Sample records for security studies volume

  1. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...

  2. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...

  3. Attachment Security in Infancy: A Preliminary Study of Prospective Links to Brain Morphometry in Late Childhood

    PubMed Central

    Leblanc, Élizabel; Dégeilh, Fanny; Daneault, Véronique; Beauchamp, Miriam H.; Bernier, Annie

    2017-01-01

    A large body of longitudinal research provides compelling evidence for the critical role of early attachment relationships in children’s social, emotional, and cognitive development. It is expected that parent–child attachment relationships may also impact children’s brain development, however, studies linking normative caregiving experiences and brain structure are scarce. To our knowledge, no study has yet examined the associations between the quality of parent–infant attachment relationships and brain morphology during childhood. The aim of this preliminary study was to investigate the prospective links between mother–infant attachment security and whole-brain gray matter (GM) volume and thickness in late childhood. Attachment security toward the mother was assessed in 33 children when they were 15 months old. These children were then invited to undergo structural magnetic resonance imaging at 10–11 years of age. Results indicated that children more securely attached to their mother in infancy had larger GM volumes in the superior temporal sulcus and gyrus, temporo-parietal junction, and precentral gyrus in late childhood. No associations between attachment security and cortical thickness were found. If replicated, these results would suggest that a secure attachment relationship and its main features (e.g., adequate dyadic emotion regulation, competent exploration) may influence GM volume in brain regions involved in social, cognitive, and emotional functioning through experience-dependent processes. PMID:29312029

  4. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, andmore » views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.« less

  5. OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38

    DOT National Transportation Integrated Search

    1989-07-01

    Developing and executing a well-thought-out security policy is critical to the success of CALS. Without appropriate security measures, the integration of technology, organizations, functions, and data envisioned as Phase II CALS can not occur. Theref...

  6. 17 CFR 15.04 - Reportable trading volume level.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Reportable trading volume level. 15.04 Section 15.04 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REPORTS-GENERAL PROVISIONS § 15.04 Reportable trading volume level. The volume quantity for the purpose of...

  7. 77 FR 54939 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-06

    ... Volume Requirement in All Assigned SLP Securities and Amend the Exchange's Price List To Specify the... Liquidity Provider (``SLP'') monthly volume requirement in all assigned SLP securities (``monthly volume... existing SLP monthly volume requirement from an ADV of more than 10 million shares to an ADV that is a...

  8. Fortresses and Icebergs: The Evolution of the Transatlantic Defense Market and the Implications for U.S. National Security Policy. Volume 1: Study Findings and Recommendations

    DTIC Science & Technology

    2009-01-01

    The United States needs a new model of “globalized” national security for this changing world: we must realign longstanding policies away from go...at the center of our approach to ensuring our future security. … Now, when we most need to re-examine our Transatlantic security model, this new two...address the globalized threats we face, our gov- ernment is already reorienting the capabilities of our national security forces to a new bal- ance

  9. Apprentice Still Photographic Specialist (AFSC 23132).

    ERIC Educational Resources Information Center

    Air Univ., Gunter AFS, Ala. Extension Course Inst.

    This four-volume student text is designed for use by Air Force personnel enrolled in a self-study extension course for apprentice still photographic specialists. Covered in the individual volumes are general subjects (career ladder progression, security, photographic safety, and photographic laboratory administration); still photographic…

  10. Transportation's role in reducing U.S. greenhouse gas emissions, volume 1 and volume 2 : report to Congress, U.S. Department of Transportation

    DOT National Transportation Integrated Search

    2010-04-01

    This study evaluates potentially viable strategies to reduce transportation : greenhouse gas (GHG) emissions. The study was mandated by the Energy : Independence and Security Act (P.L. 110-140, December 2007). The Act directed : the U.S. Department o...

  11. A governor's guide to emergency management. Volume two : homeland security

    DOT National Transportation Integrated Search

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  12. Diet Therapy Specialist.

    ERIC Educational Resources Information Center

    Air Force Training Command, Sheppard AFB, TX.

    This four-volume student text is intended for use in training Air Force diet therapy specialists. The first volume, a study guide and workbook for self-directed instruction, covers nutrition, food processing and preparation, therapeutic diets, security precautions in medical food service, procedures for ordering equipment and supplies, food…

  13. 17 CFR 240.10b-18 - Purchases of certain equity securities by the issuer and others.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... authorize Rule 10b-18 purchases by or on behalf of the issuer. (4) Agent independent of the issuer has the... trading volume for that security or, in the event that trading volume data are unavailable, is at least 20... of the security, exclusive of any shares owned by any affiliate; Provided, however, That a block...

  14. Research and Development Strategy for the 1990s, 1990 Summer Study. Volume 1 Executive Summary

    DTIC Science & Technology

    1990-10-01

    Technology Security Administration ( DTSA ), but recently, JCS has been given a significant role. Also the Services play a significant role, especially...international arena: the Defense Security Assistance Agency (DSAA), dealing with foreign military sales; the Defense Technology Security Administration ( DTSA ...in these organizations. DSAA and DTSA report indirectly to the USD(P) and DUSD(P) reports to USD(A). The DDR&E, also reporting to USD(A), is

  15. Multi-Rate Secure Processor Terminal Architecture Study. Volume 1. Terminal Architecture.

    DTIC Science & Technology

    1981-06-01

    together because of the intimate relationship that must be established between the KG devices and the control of those devices to satisy security...9.6 kilobit for ti’.:., pass filter funtion because it’s time span is larger. The resultdot loading is estimated at 260 microseconds out of 833

  16. Avionics Instrument Systems Specialist (AFSC 32551).

    ERIC Educational Resources Information Center

    Miller, Lawrence B.; Crowcroft, Robert A.

    This six-volume student text is designed for use by Air Force personnel enrolled in a self-study extension course for avionics instrument systems specialists. Covered in the individual volumes are career field familiarization (career field progression and training, security, occupational safety and health, and career field reference material);…

  17. PRISM, Volume 6, Number 1, 2016: Women, Peace and Inclusive Security

    DTIC Science & Technology

    2016-03-01

    Operations. PRISM is a security studies journal chartered to inform members of U.S. Federal agencies, allies, and other partners on complex and...thrown the national security community into disarray. Faced with such diverse challenges, the U.S. and its allies must step up with a response equally...pool? PRISM is not a journal of advocacy, but rather a venue for informed and rational discourse. The Editors’ goal is to further American and

  18. Job-Linked Literacy: Innovative Strategies at Work. Part III. Moving Ahead: Basic Skills for Career Advancement. A Work in America Policy Study.

    ERIC Educational Resources Information Center

    Rosow, Jerome M.; Zager, Robert

    This volume, Interim Report No. 3 in a 3-year study, considers literacy programs designed to qualify employees for promotions or professional advancement. It adopts a multidimensional definition of moving ahead, one that extends to monetary rewards, career development, and employment security. The volume is divided into two parts: report and case…

  19. Satellite Power Systems (SPS) laser studies. Volume 1: Laser environmental impact study

    NASA Technical Reports Server (NTRS)

    Beverly, R. E., III

    1980-01-01

    The environmental impact of space to Earth power transmission using space borne laser subsystems is emphasized. A laser system is defined, estimates of relevant efficiencies for laser power generation and atmospheric transmission are developed, and a comparison is made to a microwave system. Ancillary issues, such as laser beam spreading, safety and security, mass and volume estimates and technology growth are considered.

  20. Introduction to Retail Security.

    ERIC Educational Resources Information Center

    Thomas, James E., Ed.

    This collection consists of 15 articles dealing with retail security. Included in the volume are the following papers: "Retail Security--an Introduction," by Andrew J. Thacker and Linda Cressman; "Systematic Planning and Retail Security," by Linda T. Thomas; "Identifying Potentially Dishonest Employees," by James E.…

  1. 17 CFR 17.01 - Identification of special accounts, volume threshold accounts, and omnibus accounts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Identification of special accounts, volume threshold accounts, and omnibus accounts. 17.01 Section 17.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REPORTS BY REPORTING MARKETS, FUTURES COMMISSION MERCHANTS, CLEARING MEMBERS, AND FOREIGN BROKERS §...

  2. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  3. Security in the Middle East

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wells, S.F. Jr.; Bruzonsky, M.A.

    1986-01-01

    The full range of U.S. security interests in the Middle East is covered in this volume of original contributions from prominent international scholars. Case studies of key countries emphasize the prospects for peaceful political, economic, and cultural change in the region. The Arab-Israeli conflict is examined with particular attention to the ''Palestine problem,'' U.S. policy and diplomacy, and the peace process. Finally, the involvement of the U.S. and the USSR and the policy options open to them are considered. Includes chapters on oil and its role in Middle-East security issues.

  4. 22 CFR 9.1 - Basis.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.1 Basis. These regulations, taken together with the Information Security Oversight Office Directive No. 1 dated September 22, 2003, and Volume 5... National Security Information”, as amended (“the Executive Order”). ...

  5. 22 CFR 9.1 - Basis.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.1 Basis. These regulations, taken together with the Information Security Oversight Office Directive No. 1 dated September 22, 2003, and Volume 5... National Security Information”, as amended (“the Executive Order”). ...

  6. The impact of secure messaging on workflow in primary care: Results of a multiple-case, multiple-method study.

    PubMed

    Hoonakker, Peter L T; Carayon, Pascale; Cartmill, Randi S

    2017-04-01

    Secure messaging is a relatively new addition to health information technology (IT). Several studies have examined the impact of secure messaging on (clinical) outcomes but very few studies have examined the impact on workflow in primary care clinics. In this study we examined the impact of secure messaging on workflow of clinicians, staff and patients. We used a multiple case study design with multiple data collections methods (observation, interviews and survey). Results show that secure messaging has the potential to improve communication and information flow and the organization of work in primary care clinics, partly due to the possibility of asynchronous communication. However, secure messaging can also have a negative effect on communication and increase workload, especially if patients send messages that are not appropriate for the secure messaging medium (for example, messages that are too long, complex, ambiguous, or inappropriate). Results show that clinicians are ambivalent about secure messaging. Secure messaging can add to their workload, especially if there is high message volume, and currently they are not compensated for these activities. Staff is -especially compared to clinicians- relatively positive about secure messaging and patients are overall very satisfied with secure messaging. Finally, clinicians, staff and patients think that secure messaging can have a positive effect on quality of care and patient safety. Secure messaging is a tool that has the potential to improve communication and information flow. However, the potential of secure messaging to improve workflow is dependent on the way it is implemented and used. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. High Performance Computing Technologies for Modeling the Dynamics and Dispersion of Ice Chunks in the Arctic Ocean

    DTIC Science & Technology

    2016-08-23

    SECURITY CLASSIFICATION OF: Hybrid finite element / finite volume based CaMEL shallow water flow solvers have been successfully extended to study wave...effects on ice floes in a simplified 10 sq-km ocean domain. Our solver combines the merits of both the finite element and finite volume methods and...ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 sea ice dynamics, shallow water, finite element , finite volume

  8. Indicators of Children's Well-Being: Conference Papers. Child Health, Education, and Economic Security. Volume II. Special Report Series. Special Report Number 60b.

    ERIC Educational Resources Information Center

    Wisconsin Univ., Madison. Inst. for Research on Poverty.

    This volume groups papers discussing indicators of children's well-being into three areas: child health, education, and economic security. Papers concerning child health include: (1) "Prenatal and Infant Health Indicators" (Paula Lantz and Melissa Partin); (2) "Health Indicators for Preschool Children (Ages 1-4)" (Barbara L.…

  9. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  10. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  11. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  12. 48 CFR 752.204-2 - Security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Security requirements. 752.204-2 Section 752.204-2 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT... Security requirements. Pursuant to the Uniform State/USAID/USIA Regulations (Volume 12, Foreign Affairs...

  13. The Army War College Review: Student Publications. Volume 2, Number 2. May 2016

    DTIC Science & Technology

    2016-05-01

    Character Development of U.S. Army Leaders – The Laissez - Fair Approach,” Military Review Online, September-October 2013, 30-39, http://usacac.army.mil/CAC2...intellectual work with professionals invested in U.S. national security, Landpower, strategic leadership , global security studies, and the advancement of...assumed the leadership chair of the Arctic Council for two years. President Obama appointed a well-qualified Special Representative for the Arctic

  14. 17 CFR 41.11 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... securities with the largest market capitalization shall be identified from the universe of all NMS securities... identified from the universe of all NMS securities as defined in § 242.600 that are common stock or...

  15. 17 CFR 41.11 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... securities with the largest market capitalization shall be identified from the universe of all NMS securities... identified from the universe of all NMS securities as defined in § 242.600 that are common stock or...

  16. 17 CFR 41.11 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... securities with the largest market capitalization shall be identified from the universe of all NMS securities... identified from the universe of all NMS securities as defined in § 242.600 that are common stock or...

  17. 17 CFR 41.11 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... securities with the largest market capitalization shall be identified from the universe of all NMS securities... identified from the universe of all NMS securities as defined in § 242.600 that are common stock or...

  18. 17 CFR 41.11 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities with the largest market capitalization shall be identified from the universe of all NMS securities... identified from the universe of all NMS securities as defined in § 242.600 that are common stock or...

  19. Small Nations in Multinational Operations and Armenian Perspectives

    DTIC Science & Technology

    2014-12-12

    National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army

  20. 17 CFR 240.12h-6 - Certification by a foreign private issuer regarding the termination of registration of a class of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... certifying to the Commission on Form 15F (17 CFR 249.324) that: (1) The foreign private issuer has had... average daily trading volume of the subject class of securities in the United States for a recent 12-month period has been no greater than 5 percent of the average daily trading volume of that class of securities...

  1. PennDOT transportation security strategy : volume 2 : effective practices of state departments of transportation security planning

    DOT National Transportation Integrated Search

    2004-08-01

    Since September 11, 2001, state departments of transportation (DOTs) have been assuming a more proactive role in security and emergency management. The purpose of this Effective Practices Report is to document key lessons learned by state DOTs as the...

  2. SRI PUFF 8 Computer Program for One-Dimensional Stress Wave Propagation

    DTIC Science & Technology

    1980-03-01

    raial product. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (Tfhen Data Entered) REPORT DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING...EDITION OF I NOV 6S (S OBSOLETE UNCLASSIFIED SECURITY CLASSIFICATIOK OF THIS PAGE (When Data Entered) UNCLASSIFIED SECURITY CLASSIFICATION OF THIS...aspects of wave propagation calculations. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGEfWhen Data Entered) FOREWORD This volume constitutes a

  3. High Performance Schools Best Practices Manual. Volume I: Planning [and] Volume II: Design [and] Volume III: Criteria.

    ERIC Educational Resources Information Center

    Eley, Charles, Ed.

    This three-volume manual, focusing on California's K-12 public schools, presents guidelines for establishing schools that are healthy, comfortable, energy efficient, resource efficient, water efficient, secure, adaptable, and easy to operate and maintain. The first volume describes why high performance schools are important, what components are…

  4. Comparison of volume, security, and biomechanical strength of square and Aberdeen termination knots tied with 4-0 polyglyconate and used for termination of intradermal closures in canine cadavers.

    PubMed

    Regier, Penny J; Smeak, Daniel D; Coleman, Kristin; McGilvray, Kirk C

    2015-08-01

    To compare volumes of square knots and Aberdeen knots in vitro and evaluate security of these knot types when used as buried terminal knots for continuous intradermal wound closures in canine cadavers. Experimental study. 24 surgically closed, full-thickness, 4-cm, epidermal wounds in 4 canine cadavers and 80 knots tied in vitro. Continuous intradermal closures were performed with 4-0 polyglyconate and completed with a buried knot technique. Surgeon (intern or experienced surgeon) and termination knot type (4-throw square knot or 2 + 1 Aberdeen knot; 12 each) were randomly assigned. Closed wounds were excised, and a servohydraulic machine applied tensile load perpendicular to the long axis of the suture line. A load-displacement curve was generated for each sample; maximum load, displacement, stiffness, and mode of construct failure were recorded. Volumes of 2 + 1 Aberdeen (n = 40) and 4-throw square knots (40) tied on a suture board were measured on the basis of a cylindrical model. Aberdeen knots had a mean smaller volume (0.00045 mm(3)) than did square knots (0.003838 mm(3)). Maximum load and displacement did not differ between construct types. Mean stiffness of Aberdeen knot constructs was greater than that of square knots. The 2 + 1 Aberdeen knot had a smaller volume than the 4-throw square knot and was as secure. Although both knots may be reliably used in a clinical setting as the termination knot at the end of a continuous intradermal line, the authors advocate use of the Aberdeen terminal knot on the basis of ease of burying the smaller knot.

  5. Library Operations Policies and Procedures, Volume 2. Central Archive for Reusable Defense Software (CARDS)

    DTIC Science & Technology

    1994-02-28

    improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are...and Franchisees . A Potential User is an individual who requests a Library Account. A User Recruit has been sent a CARDS Library Account Registration

  6. Accomplishing Shipyard Work for the United States Navy; Institutions, Systems and Operations. Volume 2. Appendixes

    DTIC Science & Technology

    1975-08-01

    side #I MOC0ede.V en.d 14119111Iy by 61leek number) Ths study examines factors relating to acconrmlish-ment of Navy ship work- ~ .loads in navtal and...concludes with recomnendations to improve the cost-effectiveness of performance of shipyard work and identifies several key areas for further study . Volume 2...documents related to subjects covered by this study . r• "I. . " r . SECURITY CO OF ° P Ova’" 0.... ......:i • #0 PAPER P-1 13 2 ACCOMPLISHING SHIPYARD WORK

  7. Multi-focus image fusion and robust encryption algorithm based on compressive sensing

    NASA Astrophysics Data System (ADS)

    Xiao, Di; Wang, Lan; Xiang, Tao; Wang, Yong

    2017-06-01

    Multi-focus image fusion schemes have been studied in recent years. However, little work has been done in multi-focus image transmission security. This paper proposes a scheme that can reduce data transmission volume and resist various attacks. First, multi-focus image fusion based on wavelet decomposition can generate complete scene images and optimize the perception of the human eye. The fused images are sparsely represented with DCT and sampled with structurally random matrix (SRM), which reduces the data volume and realizes the initial encryption. Then the obtained measurements are further encrypted to resist noise and crop attack through combining permutation and diffusion stages. At the receiver, the cipher images can be jointly decrypted and reconstructed. Simulation results demonstrate the security and robustness of the proposed scheme.

  8. 17 CFR 16.01 - Trading volume, open contracts, prices, and critical dates.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading volume, open contracts... TRADING COMMISSION REPORTS BY REPORTING MARKETS § 16.01 Trading volume, open contracts, prices, and critical dates. (a) Trading volume and open contracts. Each reporting market shall record for each business...

  9. 17 CFR 16.01 - Trading volume, open contracts, prices, and critical dates.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Trading volume, open contracts... TRADING COMMISSION REPORTS BY REPORTING MARKETS § 16.01 Trading volume, open contracts, prices, and critical dates. (a) Trading volume and open contracts. Each reporting market shall record for each business...

  10. Road Map For National Security Addendum on Structure and Process Analyses. Volume 1: Key Observations and Overarching Processes

    DTIC Science & Technology

    2000-01-01

    business of national security. The seven volumes contained herein analyze key organizations and processes throughout the Federal government, to include...Secretary of State (S) Chapter 2 – Under Secretary for Political Affairs (P) Chapter 3 – Under Secretary for Economic, Business and Agricultural Affairs...vulnerabilities of the evolving global economic infrastructure; E. Energy will continue to have a major strategic significance; F. All borders will be more

  11. 76 FR 65555 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65583; File No. SR-ISE-2011-68] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend the Volume Threshold for Tier-Based Rebates for Qualified Contingent Cross Orders and Solicitation Orders Executed...

  12. Mobilization and Defense Management Technical Reports Series. Mobilization Studies Program Report: Coordinated Policy for the Aircraft Industry.

    DTIC Science & Technology

    1983-05-01

    THE ARMED FORCES AREA 6 WORK UNIT NUMBERS -. FORT LESLEY J. MC NAIR WASHINGTON, DC 20319 11. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE "Vt...yearly dollar volume and lead directly to cost- effective 𔃾.- national security. Such business generates research funding that can have important military...Mbreover, there is no central focus for these policies and no foru to discuss their effect on national security and international catetiiveness. The

  13. A Collection of Technical Studies Completed for the Computer-Aided Acquisition and Logistic Support (CALS) Program Fiscal Year 1988. Volume 1. Text, Security and Data Management

    DTIC Science & Technology

    1991-03-01

    management methodologies claim to be "expert systems" with security intelligence built into them to I derive a body of both facts and speculative data ... Data Administration considerations . III -21 IV. ARTIFICIAL INTELLIGENCE . .. .. .. . .. IV - 1 A. Description of Technologies . . . . . .. IV - 1 1...as intelligent gateways, wide area networks, and distributed databases for the distribution of logistics products. The integrity of CALS data and the

  14. Transportation's role in reducing U.S. greenhouse gas emissions, volume 2 : report to Congress, U.S. Department of Transportation

    DOT National Transportation Integrated Search

    2010-04-01

    This study evaluates potentially viable strategies to reduce transportation greenhouse gas (GHG) emissions. The study was mandated by the Energy Independence and Security Act (P.L. 110-140, December 2007). The Act directed the U.S. Department of Tran...

  15. Transportation's role in reducing U.S. greenhouse gas emissions, volume 1 : report to Congress, U.S. Department of Transportation

    DOT National Transportation Integrated Search

    2010-04-01

    This study evaluates potentially viable strategies to reduce transportation : greenhouse gas (GHG) emissions. The study was mandated by the Energy : Independence and Security Act (P.L. 110-140, December 2007). The Act directed : the U.S. Department o...

  16. The Next Wave. Volume 19, Number 2

    DTIC Science & Technology

    2012-01-01

    Afghanistan and other war zones/These are but two examples of what have become almost routine reports of failures in system security. Increasingly...and to describe what it might look like. Academic and industry experts from a broad set of disciplines including security, economics, human factors...Dusko Pavlovic from Oxford University provides a unique and unexpected model for security to reason about what a security science might be. Anupam

  17. ASIS healthcare security benchmarking study.

    PubMed

    2001-01-01

    Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.

  18. The North African Franchise: AQIM’s Threat to U.S. Security. Strategic Insights, Volume 8, Issue 5

    DTIC Science & Technology

    2009-12-01

    The North African Franchise : AQIM’s Threat to U.S. Security Strategic Insights, Volume VIII, Issue 5 (December 2009) By Captain Russell J. Isaacs...the U.S. Government. Abstract Al Qaeda of the Islamic Maghreb (AQIM) is a growing and evolving North African franchise of Al Qaeda. While the group...in towns east of Algiers. Although this attack officially marked the emergence of Al Qaeda of the Islamic Maghreb (AQIM), a North African franchise

  19. Re-assessing Rainwater Harvesting Volume by CHIRPS Satellite in Semarang Settlement Area

    NASA Astrophysics Data System (ADS)

    Prihanto, Yosef; Koestoer, Raldi H.; Sutjiningsih, Dwita

    2017-12-01

    Semarang City is one of the most influential coastal cities in Java Island. The city is facing increasingly-high water demand due to its development and water problems due to climate change. The spatial physiography and landscape of Semarang City are also exposed the city to water security problem. Hence, rainwater harvesting treatment is an urgent effort to meet the city’s water needs. However, planning, implementation and management of rainwater harvesting are highly depended on multitemporal rainfall data. It has not yet been fully compiled due to limited rain stations. This study aims to examine the extent to which CHIRPS satellite data can be utilized in estimating volume of rainwater harvesting 16 sub-districts in Semarang and determine the water security status. This study uses descriptive statistical method based on spatial analyses. Such method was developed through spatial modeling for rainfall using isohyetal model. The parameters used are rainfall, residential rooftop area, administrative area, population, physiographic and altitude units. Validation is carried out by using monthly 10 rain stations data. The results show level of validity by utilizing CHIRPS Satellite data and mapping rainfall distribution. This study also produces a potential map of distribution rainfall volume that can be harvested in 16 sub-districts of Semarang.

  20. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 3

    DTIC Science & Technology

    2009-04-01

    international standard for information security management systems like ISO /IEC 27001 :2005 [1] existed. Since that time, the organization has developed control...of ISO /IEC 27001 and the desire to make decisions based on business value and risk has prompted Ford’s IT Security and Controls organi- zation to begin...their conventional application security operation.u References 1. ISO /IEC 27001 :2005. “Information Technology – Security Techniques – Information

  1. Emerging Technologies Program Integration Report. Volume 2. Background, Delphi and Workshop Data. Appendices

    DTIC Science & Technology

    1987-05-04

    FTIILE COP’ AD-A196 840 EMERGING TECHNOLOGIES PROGRAM INTEGRATION REPORT VOLUME II BACKGROUND, DELPHI AND WORKSHOP DATA, APPENDICES . -- PREPARED...Security Classification) Emerging Technologies Program Integration Report Volume II: Background, Delphi and Workshop Data; Appendices (U) 12 PERSONAL...volumes of this integration report assess and synthesize information gathered through a Delphi survey, defense needs prioritization workshops, and

  2. Public Welfare and Work Incentives: Theory and Practice. Studies in Public Welfare. Paper No. 14.

    ERIC Educational Resources Information Center

    Burke, Vee; Townsend, Alair A.

    This chart book summarizes two volumes in the subcommittee's series, "Studies in Public Welfare." Paper No. 4 (Dec. 22, 1972) explored work incentive and disincentive features in existing and proposed public welfare programs (cash welfare, unemployment insurance, social security, veterans' benefits, food stamps, public housing, and medicaid).…

  3. Characterization of Large Volume CLYC Scintillators for Nuclear Security Applications

    NASA Astrophysics Data System (ADS)

    Soundara-Pandian, Lakshmi; Tower, J.; Hines, C.; O'Dougherty, P.; Glodo, J.; Shah, K.

    2017-07-01

    We report on our development of large volume Cs2LiYCl6 (CLYC) detectors for nuclear security applications. Three-inch diameter boules have been grown and 3-in right cylinders have been fabricated. Crystals containing either >95% 6Li or >99% 7Li have been grown for applications specific to thermal or fast neutron detection, respectively. We evaluated their gamma and neutron detection properties and the performance is as good as small size crystals. Gamma and neutron efficiencies were measured for large crystals and compared with smaller size crystals. With their excellent performance characteristics, and the ability to detect fast neutrons, CLYC detectors are excellent triple-mode scintillators for use in handheld and backpack instruments for nuclear security applications.

  4. EPA Science Matters Newsletter: Advancing Ways to Clean Up Drinking Water Systems (Published November 2013)

    EPA Pesticide Factsheets

    To advance the science and engineering of decontaminating pipe systems and safely disposing of high-volumes of contaminated water, Agency homeland security researchers are developing a Water Security Test Bed (WSTB).

  5. Study of tracking and data acquisition system for the 1990's. Volume 4: TDAS space segment architecture

    NASA Technical Reports Server (NTRS)

    Orr, R. S.

    1984-01-01

    Tracking and data acquisition system (TDAS) requirements, TDAS architectural goals, enhanced TDAS subsystems, constellation and networking options, TDAS spacecraft options, crosslink implementation, baseline TDAS space segment architecture, and treat model development/security analysis are addressed.

  6. Analyzing the cost of screening selectee and non-selectee baggage.

    PubMed

    Virta, Julie L; Jacobson, Sheldon H; Kobza, John E

    2003-10-01

    Determining how to effectively operate security devices is as important to overall system performance as developing more sensitive security devices. In light of recent federal mandates for 100% screening of all checked baggage, this research studies the trade-offs between screening only selectee checked baggage and screening both selectee and non-selectee checked baggage for a single baggage screening security device deployed at an airport. This trade-off is represented using a cost model that incorporates the cost of the baggage screening security device, the volume of checked baggage processed through the device, and the outcomes that occur when the device is used. The cost model captures the cost of deploying, maintaining, and operating a single baggage screening security device over a one-year period. The study concludes that as excess baggage screening capacity is used to screen non-selectee checked bags, the expected annual cost increases, the expected annual cost per checked bag screened decreases, and the expected annual cost per expected number of threats detected in the checked bags screened increases. These results indicate that the marginal increase in security per dollar spent is significantly lower when non-selectee checked bags are screened than when only selectee checked bags are screened.

  7. “U-Method” TVT-Secur Slings: Are they obstructive?

    PubMed Central

    Richard, Patrick; Gagnon, Louis-Olivier; Tu, Le Mai

    2012-01-01

    Introduction: The TVT-Secur, a single incision sling, was introduced in 2006. It is implanted using either the “hammock” or the “U-method” technique. With the latter, the sling is tightened to create a “pillowing effect” on the urethra until a negative stress test is obtained. Short-term results seem promising. However, no study has ever reported on the voiding pattern 12 months after its implantation. Our objective was to assess whether the “U-method” technique creates an obstructive voiding pattern on pressure-flow study (PFS) 12 months after the surgery. Methods: In this retrospective study, we reviewed the charts of 33 women who underwent the “U-method” TVT-Secur. Patients were evaluated before and 12 months postoperatively with regard to different urodynamic studies (UDS). The incontinence status was also assessed 12 months after surgery. Results: At 12 months after the operation, 12.5% (4/32) of the patients reported an improvement of their stress urinary incontinence, while 78.1% (25/32) reported being cured from it. The objective cure rate was 63% (19/30). One patient had a suspected bladder outlet obstruction (BOO) based on PFS. Maximal flow rate (Qmax) was significantly lower 12 months after surgery (26.0 mL/s [range: 19.0–36.5] vs. 21.5 mL/s [range: 16.0–32.3]). However, median voided volume was lower on the postoperative uroflowmetry (446 mL [range: 348–605] vs. 320 mL [range: 243–502]). Furthermore, none of the patients complained of voiding symptoms after surgery. Conclusions: Although one patient had findings compatible with BOO, none complained of voiding symptoms. TVT-Secur may result in a lower Qmax. However, this finding may be due to a lower voiding volume on the postoperative UDS. PMID:22511425

  8. US statutes for enforcement by security inspectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  9. Naval War College Review. Volume 64, Number 2, Spring 2011

    DTIC Science & Technology

    2011-01-01

    to revolutionize the African maritime sector holistically, across its entire spectrum—improving safety and security, gover - nance, and industrial...strategy for a maritime economy that includes the enabling elements of gover - nance, infrastructure, trade, safety, and security and plainly tells global...transport in its core function); tourism ; energy; infrastructure (ports); cooperation on safety, security, and environmental protection; tariff harmonization

  10. 49 CFR 393.136 - What are the rules for securing large boulders?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... adequately secured. (3) Rock which has been formed or cut to a shape and which provides a stable base for... blocking used to support the boulder. (e) Securement of a non-cubic shaped boulder—with a stable base. In... piece of natural, irregularly shaped rock weighing in excess of 5,000 kg (11,000 lb.) or with a volume...

  11. 1st Quarter Transportation Report FY 2015: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregory, Louis

    2015-02-20

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 1st quarter of Fiscal Year (FY) 2015 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. Tabular summaries are provided which include the following: Sources of and carriers for LLW and MLLW shipments tomore » and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report include minor volumes of non-radioactive classified waste/material that were approved for disposal (non-radioactive classified or nonradioactive classified hazardous). Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to rounding conventions for volumetric conversions from cubic meters to cubic feet.« less

  12. 3rd Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregory, Louis

    2014-09-20

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 3rd quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014 in Tables 4 and 5. Tabular summaries are provided which includemore » the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report do not include minor volumes of non-radioactive materials that were approved for disposal. Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to differing rounding conventions.« less

  13. Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security. Volume 1

    DTIC Science & Technology

    2003-11-01

    were used to develop a web-based "deployment picture." (A little money -a few million dollars-can go a long way in the combatant commands). OSD critical...AND MISSIONS f1 HOMELAND SECURJTY 91 APP8VD&XH Dr. Mark Harper U.S. Naval Academy Mr. Art Money Private Consultant Mr. Walter Morrow, Jr. MIT Lincoln...Protection BrigGen Irv Halter Discussion Mr. John Lauder Overview of NRO support to Homeland Security Mr. Brian Hack and Mr. Alan NRO Comms - NRO backbone

  14. Calculation of hydrocarbon-in-place in gas and gas-condensate reservoirs - Carbon dioxide sequestration

    USGS Publications Warehouse

    Verma, Mahendra K.

    2012-01-01

    The Energy Independence and Security Act of 2007 (Public Law 110-140) authorized the U.S. Geological Survey (USGS) to conduct a national assessment of geologic storage resources for carbon dioxide (CO2), requiring estimation of hydrocarbon-in-place volumes and formation volume factors for all the oil, gas, and gas-condensate reservoirs within the U.S. sedimentary basins. The procedures to calculate in-place volumes for oil and gas reservoirs have already been presented by Verma and Bird (2005) to help with the USGS assessment of the undiscovered resources in the National Petroleum Reserve, Alaska, but there is no straightforward procedure available for calculating in-place volumes for gas-condensate reservoirs for the carbon sequestration project. The objective of the present study is to propose a simple procedure for calculating the hydrocarbon-in-place volume of a condensate reservoir to help estimate the hydrocarbon pore volume for potential CO2 sequestration.

  15. Studies in Intelligence. Volume 56, Number 4

    DTIC Science & Technology

    2012-12-01

    two hour walk in the nearby woods . It was drizzling, but neither of us noticed. He insisted at each subsequent meeting that he would terminate...Shambaugh, and Murray Scot Tanner. See, also, Michael Swaine, The Role of the Chinese Military in National Security Policymaking (Santa Monica, CA: RAND

  16. Volume hologram with random encoded reference beam for secure data encryption

    NASA Astrophysics Data System (ADS)

    Markov, Vladimir B.; Weber, David C.; Trolinger, James D.

    2000-04-01

    A method is presented to store biometric and/or other important information on an ID card in the form of a Card Hologram that cannot be read or duplicated without the use of a special Key Hologram that is secured inside of an automated reader. The Key Hologram produces the unique wavefront required to release the information contained in a complex, 3D diffraction pattern recorded in a volume hologram attached to the card. Experimental results are presented in which the image of an Air Force resolution target are recorded and reconstructed in a volume material using a random speckle wavefront and that cannot be viewed using a simple wavefront such as a collimated or diverging laser beam.

  17. One-year results of a prospective randomized, evaluator-blinded, multicenter study comparing TVT and TVT Secur.

    PubMed

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan

    2013-02-01

    The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p < 0.0001). The TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.

  18. Federal Logistics Information System (FLIS) Procedures Manual. General and Administrative Information. Volume 1.

    DTIC Science & Technology

    1996-04-01

    Logistics Transfer 3 Data KFA Match Through Association 1 KFC File Data Minus Security Classi- 1 Note 1: Output DICs other than Search and Inter- fled...vols 8/9 KEC Output Exceeds AUTODIN Limitations 4,5 vols 8/9 KFA Match through Association 4 vols 8/9 KFC File Data Minus Security Classified...Activities 2 Nuclear Ordnance 4 Reference Numbers 2 SECURITY CLASSIFIED DATA, FILE DATA MINUS 4 vols 8/9, DIC KFC SECURITY CLASSIFIED CHARACTERISTICS 4 vols

  19. Hazardous materials safety and security technology field operational test. Volume II, evaluation final report synthesis

    DOT National Transportation Integrated Search

    2004-11-11

    The catastrophic events of September 11, 2001 and the ongoing war on terrorism have heightened the level of concern from Federal government officials and the transportation industry regarding the secure transport of hazardous materials (HAZMAT). Secu...

  20. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6

    DTIC Science & Technology

    2012-12-01

    Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for

  1. American Security and the International Energy Situation. Volume 4. Collected Papers

    DTIC Science & Technology

    1975-04-15

    piograms as jet engine sales Wheat shipments may permit the Soviets to keep chemical industries onenled l.siim.«,, ,1 Pi.l.vs.., I...security and economic interde- pendence among Western advanced industrialized countries. Periodic con- flicts have been replaced by a "security... industrialized countries, creating an "interpenetration of econ- omies." Each development affects the dimensions of the access-to- resources

  2. Public offerings of securities by petroleum industry: methods and costs of raising capital

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Siemon, D.

    1978-01-01

    This study examines public securities offerings by the petroleum industry and the flotation costs associated with raising capital through offerings to the public. Descriptive material is presented on an aggregate basis for the industry and also by selected company characteristics. Data were obtained from the Securities and Exchange Commission's records of registration statements for public offerings and include all public offerings registered with the SEC during the period January 1970 through October 1975. The petroleum industry issued 101 debt offerings and 1058 equity offerings during the time period. The total number of offerings for all industries was estimated to bemore » 20,000, so the petroleum industry accounted for roughly 5% of the total volume.« less

  3. Analytical Studies of Three-Dimensional Combustion Processes

    DTIC Science & Technology

    1989-05-01

    Include Area Code) 22c OFFICE SYMBOL Raghunath S. Boray 513-255-9991 WRDC/POPT DD Form 1473, JUN 86 Previous editions are obsolete. SECURITY...enthalpy, and momentum are calculated for each finite volume by summing the contributions from all groups of droplets. Thus, ( Sm )i,J N ((PpM-p)in

  4. Space Propulsion Hazards Analysis Manual (SPHAM). Volume 2. Appendices

    DTIC Science & Technology

    1988-10-01

    lb. RESTRICTIVE MARKINGS UNCLASSIFIED 2a. SECURITY CLASSIFICATION AUTHORITY 3 . DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release...Volume I Chapter 2 - Requirementb and the Hazards Analysis Process .... Volume I Chapter 3 - Accident Scenarios...list of the hazardous materials that are discussed; 3 ) description of the failure scenarios; 4) type of post-accident environment that is discussed

  5. 78 FR 14597 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-06

    ... assessed different fees than other indexes.\\21\\ In addition, the concept of offering a volume discount to.... This volume discount on trading Options on Treasury Securities will serve to increase order flow, which... options transaction charge. It is also reasonable and equitable to offer a floor volume discount on...

  6. Study design and rationale of "Synergistic Effect of Combination Therapy with Cilostazol and ProbUcol on Plaque Stabilization and Lesion REgression (SECURE)" study: a double-blind randomised controlled multicenter clinical trial

    PubMed Central

    2011-01-01

    Background Probucol, a cholesterol-lowering agent that paradoxically also lowers high-density lipoprotein cholesterol has been shown to prevent progression of atherosclerosis. The antiplatelet agent cilostazol, which has diverse antiatherogenic properties, has also been shown to reduce restenosis in previous clinical trials. Recent experimental studies have suggested potential synergy between probucol and cilostazol in preventing atherosclerosis, possibly by suppressing inflammatory reactions and promoting cholesterol efflux. Methods/design The Synergistic Effect of combination therapy with Cilostazol and probUcol on plaque stabilization and lesion REgression (SECURE) study is designed as a double-blind, randomised, controlled, multicenter clinical trial to investigate the effect of cilostazol and probucol combination therapy on plaque volume and composition in comparison with cilostazol monotherapy using intravascular ultrasound and Virtual Histology. The primary end point is the change in the plaque volume of index intermediate lesions between baseline and 9-month follow-up. Secondary endpoints include change in plaque composition, neointimal growth after implantation of stents at percutaneous coronary intervention target lesions, and serum levels of lipid components and biomarkers related to atherosclerosis and inflammation. A total of 118 patients will be included in the study. Discussion The SECURE study will deliver important information on the effects of combination therapy on lipid composition and biomarkers related to atherosclerosis, thereby providing insight into the mechanisms underlying the prevention of atherosclerosis progression by cilostazol and probucol. Trial registration number ClinicalTrials (NCT): NCT01031667 PMID:21226953

  7. A Secure Test Technique for Pipelined Advanced Encryption Standard

    NASA Astrophysics Data System (ADS)

    Shi, Youhua; Togawa, Nozomu; Yanagisawa, Masao; Ohtsuki, Tatsuo

    In this paper, we presented a Design-for-Secure-Test (DFST) technique for pipelined AES to guarantee both the security and the test quality during testing. Unlike previous works, the proposed method can keep all the secrets inside and provide high test quality and fault diagnosis ability as well. Furthermore, the proposed DFST technique can significantly reduce test application time, test data volume, and test generation effort as additional benefits.

  8. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 5

    DTIC Science & Technology

    2006-05-01

    Coming Events Web Sites Call for Articles Visit CrossTalk at the SSTC BackTalk Transforming: Business , Security ,Warfighting CrossTalk 76 SMXG CO-SPONSOR...theme “Transforming: Business , Security , Warfighting.” Transformation is not just the current buzzword: Many industries and the military have...systems. Transforming: Business , Security ,Warfighting Characteristic edocfosenilnoillim001-01eziS Number of external interfaces 30-300 Number of

  9. Market Reactions to Publicly Announced Privacy and Security Breaches Suffered by Companies Listed on the United States Stock Exchanges: A Comparative Empirical Investigation

    ERIC Educational Resources Information Center

    Coronado, Adolfo S.

    2012-01-01

    Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…

  10. Materials for Adaptive Structural Acoustic Control. Volume 1

    DTIC Science & Technology

    1993-04-06

    FOLLOWING PAGE 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20...375 Rubber is a highly nonlinear clastic medium. In the unstressed compliant state, the molecules ate coiled and tangled . but under stress the molecules...one-dimensional system, \\\\here tangle (solid dots) and the oblique (open circle) states are the shaded area represents the level of thermal energy

  11. Compilation of 1987 Annual Reports of the Navy ELF (Extremely Low Frequency) Communications System Ecological Monitoring Program. Volume 2

    DTIC Science & Technology

    1988-08-01

    such as those in the vicinity of the ELF antenna because they are pollinators of flowering plants , and are therefore important to the reproductive...COPY r- Compilation of 1987 Annual Reports o of the Navy ELF Communications System C4 Ecological Monitoring Program Volume 2 of 3 Volumes: TABS D -G...Security Classification) Compilation of 1987 Annual Reports of the Navy ELF Communications System Ecological Monitoring Program (Volume 2 of 3 Volumes

  12. The Development Of An Independent Locking Securement System For Mobility Aids In Public Transportation Vehicles: Volume 2

    DOT National Transportation Integrated Search

    1992-12-01

    The Quality Functional Deployment (QFD) method was used for the design of the Independent Locking Securement (ILS) System, developed by the Oregon State University. The project entailed the design, construction, and testing of the ILS system prototyp...

  13. 77 FR 68862 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-16

    ... order book in Penny Pilot Securities. The Exchange proposes to decrease the lower volume tier level from... average TCV. The Exchange also proposes to lower the upper volume tier level from an ADV equal to or... Exchange proposes to add an additional volume tier level at an ADV equal to or greater than 1.25% of...

  14. 78 FR 68108 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-13

    ... for Low-Volume Issues November 6, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange... 100,000 1,500 The Exchange introduced the current lowest-volume LMM rights fee tier on October 1, 2013...-volume LMM rights fee tier, beginning November 1, 2013 the fee for the next highest tier would apply...

  15. 78 FR 54507 - Clearing Agency; the Options Clearing Corporation; Notice of Filing of Proposed Rule Change To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-04

    ... outstanding shareholders and overall trading volume. The STANS system currently takes into account the risk to... volume). If the net long position in the account, as adjusted for the delta of short option and futures..., particularly where the average daily trading volume of the deposited security is low, while taking into account...

  16. 17 CFR 240.3a55-1 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... be identified from the universe of all NMS securities as defined in § 242.600 of this chapter that... identified from the universe of all NMS securities as defined in § 242.600 of this chapter that are common...

  17. 17 CFR 240.3a55-1 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... be identified from the universe of all NMS securities as defined in § 242.600 of this chapter that... identified from the universe of all NMS securities as defined in § 242.600 of this chapter that are common...

  18. 17 CFR 240.3a55-1 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... be identified from the universe of all NMS securities as defined in § 242.600 of this chapter that... identified from the universe of all NMS securities as defined in § 242.600 of this chapter that are common...

  19. 17 CFR 240.3a55-1 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... be identified from the universe of all NMS securities as defined in § 242.600 of this chapter that... identified from the universe of all NMS securities as defined in § 242.600 of this chapter that are common...

  20. 17 CFR 240.3a55-1 - Method for determining market capitalization and dollar value of average daily trading volume...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... be identified from the universe of all NMS securities as defined in § 242.600 of this chapter that... identified from the universe of all NMS securities as defined in § 242.600 of this chapter that are common...

  1. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to the business community in a secure manner, CBSV provides us with cost and workload management benefits. New Information: To use CBSV, interested parties must pay a one- time non-refundable...

  2. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... developed CBSV as a user- friendly, internet-based application with safeguards that protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to users in a secure manner, CBSV provides us with cost and workload management benefits. New Information...

  3. ERCMExpress. Volume 2, Issue 4

    ERIC Educational Resources Information Center

    US Department of Education, 2006

    2006-01-01

    This issue of ERCMExpress alerts readers of the All-Hazard NOAA weather radio (NWR) network upgrade. In 2004, The National Oceanic and Atmospheric Administration NOAA and the U.S. Department of Homeland Security (DHS) collaborated to enable DHS to disseminate homeland security-related information over the NWR network. DHS's goal was to produce an…

  4. 78 FR 45580 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-29

    ... and account for less than twenty percent (20%) of industry volume. Finally, by applying the lower fee... Rule Change to Amend Certain Market Maker Fees July 23, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the [[Page 45581

  5. The DISAM Journal of International Security Assistance Management. Volume 30, Number 4, December 2008

    DTIC Science & Technology

    2008-12-01

    the Black Sea’s natural beauty and resources; and improving security throughout the region. At its foundation, it follows from the same goals we have...developing countries, the force’s commander told online journalists and bloggers in an August 8, 2008 teleconference. Many past humanitarian

  6. ACUTE STUDIES OF INHALED CHLORINE IN F344 RATS SUGGEST ALTERNATIVE TO HABER'S RULE FOR RISK EXTRAPOLATIONS

    EPA Science Inventory

    Chlorine (CI2), a high-production volume air pollutant, is an irritant of interest to homeland security. Risk assessment approaches to establish egress or re-entry levels typically use an assumption based on Haber's Rule and apply a concentration times duration ("C x t") adjustme...

  7. A study of space station needs, attributes and architectural options. Volume 1: Executive summary

    NASA Technical Reports Server (NTRS)

    Steinbronn, O.

    1983-01-01

    Missions that will benefit from the development of a permanent manned space station are examined. The missions that will determine the space station architecture include spaceborne scientific experiments, space industrialization and commercialization, remote space operations, and U.S. national security. Architectural options and economic analysis are also presented.

  8. Parameters, Journal of the US Army War College, Volume 14, Number 4, Winter 1984.

    DTIC Science & Technology

    1984-01-01

    Pa.: US Army War College, Strategic Studies In- 31. A Energia Nuclear no Brasil (Rio de Janeiro: stitute, 1979), p. 17. Biblioteca do Exercito Editors...security factors exist. These would be Monetary Fund officials. "Balance of Payments," in Annual US-Mexican relationships, moral renovation , demographic

  9. The DISAM Journal of International Security Assistance Management. Volume 29, Number 4, December 2007. Building Partnership Capacity

    DTIC Science & Technology

    2007-12-01

    Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28

  10. Army Communicator. Volume 28, Number 1, Spring 2003

    DTIC Science & Technology

    2003-01-01

    SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 72 19a. NAME OF RESPONSIBLE PERSON ...does business to meet these requirements and the growing expectations from the president and his staff for instantaneous, global, secure , reliable and...by COL Tim Gibson Do you have access to a secure Internet-protocol router network terminal on a regular basis? If you answered yes, you’re wrong

  11. Parameters, US Army War College Quarterly. Volume 19, Number 3, September 1989

    DTIC Science & Technology

    1989-09-01

    American National Security ............... Steven A. Raho III The Admirals’ Revolt of 1949: Lessons for Today ....... .Phillip S. Meilinger View From the...land warfare, national and inter- national security affairs, military strategy, military leadership and management, military history, military ethics... Security Steven A. Raho III 69 The Admirals’ levolt of 1949: After the C’old War. George F Kennan 97 Commentary & Reply 105 Book Reviews 1.... 4 From

  12. Rapid Growth in Surgeons’ Use of Secure Messaging in a Patient Portal

    PubMed Central

    Shenson, Jared A.; Cronin, Robert M.; Davis, Sharon E.; Chen, Qingxia; Jackson, Gretchen Purcell

    2016-01-01

    Background Use of secure messaging through patient portals has risen substantially in recent years due to provider incentives and consumer demand. Secure messaging may increase patient satisfaction and improve outcomes, but also adds to physician workload. Most prior studies of secure messaging focused on primary care and medical specialties. We examined surgeons’ use of secure messaging and the contribution of messaging to outpatient interactions in a broadly-deployed patient portal. Methods We determined the number of clinic visits and secure messages for surgical providers in the first three years (2008–10) after patient portal deployment at an academic medical center. We calculated the proportion of outpatient interaction conducted through messaging for each specialty. Logistic regression models compared the likelihood of message-based versus clinic outpatient interaction across surgical specialties. Results Over the study period, surgical providers delivered care in 648,200 clinic visits and received 83,912 messages, with more than 200% growth in monthly message volume. Surgical specialties receiving the most messages were orthopedics/podiatry (25.1%), otolaryngology (20.1%), urology (10.8%), and general surgery (9.6%); vascular surgery (0.8%) and pediatric general surgery (0.2%) received the fewest. The proportion of outpatient interactions conducted through secure messaging increased significantly from 5.4% in 2008 to 15.3% in 2010 (p<0.001) with all specialties experiencing growth. Heart/lung transplantation (74.9%), liver/kidney/pancreas transplantation (69.5%), and general surgery (48.7%) had the highest proportion of message-based outpatient interaction by the end of the study. Conclusions This study demonstrates rapid adoption of online secure messaging across surgical specialties with significant growth in its use for outpatient interaction. Some specialties, particularly those with long-term follow-up, interacted with patients more through secure messaging than in person. As surgeons devote more time to secure messaging, additional research will be needed to understand the care delivered through online interactions and to develop models for reimbursement. PMID:26123340

  13. MEMS and MOEMS for national security applications

    NASA Astrophysics Data System (ADS)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  14. Guaranteed Student Loans: Eliminating Interest Rate Floors Could Generate Substantial Savings. Report to the Honorable George D. Mitchell, U.S. Senate.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Div. of Human Resources.

    A study was done of how interest rate floors on certain guaranteed student loans affect the federal government's and students' costs when rates on short-term government securities decline. The study developed cost comparisons using fixed and variable loan interest rates. For comparison Department of Education projections of loan volumes for fiscal…

  15. U.S. Army War College Guide to National Security Issues. Volume 2. National Security Policy and Strategy

    DTIC Science & Technology

    2012-06-01

    1998 National War College paper entitled “U.S. National Se- curity Structure: A New Model for the 21st Century” defines the national security community ...fueled by revolu- tions in communications and information management, the emergence of a truly global market and world economy, the primacy of economic...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions , searching existing data sources

  16. Trainer Engineering Report (Final) for MILES. Volume 2. Revision

    DTIC Science & Technology

    1981-04-22

    formerly a separate document, Data Item AOOX. iii/iv 1A , SECURITY CLASSIFICATION OF THIS PAGE (Uhen Deaa Enterecd) ... __ . ....... REPORT DOCUMENTATION...NAVTRAEQUIPCEN, Orlando, FL 32813 3 14. MON’TORING AGENCY NAME & ADDRESS(II dilletent from CoftrollIn OGlue*) IS. SECURITY CLASS. (of thie twoot...OBSOLETE UNCLASSIFIED S/N 0102蓞-6601 I SECURITY CL.ASSIFICATION OF THIS iPAGE fUlses Data EaieteE i • CONTENTS .I * INTRODUCTION 1-1 1.1 1980 MILES 1-1

  17. National Computer Security Conference (15th) held in Baltimore, Maryland on October 13-16, 1992. Volume 2: Proceedings

    DTIC Science & Technology

    1992-10-16

    the DNA Fingerprint Laboratory. The Los Angeles Police Department and its former Chief, Daryl Gates for permitting a secret unit, the ...authorized to change information in. Conclusions Where angels fear .... Of all the reasons for compartmentation for which the level of evaluation...database, and a security label attribute is associated with data in each tuple in a relation. The range and distribution of security levels may

  18. PRESERVING DRINKING WATER INTEGRITY IN OUR COMMUNITIES: HOMELAND SECURITY PRIORITIES OF THE ENVIRONMENTAL PROTECTION AGENCY

    EPA Science Inventory

    A book chapter published in a 3-volume textbook series by the U. S. Military Academy at West Point, Combating Terrorism Center. Book title: Homeland Security: Protecting America's Targets. The chapter is a review of background of water systems, impact of September 11, 2001, a...

  19. 17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Indexes underlying futures contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY... reported transactions used in calculating dollar value of trading volume is reported in a currency other...

  20. External Labeling as a Framework for Access Control

    ERIC Educational Resources Information Center

    Rozenbroek, Thomas H.

    2012-01-01

    With the ever increasing volume of data existing on and passing through on-line resources together with a growing number of legitimate users of that information and potential adversaries, the need for better security and safeguards is immediate and critical. Currently, most of the security and safeguards afforded on-line information are provided…

  1. 2016 Billion-Ton Report: Environmental Sustainability Effects of Select Scenarios from Volume 1 (Volume 2)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Efroymson, R. A.; Langholtz, M. H.; Johnson, K. E.

    On behalf of all the authors and contributors, it is a great privilege to present the 2016 Billion-Ton Report (BT16), volume 2: Environmental Sustainability Effects of Select Scenarios from volume 1. This report represents the culmination of several years of collaborative effort among national laboratories, government agencies, academic institutions, and industry. BT16 was developed to support the U.S. Department of Energy’s efforts towards national goals of energy security and associated quality of life.

  2. Space station needs, attributes, and architectural options study. Volume 1: Missions and requirements

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Science and applications, NOAA environmental observation, commercial resource observations, commercial space processing, commercial communications, national security, technology development, and GEO servicing are addressed. Approach to time phasing of mission requirements, system sizing summary, time-phased user mission payload support, space station facility requirements, and integrated time-phased system requirements are also addressed.

  3. Marine data security based on blockchain technology

    NASA Astrophysics Data System (ADS)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  4. U.S., Soviets Face Common Science Problems.

    ERIC Educational Resources Information Center

    Lepkowski, Wil

    1981-01-01

    Summarizes recent findings reported in a two-volume publication, "Science Policy: USA/USSR," issued by the National Science Foundation. Volumes I and II review U.S. and Soviet science policy in research and development, respectively. Comparisons are made concerning common problems around energy, environment, and the meaning of security.…

  5. 2008 Homeland Security S and T Stakeholders Conference West volume 2 Monday

    DTIC Science & Technology

    2008-01-16

    per collection and pressure to be applied, etc. . - Enviromental effects; dry vs. wet surface (vs. type of sample swipe), clean vs. dirty surfaces...selection of collection via low volume or high volume sampling, distance to suspect item critical, etc. - Enviromental effects; temperature (range of...selection of material, collection via hand wiping or sampling wand, area per collection and pressure to be applied, etc. . - Enviromental effects; dry

  6. Subchronic Toxicity Studies on 1,3,5-Trinitrobenzene, 1,3- Dinitrobenzene, and Tetryl in Rats. Subchronic Toxicity Evaluation of 1,3,5- Trinitrobenzene in Fischer 344 Rats

    DTIC Science & Technology

    1994-05-01

    cton ofMO,,natt. ’"An saqe jr~n ’edw tc.ngin o...rm to Wailoqto. HeCdos11#, ¶ n1e i Oueftoc D or.,e fwaft at~on OOWctl~t~ and AeoOat. 12 11 J~flfflOI 0S...controls in both sexes.3 14. SUBJECT TERMS 115 . NUMBER OF PAGES 16. PRICE CODE 17. SECURITv CLASSIFICATION 13. SECURITY CLASSIFICATION 19. SECURITY...NJ). Total red and white blood cell counts, platelet count, differential leukocyte count, hemoglobin, and packed cell volume were measured and

  7. Ideas, Concepts, Doctrine: Basic Thinking in the United States Air Force, 1907-1960. Volume 1

    DTIC Science & Technology

    1989-12-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 684 19a. NAME OF RESPONSIBLE PERSON a. REPORT...reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and...lecture have been cleared with the lecturer, even though they may have been unclassified as to military security . To a man these lecturers have been

  8. Behavioral Analysis of Physical Security Job Analyses. Volume 1.

    DTIC Science & Technology

    1980-10-01

    Job Analyses Personnel Reliability Program Junior Officers Physical Security Morale Motivation 20. ABSTRACT (Continue an reverese ode It neceearly and...internal motivation factors. Assignment of some auxiliary duties to enlisted personnel is possibly conducive to lowered efficiency in physical...subordinates; scheduling pressures; operational alerts and emergencies; relative lack of extrinsic rewards; constant necessity to prove credibility and

  9. U.S. Army War College Guide to National Security Issues. Third Edition, Volume 2. National Security Policy and Strategy

    DTIC Science & Technology

    2008-06-01

    183 14. Ethical Issues in War: An Overview Martin L. Cook...185 15. Ethics and War in Comparative Religious Perspective...be guided by values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general

  10. The DISAM Journal of International Security Assistance Management. Volume 24, Number 3, Spring 2002

    DTIC Science & Technology

    2002-01-01

    to security cooperation such as human rights, economics, export control, and disarmament. Others are more regionally centered in South America and...Military Affairs “ Export Control” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62 John R...related legislation recently enacted for fiscal year (FY) 2002. While funding for the fiscal year was appropriated by the Foreign Operations, Export

  11. Air and Space Power Journal. Volume 29, Number 4. July-August 2015

    DTIC Science & Technology

    2015-08-01

    Afghanistan, and Pakistan. It is incredibly difficult to prevent these attacks when the most explicit strategies are reactive ex post facto military...Editor, Strategic Studies Quarterly Air Force Research Institute Dr. Grant T. Hammond USAF Center for Strategy and Technology Dr. Dale L. Hayden Air Force...of War Studies at King’s College London, researches nonproliferation, terrorism, and US security policy. He observes that deterrence strategies

  12. 78 FR 66094 - Self-Regulatory Organizations: Miami International Securities Exchange LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... Priority Customer Rebate Program (the ``Program'') until November 30, 2013.\\3\\ The Program currently... Customer \\6\\ order transmitted by that Member which is executed on the Exchange in all multiply-listed... thresholds are calculated based on the customer average daily volume over the course of the month. Volume...

  13. Australian Family Research Conference Proceedings (Canberra, Australia, November 23-25, 1983). Volume IV: Policies and Families.

    ERIC Educational Resources Information Center

    Institute of Family Studies, Melbourne (Australia).

    Fourth in a series of volumes containing the proceedings of the 1983 Australian Family Research Conference, this publication deals with policies and families in Australia. Papers and authors included are: "Improving Social Security Programs: Some Options and Barriers" (Andrew Burbidge), "Single Parent Families and Social Policies:…

  14. Ultrasonographic Measures of Volume Responsiveness

    DTIC Science & Technology

    2017-02-01

    variation, focused rapid echocardiographic evaluation , FREE, point-of-care ultrasound, POCUS, cardiac ultrasound 16. SECURITY CLASSIFICATION OF: 17...in small populations of medical patients on standard ventilator setting. There are very few studies directly comparing measures, or evaluating the...function are assessed as part of the FREE. Several predicative measures described below were assessed in the pre-TTE evaluation (Table 1). 4.2.1

  15. Traditional Galactagogue Foods and Their Connection to Human Milk Volume in Thai Breastfeeding Mothers.

    PubMed

    Buntuchai, Ganokwun; Pavadhgul, Patcharanee; Kittipichai, Wirin; Satheannoppakao, Warapone

    2017-08-01

    Thai traditional galactagogue consumption is still observed today. However, there are few scientific studies that describe this practice. Research aim: The aim of this study was to describe the connection between traditional galactagogue consumption and human milk volume. Self-reported maternal surveys ( N = 36) were conducted of mothers and their infants who breastfeed exclusively. The mothers were interviewed about traditional galactagogue consumption and intake of protein-rich foods using a semiquantitative food-frequency questionnaire. They were also assessed for energy and nutrient intake using the 24-hr dietary recall method. Their infants were between 1 and 3 months of age and were test weighed for 24 hr to measure their mother's own milk volume. Partial correlation was used to test the relationship between galactagogue consumption and milk volume by controlling the infants' birth weight, weight-for-age, maternal energy, and carbohydrate intake. The results revealed that consumption of some traditional galactagogues was significantly correlated to human milk volume, including banana flower, lemon basil, Thai basil, bottle gourd, and pumpkin ( p < .05). Furthermore, there were significant correlations between consumption of some kinds of protein and milk volume, including egg tofu, chicken, fish, and seafood ( p < .05). Maternal energy and carbohydrate intake were related to milk volume ( p < .05), but protein intake was not. Certain kinds of traditional galactagogues and proteins are associated with human milk volume. However, studies related to the active ingredients in these galactagogues are required to secure a recommendation about use of traditional galactagogues among breastfeeding mothers.

  16. Assessing the Impact of Urbanization on Direct Runoff Using Improved Composite CN Method in a Large Urban Area.

    PubMed

    Li, Chunlin; Liu, Miao; Hu, Yuanman; Shi, Tuo; Zong, Min; Walter, M Todd

    2018-04-17

    Urbanization is one of the most widespread anthropogenic activities, which brings a range of physical and biochemical changes to hydrological system and processes. Increasing direct runoff caused by land use change has become a major challenge for urban ecological security. Reliable prediction of the quantity and rate of surface runoff is an inherently difficult and time-consuming task for large ungauged urban areas. In this study, we combined Geographic Information System and remote sensing technology with an improved Soil Conservation Service curve number model to evaluate the effects of land use change on direct runoff volume of the four-ring area in Shenyang, China, and analyzed trends of direct runoff at different scales. Through analyzing trends of direct runoff from 1984 to 2015 at different scales, we explored how urbanization and other potential factors affect direct runoff changes. Total direct runoff volume increased over time, and trends varied from the inner urban area to suburban area. Zones 1 and 2 had a tendency toward decreasing direct runoff volume and risks, while Zones 3 and 4 showed gradual increases at both regional and pixel scales. The most important influence on direct runoff change was urban surface change caused by urbanization. This study presents a framework for identifying hotspots of runoff increase, which can provide important guidance to urban managers in future green infrastructure planning, in the hopes of improving the security of urban water ecological patterns.

  17. Assessing the Impact of Urbanization on Direct Runoff Using Improved Composite CN Method in a Large Urban Area

    PubMed Central

    Li, Chunlin; Liu, Miao; Hu, Yuanman; Shi, Tuo; Zong, Min; Walter, M. Todd

    2018-01-01

    Urbanization is one of the most widespread anthropogenic activities, which brings a range of physical and biochemical changes to hydrological system and processes. Increasing direct runoff caused by land use change has become a major challenge for urban ecological security. Reliable prediction of the quantity and rate of surface runoff is an inherently difficult and time-consuming task for large ungauged urban areas. In this study, we combined Geographic Information System and remote sensing technology with an improved Soil Conservation Service curve number model to evaluate the effects of land use change on direct runoff volume of the four-ring area in Shenyang, China, and analyzed trends of direct runoff at different scales. Through analyzing trends of direct runoff from 1984 to 2015 at different scales, we explored how urbanization and other potential factors affect direct runoff changes. Total direct runoff volume increased over time, and trends varied from the inner urban area to suburban area. Zones 1 and 2 had a tendency toward decreasing direct runoff volume and risks, while Zones 3 and 4 showed gradual increases at both regional and pixel scales. The most important influence on direct runoff change was urban surface change caused by urbanization. This study presents a framework for identifying hotspots of runoff increase, which can provide important guidance to urban managers in future green infrastructure planning, in the hopes of improving the security of urban water ecological patterns. PMID:29673182

  18. 77 FR 47471 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ...\\ The amount of the credit is currently determined by the ``tier'' that the SLP qualifies for, which is based on the SLP's level of quoting and the average daily volume (``ADV'') \\4\\ of liquidity added by the SLP in assigned securities. \\3\\ SLP credits are not applicable to executions of securities with a per...

  19. 76 FR 50529 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... or more, to include criteria based on an SLP's Average Daily Volume (``ADV'') in added liquidity in... liquidity in the applicable month for all assigned SLP securities, as follows: \\5\\ \\5\\ See Securities... is more than 10 million shares but not more than 20 million shares.\\6\\ \\6\\ For all other SLP...

  20. Army Logistician. Volume 41, Issue 3, May-June 2009

    DTIC Science & Technology

    2009-06-01

    analyzing, and executing multifunc- tional logistics, including transportation, food service, and acquisition, receipt, issue, and recovery of Govern...internal gun truck security for presence patrols, com- bat replenishment operations, recovery operations for damaged vehicles, or escort operations for...the next mission. During our 14-month deployment, the gun truck pla- toon provided security for 208 combat replenishment operations, 27 recovery

  1. Software Assurance Curriculum Project Volume 2: Undergraduate Course Outlines

    DTIC Science & Technology

    2010-08-01

    Contents Acknowledgments iii Abstract v 1 An Undergraduate Curriculum Focus on Software Assurance 1 2 Computer Science I 7 3 Computer Science II...confidence that can be integrated into traditional software development and acquisition process models . Thus, in addition to a technology focus...testing throughout the software development life cycle ( SDLC ) AP Security and complexity—system development challenges: security failures

  2. Australian DefenceScience. Volume 16, Number 2, Winter

    DTIC Science & Technology

    2008-01-01

    Making Virtual Advisers speedily interactive To provide an authentically interactive experience for humans working with Virtual Advisers, the Virtual...peer trusted and strong authentication for checking of security credentials without recourse to third parties or infrastructure, thus eliminating...multiple passwords, or carry around multiple security tokens.” Each CodeStick device is readied for use with a biometric authentication process. Since

  3. Optical Storage Technology Subgroup (FIMUG)

    DTIC Science & Technology

    1990-04-01

    SECURITY CLASSICATON O NGRS PAG E NPAGE OMNo. 0704- 01 " I a REPORT SECUR - ,. ASSF o RiSTRICTIVE MARKINGS Unclasified oJU IS M’ 2a SECURITY C,.ASS...USERS 22a. NAME OF RESPONSIBLE INDIVIDUAL i22o TELEPHONE (include Area Code) 22c OFFICE SYMBOL (I 00 Form 1473, JUN 06 Previous e1t3onJ art obSo1te...Mdium May Change Shape of Optical Storage." PC Week. 1988 (21 Jun). "More Volume Buyers Turning Eyes Toward Optical-Storage Market." PC Week. 1988 (25 Jul

  4. American Security and the International Energy Situation. Volume 2. World Energy and the Security of Supply

    DTIC Science & Technology

    1975-04-15

    flue gas desulfurization technology seems to oe progressing so that by the late 1970s utilities may be able to burn high-sultur coal directly with...CObHqat ion•.V Conferva 1i on 0’ I , gas . and shale Coa I Lir.’I ronmcntal control Nuclear fission Nuclear fusion Other a. So I a r B...abandonment of all import controls , its findings on th: key problem of import dependence and security did not reflect a dear conviction that a

  5. Naval Postgraduate School Research. Volume 10, Number 2, June 2000

    DTIC Science & Technology

    2000-06-01

    Associate Provost and Dean of Research Dr. David W. Netzer R E S E A R C H N A V A L P O S T G R A D U A T E S C H O O L Introduction The past two...capture during the execution phase of Fleet Battle Experiment Golf (FBE- G ). Fleet Battle Experiment Golf was conducted by Sixth Fleet and the Maritime...in FBE- G . The National Security Telecommunications and Information Systems Security Committee (NSTISSC) and the National Security Agency has certified

  6. 75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-02

    ...In accordance with Section 763 (``Section 763'') and Section 766 (``Section 766'') of Title VII (``Title VII'') of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act''), the Securities and Exchange Commission (``SEC'' or ``Commission'') is proposing Regulation SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the Securities Exchange Act of 1934 (``Exchange Act'').\\1\\ Proposed Regulation SBSR would provide for the reporting of security- based swap information to registered security-based swap data repositories or the Commission and the public dissemination of security-based swap transaction, volume, and pricing information. Registered security-based swap data repositories would be required to establish and maintain certain policies and procedures regarding how transaction data are reported and disseminated, and participants of registered security-based swap data repositories that are security- based swap dealers or major security-based swap participants would be required to establish and maintain policies and procedures that are reasonably designed to ensure that they comply with applicable reporting obligations. Finally, proposed Regulation SBSR also would require a registered SDR to register with the Commission as a securities information processor on existing Form SIP. ---------------------------------------------------------------------------

  7. 75 FR 18558 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Accelerated Approval of a Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-12

    .... Information regarding the market price and trading volume of the Shares will be continually available on a... trading volume information for the Shares will be published daily in the financial sections of newspapers...), name of security or financial instrument, number of shares or dollar value of financial instruments...

  8. 78 FR 75629 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-12

    ... Effectiveness of a Proposed Rule Change To Amend the MIAX Fee Schedule December 6, 2013. Pursuant to the... Priority Customer Rebate Program (the ``Program'') to (i) lower the volume thresholds of the four highest... thresholds in a month as described below. The volume thresholds are calculated based on the customer average...

  9. 2nd Quarter Transportation Report FY 2014

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregory, L.

    2014-07-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the second quarter of fiscal year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014 in Tables 4 and 5. Tabular summaries are provided which includemore » the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report do not include minor volumes of non-radioactive materials that were approved for disposal. Volume reports showing cubic feet (ft3) generated using the Low-Level Waste Information System may vary slightly due to differing rounding conventions.« less

  10. Multitier specification for NSEP (National Security/Emergency Preparedness) enhancement of fiber-optic long-distance telecommunication networks. Volume 1. The multitier specification - an executive summary. Technical Information Bulletin

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peach, D.F.

    1987-12-01

    Fiber optic telecommunication systems are susceptible to both natural and man-made stress. National Security/Emergency Preparedness (NSEP) is a function of how durable these systems are in light of projected levels of stress. Emergency Preparedness in 1987 is not just a matter of--can they deliver food, water, energy and other essentials--but can they deliver the vital information necessary to maintain corporate function of our country. 'Communication stamina' is a function of 'probability of survival' when faced with stress. This report provides an overview of the enhancements to a fiber-optic communication system/installation that will increase durability. These enhancements are grouped, based onmore » their value in protecting the system, such that a Multitier Specification is created that presents multiple levels of hardness. Mitigation of effects due to high-altitude electromagnetic pulse (HEMP) and gamma radiation, and protection from vandalism and weather events are discussed in the report. The report is presented in two volumes. Volume I presents the Multitier Specification in a format that is usable for management review. The attributes of specified physical parameters, and the levels of protection stated in Volume I, are discussed in more detail in Volume II.« less

  11. Case Studies Working Group Report Volume 2

    DTIC Science & Technology

    2012-03-01

    necessarily reflect the official policy or position of the De- partment of the Army, the Department of Defense, or the U.S. Government . Authors of...able to handle complex 21st century issues by working col- laboratively across government or agency boundaries. In diagnosing key systemic...nonprofit, public interest organiza- tion working to revitalize the American government by transforming the national security system. Since the

  12. Random encoded reference beam for secure data storage in a holographic memory

    NASA Astrophysics Data System (ADS)

    Markov, Vladimir B.; Weber, David C.

    2000-11-01

    A method is presented to store biometric and/or other important information on an ID card in the form of a Card Hologram that cannot be read or duplicated without the use of a special Key Hologram that is secured inside of an automated reader. The Key Hologram produces the unique wavefront required to release the information contained in a complex, 3- D diffraction pattern recorded in a volume hologram attached to the card. Experimental results are presented in which the image of an Air Force resolution target are recorded and reconstructed in a volume material using a random speckle wavefront and that cannot be viewed using a simple wavefront such as a collimated or diverging laser beam.

  13. Joint Force Quarterly. Issue 58, 3rd Quarter

    DTIC Science & Technology

    2010-06-01

    rise to concerns over the future security of the Soviet nuclear arsenal. Anticipating the possibility of loosely controlled nuclear weapons inside...broader Cooperative Threat Reduction program—an unprecedented effort to reduce nuclear dangers by secur- ing or eliminating Russian weapons systems and...volume is about applications of the biological sciences, here called “biologi- cally inspired innovations,” to the military. Rather than treating

  14. 2005 22nd International Symposium on Ballistics. Volume 1 - Tuesday

    DTIC Science & Technology

    2005-11-18

    Electric Power in Active Armour Applications, Martin van de Voorde, R. Boeschoten, TNO Defence, Security and Safety Prevention of Sympathetic Detonation...and Kevlar®/Steel Armor - Experimental Data and Hydrocode Modeling with Eulerian and Lagrangian Methods, Dale S. Preece, Vanessa S. Berg, and Loyd R...Applications, Martin van de Voorde, R. Boeschoten, TNO Defence, Security and Safety Prevention of Sympathetic Detonation Between Reactive Armor Sandwiches

  15. The Journal of the Naval Postgraduate School Center for Homeland Defense and Security. Volume 6. Issue 3

    DTIC Science & Technology

    2010-09-01

    genetic relationships between kin.33 Regardless of the underlying mechanism, individual symbiotic relationships can confer multiple benefits to the...allocation guidelines for homeland security and emergency management policymakers. The framework provides an operationally relevant rubric for...S. Wells, The Journey of Man: A Genetic Odyssey (Princeton, NJ: Princeton University Press, 2002). 4 A. Jakubowicz, “Anglo-multiculturalism

  16. 17 CFR 240.3a55-2 - Indexes underlying futures contracts trading for fewer than 30 days.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Indexes underlying futures contracts trading for fewer than 30 days. 240.3a55-2 Section 240.3a55-2 Commodity and Securities Exchanges... of trading volume is reported in a currency other than U.S. dollars, the total value of each day's...

  17. Gateway. Volume 13

    DTIC Science & Technology

    2003-01-01

    Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Hart, Sandra G ; Drury , Colin G ; Hancock, Peter A ; Szalma, James...interventions, thereby improving threat inspection and, ultimately, homeland security. n For more information please contact: Colin G. Drury , Ph.D. University...at Buffalo, SUNY Department of Industrial Engineering 342 Bell Hell Hall Buffalo, NY 14260 A Unified Model of Security Inspection Colin G. Drury

  18. 2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday

    DTIC Science & Technology

    2008-01-16

    www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of

  19. Software OT&E Guidelines. Volume 3. Software Maintainability Evaluator’s Handbook

    DTIC Science & Technology

    1980-04-01

    SOFTWARE OT&E " 1 GUIDELINES . VOLUME III SOFTWARE MAINTAINABILITY EVALUATOR’S HANDBOOK APRIL 1980 AIR FORCE TEST AND EVALUATION CENTER KIRTLAND AIR...FORCE BASE NEW MEXICO 87117 C-, -j AfTECP 800-3 AF’r...........3 ...... UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When D.. Entered) RE:PORT...c -. 5 TY!aJ0. PERIOD COVERED SOFTWARE OT& . GUIDELINES, Volume III .of five). -1 softare-R.aintainability Evaluator’s P-IEFnook’ 4ina. i 1980

  20. Extending the imaging volume for biometric iris recognition.

    PubMed

    Narayanswamy, Ramkumar; Johnson, Gregory E; Silveira, Paulo E X; Wach, Hans B

    2005-02-10

    The use of the human iris as a biometric has recently attracted significant interest in the area of security applications. The need to capture an iris without active user cooperation places demands on the optical system. Unlike a traditional optical design, in which a large imaging volume is traded off for diminished imaging resolution and capacity for collecting light, Wavefront Coded imaging is a computational imaging technology capable of expanding the imaging volume while maintaining an accurate and robust iris identification capability. We apply Wavefront Coded imaging to extend the imaging volume of the iris recognition application.

  1. Operational Ethics in Coalition Warfare: Whose Ethics Will Prevail? A Philosophical/Theological Conundrum

    DTIC Science & Technology

    2002-05-13

    the identification of reason as the prime human faculty and virtue, i.e., sense of excellence and practical wisdom as the highest good. These are the...Clothes, " National Security Studies Quarterly Spring 2000, Volume VI, Issue 2, pp. 59-71. 43 Glynis Breakwell and Keith Spacie , Pressures Facing...commander to draw upon, then what is the solution to reduce the stressors highlighted by the Breakwell and Spacie study? Can there be operational

  2. 75 FR 38162 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Order Approving Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-01

    ... Nasdaq Short Sale Volume and Monthly Short Sale Transaction Service and Related Fees June 25, 2010. I. Introduction On April 26, 2010, The NASDAQ Stock Market LLC (``Nasdaq'') filed with the Securities and Exchange...\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to establish the Nasdaq Short Sale Volume and...

  3. Use of Digital Volume Correlation to Measure Deformation of Shale Using Natural Markers

    NASA Astrophysics Data System (ADS)

    Dewers, T. A.; Quintana, E.; Ingraham, M. D.; Jacques, C. L.

    2016-12-01

    We apply digital volume correlation (DVC) to interpreting deformation as influenced by shale heterogeneity. An extension of digital image correlation, DVC uses 3D images (CT Scans) of a sample before, during and after loading to determine deformation in terms of a 3D strain map. The technology tracks the deformation of high and low density regions within the sample to determine full field 3D strains within the sample. High pyrite shales (Woodford and Marcellus in this study) are being used as the high density pyrite serves as an excellent point to track in the volume correlation. Preliminary results indicate that this technology is promising for measuring true volume strains, strain localization, and strain portioning by microlithofacies within specimens during testing. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  4. Volatilities, traded volumes, and the hypothesis of price increments in derivative securities

    NASA Astrophysics Data System (ADS)

    Lim, Gyuchang; Kim, SooYong; Scalas, Enrico; Kim, Kyungsik

    2007-08-01

    A detrended fluctuation analysis (DFA) is applied to the statistics of Korean treasury bond (KTB) futures from which the logarithmic increments, volatilities, and traded volumes are estimated over a specific time lag. In this study, the logarithmic increment of futures prices has no long-memory property, while the volatility and the traded volume exhibit the existence of the long-memory property. To analyze and calculate whether the volatility clustering is due to a inherent higher-order correlation not detected by with the direct application of the DFA to logarithmic increments of KTB futures, it is of importance to shuffle the original tick data of future prices and to generate a geometric Brownian random walk with the same mean and standard deviation. It was found from a comparison of the three tick data that the higher-order correlation inherent in logarithmic increments leads to volatility clustering. Particularly, the result of the DFA on volatilities and traded volumes can be supported by the hypothesis of price changes.

  5. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    NASA Astrophysics Data System (ADS)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  6. Validation of Test Weighing Protocol to Estimate Enteral Feeding Volumes in Preterm Infants.

    PubMed

    Rankin, Michael W; Jimenez, Elizabeth Yakes; Caraco, Marina; Collinson, Marie; Lostetter, Lisa; DuPont, Tara L

    2016-11-01

    To evaluate the accuracy of pre- and postfeeding weights to estimate enteral feeding volumes in preterm infants. Single-center prospective cohort study of infants 28-36 weeks' corrected age receiving gavage feedings. For each test weight, 3 pre- and 3 postgavage feeding weights were obtained by study personnel, blinded to feeding volume, via a specific protocol. The correlation between test weight difference and actual volume ingested was assessed by the use of summary statistics, Spearman rho, and graphical analyses. The relationship between categorical predictive variables and a predefined acceptable difference (±5 mL) was assessed with the χ 2 or Fisher exact test. A total of 101 test weights were performed in 68 infants. Estimated and actual feeding volumes were highly correlated (r = 0.94, P < .001), with a mean absolute difference of 2.95 mL (SD: 2.70; range: 0, 12.3 mL; 5th, 95th percentile: 0, 9.3); 85% of test weights were within ±5 mL of actual feeding volume and did not vary significantly by corrected age, feeding tube or respiratory support type, feeding duration or volume, formula vs breast milk, or caloric density. With adherence to study protocol, 89% of test weights (66/74) were within ±5 mL of actual volume, compared with 71% (19/27, P = .04) when concerns about protocol adherence were noted (eg, difficulty securing oxygen tubing). Via the use of a standard protocol, feeding volumes can be estimated accurately by pre- and postfeeding weights. Test weighing could be a valuable tool to support direct breastfeeding in the neonatal intensive care unit. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Lincoln Laboratory Journal. Volume 22, Number 1, 2016

    DTIC Science & Technology

    2016-06-09

    needs cyber ranges and other infrastructure to conduct scal- able, repeatable, scientific, realistic and inexpensive testing, training, and mission...support this mission, infrastructure is being upgraded to make it more efficient and secure. In “Secur- ing the U.S. Transportation Command,” Jeff...using the Electronic Key Management System (EKMS) or over a digital network by using the Key Manage- ment Infrastructure (KMI). The units must then

  8. Computer Center Reference Manual. Volume 1

    DTIC Science & Technology

    1990-09-30

    Unlimited o- 0 0 91o1 UNCLASSI FI ED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE...with connection to INTERNET ) (host tables allow transfer to some other networks) OASYS - the DTRC Office Automation System The following can be reached...and buffers, two windows, and some word processing commands. Advanced editing commands are entered through the use of a command line. EVE las its own

  9. The DTIC Review. Volume 5, Number 4. Homeland Defense

    DTIC Science & Technology

    2001-07-01

    proliferated enormously in recent years. Approximately 19 nations currently produce cruise missiles of some type , while more than 75 countries possess them... types are deployed in 81 different countries. 14. http://www.ceip.org/programs/npp/cruise4.htm. 15. The United States Commission on National Security...MD WASHINGTON DC NATIONAL SECURITY AND INTERNATIONAL AFFAIRS DIV Biological Warfare Improved Defense Program Response Decision Tree Workshop, 29-30

  10. CHIPS. Volume 27, Number 2, April-June 2009

    DTIC Science & Technology

    2009-07-01

    unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Navy Network Enterprise 9 CARS Task Force Shortens Original Timeline – Reducing the number of Navy legacy networks to improve security and save...NETWARCOM and edited from the original article published in the Winter 2008-2009 edition of Info Domain. “A plan of action and milestones (POA&M) for

  11. Distinguishability of quantum states and shannon complexity in quantum cryptography

    NASA Astrophysics Data System (ADS)

    Arbekov, I. M.; Molotkov, S. N.

    2017-07-01

    The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.

  12. The DISAM Journal of International Security Assistance Management. Volume 23, Number 3, Summer 2001

    DTIC Science & Technology

    2001-01-01

    of subjects from enemy troop movements to control of an airborne armada. They enable commanders to cut through the fog of war and achieve decisive...and various engineers to begin the requirements definition and FMS acquisition process. The focus of the NAVAIDS Country Study Team is to: The DISAM...and recommendations process, and definitions are provided. The modernization recommendations of this report usually play an

  13. Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security: Volume 2 - A: Supporting Reports

    DTIC Science & Technology

    2004-05-01

    Prescribed by ANSI Std Z39-18 This report is a product of the Defense... products ; − Making available the experience (e.g., technical training materials, procedures, publications) gained from its effort to strengthen... products of organisms. Infectious organisms include contagious and non-contagious varieties, and toxins which can act in the long term (e. g., as

  14. National Hydroelectric Power Resources Study: Environmental Assessment. Volume 8

    DTIC Science & Technology

    1981-09-01

    hydropower developers were initiated as a result of the Public Utility Regulatory Policies Act ( PURPA ) and the Energy Security Act. Those acts and...1980a). With the passage of The Public Utilities Regulatory Policy Act ( PURPA ), DOE was authorized to promote small-scale hydropower. Under its Small...requested. In addition, OMB has decided not to request the $300 million construction loan appropriation authorized under the PURPA because OMB

  15. Minimum Release of Tributyltin to Prevent Macrofouling

    DTIC Science & Technology

    1990-10-01

    MATERIALS AND METHODS The test system used was designed to pump a known volume of a tributyltin ( TBT ) solution of known concentration through a porous...Thain, J.E., M.J. Waldock, and M.E. Wait, Toxicity and degradation studies of Tributyltin ( TBT ) and Dibutyltin (DBT) in the aquatic environment, in...ELEMENT NO NO NO ACCESSION NO 11 TITLE (Include Security Classification) nimum Release of Tributyltin to Prevent Macrofoulinq 12 PERSONAL AUTHOR(S

  16. [Successful airway management using i-gel in 7 patients undergoing awake craniotomy].

    PubMed

    Matsunami, Katsuaki; Sanuki, Michiyoshi; Yasuuji, Masakazu; Nakanuno, Ryuichi; Kato, Takahiro; Kawamoto, Masashi

    2014-07-01

    In order to secure airway during awake craniotomy, we used i-gel to perform positive-pressure ventilation in 7 patients for their anesthetic management. During removal of a tumor around the motor speech center, anesthetic management including asleep-awake-asleep technique was applied for speech testing. The technique, insertion and re-insertion of i-gel, was needed and it was easy in all the patients. During positive-pressure ventilation, peak pressure, tidal volume both for inspiration and expiration, and endtidal-CO2 were not markedly altered. Leakage around i-gel, and its differences between inspiration and expiration were negligible, while the tidal volume was adequate. We conclude that i-gel is useful for anesthetic management for awake craniotomy procedure for both securing airway and ventilation.

  17. Electronic transfer of sensitive patient data.

    PubMed

    Detterbeck, A M W; Kaiser, J; Hirschfelder, U

    2015-01-01

    The purpose of this study was to develop decision-making aids and recommendations for dental practitioners regarding the utilization and sharing of sensitive digital patient data. In the current environment of growing digitization, healthcare professionals need detailed knowledge of secure data management to maximize confidentiality and minimize the risks involved in both archiving patient data and sharing it through electronic channels. Despite well-defined legal requirements, an all-inclusive technological solution does not currently exist. The need for a preliminary review and critical appraisal of common practices of data transfer prompted a search of the literature and the Web to identify viable methods of secure data exchange and to develop a flowchart. A strong focus was placed on the transmission of datasets both smaller than and larger than 10 MB, and on secure communication by smartphone. Although encryption of patient-related data should be routine, it is often difficult to implement. Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME) are viable standards for secure e-mail encryption. Sharing of high-volume data should be accomplished with the help of file encryption. Careful handling of sensitive patient data is mandatory, and it is the end-user's responsibility to meet any requirements for encryption, preferably by using free, open-source (and hence transparent) software.

  18. Gerald L. Epstein, PhD: director, center for science, technology, and security policy, American Association for the Advancement of Science (AAAS). Interview by Madeline Drexler.

    PubMed

    Epstein, Gerald L

    2009-12-01

    Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the Harvard School of Public Health and is a senior fellow at Brandeis University's Schuster Institute for Investigative Journalism.

  19. Environmental Inventory and Analysis for Pine Bluff, Arkansas. Volume II. Appendices. Pine Bluff Metropolitan Area, Arkansas Urban Water Management Study. Revised.

    DTIC Science & Technology

    1975-10-01

    pesticides were all taken on July 18, 1974. All samples were secured in six (6) ounce po.lyethylene Whirl-pac bags or one (1) liter polyethylene...tested for nutrients, minerals, o,~gen demands, trace metal’s and pesticides throughout the course of the study. The purpose of this quality control...Pastures, lawns, fields Self-heal Pycnanthemum albescens Open woods along streams White Basil Pycnanthemum muticum Dry open woods Mountain Mint Pycnanthemum

  20. 76 FR 12784 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... accordance with a sliding scale that takes account of overall market volumes during the month. Specifically... consolidated volume is 8 billion or fewer shares per day during the month. Effective March 1, 2011, NASDAQ will... Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice...

  1. Radioactive Waste in the Nordic and Far East Seas; a Soviet Legacy with International Environmental and National Security Repercussions

    DTIC Science & Technology

    1994-01-01

    362. 17 Janusz Kindler , and Stephen F. Lintner, "An Action Plan to Clean Up the Baltic’, Environment, Volume 35, No. 8, O~ober 1993: 7. 18...Independent States of the Former Soviet Union, W~shington De, GPO, May 1993, Volume 4, Supplement No. 2: 9. Io6 Janusz Kindler , and Stephen F. Lintner...of the Post-Soviet.Press, Volume XLV, No. 44, December 1, 1993: 27. Greenberger, Leonard S. "Nuclear Waste and the NIMBY Syndrome ", Public Utilities

  2. Defense AT&L (Volume 36, Number 5, September-October 2007)

    DTIC Science & Technology

    2007-10-01

    requirements, providing security solutions, and manag- ing the security of information systems. 14 CAD/ PAD Require- ments Determination in the Air Force...be contacted at williams_peter@bah.com and steward_tiffani@bah.com. Defense AT&L: September-October 2007 14 Williams is director of the CAD/ PAD Joint...the U.S. House Science and Technology Subcommittee on Transportation, Aviation and Materials. Blair is the former head of the Air Force CAD/ PAD

  3. National Information Systems Security Conference (19th) held in Baltimore, Maryland on October 22-25, 1996. Volume 1

    DTIC Science & Technology

    1996-10-25

    been demonstrated that steganography is ineffective 195 when images are stored using this compression algorithm [2]. Difficulty in designing a general...Despite the relative ease of employing steganography to covertly transport data in an uncompressed 24-bit image , lossy compression algorithms based on... image , the security threat that steganography poses cannot be completely eliminated by application of a transform-based lossy compression algorithm

  4. How to Overcome Information Anxiety: Assignment and Use of DoD Distribution Statements for Technical Documents. Volume 1. Facilitor Guide

    DTIC Science & Technology

    1998-05-01

    distribution limitations recommended if public release is not approved. The ASD(PA) shall also process appeals when public release denial is based upon...Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court... limitations ; document markings; document preparation; scientific and technical information; STINFO; information security; security training

  5. Report on Activities and Programs for Countering Proliferation and NBC Terrorism. Volume 1, Executive Summary, Addendum to 2011 Report

    DTIC Science & Technology

    2013-06-01

    Executive Branch report on research , development, and acquisition (RDA) programs to Combat Weapons of Mass Destruction (WMD). Other interagency committees...characterize, secure, disable , and/or destroy a state or non-state actor’s WMD programs and related capabilities in hostile or uncertain environments. Threat...special operations, and security operations to defend against conventionally and unconventionally delivered WMD. WMD Consequence Management. Actions

  6. Economic Security and National Security -- Interaction and Synthesis

    DTIC Science & Technology

    2009-01-01

    phenomenon has not become the case in oil futures contracts; that is, progressively more oil is being traded in pri­ vate off-market arrangements...involving China, Iran, and Sudan, while Saudi Arabia is able to manipulate oil futures prices higher on rela­ tively light transactions volume, especially...and the ability of the United States to project hard or soft political power are daunting. Market technicians refer to this as the “ LUV problem

  7. The DISAM Journal of International Security Assistance Management. Volume 25, Number 3, Spring 2003

    DTIC Science & Technology

    2003-01-01

    rights impact in Latin America (El Salvador, Guatemala, and Nicaragua). The focus is on research derived from secondary sources and student surveys...E. Berdahl, Information Systems, Incorporated, “ Impact of Foreign Military Sales Case Payment Schedule Improvements on Defense Security Assistance...specialists functioned as it was intended. Ashline’s story, recently reported in the New York Daily News, illustrates the impact that DCMA has on the

  8. Homeland Security 2002: Evolving the Homeland Defense Infrastructure. Executive Summary Report (Conference Proceedings June 25 - 26, 2002) Volume 1, No. 2)

    DTIC Science & Technology

    2002-09-01

    ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Egov 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING...initiatives. The federal government has 55 databases that deal with security threats, but inter- agency access depends on establishing agreements through...which that information can be shared. True cooperation also will require government -wide commitment to enterprise architecture, integrated

  9. CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 3, March 2007

    DTIC Science & Technology

    2007-03-01

    Capability Maturity Model ® Integration (CMMI®). CMU Software Engineering Institute <www.sei.cmu.edu/cmmi>. 5. ISO /IEC 27001 :2005. Information Security...international standards bodies – International Organization for Standardi- zation ( ISO ) and International Electro- technical Commission (IEC) – are working on a...number of projects that affect soft- ware security: • The ISO Technical Management Board (TMB) performs strategic planning and coordination for ISO

  10. The DISAM Journal of International Security Assistance Management. Volume 30, Number 3, September 2008

    DTIC Science & Technology

    2008-01-01

    a U.S. inter-agency delegation to the inaugural meeting of the U.S.-Central American Integration System, or SICA, Dialogue on Security held in ...WTO] including making China a member in 2001. We also have strongly promoted the Asia-Pacific Economic Cooperation forum [ APEC ] and fashioned high...President Bush endorsed a Free Trade Area of the Asia-Pacific [FTA AP] during his visit to the APEC leaders meeting

  11. Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments

    DTIC Science & Technology

    2014-01-01

    systems and enterprise services during mission operation can enable greater situational awareness and empowerment for the tactical user . For example...April 01, 2007. [17] Robbins, D., Unmanned Aircraft Operational Integration using MITRE’s Cursor on Target, The Edge, Volume 10, Number 2, MITRE...appropriate level of security protection and quality of service (QoS) for the tactical users is one possibility. Such an approach is not cost ef

  12. Food Security (CSL Issue Paper, Volume 14-09, September 2009)

    DTIC Science & Technology

    2009-09-01

    Security Analyst in the Operations and Gaming Division of CSL. Cadet Jason Delousa is a senior at the United State Military Academy. This paper is...cotton, oil palm, beef, dairy, poultry and fisheries products as strategic commodities at the continental level.”32 Sustainability of these cash...Increased incomes, such as in Asia, generally lead to higher consumption of meat and hence, increased demand for cereal as livestock feed. (Source

  13. American Security and the International Energy Situation. Volume 1. Introduction and Summary

    DTIC Science & Technology

    1975-04-15

    Financial Security 28 Timely Energy Supply Enhancement 31 Prospects for a Price Break M Concluding Remarks ’♦S II. World Energy Interdependence...likely to experience as the level of social and political chaos rises under the pressures of economic contraction, financial hemorrhage, and pervasive...and Consolidated Edison’s punned storage facility planned for Storm King). Often, energy projects are delayed from the very beginning by vocal

  14. Environmental Security Cooperation USARPAC’s: Defense Environmental and International Cooperation (DEIC) Conference (Center of Strategic Leadeship Issue Paper, Volume 07-03, September 2003)

    DTIC Science & Technology

    2003-09-01

    infrastructure, and providing consequence management and mitigation of man-made and natural disasters. The United States Army, Pacifi c (USARPAC), the Offi...Terrorism, Disaster Response and Consequence Management , and Medical Aspects of Environmental Security. The conference brought together military and...consequence management in maintaining governmental legitimacy, and examine salient military roles in preventing, responding to, and mitigating natural

  15. Studies in Intelligence. Volume 52, Number 4, December 2008

    DTIC Science & Technology

    2008-12-01

    Decline and Fall of the CIA by Melvin A. Goodmandies in Intelligence Vol. 52, No. 4 (Extracts, December 2008) i In the Common Defense: National...a visiting professor at the Department of War Stud- ies , King’s College London. He has been his government’s Security and Intelligence Coordinator...wide intelligence stud- ies literature. In their essay they will normally choose the one approach with which they have come to feel most com

  16. On the Effectiveness of Military Institutions: Historical Case Studies from World War I, The Interwar Period and World War II. Volume 2. The Interwar Period

    DTIC Science & Technology

    1986-04-01

    34Guadalajara", Jesus Sales Larrazabal, Ai: wLar govr 12gin (London, 1969), pp. 126-9.3 The Voluntary Militia for Mational Security (fMqi~zia Volontaria Dog la...Lucas, Storia della unita comr•ttenti dtllla MIl-4i1 volontaria Per Ja sicujoxza nazionagle. 2923-1943 (Rome, 1976). 95. Conforer , g1adalalara, pp. 342-3

  17. The Role of GGAP2 in Prostate Cancer

    DTIC Science & Technology

    2009-03-01

    show that GGAP2 protein expression is increased in HPC in both HPC cell lines and clinical patient samples. Biochemical studies indicate that GGAP2...GTPase domain of GGAP2 and enhance its effects on cancer growth. PC3 cells stably expressing wild-type GGAP2 form larger volume tumors in nude mice...reducing HPC incidence and slow down cancer development. 15. SUBJECT TERMS GGAP2, human PC, mutation 16. SECURITY CLASSIFICATION OF: 17

  18. Measurement of breast volume is a useful supplement to select candidates for surgical breast reduction.

    PubMed

    Ikander, Peder; Drejøe, Jennifer Berg; Lumholt, Pavia; Sjøstrand, Helle; Matzen, Steen; Quirinia, Anne; Siersen, Hans Erik; Ringberg, Anita; Lambaa, Susanne; Hölmich, Lisbet Rosenkrantz

    2014-01-01

    The indication for breast reduction in a public welfare or an insurance paid setting depends on the severity of the subjective symptoms and the clinical evaluation. The purpose of this study was to evaluate the use of breast volume as an objective criterion to establish the indication for breast reduction surgery, thus establishing a standard decision basis that can be shared by surgeons and departments to secure patients fair and equal treatment opportunities. A total of 427 patients who were referred to three Danish public hospitals with breast hypertrophy in the period from January 2007 to March 2011 were included prospectively in the study. The patients' subjective complaints, height, weight and standard breast measurements were registered as well as the decision for or against surgery. Breast volume was measured using transparent plastic cups. Cut-off values for breast volume were calculated based on whether or not the patients were offered reduction surgery. Most patients (93%) with a breast volume below 800 cc were not offered surgery, while most with a volume exceeding 900 cc were offered surgery (94%). In the grey zone between 800 and 900 cc, the indication seemed to be less clear-cut, and additional parameters need to be included. Breast volume can be used as an objective criterion in addition to the presently used criteria. Breast volume can easily be measured and has become appreciated by plastic surgeons dealing with patients with breast hypertrophy as a tool which facilitates their decision-making and patients' acceptance of the decisions made. not relevant. not relevant.

  19. Report on Activities and Programs for Countering Proliferation and NBC Terrorism. Volume 1. Executive Summary

    DTIC Science & Technology

    2011-05-01

    Homeland Security (DHS) and the Department of State (DOS), and by changing the IC’s CPRC representative from the Director of Central Intelli- gence to the...Security Strategy of the United States of America (May 2010), p. 4. 2 Nuclear Posture Review Report (April 6, 2010), p. i 3 National Strategy for...ongoing efforts with GICNT, the Nuclear Forensics International Technical Working Group (ITWG), Forensics En - gagement Working Group (FEWG), NATO

  20. 77 FR 19963 - Special Local Regulation and Security Zone: War of 1812 Bicentennial Commemoration, Port of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-03

    ...The Coast Guard proposes to adopt a temporary special local regulation and temporary security zones, during, and after the War of 1812 Bicentennial Commemoration events in the Port of Boston, Massachusetts, to be held between June 28, 2012 and July 6, 2012. These regulations are necessary to promote the safe navigation of vessels and the safety of life and property during the heavy volume of vessel traffic expected during this event.

  1. The Coast Guard Proceedings of the Marine Safety and Security Council. Volume 72, Number 1, Spring 2015

    DTIC Science & Technology

    2015-01-01

    vapor-tight protection). This allows the team to make continuous entries into a contaminated area for at least 72 hours, before they need to restock...to secure a contamination source or to minimize human health or environmental impact. Tailored Response All NSF hazmat technicians are procient in...to identify unknown atmo- spheres and quantify contamination . The NSF also constantly evaluates new technology and advanced instru- ments that

  2. National Computer Security Conference (13th) Held in Washington, DC on 1-4 October, 1990. Procedings. Volume 1: Information Systems Security: Standards - The Key to the Future

    DTIC Science & Technology

    1990-10-04

    methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted

  3. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  4. Limbic correlates of fearlessness and disinhibition in incarcerated youth: Exploring the brain-behavior relationship with the Hare Psychopathy Checklist: Youth Version.

    PubMed

    Walters, Glenn D; Kiehl, Kent A

    2015-12-15

    The purpose of this study was to determine whether scores on two temperament dimensions (fearlessness and disinhibition) correlated differentially with gray matter volumes in two limbic regions (amygdala and hippocampus). It was predicted that the fearlessness dimension would correlate with low gray matter volumes in the amygdala and the disinhibition dimension would correlate with low gray matter volumes in the hippocampus after controlling for age, IQ, regular substance use, and total brain volume. Participants were 191 male adolescents (age range=13-19 years) incarcerated in a maximum-security juvenile facility. Structural magnetic resonance imaging (MRI) analysis of the limbic and paralimbic regions of the brain was conducted. The temperament dimensions were estimated with items from the Psychopathy Checklist: Youth Version (PCL: YV: Forth et al., 2003). Analyses showed that the fearlessness dimension correlated negatively with gray matter volumes in the amygdala and the disinhibition dimension correlated negatively with gray matter volumes in the hippocampus but not vice versa. These findings provide preliminary support for the construct validity of the fearlessness and disinhibition temperament dimensions and offer confirmatory evidence for involvement of the amygdala and hippocampus in fear conditioning and behavioral inhibition, respectively. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  5. Coping with Volume and Variety in Temporal Event Sequences: Strategies for Sharpening Analytic Focus.

    PubMed

    Fan Du; Shneiderman, Ben; Plaisant, Catherine; Malik, Sana; Perer, Adam

    2017-06-01

    The growing volume and variety of data presents both opportunities and challenges for visual analytics. Addressing these challenges is needed for big data to provide valuable insights and novel solutions for business, security, social media, and healthcare. In the case of temporal event sequence analytics it is the number of events in the data and variety of temporal sequence patterns that challenges users of visual analytic tools. This paper describes 15 strategies for sharpening analytic focus that analysts can use to reduce the data volume and pattern variety. Four groups of strategies are proposed: (1) extraction strategies, (2) temporal folding, (3) pattern simplification strategies, and (4) iterative strategies. For each strategy, we provide examples of the use and impact of this strategy on volume and/or variety. Examples are selected from 20 case studies gathered from either our own work, the literature, or based on email interviews with individuals who conducted the analyses and developers who observed analysts using the tools. Finally, we discuss how these strategies might be combined and report on the feedback from 10 senior event sequence analysts.

  6. Preliminary Assessment/Site Investigation: Tooele Army Depot, Utah. Volume 2. South Area

    DTIC Science & Technology

    1988-12-29

    Program until the period from 17 February to 5 March 1987. 1.3 OVERVIEV OF REPORT The remaining chapters of this report (Volume II) address the following...Engineering, Science, and Technology, Inc. for the purpose of aiding in the implementation of the U.S. Army Installation Restoration Program . The use of...NUMBERS PROGRAM PROJECT ITASK WORK UNIT ELEMENT NO. NO, NO. ACCESSION NO. __ __ __ __ __ __ _ _ __ __ __I___1___1_ 003 11 TITLE (Include Security

  7. Retirement Forecasting. Technical Descriptions of Cost, Decision and Income Models. Volume 2. Report to the Chairman, Subcommittee on Social Security and Income Maintenance Programs, Committee on Finance, United States Senate.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC.

    This supplementary report identifies and provides individual descriptions and reviews of 71 retirement forecasting models. Composed of appendices, it is intended as a source of more detailed information than that included in the main volume of the report. Appendix I is an introduction. Appendix II contains individual descriptions of 32 models of…

  8. Strategic Studies Quarterly (SSQ). Volume 11, Number 1. Spring 2017

    DTIC Science & Technology

    2017-04-01

    tour of the strategic horizon, noting the characteristics, proponents, and critics of each approach. The debate over grand strategy is a post –Cold...Winter 1996 issue of International Security.5 There, the authors sug- gested four rival grand strategies that might guide American post –Cold War...primacy the adopted grand strategy of the US government during the post –Cold War period? To some degree it was, although not to the extent that its

  9. Aptitude for Destruction. Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups

    DTIC Science & Technology

    2005-01-01

    traditional military operations against opposing security forces with terrorist bombings or assassinations-we use "terrorism," "terrorist violence ," and...in the Israeli military. The IDF pres- sured Hizballah in a variety of ways, ranging from threats against its leadership to technological measures... violence . The group’s implementation of this strategy is articulated in The Green Book, a PIRA policy and training manual:2 1. A war of attrition against

  10. Strategic Studies Quarterly: Volume 10, No. 4 Winter 2016

    DTIC Science & Technology

    2016-01-01

    capabilities for intelligence col- lection, communications , and missile warning-capabilities largely in- tended to support strategic nuclear forces. 1...WINTER 2016 NASA in the Second Space Age: Exploration, Partnering, and Security declined by 12 percent in real terms from FYlO to FY15. 11 The BCA...orbit as part of the Apollo program, six of which landed on the moon, while there have been hun- dreds of manned missions to LEO. The risks to humans

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The study was conducted to determine the pollutants of concern in the Istanbul metropolitan area, monitoring equipment specifications and monitoring and data analysis procedures for an air quality and meteorological monitoring program. This volume consists of: (1) Introduction; (2) Selection of Pollutants of Concern; (3) Selection of Monitoring Locations; (4) Equipment Specifications; (5) Site Preparation and Security; (6) Standard Operating Procedures; (7) Data Reduction and Analysis; (8) Future Phases; (9) References. Also included are Attachments A through G and List of Tables and List of Figures.

  12. Big data: survey, technologies, opportunities, and challenges.

    PubMed

    Khan, Nawsher; Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Inayat, Zakira; Ali, Waleed Kamaleldin Mahmoud; Alam, Muhammad; Shiraz, Muhammad; Gani, Abdullah

    2014-01-01

    Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data.

  13. Big Data: Survey, Technologies, Opportunities, and Challenges

    PubMed Central

    Khan, Nawsher; Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Inayat, Zakira; Mahmoud Ali, Waleed Kamaleldin; Alam, Muhammad; Shiraz, Muhammad; Gani, Abdullah

    2014-01-01

    Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data. PMID:25136682

  14. Continuous Biometric Authentication for Authorized Aircraft Personnel: A Proposed Design

    DTIC Science & Technology

    2003-06-01

    Security Magazine , “Biometrics Technology: Making Moves in the Security Game", pp. 28-34 Volume 12 #3 March 2002. [17] International Biometrics... in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a...words) Today, there is no way to ensure that the personnel working within the cockpit of an aircraft in flight are authorized to be there. The

  15. The DISAM Journal of International Security Assistance Management. Volume 3, Number 4

    DTIC Science & Technology

    2010-03-01

    enough to help create jobs and build up the UAE industry . Still, for the near term, the United States stands to benefi t from several major projects ... PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Institute of Security Assistance...it was amazing to see what industry brought to the table as far as platforms and capabilities. Industry has made it clear that they can build the

  16. United States Air Force Summer Research Program 1991. Summer Faculty Research Program (SFRP) Reports. Volume 5A. Wright Laboratory

    DTIC Science & Technology

    1992-01-09

    consolidated into this aniuai report. 14. SUBJECT TERMS IS. NUMBER OF PAGi:S 16. P ’.RCE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19...Tc(Jop), the conductor is perfectly superconducting and carries the entirety of the operating current Iop. This implies no heat generation and P = 0...further found that the code cannot converge as is. See Appendix A. 2. The subject of developing a numerical scheme capable of handling both the incom

  17. The DISAM Journal of International Security Assistance Management. Volume 23, Number 2, Winter 2001

    DTIC Science & Technology

    2001-01-01

    humanitarian role as our forces remain ever prepared for their main task of seeing to the defense and security of our country. The DISAM Journal, Winter 2001...the international mine action community. During 2001, a survey will be conducted with customers of the site to ensure that our focus remains on the...preparation. The DISAM Journal, Winter 200137 United States and Peruvians treat a child on a Medrete in the Peruvian Amazon . Units must prepare for overseas

  18. Maintenance Facilities for Ammunition, Explosives, and Toxics. Design Manual 28.3.

    DTIC Science & Technology

    1981-11-01

    LOADING DOCK RAMP PROTECTION 28.3-2 8. FIRE PROTECTION 28.3-2 9. SECURITY 28.3-2 10. SAFETY 28.3-2 Section 2. GENERAL AMMUNITION MAINTENANCE SHOPS 28.3...protection in accordance with Section 3 1910.23c, Occupatioual Safety and Health Act Standards Manual. 5 8. FIRE PROTECTION. Fire protection for all...Volume 1, and Fire Protection Engineering, NAVFAC DM-8. 9. SECURITY. Maintenance facilities for ammunition, explosives, and I toxics shall be located so

  19. The DISAM Journal of International Security Assistance Management. Volume 23, Number 1, Fall 2000

    DTIC Science & Technology

    2000-01-01

    Security Assistance Command Figure 1 The USASAC, including OPM-SANG, is staffed by 621 men and women , of whom 104 are military. These professionals are...by program managers. These program managers are like “front-line entreprenuers ” delivering products and services to their customers. They have been...NATO history was to be commanded by a Polish general in June 1988. The brigade of some 3000 men and women was composed of five national battalions

  20. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    DTIC Science & Technology

    2013-06-01

    out in our minds, it is worth remembering historic actions taken by the Army in support of civil authorities in cases like the Mississippi River...controlled by the state governor, who in most cases , places them on State Active Duty (SAD) for response. The CSTs are the only unit in the Guard...disseminate this classified information. There are reported cases where the FBI did not accept DHS security clearances; and others where DHS required

  1. Assessment of the Combat Developer’s Role in Post-Deployment Software Support (PDSS) 30 June 1980 - 28 February 1981. Volume IV.

    DTIC Science & Technology

    1981-01-31

    Intelligence and Security Command (INSCOM), the US Army Communications Command (USACC), and the US Army Computer Systems Command (USACSC). (3...responsibilities of the US-Army Intelligence and Security Command (INSCOM), the US Army Communications Command (USACC), and the US Army Computer Systems...necessary to sustain, modify, and improve a deployed system’s computer software, as defined by the User or his representative. It includes evaluation

  2. HARD PAN I Test Series Test and Instrumentation Plans. Volume I. Test Plan

    DTIC Science & Technology

    1975-12-01

    t.jw .y..,,^.,^,. Ä!»,,«-* :,,; .trwev* ’ UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGt ’Wh&n Data Entered) J?)REPORT DOCUMENTATION PAGE...to facility-l—> DO ,: FORM A’J 73 1473 EDITION OF 1 NOV 65 15 OBSOLETE UNCLASSIFIED fNW SECURITY CLASSIFICATION OF THIS PAGE (Wfien Data Entered...y^o ... — ppiiw’.^y.-.j-w... v»t \\ UNCLASSIFIED iCURITY CLASSIFICATION CF THIS PAGEfWlon Data Entered) design, modification, and hardness

  3. Testing and Evaluation of the Bear Medical Systems, Inc. Bear 33 Volume Ventilator System

    DTIC Science & Technology

    1990-12-01

    approved for publication. RICHARD J. KNECHT, Lt Col, USAF, NC ROGER L STORK , Col, USAF, BSC Project Scientist Chief, Crew Systems Branch EORCHENDER...no problems. After the vibration tests, a visual inspection of the humidifier revealed that a screw and metal clip from a terminal on the incoming...hexagonal J-bolt nuts, which secure the sled to the litter, with larger wing nuts. This modification will allow the sled to be adequately secured by

  4. Treated Wastewater's Potential for Improving Water and Food Security in the Middle East and North Africa

    NASA Astrophysics Data System (ADS)

    Dare, A. E.

    2014-12-01

    The Middle East and North Africa (MENA) contains just 1% of the world's freshwater; however, even in the very arid countries of the Gulf region, high quality treated wastewater rarely sees a productive use. As countries deal with growing populations and strive for increased food security, freshwater alone cannot be relied upon to meet these demands. This research identifies best practices from the MENA for reusing treated wastewater in agricultural production, and calculates the potential of treated wastewater for increasing food production in select countries. Drawing upon both published and original treated wastewater quality data for locations in the MENA, the annual volume of treated wastewater produced, and crop water demands, estimates for potential crop production from treated wastewater are calculated. The volume of wastewater treated annually is equivalent to 10-40% of agricultural withdrawals in most MENA countries. Irrigation by treated wastewater has significant potential to impact water and food security by reducing agricultural water withdrawals and increasing domestic food production. Such initiatives require application of best management practices, such as transparent monitoring and evaluation of reuse projects for public and environmental health risks, and support from both farmers and policy makers.

  5. Experimental study of using wastewater sludge as a new drag reduction agent.

    PubMed

    Mohamed, Hadj Djelloul; Mansour, Belhadri; Nasr-Eddine, Boudjenane

    2017-07-01

    Siltation is considering as a huge risk to the life and security of dams. Forced to preserve their useful volumes, managers use sediment dredging operations through different techniques. The aim of our work is to investigate the wastewater sludge derived from wastewater treatment as a new natural lubricating instrument during transport of sediment in the pipes and to reduce head losses. From an economic and environmental point of view, this technique is more effective than the use of industrial polymers. The rheological study is done using an RS600 rheometer. Head losses and friction reducing are measured on three horizontal pipes (30, 50 and 80 mm). The mud from the dam and sludge are added at different volumes concentrations. The results revealed that the mud follows the Herschel-Bulkley model at 10-20% volume concentration, even after adding wastewater sludge proportions from 0.1- 0.4%. The mud flow head losses in pipes increase with increasing solids concentration. A maximum reduction in yield stress and frictional head loss are observed at 0.25 to 0.35% of sludge concentration, which can be the most effective choice.

  6. Detection of total hip prostheses at airport security checkpoints: how has heightened security affected patients?

    PubMed

    Johnson, Aaron J; Naziri, Qais; Hooper, Hasan A; Mont, Michael A

    2012-04-04

    The sensitivity of airport security screening measures has increased substantially during the past decade, but few reports have examined how this affects patients who have undergone hip arthroplasty. The purpose of this study was to determine the experiences of patients who had hip prostheses and who passed through airport security screenings. A consecutive series of 250 patients who presented to the office of a high-volume surgeon were asked whether they had had a hip prosthesis for at least one year and, if so, whether they had flown on a commercial airline within the past year. Patients who responded affirmatively to both questions were asked to complete a written survey that included questions about which joint(s) had been replaced, the number of encounters with airport security, the frequency and location of metal detector activation, any additional screening procedures that were utilized, whether security officials requested documentation regarding the prosthesis, the degree of inconvenience, and other relevant information. Of the 143 patients with hip replacements who traveled by air, 120 (84%) reported triggering the alarm and required wanding with a handheld detector. Twenty-five of these patients reported subsequently having to undergo further inspection, including additional wanding, being patted down, and in two cases having to undress in a private room to show the incision. Ninety-nine (69%) of the 143 patients reported that the prosthetic joint caused an inconvenience while traveling. This study provides interesting and critical information that allows physicians to understand the real-world implications of implanted orthopaedic devices for patients who are traveling where there has been heightened security since September 11, 2001. Patients should be counseled that they should expect delays and be prepared for such inconveniences, but that these are often only momentary. This information could relieve some anxiety and concerns that patients may have prior to traveling.

  7. Traffic volume trends 1998

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  8. Data security in genomics: A review of Australian privacy requirements and their relation to cryptography in data storage.

    PubMed

    Schlosberg, Arran

    2016-01-01

    The advent of next-generation sequencing (NGS) brings with it a need to manage large volumes of patient data in a manner that is compliant with both privacy laws and long-term archival needs. Outside of the realm of genomics there is a need in the broader medical community to store data, and although radiology aside the volume may be less than that of NGS, the concepts discussed herein are similarly relevant. The relation of so-called "privacy principles" to data protection and cryptographic techniques is explored with regards to the archival and backup storage of health data in Australia, and an example implementation of secure management of genomic archives is proposed with regards to this relation. Readers are presented with sufficient detail to have informed discussions - when implementing laboratory data protocols - with experts in the fields.

  9. Data security in genomics: A review of Australian privacy requirements and their relation to cryptography in data storage

    PubMed Central

    Schlosberg, Arran

    2016-01-01

    The advent of next-generation sequencing (NGS) brings with it a need to manage large volumes of patient data in a manner that is compliant with both privacy laws and long-term archival needs. Outside of the realm of genomics there is a need in the broader medical community to store data, and although radiology aside the volume may be less than that of NGS, the concepts discussed herein are similarly relevant. The relation of so-called “privacy principles” to data protection and cryptographic techniques is explored with regards to the archival and backup storage of health data in Australia, and an example implementation of secure management of genomic archives is proposed with regards to this relation. Readers are presented with sufficient detail to have informed discussions – when implementing laboratory data protocols – with experts in the fields. PMID:26955504

  10. Humanitarian crises: what determines the level of emergency assistance? Media coverage, donor interests and the aid business.

    PubMed

    Olsen, Gorm Rye; Carstensen, Nils; Høyen, Kristian

    2003-06-01

    This paper proposes a basic hypothesis that the volume of emergency assistance any humanitarian crisis attracts is determined by three main factors working either in conjunction or individually. First, it depends on the intensity of media coverage. Second, it depends on the degree of political interest, particularly related to security, that donor governments have in a particular region. Third, the volume of emergency aid depends on strength of humanitarian NGOs and international organisations present in a specific country experiencing a humanitarian emergency. The empirical analysis of a number of emergency situations is carried out based on material that has never been published before. The paper concludes that only occasionally do the media play a decisive role in influencing donors. Rather, the security interests of Western donors are important together with the presence and strength of humanitarian stakeholders, such as NGOs and international organisations lobbying donor governments.

  11. Patient outcomes following discharge from secure psychiatric hospitals: systematic review and meta-analysis

    PubMed Central

    Fazel, Seena; Fimińska, Zuzanna; Cocks, Christopher; Coid, Jeremy

    2016-01-01

    Background Secure hospitals are a high-cost, low-volume service consuming around a fifth of the overall mental health budget in England and Wales. Aims A systematic review and meta-analysis of adverse outcomes after discharge along with a comparison with rates in other clinical and forensic groups in order to inform public health and policy. Method We searched for primary studies that followed patients discharged from a secure hospital, and reported mortality, readmissions or reconvictions. We determined crude rates for all adverse outcomes. Results In total, 35 studies from 10 countries were included, involving 12 056 patients out of which 53% were violent offenders. The crude death rate for all-cause mortality was 1538 per 100 000 person-years (95% CI 1175–1901). For suicide, the crude death rate was 325 per 100 000 person-years (95% CI 235–415). The readmission rate was 7208 per 100 000 person-years (95% CI 5916–8500). Crude reoffending rates were 4484 per 100 000 person-years (95% CI 3679–5287), with lower rates in more recent studies. Conclusions There is some evidence that patients discharged from forensic psychiatric services have lower offending outcomes than many comparative groups. Services could consider improving interventions aimed at reducing premature mortality, particularly suicide, in discharged patients. PMID:26729842

  12. Econophysics and evolutionary economics (Scientific session of the Physical Sciences Division of the Russian Academy of Sciences, 2 November 2010)

    NASA Astrophysics Data System (ADS)

    2011-07-01

    The scientific session "Econophysics and evolutionary economics" of the Division of Physical Sciences of the Russian Academy of Sciences (RAS) took place on 2 November 2010 in the conference hall of the Lebedev Physical Institute, Russian Academy of Sciences. The session agenda announced on the website www.gpad.ac.ru of the RAS Physical Sciences Division listed the following reports: (1) Maevsky V I (Institute of Economics, RAS, Moscow) "The transition from simple reproduction to economic growth"; (2) Yudanov A Yu (Financial University of the Government of the Russian Federation, Moscow) "Experimental data on the development of fast-growing innovative companies in Russia"; (3) Pospelov I G (Dorodnitsyn Computation Center, RAS, Moscow) "Why is it sometimes possible to successfully model an economy? (4) Chernyavskii D S (Lebedev Physical Institute, RAS, Moscow) "Theoretical economics"; (5) Romanovskii M Yu (Prokhorov Institute of General Physics, RAS, Moscow) "Nonclassical random walks and the phenomenology of fluctuations of the yield of securities in the securities market"; (6) Dubovikov M M, Starchenko N V (INTRAST Management Company, Moscow Engineering Physics Institute, Moscow) "Fractal analysis of financial time series and the prediction problem"; Papers written on the basis of these reports are published below. • The transition from simple reproduction to economic growth, V I Maevsky, S Yu Malkov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 729-733 • High-growth firms in Russia: experimental data and prospects for the econophysical simulation of economic modernization, A Yu Yudanov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 733-737 • Equilibrium models of economics in the period of a global financial crisis, I G Pospelov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 738-742 • On econophysics and its place in modern theoretical economics, D S Chernavskii, N I Starkov, S Yu Malkov, Yu V Kosse, A V Shcherbakov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 742-749 • Nonclassical random walks and the phenomenology of fluctuations of securities returns in the stock market, P V Vidov, M Yu Romanovsky Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 749-753 • Econophysics and the fractal analysis of financial time series, M M Dubovikov, N V Starchenko Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 754-761

  13. Development of Fracture Mechanics Maps for Composite Materials. Volume 3.

    DTIC Science & Technology

    1985-12-01

    RD-At69 W4 DEVELOPMENT OF FRCTURE ECHNICS NPS FOR COMPOSITE V3jMATERIALS VOLUME 3( ) DEUTSCHE FORSCHUNOS- UND YERSUCHSANSTALT FUER LUFT- UND RAUMF...DEVELOPMENT OF FRACTURE MECHANICS MAPS I FOR COMPOSITE MATERIALS Dr. H. W. Bergmann DFVLR - Institute for Structural Mechanics Braunschweig, West Germany...Brussels, Belgium ELEMENT NO . NO. NO. NO. 11. TITLE (Include Security Classification) Development of N/A N/A N/A N/A Fracture MechanicsMaps for Composite

  14. Calculations of Flowfield About Indented Nosetips,

    DTIC Science & Technology

    1982-08-23

    agreement is good. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAOE(ft,. Date E -t. , - NSWC TR 82-286 FOREWORD A finite difference computer program has been...Specific heat at constant pressure and volume respectively e Total energy per unit volume E ,F,H,R,S,T Functions of U AHT, HT Error in total enthalpy and...total enthalpy respectively ijGrid index in E and n directions respectively SI Identity matrix J,K Maximum grid point in E and n directions respectively

  15. Centrifugal and Numerical Modeling of Buried Structures. Volume 2. Dynamic Soil-Structure Interaction.

    DTIC Science & Technology

    1987-07-14

    RD-RISE 368 CENTRIFUGAL AND NUMERICAL MODELING OF BURIED STRUCTURES 1/3 VOLUME 2 DYNAMIC..(U) COLORADO UNIV AT BOULDER DEPT OF CIVIL ENVIRONMENTAL...20332-6448 ELEMENT NO NO. NO ACCESSION NO 61102F 2302 Cl 11 TITLE (Include Security Classification) (U) Centrifugal and Numerical Modeling of Buried ...were buried in a dry sand and tested in the centrifuge to simulate the effects of gravity-induced overburden stresses which played a major role in

  16. White House Conference on Aging (Washington, D.C., November 30-December 3, 1981). Final Report. Volume 1: A National Policy on Aging.

    ERIC Educational Resources Information Center

    White House Conference on Aging, Washington, DC.

    This first volume of three of the final report of the 1981 White House Conference on Aging contains the response to the congressional charge to the Conference that the final report propose a national policy on aging not only for the minority who need aid but also for the majority of older adults who live in comfort and security. The report is…

  17. Space station data system analysis/architecture study. Task 2: Options development, DR-5. Volume 2: Design options

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary objective of Task 2 is the development of an information base that will support the conduct of trade studies and provide sufficient data to make key design/programmatic decisions. This includes: (1) the establishment of option categories that are most likely to influence Space Station Data System (SSDS) definition; (2) the identification of preferred options in each category; and (3) the characterization of these options with respect to performance attributes, constraints, cost and risk. This volume contains the options development for the design category. This category comprises alternative structures, configurations and techniques that can be used to develop designs that are responsive to the SSDS requirements. The specific areas discussed are software, including data base management and distributed operating systems; system architecture, including fault tolerance and system growth/automation/autonomy and system interfaces; time management; and system security/privacy. Also discussed are space communications and local area networking.

  18. A Review of Education and Training for Officers (RETO). Volume 4. Rank- Independent Issue

    DTIC Science & Technology

    1978-06-30

    Orris Kelly, current Chief of Army Chaplains, conducted a si-tilar study at the Army War College, when he was student there in 1573. One hundred and...seventy- eight students of his class responded to Kelly’s questicnnaire. A consensus considered the following "core" values desirable: economic security...Melville A. Drisko, Jr., did research in the area of professional. military ethics while a student in 1976-1977 at the Army War. College. He employed a

  19. Fortresses and Icebergs: The Evolution of the Transatlantic Defense Market and the Implications for U.S. National Security Policy. Volume 2: Country Studies

    DTIC Science & Technology

    2009-01-01

    CHILE ECUADOR PARAGUAY URUGUAY FALKLAND ISLANDS SOUTH GEORGIA ISLAND KENYA ETHIOPIA ERITREA SUDAN EGYPT NIGER MAURITANIA MALI NIGERIA SOMALIA NAMIBIA...painful economic reforms also began to bear fruit. The currency stabilized and budget deficits were brought under control as the country moved toward...the criteria of the Maastricht Treaty to adopt the single European currency in place of the zloty, but entry into the Euro- zone is scheduled for 2012

  20. Malaysia’s 2004 Elections: Mahathir’s Successor Succeeds. Asia-Pacific Center for Security Studies. Volume 3, Number 5, April 2004

    DTIC Science & Technology

    2004-04-01

    Chinese-dominated Democratic Action Party ( DAP ). The BA was a marriage of convenience—a strategic pact—to avoid splitting votes in Malaysia’s plurality... Ibrahim , whom Mahathir had fired as deputy prime minister on charges of corruption and sexual misdemeanors, leading to a seri- ous political showdown...long-standing opposition parties, the Islamist PAS and the Chinese-dominated DAP , had formed an electoral understanding in the 1980s to challenge the

  1. A study of space station needs, attributes and architectural options. Volume 2: Technical. Book 1: Mission requirements

    NASA Technical Reports Server (NTRS)

    Steinbronn, O.

    1983-01-01

    The following types of space missions were evaluated to determine those that require, or will be benefited materially, by a manned space station: (1) science and applications, (2) commercial, (3) technology development, (4) space operations, and (5) national security. Integrated mission requirements for man-operated and man-tended free-flying missions were addressed. A manned space station will provide major performance and economic benefits to a wide range of missions planned for the 1990s.

  2. Studies in Intelligence. Volume 55, Number 1, March 2011

    DTIC Science & Technology

    2011-03-01

    They were stopped several times at roadblocks manned by security personnel, but Liska, wearing his uniform, “always knew what to say .” The Pros...must we have something to say that people there cannot get somewhere else—which has to be more than hav- ing secrets—but we have to be mindful of...congressional hearing or eviscerated on an edito- rial page. And when I say forever, I mean forever. Rela- tively few people have read the now infamous NIE

  3. History of the Joint Chiefs of Staff. The Joint Chiefs of Staff and National Policy. Volume 8, 1961 - 1964

    DTIC Science & Technology

    2011-01-01

    Focusing on Internal Security and Civic Action 22" Concentrating on Civic Action 227 Case Studies 231 Cuba: Threat and Target 232 16. Middle East...colleagues, and particularly with senior civilians—more so, possibly, than was actually the case . The Chief Executive extended General LeMay’s term until 1...in order to make his program more palatable politically. In any case , his testimony triggered—or perhaps provided the pretext for—another JCS debate

  4. Ocean Engineering Studies Compiled 1991. Volume 8. Pressure Hulls - Cellular Sandwich Construction

    DTIC Science & Technology

    1991-01-01

    in the equipment snd structures secured nesn in contraction the cylinder may become directly to the inside surface are not likely to elliptical in...n TAN(~ e 800 1400 1400 z z z600 600 600 400 LEGEND 400- LEGEND: 400 t ensile + tensile - compresive -- Compressive 00 zoo oaxiaol axial 0...do not act in the sense of a circular plate to resist bending due to edge moments and edge shears. In Reference 4, for instance, equations were

  5. The U.S. Army War College Guide to National Security Issues. Volume 2: National Security Policy and Strategy

    DTIC Science & Technology

    2010-07-01

    Guns, and Money”: Transnational Threats and U.S. National Security ………………………………………………………………………………………...207 Paul Rexton Kan 16. Ethical ...Issues in War: An Overview …………………………………………………………215 Martin L. Cook III. Strategic Issues and Considerations 17. Ethics and War in Comparative...values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general. This might

  6. Airport detectors and orthopaedic implants.

    PubMed

    van der Wal, Bart C H; Grimm, Bernd; Heyligers, Ide C

    2005-08-01

    As a result of the rising threats of terrorism, airport security has become a major issue. Patients with orthopaedic implants are concerned that they may activate alarms at airport security gates. A literature overview showed that the activation rate of the alarm by hand-held detectors is higher than for arch detectors (100% versus 56%). Arch detection rate has significantly increased from 0% before 1995 up to 83.3% after 1994. Reported factors which influence detection rates are implant mass, implant combinations, implant volume, transfer speed, side of implant, detector model, sensitivity settings, material and tissue masking. Detection rate has been improved by more sensitive devices and improved filter software. Doctors should be able to objectively inform patients. A form is presented which will easily inform the airport security staff.

  7. 46 CFR 194.20-5 - Ventilation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND... Ventilation. (a) Chemical storerooms shall be equipped with a power ventilation system of exhaust type. The... based upon the volume of the compartment. (1) Power ventilation units shall have nonsparking impellers...

  8. Federal Logistics Information System (FLIS) Procedures Manual. Volume 8. Document Identifier Code Input/Output Formats (Fixed Length)

    DTIC Science & Technology

    1994-07-01

    REQUIRED MIX OF SEGMENTS OR INDIVIDUAL DATA ELEMENTS TO BE EXTRACTED. IN SEGMENT R ON AN INTERROGATION TRANSACTION (LTI), DATA RECORD NUMBER (DRN 0950) ONLY...and zation and Marketing input DICs. insert the Continuation Indicator Code (DRN 8555) in position 80 of this record. Maximum of OF The assigned NSN...for Procurement KFR, File Data Minus Security Classified Characteristics Data KFC 8.5-2 DoD 4100.39-M Volume 8 CHAPTER 5 ALPHABETIC INDEX OF DIC

  9. Minnesota Water Allocation Law. Volume 1. Commentary on and Abstracts of Treaties, Legislation and Rules.

    DTIC Science & Technology

    1987-09-01

    If applicable) 8c. ADDRESS(City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS ELEMENT NO. NO. NO ACCESSION NO .T 11 TITLE (Include Security...Indians 1-13 Domestic Water Supply on Reservations 1-14 Ground water sources 1-16 Surface water sources 1-16 Commentary on Indian Water Resources 1-17...General’s Office - St. Paul, Minnesota 4 DATA COLLECTION AND REPORT ORGANIZATION Data collected for these volumes result from three primary sources

  10. Adapting an Agent-Based Model of Socio-Technical Systems to Analyze System and Security Failures

    DTIC Science & Technology

    2016-05-09

    statistically significant amount, which it did with a p-valueɘ.0003 on a simulation of 3125 iterations; the data is shown in the Delegation 1 column of...Blackout metric to a statistically significant amount, with a p-valueɘ.0003 on a simulation of 3125 iterations; the data is shown in the Delegation 2...Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1, pp. 1007- 1014 . International Foundation

  11. European Science Notes. Volume 41, Number 7.

    DTIC Science & Technology

    1987-07-01

    have been amplified relatively recently, dren aged I to 15 years. Most individuals and evidence for one such family has al- are infected with HSV type 1 ...I-AtB2 686 EUROPEAN SCIENCE MOTES VOLUME 41 NUMBER ?U) OFFICE OF 1 / 1 EN4NVAL RESEARCH LONDON (ENGLAND) C J FOX JUL 87 UNCLASSIFIED F/G 5/2 U 11111 1 ...release and sale its distribution is unu~mited. 87 Z t 1 11111 V X UNCLASSIFIED . SECURITY CLASSIFICATION OF THIS PAGE , .J REPORT DOCUMENTATION PAGE Is

  12. Laser Setup for Volume Diffractive Optical Elements Recording in Photo-Thermo-Refractive Glass

    DTIC Science & Technology

    2016-04-14

    material and an optical glass . PTR glass is a Na2O-ZnO-Al2O3- SiO2 glass doped with silver (Ag), cerium (Ce), and fluorine (F). It is transparent from...SECURITY CLASSIFICATION OF: Recorded in photo-thermo-refractive (PTR) glass volume Bragg gratings (VBGs) have found great applications for...power laser applications, is restrained because of absence of available lasers emitting on PTR glass photosensitivity region (300-350 nm) with large

  13. Advanced GaAs Process Modeling. Volume 1

    DTIC Science & Technology

    1988-05-01

    c4p 0 nm cap r( l* . On u i- + t .] ONrci i Fag. I "a.t sirci trbtos 0 ke S SirecolI. S134 ap L4b N reo d ~trb. 10 ke SI oon$0 n3 ca "S lrancap 1... CA 94305 May 1989 Final Report For Period December 1985 - October 1988 Approved for public release; distribution is unlimited E 80 MATERIALS LABORATORY...llm nmE nmn A UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704018 10 . REPORT SECURITY

  14. A Generalized Escape System Simulation (GESS) Computer Program. Volume 2. GESS Programmer’s Manual. Version II.

    DTIC Science & Technology

    1984-04-01

    Directorate (Code 6032) V NAVAL AIR DEVELOPMENT CENTER Warminster, PA 18974 and I David A. Fender KETRON. INC. Warminster, PA 18974 DTlC APRIL 1984 ELECTE FINAL...A. D’Aulerio N62269-81-Z-0206 David A. Fender Task No. 630-1944 9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMEN1T PROJECT, TASKAREA A...0102LF01401UNCLASSIFIED SECURITY CLAWFICATION OF TNIS PAGE (011t1 Die pewed) UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE w JIMu D#& Ent:ed) 9. Continued Louis A

  15. Environmental Security: United Nations Doctrine for Managing Environmental Issues in Military Actions. Volume 2. Selected International Treaties, Conventions and Protocols that Address Environment-Related Issues. Selected International Organizations Relevant to Environmental Security

    DTIC Science & Technology

    2000-07-01

    Poverty; growing gap between rich and poor 30. Increasing intensive use of chemical fertilizer, pesticides and detergents 31. Destruction of coral reefs ... oceans 24. Fishery depletion due to over-fishing 25. Forest fires like those in Indonesia, Australia, Amazonian and Mediterranean countries 26...to abate eutrophication and acidification , as well as pollution of the marine environment, in particular coastal areas, from land-based sources

  16. Treatment of Perfluorinated Alkyl Substances in Wash Water ...

    EPA Pesticide Factsheets

    Report The U.S. Environmental Protection Agency’s (EPA) National Homeland Security Research Center partnered with the Idaho National Laboratory (INL) to build the Water Security Test Bed (WSTB) at the INL test site outside of Idaho Falls, Idaho. This report summarizes the results from testing conducted to evaluate the treatment of large volumes of water containing perfluorinated alkyl substances (PFAS). This summary of conclusions and observations about the performance and implementation of adsorptive treatment of AFFF contaminated water, based on the testing performed at the INL WSTB.

  17. When Will We Ever Learn? The After Action Review, Lessons Learned and the Next Steps in Training and Educating the Homeland Security Enterprise for the 21st Century

    DTIC Science & Technology

    2013-06-01

    Evaluation Program (HSEEP), Volume III, February 2007, 27. 29 Ibid., 4. 30 Ibid. 12 …allows players to engage in a self -assessment of their...be correct in one respect. A 2003 paper entitled A Comparative Study of the After Action Review (AAR) in the Context of the Southern Africa Crisis...A Comparative Study of the After Action Review (AAR) in the Context of the Southern Africa Crisis, June 2003. 46 Ibid. 47 Human Factors Integration

  18. The impact of information disclosure on market liquidity: Evidence from firms' use of Twitter

    NASA Astrophysics Data System (ADS)

    Qu, Qixing; Wang, Lin; Qin, Liangjuan; Zhao, Xiaoye; Wang, Lijie

    2017-01-01

    Despite the popular use of social media by firms, empirical research investigating their economic values still lags. Based on the Security Exchange Commission's (SEC) new regulation on Fair Disclosure valid important corporate information discloses via social media (RIDSM), in this study, we examine the effectiveness of this new regulation to market liquidity. We collect trade data including daily volume and bid-ask spread to assemble a unique data set at individual firm level from S&P 500 firms and analyze the firms' bid-ask spread and volume before and after issuing the regulation. This natural experiment allows us to separate the effect of regulation from the effect of other confounding factors. The results from our panel data analyses indicate that bid-ask spread has decreased by about 5% in response to the new regulation. Our results are statistically significant and highly robust. We also examine the impact of the new regulation on a volume-based measure of liquidity, and find that the regulation is associated with greater volume, consistent with a reduction in information asymmetry. Moreover, this result holds mainly for firms that are high-tech, consistent with them being in greater need of this additional information disclosure channel.

  19. Packaging and transportation of radioactive materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The following topics are discussed in this volume: shielding and criticality; transportation accidents; physical security in transit; transport forecasting and logistics; transportation experience, operations and planning; regulation; standards and quality assurance; risk analysis; and environmental impacts. Separate abstracts are prepared for individual items. (DC)

  20. 46 CFR 154.1848 - Inerting.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF... oxygen concentration is 8 percent or less by volume when flammable cargoes are carried; (2) Hold and... vessel with full secondary barriers when non-flammable cargoes are carried; and (iii) A vessel with...

  1. 46 CFR 154.1848 - Inerting.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF... oxygen concentration is 8 percent or less by volume when flammable cargoes are carried; (2) Hold and... vessel with full secondary barriers when non-flammable cargoes are carried; and (iii) A vessel with...

  2. 46 CFR 154.1848 - Inerting.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF... oxygen concentration is 8 percent or less by volume when flammable cargoes are carried; (2) Hold and... vessel with full secondary barriers when non-flammable cargoes are carried; and (iii) A vessel with...

  3. 46 CFR 154.1848 - Inerting.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF... oxygen concentration is 8 percent or less by volume when flammable cargoes are carried; (2) Hold and... vessel with full secondary barriers when non-flammable cargoes are carried; and (iii) A vessel with...

  4. Environmental impacts of biofuel production and use

    EPA Science Inventory

    The 2007 Energy Independence and Security Act (EISA) required a significant increase in the production and use of renewable fuels. Given the current state of technology and infrastructure, nearly all of the projected volume of biofuel consumption over the foreseeable future is ex...

  5. 2005 8th Annual Systems Engineering Conference. Volume 1, Tuesday

    DTIC Science & Technology

    2005-10-27

    Services NCES Discovery Services Federated Search Denotes interface Service NCCP Oktoberfest 2004 101 Task: Global Strike Mission Planning NCCP Oktoberfest...Enterprise Service Management Security Services NCES Discovery Services Federated Search Service Test, cert and accreditation needs to be focused on small

  6. Secure distributed genome analysis for GWAS and sequence comparison computation.

    PubMed

    Zhang, Yihua; Blanton, Marina; Almashaqbeh, Ghada

    2015-01-01

    The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice.

  7. Secure distributed genome analysis for GWAS and sequence comparison computation

    PubMed Central

    2015-01-01

    Background The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. Methods In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. Results We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. Conclusions This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice. PMID:26733307

  8. 46 CFR 76.15-50 - Lockout valves.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... any carbon dioxide extinguishing system protecting a space over 6,000 cubic feet in volume and... system from the protected space or spaces, making it impossible for carbon dioxide to discharge in the... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon...

  9. 46 CFR 76.15-50 - Lockout valves.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... any carbon dioxide extinguishing system protecting a space over 6,000 cubic feet in volume and... system from the protected space or spaces, making it impossible for carbon dioxide to discharge in the... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon...

  10. Epithelial perturbation by inhaled chlorine: Multi-scale mechanistic modeling in rats and humans

    EPA Science Inventory

    Chlorine is a high-production volume, hazardous air pollutant and irritant gas of interest to homeland security. Thus, scenarios of interest for risk characterization range from acute high-level exposures to lower-level chronic exposures. Risk assessment approaches to estimate ...

  11. Night Owl: Maryland's After-Hours Reference Service.

    ERIC Educational Resources Information Center

    Duke, Deborah C.

    1994-01-01

    Discusses "Night Owl," a Maryland public library's after hours telephone reference service. Issues include project start-up, user profiles, types of questions, volume, after hours reference accessibility, security, costs, service limits, publicity, staffing, and employee turnover. Similar services in other states are cited. (Contains six…

  12. A DICOM based radiotherapy plan database for research collaboration and reporting

    NASA Astrophysics Data System (ADS)

    Westberg, J.; Krogh, S.; Brink, C.; Vogelius, I. R.

    2014-03-01

    Purpose: To create a central radiotherapy (RT) plan database for dose analysis and reporting, capable of calculating and presenting statistics on user defined patient groups. The goal is to facilitate multi-center research studies with easy and secure access to RT plans and statistics on protocol compliance. Methods: RT institutions are able to send data to the central database using DICOM communications on a secure computer network. The central system is composed of a number of DICOM servers, an SQL database and in-house developed software services to process the incoming data. A web site within the secure network allows the user to manage their submitted data. Results: The RT plan database has been developed in Microsoft .NET and users are able to send DICOM data between RT centers in Denmark. Dose-volume histogram (DVH) calculations performed by the system are comparable to those of conventional RT software. A permission system was implemented to ensure access control and easy, yet secure, data sharing across centers. The reports contain DVH statistics for structures in user defined patient groups. The system currently contains over 2200 patients in 14 collaborations. Conclusions: A central RT plan repository for use in multi-center trials and quality assurance was created. The system provides an attractive alternative to dummy runs by enabling continuous monitoring of protocol conformity and plan metrics in a trial.

  13. Profitability Evaluation of a Hybrid Geothermal and CO2 Sequestration Project for a Coastal Hot Saline Aquifer.

    NASA Astrophysics Data System (ADS)

    Plaksina, Tatyana; Kanfar, Mohammed

    2017-11-01

    With growing interest in commercial projects involving industrial volume CO2 sequestration, a concern about proper containment and control over the gas plume becomes particularly prominent. In this study, we explore the potential of using a typical coastal geopressured hot saline aquifer for two commercial purposes. The first purpose is to harvest geothermal heat of the aquifer for electricity generation and/or direct use and the second one is to utilize the same rock volume for safe and controlled CO2 sequestration without interruption of heat production. To achieve these goals, we devised and economically evaluated a scheme that recovers operational and capital costs within first 4 years and yields positive internal rate of return of about 15% at the end of the operations. Using our strategic design of well placement and operational scheduling, we were able to achieve in our numerical simulation study the following results. First, the hot water production rates allowed to run a 30 MW organic Rankine cycle plant for 20 years. Second, during the last 10 years of operation we managed to inject into the same reservoir (volume of 0.8 x 109 m3) approximately 10 million ton of the supercritical gas. Third, decades of numerical monitoring the plume after the end of the operations showed that this large volume of CO2 is securely sequestrated inside the reservoir without compromising the caprock integrity.

  14. FBI fingerprint identification automation study. AIDS 3 evaluation report. Volume 2: Technical feasibility

    NASA Technical Reports Server (NTRS)

    Mulhall, B. D. L.

    1980-01-01

    The results of this effort are presented in a manner for use by both the AIDS 3 Operational and Economic Feasibility subtasks as well as the Development of Alternative subtask. The approach taken was to identify the major functions that appear in AIDS 3 and then to determine which technologies would be needed for support. The technologies were then examined from the point of view of reliability, throughput, security, availability, cost and possible future trends. Whenever possible graphs are given to indicate projected costs of rapidly changing technologies.

  15. Mass Spectral Studies of 1-(2-Chloroethoxy)-2-[(2-chloroethyl)thio] Ethane and Related Compounds Using Gas ChromatographyMass Spectrometry and Gas ChromatographyTriple-Quadrupole Mass Spectrometry

    DTIC Science & Technology

    2016-02-01

    NOTES 14. ABSTRACT: The electron impact and collision-induced- dissociation mass spectra of 1-(2-chloroethoxy)-2-[(2-chloroethyl)thio] ethane and 10...Collision-ion dissociation (CID) Triple-quadrupole mass spectrometry (QQQ) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...ratio, 10:1), and a 1.0 µL volume of sample was placed on the column. Nitrogen was used as the collision gas for the collision-induced dissociation (CID

  16. The Defense Science Board 1997 Summer Study Task Force on DoD Responses to Transnational Threats; Volume 1 - Final Report.

    DTIC Science & Technology

    1997-10-01

    loss of human life - both theirs and ours - their initiatives present a formidable challenge to long-term national security. Even a small nation with...the chemical release killed a dozen people, well over 5,000 were injured and the release had the potential for far more devastating loss of life. In...individuals or groups to produce major damage and loss of life exists today. Events that we have already witnessed could well have resulted in far graver

  17. Strategic Studies Quarterly. An Air Force-Sponsored Strategic Forum on National and International Security. Winter 2009. Volume 3, Number 4

    DTIC Science & Technology

    2009-01-01

    leader of a party which has not been the dominant voice in shaping American foreign policy since Richard Nixon defeated Hubert Humphrey in the...others only think. Former Socialist foreign minister, Hubert Védrine, put it in particularly stark terms: Were France to become a “normal ally...Renate Grasse (Baden-Baden: Nomos Verlag, 2008), 233–60. 29. Le Monde, 4 October 2008. For a critical view, see Ronja Kempin and Marco Overhaus, “Kein

  18. Seismic Stability Evaluation of Ririe Dam and Reservoir Project. Report 1. Construction History and Field and Laboratory Studies. Volume 1. Main Text

    DTIC Science & Technology

    1991-09-01

    truck Service truck Steel casing, 8-foot diameter with 3/4-inch wall thickness, was installed as the shaft was advanced. A shaft cover, constructed of... steel mats. was hoisted over the shaft at night for security. To obtain in-situ density tests at selected intervals in the bottom of the shaft...subcontractor installed the three wells using an air-rotary rig, and driving steel casing as the wells were advanced. He then perforated the casings

  19. Space station needs, attributes and architectural options study. Volume 5: Cost benefits and programmatic analyses

    NASA Technical Reports Server (NTRS)

    1983-01-01

    The science, applications, commercial, U.S. national security and space operations missions that would require or be materially benefited by the availability of a permanent manned space station in low Earth orbit are considered. Space station attributes and capabilities which will be necessary to satisfy these mission requirements are identified. Emphasis is placed on the identification and validation of potential users, their requirements, and the benefits accruing to them from the existence of a space station, and the programmatic and cost implications of a space station program.

  20. Association between brain structure and phenotypic characteristics in pedophilia.

    PubMed

    Poeppl, Timm B; Nitschke, Joachim; Santtila, Pekka; Schecklmann, Martin; Langguth, Berthold; Greenlee, Mark W; Osterheider, Michael; Mokros, Andreas

    2013-05-01

    Studies applying structural neuroimaging to pedophiles are scarce and have shown conflicting results. Although first findings suggested reduced volume of the amygdala, pronounced gray matter decreases in frontal regions were observed in another group of pedophilic offenders. When compared to non-sexual offenders instead of community controls, pedophiles revealed deficiencies in white matter only. The present study sought to test the hypotheses of structurally compromised prefrontal and limbic networks and whether structural brain abnormalities are related to phenotypic characteristics in pedophiles. We compared gray matter volume of male pedophilic offenders and non-sexual offenders from high-security forensic hospitals using voxel-based morphometry in cross-sectional and correlational whole-brain analyses. The significance threshold was set to p < .05, corrected for multiple comparisons. Compared to controls, pedophiles exhibited a volume reduction of the right amygdala (small volume corrected). Within the pedophilic group, pedosexual interest and sexual recidivism were correlated with gray matter decrease in the left dorsolateral prefrontal cortex (r = -.64) and insular cortex (r = -.45). Lower age of victims was strongly associated with gray matter reductions in the orbitofrontal cortex (r = .98) and angular gyri bilaterally (r = .70 and r = .93). Our findings of specifically impaired neural networks being related to certain phenotypic characteristics might account for the heterogeneous results in previous neuroimaging studies of pedophilia. The neuroanatomical abnormalities in pedophilia seem to be of a dimensional rather than a categorical nature, supporting the notion of a multifaceted disorder. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Patient-to-physician messaging: volume nearly tripled as more patients joined system, but per capita rate plateaued.

    PubMed

    Crotty, Bradley H; Tamrat, Yonas; Mostaghimi, Arash; Safran, Charles; Landon, Bruce E

    2014-10-01

    Patients want to be able to communicate with their physicians by e-mail. However, physicians are often concerned about the impact that such communications will have on their time, productivity, and reimbursement. Typically, physicians are not reimbursed for time spent communicating with patients electronically. But under federal meaningful-use criteria for information technology, physicians can receive a modest incentive for such communications. Little is known about trends in secure e-mail messaging between physicians and patients. To understand these trends, we analyzed the volume of messages in a large academic health system's patient portal in the period 2001-10. At the end of 2010, 49,778 patients (22.7 percent of all patients seen within the system) had enrolled in the portal, and 36.9 percent of enrolled patients (8.4 percent of all patients) had sent at least one message to a physician. Physicians in the aggregate saw a near tripling of e-mail messages during the study period. However, the number of messages per hundred patients per month stabilized between 2005 and 2010, at an average of 18.9 messages. As physician reimbursement moves toward global payments, physicians' and patients' participation in secure messaging will likely increase, and electronic communication should be considered part of physicians' job descriptions. Project HOPE—The People-to-People Health Foundation, Inc.

  2. Exploring the Unknown: Selected Documents in the History of the U.S. Civilian Space Program. Volume 2; External Relationships

    NASA Technical Reports Server (NTRS)

    Logsdon, John M. (Editor); Day, Dwayne A. (Editor); Launius, Roger D. (Editor)

    1996-01-01

    The documents selected for inclusion in this volume are presented in three chapters, each covering a particular aspect of the evolution of U.S. space exploration. These chapters address (1) the relations between the civilian space program of the United States and the space activities of other countries, (2) the relations between the U.S. civilian space program and the space efforts of national security organizations and the military, and (3) NASA's relations with industry and academic institutions.

  3. Multinational Investment: Opportunity and Challenge.

    ERIC Educational Resources Information Center

    Perspective: Essays and Reviews of Issues in Employment Security and Employment and Training Programs, 1988

    1988-01-01

    This volume of an annual journal contains nine articles focusing on the internationalization of the world's economy and business and how employment security and employment and training programs can be involved. The opening article, "Foreign Investment Euphoria Hides Community Upheaval" (W. Scott Boyd), provides an overview of the volume…

  4. Military Review. Volume 90, Number 2, March-April 2000

    DTIC Science & Technology

    2000-04-01

    additional safety and security concerns and re- quirements for workers� and drivers� life support. Integration. Integration went smoothly at Puerto Quetzal ...the SPOD for initial deployment in Gua- temala. Quetzal was only 10 kilome- ters from the forward operating base and was collocated with the main

  5. 46 CFR 34.15-50 - Lockout valves-T/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Carbon Dioxide... carbon dioxide extinguishing system protecting a space over 6,000 cubic feet in volume and installed or... or spaces, making it impossible for carbon dioxide to discharge in the event of equipment failure...

  6. 46 CFR 34.15-50 - Lockout valves-T/ALL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Carbon Dioxide... carbon dioxide extinguishing system protecting a space over 6,000 cubic feet in volume and installed or... or spaces, making it impossible for carbon dioxide to discharge in the event of equipment failure...

  7. 46 CFR 34.15-50 - Lockout valves-T/ALL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Carbon Dioxide... carbon dioxide extinguishing system protecting a space over 6,000 cubic feet in volume and installed or... or spaces, making it impossible for carbon dioxide to discharge in the event of equipment failure...

  8. 32 CFR 245.15 - Appropriate military authority.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Procedures for... restrictions to be considered include: (1) Defining the affected area. (2) Defining the type of aircraft... appropriate portions of the affected area. (4) Defining restrictions for the volume of air traffic within the...

  9. CICS Region Virtualization for Cost Effective Application Development

    ERIC Educational Resources Information Center

    Khan, Kamal Waris

    2012-01-01

    Mainframe is used for hosting large commercial databases, transaction servers and applications that require a greater degree of reliability, scalability and security. Customer Information Control System (CICS) is a mainframe software framework for implementing transaction services. It is designed for rapid, high-volume online processing. In order…

  10. Promoting International Energy Security. Volume 1: Understanding Potential Air Force Roles

    DTIC Science & Technology

    2012-01-01

    obtain additional information, contact Distribution Services: Telephone: (310) 451 -7002; Fax: (310) 451 -6915; Email: order@rand.org Library of...raise the temperature of one pound of water one degree Fahrenheit ) DoD Department of Defense EIA U.S. Energy Information Administration IEA International

  11. Intraday Seasonalities and Nonstationarity of Trading Volume in Financial Markets: Individual and Cross-Sectional Features.

    PubMed

    Graczyk, Michelle B; Duarte Queirós, Sílvio M

    2016-01-01

    We study the intraday behaviour of the statistical moments of the trading volume of the blue chip equities that composed the Dow Jones Industrial Average index between 2003 and 2014. By splitting that time interval into semesters, we provide a quantitative account of the nonstationary nature of the intraday statistical properties as well. Explicitly, we prove the well-known ∪-shape exhibited by the average trading volume-as well as the volatility of the price fluctuations-experienced a significant change from 2008 (the year of the "subprime" financial crisis) onwards. That has resulted in a faster relaxation after the market opening and relates to a consistent decrease in the convexity of the average trading volume intraday profile. Simultaneously, the last part of the session has become steeper as well, a modification that is likely to have been triggered by the new short-selling rules that were introduced in 2007 by the Securities and Exchange Commission. The combination of both results reveals that the ∪ has been turning into a ⊔. Additionally, the analysis of higher-order cumulants-namely the skewness and the kurtosis-shows that the morning and the afternoon parts of the trading session are each clearly associated with different statistical features and hence dynamical rules. Concretely, we claim that the large initial trading volume is due to wayward stocks whereas the large volume during the last part of the session hinges on a cohesive increase of the trading volume. That dissimilarity between the two parts of the trading session is stressed in periods of higher uproar in the market.

  12. Testing large volume water treatment and crude oil ...

    EPA Pesticide Factsheets

    Report EPA’s Homeland Security Research Program (HSRP) partnered with the Idaho National Laboratory (INL) to build the Water Security Test Bed (WSTB) at the INL test site outside of Idaho Falls, Idaho. The WSTB was built using an 8-inch (20 cm) diameter cement-mortar lined drinking water pipe that was previously taken out of service. The pipe was exhumed from the INL grounds and oriented in the shape of a small drinking water distribution system. Effluent from the pipe is captured in a lagoon. The WSTB can support drinking water distribution system research on a variety of drinking water treatment topics including biofilms, water quality, sensors, and homeland security related contaminants. Because the WSTB is constructed of real drinking water distribution system pipes, research can be conducted under conditions similar to those in a real drinking water system. In 2014, WSTB pipe was experimentally contaminated with Bacillus globigii spores, a non-pathogenic surrogate for the pathogenic B. anthracis, and then decontaminated using chlorine dioxide. In 2015, the WSTB was used to perform the following experiments: • Four mobile disinfection technologies were tested for their ability to disinfect large volumes of biologically contaminated “dirty” water from the WSTB. B. globigii spores acted as the biological contaminant. The four technologies evaluated included: (1) Hayward Saline C™ 6.0 Chlorination System, (2) Advanced Oxidation Process (A

  13. Transaction-based building controls framework, Volume 2: Platform descriptive model and requirements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Akyol, Bora A.; Haack, Jereme N.; Carpenter, Brandon J.

    Transaction-based Building Controls (TBC) offer a control systems platform that provides an agent execution environment that meets the growing requirements for security, resource utilization, and reliability. This report outlines the requirements for a platform to meet these needs and describes an illustrative/exemplary implementation.

  14. PKSOI Bulletin. Volume 1, Issue 2, February 2009

    DTIC Science & Technology

    2009-02-01

    pose a threat to U.S. foreign policy, security, or eco - nomic interests. In a complementary manner, the U.S. Army defines “stability operations...plenty of advice on domestic and international priorities; making stabi- lization programs more effective may not be a front burner item, but as a

  15. Pathfinder, Volume 7, Number 3, May/June 2009. A Historic Role

    DTIC Science & Technology

    2009-06-01

    Intelligence System (DMIGS) into service. These self- contained vehicles represent “NGA on wheels” and can travel to any and all National Special Security...never had any formal military training, but with Hogarth’s interces - sion, he received a commission as a second lieutenant interpreter in the British

  16. Homeland Security Interagency Support. (Joint Center for Lessons Learned Quarterly Bulletin. Volume 4, Issue 2, March 2002)

    DTIC Science & Technology

    2002-03-01

    sections consists of four units, the Domestic Terrorism Operations Unit, the WMD Operations Unit, the WMD Countermeasures Unit, and Special Events Management Unit...Countermeasures Unit Chief Special Events Management Unit Chief Domestic Terrorism/ Counterterrorism Section Chief International Terrorism Section Asstistant

  17. Aberrant Paralimbic Gray Matter in Incarcerated Male Adolescents with Psychopathic Traits

    ERIC Educational Resources Information Center

    Ermer, Elsa; Cope, Lora M.; Nyalakanti, Prashanth K.; Calhoun, Vince D.; Kiehl, Kent A.

    2013-01-01

    Objective: To investigate the relationship between brain structure and psychopathic traits in maximum-security incarcerated male adolescents, and to examine whether the associations between brain volumes in paralimbic and limbic regions and psychopathic traits observed in incarcerated adult men extend to an independent sample of incarcerated male…

  18. 78 FR 69501 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... volumes year-to-date. In order to ensure that revenue collected from the ORF, in combination with other... January 1, 2010 as this effective date has passed. The ORF is designed to recover a material portion of... the subject line. [[Page 69503

  19. Climate Change, Adaptation and Security in Central America and the Caribbean (CSL Issue Paper, Volume 3-11)

    DTIC Science & Technology

    2011-03-01

    associated disturbances, such as flooding, drought, wildfire, insects, and ocean acidification , and the global change drivers of land use change, pollution...coastlines, overfishing, water contamination due to pollution and destruction of coral reefs were also identified as concerns. A general attendee

  20. Naval War College Review. Volume 61, Number 1, Winter 2008

    DTIC Science & Technology

    2008-01-01

    available at www.rsis.edu.sg/publications/Perspective/ RSIS0182007.pdf. 4. See Catherine Zara Raymond, “The Malacca Straits and the Threat of Maritime...Security in the Asia-Pacific, ed. Joshua Ho and Catherine Zara Raymond (Singapore: World Scientific, 2005), p. 263. 39. Arthur Stein, “Coordination and

  1. BRITISH RESEARCH AND DEVELOPMENT REPORTS. VOLUME 2, NUMBER 4.

    DTIC Science & Technology

    make it known that the N.L.L. is anxious to collect these reports. They vary in nature from the reports, produced by a defence or industrial ...organisation, which are found to have no security or commercial limitations on their availability to reports produced in university laboratories which contain

  2. The DISAM Journal of International Security Assistance Management. Volume 26, Number 1, Fall 2003

    DTIC Science & Technology

    2003-01-01

    contribution to international peace and stability. Current Members of the Hall of Fame General Lojas Fodor, Commander, Hungarian Defense Forces and Chief of...Belize Bermuda Bolivia Brazil British Virgin Islands Cayman Islands Chile Colombia Costa Rica Cuba Dominica Dominican Republic Ecuador El

  3. EDJJ Notes. Volume 3, Number 2

    ERIC Educational Resources Information Center

    Gagnon, Joe, Ed.

    2004-01-01

    This issue of "EDJJ Notes" contains the following articles: (1) "In the News: The Policy of Prosecuting Juvenile Offenders as Adults: A Summary of Key Issues" (Jeffrey M. Poirier); (2) "Youth Transition from a Secure Care Facility" (Megan McGlynn); and (3) "Research to Practice: Self-Management" (Part II of…

  4. Model Offices: Flexible Options, Local Innovations.

    ERIC Educational Resources Information Center

    Perspective: Essays and Reviews of Issues in Employment Security and Employment and Training Programs, 1990

    1990-01-01

    This volume of an annual journal contains 17 articles that focus on model local offices of the employment security (ES) and training systems. The articles are arranged in three parts. Part I, on developing new initiatives, contains the following five articles: "A Public Employment Service for the 1990s" (Elizabeth Dole); "The…

  5. Addressing Employer Services.

    ERIC Educational Resources Information Center

    Perspective: Essays and Reviews of Issues in Employment Security and Employment and Training Programs, 1986

    1986-01-01

    This volume of an annual journal contains 21 articles focusing on the many services that state Employment Security (ES) agencies are providing to improve outreach to employers who pay for the programs through the dedicated revenues of the Federal Unemployment Tax Act and state benefit taxes and to improve their own staff ability to deliver…

  6. 41 CFR 101-25.101-2 - Supply through storage and issue.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 25-GENERAL 25.1... close inspection or testing is necessary to secure quality, or where repetitive inspection and test of... distribution system does not exist to assure availability at use point. (6) Where volume purchases are...

  7. 41 CFR 101-25.101-2 - Supply through storage and issue.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 25-GENERAL 25.1... close inspection or testing is necessary to secure quality, or where repetitive inspection and test of... distribution system does not exist to assure availability at use point. (6) Where volume purchases are...

  8. Development of Sub-Ischial Prosthetic Sockets with Vacuum-Assisted Suspension for Highly Active Persons with Transfemoral Amputations

    DTIC Science & Technology

    2013-10-01

    15. SUBJECT TERMS Transfemoral amputation, sub-ischial socket, prosthesis , vacuum-assisted suspension 16. SECURITY CLASSIFICATION OF: 17...vacuum for suspension of the prosthesis ...14 Task 6 Determine range of volumes to be evacuated from transfemoral sockets of highly active prosthesis users

  9. Integrated water resources management and infrastructure planning for water security in Southern Africa

    NASA Astrophysics Data System (ADS)

    Mapani, Benjamin; Magole, Lapologang; Makurira, Hodson; Meck, Maideyi; Mkandawire, Theresa; Mul, Marloes; Ngongondo, Cosmo

    2017-08-01

    This volume has brought together papers that are peer reviewed emanating from the WaterNet/WARFSA/GWP-SA 16th Symposium. The papers cover the following themes: Hydrology, Water and Environment, Water and Land, Water and Society, Water Supply and Sanitation and Water Resources Management.

  10. 17 CFR 18.05 - Maintenance of books and records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Maintenance of books and... REPORTS BY TRADERS § 18.05 Maintenance of books and records. (a) Every volume threshold account controller... keep books and records showing all details concerning all positions and transactions in the commodity...

  11. Space station needs, attributes and architectural options. Volume 1, attachment 1: Executive summary NASA

    NASA Technical Reports Server (NTRS)

    1983-01-01

    User alignment plan, physical and life sciences and applications, commercial requirements national security, space operations, user needs, foreign contacts, mission scenario analysis and architectural concepts, alternative systems concepts, mission operations architectural development, architectural analysis trades, evolution, configuration, and technology development are discussed.

  12. Secure data aggregation in wireless sensor networks using homomorphic encryption

    NASA Astrophysics Data System (ADS)

    Kumar, Manish; Verma, Shekhar; Lata, Kusum

    2015-04-01

    In a Wireless Sensor Network (WSN), aggregation exploits the correlation between spatially and temporally proximate sensor data to reduce the total data volume to be transmitted to the sink. Mobile agents (MAs) fit into this paradigm, and data can be aggregated and collected by an MA from different sensor nodes using context specific codes. The MA-based data collection suffers due to large size of a typical WSN and is prone to security problems. In this article, homomorphic encryption in a clustered WSN has been proposed for secure and efficient data collection using MAs. The nodes keep encrypted data that are given to an MA for data aggregation tasks. The MA performs all the data aggregation operations upon encrypted data as it migrates between nodes in a tree-like structure in which the nodes are leafs and the cluster head is the root of the tree. It returns and deposits the encrypted aggregated data to the cluster head after traversing through all the intra cluster nodes over a shortest path route. The homomorphic encryption and aggregation processing in encrypted domain makes the data collection process secure. Simulation results confirm the effectiveness of the proposed secure data aggregation mechanism. In addition to security, MA-based mechanism leads to lesser delay and bandwidth requirements.

  13. In-volume structuring of a bilayered polymer foil using direct laser interference patterning

    NASA Astrophysics Data System (ADS)

    Rößler, Florian; Günther, Katja; Lasagni, Andrés F.

    2018-05-01

    Periodic surface patterns can provide materials with special optical properties, which are usable in decorative or security applications. However, they can be sensitive to contact wear and thus their lifetime and functionality are limited. This study describes the use of direct laser interference patterning for structuring a multilayered polymer film at its interface creating periodic in-volume structures which are resistant to contact wear. The spatial period of the structures are varied in the range of 1.0 μm to 2.0 μm in order to produce decorative elements. The pattern formation at the interface is explained using cross sectional observations and a thermal simulation of the temperature evolution during the laser treatment at the interface. Both, the diffraction efficiency and direct transmission are characterized by light intensity measurements to describe the optical behavior of the produced periodic structures and a decorative application example is presented.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zenoni, Aldo; INFN Sezione di Pavia, Via Bassi 6, 27100 Pavia,

    Cosmic ray radiation is mostly composed, at sea level, by high energy muons, which are highly penetrating particles capable of crossing kilometers of rock. The ubiquitous and steady presence at the Earth's surface and the high penetration capability have motivated the use of cosmic ray radiation also in fields beyond particle physics, from geology, archaeology, speleology to industrial applications and homeland security. In particular, in recent years, the novel technique of muon tomography has been proposed, with the aim of performing non invasive inspection of large non accessible volumes, material atomic number Z and density discrimination, and three dimension imagemore » reconstruction of the inspected volume. In the present paper, after a short recall of the physical principles and mathematical formalism on which muon tomography is based, a number of examples of application of the novel technique in industry and homeland security issues is given. Moreover, a new application of cosmic rays detection techniques in the field of civil engineering is proposed. The aim is the monitoring of the stability of large structures, in particular the static monitoring of historical buildings, where conservation constraints are more severe and the time evolution of the deformation phenomena under study may be of the order of months or years. The new technique may be seen, in some way, as the reverse problem of muon tomography. As a significant case study, the monitoring of the wooden vaulted roof of the Palazzo della Loggia in the town of Brescia, in Italy, has been considered. The feasibility as well as the performances and limitations of a monitoring system based on cosmic ray tracking have been studied by Monte Carlo simulation and discussed in comparison with more traditional monitoring systems. (authors)« less

  15. Historical Building Stability Monitoring by Means of a Cosmic Ray Tracking System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zenoni, Aldo; INFN Sezione di Pavia, Via Bassi 6, 27100 Pavia

    Cosmic ray radiation is mostly composed, at sea level, by high energy muons, which are highly penetrating particles capable of crossing kilometers of rock. The ubiquitous and steady presence at the Earth's surface and the high penetration capability have motivated the use of cosmic ray radiation also in fields beyond particle physics, from geology, archaeology, speleology to industrial applications and homeland security. In particular, in recent years, the novel technique of muon tomography has been proposed, with the aim of performing non invasive inspection of large non accessible volumes, material atomic number Z and density discrimination, and three dimension imagemore » reconstruction of the inspected volume. In the present paper, after a short recall of the physical principles and mathematical formalism on which muon tomography is based, a number of examples of application of the novel technique in industry and homeland security issues is given. Moreover, a new application of cosmic rays detection techniques in the field of civil engineering is proposed. The aim is the monitoring of the stability of large structures, in particular the static monitoring of historical buildings, where conservation constraints are more severe and the time evolution of the deformation phenomena under study may be of the order of months or years. The new technique may be seen, in some way, as the reverse problem of muon tomography. As a significant case study, the monitoring of the wooden vaulted roof of the Palazzo della Loggia in the town of Brescia, in Italy, has been considered. The feasibility as well as the performances and limitations of a monitoring system based on cosmic ray tracking have been studied by Monte Carlo simulation and discussed in comparison with more traditional monitoring systems. (authors)« less

  16. Potential and attainable food production and food security in different regions

    PubMed Central

    Vries, F. W. T. Penning de; Rabbinge, R.; Groot, J. J. R.

    1997-01-01

    Growing prosperity in the South is accompanied by human diets that will claim more natural resources per capita. This reality, combined with growing populations, may raise the global demand for food crops two- to four-fold within two generations. Considering the large volume of natural resources and potential crop yields, it seems that this demand can be met smoothly. However, this is a fallacy for the following reasons. (i) Geographic regions differ widely in their potential food security: policy choices for agricultural use of natural resources are limited in Asia. For example, to ensure national self-sufficiency and food security, most of the suitable land (China) and nearly all of the surface water (India) are needed. Degradation restricts options further. (ii) The attainable level of agricultural production depends also on socio-economic conditions. Extensive poverty keeps the attainable food production too low to achieve food security, even when the yield gap is wide, as in Africa. (iii) Bio-energy, non-food crops and nature compete with food crops for natural resources. Global and regional food security are attainable, but only with major efforts. Strategies to achieve alternative aims will be discussed.

  17. Secure scalable disaster electronic medical record and tracking system.

    PubMed

    Demers, Gerard; Kahn, Christopher; Johansson, Per; Buono, Colleen; Chipara, Octav; Griswold, William; Chan, Theodore

    2013-10-01

    Electronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability. Report As the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures. A secure prehospital triage EMR improves documentation quality during disaster drills.

  18. Environmental Assessment for Proposed Construction and Lease of New Facilities for the Department of Energy, National Nuclear Security Administration, Office of Secure Transportation (Albuquerque Transportation and Technology Center), Albuquerque, New Mexico

    DTIC Science & Technology

    2006-07-01

    The ADT in 2025 is predicted to range from 38,000 to 40,000. Peak hour volumes are predicted to be 2,097 in the AM peak hour and 2,360 in the PM... peak hour. A variety of things could change this classification and improve traffic and the projected LOS by 2025. Several examples include the...vehicles, as well as numerous off- peak trips. Development proposals south at the adjacent Sandia Science and Technology Park and further south of the

  19. A Systems Analysis View of the Vietnam War 1965-1972. Volume 6. Republic of Vietnam Armed Forces (RVNAF)

    DTIC Science & Technology

    1975-02-18

    CA S " T .’ T !.I),_ SECURITY CLAS ’IFI’.0" ’. O3 THIS IA(.-! (W’,.en r).-e ,, ft, e-efd ""Rr.D INSTRUCTIONSREPORT DOCUMENTATION PAGE BEFORE COMPLETING...n•.• .-’ ~e.•b t .," •..-oa• -PORT :NUMBER•• V’efiat"p 󈧗 ea~ 1, RvINAF/ None .7- UTHOR(a.) ..... 8. CONTRACT OR GRANT NUMBER(&) Thomas C. rayfg...losses, population security, war costs and inflation and construction and port operations in South Vietnam.. SDD, FR17 1473 VDIT.ON OF, t OV 66 15 o.,o

  20. Global Maize Trade and Food Security: Implications from a Social Network Model

    PubMed Central

    Wu, Felicia; Guclu, Hasan

    2013-01-01

    In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability were decreased due to factors such as diversion to non-food uses, climatic factors, or plant diseases. Using data on imports and exports from the United Nations Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, while Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents US maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which US maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. PMID:23656551

  1. Global maize trade and food security: implications from a social network model.

    PubMed

    Wu, Felicia; Guclu, Hasan

    2013-12-01

    In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability was decreased due to factors such as diversion to nonfood uses, climatic factors, or plant diseases. Using data on imports and exports from the U.N. Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, whereas Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents U.S. maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which U.S. maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. © 2013 Society for Risk Analysis.

  2. Storage media for computers in radiology.

    PubMed

    Dandu, Ravi Varma

    2008-11-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits.

  3. South Atlantic Omega Validation. Volume 1. Summary, Analysis, Appendices A-E.

    DTIC Science & Technology

    1983-01-01

    JAN 63 UNLASSIFIED DTC O23-0 -C-4-23 F/O 17?3 L Wi 1j.1 Vll 11.2 MICOCPV ESLUIO TETC6 R NATINAL U~ i L 4.& STNAO .0 64:4 1ILE ()PY < SPAGE MILL RD. I ...NCO. I 10C .PALO M.O, CAUPOIUi CCII) 1ir,- SOUTH ATLANTIC OMEGA VALIDATION Final Report VOLUME I : SUMMARY, ANALYSIS, APPENDICES A-E January 1983...OPERATIONS DETAIL Washington, D.C. 20590 e.lS~ i ..lz... CEU I . ASSIFICATION OF THIS PAGE’ REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION lb

  4. 78 FR 3934 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-17

    ... Symbols, 2) increase the maker fee for complex orders that trade against Priority Customer complex orders... provides volume-based tiered rebates for Priority Customer complex orders in the Select Symbols (excluding... orders trade with non-Priority Customer orders in the complex order book. In the Select Symbols, the...

  5. Forest statistics for Southwest Arkansas counties

    Treesearch

    T. Richard Quick; Mary S. Hedlund

    1979-01-01

    These tables were derived from data obtained during a 1978 inventory of 20 counties comprising the Southwest Unit of Arkansas (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  6. Forest statistics for plateau Tennessee counties

    Treesearch

    Renewable Resources Evaluation Research Work Unit

    1982-01-01

    These tables were derived from data obtained during a 1980 inventory of 16 counties comprising the Plateau Unit of Tennessee (fib. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  7. Forest statistics for Northwest Louisiana Parishes

    Treesearch

    James F. Rosson; Daniel F. Bertelson

    1985-01-01

    These tables were derived from data obtained during a 1984 inventory of 13 parishes comprising the Northwest unit of Louisiana (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  8. Forest statistics for Southwest Louisiana parishes

    Treesearch

    James F. Rosson; Daniel F. Bertelson

    1985-01-01

    These tables were derived from data obtained during a 1984 inventory of 11 parishes comprising the Southwest Unit of Louisiana (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  9. CompGC: Efficient Offline/Online Sem i-honest Two-party Computation

    DTIC Science & Technology

    2016-04-22

    Rivest, and A. T. Sherman, Eds., Plenum Press, New York, USA, pp. 205–210. 13 [9] Goldreich, O. Foundations of Cryptography : Volume 2, Basic...low depth circuits. In FC 2013: 17th International Conference on Financial Cryptography and Data Security (Okinawa, Japan, Apr. 1–5, 2013), A.-R

  10. American Security and the International Energy Situation. Volume 3. The Petromoney Question

    DTIC Science & Technology

    1975-04-15

    energy business that will discourage and deprive the other countries (and entrepreneurs ) from development of their energy sources. As a resjlt...LJmnLiMjmrnrijs^. 1972-1985 107 972 97S 980 1985 Total Increse Annual Increase Per Capita: 972 1985 Tot. Increase 108 ~- ri 1 £ cjy t\\r\\ TABLE

  11. The Privacy and Security Policy Vacuum in Higher Education

    ERIC Educational Resources Information Center

    Cate, Fred H.

    2006-01-01

    Colleges and universities face heightened responsibilities. They possess a large volume and variety of sensitive information on a wide range of individuals, and demands for this information are growing. The students that are educated, housed, and/or employed by colleges and universities tend to be in a vulnerable age cohort: eighteen- to…

  12. Naval War College Review. Volume 63, Number 2, Spring 2010

    DTIC Science & Technology

    2010-01-01

    coast of Somalia is a result of the absence of gover - nance on land projected out to sea, the unremedied collapse of the Somali state will be an...vis its own internal security issues. With lucrative foreign investments, a tourism industry shaken by electoral violence two years ago, and almost

  13. The EDUTECH Report. The Education Technology Newsletter for Faculty and Administrators, 1992-1993.

    ERIC Educational Resources Information Center

    EDUTECH Report, 1993

    1993-01-01

    This newsletter examines education technology issues of concern to school faculty and administrators. Regular features in each issue include educational technology news, a book review, and a question and answer column. The cover articles during this volume year are: "Data Access Issues: Security Vs. Openness"; "Creation of an…

  14. 33 CFR 72.05-5 - Sales agencies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Sales agencies. 72.05-5 Section 72.05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION MARINE INFORMATION Light Lists § 72.05-5 Sales agencies. Each volume of the Light List is for sale...

  15. 33 CFR 72.05-5 - Sales agencies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Sales agencies. 72.05-5 Section 72.05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION MARINE INFORMATION Light Lists § 72.05-5 Sales agencies. Each volume of the Light List is for sale...

  16. 46 CFR 154.801 - Pressure relief systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Pressure relief systems. 154.801 Section 154.801 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Vent Systems § 154.801 Pressure relief systems. (a) Each cargo tank that has a volume of 20m3 (706 ft.3...

  17. Council of Ontario Universities Working Paper Series, 2001-2002.

    ERIC Educational Resources Information Center

    Forcese, Dennis; Oosthuizen, Patrick; Aubrey, Jocelyn B.

    2002-01-01

    Papers in this volume are the first working papers produced by the Council of Ontario Universities. Issue 1, "The Role and State of Ontario Graduate Education" by Dennis Forcese, advocates the reinforcement of graduate education in Ontario institutions to maintain the overall quality of the institutions and to secure the future. The paper outlines…

  18. 77 FR 48570 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Order Approving a Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-14

    ... Underlying Securities) of the NASDAQ Options Market rules.\\11\\ Additionally, the Target Component's and the...\\ Additionally, the Target Component's and the Benchmark Component's trading volume (in all markets in which the...-Regulatory Organizations; The NASDAQ Stock Market LLC; Order Approving a Proposed Rule Change Relating to the...

  19. Education under the Security State: Defending Public Schools

    ERIC Educational Resources Information Center

    Gabbard, David A., Ed.; Ross, E. Wayne, Ed.

    2008-01-01

    This highly acclaimed volume in the "Defending Public Schools" series is now available in paperback from Teachers College Press. It is a practical, necessary addition to the work of administrators, teachers, policymakers, and parents as they negotiate the difficult path of how to best teach and educate today's children and youth. This…

  20. 78 FR 57669 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... Change Proposing To Modify the Manner in Which It Calculates Volume, Liquidity and Quoting Thresholds... Arca'') filed with the Securities and Exchange Commission (the ``Commission'') the proposed rule change... organization. The Commission is publishing this notice to solicit comments on the proposed rule change from...

  1. The Militarization of the Collective Security Treaty Organization (CSL Issue Paper, Volume 6-09, July 2009)

    DTIC Science & Technology

    2009-07-01

    crises that more than likely are considered to threaten Uzbek vital interests in Central Asia. According to CSTO Secretary General Nikolai Bordyuzha, the...Central Asia. To Russian leaders, the planned deployment of theater missile defense interceptors to Poland and a radar system in the Czech Republic

  2. Semiannual Report to the Congress (April 1, 2000 - September 30, 2000) Volume 44

    DTIC Science & Technology

    2000-09-01

    remains concerned over the strength of traditional La Cosa Nostra crime groups in the labor union area as well as in union-related employee benefit plans...Department needs to assure that its major systems are secure from threats and loss of assets. The rapidly expanding use of Internet applications exposes...

  3. 77 FR 42052 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; NYSE Arca, Inc.; Order Instituting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... proposed MQP would be a program designed to promote market quality in certain securities listed on NASDAQ... contain the specific quantitative listing requirements for listing on the Global Select, Global Market... pilot (for comparative purposes), volume metrics, NBBO bid/ask spread differentials, LMM participation...

  4. 78 FR 66798 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Instituting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-06

    ... shares traded. Specifically, the Exchange states that, according to State Street Global Advisor, the... to the Exchange, for the three months ending on June 20, 2013, the average daily volume in SPY shares was 137 million, and the average value of shares traded was $22.1 billion. According to the Exchange...

  5. Forest statistics for Arkansas' Ouachita counties - 1988

    Treesearch

    F. Dee Hines

    1988-01-01

    Tabulated results were derived from data obtained during a recent inventory of 10 counties comprising the Ouachita Unit of Arkansas. Data on forest acreage and timber volume were secured by a three-step process. A forest-nonforest classification using aerial photographs was accomplished for points representing approximately 230 acres. These photo classifications were...

  6. Forest statistics for Southwest Mississippi counties - 1987

    Treesearch

    John F. Kelly; F. Dee Hines

    1987-01-01

    The tables in this report were derived from data obtained from an inventory of 11 counties comprising the Southwest Mississippi Unit (fig. I). The data on forest acreage and timber volume were secured by a three-step process. A forest-nonforest classification was accomplished on aerial photographs for points representing approximately 230 acres. These photo...

  7. Secure and Robust Overlay Content Distribution

    ERIC Educational Resources Information Center

    Kang, Hun Jeong

    2010-01-01

    With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alfred J. Karns

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit (No. NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume andmore » toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO.« less

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    NSTec Environmental Management

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during calendar year (CY) 2007. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit (number NEV HW0021), and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the U.S. Department of Energy, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process tomore » reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO.« less

  10. Errant corporations, diffuse responsibilities, and the environment: ethical issues in the Orica case study.

    PubMed

    Grace, Damian

    2009-04-01

    The papers in this volume deal with various aspects of the HCB legacy at the Orica plant at Botany. Whether explicitly or implicitly, they are concerned with questions of ethics; with the just distribution of burdens and benefits; with just processes for disposing of dangerous industrial waste; and with a just custodianship of the Botany environment. These ethical issues illustrate the difficulty of securing corporate accountability, and the elusiveness of responsibility within organisations. This paper reflects on some of the issues for ethics raised by the Orica case and their significance for corporate ethics.

  11. Aircraft Detection System Ensures Free-Space Laser Safety

    NASA Technical Reports Server (NTRS)

    Smithgall, Brian; Wilson, Keith E.

    2004-01-01

    As scientists continue to explore our solar system, there are increasing demands to return greater volumes of data from smaller deep-space probes. Accordingly, NASA is studying advanced strategies based on free-space laser transmissions, which offer secure, high-bandwidth communications using smaller subsystems of much lower power and mass than existing ones. These approaches, however, can pose a danger to pilots in the beam path because the lasers may illuminate aircraft and blind them. Researchers thus are investigating systems that will monitor the surrounding airspace for aircraft that could be affected. This paper presents current methods for safe free space laser propagation.

  12. Strategic Studies Quarterly: An Air Force-Sponsored Strategic Forum for Military, Government, and Academic Professionals. Volume 2, Number 1

    DTIC Science & Technology

    2008-03-01

    School of, la. \\ Ir . Blazejewski would like to thank Frank von Hippel and R. Scott Kemp for their comments on an earlier version of t is article. S< 5...example, - homas E Homer-Dixon, "Environmental Scarcities and Violent Conflict: Evidence from Cases," International Security 19, no. 1 (Summer 1994): 5...of AFRICOM. .3. Michael Clough, Free At Last? US Po/ity toward Africa and the h-nd oe’the Cold W" Ir (NcX York: Council on Foreign Relations Press

  13. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  14. SocialRAD: an infrastructure for a secure, cooperative, asynchronous teleradiology system.

    PubMed

    Figueiredo, João Filho Matos; Motta, Gustavo Henrique Matos Bezerra

    2013-01-01

    The popularity of teleradiology services has enabled a major advance in the provision of health services to areas with difficult geographical access. However, this potential has also brought with it a number of challenges: the large volume of data, characteristic of imaging tests, and security requirements designed to ensure confidentiality and integrity. Moreover, there is also a number of ethical questions involving the dominant model on the market, whereby this service is outsourced to private companies, and is not directly undertaken by professional radiologists. Therefore, the present paper proposes a cooperative model of teleradiology, where health professionals interact directly with the hospitals providing patient care. This has involved the integration of a wide range of technologies, such as the interconnection models Peer-to-Peer, Cloud Computing, Dynamic DNS, RESTful Web Services, as well as security and interoperability standards, with the aim of promoting a secure, collaborative asynchronous environment. The developed model is currently being used on an experimental basis, providing teleradiology support to cities in the north-eastern hinterland of Brazil, and is fulfilling all expectations.

  15. Euler-Lagrange Simulations of Shock Wave-Particle Cloud Interaction

    NASA Astrophysics Data System (ADS)

    Koneru, Rahul; Rollin, Bertrand; Ouellet, Frederick; Park, Chanyoung; Balachandar, S.

    2017-11-01

    Numerical experiments of shock interacting with an evolving and fixed cloud of particles are performed. In these simulations we use Eulerian-Lagrangian approach along with state-of-the-art point-particle force and heat transfer models. As validation, we use Sandia Multiphase Shock Tube experiments and particle-resolved simulations. The particle curtain upon interaction with the shock wave is expected to experience Kelvin-Helmholtz (KH) and Richtmyer-Meshkov (RM) instabilities. In the simulations evolving the particle cloud, the initial volume fraction profile matches with that of Sandia Multiphase Shock Tube experiments, and the shock Mach number is limited to M =1.66. Measurements of particle dispersion are made at different initial volume fractions. A detailed analysis of the influence of initial conditions on the evolution of the particle cloudis presented. The early time behavior of the models is studied in the fixed bed simulations at varying volume fractions and shock Mach numbers.The mean gas quantities are measured in the context of 1-way and 2-way coupled simulations. This work was supported by the U.S. Department of Energy, National Nuclear Security Administration, Advanced Simulation and Computing Program, as a Cooperative Agreement under the Predictive Science Academic Alliance Program, Contract No. DE-NA0002378.

  16. What Happened, and Why: Toward an Understanding of Human Error Based on Automated Analyses of Incident Reports. Volume 2

    NASA Technical Reports Server (NTRS)

    Ferryman, Thomas A.; Posse, Christian; Rosenthal, Loren J.; Srivastava, Ashok N.; Statler, Irving C.

    2006-01-01

    The objective of the Aviation System Monitoring and Modeling project of NASA's Aviation Safety and Security Program was to develop technologies to enable proactive management of safety risk, which entails identifying the precursor events and conditions that foreshadow most accidents. Information about what happened can be extracted from quantitative data sources, but the experiential account of the incident reporter is the best available source of information about why an incident happened. In Volume I, the concept of the Scenario was introduced as a pragmatic guide for identifying similarities of what happened based on the objective parameters that define the Context and the Outcome of a Scenario. In this Volume II, that study continues into the analyses of the free narratives to gain understanding as to why the incident occurred from the reporter s perspective. While this is just the first experiment, the results of our approach are encouraging and indicate that it will be possible to design an automated analysis process guided by the structure of the Scenario that can achieve the level of consistency and reliability of human analysis of narrative reports.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ratel, K.; Lee, R; Remien, J

    Brookhaven National Laboratory (BNL) prepares an annual Site Environmental Report (SER) in accordance with DOE Order 231.1A, Environment, Safety and Health Reporting of the U.S. Department of Energy. The report is written to inform the public, regulators, employees, and other stakeholders of the Laboratory's environmental performance during the calendar year in review. Volume I of the SER summarizes environmental data; environmental management performance; compliance with applicable DOE, federal, state, and local regulations; and performance in restoration and surveillance monitoring programs. BNL has prepared annual SERs since 1971 and has documented nearly all of its environmental history since the Laboratory's inceptionmore » in 1947. Volume II of the SER, the Groundwater Status Report, also is prepared annually to report on the status of and evaluate the performance of groundwater treatment systems at the Laboratory. Volume II includes detailed technical summaries of groundwater data and its interpretation, and is intended for internal BNL users, regulators, and other technically oriented stakeholders. A brief summary of the information contained in Volume II is included in Chapter 7, Groundwater Protection, of this volume. Both reports are available in print and as downloadable files on the BNL web page at http://www.bnl.gov/ewms/ser/. An electronic version on compact disc is distributed with each printed report. In addition, a summary of Volume I is prepared each year to provide a general overview of the report, and is distributed with a compact disc containing the full report. BNL is operated and managed for DOE's Office of Science by Brookhaven Science Associates (BSA), a partnership formed by Stony Brook University and Battelle Memorial Institute. For more than 60 years, the Laboratory has played a lead role in the DOE Science and Technology mission and continues to contribute to the DOE missions in energy resources, environmental quality, and national security. BNL manages its world-class scientific research with particular sensitivity to environmental issues and community concerns. The Laboratory's motto, 'Exploring Life's Mysteries...Protecting its Future,' and its Environmental, Safety, Security and Health Policy reflect the commitment of BNL's management to fully integrate environmental stewardship into all facets of its mission and operations.« less

  18. Asian Security Challenges-Planning in the Face of Strategic Uncertainties. Volume 2. Appendices

    DTIC Science & Technology

    1994-10-01

    suited to the company’s own strengths." In addition, the authors argue, U.S. firms should emulate the Japanese and South Koreans by setting up global ... marketing franchises and sharing core competencies where it makes sense to do so. Finally, they take a swipe at traditional strategic planning, criticizing

  19. 75 FR 54411 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-07

    ... and add a requirement that the SLP provide average daily volume (``ADV'') of more than 10 million shares for all assigned SLP securities on a monthly basis. In connection with this proposed change, the Exchange also proposes to revise the non-regulatory penalties associated with the SLP program to align them...

  20. 30 CFR 250.614 - Well-control fluids, equipment, and operations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... well is shut in and secured. (b) When coming out of the hole with drill pipe or a workover string, the... string and drill collars that may be pulled prior to filling the hole and the equivalent well-control... fluid volumes when filling the hole on trips; and (3) A recording mud-pit-level indicator to determine...

  1. Information Processing Techniques Program. Volume I. Packet Speech Systems Technology

    DTIC Science & Technology

    1980-09-30

    Itindsign has litt-rn vt-tntit-r aliti sill dI- ditiibuted trrni cparat- tintr aisa ithnnin ITtc-i A. Packet Vttice Terminal As Iprt- iouisik rtrtteti tin...September 1980. FO1M 1473 EDITION OF I NOV 65 IS OBSOLETEDD I JAN 73 UNCLA.SSI F[IF ) SECURITY CLASSIFICATION OF THIS PAGE (Ibmn Data fntew-d)

  2. Forest statistics for West-Central Tennessee counties

    Treesearch

    Renewable Resource Evaluation Research Work Unit

    1982-01-01

    These tables were derived from data obtained during a 1980 inventory of 11 counties comprising the West Central Unit of Tennessee (fig. 1). The data on forest acreage and timber volume were secured by systematic sampling method involving a forest-non-forest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  3. Forest statistics for Southwest-South Alabama counties

    Treesearch

    Forest Inventory and Analysis Research Work Unit

    1983-01-01

    These tables were derived from data obtained during a 1982 inventory of 21 counties comprising the Southeast Unit of Alabama (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method of involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  4. Forest statistics for North-Central Alabama counties

    Treesearch

    Forest Inventory and Analysis Research Work Unit

    1983-01-01

    These tables were derived from data obtained during a 1982 inventory of 15 counties comprising the North Central Unit of Alabama (fig. 1). The data on forest acreage and timber volume were secured by systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  5. Forest statistics for West Tennessee counties

    Treesearch

    No Author Named

    1982-01-01

    These tables were derived from data obtained during a 1980 inventory of 18 counties comprising the West Unit of Tennessee (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample locations...

  6. Forest statistics for North Alabama counties

    Treesearch

    Forest Inventory and Analysis Work Unit

    1983-01-01

    These tables were derived from data obtained during a 1982 inventory of 10 counties comprising the North Unit of Alabama (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample locations...

  7. Forest statistics for Central Tennessee counties

    Treesearch

    Renewable Resources Evaluation Research Work Unit

    1981-01-01

    These tables were derived from data obtained during a 1980 inventory of 23 counties comprising the Central Unit of Tennessee (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-non-forest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  8. Forest statistics for Southwest Alabama counties

    Treesearch

    SO Southern Experiment Sta

    1983-01-01

    These tables were derived from data obtained during a 1982 inventory of 21 counties comprising the Southeast Unit of Alabama (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method of involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  9. Forest statistics for West Central Alabama counties

    Treesearch

    SO Southern Experiment Sta

    1983-01-01

    These tables were derived from data obtained during a 1982 inventory of 21 counties comprising the Southeast Unit of Alabama (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method of involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...

  10. Upward Mobility Programs in the Service Sector for Disadvantaged and Dislocated Workers. Volume I: Final Report.

    ERIC Educational Resources Information Center

    Tao, Fumiyo; And Others

    Upward mobility programs in the service sector for low-skilled, economically disadvantaged, and dislocated or displaced workers promote employment security, career development, and productivity. Two basic types of upward mobility programs are basic and job-specific skills training. Although 60-80 percent of all employer-sponsored formal training…

  11. World Oil Transit Chokepoints

    EIA Publications

    2014-01-01

    The U.S. Energy Information Administration (EIA) defines world oil chokepoints as narrow channels along widely-used global sea routes, some so narrow that restrictions are placed on the size of the vessel that can navigate through them. Chokepoints are a critical part of global energy security because of the high volume of petroleum and other liquids transported through their narrow straits.

  12. CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009

    DTIC Science & Technology

    2009-12-01

    an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210

  13. Biomarkers of Exposure to Toxic Substances. Volume 1. Global Experimental Design: Biomarker Discovery for Early Prediction of Organ-Selective Toxicity

    DTIC Science & Technology

    2009-05-30

    in the polyphenols chlorogenic acid , quinic acid and caffeic acid ). It appears in variable concentrations in urine and at much lower concentrations...liver, kidney, toxicity, gene, expression, nephrotoxin, D-serine, hippuric acid , Puromycin, Amphotericin B 16. SECURITY CLASSIFICATION OF: 17...6 1.4.4. Hippuric Acid

  14. Center for Strategic Leadership Issue Paper, August 2007, Volume 8-07. Military Education Workshop Addresses Threats to Stability and Security.

    DTIC Science & Technology

    2007-08-01

    upcoming National Intelligence Estimate (NIE), the National Inteligence Council (NIC) has reached out to a broad group of U.S. government organizations and...USAF (Retired) Major Shannon Beebe U.S. ARMY WAR COLLEGE Center for Strategic Leadership 650 Wright Avenue Carlisle, PA 17103-5049 OFFICIAL BUSINESS

  15. Space station needs, attributes and architectural options. Volume 3, attachment 1, task 1: Mission requirements

    NASA Technical Reports Server (NTRS)

    1983-01-01

    The development and systems architectural requirements of the space station program are described. The system design is determined by user requirements. Investigated topics include physical and life science experiments, commercial utilization, U.S. national security, and remote space operations. The economic impact of the space station program is analyzed.

  16. Covered Bridge Security Manual

    Treesearch

    Brett Phares; Terry Wipf; Ryan Sievers; Travis Hosteng

    2013-01-01

    The design, construction, and use of covered timber bridges is all but a lost art in these days of pre-stressed concrete, high-performance steel, and the significant growth both in the volume and size of vehicles. Furthermore, many of the existing covered timber bridges are preserved only because of their status on the National Registry of Historic Places or the...

  17. 76 FR 69774 - Self-Regulatory Organizations; NYSE Amex LLC; Notice of Filing of Rule Change Proposing a One...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-09

    ... matters concerning its previously assigned RLP securities. RLP Requirements Under proposed NYSE Amex... determinations by the RLP Panel would constitute final action by the Exchange on the matter at issue. Retail...) (noting that dark pools and internalizing broker- dealers executed approximately 25.4% of share volume in...

  18. Cultural Resources Evaluation of the Vandenberg Air Force Base Security Clear Zones, Santa Barbara County, California. Volume I.

    DTIC Science & Technology

    1981-07-01

    1971:9) describes this type of foothill area as a chaparral ecozone or coastal sage scrub community. Small stands of Mock Heather (Haploppaus...Vegetation in this area is typical of the chaparral ecozone . 5 Vegetation Ground Cover: Interior--completely paved with asphalt. Exterior--twenty five percent

  19. Reemployment Assistance for Engineers, Scientists, and Technicians Unemployed Because of Aerospace and Defense Cutbacks. Report to Congress.

    ERIC Educational Resources Information Center

    Comptroller General of the U.S., Washington, DC.

    As a report on the Department of Labor's Technology Mobilization and Reemployment (TMR) program, findings and conclusions from an evaluative review are presented in this volume. Information is obtained from state eployment security offices in Los Angeles and Van Nuys, California; Seattle; Denver; and New Orleans. The program accomplishments are…

  20. Forest statistics for Mississippi counties - 1987

    Treesearch

    Bryan L. Donner; F. Dee Hines

    1987-01-01

    The tables and figures in this report were derived from data obtained through a multi-resource inventory of 82 counties and five survey regions comprising the state of Mississippi (fig. 1). The data on forest acreage and timber volume were secured by a three-step process. First, a forest-non-forest classification was accomplished on aerial photographs for points...

  1. Arizonans on Edge...So Why Not Involved? AZ Views. Volume 2, Issue 1

    ERIC Educational Resources Information Center

    Morrison Institute for Public Policy, Arizona State University, 2009

    2009-01-01

    What a difference a year makes. In June 2008, "AZ Views" reported that "Arizonans have a strong sense of job security, despite the national economic slump and the state's budget crisis." That is no longer true, as this edition of "AZ Views" shows, and Arizona's economic situation arguably is the best example of the…

  2. 77 FR 6608 - Self-Regulatory Organizations; BATS Exchange, Inc.; Order Granting Approval of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-08

    ... daily volume (``CADV'') \\4\\ of equal to or greater than 2 million shares for two consecutive calendar... CLP quoting requirement in each assigned security on a daily and monthly basis; (5) a disciplinary... member's customer, research and investment banking business. \\5\\ See Exchange Rules 11.5-11.8. To become...

  3. Space station needs, attributes and architectural options. Volume 3, task 1: Mission requirements

    NASA Technical Reports Server (NTRS)

    1983-01-01

    The mission requirements of the space station program are investigated. Mission parameters are divided into user support from private industry, scientific experimentation, U.S. national security, and space operations away from the space station. These categories define the design and use of the space station. An analysis of cost estimates is included.

  4. 77 FR 47899 - Self-Regulatory Organizations; EDGX Exchange, Inc.; Notice of Filing of Proposed Rule Change to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-10

    ... national securities exchanges and alternative market centers for intraday equities order flow has resulted... infra at footnotes 14 and 18). For most exchanges, however, the ``cost of match'' for intraday matches... daily volume of ``on close'' orders is 14 million shares or more. Relative to intraday matches or...

  5. 75 FR 11953 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule Change by the Chicago Stock... Volume for Billing Purposes March 5, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of... (the ``Commission'') the proposed rule change as described in Items I, II and III below, which Items...

  6. Operations Security in an Age of Radical Transparency (Center for Strategic Leadership Issue Paper, Volume 2-09, January 2009)

    DTIC Science & Technology

    2009-01-01

    communicate today. This includes the use of social networking sites such as MySpace and Facebook among others, as well as active participation in...it should be viewed with an eye toward the impact on strategic communication. Blogs and social networking sites provide a forum to tell the

  7. Challenges in Accommodating Volume Change of Si Anodes for Li-Ion Batteries

    PubMed Central

    Ko, Minseong; Chae, Sujong; Cho, Jaephil

    2015-01-01

    Si has been considered as a promising alternative anode for next-generation Li-ion batteries (LIBs) because of its high theoretical energy density, relatively low working potential, and abundance in nature. However, Si anodes exhibit rapid capacity decay and an increase in the internal resistance, which are caused by the large volume changes upon Li insertion and extraction. This unfortunately limits their practical applications. Therefore, managing the total volume change remains a critical challenge for effectively alleviating the mechanical fractures and instability of solid-electrolyte-interphase products. In this regard, we review the recent progress in volume-change-accommodating Si electrodes and investigate their ingenious structures with significant improvements in the battery performance, including size-controlled materials, patterned thin films, porous structures, shape-preserving shell designs, and graphene composites. These representative approaches potentially overcome the large morphologic changes in the volume of Si anodes by securing the strain relaxation and structural integrity in the entire electrode. Finally, we propose perspectives and future challenges to realize the practical application of Si anodes in LIB systems. PMID:27525208

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dondero, Rachel Elizabeth

    The increased use of Field Programmable Gate Arrays (FPGAs) in critical systems brings new challenges in securing the diversely programmable fabric from cyber-attacks. FPGAs are an inexpensive, efficient, and flexible alternative to Application Specific Integrated Circuits (ASICs), which are becoming increasingly expensive and impractical for low volume manufacturing as technology nodes continue to shrink. Unfortunately, FPGAs are not designed for high security applications, and their high-flexibility lends itself to low security and vulnerability to malicious attacks. Similar to securing an ASIC’s functionality, FPGA programmers can exploit the inherent randomness introduced into hardware structures during fabrication for security applications. Physically Unclonablemore » Functions (PUFs) are one such solution that uses the die specific variability in hardware fabrication for both secret key generation and verification. PUFs strive to be random, unique, and reliable. Throughout recent years many PUF structures have been presented to try and maximize these three design constraints, reliability being the most difficult of the three to achieve. This thesis presents a new PUF structure that combines two elementary PUF concepts (a bi-stable SRAM PUF and a delay-based arbiter PUF) to create a PUF with increased reliability, while maintaining both random and unique qualities. Properties of the new PUF will be discussed as well as the various design modifications that can be made to tweak the desired performance and overhead.« less

  9. Implications of Water Budget Deficits on Socio-Economic Stability and Food Security in the Arabian Peninsula and in North Africa

    NASA Astrophysics Data System (ADS)

    Mazzoni, A.; Heggy, E.; Scabbia, G.

    2017-12-01

    Water scarcity in the Arabian Peninsula and North Africa is accentuated by forecasted climatic variability, decreasing precipitation volumes and projected population growth, urbanization and economic development, increasing water demand. These factors impose uncertainties on food security and socio-economic stability in the region. We develop a water-budget model combining hydrologic, climatic and economic data to quantify water deficit volumes and groundwater depletion rates for the main aquifer systems in the area, taking into account three different climatic scenarios, and calculated from the precipitation forecast elaborated in the CSIRO, ECHAM4 and HADCM3 global circulation models from 2016 to 2050 over 1-year intervals. Water demand comprises water requirements for each economic sector, derived from data such as population, GDP, cropland cover and electricity production, and is based upon the five different SSPs. Conventional and non-conventional water resource supply data are retrieved from FAO Aquastat and institutional databases. Our results suggest that in the next 35 years, in North Africa, only Egypt and Libya will exhibit severe water deficits with respectively 44% and 89.7% of their current water budgets by 2050 (SSP2-AVG climatic scenario), while all the countries in the Arabian Peninsula will be subjected to water stress; the majority of small-size aquifers in the Arabian Peninsula will reach full depletion by 2050. In North Africa, the fossil aquifers' volume loss will be 1-15% by 2050, and total depletion within 200-300 years. Our study suggests that (1) anthropogenic drivers on water resources are harsher than projected climatic variability; (2) the estimated water deficit will induce substantial rise in domestic food production's costs, causing higher dependency on food imports; and (3) projected water deficits will most strongly impact the nations with the lowest GDPP, namely Egypt, Yemen and Libya.

  10. Secure corridor for infraacetabular screws in acetabular fracture fixation-a 3-D radiomorphometric analysis of 124 pelvic CT datasets.

    PubMed

    Arlt, Stephan; Noser, Hansrudi; Wienke, Andreas; Radetzki, Florian; Hofmann, Gunther Olaf; Mendel, Thomas

    2018-05-21

    Acetabular fracture surgery is directed toward anatomical reduction and stable fixation to allow for the early functional rehabilitation of an injured hip joint. Recent biomechanical investigations have shown the superiority of using an additional screw in the infraacetabular (IA) region, thereby transfixing the separated columns to strengthen the construct by closing the periacetabular fixation frame. However, the inter-individual existence and variance concerning secure IA screw corridors are poorly understood. This computer-aided 3-D radiomorphometric study examined 124 CT Digital Imaging and Communications in Medicine (DICOM) datasets of intact human pelves (248 acetabula) to visualize the spatial IA corridors as the sum of all intraosseous screw positions. DICOM files were pre-processed using the Amira® 4.2 visualization software. Final corridor computation was accomplished using a custom-made software algorithm. The volumetric measurement data of each corridor were calculated for further statistical analyses. Correlations between the volumetric values and the biometric data were investigated. Furthermore, the influence of hip dysplasia on the IA corridor configuration was analyzed. The IA corridors consistently showed a double-cone shape with the isthmus located at the acetabular fovea. In 97% of male and 91% of female acetabula, a corridor for a 3.5-mm screw could be found. The number of IA corridors was significantly lower in females for screw diameters ≥ 4.5 mm. The mean 3.5-mm screw corridor volume was 16 cm 3 in males and 9.2 cm 3 in female pelves. Corridor volumes were significantly positively correlated with body height and weight and with the diameter of Köhler's teardrop on standard AP pelvic X-rays. No correlation was observed between hip dysplasia and the IA corridor extent. IA corridors are consistently smaller in females. However, 3.5-mm small fragment screws may still be used as the standard implant because sex-specific differences are significant only with screw diameters ≥ 4.5 mm. Congenital hip dysplasia does not affect secure IA screw insertion. The described method allows 3-D shape analyses with highly reliable results. The visualization of secure IA corridors may support the spatial awareness of surgeons. Volumetric data allow the reliable assessment of individual IA corridors using standard AP X-ray views, which aids preoperative planning.

  11. Regenerate Healing Outcomes in Unilateral Mandibular Distraction Osteogenesis Using Quantitative Histomorphometry

    PubMed Central

    Schwarz, Daniel A.; Arman, Krikor G.; Kakwan, Mehreen S.; Jamali, Ameen M.; Elmeligy, Ayman A.; Buchman, Steven R.

    2015-01-01

    Background The authors’ goal was to ascertain regenerate bone-healing metrics using quantitative histomorphometry at a single consolidation period. Methods Rats underwent either mandibular distraction osteogenesis (n=7) or partially reduced fractures (n=7); their contralateral mandibles were used as controls (n=11). External fixators were secured and unilateral osteotomies performed, followed by either mandibular distraction osteogenesis (4 days’ latency, then 0.3 mm every 12 hours for 8 days; 5.1 mm) or partially reduced fractures (fixed immediately postoperatively; 2.1 mm); both groups underwent 4 weeks of consolidation. After tissue processing, bone volume/tissue volume ratio, osteoid volume/tissue volume ratio, and osteocyte count per high-power field were analyzed by means of quantitative histomorphometry. Results Contralateral mandibles had statistically greater bone volume/tissue volume ratio and osteocyte count per high-power field compared with both mandibular distraction osteogenesis and partially reduced fractures by almost 50 percent, whereas osteoid volume/tissue volume ratio was statistically greater in both mandibular distraction osteogenesis specimens and partially reduced fractures compared with contralateral mandibles. No statistical difference in bone volume/tissue volume ratio, osteoid volume/tissue volume ratio, or osteocyte count per high-power field was found between mandibular distraction osteogenesis specimens and partially reduced fractures. Conclusions The authors’ findings demonstrate significantly decreased bone quantity and maturity in mandibular distraction osteogenesis specimens and partially reduced fractures compared with contralateral mandibles using the clinically analogous protocols. If these results are extrapolated clinically, treatment strategies may require modification to ensure reliable, predictable, and improved outcomes. PMID:20463629

  12. U.S. Navy Marine Climatic Atlas of the World. Volume 5. South Pacific Ocean. (Revised 1979)

    DTIC Science & Technology

    1979-10-01

    Hayward et al . (1976) and Nemiroff (1977). CLOUD COVER Even with the increased data base, the quality and HUMIDITY quantity of low cloud data is quite...u s ’ MA/,E-CIA O.F THE W VOLUM SoT PAII REIE 09( PLS HE BYTH C01 NAVAL OCAOGAH 4 V A A’ DTI RVP 1979 A SECUR, I v* et -A44jjC ATIO . 11 ( ,1: (111...climatology are Among these are: the difficulty in taking observations of made possible by the maintenance of weather records at m og iches e et s from n

  13. Storage media for computers in radiology

    PubMed Central

    Dandu, Ravi Varma

    2008-01-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits. PMID:19774182

  14. All-in-one assembly based on 3D-intertangled and cross-jointed architectures of Si/Cu 1D-nanowires for lithium ion batteries

    PubMed Central

    Hwang, Chihyun; Kim, Tae-Hee; Cho, Yoon-Gyo; Kim, Jieun; Song, Hyun-Kon

    2015-01-01

    All-in-one assemblies of separator, electrode and current collector (SECA) for lithium ion batteries are presented by using 1D nanowires of Si and Cu (nwSi and nwCu). Even without binders, integrity of SECA is secured via structural joints based on ductility of Cu as well as entanglement of nwSi and nwCu. By controlling the ratio of the nanowires, the number of contact points and voids accommodating volume expansion of Si active material are tunable. Zero volume expansion and high energy density are simultaneously achievable by the architecture. PMID:25720334

  15. Increasing the information acquisition volume in iris recognition systems.

    PubMed

    Barwick, D Shane

    2008-09-10

    A significant hurdle for the widespread adoption of iris recognition in security applications is that the typically small imaging volume for eye placement results in systems that are not user friendly. Separable cubic phase plates at the lens pupil have been shown to ameliorate this disadvantage by increasing the depth of field. However, these phase masks have limitations on how efficiently they can capture the information-bearing spatial frequencies in iris images. The performance gains in information acquisition that can be achieved by more general, nonseparable phase masks is demonstrated. A detailed design method is presented, and simulations using representative designs allow for performance comparisons.

  16. Volatilities, Traded Volumes, and Price Increments in Derivative Securities

    NASA Astrophysics Data System (ADS)

    Kim, Kyungsik; Lim, Gyuchang; Kim, Soo Yong; Scalas, Enrico

    2007-03-01

    We apply the detrended fluctuation analysis (DFA) to the statistics of the Korean treasury bond (KTB) futures from which the logarithmic increments, volatilities, and traded volumes are estimated over a specific time lag. For our case, the logarithmic increment of futures prices has no long-memory property, while the volatility and the traded volume exhibit the existence of long-memory property. To analyze and calculate whether the volatility clustering is due to the inherent higher-order correlation not detected by applying directly the DFA to logarithmic increments of the KTB futures, it is of importance to shuffle the original tick data of futures prices and to generate the geometric Brownian random walk with the same mean and standard deviation. It is really shown from comparing the three tick data that the higher-order correlation inherent in logarithmic increments makes the volatility clustering. Particularly, the result of the DFA on volatilities and traded volumes may be supported the hypothesis of price changes.

  17. Research on the information security system in electrical gis system in mobile application

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua

    2017-05-01

    With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.

  18. Intraday Seasonalities and Nonstationarity of Trading Volume in Financial Markets: Individual and Cross-Sectional Features

    PubMed Central

    Graczyk, Michelle B.; Duarte Queirós, Sílvio M.

    2016-01-01

    We study the intraday behaviour of the statistical moments of the trading volume of the blue chip equities that composed the Dow Jones Industrial Average index between 2003 and 2014. By splitting that time interval into semesters, we provide a quantitative account of the nonstationary nature of the intraday statistical properties as well. Explicitly, we prove the well-known ∪-shape exhibited by the average trading volume—as well as the volatility of the price fluctuations—experienced a significant change from 2008 (the year of the “subprime” financial crisis) onwards. That has resulted in a faster relaxation after the market opening and relates to a consistent decrease in the convexity of the average trading volume intraday profile. Simultaneously, the last part of the session has become steeper as well, a modification that is likely to have been triggered by the new short-selling rules that were introduced in 2007 by the Securities and Exchange Commission. The combination of both results reveals that the ∪ has been turning into a ⊔. Additionally, the analysis of higher-order cumulants—namely the skewness and the kurtosis—shows that the morning and the afternoon parts of the trading session are each clearly associated with different statistical features and hence dynamical rules. Concretely, we claim that the large initial trading volume is due to wayward stocks whereas the large volume during the last part of the session hinges on a cohesive increase of the trading volume. That dissimilarity between the two parts of the trading session is stressed in periods of higher uproar in the market. PMID:27812141

  19. Statistical properties of share volume traded in financial markets

    NASA Astrophysics Data System (ADS)

    Gopikrishnan, Parameswaran; Plerou, Vasiliki; Gabaix, Xavier; Stanley, H. Eugene

    2000-10-01

    We quantitatively investigate the ideas behind the often-expressed adage ``it takes volume to move stock prices,'' and study the statistical properties of the number of shares traded QΔt for a given stock in a fixed time interval Δt. We analyze transaction data for the largest 1000 stocks for the two-year period 1994-95, using a database that records every transaction for all securities in three major US stock markets. We find that the distribution P(QΔt) displays a power-law decay, and that the time correlations in QΔt display long-range persistence. Further, we investigate the relation between QΔt and the number of transactions NΔt in a time interval Δt, and find that the long-range correlations in QΔt are largely due to those of NΔt. Our results are consistent with the interpretation that the large equal-time correlation previously found between QΔt and the absolute value of price change \\|GΔt\\| (related to volatility) are largely due to NΔt.

  20. West European and East Asian perspectives on defense, deterrence, and strategy. Volume 6. South Korean perspectives on defense, deterrence, and strategy. Technical report, 1 December 1981-30 November 1982

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pfaltzgraff, R.L.; Dougherty, J.E.; Davis, J.K.

    1984-04-11

    This study addresses the international security perspectives of the Republic of Korea (South Korea). Particular emphasis is placed on the way in which American, Soviet, Chinese and Japanese interests intersect on the Korean Peninsula and on their impact upon the military balance between North and South Korea. A major portion of this analysis is devoted as well to an examination of inter-Korean relations, spotlighting the varying security implications of the continued partition, as opposed to the eventual reunification of the two Koreas. The importance to South Korea of the Seoul-Washington-Tokyo relationship is discussed, as well as the effect of themore » Sino-Soviet dispute on South Korean defense and foreign policies. In order to clarify further the strategic perspectives of key decision makers in Seoul, the study reviewed and assessed South Korean views on such controversial issues as the expansion of Japan's self-defense forces, the withdrawal of the U.S. ground troops from the Korean peninsula, Sino-Soviet moves toward rapprochement, and the proliferation of nuclear weapons in Northeast Asia.« less

  1. Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ

    DTIC Science & Technology

    2015-08-06

    SHA - 256 [98], we assume that H is a random oracle to prove Theorem 2. Moreover, we assume the sigma protocols used by Helios 4.0 satisfy the...Aspects in Security and Trust, volume 5491 of LNCS, pages 242– 256 . Springer, 2008. [68] Martin Hirt. Receipt-Free K-out-of-L Voting Based on ElGamal

  2. Collective Bargaining: The Faculty Viewpoint; and What Collective Bargaining Means to University Administrators. IRTHE Volume 6, Number 1.

    ERIC Educational Resources Information Center

    Riechmann, Sheryl; And Others

    What causes faculty to vote for collective bargaining? Undoubtedly, there is no single answer. A common factor reported by many institutions is some faculty dissatisfaction with compensation, course loads, governance systems, and job security. Another answer, proposed by Ladd and Lipset, is that the rapid growth of collective bargaining in higher…

  3. 77 FR 1769 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... liquidity on the Exchange. Currently, under a tiered structure of credits, a SLP that meets the 10% average... 50529 (August 15, 2011) (SR-NYSE-2011-39). $0.0020 credit per share per transaction if the SLP adds... all assigned SLP securities; and \\4\\ Consolidated ADV is equal to the volume reported by all exchanges...

  4. Final Tactical Decision Aid (FTDA) for Infrared (8-12 Micrometers) Systems - Manual Version. Volume II. Appendix A. Atmospheric Transmission Tables,

    DTIC Science & Technology

    1982-09-15

    OBSOLETE UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Date Efntee -- - -- I I New SSD-T-8-6061-007 (1I)-82 TABLE OF CONTENTS 1. A Brief...possible transformation of airmasses with a continntal origin so that their aerosol asames the extinction properties of a maritime aerosol. Figure A-IB

  5. PNNLs Data Intensive Computing research battles Homeland Security threats

    ScienceCinema

    David Thurman; Joe Kielman; Katherine Wolf; David Atkinson

    2018-05-11

    The Pacific Northwest National Laboratorys (PNNL's) approach to data intensive computing (DIC) is focused on three key research areas: hybrid hardware architecture, software architectures, and analytic algorithms. Advancements in these areas will help to address, and solve, DIC issues associated with capturing, managing, analyzing and understanding, in near real time, data at volumes and rates that push the frontiers of current technologies.

  6. 17 CFR 16.01 - Publication of market data on futures, swaps and options thereon: trading volume, open contracts...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Publication of market data on... MARKETS AND SWAP EXECUTION FACILITIES § 16.01 Publication of market data on futures, swaps and options.... (1) Each reporting market, as defined in part 15 of this chapter, must separately record for each...

  7. 17 CFR 16.01 - Publication of market data on futures, swaps and options thereon: trading volume, open contracts...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Publication of market data on... MARKETS AND SWAP EXECUTION FACILITIES § 16.01 Publication of market data on futures, swaps and options.... (1) Each reporting market, as defined in part 15 of this chapter, must separately record for each...

  8. Social Security Disability Programs: An International Perspective, Austria, Canada, Finland, Israel, Sweden, Netherlands, Federal Republic of Germany, England. Monograph Number Forty-One.

    ERIC Educational Resources Information Center

    Berkowitz, Monroe; And Others

    The papers in this volume synthesize international disability policies, providing a cross-national perspective on disability definitions, the criteria for entitlement to disability benefits, and measures to facilitate a return to work for disabled individuals. Two papers, which were presented at the International Research Conference on Social…

  9. 17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... its aggregate trading volume on securities exchanges in Canada and on the Canadian Dealing Network... accordance with the requirements of the home jurisdiction law or practice will satisfy the requirements of... jurisdiction law or practice will satisfy the requirements of § 240.14e-1(c). Where payment may not be made on...

  10. 17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... its aggregate trading volume on securities exchanges in Canada and on the Canadian Dealing Network... accordance with the requirements of the home jurisdiction law or practice will satisfy the requirements of... jurisdiction law or practice will satisfy the requirements of § 240.14e-1(c). Where payment may not be made on...

  11. 17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... its aggregate trading volume on securities exchanges in Canada and on the Canadian Dealing Network... accordance with the requirements of the home jurisdiction law or practice will satisfy the requirements of... jurisdiction law or practice will satisfy the requirements of § 240.14e-1(c). Where payment may not be made on...

  12. 17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... its aggregate trading volume on securities exchanges in Canada and on the Canadian Dealing Network... accordance with the requirements of the home jurisdiction law or practice will satisfy the requirements of... jurisdiction law or practice will satisfy the requirements of § 240.14e-1(c). Where payment may not be made on...

  13. Army Communicator (Volume 37, Number 4, Winter 2012)

    DTIC Science & Technology

    2012-01-01

    support of DOTMLPF [Doctrine, Organization, Training, Materiel, Leader Development, Personnel, and Facilities]. We are innovating , transforming and...network assurance (cyber security). This personnel alignment maps precisely with the documented organizational structure for the corps/division G-6s...precision. •A team oriented on and engaged with commanders and Soldiers •A transparent, flexible, innovative and agile com- mand – focused on improving

  14. Portable Low-Volume Therapy for Severe Blood Loss

    DTIC Science & Technology

    2014-06-01

    experiments are described in this Annual Report for Year 3. In summary we made the following conclusions: 1.) Melatonin provides therapeutic effects at...very low concentrations. This was shown by the low histopathological score observed when administering a solution containing melatonin at a...hydroxybutyrate, melatonin 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON

  15. The DISAM Journal of International Security Assistance Management. Volume 24, Number 2, Winter 2001-2002

    DTIC Science & Technology

    2002-01-01

    speeds that are sufficient to download and play the audio/video content in near real-time. Most users at home are connected via analog modems , which are...significantly slower (28.8K, 56K ). Audio files can take several minutes to load, and the user may experience pauses and buffering. While not ideal

  16. CTC Sentinel. Volume 7, Issue 3

    DTIC Science & Technology

    2014-03-01

    foreign fighting, including Finland . In March 2014, the Finnish Security and Intelligence Service (FSIS) stated that over 30 individuals had...hardened jihadists returning to Finland from Syria.5 This article examines the factors that may have contributed to Finnish Muslim participation...Violent Extremism in Finland – Situation Overview 2/2013,” Finland Ministry of the Interior, August 26, 2013. The reports do not clarify whether

  17. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-05

    ... collection was previously published in the Federal Register on October 6, 2010 at Volume 75 FR 61783 allowing... Budget is particularly interested in comments that: 1. Evaluate whether the proposed collection of...; 3. Enhance the quality, utility, and clarity of the information to be collected; and 4. Minimize the...

  18. Archaeology, Geomorphology and Historic Surveys in Pools 13-14, Upper Mississippi River. Volume 1

    DTIC Science & Technology

    1989-09-01

    sold for $5, $10, or $50 an acre. Townsites were platted by the hundreds: In some embryo towns, corner lots sold for $500 in the morning might be sold...Mexico in the name of "Manifest Destiny " secures California and much of northern Mex ico for the United I States. 1848 California Gold Rush., Gold is

  19. 78 FR 26836 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-08

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69503; File No. SR-NYSEArca-2013-44] Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Amending Its Schedule of Fees and Charges for Exchange Services To Amend Step Up Tier 2 to Reduce the Volume Threshold Requirements Needed To...

  20. Intrinsic radioactivity of KSr2I5:Eu2+

    NASA Astrophysics Data System (ADS)

    Rust, M.; Melcher, C.; Lukosi, E.

    2016-10-01

    A current need in nuclear security is an economical, yet high energy resolution (near 2%), scintillation detector suitable for gamma-ray spectroscopy. For current scintillators on the market, there is an inverse relationship between scintillator energy resolution and cost of production. A new promising scintillator, KSr2I5:Eu2+, under development at the University of Tennessee, has achieved an energy resolution of 2.4% at 662 keV at room temperature, with potential growth rates exceeding several millimeters per hour. However, the internal background due to the 40K content could present a hurdle for effective source detection/identification in nuclear security applications. As a first step in addressing this question, this paper reports on a computational investigation of the intrinsic differential pulse height spectrum (DPHS) generated by 40K within the KSr2I5:Eu2+ scintillator as a function of crystal geometry. It was found that the DPHS remains relatively equal to a constant multiplicative factor of the negatron emission spectrum with a direct increase of the 1.46 MeV photopeak relative height to the negatron spectrum with volume. Further, peak pileup does not readily manifest itself for practical KSr2I5:Eu2+ volumes.

  1. Potential of Securitization in Solar PV Finance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lowder, Travis; Mendelsohn, Michael

    This report aims to demonstrate, hypothetically and at a high level, what volumes of solar deployment could be supported given solar industry access to the capital markets in the form of security issuance. Securitization is not anticipated to replace tax equity in the near- to mid-term, but it could provide an additional source of funds that would be comparatively inexpensive and could reduce the weighted average cost of capital for a given solar project or portfolio. Thus, the potential to securitize solar assets and seek financing in the capital markets could help to sustain the solar industry when the investmentmore » tax credit (ITC) -- one of the federal incentives that has leveraged billions of dollars of private capital in the solar industry -- drops from 30% to 10% at the close of 2016. The report offers analysis on the size of the U.S. third-party financed solar market, as well as on the volumes (in MW) of solar asset origination possible through a $100 million securitization fund (assuming no overcollateralization). It also provides data on the size of the relevant securities markets and how the solar asset class may fit into these markets.« less

  2. Use of a Temporary Shunt as a Salvage Technique for Distal Extremity Amputations Requiring Repair by Vessel Grafting during Critical Ischemia

    PubMed Central

    Dadaci, Mehmet; Altuntas, Zeynep

    2016-01-01

    Background Although the use of temporary shunts in proximal extremity amputations has been reported, no study has described the use of temporary shunts in distal extremity amputations that require vein grafting. Moreover, the total volume of blood loss when temporary shunts are used has not been reported. The aim of this study was to investigate the applicability of a temporary shunt for distal extremity amputations requiring repair by vessel grafting with an ischemia time of >6 hours. This study also aimed to determine the total volume of blood loss when temporary shunts were used. Methods Patients who underwent distal major extremity replantation and/or revascularization with a vessel graft and who experienced ischemia for 6–8 hours between 2013 and 2014 were included in the study. A 6-Fr suction catheter was cut to 5 cm in length after the infusion of heparin, and secured with a 5-0 silk suture between the distal and the proximal ends of the artery. While bleeding continued, the bones were shortened and fixed. After the complete restoration of circulation, the arterial shunt created using the catheter was also repaired with a vein graft. Results Six patients were included in this study. The mean duration of ischemia was 7.25 hours. The mean duration of suction catheter use during limb revascularization was 7 minutes. The mean transfusion volume was 7.5 units. No losses of the extremity were observed. Conclusions This procedure should be considered in distal extremity amputations requiring repair by vessel grafting during critical ischemia. PMID:27896186

  3. In Vitro Evaluation of the Size, Knot Holding Capacity, and Knot Security of the Forwarder Knot Compared to Square and Surgeon's Knots Using Large Gauge Suture.

    PubMed

    Gillen, Alex M; Munsterman, Amelia S; Hanson, R Reid

    2016-11-01

    To investigate the strength, size, and holding capacity of the self-locking forwarder knot compared to surgeon's and square knots using large gauge suture. In vitro mechanical study. Knotted suture. Forwarder, surgeon's, and square knots were tested on a universal testing machine under linear tension using 2 and 3 USP polyglactin 910 and 2 USP polydioxanone. Knot holding capacity (KHC) and mode of failure were recorded and relative knot security (RKS) was calculated as a percentage of KHC. Knot volume and weight were assessed by digital micrometer and balance, respectively. ANOVA and post hoc testing were used tocompare strength between number of throws, suture, suture size, and knot type. P<.05 was considered significant. Forwarder knots had a higher KHC and RKS than surgeon's or square knots for all suture types and number of throws. No forwarder knots unraveled, but a proportion of square and surgeon's knots with <6 throws did unravel. Forwarder knots had a smaller volume and weight than surgeon's and square knots with equal number of throws. The forwarder knot of 4 throws using 3 USP polyglactin 910 had the highest KHC, RKS, and the smallest size and weight. Forwarder knots may be an alternative for commencing continuous patterns in large gauge suture, without sacrificing knot integrity, but further in vivo and ex vivo testing is required to assess the effects of this sliding knot on tissue perfusion before clinical application. © Copyright 2016 by The American College of Veterinary Surgeons.

  4. In vitro evaluation of square and surgeon's knots in large gauge suture.

    PubMed

    Gillen, Alex M; Munsterman, Amelia S; Farag, Ramsis; Coleridge, Matthew O D; Hanson, R Reid

    2017-02-01

    To investigate the strength and size of surgeon's and square knots for starting and ending continuous suture lines using large gauge suture. In vitro mechanical study. Knotted suture. Surgeon's and square knots were tested using 2 and 3 USP polyglactin 910 and 2 USP polydioxanone under linear tension on a universal testing machine. Failure mode and knot holding capacity (KHC) were recorded, and relative knot security (RKS) was calculated as a percentage of KHC. Comparisons were made between number of throws, suture size, suture type, and knot types. Knot volume and weight were assessed by a digital micrometer and balance, respectively. There were no significant differences in KHC (P = .295), RKS (P = .307), volume (P = .128), or weight (P = .310) between square and surgeon's knots at the start or end of suture lines with the same number of throws and suture type. A minimum of 6 throws were required for start knots and 7 throws at end knots to prevent unraveling. Knots tied with 3 polyglactin 910 were strongest (P < .001) and 2 polyglactin 910 produced knots with higher KHC and RKS than 2 polydioxanone (P < .001). No consistent differences were detected between knots types tied with the same suture material; however, number of throws affected KHC and RKS up to 6 throws in start or 7 throws in end knots. The configuration of square and surgeon's knots performed at the end of a continuous line alters their KHC, supporting the use of additional throws for knot security. © 2017 The American College of Veterinary Surgeons.

  5. Hydrological sciences and water security: An overview

    NASA Astrophysics Data System (ADS)

    Young, G.; Demuth, S.; Mishra, A.; Cudennec, C.

    2015-04-01

    This paper provides an introduction to the concepts of water security including not only the risks to human wellbeing posed by floods and droughts, but also the threats of inadequate supply of water in both quantity and quality for food production, human health, energy and industrial production, and for the natural ecosystems on which life depends. The overall setting is one of constant change in all aspects of Earth systems. Hydrological systems (processes and regimes) are changing, resulting from varying and changing precipitation and energy inputs, changes in surface covers, mining of groundwater resources, and storage and diversions by dams and infrastructures. Changes in social, political and economic conditions include population and demographic shifts, political realignments, changes in financial systems and in trade patterns. There is an urgent need to address hydrological and social changes simultaneously and in combination rather than as separate entities, and thus the need to develop the approach of `socio-hydrology'. All aspects of water security, including the responses of both UNESCO and the International Association of Hydrological Sciences (IAHS) to the concepts of socio-hydrology, are examined in detailed papers within the volume titled Hydrological Sciences and Water Security: Past, Present and Future.

  6. WriteShield: A Pseudo Thin Client for Prevention of Information Leakage

    NASA Astrophysics Data System (ADS)

    Kirihata, Yasuhiro; Sameshima, Yoshiki; Onoyama, Takashi; Komoda, Norihisa

    While thin-client systems are diffusing as an effective security method in enterprises and organizations, there is a new approach called pseudo thin-client system. In this system, local disks of clients are write-protected and user data is forced to save on the central file server to realize the same security effect of conventional thin-client systems. Since it takes purely the software-based simple approach, it does not require the hardware enhancement of network and servers to reduce the installation cost. However there are several problems such as no write control to external media, memory depletion possibility, and lower security because of the exceptional write permission to the system processes. In this paper, we propose WriteShield, a pseudo thin-client system which solves these issues. In this system, the local disks are write-protected with volume filter driver and it has a virtual cache mechanism to extend the memory cache size for the write protection. This paper presents design and implementation details of WriteShield. Besides we describe the security analysis and simulation evaluation of paging algorithms for virtual cache mechanism and measure the disk I/O performance to verify its feasibility in the actual environment.

  7. Privacy Is Become with, Data Perturbation

    NASA Astrophysics Data System (ADS)

    Singh, Er. Niranjan; Singhai, Niky

    2011-06-01

    Privacy is becoming an increasingly important issue in many data mining applications that deal with health care, security, finance, behavior and other types of sensitive data. Is particularly becoming important in counterterrorism and homeland security-related applications. We touch upon several techniques of masking the data, namely random distortion, including the uniform and Gaussian noise, applied to the data in order to protect it. These perturbation schemes are equivalent to additive perturbation after the logarithmic Transformation. Due to the large volume of research in deriving private information from the additive noise perturbed data, the security of these perturbation schemes is questionable Many artificial intelligence and statistical methods exist for data analysis interpretation, Identifying and measuring the interestingness of patterns and rules discovered, or to be discovered is essential for the evaluation of the mined knowledge and the KDD process as a whole. While some concrete measurements exist, assessing the interestingness of discovered knowledge is still an important research issue. As the tool for the algorithm implementations we chose the language of choice in industrial world MATLAB.

  8. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    PubMed Central

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  9. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing

    NASA Astrophysics Data System (ADS)

    Newe, Thomas; O'Connell, Eoin; Meere, Damien; Yuan, Hongwei; Leen, Gabriel; O'Keeffe, Sinead; Lewis, Elfed

    2016-05-01

    Recent advancements in cloud computing technologies in the context of optical and optical fibre based systems are reported. The proliferation of real time and multi-channel based sensor systems represents significant growth in data volume. This coupled with a growing need for security presents many challenges and presents a huge opportunity for an evolutionary step in the widespread application of these sensing technologies. A tiered infrastructural system approach is adopted that is designed to facilitate the delivery of Optical Fibre-based "SENsing as a Service- SENaaS". Within this infrastructure, novel optical sensing platforms, deployed within different environments, are interfaced with a Cloud-based backbone infrastructure which facilitates the secure collection, storage and analysis of real-time data. Feedback systems, which harness this data to affect a change within the monitored location/environment/condition, are also discussed. The cloud based system presented here can also be used with chemical and physical sensors that require real-time data analysis, processing and feedback.

  10. Detection of the urban release of a bacillus anthracis simulant by air sampling.

    PubMed

    Garza, Alexander G; Van Cuyk, Sheila M; Brown, Michael J; Omberg, Kristin M

    2014-01-01

    In 2005 and 2009, the Pentagon Force Protection Agency (PFPA) staged deliberate releases of a commercially available organic pesticide containing Bacillus amyloliquefaciens to evaluate PFPA's biothreat response protocols. In concert with, but independent of, these releases, the Department of Homeland Security sponsored experiments to evaluate the efficacy of commonly employed air and surface sampling techniques for detection of an aerosolized biological agent. High-volume air samplers were placed in the expected downwind plume, and samples were collected before, during, and after the releases. Environmental surface and personal air samples were collected in the vicinity of the high-volume air samplers hours after the plume had dispersed. The results indicate it is feasible to detect the release of a biological agent in an urban area both during and after the release of a biological agent using high-volume air and environmental sampling techniques.

  11. [Foodstuff as sources of vitamin C in nutrition of the population of the Russian Federation].

    PubMed

    Kpsheleva, O V; Baturin, A K; Shatniuk, L N

    2006-01-01

    The estimation of the contribution of foodstuff in security of the population of the Russian Federation by vitamin C in view of volumes of their consumption is lead. It is shown, that the basic sources of vitamin, borrowing in the general structure of consumption of foodstuff about 30%, do not provide sufficient volume its receipt. The real maintenance of vitamin C certain by standard analytical methods in some fruit-and-vegetable cultures, shows significant variability and difference from the given official tables of a chemical compound. The lack of the micronutrient is expedient to compensate by inclusion of biologically active additives to food or enriched foodstuff in a diet.

  12. [Lung protective ventilation. Ventilatory modes and ventilator parameters].

    PubMed

    Schädler, Dirk; Weiler, Norbert

    2008-06-01

    Mechanical ventilation has a considerable potential for injuring the lung tissue. Therefore, attention has to be paid to the proper choice of ventilatory mode and settings to secure lung-protective ventilation whenever possible. Such ventilator strategy should account for low tidal volume ventilation (6 ml/kg PBW), limited plateau pressure (30 to 35 cm H2O) and positive end-expiratory pressure (PEEP). It is unclear whether pressure controlled or volume controlled ventilation with square flow profile is beneficial. The adjustment of inspiration and expiration time should consider the actual breathing mechanics and anticipate the generation of intrinsic PEEP. Ventilatory modes with the possibility of supporting spontaneous breathing should be used as soon as possible.

  13. Automatically measuring brain ventricular volume within PACS using artificial intelligence.

    PubMed

    Yepes-Calderon, Fernando; Nelson, Marvin D; McComb, J Gordon

    2018-01-01

    The picture archiving and communications system (PACS) is currently the standard platform to manage medical images but lacks analytical capabilities. Staying within PACS, the authors have developed an automatic method to retrieve the medical data and access it at a voxel level, decrypted and uncompressed that allows analytical capabilities while not perturbing the system's daily operation. Additionally, the strategy is secure and vendor independent. Cerebral ventricular volume is important for the diagnosis and treatment of many neurological disorders. A significant change in ventricular volume is readily recognized, but subtle changes, especially over longer periods of time, may be difficult to discern. Clinical imaging protocols and parameters are often varied making it difficult to use a general solution with standard segmentation techniques. Presented is a segmentation strategy based on an algorithm that uses four features extracted from the medical images to create a statistical estimator capable of determining ventricular volume. When compared with manual segmentations, the correlation was 94% and holds promise for even better accuracy by incorporating the unlimited data available. The volume of any segmentable structure can be accurately determined utilizing the machine learning strategy presented and runs fully automatically within the PACS.

  14. Evaluation of Large Volume SrI2(Eu) Scintillator Detectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sturm, B W; Cherepy, N J; Drury, O B

    2010-11-18

    There is an ever increasing demand for gamma-ray detectors which can achieve good energy resolution, high detection efficiency, and room-temperature operation. We are working to address each of these requirements through the development of large volume SrI{sub 2}(Eu) scintillator detectors. In this work, we have evaluated a variety of SrI{sub 2} crystals with volumes >10 cm{sup 3}. The goal of this research was to examine the causes of energy resolution degradation for larger detectors and to determine what can be done to mitigate these effects. Testing both packaged and unpackaged detectors, we have consistently achieved better resolution with the packagedmore » detectors. Using a collimated gamma-ray source, it was determined that better energy resolution for the packaged detectors is correlated with better light collection uniformity. A number of packaged detectors were fabricated and tested and the best spectroscopic performance was achieved for a 3% Eu doped crystal with an energy resolution of 2.93% FWHM at 662keV. Simulations of SrI{sub 2}(Eu) crystals were also performed to better understand the light transport physics in scintillators and are reported. This study has important implications for the development of SrI{sub 2}(Eu) detectors for national security purposes.« less

  15. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 3

    DTIC Science & Technology

    2008-03-01

    describes essentials for requirements development and management. In addi- tion to providing training, eLearning and consulting services, she speaks at and...information, support sense- making, enable collaborative decision making, and effect changes in the physical environment. For example, the Global ...across layers, which enables effective use of resources and helps enforce security and confiden- tiality policies. Global Data Space DDS provides a

  16. Defense Acquisition Review Journal. Volume 16, Number 2

    DTIC Science & Technology

    2009-07-01

    current status of the conventional munitions industry in the United States today and provides an economic theory for reviving this declining, but...Avant, 2007). United States Naval War College Professor Larry McCabe observed that an economic aspect to the emergence of private security...flows, feedback, and nonlinear relationships in managerial control. The methodology’s ability to model many diverse system components (e.g., work

  17. Libraries, National Security, Freedom of Information Laws and Social Responsibilities. IFLA/FAIFE World Report Series Volume V

    ERIC Educational Resources Information Center

    Seidelin, Susanne, Ed.; Hamilton, Stuart, Ed.

    2005-01-01

    The IFLA/FAIFE World Report Series is unique. It is the only source based on a systematic data collection process that provides an overview of how libraries around the world are tackling barriers to freedom of access to information and freedom of expression. This year's edition includes 84 country reports which detail the extent of Internet access…

  18. Formal Methods for Privacy

    DTIC Science & Technology

    2009-09-01

    Review, 39:962, 1964. [8] D. Chaum . Secret ballot receipts: True voter-verifiable elections. IEEE J. Security and Privacy, pages 38–47, 2004. [9...TCC 2005), pages 363–385, 2005. [10] David Clark, Sebastian Hunt, and Pasquale Malacaria. A static analysis for quantifying in- formation flow in a... David Buckingham, editor, MacArthur Foundation Series on Digital Learning– Youth, Identity, Digital Media Volume, Cambridge, MA, 2007. MIT Press. 11

  19. U.S. Army War College Guide to National Security Issues. Volume 1. Theory of War and Strategy

    DTIC Science & Technology

    2012-06-01

    273 Tami Davis Biddle 21. John Warden’s Five Ring Model and the Indirect Approach to War ..........................295 Clayton K. S. Chun...266 Chapter 21 Figure 21-1. John Warden’s Five Ring Model...strategy from the battlefield to the civilian rear, thus blur- ring the difference between combatant and noncombatant.22 At the same time, the military

  20. Low Intensity Conflict. Volume 2. Appendices.

    DTIC Science & Technology

    1983-06-30

    parapsychology, which includes extrasensory perception (ESP). U.S. intelligence agencies, according to NBC Inc., have not taken the Soviet effort too seriously...theoreti- cal adjustment. What remains important is the perceptions of those involved concerning the implications of winning or losing. Perceotions are...opponents feel about such matters is of great concern. In 1948, over 100,000 British security forces withdrew from Palestine because of perceptions of

  1. Research on Secure Systems and Automatic Programming. Volume I

    DTIC Science & Technology

    1977-10-14

    for the enforcement of adherence to authorization; they include physical limitations, legal codes, social pressures, and the psychological makeup of...systems job statistics and possibly indications of an support instructions. The criteria for their abnormal termination. * inclusion were high execution...interrupt processes, for the output data page. Jobs may also terminate however, use the standard SWI TCH PROCESS instruc- abnormally by executing an

  2. The DTIC Review. Volume 5, Number 3. Cybernetics: Enhancing Human Performance

    DTIC Science & Technology

    2001-03-01

    Human Factors Engineering 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES Phyllis...2 AD Number: A382305 Corporate Author: Arizona University - Tucson Department of Electrical and Computer Engineering Tucson, AZ...Visualization Aids AD-A382305 Aug 2000 Arizona University - Tucson Department of Electrical and Computer Engineering Tucson, AZ 2 THIS PAGE INTENTIONALLY

  3. Promoting International Energy Security. Volume 2: Turkey and the Caspian

    DTIC Science & Technology

    2012-01-01

    RAND reports un- dergo rigorous peer review to ensure that they meet high standards for research quality and objectivity. Promoting International...Russian invasion of Georgia in 2008 did not directly target energy infrastructure, most export routes for oil and natural gas from Azerbai- jan to...particular focus on the three countries with appreciable energy export potential: Azerbai- jan , Kazakhstan, and Turkmenistan. It also provides an

  4. Intravenous Renal Cell Transplantation for Polycystic Kidney Disease

    DTIC Science & Technology

    2013-10-01

    extend the utility of organs available for transplant. Data obtained to date demonstrate markedly lower renal cyst volume and fibrosis and better...Nephrology in November, 2013. 15. SUBJECT TERMS polycystic kidney diseases; renal insufficiency, chronic; kidney failure, chronic; fibrosis 16. SECURITY...reflect better diagnosis and reporting, they illustrate that ESRD from PKD is a huge health problem. The main goal of this proposal is the development

  5. Defense AT and L. Volume 43, Number 4

    DTIC Science & Technology

    2014-08-01

    nature , guidance can become dated soon after it is published since it is typically anticipatory or reactive in na- ture. Tearing down boundaries and...how we pro- tect and defend the United States and its allies. Those technologies began as ideas that were nurtured , guarded and secured by...intimidation by criminals /insurgents, and safe facilities for their workers. They also need reliable infrastructure for their manufacturing facilities

  6. Chemical plants remain vulnerable to terrorists: a call to action.

    PubMed

    Lippin, Tobi Mae; McQuiston, Thomas H; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L; Howard, Donna; Seymour, Thomas A; Stephens, Doug; Williams, Brian K

    2006-09-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation's security are as follows: a) specify detailed requirements for chemical site assessment and security ; b) mandate audit inspections supported by significant penalties for cases of noncompliance ; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals ; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation ; e) mandate and fund the upgrading of emergency communication systems ; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident.

  7. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    PubMed Central

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  8. Contributing to shipping container security: can passive sensors bring a solution?

    PubMed

    Janssens-Maenhout, G; De Roo, F; Janssens, W

    2010-02-01

    Illicit trafficking of fissionable material in container cargoes is recognized as a potential weakness in Nuclear Security. Triggered by the attacks of 11 September 2001, measures were undertaken to enhance maritime security in extension to the Safety Of Life At Sea Convention and in line with the US Container Security Initiatives. Effective detection techniques are needed that allow the inspector to intercept illicit trafficking of nuclear weapons components or components of other nuclear explosive devices. Many security measures focus on active interrogation of the container content by X-ray scan, which might be extended with the newly developed tagged neutron inspection system. Both active interrogation techniques can, with the current huge volume of container traffic, only be applied to a limited number of selected containers. The question arises whether a passive detection technique can offer an alternative solution. This study investigates if containers equipped with a small passive detector will register during transport the neutron irradiation by fissionable material such as plutonium in a measurable way. In practice, 4/5 of the containers are about 1/8 filled with hydrogenous material and undergo a typical 2 months route. For this reference case, it was found that the most compatible passive detector would be an activation foil of iridium. Monte-Carlo simulations showed that for the reference case the activity of a 250 microm thin foil with 6 cm(2) cross-section would register 1.2 Bq when it is irradiated by a significant quantity of Reactor-Grade PuO(2). However this activity drops with almost two orders of magnitude for other fillings and other isotopic compositions and forms of the Pu-source. The procedure of selecting the target material for Pu detection is detailed with the theoretical methods, in order to be useful for other applications. Moreover the value of such additional passive sensors for securing maritime container transport is situated within the global framework of the First, Second and Third Line of Defense against illicit trafficking. Copyright 2009 Elsevier Ltd. All rights reserved.

  9. A wireless sensor tag platform for container security and integrity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. Thismore » allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.« less

  10. A wireless sensor tag platform for container security and integrity

    NASA Astrophysics Data System (ADS)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    2011-04-01

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. This allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.

  11. Photonic sensor opportunities for distributed and wireless systems in security applications

    NASA Astrophysics Data System (ADS)

    Krohn, David

    2006-10-01

    There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.

  12. Influence of taekwondo as security martial arts training on anaerobic threshold, cardiorespiratory fitness, and blood lactate recovery.

    PubMed

    Kim, Dae-Young; Seo, Byoung-Do; Choi, Pan-Am

    2014-04-01

    [Purpose] This study was conducted to determine the influence of Taekwondo as security martial arts training on anaerobic threshold, cardiorespiratory fitness, and blood lactate recovery. [Subjects and Methods] Fourteen healthy university students were recruited and divided into an exercise group and a control group (n = 7 in each group). The subjects who participated in the experiment were subjected to an exercise loading test in which anaerobic threshold, value of ventilation, oxygen uptake, maximal oxygen uptake, heart rate, and maximal values of ventilation / heart rate were measured during the exercise, immediately after maximum exercise loading, and at 1, 3, 5, 10, and 15 min of recovery. [Results] At the anaerobic threshold time point, the exercise group showed a significantly longer time to reach anaerobic threshold. The exercise group showed significantly higher values for the time to reach VO2max, maximal values of ventilation, maximal oxygen uptake and maximal values of ventilation / heart rate. Significant changes were observed in the value of ventilation volumes at the 1- and 5-min recovery time points within the exercise group; oxygen uptake and maximal oxygen uptake were significantly different at the 5- and 10-min time points; heart rate was significantly different at the 1- and 3-min time points; and maximal values of ventilation / heart rate was significantly different at the 5-min time point. The exercise group showed significant decreases in blood lactate levels at the 15- and 30-min recovery time points. [Conclusion] The study results revealed that Taekwondo as a security martial arts training increases the maximal oxygen uptake and anaerobic threshold and accelerates an individual's recovery to the normal state of cardiorespiratory fitness and blood lactate level. These results are expected to contribute to the execution of more effective security services in emergencies in which violence can occur.

  13. The thick left ventricular wall of the giraffe heart normalises wall tension, but limits stroke volume and cardiac output.

    PubMed

    Smerup, Morten; Damkjær, Mads; Brøndum, Emil; Baandrup, Ulrik T; Kristiansen, Steen Buus; Nygaard, Hans; Funder, Jonas; Aalkjær, Christian; Sauer, Cathrine; Buchanan, Rasmus; Bertelsen, Mads Frost; Østergaard, Kristine; Grøndahl, Carsten; Candy, Geoffrey; Hasenkam, J Michael; Secher, Niels H; Bie, Peter; Wang, Tobias

    2016-02-01

    Giraffes--the tallest extant animals on Earth--are renowned for their high central arterial blood pressure, which is necessary to secure brain perfusion. Arterial pressure may exceed 300 mmHg and has historically been attributed to an exceptionally large heart. Recently, this has been refuted by several studies demonstrating that the mass of giraffe heart is similar to that of other mammals when expressed relative to body mass. It thus remains unexplained how the normal-sized giraffe heart generates such massive arterial pressures. We hypothesized that giraffe hearts have a small intraventricular cavity and a relatively thick ventricular wall, allowing for generation of high arterial pressures at normal left ventricular wall tension. In nine anaesthetized giraffes (495±38 kg), we determined in vivo ventricular dimensions using echocardiography along with intraventricular and aortic pressures to calculate left ventricular wall stress. Cardiac output was also determined by inert gas rebreathing to provide an additional and independent estimate of stroke volume. Echocardiography and inert gas-rebreathing yielded similar cardiac outputs of 16.1±2.5 and 16.4±1.4 l min(-1), respectively. End-diastolic and end-systolic volumes were 521±61 ml and 228±42 ml, respectively, yielding an ejection fraction of 56±4% and a stroke volume of 0.59 ml kg(-1). Left ventricular circumferential wall stress was 7.83±1.76 kPa. We conclude that, relative to body mass, a small left ventricular cavity and a low stroke volume characterizes the giraffe heart. The adaptations result in typical mammalian left ventricular wall tensions, but produce a lowered cardiac output. © 2016. Published by The Company of Biologists Ltd.

  14. China’s Pursuit of Africa’s Natural Resources, (CSL Issue Paper, Volume 1-09, June 2009)

    DTIC Science & Technology

    2009-06-01

    beyond recovery, and mineral exploitation has generated significant pollution that has rendered agricultural land infertile and given rise to social...heard. Then-South African President Thabo Mbeki cautioned China against dumping its low-cost textile and plastics products in Africa, thus denying...energy-security-asem- beijing -financial-crisis (accessed December 5, 2008). African Politics Portal. 2008. Top Ten Misconceptions about Chinese

  15. Biennial Survey of Education in the United States, 1928-1930. Bulletin, 1931, No. 20. Volume I. Chapter VIII: Art Education

    ERIC Educational Resources Information Center

    Farnum, Royal Bailey

    1931-01-01

    Art education in the United States has never been on a firmer footing than at the present time. It faces a future secure in the knowledge that during the past 10 years its social, economic, and educational values have been demonstrated and acknowledged and generally put into practice. Educational leaders no longer ignore it; rather one finds an…

  16. Naval Medical Research and Development News. Volume 7, Issue 1, January 2015

    DTIC Science & Technology

    2015-01-01

    Laos, Malaysia, Thailand and the Philippines . Vietnam has set a 2030 malaria elimination goal and NAMRU-2 is partnering to identify malaria...conducting active surveillance of dengue and malaria; extending training opportunities to the local military, and identifying new pathogens and vectors...enhance regional security, stability and cooperation,” said Gutierrez. “Over the last year, Soto Cano was activated as the fourth site to take

  17. Promoting International Energy Security. Volume 3: Sea-Lanes to Asia

    DTIC Science & Technology

    2012-01-01

    commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under...copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use . For...trademark. © Copyright 2012 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and

  18. PRISM. Volume 3, Number 2, March 2012

    DTIC Science & Technology

    2012-03-01

    control. The first problem that is encountered is the use of the word control, which in many languages is pejorative, implying a dictatorial approach...lieu of control, the language used should imply partnership in the decisionmaking process. The second problem is that all too fre- quently the terms...effectiveness of the security and development strategy as peace talks use the language of development to address the unmet needs of the insurgents

  19. CTC Sentinel. Volume 9, Issue 3

    DTIC Science & Technology

    2016-03-01

    International Terror Andrew Watkins 19 The Islamic State Threat to Britain: Evidence from Recent Terror Trials Raffaello Pantucci PROFILE 24 The Last...a new beachhead for fostering the Islamic State’s regional extremism.” Andrew Watkins explores why there may be a strong correlation between...offensive Andrew Watkins is an energy and security analyst for the Iraq Oil Report. He spent four years working as a senior lecturer at the American

  20. Defense AR Journal. Volume 16, Number 2, Issue 51, July 2009

    DTIC Science & Technology

    2009-07-01

    and provides an economic theory for reviving this declining, but important industry. The fourth article by Dr. Roy Wood, “Program Manager as Chief...services (Avant, 2007). United States Naval War College Professor Larry McCabe observed that an economic aspect to the emergence of private security...and nonlinear relationships in managerial control. The methodology’s ability to model many diverse system components (e.g., work, people, money

  1. A Survey of Satellite Communications System Vulnerabilities

    DTIC Science & Technology

    2008-06-01

    2008. 16. Arnal, Fabrice, Cedric Baudon, Elisa Callejo, Miriam Catalan, Laurence Duquerroy, Thierry Gayraud, Jose A. Guerra, Ignacio Jimenez, Pierre...Communications, Volume SAC-3, Number 1, January 1985, Manuscript received 1 August 1984 and revised 1 October 1984. 42. Collier , Mark D., “Session...accessed 5 May 2008. 43. Collier , Mark, “The Value of VoIP Security,” http://www.callcentermagazine.com/shared/printableArticle.jhtml?articleID

  2. The DISAM Journal of International Security Assistance Management. Volume 30, Number 2, June 2008

    DTIC Science & Technology

    2008-06-01

    made by the Indonesian government in Aceh regarding democratic governance and counter-terrorism cooperation, the SAC remains concerned with...requested $15,700,000 when the Secretary of State reports that the Indonesian government has provided plans for effectively addressing these...Secretary of State reports to the congressional appropriations committees: • Of the steps taken by the Indonesian government in the prosecution and

  3. CTC Sentinel. Volume 4, Issue 8

    DTIC Science & Technology

    2011-08-01

    direct threat to national security and public safety because of their sup- port for terrorism. As a result, they are being monitored by German law...proper) Muslim way of life. Therefore, they often quit habits such as drinking alcohol and eating pork . Many converts have mentioned difficult times...Neil (Ibrahim) Golightly, a 34-year-old convert from Glasgow, was killed while trying to bring food and supplies to besieged Sarajevo in August 1995

  4. Organic Inorganic Hybrid Solar Cell Efficiency Improvement By Employing Au Nanocluster

    DTIC Science & Technology

    2015-06-14

    ABSTRACT 16. SECURITY CLASSIFICATION OF: Poly( 3,4-ethyllenedioxythiophene):poly (styrene sulfonate) (PEDOT:PSS), a P-type organic polymer is frequently...Addition of small volume percentage of organic additives such as dimethyl sulfoxide (DMSO) has a positive effect on the conductivity of this polymer . In...Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 hybrid solar cell, tunable conductivity, organic polymer , heterojunction, nanocluster

  5. UCLA High Speed, High Volume Laboratory Network for Infectious Diseases. Addendum

    DTIC Science & Technology

    2009-08-01

    s) and should not be construed as an official Department of the Army position, policy or decision unless so designated by other documentation... Design : Because of current public health and national security threats, influenza surveillance and analysis will be the initial focus. In the upcoming...throughput and automated systems will enable processing of tens of thousands of samples and provide critical laboratory capacity. Its overall design and

  6. CHIPS. Volume 29, Issue 1, January - March 2011

    DTIC Science & Technology

    2011-03-01

    services, like electricity, heating or cable television. Bank/Finance Fraud: • They may create counterfeit checks using their victim’s name or...consolidating disparate, stove- piped networks into a single, modern, cost-effective enterprise network with a high level of service that meets...Holland, NGEN program manager. “If NMCI is not the most secure network in the world, it is certainly close. There is no shortfall flexibility

  7. Naval Medical Research and Development News. Volume 7, Issue 3, March 2015

    DTIC Science & Technology

    2016-02-29

    coordinated with the WHO on a combined animal/human health consultation mission to Egypt, including experts from the World Organization of Animal Health ...actively in emerging global health challenges like this. As we do so, we offer distinct diplomatic value as an expression of U.S. humanitarian and...scientific leadership, while also advancing health security and scientific progress. The biannual Navy Medical Research and Development Enterprise

  8. Air & Space Power Journal. Volume 27, Number 4, July-August 2013

    DTIC Science & Technology

    2013-08-01

    with old-fashioned radio communications . Meanwhile, our cyber warrior has successfully isolated the hack and goes on the counteroffensive with an...impostors is best solved with technological solutions. • Radio frequency identication • Biometrics • Embedded security markers Figure 4. Defectors...Museum, 26 July 1948, http://www.trumanlibrary.org/9981a.htm. 21. Jones, “ Community Defense in Afghanistan,” 11 . July–August 2013 Air & Space Power

  9. 78 FR 26675 - Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-07

    ... Electronic Executions and To Introduce Volume-Based Tiers for Certain Proprietary Electronic Executions May 1, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and... change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 15 U.S.C. 78a. \\3\\ 17 CFR 240.19b-4. I. Self...

  10. Joint Logistics Commanders’ Biennial Software Workshop (4th) Orlando II: Solving the PDSS (Post Deployment Software Support) Challenge Held in Orlando, Florida on 27-29 January 87. Volume 2. Proceedings

    DTIC Science & Technology

    1987-06-01

    described the state )f ruaturity of software engineering as being equivalent to the state of maturity of Civil Engineering before Pythagoras invented the...formal verification languages, theorem provers or secure configuration 0 management tools would have to be maintained and used in the PDSS Center to

  11. Military Review: The Professional Journal of the U.S. Army. Volume 88, Number 2, March-April 2008

    DTIC Science & Technology

    2008-04-01

    assembly and fabrication, maintenance. Najaf Hotels and tourism infrastructure and services. Karbala Hotels and tourism infrastructure and services...Lucius Clay (right), deputy military gover - nor of Germany after World War II, talks with General Dwight D. Eisenhower during the Potsdam Conference...intervening forces cannot reform gover - nance, economics, and security independently of one another. these functions are interdependent. Iraq

  12. Smart Adaptive Socket to Improve Fit and Relieve Pain in Wounded Warriors

    DTIC Science & Technology

    2016-10-01

    applications were developed for wireless interaction with the socket system firmware. A control algorithm was designed and tested. Clinical trial...interface, Dynamic segmental volume control, Wireless connection, Pressure control system. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...charging jack, and power button are included in the design. A Bluetooth 4 radio is also included to allow for advanced user control via smartphone. The

  13. CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 2, March/April 2010

    DTIC Science & Technology

    2010-04-01

    SDLC phase. 4. Developing secure software depends on understanding the operational con- text in which it will be used. This con- text includes... its development . BSI leverages the Common Weakness Enumeration (CWE) and the Common Attack Pattern Enumeration and Classification (CAPEC) efforts. To...system integrators providing sys- tems (both IT and warfighting) to the Concept Refinement Technology Development System Development and

  14. CTC Sentinel. Volume 3, Issue 4

    DTIC Science & Technology

    2010-04-01

    The attack targeted a popular German bakery located in the Koregaon Park area. The bakery is situated near a Hindu spiritual center (Osho...nitrate, RDX explosives and petroleum hydrocarbon oil.2 The bakery was likely targeted because it is located in a crowded area and more vulnerable...frequent the area. It is likely that the militants selected the bakery either due to heightened security measures at the respective spiritual and

  15. Air Force Journal of Logistics. Volume 34, Numbers 3 and 4, 2011

    DTIC Science & Technology

    2011-01-01

    best value. Since these scores are mathematically derived, they violate some agencies* procurement policies (those that require qualitative ratings...the trust fund assets will be exhausted and Social Security will lack the resources to pay all promised benefits. According to SSA actuaries ...education programs (masters degrees) than either the Air Force or the Army. This was quite surprising. Mathematical Model to Determine Senior Officers

  16. The DISAM Journal of International Security Assistance Management. Volume 31, Number 2, August 2009

    DTIC Science & Technology

    2009-08-01

    implementation of existing labor laws and regulations for all workers, especially for construction and household workers. 28The DISAM Journal, August... constructive relationship with our Chinese 48The DISAM Journal, August 2009 counterparts. Through cooperation and candor, we aim to reduce the chances...from the Asia-Pacifi c. This was a remarkable gathering, and the informal setting encouraged candor and constructive dialogue. Discussions during

  17. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 12, December 2006

    DTIC Science & Technology

    2006-12-01

    Feature-Oriented Domain Analysis ( FODA ) FODA is a domain analysis and engineer- ing method that focuses on developing reusable assets [9]. By examining...Eliciting Security Requirements This article describes an approach for doing trade-off analysis among requirements elicitation methods. by Dr. Nancy R...high-level requirements are addressed and met in the requirements work products. 3. Unclear requirements Mitigation Perform requirements analysis and

  18. Instrumentation for Linear and Nonlinear Optical Device Characterization

    DTIC Science & Technology

    2018-01-31

    1998. 4. TITLE. Enter title and subtitle with volume number and part number, if applicable. On classified documents, enter the title classification...with security classification regulations, e.g. U, C, S, etc. If this form contains classified information, stamp classification level on the top...hundreds of picoseconds. Figure 3 illustrates example data taken from the oscilloscope. 0 5 10 15 Time (ns) 20 25 30 Figure 3. (a) A screen shot

  19. Energy Security in the United States

    DTIC Science & Technology

    2012-05-01

    gas facility. Biomass can also be burned with coal (at volumes of up to 10 percent without affecting performance) to generate electricity.26 In...2008, coal-burning facilities substituted biomass for coal to generate 1.3 percent of electricity. 26. See David Ortiz and others, Near-Term...Opportunities for Integrat- ing Biomass into the U.S. Electricity Supply (Santa Monica, Calif.: RAND, 2011), www.rand.org/pubs/technical_reports/ TR984.html

  20. Military and Security Developments Involving the People’s Republic of China 2013

    DTIC Science & Technology

    2013-01-01

    discussions have stalled over pricing differences. China’s Top Crude Suppliers 2011 Country Volume (1,000 barrels per day) Percentage of...the transfer or disclosure of U.S.-origin defense articles, defense services, technical data, and/or technology to China. Additionally, Public Law... transfer or export of defense articles (including technical data) and defense services. Beijing primarily conducts arms sales to enhance foreign

  1. Strengthening United States National Security Through Education in the African American Community

    DTIC Science & Technology

    1993-04-01

    Howard University , 1974, "Can America Solve Its Biggest Problems?" Focus. February & March 1992: 5-6. Chubb, John E. and...Antoine M.,"Educating and Motivating African American Males to Succeed", The Journal of Negro Eci. Howard University , Washington DC: Howard University Press...Jerome,"Strategies for Success", The Journal of Nearo Education. Howard University , Washington DC: Howard University Press, Volume 59, Number 2,

  2. Defense AT&L (Volume 37, Number 2, March-April 2008)

    DTIC Science & Technology

    2008-04-01

    environment. Operational suit- ability is the degree to which a system can be satisfactorily placed in field use, with consideration given to reliability...devise the most effective test-and-evaluation strategy. Whenever possible, the program should be developed and fielded in small increments and provided... ability to control access to design-related informa- tion and availability of technology, and it will raise grave security considerations. Do you develop

  3. Defense AT&L. Volume 40, Number 3, May-June 2011

    DTIC Science & Technology

    2011-05-01

    181, Sections 886, January 2008) and is implemented by the Defense Federal Acquisition Regulation Supplement (DFARS) Subpart 225.77. Origins of...of Defense Technology and the Lessons of History IGA Robert Ranquet, IHEDN, Paris The United States has long relied on tech-nology to secure...Gen. Vincent Desportes, latest commandant of the French National War College, puts it in his recent book, La Guerre Probable ( Paris , 2008: Economica

  4. Department of Defense Annual Statement of Assurance, Volume II for Fiscal Year 1996.

    DTIC Science & Technology

    1996-12-01

    FY 1996. US Army Audit Agency (USAAA) conducted a multilocation audit of contract security requirements at the request of the US Army Contracting...corrective action(s) are certified by the responsible components upon completion and reviewed through on-site verification, subsequent audit . inspection...requirement for processing Navy pricing inquiries received by DLA inventory control points. 9/97 Verification: Subsequent on-site verification. audit

  5. ERDYM: Economic Recovery Dynamics Model. Volume 1. Modifications and Simulations.

    DTIC Science & Technology

    1984-05-01

    Pacific Northwest Laboratories AEAOKNTUSR P.O. Bx 999FEMA Work Unit 4342-D * Richland, Washington 99352 I. CONTROLLING OFFICE NAME AND ADDRESS 12...dleu.,m, hft Controlling Office) 15. SECURITY CLASS. (of thls report) Unclassified I 1a. DECLASSIFICATION/DOWNGRADING SCHEDULE 16. DISTRIBUTION...rationinq and wage and price controls . 2.6.1 Economic Role of Government Revenues * The representation of government financinq in ERDYM is straiqhtfoward. 9

  6. Fe moments in the pressure-induced collapsed tetragonal phase of (Ca0.67Sr0.33) Fe2As2

    NASA Astrophysics Data System (ADS)

    Jeffries, Jason; Butch, Nicha; Bradley, Joseph; Xiao, Yuming; Chow, Paul; Saha, Shanta; Kirshenbaum, Kevin; Paglione, Johnpierre

    2013-06-01

    The tetragonal AEFe2As2 (AE =alkaline earth element) family of iron-based superconductors exhibits magnetic order at ambient pressure and low temperature. Under pressure, the magnetic order is suppressed, and an isostructural volume collapse is induced due to increased As-As bonding across the mirror plane of the structure. This collapsed tetragonal phase has been shown to support superconductivity under some conditions, and theoretical calculations suggest an unconventional origin. Theoretical calculations also reveal that enhanced As-As bonding and the magnitude of the Fe moments are correlated, suggesting that the Fe moments can be quenched in the collapsed tetragonal phase. Whether the Fe moments persist in the collapsed tetragonal phase has implications for the pairing mechanism of the observed, pressure-induced superconductivity in these compounds. We will present pressure- dependent x-ray emission spectroscopy (XES) measurements that probe the Fe moments through the volume collapse transition of (Ca0.67Sr0.33) Fe2As2. These measurements will be compared with previously reported phase diagrams that include superconductivity. Lawrence Livermore National Laboratory is operated by Lawrence Livermore National Security, LLC, for the US Department of Energy (DOE), National Nuclear Security Administration under Contract No. DE-AC52-07NA27344.

  7. Trends in Primary and Revision Hip Arthroplasty Among Orthopedic Surgeons Who Take the American Board of Orthopedics Part II Examination.

    PubMed

    Eslam Pour, Aidin; Bradbury, Thomas L; Horst, Patrick K; Harrast, John J; Erens, Greg A; Roberson, James R

    2016-07-01

    A certified list of all operative cases performed within a 6-month period is a required prerequisite for surgeons taking the American Board of Orthopaedic Surgery Part II oral examination. Using the American Board of Orthopaedic Surgery secure Internet database database containing these cases, this study (1) assessed changing trends for primary and revision total hip arthroplasty (THA) and (2) compared practices and early postoperative complications between 2 groups of examinees, those with and without adult reconstruction fellowship training. Secure Internet database was searched for all 2003-2013 procedures with a Current Procedural Terminology code for THA, hip resurfacing, hemiarthroplasty, revision hip arthroplasty, conversion to THA, or removal of hip implant (Girdlestone, static, or dynamic spacer). Adult reconstruction fellowship-trained surgeons performed 60% of the more than 33,000 surgeries identified (average 28.1) and nonfellowship-trained surgeons performed 40% (average 5.2) (P < .001). Fellowship-trained surgeons performed significantly more revision surgeries for infection (71% vs 29%)(P < .001). High-volume surgeons had significantly fewer complications in both primary (11.1% vs 19.6%) and revision surgeries (29% vs 35.5%) (P < .001). Those who passed the Part II examination reported higher rates of complications (21.5% vs 19.9%). In early practice, primary and revision hip arthroplasties are often performed by surgeons without adult reconstruction fellowship training. Complications are less frequently reported by surgeons with larger volumes of joint replacement surgery who perform either primary or more complex cases. Primary hip arthroplasty is increasingly performed by surgeons early in practice who have completed an adult reconstructive fellowship after residency training. This trend is even more pronounced for more complex cases such as revision or management of infection. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. Ultra-Low-Noise W-Band MMIC Detector Modules

    NASA Technical Reports Server (NTRS)

    Gaier, Todd C.; Samoska, Lorene A.; Kangaslahti, Pekka P.; Van Vinkle, Dan; Tantawi, Sami; Fox, John; Church, Sarah E.; Lau, Jusy M.; Sieth, Matthew M.; Voll, Patricia E.; hide

    2010-01-01

    A monolithic microwave integrated circuit (MMIC) receiver can be used as a building block for next-generation radio astronomy instruments that are scalable to hundreds or thousands of pixels. W-band (75-110 GHz) low-noise receivers are needed for radio astronomy interferometers and spectrometers, and can be used in missile radar and security imagers. These receivers need to be designed to be mass-producible to increase the sensitivity of the instrument. This innovation is a prototyped single-sideband MMIC receiver that has all the receiver front-end functionality in one small and planar module. The planar module is easy to assemble in volume and does not require tuning of individual receivers. This makes this design low-cost in large volumes.

  9. [MORPHOLOGICAL CHANGES OF THE LIVER IN OBTURATION JAUNDICE, CAUSED BY CHOLEDOCHOLITHIASIS, DEPENDING ON ITS DURATION].

    PubMed

    Sipliviy, V A; Yevtushenko, D V; Naumova, O V; Andreyeshchev, S A; Yevtushenko, A V

    2016-02-01

    Abstract The results of surgical treatment of 184 patients for obturation jaundice, caused by choledocholithiasis, were analyzed. Morphological changes of the liver were studied in 20 patients. There were three groups of patients delineated, depending on the obturation jaundice duration: up to 7 days, from 8 to 14 days, more than 15 days, and also a group of patients after the bile outflow restoration. The obturation jaundice occurrence in choledocholithiasis is accompanied by significant morphological changes in the liver, severity of which is enhancing while the obturation jaundice persistence increasing. While persistence of obturation jaundice through 8 days and more the connective tissue volume is enhancing, a relative volume of hepatocytes is reducing and a stromal-parenchymatous index is increasing. The bile outflow restoration secures significant reduction of intensity of alterative and inflammatory changes in hepatic parenchyma, as well as activation of reparative processes in the tissue. In cholangitis, caused by P. aeruginosa and E. coli, according to morphological investigations data, in the liver a diffuse purulent cholangitis on background of chronic changes in accordance to duration of the obturation jaundice persists.

  10. Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention.

    PubMed

    Jacquez, Geoffrey M; Essex, Aleksander; Curtis, Andrew; Kohler, Betsy; Sherman, Recinda; Emam, Khaled El; Shi, Chen; Kaufmann, Andy; Beale, Linda; Cusick, Thomas; Goldberg, Daniel; Goovaerts, Pierre

    2017-07-01

    As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement of science by posing substantial obstacles to the sharing of data to validate research results, but they are obstacles to conducting certain research projects in the first place. Geospatial cryptography involves the specification, design, implementation and application of cryptographic techniques to address privacy, confidentiality and security concerns for geographically referenced data. This article defines geospatial cryptography and demonstrates its application in cancer control and surveillance. Four use cases are considered: (1) national-level de-duplication among state or province-based cancer registries; (2) sharing of confidential data across cancer registries to support case aggregation across administrative geographies; (3) secure data linkage; and (4) cancer cluster investigation and surveillance. A secure multi-party system for geospatial cryptography is developed. Solutions under geospatial cryptography are presented and computation time is calculated. As services provided by cancer registries to the research community, de-duplication, case aggregation across administrative geographies and secure data linkage are often time-consuming and in some instances precluded by confidentiality and security concerns. Geospatial cryptography provides secure solutions that hold significant promise for addressing these concerns and for accelerating the pace of research with human subjects data residing in our nation's cancer registries. Pursuit of the research directions posed herein conceivably would lead to a geospatially encrypted geographic information system (GEGIS) designed specifically to promote the sharing and spatial analysis of confidential data. Geospatial cryptography holds substantial promise for accelerating the pace of research with spatially referenced human subjects data.

  11. An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

    NASA Astrophysics Data System (ADS)

    Khan, Muazzam A.; Ahmad, Jawad; Javaid, Qaisar; Saqib, Nazar A.

    2017-03-01

    Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN can be found in smart homes, intelligent buildings, health care, energy efficient smart grids and industrial control systems. In recent years, computer scientists has focused towards findings more applications of WSN in multimedia technologies, i.e. audio, video and digital images. Due to bulky nature of multimedia data, WSN process a large volume of multimedia data which significantly increases computational complexity and hence reduces battery time. With respect to battery life constraints, image compression in addition with secure transmission over a wide ranged sensor network is an emerging and challenging task in Wireless Multimedia Sensor Networks. Due to the open nature of the Internet, transmission of data must be secure through a process known as encryption. As a result, there is an intensive demand for such schemes that is energy efficient as well as highly secure since decades. In this paper, discrete wavelet-based partial image encryption scheme using hashing algorithm, chaotic maps and Hussain's S-Box is reported. The plaintext image is compressed via discrete wavelet transform and then the image is shuffled column-wise and row wise-wise via Piece-wise Linear Chaotic Map (PWLCM) and Nonlinear Chaotic Algorithm, respectively. To get higher security, initial conditions for PWLCM are made dependent on hash function. The permuted image is bitwise XORed with random matrix generated from Intertwining Logistic map. To enhance the security further, final ciphertext is obtained after substituting all elements with Hussain's substitution box. Experimental and statistical results confirm the strength of the anticipated scheme.

  12. Public-Private Ventures for Morale, Welfare, and Recreation Activities. A Solution to the Loss of Appropriated Funds. Volume 5. Appendices J, K, and L

    DTIC Science & Technology

    1990-07-01

    5 H. Instructions to Offerors ..................................... V-5 VI. Evaluation Factors for Award .................................. VI- 1 A...providing capital improvements, and providing payments to the NAFI (Section VI). These factors will be weighted in the evaluation. The Contracting...maintenance of good order and discipline, security checks, control of drugs and alcohol, and building signage. g. Products and Services. All supplies

  13. Collins Center Update. Volume 14, Issue 4, July-September 2012

    DTIC Science & Technology

    2012-09-01

    Strategic Leader Staff Ride Program 2012 • Initiation of “Quick-Turn” Wargame Concept • Combating Terrorism Seminar at the Romanian National Defense...ians, and resident students aid in communicating cur- rent Army issues to these prominent leaders in Amer- ica. Tufts University’s Fletcher School...of Law and Diplo- macy kicked off the 2012 season in early April with 22 partici- pating graduate students enrolled in the International Security

  14. Biological Effects of Short, High-Level Exposure to Gases: Ammonia

    DTIC Science & Technology

    1980-05-01

    NMRAMI~ N UBR Fort Detrick, Frederick. MD 21701 14. MONITORING AGEINCY MNA ADORSA(If 4111ten, five CmoIelaid Off..) IS. SECURITY CLASS. (of Ole rePert...physiology, manifested either by increased or de - creased ventilation minute volume, have been reported at concentrations over 150 ppm (104 mg/m3...as have occurred generally have been attributed to acute pulmonary edema . Surviving patients with * residual pulmonary dysfunction usually have had

  15. CTC Sentinel. Volume 9, Issue 9

    DTIC Science & Technology

    2016-09-01

    expiration date on the Islamic State’s caliphate project. With the group under growing pressure in Iraq and Syria, Jacob Shapiro argues that the... group has built up a powerful presence, while Anne Stenersen details how the group is making a comeback in the country from which it launched the 9...Previously, he served at the White House for four years as Assistant to the President for Homeland Security and Counterterrorism. During that time, he

  16. LOGAM (Logistic Analysis Model). Volume 3. Technical/Programmer Manual.

    DTIC Science & Technology

    1982-08-01

    ADDRESS(If different from Controlling Office) 15. SECURITY CLASS. (of this report) UNCLASS IF I ED IS. DECL ASSI FICATI ON/ DOWNGRADING SCHEDULE 16...It different from Report) S0. SUPPLEMENTARY NOTES It. KEY WOROS (Continue an rvereoe side It necesary end identify by block numiber) Logistics... different even though the concepts developed have the same support levels. For example, lets assume one wants to model a typical 4 level maintenance concept

  17. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 11

    DTIC Science & Technology

    2005-11-01

    languages. Our discipline of software engineering has really experienced phenomenal growth right before our eyes. A sign that software design has...approach on a high level of abstraction. The main emphasis is on the identification and allocation of a needed functionality (e.g., a target tracker ), rather...messaging software that is the backbone of teenage culture. As increasing security constraints will increase the cost of developing and main- taining any

  18. Army Sustainment. Volume 44, Issue 2, March-April 2012

    DTIC Science & Technology

    2012-04-01

    b.a. deGree in criMinal justice adMinistration froM con- cordia colleGe in MicHiGan. He is leVel iii certified in loGistics ManaGeMent and leVel ii...book and unit supply), plant maintenance, finance, and Defense Forces and Public Security (DFPS). Together, these modules provide enhanced...maintenance-related information for all assigned assets. The plant maintenance module provides users with equipment readiness and enhanced personnel

  19. 2008 Homeland Security S and T Stakeholders Conference West-Volume 3 Tuesday

    DTIC Science & Technology

    2008-01-16

    Architecture ( PNNL SRS) • Online data collection / entry • Data Warehouse • On Demand Analysis and Reporting Tools • Reports, Charts & Graphs • Visual / Data...Sustainability 2007– 2016 Our region wide investment include all PANYNJ business areas Computer Statistical Analysis COMPSTAT •NYPD 1990’s •Personnel Management...Coast Guard, and public health Expertise, Depth, Agility Staff Degrees 6 Our Value Added Capabilities • Risk Analysis • Operations Analysis

  20. Promoting International Energy Security: Volume 4, The Gulf of Guinea

    DTIC Science & Technology

    2012-01-01

    Politicians, both federal and state, routinely 2 For a recent and concise review of stability in Nigeria, see Nigeria: Assessing Risks to Stability (Lewis...Export Customer for ATR 42MP,” Defense News, December 10, 2009. Lewis, Peter M., Nigeria: Assessing Risks to Stability, Washington, D.C.: Center for...especially the risks that U.S.-provided military capabilities might be applied to local civilian populations. While there are signs of improved governance

Top