used by therapists working in VA residential PTSD programs. EBP receipt measured using EMR templates was consistent with therapist self-report of EBT delivery. There were several patient-level predictors of EBP receipt and therapist-level predictors of EBP delivery. However, therapists most likely to deliver EBPs were clustered at a limited number of sites.

  3. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  4. Stereolithographic Surgical Template: A Review

    PubMed Central

    Dandekeri, Shilpa Sudesh; Sowmya, M.K.; Bhandary, Shruthi

    2013-01-01

    Implant placement has become a routine modality of dental care.Improvements in surgical reconstructive methods as well as increased prosthetic demands,require a highly accurate diagnosis, planning and placement. Recently,computer-aided design and manufacturing have made it possible to use data from computerised tomography to not only plan implant rehabilitation,but also transfer this information to the surgery.A review on one of this technique called Stereolithography is presented in this article.It permits graphic and complex 3D implant placement and fabrication of stereolithographic surgical templates. Also offers many significant benefits over traditional procedures. PMID:24179955

  5. An alternative for presenting interactive dynamic data sets in electronic presentations: a scrollable flash movie loop.

    PubMed

    Yam, Chun-Shan

    2007-11-01

    The purpose of this article is to describe an alternative for creating scrollable movie loops for electronic presentations including PowerPoint. The alternative provided in this article enables academic radiologists to present scrollable movie loops in PowerPoint. The scrolling capability is created using Flash ActionScript. A Flash template with the required ActionScript code is provided. Users can simply download the template and follow the step-by-step demonstration to create scrollable movie loops. No previous ActionScript programming knowledge is necessary.

  6. 20 CFR 209.3 - Social security number required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Social security number required. 209.3... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  7. 33 CFR 105.290 - Additional requirements-cruise ship terminals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Additional requirements-cruise ship terminals. 105.290 Section 105.290 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.290 Additional requirements—cruise ship terminals...

  8. 33 CFR 104.295 - Additional requirements-cruise ships.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Additional requirements-cruise ships. 104.295 Section 104.295 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.295 Additional requirements—cruise ships. (a) At all MARSEC...

  9. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Application for security deposit... AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other requirements. (a) Each...

  10. 7 CFR 770.7 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed of...

  11. 7 CFR 764.235 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.235 Section 764.235... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a... estate may be taken as additional security if needed. (c) Loans of $25,000 of less for real estate...

  12. 7 CFR 770.7 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed of...

  13. 78 FR 4365 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major... public comment to establish capital, margin, and segregation requirements for security-based swap dealers... soliciting comment on proposed rules and rule amendments establishing capital, margin, and segregation...

  14. 20 CFR 209.3 - Social security number required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Social security number required. 209.3... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  15. 20 CFR 209.3 - Social security number required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Social security number required. 209.3 Section... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  16. 20 CFR 209.3 - Social security number required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Social security number required. 209.3 Section... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  17. 20 CFR 209.3 - Social security number required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Social security number required. 209.3... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  18. 48 CFR 1852.204-76 - Security requirements for unclassified information technolocgy resources.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Officer for approval by the Network Security Configuration Control Board (NSCCB); (ii) Comply with the... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for... CONTRACT CLAUSES Texts of Provisions and Clauses 1852.204-76 Security requirements for unclassified...

  19. 7 CFR 273.12 - Requirements for change reporting households.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... requiring Social Security numbers, the routine uses for Social Security numbers, and the effect of not... paragraph (c) of this section; (x) If the form requests Social Security numbers, include a statement of the State agency's authority to require Social Security numbers (including the statutory citation, the title...

  20. 7 CFR 273.12 - Requirements for change reporting households.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... requiring Social Security numbers, the routine uses for Social Security numbers, and the effect of not... paragraph (c) of this section; (x) If the form requests Social Security numbers, include a statement of the State agency's authority to require Social Security numbers (including the statutory citation, the title...

  1. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  2. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  3. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  4. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  5. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  6. Foundational Security Principles for Medical Application Platforms* (Extended Abstract)

    PubMed Central

    Vasserman, Eugene Y.; Hatcliff, John

    2014-01-01

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

  7. Plasmodium vivax molecular diagnostics in community surveys: pitfalls and solutions.

    PubMed

    Gruenberg, Maria; Moniz, Clara Antunes; Hofmann, Natalie Ellen; Wampfler, Rahel; Koepfli, Cristian; Mueller, Ivo; Monteiro, Wuelton Marcelo; Lacerda, Marcus; de Melo, Gisely Cardoso; Kuehn, Andrea; Siqueira, Andre M; Felger, Ingrid

    2018-01-30

    A distinctive feature of Plasmodium vivax infections is the overall low parasite density in peripheral blood. Thus, identifying asymptomatic infected individuals in endemic communities requires diagnostic tests with high sensitivity. The detection limits of molecular diagnostic tests are primarily defined by the volume of blood analysed and by the copy number of the amplified molecular marker serving as the template for amplification. By using mitochondrial DNA as the multi-copy template, the detection limit can be improved more than tenfold, compared to standard 18S rRNA targets, thereby allowing detection of lower parasite densities. In a very low transmission area in Brazil, application of a mitochondrial DNA-based assay increased prevalence from 4.9 to 6.5%. The usefulness of molecular tests in malaria epidemiological studies is widely recognized, especially when precise prevalence rates are desired. Of concern, however, is the challenge of demonstrating test accuracy and quality control for samples with very low parasite densities. In this case, chance effects in template distribution around the detection limit constrain reproducibility. Rigorous assessment of false positive and false negative test results is, therefore, required to prevent over- or under-estimation of parasite prevalence in epidemiological studies or when monitoring interventions.

  8. Detection and Counting of Orchard Trees from Vhr Images Using a Geometrical-Optical Model and Marked Template Matching

    NASA Astrophysics Data System (ADS)

    Maillard, Philippe; Gomes, Marília F.

    2016-06-01

    This article presents an original algorithm created to detect and count trees in orchards using very high resolution images. The algorithm is based on an adaptation of the "template matching" image processing approach, in which the template is based on a "geometricaloptical" model created from a series of parameters, such as illumination angles, maximum and ambient radiance, and tree size specifications. The algorithm is tested on four images from different regions of the world and different crop types. These images all have < 1 meter spatial resolution and were downloaded from the GoogleEarth application. Results show that the algorithm is very efficient at detecting and counting trees as long as their spectral and spatial characteristics are relatively constant. For walnut, mango and orange trees, the overall accuracy was clearly above 90%. However, the overall success rate for apple trees fell under 75%. It appears that the openness of the apple tree crown is most probably responsible for this poorer result. The algorithm is fully explained with a step-by-step description. At this stage, the algorithm still requires quite a bit of user interaction. The automatic determination of most of the required parameters is under development.

  9. Mask replication using jet and flash imprint lithography

    NASA Astrophysics Data System (ADS)

    Selinidis, Kosta S.; Jones, Chris; Doyle, Gary F.; Brown, Laura; Imhof, Joseph; LaBrake, Dwayne L.; Resnick, Douglas J.; Sreenivasan, S. V.

    2011-11-01

    The Jet and Flash Imprint Lithography (J-FILTM) process uses drop dispensing of UV curable resists to assist high resolution patterning for subsequent dry etch pattern transfer. The technology is actively being used to develop solutions for memory markets including Flash memory and patterned media for hard disk drives. It is anticipated that the lifetime of a single template (for patterned media) or mask (for semiconductor) will be on the order of 104 - 105imprints. This suggests that tens of thousands of templates/masks will be required to satisfy the needs of a manufacturing environment. Electron-beam patterning is too slow to feasibly deliver these volumes, but instead can provide a high quality "master" mask which can be replicated many times with an imprint lithography tool. This strategy has the capability to produce the required supply of "working" templates/masks. In this paper, we review the development of the mask form factor, imprint replication tools and the semiconductor mask replication process. A PerfectaTM MR5000 mask replication tool has been developed specifically to pattern replica masks from an ebeam written master. Performance results, including image placement, critical dimension uniformity, and pattern transfer are covered in detail.

  10. Network Security Validation Using Game Theory

    NASA Astrophysics Data System (ADS)

    Papadopoulou, Vicky; Gregoriades, Andreas

    Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

  11. Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication.

    PubMed

    Juang, Kevin; Greenstein, Joel

    2018-04-01

    We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.

  12. 21 CFR 1301.73 - Physical security controls for non-practitioners; compounders for narcotic treatment programs...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security Requirements § 1301.73 Physical security... adequate security for the area or building. If such security requires an alarm, such alarm, upon...

  13. Remote site-selective C-H activation directed by a catalytic bifunctional template

    NASA Astrophysics Data System (ADS)

    Zhang, Zhipeng; Tanaka, Keita; Yu, Jin-Quan

    2017-03-01

    In chemical syntheses, the activation of carbon-hydrogen (C-H) bonds converts them directly into carbon-carbon or carbon-heteroatom bonds without requiring any prior functionalization. C-H activation can thus substantially reduce the number of steps involved in a synthesis. A single specific C-H bond in a substrate can be activated by using a ‘directing’ (usually a functional) group to obtain the desired product selectively. The applicability of such a C-H activation reaction can be severely curtailed by the distance of the C-H bond in question from the directing group, and by the shape of the substrate, but several approaches have been developed to overcome these limitations. In one such approach, an understanding of the distal and geometric relationships between the functional groups and C-H bonds of a substrate has been exploited to achieve meta-selective C-H activation by using a covalently attached, U-shaped template. However, stoichiometric installation of this template has not been feasible in the absence of an appropriate functional group on which to attach it. Here we report the design of a catalytic, bifunctional nitrile template that binds a heterocyclic substrate via a reversible coordination instead of a covalent linkage. The two metal centres coordinated to this template have different roles: one reversibly anchors substrates near the catalyst, and the other cleaves remote C-H bonds. Using this strategy, we demonstrate remote, site-selective C-H olefination of heterocyclic substrates that do not have the necessary functional groups for covalently attaching templates.

  14. Remote site-selective C-H activation directed by a catalytic bifunctional template.

    PubMed

    Zhang, Zhipeng; Tanaka, Keita; Yu, Jin-Quan

    2017-03-23

    In chemical syntheses, the activation of carbon-hydrogen (C-H) bonds converts them directly into carbon-carbon or carbon-heteroatom bonds without requiring any prior functionalization. C-H activation can thus substantially reduce the number of steps involved in a synthesis. A single specific C-H bond in a substrate can be activated by using a 'directing' (usually a functional) group to obtain the desired product selectively. The applicability of such a C-H activation reaction can be severely curtailed by the distance of the C-H bond in question from the directing group, and by the shape of the substrate, but several approaches have been developed to overcome these limitations. In one such approach, an understanding of the distal and geometric relationships between the functional groups and C-H bonds of a substrate has been exploited to achieve meta-selective C-H activation by using a covalently attached, U-shaped template. However, stoichiometric installation of this template has not been feasible in the absence of an appropriate functional group on which to attach it. Here we report the design of a catalytic, bifunctional nitrile template that binds a heterocyclic substrate via a reversible coordination instead of a covalent linkage. The two metal centres coordinated to this template have different roles: one reversibly anchors substrates near the catalyst, and the other cleaves remote C-H bonds. Using this strategy, we demonstrate remote, site-selective C-H olefination of heterocyclic substrates that do not have the necessary functional groups for covalently attaching templates.

  15. Directed deposition of inorganic oxide networks on patterned polymer templates

    NASA Astrophysics Data System (ADS)

    Ford, Thomas James Robert

    Inspired by nature, we have successfully directed the deposition of inorganic oxide materials on polymer templates via a combination of top-down and bottom-up fabrication methods. We have functionally mimicked the hierarchical silica exoskeletons of diatoms, where specialized proteins chaperone the condensation of silicic acid into nanoscale silica networks confined by microscopic vesicle walls. We replaced the proteins with functionally analogous polyamines and vesicles with lithographically defined polymer templates. We grafted the polyamines either to the surface or throughout the template by changing the template chemistry and altering our grafting strategy. Exposure to an inorganic oxide precursor solution led to electrostatic aggregation at the polyamine chains, catalyzing hydrolysis and condensation to form long-range inorganic oxide nanoparticle networks. Grafted to epoxy surfaces, swelling effects and the hyperbranched brush morphology lead to the formation of nanofruit features that generated thin, conformal inorganic coatings. When the polyamines were grafted throughout hydrogel templates, we obtained composite networks that yielded faithful inorganic replicas of the original patterns. By varying the polyamine chain length and combustion parameters, we controlled the nanoparticle size, morphology, and crystalline phase. The polyamine morphology affected the resulting inorganic network in both fabrication schemes and we could control the depostion over multiple length scales. Because our methods were compatible with a variety of lithographic methods, we were able to generate inorganic replicas of 1D, 2D, and 3D polymer structures. These may be used for a wide range of applications, including sensing, catalysis, photonic, phononic, photovoltaic, and others that require well-defined inorganic structures.

  16. Development of a femoral template for computer-assisted tunnel placement in anatomical double-bundle ACL reconstruction.

    PubMed

    Luites, J W H; Wymenga, A B; Blankevoort, L; Kooloos, J M G; Verdonschot, N

    2011-01-01

    Femoral graft placement is an important factor in the success of anterior cruciate ligament (ACL) reconstruction. In addition to improving the accuracy of femoral tunnel placement, Computer Assisted Surgery (CAS) can be used to determine the anatomic location. This is achieved by using a 3D femoral template which indicates the position of the anatomical ACL center based on endoscopically measurable landmarks. This study describes the development and application of this method. The template is generated through statistical shape analysis of the ACL insertion, with respect to the anteromedial (AM) and posterolateral (PL) bundles. The ligament insertion data, together with the osteocartilage edge on the lateral notch, were mapped onto a cylinder fitted to the intercondylar notch surface (n = 33). Anatomic variation, in terms of standard variation of the positions of the ligament centers in the template, was within 2.2 mm. The resulting template was programmed in a computer-assisted navigation system for ACL replacement and its accuracy and precision were determined on 31 femora. It was found that with the navigation system the AM and PL tunnels could be positioned with an accuracy of 2.5 mm relative to the anatomic insertion centers; the precision was 2.4 mm. This system consists of a template that can easily be implemented in 3D computer navigation software. Requiring no preoperative images and planning, the system provides adequate accuracy and precision to position the entrance of the femoral tunnels for anatomical single- or double-bundle ACL reconstruction.

  17. Hardware architecture design of a fast global motion estimation method

    NASA Astrophysics Data System (ADS)

    Liang, Chaobing; Sang, Hongshi; Shen, Xubang

    2015-12-01

    VLSI implementation of gradient-based global motion estimation (GME) faces two main challenges: irregular data access and high off-chip memory bandwidth requirement. We previously proposed a fast GME method that reduces computational complexity by choosing certain number of small patches containing corners and using them in a gradient-based framework. A hardware architecture is designed to implement this method and further reduce off-chip memory bandwidth requirement. On-chip memories are used to store coordinates of the corners and template patches, while the Gaussian pyramids of both the template and reference frame are stored in off-chip SDRAMs. By performing geometric transform only on the coordinates of the center pixel of a 3-by-3 patch in the template image, a 5-by-5 area containing the warped 3-by-3 patch in the reference image is extracted from the SDRAMs by burst read. Patched-based and burst mode data access helps to keep the off-chip memory bandwidth requirement at the minimum. Although patch size varies at different pyramid level, all patches are processed in term of 3x3 patches, so the utilization of the patch-processing circuit reaches 100%. FPGA implementation results show that the design utilizes 24,080 bits on-chip memory and for a sequence with resolution of 352x288 and frequency of 60Hz, the off-chip bandwidth requirement is only 3.96Mbyte/s, compared with 243.84Mbyte/s of the original gradient-based GME method. This design can be used in applications like video codec, video stabilization, and super-resolution, where real-time GME is a necessity and minimum memory bandwidth requirement is appreciated.

  18. Resistive Exercise Device

    NASA Technical Reports Server (NTRS)

    Smith, Damon C. (Inventor)

    2005-01-01

    An exercise device 10 is particularly well suited for use in low gravity environments, and includes a frame 12 with plurality of resistance elements 30,82 supported in parallel on the frame. A load transfer member 20 is moveable relative to the frame for transferring the applied force to the free end of each captured resistance element. Load selection template 14 is removably secured both to the load transfer member, and a plurality of capture mechanisms engage the free end of corresponding resistance elements. The force applying mechanism 53 may be a handle, harness or other user interface for applying a force to move the load transfer member.

  19. SU-E-T-475: Improvements to Total Body Irradiation Dosimetry Efficiency with EBT3 Radiochromic Film and a Template System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butson, M; Pope, D; Whitaker, M

    Purpose: Total Body Irradiation (TBI) treatments are mainly used in a preparative regimen for haematopoietic stem cell (or bone marrow) transplantation. Our standard regimen is a 12 Gy / 6 fraction bi-daily technique. To evaluate the delivered dose homogeneity to the patient, EBT3 Gafchromic film is positioned at the head, neck, chest, pelvis and groin for all fractions. A system has been developed to simply and accurately prepare and readout the films for patient dose assessment. Methods: A process involving easy preparation and analysis has been produced to minimise the time requirements for TBI dosimetry. One sheet of EBT3 filmmore » is used to prepare treatment dosimeters for all fractions, including calibration films, and an automated dose analysis system for easy evaluation and calculation of estimated in-vivo doses was developed. A desktop scanner is used with a dedicated TBI film template to accurately position the films for Image J analysis and extraction. Dental wax bolus and zip-lock bag holders are used to hold the EBT3 film in place during irradiation. Results: To adequately provide dosimetry information for a 6 fraction, TBI patient, only one sheet of Gafchromic EBT3 film is required. The dosimeters are cut, using a template, into 19 mm squares which are then placed between two 30 mm x 30 mm x 4.5 mm wax blocks for bolus. All packages are prepared before the first treatment fraction. The scanning and analysis process can be completed in less than 10 minutes after a 240 min development period. Results have shown that a high level of accuracy and reproducibility can be achieved using the template system provided. Conclusion: Gafchromic EBT3 film provides an adequate in-vivo dosimetry measure for TBI patients. Using a template based system on a dedicated desktop scanner, in-vivo results can be ascertained quickly and accurately.« less

  20. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  1. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  2. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  3. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  4. 48 CFR 239.7402 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with which the contractor's telecommunications security equipment, devices, techniques, or services must be...

  5. Role of Scientific Education in Civil Protection

    NASA Astrophysics Data System (ADS)

    Alexander, D.

    2009-04-01

    Education and training can be considered as fundamental means of professionalising civil protection services. A model of the processes involved is presented and its implications are explored. The fragmentary nature of knowledge and expertise in civil protection is discussed. The traditional structure of scientific endeavour has inhibited the growth of a trans-disciplinary approach well able to solve practical problems in a complex emergency environment. New means of breaking down the barriers between disciplines are required, as are new forms of dialogue between researchers and practitioners. In this context, a template for the standardisation of courses and curricula is presented and evaluated in terms of its positive and negative connotations. The warning process is given as an example of the need to strengthen links between the technical, administrative and social processes at work in civil protection. Sustainable disaster preparedness, a form of resiliency, requires sustained input from the earth science community, but of a kind that is sensitive to the needs, objectives and cultures of the other participants in the process. There is always a need for scientific input into safety and security policy, but one needs to be sure that the policy-making objectives are sound, as scientific results can be used to back up diverse approaches. Hence the moral and ethical aspects of resiliency are fundamentally important to policy formulation and its use of science.

  6. 33 CFR 105.220 - Drill and exercise requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...

  7. 33 CFR 104.230 - Drill and exercise requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.230 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of vessel personnel in assigned...

  8. 33 CFR 104.230 - Drill and exercise requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.230 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of vessel personnel in assigned...

  9. 33 CFR 105.220 - Drill and exercise requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...

  10. 33 CFR 105.220 - Drill and exercise requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...

  11. 33 CFR 104.230 - Drill and exercise requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.230 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of vessel personnel in assigned...

  12. 33 CFR 104.230 - Drill and exercise requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.230 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of vessel personnel in assigned...

  13. 33 CFR 104.230 - Drill and exercise requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.230 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of vessel personnel in assigned...

  14. 33 CFR 105.220 - Drill and exercise requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...

  15. 33 CFR 105.220 - Drill and exercise requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...

  16. 49 CFR 1542.215 - Law enforcement support.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...

  17. 49 CFR 1542.215 - Law enforcement support.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...

  18. 49 CFR 1542.215 - Law enforcement support.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...

  19. 49 CFR 1542.215 - Law enforcement support.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...

  20. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  1. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  2. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  3. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  4. A Microsoft Project-Based Planning, Tracking, and Management Tool for the National Transonic Facility's Model Changeover Process

    NASA Technical Reports Server (NTRS)

    Vairo, Daniel M.

    1998-01-01

    The removal and installation of sting-mounted wind tunnel models in the National Transonic Facility (NTF) is a multi-task process having a large impact on the annual throughput of the facility. Approximately ten model removal and installation cycles occur annually at the NTF with each cycle requiring slightly over five days to complete. The various tasks of the model changeover process were modeled in Microsoft Project as a template to provide a planning, tracking, and management tool. The template can also be used as a tool to evaluate improvements to this process. This document describes the development of the template and provides step-by-step instructions on its use and as a planning and tracking tool. A secondary role of this document is to provide an overview of the model changeover process and briefly describe the tasks associated with it.

  5. Synthesis of ZSM-23/ZSM-22 intergrowth zeolite with a novel dual-template strategy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Bingchun, E-mail: wangbc@dicp.ac.cn; Graduate University of Chinese Academy of Sciences, Beijing 100049; Tian, Zhijian, E-mail: tianz@dicp.ac.cn

    2009-12-15

    ZSM-23/ZSM-22 intergrowth zeolite with fixed proportion of 60%ZSM-23/40%ZSM-22 has been synthesized with a novel dual-template strategy. The products were characterized by X-ray diffraction and scanning electron microscopy. Dimethylamine and diethylamine were used together as a dual-template system. The molar ratio of diethylamine to dimethylamine, which was changed with the type of aluminum source, was the key factor for the synthesis of intergrowth zeolites. A molar ratio of diethylamine to dimethylamine of 1:24 could result in an ZSM-23/ZSM-22 intergrowth zeolite if aluminum sulfate was used as aluminum source, whereas a molar ratio of diethylamine to dimethylamine of 1:12 was required tomore » get an ZSM-23/ZSM-22 intergrowth zeolite if sodium metaaluminate was used. Furthermore, fluoride anion could be involved in the process as a crystallization promoter.« less

  6. Nanospace-Mediated Self-Organization of Nanoparticles in Flexible Porous Polymer Templates.

    PubMed

    Kuroda, Yoshiyuki; Muto, Itaru; Shimojima, Atsushi; Wada, Hiroaki; Kuroda, Kazuyuki

    2017-09-12

    Self-organization is a fundamental process for the construction of complex hierarchically ordered nanostructures, which are widespread in biological systems. However, precise control of size, shape, and surface properties is required for self-organization of nanoparticles. Here, we demonstrate a novel self-organization phenomenon mediated by flexible nanospaces in templates. Inorganic nanoparticles (e.g., silica, zirconia, and titania) are deposited in porous polymer thin films with randomly distributed pores on the surface, leaving a partially filled nanospace in each pore. Heating at temperatures beyond the glass transition temperature of the template leads to self-organization of the inorganic nanoparticles into one-dimensional chainlike networks. The self-organization is mediated by the deformation and fusion of the residual nanospaces, and it can be rationally controlled by sequential heat treatments. These results show that a nanospace, defined by the nonexistence of matter, interacts indirectly with matter and can be used as a component of self-organization systems.

  7. Precision genome editing using CRISPR-Cas9 and linear repair templates in C. elegans.

    PubMed

    Paix, Alexandre; Folkmann, Andrew; Seydoux, Geraldine

    2017-05-15

    The ability to introduce targeted edits in the genome of model organisms is revolutionizing the field of genetics. State-of-the-art methods for precision genome editing use RNA-guided endonucleases to create double-strand breaks (DSBs) and DNA templates containing the edits to repair the DSBs. Following this strategy, we have developed a protocol to create precise edits in the C. elegans genome. The protocol takes advantage of two innovations to improve editing efficiency: direct injection of CRISPR-Cas9 ribonucleoprotein complexes and use of linear DNAs with short homology arms as repair templates. The protocol requires no cloning or selection, and can be used to generate base and gene-size edits in just 4days. Point mutations, insertions, deletions and gene replacements can all be created using the same experimental pipeline. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  8. Design reflowable digital book template

    NASA Astrophysics Data System (ADS)

    Prasetya, Didik Dwi; Widiyaningtyas, Triyanna; Arifin, M. Zainal; Wahyu Sakti G., I.

    2017-09-01

    Electronic books (e-books or digital books) increasingly in demand and continue to grow in the form of future books. One of the standard format electronic books that potential is EPUB (electronic publication) published by the International Digital Publishing Forum (IDPF). This digital book has major advantages are able to provide interactive and reflowable content, which are not found in another book format, such as PDF. Reflowable content allows the book can be accessed through a variety of reader device, like desktop and mobile with a fit and comfort view. However, because the generating process of an EPUB digital book is not as easy a PDF, so this format is less popular. Therefore, in order to help overcome the existing problems, this paper develops digital reflowable text book templates to support electronic learning, especially in Indonesia. This template can be used by anyone to produce a standard digital book quickly and easily without requiring additional specialized knowledge.

  9. Template Interfaces for Agile Parallel Data-Intensive Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ramakrishnan, Lavanya; Gunter, Daniel; Pastorello, Gilerto Z.

    Tigres provides a programming library to compose and execute large-scale data-intensive scientific workflows from desktops to supercomputers. DOE User Facilities and large science collaborations are increasingly generating large enough data sets that it is no longer practical to download them to a desktop to operate on them. They are instead stored at centralized compute and storage resources such as high performance computing (HPC) centers. Analysis of this data requires an ability to run on these facilities, but with current technologies, scaling an analysis to an HPC center and to a large data set is difficult even for experts. Tigres ismore » addressing the challenge of enabling collaborative analysis of DOE Science data through a new concept of reusable "templates" that enable scientists to easily compose, run and manage collaborative computational tasks. These templates define common computation patterns used in analyzing a data set.« less

  10. A template for integrated community sustainability planning.

    PubMed

    Ling, Christopher; Hanna, Kevin; Dale, Ann

    2009-08-01

    This article describes a template for implementing an integrated community sustainability plan. The template emphasizes community engagement and outlines the components of a basic framework for integrating ecological, social and economic dynamics into a community plan. The framework is a series of steps that support a sustainable community development process. While it reflects the Canadian experience, the tools and techniques have applied value for a range of environmental planning contexts around the world. The research is case study based and draws from a diverse range of communities representing many types of infrastructure, demographics and ecological and geographical contexts. A critical path for moving local governments to sustainable community development is the creation and implementation of integrated planning approaches. To be effective and to be implemented, a requisite shift to sustainability requires active community engagement processes, political will, and a commitment to political and administrative accountability, and measurement.

  11. 33 CFR 106.225 - Drill and exercise requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Drill and exercise requirements...) Facility Security Requirements § 106.225 Drill and exercise requirements. (a) General. (1) Drills and... Security Officer (FSO) to identify any related security deficiencies that need to be addressed. (2) A drill...

  12. 33 CFR 106.225 - Drill and exercise requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Drill and exercise requirements...) Facility Security Requirements § 106.225 Drill and exercise requirements. (a) General. (1) Drills and... Security Officer (FSO) to identify any related security deficiencies that need to be addressed. (2) A drill...

  13. 33 CFR 106.225 - Drill and exercise requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Drill and exercise requirements...) Facility Security Requirements § 106.225 Drill and exercise requirements. (a) General. (1) Drills and... Security Officer (FSO) to identify any related security deficiencies that need to be addressed. (2) A drill...

  14. 33 CFR 106.225 - Drill and exercise requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Drill and exercise requirements...) Facility Security Requirements § 106.225 Drill and exercise requirements. (a) General. (1) Drills and... Security Officer (FSO) to identify any related security deficiencies that need to be addressed. (2) A drill...

  15. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature requirement and effect. 201.153 Section 201.153 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... requirement and effect. (a) General requirements. Following the issuance of an order instituting proceedings...

  16. 7 CFR 764.104 - General real estate security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false General real estate security requirements. 764.104....104 General real estate security requirements. (a) Agency lien position requirements. If real estate... Agency; and (4) Equity in the collateral exists. (b) Real estate held under a purchase contract. If the...

  17. 7 CFR 764.104 - General real estate security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false General real estate security requirements. 764.104....104 General real estate security requirements. (a) Agency lien position requirements. If real estate... Agency; and (4) Equity in the collateral exists. (b) Real estate held under a purchase contract. If the...

  18. 7 CFR 764.104 - General real estate security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false General real estate security requirements. 764.104....104 General real estate security requirements. (a) Agency lien position requirements. If real estate... Agency; and (4) Equity in the collateral exists. (b) Real estate held under a purchase contract. If the...

  19. 7 CFR 764.104 - General real estate security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false General real estate security requirements. 764.104....104 General real estate security requirements. (a) Agency lien position requirements. If real estate... Agency; and (4) Equity in the collateral exists. (b) Real estate held under a purchase contract. If the...

  20. 7 CFR 764.104 - General real estate security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false General real estate security requirements. 764.104....104 General real estate security requirements. (a) Agency lien position requirements. If real estate... Agency; and (4) Equity in the collateral exists. (b) Real estate held under a purchase contract. If the...

  1. 17 CFR 41.22 - Required certifications.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 41.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.22 Required certifications. It shall be unlawful for a designated contract market or registered derivatives transaction execution...

  2. Quantification of rectifications for the Northwestern University Flexible Sub-Ischial Vacuum Socket.

    PubMed

    Fatone, Stefania; Johnson, William Brett; Tran, Lilly; Tucker, Kerice; Mowrer, Christofer; Caldwell, Ryan

    2017-06-01

    The fit and function of a prosthetic socket depend on the prosthetist's ability to design the socket's shape to distribute load comfortably over the residual limb. We recently developed a sub-ischial socket for persons with transfemoral amputation: the Northwestern University Flexible Sub-Ischial Vacuum Socket. This study aimed to quantify the rectifications required to fit the Northwestern University Flexible Sub-Ischial Vacuum Socket to teach the technique to prosthetists as well as provide a computer-aided design-computer-aided manufacturing option. Development project. A program was used to align scans of unrectified and rectified negative molds and calculate shape change as a result of rectification. Averaged rectifications were used to create a socket template, which was shared with a central fabrication facility engaged in provision of Northwestern University Flexible Sub-Ischial Vacuum Sockets to early clinical adopters. Feedback regarding quality of fitting was obtained. Rectification maps created from 30 cast pairs of successfully fit Northwestern University Flexible Sub-Ischial Vacuum Sockets confirmed that material was primarily removed from the positive mold in the proximal-lateral and posterior regions. The template was used to fabricate check sockets for 15 persons with transfemoral amputation. Feedback suggested that the template provided a reasonable initial fit with only minor adjustments. Rectification maps and template were used to facilitate teaching and central fabrication of the Northwestern University Flexible Sub-Ischial Vacuum Socket. Minor issues with quality of initial fit achieved with the template may be due to inability to adjust the template to patient characteristics (e.g. tissue type, limb shape) and/or the degree to which it represented a fully mature version of the technique. Clinical relevance Rectification maps help communicate an important step in the fabrication of the Northwestern University Flexible Sub-Ischial Vacuum Socket facilitating dissemination of the technique, while the average template provides an alternative fabrication option via computer-aided design-computer-aided manufacturing and central fabrication.

  3. A novel use of the discrete templated notes within an electronic health record software to monitor resident supervision.

    PubMed

    Ban, Vin Shen; Madden, Christopher J; Browning, Travis; O'Connell, Ellen; Marple, Bradley F; Moran, Brett

    2017-04-01

    Monitoring the supervision of residents can be a challenging task. We describe our experience with the implementation of a templated note system for documenting procedures with the aim of enabling automated, discrete, and standardized capture of documentation of supervision of residents performing floor-based procedures, with minimal extra effort from the residents. Procedural note templates were designed using the standard existing template within a commercial electronic health record software. Templates for common procedures were created such that residents could document every procedure performed outside of the formal procedural areas. Automated reports were generated and letters were sent to noncompliers. A total of 27 045 inpatient non-formal procedural area procedures were recorded from August 2012 to June 2014. Compliance with NoteWriter template usage averaged 86% in the first year and increased to 94.6% in the second year ( P  = .0055). Initially, only 12.5% of residents documented supervision of any form. By the end of the first year, this was above 80%, with the gains maintained into the second year and beyond. Direct supervision was documented to have occurred where required in 62.8% in the first year and increased to 99.8% in the second year ( P  = .0001) after the addition of hard stops. Notification of attendings prior to procedures was documented 100% of the time by September 2013. Letters sent to errant residents decreased from 3.6 to 0.83 per 100 residents per week. The templated procedure note system with hard stops and integrated reporting can successfully be used to improve monitoring of resident supervision. This has potential impact on resident education and patient safety. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  4. Computer templates in chronic disease management: ethnographic case study in general practice.

    PubMed

    Swinglehurst, Deborah; Greenhalgh, Trisha; Roberts, Celia

    2012-01-01

    To investigate how electronic templates shape, enable and constrain consultations about chronic diseases. Ethnographic case study, combining field notes, video-recording, screen capture with a microanalysis of talk, body language and data entry-an approach called linguistic ethnography. Two general practices in England. Ethnographic observation of administrative areas and 36 nurse-led consultations was done. Twenty-four consultations were directly observed and 12 consultations were video-recorded alongside computer screen capture. Consultations were transcribed using conversation analysis conventions, with notes on body language and the electronic record. The analysis involved repeated rounds of viewing video, annotating field notes, transcription and microanalysis to identify themes. The data was interpreted using discourse analysis, with attention to the sociotechnical theory. Consultations centred explicitly or implicitly on evidence-based protocols inscribed in templates. Templates did not simply identify tasks for completion, but contributed to defining what chronic diseases were, how care was being delivered and what it meant to be a patient or professional in this context. Patients' stories morphed into data bytes; the particular became generalised; the complex was made discrete, simple and manageable; and uncertainty became categorised and contained. Many consultations resembled bureaucratic encounters, primarily oriented to completing data fields. We identified a tension, sharpened by the template, between different framings of the patient-as 'individual' or as 'one of a population'. Some clinicians overcame this tension, responding creatively to prompts within a dialogue constructed around the patient's narrative. Despite their widespread implementation, little previous research has examined how templates are actually used in practice. Templates do not simply document the tasks of chronic disease management but profoundly change the nature of this work. Designed to assure standards of 'quality' care they contribute to bureaucratisation of care and may marginalise aspects of quality care which lie beyond their focus. Creative work is required to avoid privileging 'institution-centred' care over patient-centred care.

  5. Computer templates in chronic disease management: ethnographic case study in general practice

    PubMed Central

    Swinglehurst, Deborah; Greenhalgh, Trisha; Roberts, Celia

    2012-01-01

    Objective To investigate how electronic templates shape, enable and constrain consultations about chronic diseases. Design Ethnographic case study, combining field notes, video-recording, screen capture with a microanalysis of talk, body language and data entry—an approach called linguistic ethnography. Setting Two general practices in England. Participants and methods Ethnographic observation of administrative areas and 36 nurse-led consultations was done. Twenty-four consultations were directly observed and 12 consultations were video-recorded alongside computer screen capture. Consultations were transcribed using conversation analysis conventions, with notes on body language and the electronic record. The analysis involved repeated rounds of viewing video, annotating field notes, transcription and microanalysis to identify themes. The data was interpreted using discourse analysis, with attention to the sociotechnical theory. Results Consultations centred explicitly or implicitly on evidence-based protocols inscribed in templates. Templates did not simply identify tasks for completion, but contributed to defining what chronic diseases were, how care was being delivered and what it meant to be a patient or professional in this context. Patients’ stories morphed into data bytes; the particular became generalised; the complex was made discrete, simple and manageable; and uncertainty became categorised and contained. Many consultations resembled bureaucratic encounters, primarily oriented to completing data fields. We identified a tension, sharpened by the template, between different framings of the patient—as ‘individual’ or as ‘one of a population’. Some clinicians overcame this tension, responding creatively to prompts within a dialogue constructed around the patient's narrative. Conclusions Despite their widespread implementation, little previous research has examined how templates are actually used in practice. Templates do not simply document the tasks of chronic disease management but profoundly change the nature of this work. Designed to assure standards of ‘quality’ care they contribute to bureaucratisation of care and may marginalise aspects of quality care which lie beyond their focus. Creative work is required to avoid privileging ‘institution-centred’ care over patient-centred care. PMID:23192245

  6. 49 CFR 15.5 - Sensitive security information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... requirements of Federal law. (5) Vulnerability assessments. Any vulnerability assessment directed, created... security requirements of Federal law that could reveal a security vulnerability, including the identity of... Guard responsible for conducting vulnerability assessments, security boardings, or engaged in operations...

  7. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... covered entity to reasonably and appropriately implement the standards and implementation specifications...

  8. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... and appropriately implement the standards and implementation specifications as specified in this...

  9. 33 CFR 128.300 - What is required to be in a Terminal Security Plan?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...

  10. 33 CFR 128.300 - What is required to be in a Terminal Security Plan?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...

  11. 33 CFR 128.300 - What is required to be in a Terminal Security Plan?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...

  12. 48 CFR 1852.219-79 - Mentor requirements and evaluation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the semiannual report template found on the Web site at http://www.osbp.nasa.gov. (d) The mentor will... following clause: Mentor Requirements and Evaluation (Month/Year) (a) The purpose of the NASA Mentor-Protégé Program is for a NASA prime contractor to provide developmental assistance to certain subcontractors...

  13. 48 CFR 1852.219-79 - Mentor requirements and evaluation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the semiannual report template found on the Web site at http://www.osbp.nasa.gov. (d) The mentor will... following clause: Mentor Requirements and Evaluation (Month/Year) (a) The purpose of the NASA Mentor-Protégé Program is for a NASA prime contractor to provide developmental assistance to certain subcontractors...

  14. 48 CFR 1852.219-79 - Mentor requirements and evaluation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the semiannual report template found on the Web site at http://www.osbp.nasa.gov. (d) The mentor will... following clause: Mentor Requirements and Evaluation (Month/Year) (a) The purpose of the NASA Mentor-Protégé Program is for a NASA prime contractor to provide developmental assistance to certain subcontractors...

  15. 48 CFR 1852.219-79 - Mentor requirements and evaluation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the semiannual report template found on the Web site at http://www.osbp.nasa.gov. (d) The mentor will... following clause: Mentor Requirements and Evaluation (Month/Year) (a) The purpose of the NASA Mentor-Protégé Program is for a NASA prime contractor to provide developmental assistance to certain subcontractors...

  16. 48 CFR 1852.219-79 - Mentor requirements and evaluation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the semiannual report template found on the Web site at http://www.osbp.nasa.gov. (d) The mentor will... following clause: Mentor Requirements and Evaluation (MAY 2009) (a) The purpose of the NASA Mentor-Protégé Program is for a NASA prime contractor to provide developmental assistance to certain subcontractors...

  17. The histone chaperone TAF-I/SET/INHAT is required for transcription in vitro of chromatin templates.

    PubMed

    Gamble, Matthew J; Erdjument-Bromage, Hediye; Tempst, Paul; Freedman, Leonard P; Fisher, Robert P

    2005-01-01

    To uncover factors required for transcription by RNA polymerase II on chromatin, we fractionated a mammalian cell nuclear extract. We identified the histone chaperone TAF-I (also known as INHAT [inhibitor of histone acetyltransferase]), which was previously proposed to repress transcription, as a potent activator of chromatin transcription responsive to the vitamin D3 receptor or to Gal4-VP16. TAF-I associates with chromatin in vitro and can substitute for the related protein NAP-1 in assembling chromatin onto cloned DNA templates in cooperation with the remodeling enzyme ATP-dependent chromatin assembly factor (ACF). The chromatin assembly and transcriptional activation functions are distinct, however, and can be dissociated temporally. Efficient transcription of chromatin assembled with TAF-I still requires the presence of TAF-I during the polymerization reaction. Conversely, TAF-I cannot stimulate transcript elongation when added after the other factors necessary for assembly of a preinitiation complex on naked DNA. Thus, TAF-I is required to facilitate transcription at a step after chromatin assembly but before transcript elongation.

  18. Single-crystal gallium nitride nanotubes.

    PubMed

    Goldberger, Joshua; He, Rongrui; Zhang, Yanfeng; Lee, Sangkwon; Yan, Haoquan; Choi, Heon-Jin; Yang, Peidong

    2003-04-10

    Since the discovery of carbon nanotubes in 1991 (ref. 1), there have been significant research efforts to synthesize nanometre-scale tubular forms of various solids. The formation of tubular nanostructure generally requires a layered or anisotropic crystal structure. There are reports of nanotubes made from silica, alumina, silicon and metals that do not have a layered crystal structure; they are synthesized by using carbon nanotubes and porous membranes as templates, or by thin-film rolling. These nanotubes, however, are either amorphous, polycrystalline or exist only in ultrahigh vacuum. The growth of single-crystal semiconductor hollow nanotubes would be advantageous in potential nanoscale electronics, optoelectronics and biochemical-sensing applications. Here we report an 'epitaxial casting' approach for the synthesis of single-crystal GaN nanotubes with inner diameters of 30-200 nm and wall thicknesses of 5-50 nm. Hexagonal ZnO nanowires were used as templates for the epitaxial overgrowth of thin GaN layers in a chemical vapour deposition system. The ZnO nanowire templates were subsequently removed by thermal reduction and evaporation, resulting in ordered arrays of GaN nanotubes on the substrates. This templating process should be applicable to many other semiconductor systems.

  19. A generic template for automated bioanalytical ligand-binding assays using modular robotic scripts in support of discovery biotherapeutic programs.

    PubMed

    Duo, Jia; Dong, Huijin; DeSilva, Binodh; Zhang, Yan J

    2013-07-01

    Sample dilution and reagent pipetting are time-consuming steps in ligand-binding assays (LBAs). Traditional automation-assisted LBAs use assay-specific scripts that require labor-intensive script writing and user training. Five major script modules were developed on Tecan Freedom EVO liquid handling software to facilitate the automated sample preparation and LBA procedure: sample dilution, sample minimum required dilution, standard/QC minimum required dilution, standard/QC/sample addition, and reagent addition. The modular design of automation scripts allowed the users to assemble an automated assay with minimal script modification. The application of the template was demonstrated in three LBAs to support discovery biotherapeutic programs. The results demonstrated that the modular scripts provided the flexibility in adapting to various LBA formats and the significant time saving in script writing and scientist training. Data generated by the automated process were comparable to those by manual process while the bioanalytical productivity was significantly improved using the modular robotic scripts.

  20. Opportunities for Improvement in Pathology Reporting of Childhood Nonrhabdomyosarcoma Soft Tissue Sarcomas:  A Report From Children's Oncology Group (COG) Study ARST0332.

    PubMed

    Black, Jennifer O; Coffin, Cheryl M; Parham, David M; Hawkins, Douglas S; Speights, Rose A; Spunt, Sheri L

    2016-09-01

    Treatment of soft tissue tumors in young patients relies on the diagnostic information conveyed in the pathology report. We examined pathology reports from Children's Oncology Group ARST0332 for inclusion of data elements required in published guidelines. Pathology reports for 551 eligible patients were examined for required data elements defined by the College of American Pathologists, including tissue type, procedure, tumor site, tumor maximum diameter, macroscopic extent of tumor, histologic type, mitotic rate, extent of necrosis, tumor grade, margin status, use of ancillary studies, and pathologic stage. Only 65 (12%) of 551 reports included all required data elements. Of reports containing synoptic templates, 57% were complete. This study reveals significant opportunity to improve the quality of pathology reports in young patients with soft tissue tumors. Use of templates or checklists improves completeness of reports. © American Society for Clinical Pathology, 2016. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. Characteristics of Deoxyribonucleic Acid Polymerase Isolated from Spores of Rhizopus stolonifer1

    PubMed Central

    Gong, Cheng-Shung; Dunkle, Larry D.; Van Etten, James L.

    1973-01-01

    Deoxyribonucleic acid (DNA)-dependent DNA polymerase was purified several hundredfold from germinated and ungerminated spores of the fungus Rhizopus stolonifer. The partially purified enzymes from both spore stages exhibited identical characteristics; incorporation of [3H]deoxythymidine monophosphate into DNA required Mg2+, DNA, a reducing agent, and the simultaneous presence of deoxyguanosine triphosphate, deoxycytidine triphosphate, and deoxyadenosine triphosphate. Heat-denatured and activated DNAs were better templates than were native DNAs. The buoyant density of the radioactive product of the reaction was similar to that of the template DNA. The enzyme is probably composed of a single polypeptide chain with an S value of 5.12 and an estimated molecular weight of 70,000 to 75,000. During the early stages of purification, the enzyme fraction from ungerminated spores required exogenous DNA for maximum activity, whereas the corresponding enzyme fraction from germinated spores did not require added DNA. Apparently DNA polymerase from germinated spores was more tightly bound to endogenous DNA than was the enzyme from ungerminated spores. PMID:4728271

  2. PDF Version of EPA Communication Product Standards Stylebook

    EPA Pesticide Factsheets

    This stylebook provides style and format guidance for most media, including print documents, audiovisual, broadcast, presentation and exhibit work. Also find templates and samples, copyright requirements, publishing information, and logo use standards.

  3. 48 CFR 1804.470-1 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... implements NASA's acquisition requirements pertaining to Federal policies for the security of unclassified... (FISMA) of 2002, Homeland Security Presidential Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C... Institute of Standards and Technology (NIST) security requirements and standards. These requirements...

  4. 48 CFR 1804.470-1 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... implements NASA's acquisition requirements pertaining to Federal policies for the security of unclassified... (FISMA) of 2002, Homeland Security Presidential Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C... Institute of Standards and Technology (NIST) security requirements and standards. These requirements...

  5. Security measures required for HIPAA privacy.

    PubMed

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  6. Rapid and Robust Cross-Correlation-Based Seismic Phase Identification Using an Approximate Nearest Neighbor Method

    NASA Astrophysics Data System (ADS)

    Tibi, R.; Young, C. J.; Gonzales, A.; Ballard, S.; Encarnacao, A. V.

    2016-12-01

    The matched filtering technique involving the cross-correlation of a waveform of interest with archived signals from a template library has proven to be a powerful tool for detecting events in regions with repeating seismicity. However, waveform correlation is computationally expensive, and therefore impractical for large template sets unless dedicated distributed computing hardware and software are used. In this study, we introduce an Approximate Nearest Neighbor (ANN) approach that enables the use of very large template libraries for waveform correlation without requiring a complex distributed computing system. Our method begins with a projection into a reduced dimensionality space based on correlation with a randomized subset of the full template archive. Searching for a specified number of nearest neighbors is accomplished by using randomized K-dimensional trees. We used the approach to search for matches to each of 2700 analyst-reviewed signal detections reported for May 2010 for the IMS station MKAR. The template library in this case consists of a dataset of more than 200,000 analyst-reviewed signal detections for the same station from 2002-2014 (excluding May 2010). Of these signal detections, 60% are teleseismic first P, and 15% regional phases (Pn, Pg, Sn, and Lg). The analyses performed on a standard desktop computer shows that the proposed approach performs the search of the large template libraries about 20 times faster than the standard full linear search, while achieving recall rates greater than 80%, with the recall rate increasing for higher correlation values. To decide whether to confirm a match, we use a hybrid method involving a cluster approach for queries with two or more matches, and correlation score for single matches. Of the signal detections that passed our confirmation process, 52% were teleseismic first P, and 30% were regional phases.

  7. 32 CFR 322.4 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... physical security requirements for the protection of personal information and ensure that such requirements... NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The... Associate Director for Human Resources Services or designee shall: (1) Establish the physical security...

  8. Energy conservation using face detection

    NASA Astrophysics Data System (ADS)

    Deotale, Nilesh T.; Kalbande, Dhananjay R.; Mishra, Akassh A.

    2011-10-01

    Computerized Face Detection, is concerned with the difficult task of converting a video signal of a person to written text. It has several applications like face recognition, simultaneous multiple face processing, biometrics, security, video surveillance, human computer interface, image database management, digital cameras use face detection for autofocus, selecting regions of interest in photo slideshows that use a pan-and-scale and The Present Paper deals with energy conservation using face detection. Automating the process to a computer requires the use of various image processing techniques. There are various methods that can be used for Face Detection such as Contour tracking methods, Template matching, Controlled background, Model based, Motion based and color based. Basically, the video of the subject are converted into images are further selected manually for processing. However, several factors like poor illumination, movement of face, viewpoint-dependent Physical appearance, Acquisition geometry, Imaging conditions, Compression artifacts makes Face detection difficult. This paper reports an algorithm for conservation of energy using face detection for various devices. The present paper suggests Energy Conservation can be done by Detecting the Face and reducing the brightness of complete image and then adjusting the brightness of the particular area of an image where the face is located using histogram equalization.

  9. CORE (Common Operating Response Environment) Software Technology Suite

    ScienceCinema

    Gelston, Gariann; Rohlfing, Kerrie

    2018-05-30

    Agencies that oversee complex, multi-stakeholder programs need efficient, secure ways to link people and knowledge within and across organizations. The Common Operating Response Environment (CORE), a software suite developed by PNNL researchers does just that. The CORE tool—which is customizable for a multitude of uses—facilitates situational awareness by integrating diverse data streams without the need to reformat them, summarizing that information, and providing users with the information they need to rapidly understand and appropriately respond to situations. It is mobile device-ready, has a straightforward interface for ease of use across organizations and skill sets, and is incredibly configurable to the needs of each specific user, whether they require data summaries for high-level decision makers or tactical maps, operational data, or weather information for responders in the field. Information can be input into CORE and queried in a variety of ways—using customized forms, reports, visuals, or other organizational templates—according to the needs of each user’s organization, teams, and business processes. CORE data forms, for instance, could be accessed and used in real-time to capture information about vessels being inspected for nuclear material.

  10. Architecture of portable electronic medical records system integrated with streaming media.

    PubMed

    Chen, Wei; Shih, Chien-Chou

    2012-02-01

    Due to increasing occurrence of accidents and illness during business trips, travel, or overseas studies, the requirement for portable EMR (Electronic Medical Records) has increased. This study proposes integrating streaming media technology into the EMR system to facilitate referrals, contracted laboratories, and disease notification among hospitals. The current study encoded static and dynamic medical images of patients into a streaming video format and stored them in a Flash Media Server (FMS). Based on the Taiwan Electronic Medical Record Template (TMT) standard, EMR records can be converted into XML documents and used to integrate description fields with embedded streaming videos. This investigation implemented a web-based portable EMR interchanging system using streaming media techniques to expedite exchanging medical image information among hospitals. The proposed architecture of the portable EMR retrieval system not only provides local hospital users the ability to acquire EMR text files from a previous hospital, but also helps access static and dynamic medical images as reference for clinical diagnosis and treatment. The proposed method protects property rights of medical images through information security mechanisms of the Medical Record Interchange Service Center and Health Certificate Authorization to facilitate proper, efficient, and continuous treatment of patients.

  11. 7 CFR 762.126 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 762.126 Section 762.126 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.126 Security requirements. (a) General. (1) The...

  12. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  13. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  14. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  15. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  16. 7 CFR 764.155 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.155 Section 764.155 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Farm Ownership Loan Program § 764.155 Security requirements...

  17. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  18. 7 CFR 764.235 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.235 Section 764.235 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a...

  19. 7 CFR 764.205 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.205 Section 764.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Downpayment Loan Program § 764.205 Security requirements. A...

  20. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  1. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  2. 7 CFR 764.155 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.155 Section 764.155 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Farm Ownership Loan Program § 764.155 Security requirements...

  3. 7 CFR 764.205 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.205 Section 764.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Downpayment Loan Program § 764.205 Security requirements. A...

  4. 7 CFR 766.56 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 766.56 Section 766.56 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Disaster Set-Aside § 766.56 Security requirements...

  5. 7 CFR 766.56 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 766.56 Section 766.56 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Disaster Set-Aside § 766.56 Security requirements...

  6. 17 CFR 41.2 - Required records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Required records. 41.2 Section 41.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS General Provisions § 41.2 Required records. A designated contract market or registered derivatives...

  7. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  8. 78 FR 19073 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-28

    ... individual custodians; end-investors providing security-by-security information will require an average of...; end-investors providing security-by-security information will require an average of 146 hours; and... keeping burdens on respondents, including the use of information technologies to automate the collection...

  9. 27 CFR 19.192 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.192 Section... THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...

  10. 27 CFR 19.192 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.192 Section... THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...

  11. 27 CFR 19.192 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.192 Section... THE TREASURY ALCOHOL DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...

  12. 27 CFR 19.192 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.192 Section... THE TREASURY ALCOHOL DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...

  13. 17 CFR 230.481 - Information required in prospectuses.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Information required in prospectuses. 230.481 Section 230.481 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies...

  14. Privacy and security in teleradiology.

    PubMed

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  15. N7 logic via patterning using templated DSA: implementation aspects

    NASA Astrophysics Data System (ADS)

    Bekaert, J.; Doise, J.; Gronheid, R.; Ryckaert, J.; Vandenberghe, G.; Fenger, G.; Her, Y. J.; Cao, Y.

    2015-07-01

    In recent years, major advancements have been made in the directed self-assembly (DSA) of block copolymers (BCP). Insertion of DSA for IC fabrication is seriously considered for the 7 nm node. At this node the DSA technology could alleviate costs for multiple patterning and limit the number of masks that would be required per layer. At imec, multiple approaches for inserting DSA into the 7 nm node are considered. One of the most straightforward approaches for implementation would be for via patterning through templated DSA; a grapho-epitaxy flow using cylindrical phase BCP material resulting in contact hole multiplication within a litho-defined pre-pattern. To be implemented for 7 nm node via patterning, not only the appropriate process flow needs to be available, but also DSA-aware mask decomposition is required. In this paper, several aspects of the imec approach for implementing templated DSA will be discussed, including experimental demonstration of density effect mitigation, DSA hole pattern transfer and double DSA patterning, creation of a compact DSA model. Using an actual 7 nm node logic layout, we derive DSA-friendly design rules in a logical way from a lithographer's view point. A concrete assessment is provided on how DSA-friendly design could potentially reduce the number of Via masks for a place-and-routed N7 logic pattern.

  16. Memory-Based Attention Capture when Multiple Items Are Maintained in Visual Working Memory

    PubMed Central

    Hollingworth, Andrew; Beck, Valerie M.

    2016-01-01

    Efficient visual search requires that attention is guided strategically to relevant objects, and most theories of visual search implement this function by means of a target template maintained in visual working memory (VWM). However, there is currently debate over the architecture of VWM-based attentional guidance. We contrasted a single-item-template hypothesis with a multiple-item-template hypothesis, which differ in their claims about structural limits on the interaction between VWM representations and perceptual selection. Recent evidence from van Moorselaar, Theeuwes, and Olivers (2014) indicated that memory-based capture during search—an index of VWM guidance—is not observed when memory set size is increased beyond a single item, suggesting that multiple items in VWM do not guide attention. In the present study, we maximized the overlap between multiple colors held in VWM and the colors of distractors in a search array. Reliable capture was observed when two colors were held in VWM and both colors were present as distractors, using both the original van Moorselaar et al. singleton-shape search task and a search task that required focal attention to array elements (gap location in outline square stimuli). In the latter task, memory-based capture was consistent with the simultaneous guidance of attention by multiple VWM representations. PMID:27123681

  17. 12 CFR 208.35 - Qualification requirements for transactions in certain securities. [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requirements for transactions in certain securities. [Reserved] ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Qualification requirements for transactions in certain securities. [Reserved] 208.35 Section 208.35 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF...

  18. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  19. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  20. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  1. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  2. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  3. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  4. 7 CFR 764.255 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.255 Section 764.255 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL...

  5. 7 CFR 764.305 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.305 Section 764.305 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Youth Loan Program § 764.305 Security requirements. A first...

  6. 7 CFR 764.305 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.305 Section 764.305 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Youth Loan Program § 764.305 Security requirements. A first...

  7. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  8. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  9. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  10. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  11. 17 CFR 240.3a69-3 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Books and records requirements... § 240.3a69-3 Books and records requirements for security-based swap agreements. (a) A person registered... and regulations thereunder: (1) Shall not be required to keep and maintain additional books and...

  12. 17 CFR 240.3a69-3 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Books and records requirements... § 240.3a69-3 Books and records requirements for security-based swap agreements. (a) A person registered... and regulations thereunder: (1) Shall not be required to keep and maintain additional books and...

  13. 6 CFR 7.12 - Violations of classified information requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Violations of classified information requirements. 7.12 Section 7.12 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED NATIONAL SECURITY INFORMATION Administration § 7.12 Violations of classified information...

  14. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer Training Requirements; Correction AGENCY: Coast Guard, DHS. ACTION: Notice of public meeting; request for... comments on the development of a Facility Security Officer training program. The notice contains an...

  15. 17 CFR 230.484 - Undertaking required in certain registration statements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Undertaking required in certain registration statements. 230.484 Section 230.484 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business...

  16. 49 CFR 1572.9 - Applicant information required for HME security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... threat assessment. 1572.9 Section 1572.9 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.9 Applicant information required for HME security threat assessment. An applicant must supply the information...

  17. 48 CFR 3452.239-72 - Department security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... contracting officer or the COR, the Department personnel security officer, and the Department computer... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Department security... Clauses 3452.239-72 Department security requirements. As prescribed in 3439.702, include the following...

  18. 48 CFR 3452.239-72 - Department security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... contracting officer or the COR, the Department personnel security officer, and the Department computer... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Department security... Clauses 3452.239-72 Department security requirements. As prescribed in 3439.702, include the following...

  19. 48 CFR 3452.239-72 - Department security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... contracting officer or the COR, the Department personnel security officer, and the Department computer... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Department security... Clauses 3452.239-72 Department security requirements. As prescribed in 3439.702, include the following...

  20. 48 CFR 3452.239-72 - Department security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... contracting officer or the COR, the Department personnel security officer, and the Department computer... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Department security... Clauses 3452.239-72 Department security requirements. As prescribed in 3439.702, include the following...

  1. Double displacement: An improved bioorthogonal reaction strategy for templated nucleic acid detection.

    PubMed

    Kleinbaum, Daniel J; Miller, Gregory P; Kool, Eric T

    2010-06-16

    Quenched autoligation probes have been employed previously in a target-templated nonenzymatic ligation strategy for detecting nucleic acids in cells by fluorescence. A common source of background signal in such probes is the undesired reaction with water and other cellular nucleophiles. Here, we describe a new class of self-ligating probes, double displacement (DD) probes, that rely on two displacement reactions to fully unquench a nearby fluorophore. Three potential double displacement architectures, all possessing two fluorescence quencher/leaving groups (dabsylate groups), were synthesized and evaluated for templated reaction with nucleophile (phosphorothioate) probes both in vitro and in intact bacterial cells. All three DD probe designs provided substantially better initial quenching than a single-Dabsyl control. In isothermal templated reactions in vitro, double displacement probes yielded considerably lower background signal than previous single displacement probes; investigation into the mechanism revealed that one dabsylate acts as a sacrificial leaving group, reacting nonspecifically with water, but yielding little signal because another quencher group remains. Templated reaction with the specific nucleophile probe is required to activate a signal. The double displacement probes provided a ca. 80-fold turn-on signal and yielded a 2-4-fold improvement in signal/background over single Dabsyl probes. The best-performing probe architecture was demonstrated in a two-color, FRET-based two-allele discrimination system in vitro and was shown to be capable of discriminating between two closely related species of bacteria differing by a single nucleotide at an rRNA target site.

  2. In vivo delineation of subdivisions of the human amygdaloid complex in a high-resolution group template

    PubMed Central

    Tyszka, J. Michael; Pauli, Wolfgang M.

    2016-01-01

    The nuclei of the human amygdala remain difficult to distinguish in individual subject structural magnetic resonance images. However, interpretation of the amygdala’s role in whole brain networks requires accurate localization of functional activity to a particular nucleus or subgroup of nuclei. To address this, we constructed high spatial resolution, three-dimensional templates, using joint high accuracy diffeomorphic registration of T1- and T2-weighted structural images from 168 typical adults between 22 and 35 years old released by the Human Connectome Project. Several internuclear boundaries are clearly visible in these templates, which would otherwise be impossible to delineate in individual subject data. A probabilistic atlas of major nuclei and nuclear groups was constructed in this template space and mapped back to individual spaces by inversion of the individual diffeomorphisms. Group level analyses revealed a slight (approximately 2%) bias towards larger total amygdala and nuclear volumes in the right hemisphere. No substantial sex or age differences were found in amygdala volumes normalized to total intracranial volume, or subdivision volumes normalized to amygdala volume. The current delineation provides a finer parcellation of the amygdala with more accurate external boundary definition than current histology-based atlases when used in conjunction with high accuracy registration methods, such as diffeomorphic warping. These templates and delineation are intended to be an open and evolving resource for future functional and structural imaging studies of the human amygdala. PMID:27354150

  3. Chloropicrin and 1,3-D Fumigant Management Plan Phase 2 Templates

    EPA Pesticide Factsheets

    Plans for soil fumigant pesticide products that contain chloropicrin or 1,3-dichloropropene should include application block information, tarp plan, sign posting for treated area and buffer zone, and other requirements.

  4. 48 CFR 307.104 - General procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... regarding the specific acquisition method the contracting activity plans to use. (5) HHS requires use of a standard format for an AAP. The template for the plan is available on the ASFR/OGAPA/DA Internet Web site...

  5. SPAN security policies and guidelines

    NASA Technical Reports Server (NTRS)

    Sisson, Patricia L.; Green, James L.

    1989-01-01

    A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.

  6. Lean thinking transformation of the unsedated upper gastrointestinal endoscopy pathway improves efficiency and is associated with high levels of patient satisfaction.

    PubMed

    Hydes, Theresa; Hansi, Navjyot; Trebble, Timothy M

    2012-01-01

    Upper gastrointestinal (UGI) endoscopy is a routine healthcare procedure with a defined patient pathway. The objective of this study was to redesign this pathway for unsedated patients using lean thinking transformation to focus on patient-derived value-adding steps, remove waste and create a more efficient process. This was to form the basis of a pathway template that was transferrable to other endoscopy units. A literature search of patient expectations for UGI endoscopy identified patient-derived value. A value stream map was created of the current pathway. The minimum and maximum time per step, bottlenecks and staff-staff interactions were recorded. This information was used for service transformation using lean thinking. A patient pathway template was created and implemented into a secondary unit. Questionnaire studies were performed to assess patient satisfaction. In the primary unit the patient pathway reduced from 19 to 11 steps with a reduction in the maximum lead time from 375 to 80 min following lean thinking transformation. The minimum value/lead time ratio increased from 24% to 49%. The patient pathway was redesigned as a 'cellular' system with minimised patient and staff travelling distances, waiting times, paperwork and handoffs. Nursing staff requirements reduced by 25%. Patient-prioritised aspects of care were emphasised with increased patient-endoscopist interaction time. The template was successfully introduced into a second unit with an overall positive patient satisfaction rating of 95%. Lean thinking transformation of the unsedated UGI endoscopy pathway results in reduced waiting times, reduced staffing requirements and improved patient flow and can form the basis of a pathway template which may be successfully transferred into alternative endoscopy environments with high levels of patient satisfaction.

  7. A Microwell-Printing Fabrication Strategy for the On-Chip Templated Biosynthesis of Protein Microarrays for Surface Plasmon Resonance Imaging

    PubMed Central

    Manuel, Gerald; Lupták, Andrej; Corn, Robert M.

    2017-01-01

    A two-step templated, ribosomal biosynthesis/printing method for the fabrication of protein microarrays for surface plasmon resonance imaging (SPRI) measurements is demonstrated. In the first step, a sixteen component microarray of proteins is created in microwells by cell free on chip protein synthesis; each microwell contains both an in vitro transcription and translation (IVTT) solution and 350 femtomoles of a specific DNA template sequence that together are used to create approximately 40 picomoles of a specific hexahistidine-tagged protein. In the second step, the protein microwell array is used to contact print one or more protein microarrays onto nitrilotriacetic acid (NTA)-functionalized gold thin film SPRI chips for real-time SPRI surface bioaffinity adsorption measurements. Even though each microwell array element only contains approximately 40 picomoles of protein, the concentration is sufficiently high for the efficient bioaffinity adsorption and capture of the approximately 100 femtomoles of hexahistidine-tagged protein required to create each SPRI microarray element. As a first example, the protein biosynthesis process is verified with fluorescence imaging measurements of a microwell array containing His-tagged green fluorescent protein (GFP), yellow fluorescent protein (YFP) and mCherry (RFP), and then the fidelity of SPRI chips printed from this protein microwell array is ascertained by measuring the real-time adsorption of various antibodies specific to these three structurally related proteins. This greatly simplified two-step synthesis/printing fabrication methodology eliminates most of the handling, purification and processing steps normally required in the synthesis of multiple protein probes, and enables the rapid fabrication of SPRI protein microarrays from DNA templates for the study of protein-protein bioaffinity interactions. PMID:28706572

  8. 17 CFR 256.01-6 - Departmental classification required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Departmental classification required. 256.01-6 Section 256.01-6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... UTILITY HOLDING COMPANY ACT OF 1935 General Instructions § 256.01-6 Departmental classification required...

  9. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 4 2012-04-01 2012-04-01 false Application for security deposit...' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other...

  10. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Application for security deposit...' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other...

  11. 10 CFR 37.43 - General security program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the licensee's...

  12. ATAC Process Proof of Concept Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston; Sarah Freeman

    Researchers at INL with funding from the Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) evaluated a novel approach for near real-time consumption of threat intelligence. Demonstration testing in an industry environment supported the development of this new process to assist the electric sector in securing their critical networks. This report provides the reader with an understanding of the methods used during this proof of concept project. The processes and templates were further advanced with an industry partner during an onsite assessment. This report concludes with lessons learned and a roadmap for final development of these materialsmore » for use by industry.« less

  13. Perceiving intergroup conflict: from game models to mental templates.

    PubMed

    Halevy, Nir; Sagiv, Lilach; Roccas, Sonia; Bornstein, Gary

    2006-12-01

    This article puts forward a parsimonious framework for studying subjective perceptions of real-life intergroup conflicts. Four studies were conducted to explore how individuals perceive the strategic properties of the Israeli-Palestinian conflict. Studies 1 and 2 found theory-driven associations between people's subjective perception of the conflict's structure as a Chicken, Assurance, or Prisoner's Dilemma game and their ingroup/outgroup perceptions, national identification, religiosity, political partisanship, voting behavior, and right-wing authoritarianism. Studies 3 and 4 manipulated the saliency of the needs for cognitive closure and security, respectively, demonstrating that these needs affect people's endorsement of the game models as descriptions of the conflict.

  14. Planning Considerations for Secure Network Protocols

    DTIC Science & Technology

    1999-03-01

    distribution / management ) requirements needed to support network security services are examined. The thesis concludes by identifying tactical user network requirements and suggests security issues to be considered in concert with network

  15. 6 CFR 27.255 - Recordkeeping requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... audit required under § 27.225(e)) or Security Vulnerability Assessment, a record of the audit, including... retain records of submitted Top-Screens, Security Vulnerability Assessments, Site Security Plans, and all...

  16. 6 CFR 5.3 - Requirements for making requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Requirements for making requests. 5.3 Section 5.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Freedom of Information Act § 5.3 Requirements for making requests. (a) How made and...

  17. 14 CFR § 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information technology resources. § 1274.937 Section § 1274.937 Aeronautics and Space NATIONAL AERONAUTICS... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  18. 7 CFR 3550.108 - Security requirements (loans only).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security requirements (loans only). 3550.108 Section..., DEPARTMENT OF AGRICULTURE DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS Section 504 Origination and Section 306C Water and Waste Disposal Grants § 3550.108 Security requirements (loans only). When the total...

  19. 46 CFR 15.1113 - Vessel Security Officer (VSO).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Vessel Security Officer (VSO). 15.1113 Section 15.1113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Vessels Subject to Requirements of STCW § 15.1113 Vessel Security Officer (VSO). After July 1...

  20. 46 CFR 15.1113 - Vessel Security Officer (VSO).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Vessel Security Officer (VSO). 15.1113 Section 15.1113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Vessels Subject to Requirements of STCW § 15.1113 Vessel Security Officer (VSO). After July 1...

  1. 46 CFR 15.1113 - Vessel Security Officer (VSO).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Vessel Security Officer (VSO). 15.1113 Section 15.1113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Vessels Subject to Requirements of STCW § 15.1113 Vessel Security Officer (VSO). After July 1...

  2. 46 CFR 15.1113 - Vessel Security Officer (VSO).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Vessel Security Officer (VSO). 15.1113 Section 15.1113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Vessels Subject to Requirements of STCW § 15.1113 Vessel Security Officer (VSO). After July 1...

  3. 24 CFR 761.17 - Eligible and ineligible activities for funding.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... enforcement requirements. (1) Employment of security personnel, as provided in 42 U.S.C. 11903(a)(1), with the following additional requirements: (i) Security guard personnel. (A) Contract security personnel funded by.... (B) The applicant, the provider (contractor) of the security personnel and, only if the local law...

  4. 31 CFR 1023.300 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.300 General. Brokers or dealers in securities are... in securities should also refer to subpart C of part 1010 of this chapter for reporting requirements...

  5. 31 CFR 1023.300 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.300 General. Brokers or dealers in securities are... in securities should also refer to subpart C of part 1010 of this chapter for reporting requirements...

  6. 31 CFR 1023.300 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.300 General. Brokers or dealers in securities are... in securities should also refer to subpart C of part 1010 of this chapter for reporting requirements...

  7. 31 CFR 1023.300 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.300 General. Brokers or dealers in securities are... in securities should also refer to subpart C of part 1010 of this chapter for reporting requirements...

  8. An analysis of root cause identification and continuous quality improvement in public health H1N1 after-action reports.

    PubMed

    Singleton, Christa-Marie; Debastiani, Summer; Rose, Dale; Kahn, Emily B

    2014-01-01

    To identify the extent to which the Homeland Security Exercise and Evaluation Program's (HSEEP) After Action Report/Improvement Plan (AAR/IP) template was followed by public health entities and facilitated the identification of detailed corrective actions and continuous improvement. Data were drawn from the US H1N1 Public Health Emergency Response (PHER) federal grant awardees (n = 62). After action report/improvement plan text was examined to identify the presence of AAR/IP HSEEP elements and characterized as "minimally complete," "partially complete," or "complete." Corrective actions (CA) and recommendations within the IP focusing on performance deficits were coded as specific, measurable, and time-bound, and whether they were associated with a problem that met root cause criteria and whether the CA/recommendation was intended to address or fix the root cause. A total of 2619 CA/recommendations were identified. More than half (n = 1480, 57%) addressed root causes. Corrective actions/recommendations associated with complete AARs more frequently addressed root cause (58% vs 51%, χ = 9.1, P < 0.003) and were more specific (34% vs 23%, χ = 32.3, P < 0.0001), measurable (30% vs 18%, χ = 37.9, P < 0.0001), and time-bound (38% vs 15%, χ = 115.5, P < 0.0001) than partially complete AARs. The same pattern was not observed with completeness of IPs. Corrective actions and recommendations were similarly specific and measurable. Recommendations significantly addressed root cause more than CAs. Our analysis indicates a possible lack of awardee distinction between CA and recommendations in AARs. As HSEEP adapts to align with the 2011 National Preparedness Goal and National Preparedness System, future HSEEP documents should emphasize the importance of root cause analysis as a required element within AAR documents and templates in the exercise and real incident environment, as well as the need for specific and measurable CAs.

  9. Buffer Zone Sign Template

    EPA Pesticide Factsheets

    The certified pesticide applicator is required to post a comparable sign, designating a buffer zone around the soil fumigant application block in order to control exposure risk. It must include the don't walk symbol, product name, and applicator contact.

  10. Commandant Instruction 5216. 17A: Correspondence Standards

    DOT National Transportation Integrated Search

    1997-01-14

    Emphasizes the requirement that users of both Standard Workstation II and III : use the approved pre-formatted macros on CG Standard Workstation II (CGSWII) and : templates on Standard Workstation III (WSIII) respectively. It also expands the : range...

  11. Properties of an unusual DNA primase from an archaeal plasmid

    PubMed Central

    Beck, Kirsten; Lipps, Georg

    2007-01-01

    Primases are specialized DNA-dependent RNA polymerases that synthesize a short oligoribonucleotide complementary to single-stranded template DNA. In the context of cellular DNA replication, primases are indispensable since DNA polymerases are not able to start DNA polymerization de novo. The primase activity of the replication protein from the archaeal plasmid pRN1 synthesizes a rather unusual mixed primer consisting of a single ribonucleotide at the 5′ end followed by seven deoxynucleotides. Ribonucleotides and deoxynucleotides are strictly required at the respective positions within the primer. Furthermore, in contrast to other archaeo-eukaryotic primases, the primase activity is highly sequence-specific and requires the trinucleotide motif GTG in the template. Primer synthesis starts outside of the recognition motif, immediately 5′ to the recognition motif. The fidelity of the primase synthesis is high, as non-complementary bases are not incorporated into the primer. PMID:17709343

  12. Review of the Literature Related to Screening Airline Passenger Baggage.

    DTIC Science & Technology

    1994-10-01

    11 billion passengers and their carry-on items have passed through airport security checkpoints. According to the Federal Aviation Administration...Aviation Security establishes security requirements, inspects airline and airport security operations, and issues civil penalties for noncompliance with...operations areas and provide law enforcement support for the screening system and overall airport security requirements (FAA, 1991). The FAA’s role in aviation

  13. 49 CFR 172.704 - Training requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND... communication standards of this subchapter. (2) Function-specific training. (i) Each hazmat employee must be... must include company security objectives, organizational security structure, specific security...

  14. Strategies for Controlled Placement of Nanoscale Building Blocks

    PubMed Central

    2007-01-01

    The capability of placing individual nanoscale building blocks on exact substrate locations in a controlled manner is one of the key requirements to realize future electronic, optical, and magnetic devices and sensors that are composed of such blocks. This article reviews some important advances in the strategies for controlled placement of nanoscale building blocks. In particular, we will overview template assisted placement that utilizes physical, molecular, or electrostatic templates, DNA-programmed assembly, placement using dielectrophoresis, approaches for non-close-packed assembly of spherical particles, and recent development of focused placement schemes including electrostatic funneling, focused placement via molecular gradient patterns, electrodynamic focusing of charged aerosols, and others. PMID:21794185

  15. Rational design of new materials using recombinant structural proteins: Current state and future challenges.

    PubMed

    Sutherland, Tara D; Huson, Mickey G; Rapson, Trevor D

    2018-01-01

    Sequence-definable polymers are seen as a prerequisite for design of future materials, with many polymer scientists regarding such polymers as the holy grail of polymer science. Recombinant proteins are sequence-defined polymers. Proteins are dictated by DNA templates and therefore the sequence of amino acids in a protein is defined, and molecular biology provides tools that allow redesign of the DNA as required. Despite this advantage, proteins are underrepresented in materials science. In this publication we investigate the advantages and limitations of using proteins as templates for rational design of new materials. Crown Copyright © 2017. Published by Elsevier Inc. All rights reserved.

  16. Performance Portability Strategies for Grid C++ Expression Templates

    NASA Astrophysics Data System (ADS)

    Boyle, Peter A.; Clark, M. A.; DeTar, Carleton; Lin, Meifeng; Rana, Verinder; Vaquero Avilés-Casco, Alejandro

    2018-03-01

    One of the key requirements for the Lattice QCD Application Development as part of the US Exascale Computing Project is performance portability across multiple architectures. Using the Grid C++ expression template as a starting point, we report on the progress made with regards to the Grid GPU offloading strategies. We present both the successes and issues encountered in using CUDA, OpenACC and Just-In-Time compilation. Experimentation and performance on GPUs with a SU(3)×SU(3) streaming test will be reported. We will also report on the challenges of using current OpenMP 4.x for GPU offloading in the same code.

  17. 7 CFR 771.9 - Interest rates, terms, security requirements, and repayment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rates, terms, security requirements, and... Interest rates, terms, security requirements, and repayment. (a) Interest rate. The interest rate will be fixed for the term of the loan. The rate will be established by FSA, based upon the cost of Government...

  18. 7 CFR 774.18 - Interest rate, terms and security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rate, terms and security requirements. 774.18..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS EMERGENCY LOAN FOR SEED PRODUCERS PROGRAM § 774.18 Interest rate, terms and security requirements. (a) Interest rate. (1) The interest rate on the loan will be zero...

  19. 17 CFR 405.5 - Risk assessment reporting requirements for registered government securities brokers and dealers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Risk assessment reporting requirements for registered government securities brokers and dealers. 405.5 Section 405.5 Commodity and... OF 1934 REPORTS AND AUDIT § 405.5 Risk assessment reporting requirements for registered government...

  20. 12 CFR 350.12 - Disclosure required by applicable banking or securities law or regulations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Disclosure required by applicable banking or securities law or regulations. 350.12 Section 350.12 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... STATE NONMEMBER BANKS § 350.12 Disclosure required by applicable banking or securities law or...

Top