Sample records for security survey module

  1. Measurement of household food security in the USA and other industrialised countries.

    PubMed

    Radimer, Kathy L; Radimer, Kathy L

    2002-12-01

    To describe the history and current status of household food security measurement. In the 1980s evidence of rising levels of hunger was a concern for many, but disputed by some, Americans. Acknowledgement and quantification of hunger was hindered by the lack of an accepted definition and measure of hunger. Qualitative research at Cornell provided a conceptual framework, description, definition and survey items for hunger. The Community Childhood Hunger Identification Project developed an instrument used in numerous communities. Based upon these initiatives, widely accepted definitions of hunger and food insecurity, and the US Household Food Security Module for its measurement, now exist. The module classifies households as food-secure, or food-insecure without hunger or with moderate or severe hunger, and contains household-, adult- and child-referent items. Its inclusion in the Current Population Survey (CPS) since 1995 has yielded annual estimates of food insecurity. A six-item short form of the module, for surveys with severe time constraints, classifies households only as food-secure or food-insecure without or with hunger and contains no child-specific items. Surveys using the 18-item or short-form module can compare results with published national data from the CPS. Information about the module is available at http://www.ers.usda.gov/briefing/foodsecurity and http://www.fns.usda/fsec. Current research on food security measurement includes measurement of individual food insecurity and hunger, module performance regarding hunger duration and frequency, performance of the module in population sub-groups, and the effect of translations on module meaning and performance. National surveys in Canada, New Zealand and Australia also have measured food security.

  2. Development of a conceptually equivalent Chinese-language translation of the US Household Food Security Survey Module for Chinese immigrants to the USA.

    PubMed

    Kwan, Christine Ml; Napoles, Anna M; Chou, Jeyling; Seligman, Hilary K

    2015-02-01

    To develop a conceptually equivalent Chinese-language translation of the eighteen-item US Household Food Security Survey Module. In the current qualitative study, we (i) highlight methodological challenges which arise in developing survey instruments that will be used to make comparisons across language groups and (ii) describe the development of a Chinese-language translation of the US Household Food Security Survey Module, called the San Francisco Chinese Food Security Module. Community sites in San Francisco, CA, USA. We conducted cognitive interviews with twenty-two community members recruited from community sites hosting food pantries and with five professionals recruited from clinical settings. Development of conceptually equivalent surveys can be difficult. We highlight challenges related to dialect, education, literacy (e.g. preferences for more or less formal phrasing), English words and phrases for which there is no Chinese language equivalent (e.g. 'balanced meals' and 'eat less than you felt you should') and response formats. We selected final translations to maximize: (i) consistency of the Chinese translation with the intent of the English version; (ii) clarity; and (iii) similarities in understanding across dialects and literacy levels. Survey translation is essential for conducting research in many communities. The challenges encountered illustrate how literal translations can affect the conceptual equivalence of survey items across languages. Cognitive interview methods should be routinely used for survey translation when such non-equivalence is suspected, such as in surveys addressing highly culturally bound behaviours such as diet and eating behaviours. Literally translated surveys lacking conceptual equivalence may magnify or obscure important health inequalities.

  3. Development of a conceptually equivalent Chinese-language translation of the US Household Food Security Survey Module for Chinese immigrants to the USA

    PubMed Central

    Kwan, Christine ML; Napoles, Anna M; Chou, Jeyling; Seligman, Hilary K

    2014-01-01

    Objective To develop a conceptually equivalent Chinese-language translation of the eighteen-item US Household Food Security Survey Module. Design In the current qualitative study, we (i) highlight methodological challenges which arise in developing survey instruments that will be used to make comparisons across language groups and (ii) describe the development of a Chinese-language translation of the US Household Food Security Survey Module, called the San Francisco Chinese Food Security Module. Setting Community sites in San Francisco, CA, USA. Subjects We conducted cognitive interviews with twenty-two community members recruited from community sites hosting food pantries and with five professionals recruited from clinical settings. Results Development of conceptually equivalent surveys can be difficult. We highlight challenges related to dialect, education, literacy (e.g. preferences for more or less formal phrasing), English words and phrases for which there is no Chinese language equivalent (e.g. ‘balanced meals’ and ‘eat less than you felt you should’) and response formats. We selected final translations to maximize: (i) consistency of the Chinese translation with the intent of the English version; (ii) clarity; and (iii) similarities in understanding across dialects and literacy levels. Conclusions Survey translation is essential for conducting research in many communities. The challenges encountered illustrate how literal translations can affect the conceptual equivalence of survey items across languages. Cognitive interview methods should be routinely used for survey translation when such non-equivalence is suspected, such as in surveys addressing highly culturally bound behaviours such as diet and eating behaviours. Literally translated surveys lacking conceptual equivalence may magnify or obscure important health inequalities. PMID:24642365

  4. Food Insecurity: Is It an Issue among Tertiary Students?

    ERIC Educational Resources Information Center

    Gallegos, Danielle; Ramsey, Rebecca; Ong, Kai Wen

    2014-01-01

    Insufficient access to food is known to compromise tertiary studies. Students often belong to groups known to have poor food security such as those renting or relying on government payments. The present study administered a cross-sectional survey incorporating the USDA food security survey module (FSSM) to 810 students at a metropolitan university…

  5. Food Insecurity among Community College Students: Prevalence and Association with Grade Point Average

    ERIC Educational Resources Information Center

    Maroto, Maya E.; Snelling, Anastasia; Linck, Henry

    2015-01-01

    This study investigated the prevalence of food insecurity among community college students (N = 301) and the relationship between food insecurity and student grade point average (GPA). It employed a cross-sectional intercept survey, utilizing the U.S. Department of Agriculture's Household Food Security Survey Module, student self-reported GPA, and…

  6. Utilising a multi-item questionnaire to assess household food security in Australia.

    PubMed

    Butcher, Lucy M; O'Sullivan, Therese A; Ryan, Maria M; Lo, Johnny; Devine, Amanda

    2018-03-15

    Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed to underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables. Two online surveys were completed by 2334 Australian participants from November 2014 to February 2015. Surveys contained the short form of the HFSSM and twelve socio-demographic questions. Cross-tabulations chi-square tests and a multinomial logistic regression model were employed to analyse the survey data. Food security status of the respondents was classified accordingly: High or Marginal (64%, n = 1495), Low (20%, n = 460) or Very Low (16%, n = 379). Significant independent predictors of food security were age (P < .001), marital status (P = .005), household income (P < .001) and education (P < .001). Findings suggest food insecurity is an important issue across Australia and that certain groups, regardless of income, are particularly vulnerable. Government policy and health promotion interventions that specifically target "at risk" groups may assist to more effectively address the problem. Additionally, the use of a multi-item measure is worth considering as a national indicator of food security in Australia. © 2018 Australian Health Promotion Association.

  7. Household Food Security in Isfahan Based on Current Population Survey Adapted Questionnaire

    PubMed Central

    Rafiei, Morteza; Rastegari, Hosein Ali; Ghiasi, Mojdeh; Shahsanaie, Vahid

    2013-01-01

    Background: Food security is a state in which all people at every time have physical and economic access to adequate food to obviate nutritional needs and live a healthy and active life. Therefore, this study was performed to quantitatively evaluate the household food security in Esfahan using the localized version of US Household Food Security Survey Module (US HFSSM). Methods: This descriptive cross-sectional study was performed in year 2006 on 3000 households of Esfahan. The study instrument used in this work is 18-item US food security module, which is developed into a localized 15-item questionnaire. This study is performed in two stages of families with no children (under 18 years old) and families with children over 18 years old. Results: The results showed that item severity coefficient, ratio of responses given by households and item infit and outfit coefficient in adult's and children's questionnaire respectively. According to obtained data, scale score of +3 in adults group is described as determination limit of slight food insecurity and +6 is stated as the limit for severe food insecurity. For children's group, scale score of +2 is defined to be the limit of slight food insecurity and +5 is the determination limit of severe food insecurity. Conclusions: The main hypothesis of this survey analysis is based on the raw scale score of USFSSM The item of “lack of enough money for buying food” (item 2) and the item of “lack of balanced meal” (3rd item) have the lowest severity coefficient. Then, the ascending rate of item severity continues in first item, 4th item and keeps increasing into 10th item. PMID:24498498

  8. Iron deficiency is associated with food insecurity in pregnant females in the United States: National Health and Nutrition Examination Survey 1999-2010.

    PubMed

    Park, Clara Y; Eicher-Miller, Heather A

    2014-12-01

    Food-insecure pregnant females may be at greater risk of iron deficiency (ID) because nutrition needs increase and more resources are needed to secure food during pregnancy. This may result in a higher risk of infant low birth weight and possibly cognitive impairment in the neonate. The relationships of food insecurity and poverty income ratio (PIR) with iron intake and ID among pregnant females in the United States were investigated using National Health and Nutrition Examination Survey 1999-2010 data (n=1,045). Food security status was classified using the US Food Security Survey Module. One 24-hour dietary recall and a 30-day supplement recall were used to assess iron intake. Ferritin, soluble transferrin receptor, or total body iron classified ID. Difference of supplement intake prevalence, difference in mean iron intake, and association of ID and food security status or PIR were assessed using χ(2) analysis, Student t test, and logistic regression analysis (adjusted for age, race, survey year, PIR/food security status, education, parity, trimester, smoking, C-reactive protein level, and health insurance coverage), respectively. Mean dietary iron intake was similar among groups. Mean supplemental and total iron intake were lower, whereas odds of ID, classified by ferritin status, were 2.90 times higher for food-insecure pregnant females compared with food-secure pregnant females. Other indicators of ID were not associated with food security status. PIR was not associated with iron intake or ID. Food insecurity status may be a better indicator compared with income status to identify populations at whom to direct interventions aimed at improving access and education regarding iron-rich foods and supplements. Copyright © 2014 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  9. Associations between Food Security Status and Dietary Inflammatory Potential within Lower-Income Adults from the United States National Health and Nutrition Examination Survey, Cycles 2007 to 2014.

    PubMed

    Bergmans, Rachel S; Palta, Mari; Robert, Stephanie A; Berger, Lawrence M; Ehrenthal, Deborah B; Malecki, Kristen M

    2018-06-01

    Evidence suggests both that chronic inflammation mediates the association of food insecurity with adverse health outcomes and that diet may be a significant source of inflammation among food insecure individuals. To examine whether food security status is associated with dietary inflammatory potential. Cross-sectional data came from the National Health and Nutrition Examination Survey (NHANES), cycles 2007 to 2014 (n=10,630). The analysis sample is representative of noninstitutionalized US adults with an income-to-poverty ratio ≤3.00. Dietary Inflammatory Index (DII) score, calculated using the average of two 24-hour dietary recalls, was the main outcome measure. Type III F tests or χ 2 tests compared population characteristics by food security status, defined using the US Food Security Survey Module. Multivariable linear regression was used to estimate the association between food security status and the DII score and moderation by demographic factors. Survey weighting procedures accounted for the effects of stratification and clustering used in the NHANES study design. When accounting for socioeconomic status, demographic factors, and health status, DII score was higher at greater levels of food insecurity (P=0.0033). Those with very low food security had a 0.31 (95% CI=0.12 to 0.49) higher DII score than those with high food security. Age moderated the association between food security status and DII score (interaction P=0.0103), where the magnitude of the association between DII score and severity of food insecurity was higher for those >65 years than for younger age groups. Food security status may be associated with dietary inflammatory potential, which is hypothesized to play a role in multiple chronic health conditions. Further research is needed to determine the causal nature of this relationship and evaluate how best to implement programs designed to address health disparities within food insecure populations. Copyright © 2018 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  10. The Prevalence of Food Security and Insecurity Among Illinois University Students.

    PubMed

    Morris, Loran Mary; Smith, Sylvia; Davis, Jeremy; Null, Dawn Bloyd

    2016-06-01

    This study aims to define the food security status of Illinois university students and whether sociodemographic characteristics are related to that status. A cross-sectional research design was used to analyze the food security status of undergraduate Illinois university students, employing a survey containing the Household Food Security Survey Module that was distributed via e-mail to student participants. Four public Illinois universities were highlighted, including Eastern Illinois University, Northern Illinois University, Southern Illinois University, and Western Illinois University. A total of 1,882 undergraduate students participated in the research study in April, 2013. Variables include food security status and sociodemographic characteristics such as age, sex, race, and academic standing. Statistical analysis included frequencies and chi-square tests. The percentage of student respondents in the total sample who were considered food insecure was 35.0%. There were significant relationships between food security status and sociodemographic variables including race, grade point average, loan use, and living location. This study suggests that 35% of respondents were food insecure based on quantitative assessment. Understanding the significant relationship between food security status and race, grade point average, loan use, and living location may be useful in developing services for those in need. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  11. Children’s reporting of food insecurity in predominately food insecure households in Texas border colonias

    PubMed Central

    2013-01-01

    Background Food insecurity is associated with detrimental physical, psychological, behavioral, social, and educational functioning in children and adults. Greater than one-quarter of all Hispanic households in the U.S. are food insecure. Hispanic families in the U.S. comprise 30% of households with food insecurity at the child level, the most severe form of the condition. Methods Food security discordance was evaluated among 50 Mexican-origin children ages 6–11 and their mothers living in Texas border colonias from March to June 2010. Mothers and children were interviewed separately using promotora-researcher administered Spanish versions of the Household Food Security Survey Module and the Food Security Survey Module for Youth. Cohen’s kappa statistic (κ) was used to analyze dyadic agreement of food security constructs and level of food security. Results Eighty percent of mothers reported household food insecurity while 64% of children identified food insecurity at the child level. There was slight inter-rater agreement in food security status (κ = 0.13, p = 0.15). Poor agreement was observed on the child hunger construct (κ = −0.06, p = 0.66) with fair agreement in children not eating for a full day (κ = 0.26, p < 0.01) and relying on low-cost foods (κ = 0.23, p = 0.05). Conclusions Mother and child-reported household and child-level food insecurity among this sample of limited-resource Mexican-origin colonias residents far surpass national estimates. While the level of dyadic agreement was poor, discordance may be attributable to parental buffering, social desirability in responses, and/or the age of children included in the present analysis. Future research should continue to explore how food security is understood from the perspectives and experiences of children and adolescents. PMID:23356877

  12. Rasch Analyses of Very Low Food Security among Households and Children in the Three City Study*

    PubMed Central

    Moffitt, Robert A.; Ribar, David C.

    2017-01-01

    The longitudinal Three City Study of low-income families with children measures food hardships using fewer questions and some different questions from the standard U.S. instrument for measuring food security, the Household Food Security Survey Module (HFSSM) in the Current Population Survey (CPS). We utilize a Rasch measurement model to identify thresholds of very low food security among households and very low food security among children in the Three City Study that are comparable to thresholds from the HFSSM. We also use the Three City Study to empirically investigate the determinants of food insecurity and of these specific food insecurity outcomes, estimating a multivariate behavioral Rasch model that is adapted to address longitudinal data. The estimation results indicate that participation in the Supplemental Nutrition Assistance Program and the Temporary Assistance for Needy Families program reduce food insecurity, while poverty and disability among caregivers increase it. Besides its longitudinal structure, the Three City Study measures many more characteristics about households than the CPS. Our estimates reveal that financial assistance through social networks and a household's own financial assets reduce food insecurity, while its outstanding loans increase insecurity. PMID:29187764

  13. Rasch Analyses of Very Low Food Security among Households and Children in the Three City Study.

    PubMed

    Moffitt, Robert A; Ribar, David C

    2016-04-01

    The longitudinal Three City Study of low-income families with children measures food hardships using fewer questions and some different questions from the standard U.S. instrument for measuring food security, the Household Food Security Survey Module (HFSSM) in the Current Population Survey (CPS). We utilize a Rasch measurement model to identify thresholds of very low food security among households and very low food security among children in the Three City Study that are comparable to thresholds from the HFSSM. We also use the Three City Study to empirically investigate the determinants of food insecurity and of these specific food insecurity outcomes, estimating a multivariate behavioral Rasch model that is adapted to address longitudinal data. The estimation results indicate that participation in the Supplemental Nutrition Assistance Program and the Temporary Assistance for Needy Families program reduce food insecurity, while poverty and disability among caregivers increase it. Besides its longitudinal structure, the Three City Study measures many more characteristics about households than the CPS. Our estimates reveal that financial assistance through social networks and a household's own financial assets reduce food insecurity, while its outstanding loans increase insecurity.

  14. Food Security and Leukocyte Telomere Length in Adult Americans.

    PubMed

    Mazidi, Mohsen; Kengne, Andre Pascal; Vatanparast, Hassan

    2017-01-01

    Leukocyte telomere length (LTL) is a biomarker of biologic age. Whether food security status modulates LTL is still unknown. We investigated the association between food security and LTL in participants of the 1999-2002 US National Health and Nutrition Examination Survey (NHANES). Analysis of covariance (ANCOVA) was used to evaluate the association between food security categories and LTL controlling for sex, race, and education and accounting for the survey design and sample weights. We included 10,888 participants with 5228 (48.0%) being men. They were aged on average 44.1 years. In all, 2362 (21.7%) had less than high school, 2787 (25.6%) had achieved high school, while 5705 (52.5%) had done more than high school. In sex-, race-, and education-adjusted ANCOVA, average LTL (T/S ratio) for participants with high food security versus those with marginal, low, or very low food security was 1.32 versus 1.20 for the age group 25-35 years and 1.26 versus 1.11 for the 35-45 years, ( p < 0.001). The association between food insecurity and LTL shortening in young adults suggest that some of the future effects of food insecurity on chronic disease risk in this population could be mediated by telomere shortening.

  15. PV module mounting method and mounting assembly

    DOEpatents

    Lenox, Carl J.S.; Johnson, Kurt M.

    2013-04-23

    A method for mounting PV modules to a deck includes selecting PV module layout pattern so that adjacent PV module edges are spaced apart. PV mounting and support assemblies are secured to the deck according to the layout pattern using fasteners extending into the deck. The PV modules are placed on the PV mounting and support assemblies. Retaining elements are located over and secured against the upper peripheral edge surfaces of the PV modules so to secure them to the deck with the peripheral edges of the PV modules spaced apart from the deck. In some examples a PV module mounting assembly, for use on a shingled deck, comprises flashing, a base mountable on the flashing, a deck-penetrating fastener engageable with the base and securable to the deck so to secure the flashing and the base to the shingled deck, and PV module mounting hardware securable to the base.

  16. Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change.

    PubMed

    Ip, Edward H; Saldana, Santiago; Arcury, Thomas A; Grzywacz, Joseph G; Trejo, Grisel; Quandt, Sara A

    2015-10-01

    We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population.

  17. Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change

    PubMed Central

    Saldana, Santiago; Arcury, Thomas A.; Grzywacz, Joseph G.; Trejo, Grisel; Quandt, Sara A.

    2015-01-01

    Objectives. We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Methods. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. Results. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Conclusions. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population. PMID:26270304

  18. Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers.

    PubMed

    Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose

    2014-01-06

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols.

  19. Survalytics: An Open-Source Cloud-Integrated Experience Sampling, Survey, and Analytics and Metadata Collection Module for Android Operating System Apps

    PubMed Central

    Mackey, Sean

    2016-01-01

    Background We describe here Survalytics, a software module designed to address two broad areas of need. The first area is in the domain of surveys and app analytics: developers of mobile apps in both academic and commercial environments require information about their users, as well as how the apps are being used, to understand who their users are and how to optimally approach app development. The second area of need is in the field of ecological momentary assessment, also referred to as experience sampling: researchers in a wide variety of fields, spanning from the social sciences to psychology to clinical medicine, would like to be able to capture daily or even more frequent data from research subjects while in their natural environment. Objective Survalytics is an open-source solution for the collection of survey responses as well as arbitrary analytic metadata from users of Android operating system apps. Methods Surveys may be administered in any combination of one-time questions and ongoing questions. The module may be deployed as a stand-alone app for experience sampling purposes or as an add-on to existing apps. The module takes advantage of free-tier NoSQL cloud database management offered by the Amazon Web Services DynamoDB platform to package a secure, flexible, extensible data collection module. DynamoDB is capable of Health Insurance Portability and Accountability Act compliant storage of personal health information. Results The provided example app may be used without modification for a basic experience sampling project, and we provide example questions for daily collection of blood glucose data from study subjects. Conclusions The module will help researchers in a wide variety of fields rapidly develop tailor-made Android apps for a variety of data collection purposes. PMID:27261155

  20. Survalytics: An Open-Source Cloud-Integrated Experience Sampling, Survey, and Analytics and Metadata Collection Module for Android Operating System Apps.

    PubMed

    O'Reilly-Shah, Vikas; Mackey, Sean

    2016-06-03

    We describe here Survalytics, a software module designed to address two broad areas of need. The first area is in the domain of surveys and app analytics: developers of mobile apps in both academic and commercial environments require information about their users, as well as how the apps are being used, to understand who their users are and how to optimally approach app development. The second area of need is in the field of ecological momentary assessment, also referred to as experience sampling: researchers in a wide variety of fields, spanning from the social sciences to psychology to clinical medicine, would like to be able to capture daily or even more frequent data from research subjects while in their natural environment. Survalytics is an open-source solution for the collection of survey responses as well as arbitrary analytic metadata from users of Android operating system apps. Surveys may be administered in any combination of one-time questions and ongoing questions. The module may be deployed as a stand-alone app for experience sampling purposes or as an add-on to existing apps. The module takes advantage of free-tier NoSQL cloud database management offered by the Amazon Web Services DynamoDB platform to package a secure, flexible, extensible data collection module. DynamoDB is capable of Health Insurance Portability and Accountability Act compliant storage of personal health information. The provided example app may be used without modification for a basic experience sampling project, and we provide example questions for daily collection of blood glucose data from study subjects. The module will help researchers in a wide variety of fields rapidly develop tailor-made Android apps for a variety of data collection purposes.

  1. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    PubMed Central

    Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols. PMID:24399155

  2. Food insecurity, a determinant of obesity? - an analysis from a population-based survey in the Paris metropolitan area, 2010.

    PubMed

    Martin-Fernandez, Judith; Caillavet, France; Lhuissier, Anne; Chauvin, Pierre

    2014-01-01

    The relationship between food insecurity and obesity is discussed in the literature. The objective of this study was to determine whether food insecurity and obesity were associated in the Paris metropolitan area. We used data from third wave of the Health, Inequalities and Social Ruptures (SIRS) cohort study, a longitudinal population-based, representative health and socioepidemiological survey of the general population in the Paris metropolitan area. The participants' BMI (calculated using self-reported height and weight) was analyzed as a continuous variable, and a dichotomous variable (BMI < 30 kg/m(2)/BMI ≥ 30 kg/m(2)) was constructed. Food insecurity was estimated using the Household Food Security Scale Module (HFSSM) and was treated as a trichotomous variable (food security / low food security / very low food security). Multilevel models were estimated for men and women separately. Obesity (BMI ≥ 30 kg/m(2)) prevalence was 10.2%. The determinant of obesity differs according to gender. After adjustment for age, income and the sociooccupational group, very low food security was associated with obesity in women (OR = 2.01, 95%CI 1.05-3.82), and women with very low food security had a higher BMI (Coef. = 1.78, 95% CI 0.24-3.31). This association, however, was not significant for men (OR = 1.84, 95%CI 0.64-5.30). In times of economic crisis, it is increasingly essential to explore and understand the pathway through which very low food security is linked to obesity.

  3. A web based Foundations of Radiological Physics for diagnostic radiology residents.

    PubMed

    Blackmon, Kevin N; Huda, Walter; Lewis, Madelene C; Tipnis, Sameer; Mah, Eugene; Frey, Donald G

    2013-03-01

    RATIONALE AND OBJECTS: We describe a new web-based physics course for radiology residents preparing for the Exam of the Future (EOF). A course was developed with a total of 12 web-based modules. Six modules were focused on "imaging" and six on "radiation." A module was subdivided into nine short "nuggets." Traditional lectures were replaced by modules using prerecorded lectures (Tegrity) to a secure website (WebCT). Each module was accompanied by three quizzes, each consisting of ten questions designed to reinforce covered materials. All online modules were accompanied by a noon conference that employed an Audience Response System (Turning Point). Seventeen first-year residents over 2 consecutive years beginning in July 2010 took this new course, and participated in an anonymous online follow-up survey (Survey Monkey). The recorded 12 modules had an overall average duration of 72 ± 19 minutes. Ten of 17 residents expressed a preference of 15 minutes for nugget duration. Highest personal assessment scores of each resident's understanding were obtained in human radiation risks and radiation protection. Residents considered supplemental noon conferences to be important for learning radiological physics. Satisfaction level was largely positive, with five residents highly satisfied, nine residents somewhat satisfied, two residents neutral, and only one resident somewhat dissatisfied. Our Foundations of Radiological Physics course was well received and served as the springboard for mastering x-ray-based imaging modalities of radiography, mammography, fluoroscopy, interventional radiology, and computed tomography. Copyright © 2013 AUR. Published by Elsevier Inc. All rights reserved.

  4. Reducing Food Insecurity and Improving Fruit and Vegetable Intake Among Farmers' Market Incentive Program Participants.

    PubMed

    Savoie-Roskos, Mateja; Durward, Carrie; Jeweks, Melanie; LeBlanc, Heidi

    2016-01-01

    To determine whether participation in a farmers' market incentive pilot program had an impact on food security and fruit and vegetable (F&V) intake of participants. Participants in the Supplemental Nutrition Assistance Program were eligible to receive a dollar-per-dollar match up to $10/wk in farmers' market incentives. The researchers used a pretest-posttest design to measure F&V intake and food security status of 54 adult participants before and after receiving farmers' market incentives. The 6-item Behavior Risk Factor Surveillance System questionnaire and US Household Food Security Survey Module were used to measure F&V intake and food security, respectively. Wilcoxon signed-rank test was used to compare scores of F&V intake. After receiving incentives, fewer individuals reported experiencing food insecurity-related behaviors. A significantly increased intake (P < .05) was found among selected vegetables. Participation in a farmers' market incentive program was positively related to greater food security and intake of select vegetables among participants in the Supplemental Nutrition Assistance Program. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  5. Relation between household food insecurity and breastfeeding in Canada

    PubMed Central

    Orr, Sarah K.; Dachner, Naomi; Frank, Lesley

    2018-01-01

    BACKGROUND: Qualitative studies have suggested that food insecurity adversely affects infant feeding practices. We aimed to determine how household food insecurity relates to breastfeeding initiation, duration of exclusive breastfeeding and vitamin D supplementation of breastfed infants in Canada. METHODS: We studied 10 450 women who had completed the Maternal Experiences — Breastfeeding Module and the Household Food Security Survey Module of the Canadian Community Health Survey (2005–2014) and who had given birth in the year of or year before their interview. We used multivariable Cox proportional hazards models and logistic regression to examine the relation between food insecurity and infant feeding practices, adjusting for sociodemographic characteristics, maternal mood disorders and diabetes mellitus. RESULTS: Overall, 17% of the women reported household food insecurity, of whom 8.6% had moderate food insecurity and 2.9% had severe food insecurity (weighted percentages). After adjustment for sociodemographic factors, women with food insecurity were no less likely than others to initiate breastfeeding or provide vitamin D supplementation to their infants. Half of the women with food insecurity ceased exclusive breastfeeding by 2 months, whereas most of those with food security persisted with breastfeeding for 4 months or more. Relative to women with food security, those with marginal, moderate and severe food insecurity had significantly lower odds of exclusive breastfeeding to 4 months, but only women with moderate food insecurity had lower odds of exclusive breastfeeding to 6 months, independent of sociodemographic characteristics (odds ratio 0.60, 95% confidence interval 0.39–0.92). Adjustment for maternal mood disorder or diabetes slightly attenuated these relationships. INTERPRETATION: Mothers caring for infants in food-insecure households attempted to follow infant feeding recommendations, but were less able than women with food security to sustain exclusive breastfeeding. Our findings highlight the need for more effective interventions to support food-insecure families with newborns. PMID:29555861

  6. Relation between household food insecurity and breastfeeding in Canada.

    PubMed

    Orr, Sarah K; Dachner, Naomi; Frank, Lesley; Tarasuk, Valerie

    2018-03-19

    Qualitative studies have suggested that food insecurity adversely affects infant feeding practices. We aimed to determine how household food insecurity relates to breastfeeding initiation, duration of exclusive breastfeeding and vitamin D supplementation of breastfed infants in Canada. We studied 10 450 women who had completed the Maternal Experiences - Breastfeeding Module and the Household Food Security Survey Module of the Canadian Community Health Survey (2005-2014) and who had given birth in the year of or year before their interview. We used multivariable Cox proportional hazards models and logistic regression to examine the relation between food insecurity and infant feeding practices, adjusting for sociodemographic characteristics, maternal mood disorders and diabetes mellitus. Overall, 17% of the women reported household food insecurity, of whom 8.6% had moderate food insecurity and 2.9% had severe food insecurity (weighted percentages). After adjustment for sociodemographic factors, women with food insecurity were no less likely than others to initiate breastfeeding or provide vitamin D supplementation to their infants. Half of the women with food insecurity ceased exclusive breastfeeding by 2 months, whereas most of those with food security persisted with breastfeeding for 4 months or more. Relative to women with food security, those with marginal, moderate and severe food insecurity had significantly lower odds of exclusive breastfeeding to 4 months, but only women with moderate food insecurity had lower odds of exclusive breastfeeding to 6 months, independent of sociodemographic characteristics (odds ratio 0.60, 95% confidence interval 0.39-0.92). Adjustment for maternal mood disorder or diabetes slightly attenuated these relationships. Mothers caring for infants in food-insecure households attempted to follow infant feeding recommendations, but were less able than women with food security to sustain exclusive breastfeeding. Our findings highlight the need for more effective interventions to support food-insecure families with newborns. © 2018 Joule Inc. or its licensors.

  7. Household food insecurity and food expenditure in Bolivia, Burkina Faso, And the Philippines.

    PubMed

    Melgar-Quinonez, Hugo R; Zubieta, Ana C; MkNelly, Barbara; Nteziyaremye, Anastase; Gerardo, Maria Filipinas D; Dunford, Christopher

    2006-05-01

    This study examined the association between food insecurity, determined by a modified version of the U.S. Household Food Security Survey Module (US HFSSM), and total daily per capita (DPC) consumption (measured as household expenditures) in Bolivia, Burkina Faso, and the Philippines. Household food insecurity was determined by an adapted 9-item US HFSSM version. A short version of the World Bank's Living Standards Measurement Study (LSMS) consumption module measured household expenditures. Focus groups were used to adapt the survey instrument to each local context. The sample (n approximately 330 per country) includes residents of urban and rural areas. A 12-month food expenditure aggregate was generated as part of the total household expenditures calculation. DPC food expenditure, which represented over 60% of the total household consumption, as well as expenditures on specific food groups correlated with food insecurity both as a continuous Food Insecurity Score (FinSS) and a tricategorical food insecurity status variable. ANOVA and regression analysis were executed adjusting for social and demographic covariates. Food-secure households have significantly higher (P < 0.05) total DPC food expenditures as well as expenditures on animal source foods, vegetables, and fats and oils than moderately and severely food-insecure households. The results offer evidence that the US HFSSM is able to discriminate between households at different levels of food insecurity status in diverse developing world settings.

  8. Social capital, social support, and food insecurity in food pantry users.

    PubMed

    Chhabra, Surbhi; Falciglia, Grace A; Lee, Seung-Yeon

    2014-01-01

    The purpose of this study was to examine the relationship between food security, social capital, and social support among urban food pantry users in Cincinnati. In-person interviews with 53 participants were completed using the U.S. Household Food Security Survey Module, Social Capital questionnaire, and Social Support questionnaire. Social capital was assessed through four subscales using a Likert scale, with a response range 1 to 4, and social support was measured by rating significant others' emotional, informational, and instrumental support as well as companionship (ranged from 0 to 4). The findings suggested that there were no significant associations among them. This may be due to a small sample size. Thus, the associations need to be examined with a larger sample. Further, a qualitative approach may be necessary to explore the contextual nature of social capital and social support related to food security.

  9. Increasing security in inter-chip communication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Edwards, Nathan J.; Hamlet, Jason; Bauer, Todd

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  10. Increasing security in inter-chip communication

    DOEpatents

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  11. Occupational Home Economics Education Series. Securing Employment. Competency Based Teaching Module.

    ERIC Educational Resources Information Center

    Lowe, Phyllis; And Others

    This module, one of ten competency based modules developed for vocational teachers, focuses on securing employment in home economics. It is designed for a variety of levels of learners (secondary, postsecondary, adult) in both school and nonschool educational settings. Five competencies to be developed with this module deal with the meaning of…

  12. Development and validation of an Arab family food security scale.

    PubMed

    Sahyoun, Nadine R; Nord, Mark; Sassine, Anniebelle J; Seyfert, Karin; Hwalla, Nahla; Ghattas, Hala

    2014-05-01

    The objective of this article was to describe 1) the validation of 2 similar but not identical food security modules used to collect data from 2 vulnerable populations, southern Lebanon residents (n = 815) and Palestinian refugees in Lebanon (n = 2501), and 2) the development and validation of an Arab Family Food Security Scale (AFFSS). The surveys used a cluster-randomized sampling design. The 2 food security subscales underwent face and construct validity. In addition, both of these tools and the AFFSS underwent psychometric assessment for internal validity by using statistical methods based on Item Response Theory. The food security questions tested by focus groups were understood and accepted in all regions of Lebanon. The food security subscales and the AFFSS had acceptable levels of internal consistency. The psychometric assessment confirmed that the 7 items of the AFFSS had good internal validity and reasonable reliability with item in-fits from 0.73 to 1.16. Food insecurity was identified among 42% of southern Lebanese and 62% of Palestinian refugee households. The determinants and consequences of food security measured in this study provide additional support for the validity of the modules. Using multivariate logistic regression, the higher the mean monthly income per household member and the higher the educational attainment of the head of household, the lower the risk of food insecurity [ORs (95% CIs): 0.99 (0.98, 0.99) and 0.66 (0.54, 0.80), respectively]. There was a strong significant association between food insecurity and lower food expenditure and lower intake of all food categories except for legumes, which was significantly associated in the opposite direction (P < 0.001). The odds of borrowing money and accepting gifts/donations were significantly higher among moderately and severely food-insecure households (P < 0.000). The AFFSS has been validated within Lebanon and can potentially be extended to other Arab-speaking populations.

  13. Prevalence and severity of household food insecurity of First Nations people living in an on-reserve, sub-Arctic community within the Mushkegowuk Territory.

    PubMed

    Skinner, Kelly; Hanning, Rhona M; Tsuji, Leonard J S

    2014-01-01

    To measure and describe the prevalence and severity of household food insecurity in a remote on-reserve First Nations community using the Household Food Security Survey Module (HFSSM) and to evaluate the perceived relevance of the HFSSM for this population. Household food security status was determined from the eighteen-item HFSSM following the classifications developed by Health Canada for the Canadian Community Health Survey, Cycle 2·2 Nutrition. One adult from each household in the community was invited to complete the HFSSM and to comment on its relevance as a tool to measure food security for First Nations communities. Sub-Arctic Ontario, Canada. Households (n 64). Seventy per cent of households were food insecure, 17% severely and 53% moderately. The prevalence of food insecurity in households with children was 76%. Among respondents from homes rated as having severe food insecurity, all (100 %) reported worrying that food would run out, times when food didn't last and there wasn't money to buy more, and times when they couldn't afford to eat balanced meals. The majority of respondents felt the HFSSM did not capture an accurate picture of food security for their situation. Aspects missing from the HFSSM included the high cost of market food and the incorporation of traditional food practices. A high prevalence of household food insecurity was reported in this community. On-reserve remote First Nations communities may be more susceptible to food insecurity than off-reserve Aboriginal populations. Initiatives that promote food security for this vulnerable population are needed.

  14. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  15. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    A module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  16. How do Student Clients of a University-based Food Bank Cope with Food Insecurity?

    PubMed

    Farahbakhsh, Jasmine; Ball, Geoff D C; Farmer, Anna P; Maximova, Katerina; Hanbazaza, Mahitab; Willows, Noreen D

    2015-12-01

    To describe the food security status, food insecurity coping strategies, characteristics, and experiences of student clients of the Campus Food Bank (CFB) at the University of Alberta in Edmonton, Alberta, Canada. A convenience sample of 58 students completed a survey from April 2013 to April 2014. Food security status was determined using the "Adult Food Security Survey Module". Ninety percent of CFB student clients who participated in this study were food insecure, which included both moderately and severely food insecure groups. The most prevalent coping strategies for food insecurity included applying for a loan or bursary (86.2%), seeking employment or working more hours (84.5%), and purchasing food using a credit card (77.6%). Participants were a diverse mix of students, including graduate students (50.0%), international students (46.6%), and caregivers of children (24.1%). The most common primary sources of income were government student loans (29.3%) and research assistantships (20.7%). Most participants (82.8%) liked the food they received from the food bank. Food insecurity is highly prevalent among student clients of this university-based food bank. Students used a variety of coping strategies to increase their disposable income, highlighting the need for additional strategies to alleviate food insecurity among vulnerable students.

  17. Are food insecurity's health impacts underestimated in the U.S. population? Marginal food security also predicts adverse health outcomes in young U.S. children and mothers.

    PubMed

    Cook, John T; Black, Maureen; Chilton, Mariana; Cutts, Diana; Ettinger de Cuba, Stephanie; Heeren, Timothy C; Rose-Jacobs, Ruth; Sandel, Megan; Casey, Patrick H; Coleman, Sharon; Weiss, Ingrid; Frank, Deborah A

    2013-01-01

    This review addresses epidemiological, public health, and social policy implications of categorizing young children and their adult female caregivers in the United States as food secure when they live in households with "marginal food security," as indicated by the U.S. Household Food Security Survey Module. Existing literature shows that households in the US with marginal food security are more like food-insecure households than food-secure households. Similarities include socio-demographic characteristics, psychosocial profiles, and patterns of disease and health risk. Building on existing knowledge, we present new research on associations of marginal food security with health and developmental risks in young children (<48 mo) and health in their female caregivers. Marginal food security is positively associated with adverse health outcomes compared with food security, but the strength of the associations is weaker than that for food insecurity as usually defined in the US. Nonoverlapping CIs, when comparing odds of marginally food-secure children's fair/poor health and developmental risk and caregivers' depressive symptoms and fair/poor health with those in food-secure and -insecure families, indicate associations of marginal food security significantly and distinctly intermediate between those of food security and food insecurity. Evidence from reviewed research and the new research presented indicates that households with marginal food security should not be classified as food secure, as is the current practice, but should be reported in a separate discrete category. These findings highlight the potential underestimation of the prevalence of adverse health outcomes associated with exposure to lack of enough food for an active, healthy life in the US and indicate an even greater need for preventive action and policies to limit and reduce exposure among children and mothers.

  18. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  19. Persistent food insecurity is associated with higher levels of cost-related medication nonadherence in low-income older adults.

    PubMed

    Sattler, Elisabeth Lilian Pia; Lee, Jung Sun

    2013-01-01

    The purpose of this study was to examine relationships between changes in food insecurity (FI) and cost-related medication nonadherence (CRN) among Older Americans Act Nutrition Program participants and wait-listed individuals in Georgia. This study used data collected from 3 waves of self-administered mail surveys conducted 4 months apart in 2008 and 2009 (n = 664, mean age 74.6 ± 8.9 years, 71.5% female, 31.0% African American). FI was assessed by using a validated 6-item U.S. Household Food Security Survey Module. Practice of 5 CRN behaviors was evaluated. Changes in FI and CRN were determined based on ≥ 2 repeated measures. Participants with persistent FI and CRN were more likely to be younger, low-income, and in poorer health. After controlling for potential confounders, persistently food insecure individuals and those who became food insecure showed 8.2 (95% CI: 5.4-12.5) times and 5.3 (95% CI: 3.2-8.8) times increased odds of reporting higher levels of CRN than persistently food secure individuals.

  20. Private Security Training. Phase 1: Basic. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…

  1. High-security communication by coherence modulation at the photon-counting level.

    PubMed

    Rhodes, William T; Boughanmi, Abdellatif; Moreno, Yezid Torres

    2016-05-20

    We show that key-specified interferometer path-length difference modulation (often referred to as coherence modulation), operating in the photon-counting regime with a broadband source, can provide a quantifiably high level of physics-guaranteed security for binary signal transmission. Each signal bit is associated with many photocounts, perhaps numbering in the thousands. Of great importance, the presence of an eavesdropper can be quickly detected. We first review the operation of key-specified coherence modulation at high light levels, illustrating by means of an example its lack of security against attack. We then show, using the same example, that, through the reduction of light intensities to photon-counting levels, a high level of security can be attained. A particular attack on the system is analyzed to demonstrate the quantifiability of the scheme's security, and various remaining research issues are discussed. A potential weakness of the scheme lies in a possible vulnerability to light amplification by an attacker.

  2. Severity of Household Food Insecurity Is Positively Associated with Mental Disorders among Children and Adolescents in the United States.

    PubMed

    Burke, Michael P; Martini, Lauren H; Çayır, Ebru; Hartline-Grafton, Heather L; Meade, Randa L

    2016-10-01

    Household food insecurity and mental disorders are both prevalent conditions among children and adolescents (i.e., youth) in the United States. Although some research has examined the association between the 2 conditions, it is not known whether more severe food insecurity is differently associated with mental disorders in youth. We investigated the association between severity of household food insecurity and mental disorders among children (aged 4-11 y) and adolescents (aged 12-17 y) using valid and reliable measures of both household food security status and mental disorders. We analyzed cross-sectional data on 16,918 children and 14,143 adolescents whose families participated in the 2011-2014 National Health Interview Survey. The brief Strengths and Difficulties Questionnaire and the 10-item USDA Household Food Security Survey Module were used to measure mental disorders and food security status, respectively. Multinomial logistic regressions were used to test the association between household food security status and mental disorders in youth. There was a significant linear trend in ORs, such that as severity of household food insecurity increased so did the odds of youth having a mental disorder (P < 0.001). Other selected results included the following: compared with food-secure households, youth in marginally food-secure households had higher odds of having a mental disorder with impairment [child OR: 1.26 (95% CI: 1.05, 1.52); adolescent OR: 1.33 (95% CI: 1.05, 1.68)]. In addition, compared with food-secure households, youth in very-low-food-secure households had higher odds of having a mental disorder with severe impairment [child OR: 2.55 (95% CI: 1.90, 3.43); adolescent OR: 3.44 (95% CI: 2.50, 4.75)]. The severity of household food insecurity is positively associated with mental disorders among both children and adolescents in the United States. These results suggest that improving household food security status has the potential to reduce mental disorders among US youth. © 2016 American Society for Nutrition.

  3. Food security among individuals experiencing homelessness and mental illness in the At Home/Chez Soi Trial.

    PubMed

    O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi

    2017-08-01

    Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.

  4. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    PubMed

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  5. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2011-04-15

    In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.

  6. Progress in Y-00 physical cipher for Giga bit/sec optical data communications (intensity modulation method)

    NASA Astrophysics Data System (ADS)

    Hirota, Osamu; Futami, Fumio

    2014-10-01

    To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.

  7. Supported PV module assembly

    DOEpatents

    Mascolo, Gianluigi; Taggart, David F.; Botkin, Jonathan D.; Edgett, Christopher S.

    2013-10-15

    A supported PV assembly may include a PV module comprising a PV panel and PV module supports including module supports having a support surface supporting the module, a module registration member engaging the PV module to properly position the PV module on the module support, and a mounting element. In some embodiments the PV module registration members engage only the external surfaces of the PV modules at the corners. In some embodiments the assembly includes a wind deflector with ballast secured to a least one of the PV module supports and the wind deflector. An array of the assemblies can be secured to one another at their corners to prevent horizontal separation of the adjacent corners while permitting the PV modules to flex relative to one another so to permit the array of PV modules to follow a contour of the support surface.

  8. Food Insecurity, Poor Diet Quality, and Suboptimal Intakes of Folate and Iron Are Independently Associated with Perceived Mental Health in Canadian Adults

    PubMed Central

    Davison, Karen M.; Gondara, Lovedeep; Kaplan, Bonnie J.

    2017-01-01

    Background: To address nutrition-related population mental health data gaps, we examined relationships among food insecurity, diet quality, and perceived mental health. Methods: Stratified and logistic regression analyses of respondents aged 19–70 years from the Canadian Community Health Survey, Cycle 2.2 were conducted (n = 15,546). Measures included the Household Food Security Survey Module, diet quality (i.e., comparisons to the Dietary Reference Intakes, Healthy Eating Index), perceived mental health (poor versus good), sociodemographics, and smoking. Results: In this sample, 6.9% were food insecure and 4.5% reported poor mental health. Stratified analysis of food security and mental health status by age/gender found associations for poor diet quality, protein, fat, fibre, and several micronutrients (p-values < 0.05); those who were food insecure tended to have higher suboptimal intakes (p-values < 0.05). After adjustment for covariates, associations in relation to mental health emerged for food insecurity (OR = 1.60, 95% CI 1.45–1.71), poor diet quality (1.61, 95% CI 1.34–1.81), and suboptimal intakes of folate (OR = 1.58, 95% CI 1.17–1.90) and iron (OR = 1.45, 95% CI 1.23–1.88). Conclusions: Population approaches that improve food security and intakes of high quality diets may protect people from poor mental health. PMID:28335418

  9. Food Insecurity, Poor Diet Quality, and Suboptimal Intakes of Folate and Iron Are Independently Associated with Perceived Mental Health in Canadian Adults.

    PubMed

    Davison, Karen M; Gondara, Lovedeep; Kaplan, Bonnie J

    2017-03-14

    To address nutrition-related population mental health data gaps, we examined relationships among food insecurity, diet quality, and perceived mental health. Stratified and logistic regression analyses of respondents aged 19-70 years from the Canadian Community Health Survey, Cycle 2.2 were conducted ( n = 15,546). Measures included the Household Food Security Survey Module, diet quality (i.e., comparisons to the Dietary Reference Intakes , Healthy Eating Index), perceived mental health (poor versus good), sociodemographics, and smoking. In this sample, 6.9% were food insecure and 4.5% reported poor mental health. Stratified analysis of food security and mental health status by age/gender found associations for poor diet quality, protein, fat, fibre, and several micronutrients ( p -values < 0.05); those who were food insecure tended to have higher suboptimal intakes ( p -values < 0.05). After adjustment for covariates, associations in relation to mental health emerged for food insecurity (OR = 1.60, 95% CI 1.45-1.71), poor diet quality (1.61, 95% CI 1.34-1.81), and suboptimal intakes of folate (OR = 1.58, 95% CI 1.17-1.90) and iron (OR = 1.45, 95% CI 1.23-1.88). Population approaches that improve food security and intakes of high quality diets may protect people from poor mental health.

  10. Adaptation of the U.S. Food Security Survey Module for Low-Income Pregnant Latinas: Qualitative Phase.

    PubMed

    Hromi-Fiedler, Amber; Bermúdez-Millán, Angela; Segura-Pérez, Sofia; Damio, Grace; Pérez-Escamilla, Rafael

    2009-01-01

    The objectives of this study were to: 1) assessed the face validity of the 18-items US Household Food Security Scale Module (US HFSSM) among low-income pregnant Latinas and 2) adapt the US HFSSM to the target population. This study was conducted in the United States in Hartford, Connecticut where 40% of residents are of Latina descent. Three focus groups (N=14(total)) were held with pregnant and postpartum Latinas from April - June 2004 to assess the understanding and applicability (face validity) of the US HFSSM as well as adapt the US HFSSM based on their recommendations. This was followed by pre-testing (N=7) to make final adaptations to the US HFSSM. Overall, the items in the US HFSSM were clear and understandable to participants, but some questions sounded repetitive to them. Participants felt the questions were applicable to other pregnant Latinas in their community and shared food security related experiences and strategies. Participants recommendations led to key adaptations to the US HFSSM including reducing the scale to 15-items, wording statements as questions, including two time periods, replacing the term "balanced meals" with "healthy and varied", replacing the term "low cost foods" with "cheap foods" and including a definition of the term, and including a coping mechanism of avoiding running out of food. The adapted US HFSSM was found to have good face validity among pregnant Latinas and can be used to assess food insecurity among this vulnerable population.

  11. Critical field-exponents for secure message-passing in modular networks

    NASA Astrophysics Data System (ADS)

    Shekhtman, Louis M.; Danziger, Michael M.; Bonamassa, Ivan; Buldyrev, Sergey V.; Caldarelli, Guido; Zlatić, Vinko; Havlin, Shlomo

    2018-05-01

    We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via simulations that the links between the modules (interlinks) have effects analogous to a magnetic field in a spin-system in that for any amount of interlinks the system no longer undergoes a phase transition. We then define the exponents δ, which relates the order parameter (the size of the giant secure component) at the critical point to the field strength (average number of interlinks per node), and γ, which describes the susceptibility near criticality. These are found to be δ = 2 and γ = 1 (with the scaling of the order parameter near the critical point given by β = 1). When two or more vulnerabilities are equally present in a module we find δ = 1 and γ = 0 (with β ≥ 2). Apart from defining a previously unidentified universality class, these exponents show that increasing connections between modules is more beneficial for security than increasing connections within modules. We also measure the correlation critical exponent ν, and the upper critical dimension d c , finding that ν {d}c=3 as for ordinary percolation, suggesting that for secure message-passing d c = 6. These results provide an interesting analogy between secure message-passing in modular networks and the physics of magnetic spin-systems.

  12. A Survey on Cyber Security awareness among college students in Tamil Nadu

    NASA Astrophysics Data System (ADS)

    Senthilkumar, K.; Easwaramoorthy, Sathishkumar

    2017-11-01

    The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.

  13. Are Food Insecurity’s Health Impacts Underestimated in the U.S. Population? Marginal Food Security Also Predicts Adverse Health Outcomes in Young U.S. Children and Mothers123

    PubMed Central

    Cook, John T.; Black, Maureen; Chilton, Mariana; Cutts, Diana; Ettinger de Cuba, Stephanie; Heeren, Timothy C.; Rose-Jacobs, Ruth; Sandel, Megan; Casey, Patrick H.; Coleman, Sharon; Weiss, Ingrid; Frank, Deborah A.

    2013-01-01

    This review addresses epidemiological, public health, and social policy implications of categorizing young children and their adult female caregivers in the United States as food secure when they live in households with “marginal food security,” as indicated by the U.S. Household Food Security Survey Module. Existing literature shows that households in the US with marginal food security are more like food-insecure households than food-secure households. Similarities include socio-demographic characteristics, psychosocial profiles, and patterns of disease and health risk. Building on existing knowledge, we present new research on associations of marginal food security with health and developmental risks in young children (<48 mo) and health in their female caregivers. Marginal food security is positively associated with adverse health outcomes compared with food security, but the strength of the associations is weaker than that for food insecurity as usually defined in the US. Nonoverlapping CIs, when comparing odds of marginally food-secure children’s fair/poor health and developmental risk and caregivers’ depressive symptoms and fair/poor health with those in food-secure and -insecure families, indicate associations of marginal food security significantly and distinctly intermediate between those of food security and food insecurity. Evidence from reviewed research and the new research presented indicates that households with marginal food security should not be classified as food secure, as is the current practice, but should be reported in a separate discrete category. These findings highlight the potential underestimation of the prevalence of adverse health outcomes associated with exposure to lack of enough food for an active, healthy life in the US and indicate an even greater need for preventive action and policies to limit and reduce exposure among children and mothers. PMID:23319123

  14. Multi-position photovoltaic assembly

    DOEpatents

    Dinwoodie, Thomas L.

    2003-03-18

    The invention is directed to a PV assembly, for use on a support surface, comprising a base, a PV module, a multi-position module support assembly, securing the module to the base at shipping and inclined-use angles, a deflector, a multi-position deflector support securing the deflector to the base at deflector shipping and deflector inclined-use angles, the module and deflector having opposed edges defining a gap therebetween. The invention permits transport of the PV assemblies in a relatively compact form, thus lowering shipping costs, while facilitating installation of the PV assemblies with the PV module at the proper inclination.

  15. Jordan Water Project: an interdisciplinary evaluation of freshwater vulnerability and security

    NASA Astrophysics Data System (ADS)

    Gorelick, S.; Yoon, J.; Rajsekhar, D.; Muller, M. F.; Zhang, H.; Gawel, E.; Klauer, B.; Klassert, C. J. A.; Sigel, K.; Thilmant, A.; Avisse, N.; Lachaut, T.; Harou, J. J.; Knox, S.; Selby, P. D.; Mustafa, D.; Talozi, S.; Haddad, Y.; Shamekh, M.

    2016-12-01

    The Jordan Water Project, part of the Belmont Forum projects, is an interdisciplinary, international research effort focused on evaluation of freshwater security in Jordan, one of the most water-vulnerable countries in the world. The team covers hydrology, water resources systems analysis, economics, policy evaluation, geography, risk and remote sensing analyses, and model platform development. The entire project team communally engaged in construction of an integrated hydroeconomic model for water supply policy evaluation. To represent water demand and allocation behavior at multiple levels of decision making,the model integrates biophysical modules that simulate natural and engineered hydrologic phenomena with human behavioral modules. Hydrologic modules include spatially-distributed groundwater and surface-water models for the major aquifers and watersheds throughout Jordan. For the human modules, we adopt a multi-agent modeling approach to represent decision-making processes. The integrated model was developed in Pynsim, a new open-source, object-oriented platform in Python for network-based water resource systems. We continue to explore the impacts of future scenarios and interventions.This project had tremendous encouragement and data support from Jordan's Ministry of Water and Irrigation. Modeling technology is being transferred through a companion NSF/USAID PEER project awarded toJordan University of Science and Technology. Individual teams have also conducted a range of studies aimed at evaluating Jordanian and transboundary surface water and groundwater systems. Surveys, interviews, and econometric analyses enabled us to better understandthe behavior of urban households, farmers, private water resellers, water use pattern of the commercial sector and irrigation water user associations. We analyzed nationwide spatial and temporal statistical trends in rainfall, developed urban and national comparative metrics to quantify water supply vulnerability, improved remote sensing methods to estimate crop-water use, and evaluated the impacts of climate change on future drought severity.

  16. Safe Schools Survey: Post-Secondary Survey Results.

    ERIC Educational Resources Information Center

    Mowery, Andrea

    This report provides the results of a survey of safety and security at colleges and universities in Minnesota, along with policy recommendations to improve safety and security at Minnesota post-secondary institutions. It is based on campus security reports voluntarily submitted by 60 of the 110 Minnesota post-secondary institutions, personal…

  17. European Service Module-Structural Test Article Load onto Transp

    NASA Image and Video Library

    2017-06-21

    The Orion service module structural test article for Exploration Mission-1 (EM-1), built by the European Space Agency, is prepared for shipment to Lockheed Martin's Denver facility to undergo testing. Inside the Neil Armstrong Operations and Checkout Building high bay at NASA's Kennedy Space Center in Florida, workers secure the protective covering around the module and a crane lifts the module, secured on stand, for the move to the transport truck. The Orion spacecraft will launch atop the agency's Space Launch System rocket on EM-1 in 2019.

  18. Enhanced rearrangement technique for secure data transmission: case study credit card process

    NASA Astrophysics Data System (ADS)

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  19. Food Insecurity and Peripheral Arterial Disease in Older Adult Populations.

    PubMed

    Redmond, M L; Dong, F; Goetz, J; Jacobson, L T; Collins, T C

    2016-01-01

    Food insecurity, defined as the limited or uncertain availability of nutritious and safe foods, is a complex phenomenon and is linked to poor nutrition and diet-sensitive chronic diseases. Dietary patterns that include saturated fats and meat products are potential risk factors for the progression of peripheral arterial disease (PAD). This study explored whether there is a relationship between food insecurity and PAD among a national sample of older adults. We conducted a cross-sectional data analysis using data from the 1999-2004 National Health and Nutrition Examination Survey (NHANES). Food security was assessed using the US Household Food Security Survey Module. Bivariate analyses were conducted using the Rao-Scott Chi-square test to examine associations between PAD and sociodemographic variables. Multivariable generalized logistic regression was employed to assess the effect of food security on the presence of PAD, with adjustment for respondent's socio demographic characteristics. A total of 2,027 adults with PAD were included (Ankle Brachial Index (ABI) score ≤ 0.90).We excluded participants less than 60 years of age. Compared to older adults who are food secure, those who are food insecure have an increased risk for PAD. Food insecurity is associated with peripheral arterial disease among older adults (adults adjusted odds ratio, 1.50 [95% CI 1.11-2.03). Older adults with peripheral arterial disease are experiencing food insecurity. While nutrition and PAD are not well-defined, previous literature indicates there is a connection between food insecurity and diet-sensitive chronic diseases (diabetes and hypertension) which are risk factors for PAD. Food insecurity should be taken into consideration when treating older adults with PAD to help decrease poor health outcomes that are linked to an insufficient amount of nutritious foods.

  20. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance... surveying travelers to measure customer satisfaction of aviation security in an effort to more efficiently... Title: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. Type of Request...

  1. Software Development Life Cycle Security Issues

    NASA Astrophysics Data System (ADS)

    Kaur, Daljit; Kaur, Parminder

    2011-12-01

    Security is now-a-days one of the major problems because of many reasons. Security is now-a-days one of the major problems because of many reasons. The main cause is that software can't withstand security attacks because of vulnerabilities in it which are caused by defective specifications design and implementation. We have conducted a survey asking software developers, project managers and other people in software development about their security awareness and implementation in Software Development Life Cycle (SDLC). The survey was open to participation for three weeks and this paper explains the survey results.

  2. Hierarchical data security in a Query-By-Example interface for a shared database.

    PubMed

    Taylor, Merwyn

    2002-06-01

    Whenever a shared database resource, containing critical patient data, is created, protecting the contents of the database is a high priority goal. This goal can be achieved by developing a Query-By-Example (QBE) interface, designed to access a shared database, and embedding within the QBE a hierarchical security module that limits access to the data. The security module ensures that researchers working in one clinic do not get access to data from another clinic. The security can be based on a flexible taxonomy structure that allows ordinary users to access data from individual clinics and super users to access data from all clinics. All researchers submit queries through the same interface and the security module processes the taxonomy and user identifiers to limit access. Using this system, two different users with different access rights can submit the same query and get different results thus reducing the need to create different interfaces for different clinics and access rights.

  3. Design of real-time encryption module for secure data protection of wearable healthcare devices.

    PubMed

    Kim, Jungchae; Lee, Byuck Jin; Yoo, Sun K

    2013-01-01

    Wearable devices for biomedical instrumentation could generate the medical data and transmit to a repository on cloud service through wireless networks. In this process, the private medical data will be disclosed by man in the middle attack. Thus, the archived data for healthcare services would be protected by non-standardized security policy by healthcare service provider (HSP) because HIPAA only defines the security rules. In this paper, we adopted the Advanced Encryption Standard (AES) for security framework on wearable devices, so healthcare applications using this framework could support the confidentiality easily. The framework developed as dynamic loadable module targeted for lightweight microcontroller such as msp430 within embedded operating system. The performance was shown that the module can support the real-time encryption using electrocardiogram and photoplethysmogram. In this regard, the processing load for enabling security is distributed to wearable devices, and the customized data protection method could be composed by HSP for a trusted healthcare service.

  4. OPTICAL STUDIES OF 13 HARD X-RAY SELECTED CATACLYSMIC BINARIES FROM THE SWIFT-BAT SURVEY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halpern, Jules P.; Thorstensen, John R.

    2015-12-15

    From a set of 13 cataclysmic binaries that were discovered in the Swift Burst Alert Telescope (BAT) survey, we conducted time-resolved optical spectroscopy and/or time-series photometry of 11, with the goal of measuring their orbital periods and searching for spin periods. Seven of the objects in this study are new optical identifications. Orbital periods are found for seven targets, ranging from 81 minutes to 20.4 hr. PBC J0706.7+0327 is an AM Herculis star (polar) based on its emission-line variations and large amplitude photometric modulation on the same period. Swift J2341.0+7645 may be a polar, although the evidence here is lessmore » secure. Coherent pulsations are detected from two objects, Swift J0503.7−2819 (975 s) and Swift J0614.0+1709 (1412 s and 1530 s, spin and beat periods, respectively), indicating that they are probable intermediate polars (DQ Herculis stars). For two other stars, longer spin periods are tentatively suggested. We also present the discovery of a 2.00 hr X-ray modulation from RX J2015.6+3711, possibly a contributor to Swift J2015.9+3715, and likely a polar.« less

  5. A security/safety survey of long term care facilities.

    PubMed

    Acorn, Jonathan R

    2010-01-01

    What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.

  6. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    PubMed

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  7. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.

    PubMed

    Leverrier, Anthony; Grangier, Philippe

    2009-05-08

    We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.

  8. Secure coherent optical multi-carrier system with four-dimensional modulation space and Stokes vector scrambling.

    PubMed

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun

    2015-06-15

    A secure enhanced coherent optical multi-carrier system based on Stokes vector scrambling is proposed and experimentally demonstrated. The optical signal with four-dimensional (4D) modulation space has been scrambled intra- and inter-subcarriers, where a multi-layer logistic map is adopted as the chaotic model. An experiment with 61.71-Gb/s encrypted multi-carrier signal is successfully demonstrated with the proposed method. The results indicate a promising solution for the physical secure optical communication.

  9. The QUIRO Study (assurance of quality and innovation in radiooncology): methodology, instruments and practices.

    PubMed

    Dunst, J; Willich, N; Sack, H; Engenhart-Cabillic, R; Budach, V; Popp, W

    2014-02-01

    The QUIRO study aimed to establish a secure level of quality and innovation in radiation oncology. Over 6 years, 27 specific surveys were conducted at 24 radiooncological departments. In all, 36 renowned experts from the field of radiation oncology (mostly head physicians and full professors) supported the realization of the study. A salient feature of the chosen methodological approach is the "process" as a means of systematizing diversified medical-technical procedures according to standardized criteria. On the one hand, "processes" as a tool of translation are adapted for creating and transforming standards into concrete clinical and medical actions; on the other hand, they provide the basis for standardized instruments and methods to determine the required needs of physicians, staff, and equipment. In the foreground of the collection and measurement of resource requirements were the processes of direct service provision which were subdivided into modules for reasons of clarity and comprehensibility. Overhead tasks (i.e., participation in quality management) were excluded from the main study and examined in a separate survey with appropriate methods. After the exploration of guidelines, tumor- or indication-specific examination and treatment processes were developed in expert workshops. Moreover, those specific modules were defined which characterize these entities and indications in a special degree. Afterwards, these modules were compiled according to their time and resources required in the "reference institution", i.e., in specialized and as competent recognized departments (mostly from the university area), by various suitable survey methods. The significance of the QUIRO study and the validity of the results were optimized in a process of constant improvements and comprehensive checks. As a consequence, the QUIRO study yields representative results concerning the resource requirement for specialized, qualitatively and technologically highly sophisticated radiooncologic treatment in Germany.

  10. 2016 California Vehicle Survey | Transportation Secure Data Center |

    Science.gov Websites

    Transportation Secure Data Center | NREL 6 California Vehicle Survey 2016 California Vehicle Survey The 2016 California Vehicle Survey of residential and commercial light-duty fleet owners in vehicle (PEV) owners. Data Collection Agency The California Energy Commission conducted the survey

  11. A novel anti-theft security system for photovoltaic modules

    NASA Astrophysics Data System (ADS)

    Khan, Wasif Ali; Lim, Boon-Han; Lai, An-Chow; Chong, Kok-Keong

    2017-04-01

    Solar farms are considered as easy target for thieves because of insufficient protection measures. Existing anti-theft approaches are based on system level and are not very preventive and efficient because these can be bypassed with some technical knowledge. Additionally, it is difficult for security guards to tackle them as robbers come in a form of a gang equipped with heavy weapons. In this paper, a low power auto shut-off and non-destructive system is proposed for photovoltaic (PV) modules to achieve better level of security at module level. In proposed method, the power generation function of the PV module will be shut-off internally and cannot be re-activated by unauthorized personnel, in the case of theft. Hence, the PV module will not be functional even sold to new customers. The system comprises of a microcontroller, a low power position sensor, a controllable semiconductor switch and a wireless reactive-able system. The anti-theft system is developed to be laminated inside PV module and will be interconnected with solar cells so it becomes difficult for thieves to temper. The position of PV module is retrieved by position sensor and stored in a microcontroller as an initial reference value. Microcontroller uses this stored reference value to control power supply of PV module via power switch. The stored reference value can be altered using wireless circuitry by following authentication protocol. It makes the system non-destructive as anti-theft function can be reset again by authorized personnel, if it is recovered after theft or moved for maintenance purposes. The research component includes the design of a position sensing circuit, an auto shut-off circuit, a reactive-able wireless security protection algorithm and finally the integration of the multiple circuits.

  12. Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry

    DOEpatents

    Areno, Matthew

    2015-12-08

    Techniques and mechanisms for providing a value from physically unclonable function (PUF) circuitry for a cryptographic operation of a security module. In an embodiment, a cryptographic engine receives a value from PUF circuitry and based on the value, outputs a result of a cryptographic operation to a bus of the security module. The bus couples the cryptographic engine to control logic or interface logic of the security module. In another embodiment, the value is provided to the cryptographic engine from the PUF circuitry via a signal line which is distinct from the bus, where any exchange of the value by either of the cryptographic engine and the PUF circuitry is for communication of the first value independent of the bus.

  13. Teaching Web Security Using Portable Virtual Labs

    ERIC Educational Resources Information Center

    Chen, Li-Chiou; Tao, Lixin

    2012-01-01

    We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

  14. A Demonstration of a Trusted Computer Interface Between a Multilevel Secure Command and Control System and Untrusted Tactical Data Systems.

    DTIC Science & Technology

    1987-03-01

    information and work in a completely secure environment. Information used with today’s C3I systems must be protected. To better understand the role of...and security was of minor concern. The user either worked on his own behalf or as a programmer for someone else. The computer power was limited. With...Although the modules may be of the same classification level, the manager may want to limit each team’s access to the module on which they are working

  15. Building a Practical Framework for Enterprise-Wide Security Management

    DTIC Science & Technology

    2004-04-28

    management. They have found that current efforts to manage security vulnerabilities and security risks only take an enterprise so far, with results...analyzed reports to determine the cause of the increase. Slide 5 © 2004 by Carnegie Mellon University Version 1.0 Secure IT 2004 - page 5 Attack...Nearly 1 in 5 of those surveyed reported that none of their IT staff have any formal security training. [A survey of 896 Computing Technology

  16. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    PubMed

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  17. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  18. Children with Special Health Care Needs, Supplemental Security Income, and Food Insecurity.

    PubMed

    Rose-Jacobs, Ruth; Fiore, Jennifer Goodhart; de Cuba, Stephanie Ettinger; Black, Maureen; Cutts, Diana B; Coleman, Sharon M; Heeren, Timothy; Chilton, Mariana; Casey, Patrick; Cook, John; Frank, Deborah A

    2016-01-01

    To assess food insecurity in low-income households with young children with/without special health care needs (SHCN) and evaluate relationships between child Supplemental Security Income (SSI) receipt and food insecurity. A cross-sectional survey (2013-2015) of caregivers was conducted at 5 medical centers. Eligibility included index child age <48 months without private health insurance and a caregiver fluent in English or Spanish. Interviews included sociodemographics, 5-item Children with Special Health Care Needs Screener, 18-item US Food Security Survey Module, household public assistance program participation, and child SSI receipt. Household and child food insecurity, each, were evaluated using multivariable logistic regression models. Of 6724 index children, 81.5% screened negative for SHCN, 14.8% positive for SHCN (no SSI), and 3.7% had SHCN and received SSI. After covariate control, households, with versus without a child with SHCN, were more likely to experience household (Adjusted odds ratios [AOR] 1.24, 95% confidence intervals [CI], 1.03-1.48) and child (AOR 1.35, 95% CI, 1.11-1.63) food insecurity. Among households with children with SHCN, those with children receiving, versus not receiving SSI, were more likely to report household (AOR 1.42, 95% CI, 0.97-2.09) but not child food insecurity. Low-income households with young children having SHCN are at risk for food insecurity, regardless of child SSI receipt and household participation in other public assistance programs. Policy recommendations include reevaluation of assistance programs' income and medical deduction criteria for households with children with SHCN to decrease the food insecurity risk faced by these children and their families.

  19. Hot gas cross flow filtering module

    DOEpatents

    Lippert, Thomas E.; Ciliberti, David F.

    1988-01-01

    A filter module for use in filtering particulates from a high temperature gas has a central gas duct and at least one horizontally extending support mount affixed to the duct. The support mount supports a filter element thereon and has a chamber therein, which communicates with an inner space of the duct through an opening in the wall of the duct, and which communicates with the clean gas face of the filter element. The filter element is secured to the support mount over an opening in the top wall of the support mount, with releasable securement provided to enable replacement of the filter element when desired. Ceramic springs may be used in connection with the filter module either to secure a filter element to a support mount or to prevent delamination of the filter element during blowback.

  20. 21 CFR 1311.08 - Incorporation by reference.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...

  1. Design and implement of pack filter module base on embedded firewall

    NASA Astrophysics Data System (ADS)

    Tian, Libo; Wang, Chen; Yang, Shunbo

    2011-10-01

    In the traditional security solution conditions, software firewall cannot intercept and respond the invasion before being attacked. And because of the high cost, the hardware firewall does not apply to the security strategy of the end nodes, so we have designed a kind of solution of embedded firewall with hardware and software. With ARM embedding Linux operating system, we have designed packet filter module and intrusion detection module to implement the basic function of firewall. Experiments and results show that that firewall has the advantages of low cost, high processing speed, high safety and the application of the computer terminals. This paper focuses on packet filtering module design and implementation.

  2. 78 FR 32416 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Aviation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-30

    ... From OMB of One Current Public Collection of Information: Aviation Security Customer Satisfaction... collection involves surveying travelers to measure customer satisfaction of aviation security in an effort to...; Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. TSA, with OMB's approval...

  3. Severity of household food insecurity and lifetime racial discrimination among African-American households in South Carolina.

    PubMed

    Burke, Michael P; Jones, Sonya J; Frongillo, Edward A; Fram, Maryah S; Blake, Christine E; Freedman, Darcy A

    2018-04-01

    In 2014, 30% of African-American households with children had low or very low food security, a rate double that of white households with children. A household has low food security if its members experience food shortages and reductions in food quality attributable to a lack of household resources or access and very low food security if its members also experience reductions in food intake and disrupted eating patterns. Households that are either low or very low food secure are known collectively as food insecure. We examined the association between the severity of household food insecurity and reports of lifetime racial discrimination among a sample of food-insecure African-American households in South Carolina. Data were collected from 154 African-American respondents. Food insecurity was measured using the US Department of Agriculture's Household Food Security Survey Module. Lifetime racial discrimination was measured using the Perceived Ethnic Discrimination Questionnaire-Community Version (PEDQ-CV). We used logistic regression to test the association between severity of food insecurity (low vs. very low food secure), PEDQ-CV score and PEDQ-CV subscales. All models were adjusted for demographic and socioeconomic variables. A one-unit increase in the frequency of lifetime racial discrimination was associated with a 5% increase in the odds of being very low food secure (odds ratio (OR) 1.05, P < .05). More reports of discrimination that were stigmatizing or devaluing (OR 1.16, P < .05), took place at a workplace or school (OR 1.15, P < .05) or were threatening or aggressive (OR 1.39, P < .05) increased the odds of being very low food secure. More reports of racial discrimination that were excluding or rejecting did not significantly increase the odds of being very low food secure (OR 1.07, P > .05). Severity of household food insecurity is associated with lifetime racial discrimination among African-American households in South Carolina.

  4. Develop 3G Application with The J2ME SATSA API

    NASA Astrophysics Data System (ADS)

    JunWu, Xu; JunLing, Liang

    This paper describes research in the use of the Security and Trust Services API for J2ME (SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2ME applications to communicate with and access functionality, secure storage and cryptographic operations provided by security elements such as smart cards and Wireless Identification Modules (WIM). A Java Card application could also work as an authentication module in a J2ME-based e-bank application. The e-bank application would allow its users to access their bank accounts using their cell phones.

  5. 76 FR 23971 - Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-29

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey Program AGENCY: Bureau of Industry and Security... their abilities to meet defense program needs. The information collected from voluntary surveys will be...

  6. Food insecurity is highly prevalent and predicts underweight but not overweight in adults and school children from Bogotá, Colombia.

    PubMed

    Isanaka, Sheila; Mora-Plazas, Mercedes; Lopez-Arana, Sandra; Baylin, Ana; Villamor, Eduardo

    2007-12-01

    The aims of this study were to determine the sociodemographic and dietary correlates of household and child food insecurity in Bogotá, Colombia and to examine whether food insecurity is a risk factor for underweight or overweight in this population. We analyzed data from 2359 families with 2526 children 5-12 y of age who completed a cross-sectional survey conducted in 2006. The survey was representative of low- and middle-income families who had children enrolled in the public primary school system of Bogotá. We used a 16-item food insecurity scale, modified from the United States Household Food Security Survey Module, assessed children's dietary intake with a FFQ, and measured their height and weight. Mothers' anthropometry was obtained through self-report. We estimated adjusted prevalence ratios and 95% CI from binomial regression models. Household food insecurity with hunger and child food insecurity were each positively associated with maternal age, parity, and single parent status and inversely related to mean household income and number of home assets. Animal protein and snack food intake were inversely related to child food insecurity. In multivariate analyses, food-insecure children were 3 times more likely to be underweight than food-secure children (95% CI = 1.6, 5.4; P = 0.0007). Hunger in the household was significantly associated with maternal underweight. Food insecurity was not related to child stunting, child overweight, or maternal overweight. The prevalence of food insecurity in Bogotá is high and related to poverty. Food insecurity does not necessarily predict overweight in countries undergoing the nutrition transition.

  7. Large-Scale Survey Findings Inform Patients’ Experiences in Using Secure Messaging to Engage in Patient-Provider Communication and Self-Care Management: A Quantitative Assessment

    PubMed Central

    Patel, Nitin R; Lind, Jason D; Antinori, Nicole

    2015-01-01

    Background Secure email messaging is part of a national transformation initiative in the United States to promote new models of care that support enhanced patient-provider communication. To date, only a limited number of large-scale studies have evaluated users’ experiences in using secure email messaging. Objective To quantitatively assess veteran patients’ experiences in using secure email messaging in a large patient sample. Methods A cross-sectional mail-delivered paper-and-pencil survey study was conducted with a sample of respondents identified as registered for the Veteran Health Administrations’ Web-based patient portal (My HealtheVet) and opted to use secure messaging. The survey collected demographic data, assessed computer and health literacy, and secure messaging use. Analyses conducted on survey data include frequencies and proportions, chi-square tests, and one-way analysis of variance. Results The majority of respondents (N=819) reported using secure messaging 6 months or longer (n=499, 60.9%). They reported secure messaging to be helpful for completing medication refills (n=546, 66.7%), managing appointments (n=343, 41.9%), looking up test results (n=350, 42.7%), and asking health-related questions (n=340, 41.5%). Notably, some respondents reported using secure messaging to address sensitive health topics (n=67, 8.2%). Survey responses indicated that younger age (P=.039) and higher levels of education (P=.025) and income (P=.003) were associated with more frequent use of secure messaging. Females were more likely to report using secure messaging more often, compared with their male counterparts (P=.098). Minorities were more likely to report using secure messaging more often, at least once a month, compared with nonminorities (P=.086). Individuals with higher levels of health literacy reported more frequent use of secure messaging (P=.007), greater satisfaction (P=.002), and indicated that secure messaging is a useful (P=.002) and easy-to-use (P≤.001) communication tool, compared with individuals with lower reported health literacy. Many respondents (n=328, 40.0%) reported that they would like to receive education and/or felt other veterans would benefit from education on how to access and use the electronic patient portal and secure messaging (n=652, 79.6%). Conclusions Survey findings validated qualitative findings found in previous research, such that veterans perceive secure email messaging as a useful tool for communicating with health care teams. To maximize sustained utilization of secure email messaging, marketing, education, skill building, and system modifications are needed. These findings can inform ongoing efforts to promote the sustained use of this electronic tool to support for patient-provider communication. PMID:26690761

  8. Large-Scale Survey Findings Inform Patients' Experiences in Using Secure Messaging to Engage in Patient-Provider Communication and Self-Care Management: A Quantitative Assessment.

    PubMed

    Haun, Jolie N; Patel, Nitin R; Lind, Jason D; Antinori, Nicole

    2015-12-21

    Secure email messaging is part of a national transformation initiative in the United States to promote new models of care that support enhanced patient-provider communication. To date, only a limited number of large-scale studies have evaluated users' experiences in using secure email messaging. To quantitatively assess veteran patients' experiences in using secure email messaging in a large patient sample. A cross-sectional mail-delivered paper-and-pencil survey study was conducted with a sample of respondents identified as registered for the Veteran Health Administrations' Web-based patient portal (My HealtheVet) and opted to use secure messaging. The survey collected demographic data, assessed computer and health literacy, and secure messaging use. Analyses conducted on survey data include frequencies and proportions, chi-square tests, and one-way analysis of variance. The majority of respondents (N=819) reported using secure messaging 6 months or longer (n=499, 60.9%). They reported secure messaging to be helpful for completing medication refills (n=546, 66.7%), managing appointments (n=343, 41.9%), looking up test results (n=350, 42.7%), and asking health-related questions (n=340, 41.5%). Notably, some respondents reported using secure messaging to address sensitive health topics (n=67, 8.2%). Survey responses indicated that younger age (P=.039) and higher levels of education (P=.025) and income (P=.003) were associated with more frequent use of secure messaging. Females were more likely to report using secure messaging more often, compared with their male counterparts (P=.098). Minorities were more likely to report using secure messaging more often, at least once a month, compared with nonminorities (P=.086). Individuals with higher levels of health literacy reported more frequent use of secure messaging (P=.007), greater satisfaction (P=.002), and indicated that secure messaging is a useful (P=.002) and easy-to-use (P≤.001) communication tool, compared with individuals with lower reported health literacy. Many respondents (n=328, 40.0%) reported that they would like to receive education and/or felt other veterans would benefit from education on how to access and use the electronic patient portal and secure messaging (n=652, 79.6%). Survey findings validated qualitative findings found in previous research, such that veterans perceive secure email messaging as a useful tool for communicating with health care teams. To maximize sustained utilization of secure email messaging, marketing, education, skill building, and system modifications are needed. These findings can inform ongoing efforts to promote the sustained use of this electronic tool to support for patient-provider communication.

  9. 76 FR 71994 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-21

    ... recommendations on how to proceed on those topics: Subcommittee: The Global Supply Chain Security Land Border... document for public release.--Report by the Global Supply Chain Security Air Cargo Subcommittee. Status... surveys (IPR Partnership Program Survey and IPR Distribution Chain Management survey). Subcommittee...

  10. Pressure-equalizing PV assembly and method

    DOEpatents

    Dinwoodie, Thomas L.

    2004-10-26

    Each PV assembly of an array of PV assemblies comprises a base, a PV module and a support assembly securing the PV module to a position overlying the upper surface of the base. Vents are formed through the base. A pressure equalization path extends from the outer surface of the PV module, past the PV module, to and through at least one of the vents, and to the lower surface of the base to help reduce wind uplift forces on the PV assembly. The PV assemblies may be interengaged, such as by interengaging the bases of adjacent PV assemblies. The base may include a main portion and a cover and the bases of adjacent PV assemblies may be interengaged by securing the covers of adjacent bases together.

  11. Long-distance continuous-variable quantum key distribution with a Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jouguet, Paul; SeQureNet, 23 avenue d'Italie, F-75013 Paris; Kunz-Jacques, Sebastien

    2011-12-15

    We designed high-efficiency error correcting codes allowing us to extract an errorless secret key in a continuous-variable quantum key distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signal-to-noise ratios on an additive white Gaussian noise channel with a binary modulation and can be combined with a multidimensional reconciliation method proven secure against arbitrary collective attacks. This improved reconciliation procedure considerably extends the secure range of a CVQKD with a Gaussian modulation, giving a secret key rate of about 10{sup -3} bit per pulse at amore » distance of 120 km for reasonable physical parameters.« less

  12. The relationship between childhood adversity and food insecurity: 'It's like a bird nesting in your head'.

    PubMed

    Chilton, Mariana; Knowles, Molly; Rabinowich, Jenny; Arnold, Kimberly T

    2015-10-01

    Adverse childhood experiences, including abuse, neglect and household instability, affect lifelong health and economic potential. The present study investigates how adverse childhood experiences are associated with food insecurity by exploring caregivers' perceptions of the impact of their childhood adversity on educational attainment, employment and mental health. Semi-structured audio-recorded in-person interviews that included (i) quantitative measures of maternal and child health, adverse childhood experiences (range: 0-10) and food security using the US Household Food Security Survey Module; and (ii) qualitative audio-recorded investigations of experiences with abuse, neglect, violence and hunger over participants' lifetimes. Households in Philadelphia, PA, USA. Thirty-one mothers of children <4 years old who reported low or very low household food security. Twenty-one caregivers (68 %) reported four or more adverse childhood experiences, and this severity was significantly associated with reports of very low food security (Fisher's exact P=0·021). Mothers reporting emotional and physical abuse were more likely to report very low food security (Fisher's exact P=0·032). Qualitatively, participants described the impact of childhood adverse experiences with emotional and physical abuse/neglect, and household substance abuse, on their emotional health, school performance and ability to maintain employment. In turn, these experiences negatively affected their ability to protect their children from food insecurity. The associations between mothers' adverse experiences in childhood and reports of current household food security should inspire researchers, advocates and policy makers to comprehensively address family hardship through greater attention to the emotional health of caregivers. Programmes meant to address nutritional deprivation and financial hardship should include trauma-informed approaches that integrate behavioural interventions.

  13. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  14. Secure polarization-independent subcarrier quantum key distribution in optical fiber channel using BB84 protocol with a strong reference.

    PubMed

    Gleim, A V; Egorov, V I; Nazarov, Yu V; Smirnov, S V; Chistyakov, V V; Bannik, O I; Anisimov, A A; Kynev, S M; Ivanova, A E; Collins, R J; Kozlov, S A; Buller, G S

    2016-02-08

    A quantum key distribution system based on the subcarrier wave modulation method has been demonstrated which employs the BB84 protocol with a strong reference to generate secure bits at a rate of 16.5 kbit/s with an error of 0.5% over an optical channel of 10 dB loss, and 18 bits/s with an error of 0.75% over 25 dB of channel loss. To the best of our knowledge, these results represent the highest channel loss reported for secure quantum key distribution using the subcarrier wave approach. A passive unidirectional scheme has been used to compensate for the polarization dependence of the phase modulators in the receiver module, which resulted in a high visibility of 98.8%. The system is thus fully insensitive to polarization fluctuations and robust to environmental changes, making the approach promising for use in optical telecommunication networks. Further improvements in secure key rate and transmission distance can be achieved by implementing the decoy states protocol or by optimizing the mean photon number used in line with experimental parameters.

  15. Prevalence of Perceived Food and Housing Security - 15 States, 2013.

    PubMed

    Njai, Rashid; Siegel, Paul; Yin, Shaoman; Liao, Youlian

    2017-01-13

    Recent global (1) and national (2,3) health equity initiatives conclude that the elimination of health disparities requires improved understanding of social context (4,5) and ability to measure social determinants of health, including food and housing security (3). Food and housing security reflect the availability of and access to essential resources needed to lead a healthy life. The 2013 Behavioral Risk Factor Surveillance System (BRFSS) included two questions to assess perceived food and housing security in 15 states.* Among 95,665 respondents, the proportion who answered "never or rarely" to the question "how often in the past 12 months would you say you were worried or stressed about having enough money to buy nutritious meals?" ranged from 68.5% to 82.4% by state. Among 90,291 respondents living in housing they either owned or rented, the proportion who answered "never or rarely" to the question, "how often in the past 12 months would you say you were worried or stressed about having enough money to pay your rent/mortgage?" ranged from 59.9% to 72.8% by state. Food security was reported less often among non-Hispanic blacks (blacks) (68.5%) and Hispanics (64.6%) than non-Hispanic whites (whites) (81.8%). These racial/ethnic disparities were present across all levels of education; housing security followed a similar pattern. These results highlight racial/ethnic disparities in two important social determinants of health, food and housing security, as well as a substantial prevalence of worry or stress about food or housing among all subgroups in the United States. The concise nature of the BRFSS Social Context Module's single-question format for food and housing security makes it possible to incorporate these questions into large health surveys so that social determinants can be monitored at the state and national levels and populations at risk can be identified.

  16. Infusing Aging and Public Policy Content into Gerontology Courses: Collaborative Learning Methods To Teach about Social Security and Medicare.

    ERIC Educational Resources Information Center

    Cianciolo, Patricia K.; Henderson, Tammy L.

    2003-01-01

    Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…

  17. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  18. Does interview mode matter for food security measurement? Telephone versus in-person interviews in the Current Population Survey Food Security Supplement.

    PubMed

    Nord, Mark; Hopwood, Heather

    2007-12-01

    To assess whether interview mode (telephone vs. in-person) affects the results of surveys that measure food security. Responses given by households interviewed by telephone and in-person in recent US Current Population Survey Food Security Supplements (CPS-FSS) were compared. Statistical methods based on the Rasch measurement model were used to assess whether response patterns differed between the two interview modes. Multivariate logistic regression analysis was then used to gauge the effect of interview mode on the measured household prevalence rates of food insecurity and very low food security while controlling for income, employment, household structure, and other household characteristics that affect food security. Response patterns to the indicators that comprise the food security scale did not differ substantially between interview modes. Prevalence rates of food insecurity and very low food security estimated from the two interview modes differed by only small proportions after accounting for differences in the socio-economic characteristics of households. Findings suggest that effects of interview mode on food security measurement in the CPS-FSS are small, or at most modest. Prevalence estimates may be biased upwards somewhat for households interviewed in-person compared with those interviewed by telephone. The extent to which these results can be generalised may depend, to some extent, on survey characteristics other than interview mode, such as surveyor name recognition and respondents' trust and confidence in the surveyor.

  19. Food insecurity is associated with high risk glycemic control and higher health care utilization among youth and young adults with type 1 diabetes.

    PubMed

    Mendoza, Jason A; Haaland, Wren; D'Agostino, Ralph B; Martini, Lauren; Pihoker, Catherine; Frongillo, Edward A; Mayer-Davis, Elizabeth J; Liu, Lenna L; Dabelea, Dana; Lawrence, Jean M; Liese, Angela D

    2018-04-01

    Household food insecurity (FI), i.e., limited availability of nutritionally adequate foods, is associated with poor glycemic control among adults with type 2 diabetes. We evaluated the association of FI among youth and young adults (YYA) with type 1 diabetes to inform recent clinical recommendations from the American Diabetes Association for providers to screen all patients with diabetes for FI. Using data from the Washington and South Carolina SEARCH for Diabetes in Youth Study sites, we conducted an observational, cross-sectional evaluation of associations between FI and glycemic control, hospitalizations, and emergency department (ED) visits among YYA with type 1 diabetes. FI was assessed using the Household Food Security Survey Module, which queries conditions and behaviors typical of households unable to meet basic food needs. Participants' HbA 1c were measured from blood drawn at the research visit; socio-demographics and medical history were collected by survey. The prevalence of FI was 19.5%. In adjusted logistic regression analysis, YYAs from food-insecure households had 2.37 higher odds (95% CI: 1.10, 5.09) of high risk glycemic control, i.e., HbA 1c >9.0%, vs. peers from food-secure households. In adjusted binomial regression analysis for ED visits, YYAs from food-insecure households had an adjusted prevalence rate that was 2.95 times (95% CI [1.17, 7.45]) as great as those from food secure households. FI was associated with high risk glycemic control and more ED visits. Targeted efforts should be developed and tested to alleviate FI among YYA with type 1 diabetes. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. 21 CFR 1311.08 - Incorporation by reference.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the National Institute of Standards and Technology, Computer Security Division, Information Technology... Publication (FIPS PUB) 140-2, Change Notices (12-03-2002), Security Requirements for Cryptographic Modules... §§ 1311.30(b), 1311.55(b), 1311.115(b), 1311.120(b), 1311.205(b). (i) Annex A: Approved Security Functions...

  1. Survey of Machine Learning Methods for Database Security

    NASA Astrophysics Data System (ADS)

    Kamra, Ashish; Ber, Elisa

    Application of machine learning techniques to database security is an emerging area of research. In this chapter, we present a survey of various approaches that use machine learning/data mining techniques to enhance the traditional security mechanisms of databases. There are two key database security areas in which these techniques have found applications, namely, detection of SQL Injection attacks and anomaly detection for defending against insider threats. Apart from the research prototypes and tools, various third-party commercial products are also available that provide database activity monitoring solutions by profiling database users and applications. We present a survey of such products. We end the chapter with a primer on mechanisms for responding to database anomalies.

  2. HIPAA Compliance in U.S. Hospitals: A Self-Report of Progress Toward the Security Rule

    PubMed Central

    Having, Karen; Davis, Diane C

    2005-01-01

    In January 2004, a random sampling of 1,000 U.S. hospitals was surveyed by researchers at a midwestern university to determine perceived level of compliance with the security requirements of the federal Health Insurance Portability and Accountability Act (HIPAA). Exactly one year later, a follow-up survey was sent to the 286 respondents of the 2004 survey, yielding a 50 percent return rate (n = 144). There was an overall trend in increased HIPAA security compliance from 2004 to 2005. There was no significant difference in perceived level of compliance based on the size of the hospital for the majority of security standards. PMID:18066377

  3. Food insecurity among people who inject drugs in Los Angeles and San Francisco.

    PubMed

    Schmitz, Jane; Kral, Alex H; Chu, Daniel; Wenger, Lynn D; Bluthenthal, Ricky N

    2016-08-01

    We estimated the prevalence of food insecurity among people who inject drugs (PWID) in Los Angeles and San Francisco and explored correlates of food insecurity. A cross-sectional study that measured 30 d food insecurity using the US Adult Food Security Survey ten-item Module developed by the US Department of Agriculture. Food insecurity was defined as including low and very low food security. Two cities in the state of California, USA. Male and female active PWID (n 777). Among participants, 58 % reported food insecurity and 41 % reported very low food security. Food-insecure PWID were more likely to report being homeless (prevalence ratio (PR)=1·20; 95 % CI 1·05, 1·37), chest pain in the past 12 months (PR=1·19; CI 1·06, 1·35), acquiring syringes from someone who goes to a syringe exchange programme (PR=1·27; 95 % CI 1·13, 1·43) and feeling at risk for arrest for possession of drug paraphernalia (PR=1·30; 95 % CI 1·15, 1·46). Current food insecurity was common among PWID in these two cities, yet few factors were independently associated with food insecurity. These data suggest that broad strategies to improve food access for this high-risk population are urgently needed.

  4. Biocontainment, biosecurity, and security practices in beef feedyards.

    PubMed

    Brandt, Aric W; Sanderson, Michael W; DeGroot, Brad D; Thomson, Dan U; Hollis, Larry C

    2008-01-15

    To determine the biocontainment, biosecurity, and security practices at beef feedyards in the Central Plains of the United States. Survey. Managers of feedyards in Colorado, Kansas, Nebraska, Oklahoma, and Texas that feed beef cattle for finish before slaughter; feedyards had to have an active concentrated animal feeding operation permit with a 1-time capacity of >or= 1,000 cattle. A voluntary survey of feedyard personnel was conducted. Identified feedyard personnel were interviewed and responses regarding facility design, security, employees, disease preparedness, feedstuffs, hospital or treatment systems, sanitation, cattle sources, handling of sick cattle, and disposal of carcasses were collected in a database questionnaire. The survey was conducted for 106 feedyards with a 1-time capacity that ranged from 1,300 to 125,000 cattle. Feedyards in general did not have high implementation of biocontainment, biosecurity, or security practices. Smaller feedyards were, in general, less likely to use good practices than were larger feedyards. Results of the survey provided standard practices for biocontainment, biosecurity, and security in feedyards located in Central Plains states. Information gained from the survey results can be used by consulting veterinarians and feedyard managers as a basis for discussion and to target training efforts.

  5. Stabilized PV system

    DOEpatents

    Dinwoodie, Thomas L.

    2002-12-17

    A stabilized PV system comprises an array of photovoltaic (PV) assemblies mounted to a support surface. Each PV assembly comprises a PV module and a support assembly securing the PV module to a position overlying the support surface. The array of modules is circumscribed by a continuous, belt-like perimeter assembly. Cross strapping, extending above, below or through the array, or some combination of above, below and through the array, secures a first position along the perimeter assembly to at least a second position along the perimeter assembly thereby stabilizing the array against wind uplift forces. The first and second positions may be on opposite sides on the array.

  6. Food security for community-living elderly people in Beijing, China.

    PubMed

    Cheng, Yang; Rosenberg, Mark; Yu, Jie; Zhang, Hua

    2016-11-01

    Food security has been identified as an important issue for elderly people's quality of life and ageing in place. A food security index composed of three indicators (food intake, food quality and food affordability) was developed to measure the food security status of community-living elderly people. Food security was then examined among community-living elderly in the central urban districts of Beijing, China. Data were collected by a questionnaire survey in the summer of 2013 and the response rate was 78.5%. Descriptive statistics and binary logistic regression were applied to analyse food security and the associations between food security and demographic and socioeconomic factors. The results showed that 54.2% of the surveyed elderly experienced food security. Participants with better education (OR = 1.68) and better health (OR = 1.47) were more likely to experience food security. The young-old were less likely to experience food security than the older old (OR = 0.94). Elderly people who lived with their children were less likely to experience food security than those who lived alone (OR = 0.43). The results of impact factors on food security highlight both similarities with studies from more developed countries and the unique challenges faced in a rapidly changing China with its unique social, cultural and political systems. The food security index we developed in this study is a simple and effective measure of food security status, which can be used in surveys for evaluating the food security status of elderly people in the future. © 2015 John Wiley & Sons Ltd.

  7. Pressure equalizing photovoltaic assembly and method

    DOEpatents

    Dinwoodie, Thomas L [Piedmont, CA

    2003-05-27

    Each PV assembly of an array of PV assemblies comprises a base, a PV module and a support assembly securing the PV module to a position overlying the upper surface of the base. Vents are formed through the base. A pressure equalization path extends from the outer surface of the PV module, past the peripheral edge of the PV module, to and through at least one of the vents, and to the lower surface of the base to help reduce wind uplift forces on the PV assembly. The PV assemblies may be interengaged, such as by interengaging the bases of adjacent PV assemblies. The base may include a main portion and a cover and the bases of adjacent PV assemblies may be interengaged by securing the covers of adjacent bases together.

  8. An Integrated Intranet and Dynamic Database Application for the Security Manager at Naval Postgraduate School

    DTIC Science & Technology

    2002-09-01

    Basic for Applications ( VBA ) 6.0 as macros may not be supported in 8 future versions of Access. Access 2000 offers Internet- related features for...security features from Microsoft’s SQL Server. [1] 3. System Requirements Access 2000 is a resource-intensive application as are all Office 2000...1] • Modules – Functions and procedures written in the Visual Basic for Applications ( VBA ) programming language. The capabilities of modules

  9. Breakfast-Skipping and Selecting Low-Nutritional-Quality Foods for Breakfast Are Common among Low-Income Urban Children, Regardless of Food Security Status.

    PubMed

    Dykstra, Holly; Davey, Adam; Fisher, Jennifer O; Polonsky, Heather; Sherman, Sandra; Abel, Michelle L; Dale, Lauren C; Foster, Gary D; Bauer, Katherine W

    2016-03-01

    Universal access to the School Breakfast Program (SBP) is intended to help low-income and food-insecure students overcome barriers to eating breakfast. However, SBP participation is often still low despite universal access. Further information is needed with regard to these children's breakfast behaviors, and in particular breakfast behaviors among youth from food-insecure families, to inform effective breakfast interventions. The objective of this study was to examine breakfast behaviors among a large sample of urban students with universal access to the SBP and to identify differences in breakfast behaviors among children from food-secure compared with food-insecure households. A cross-sectional study of 821 fourth- through sixth-grade students and their parents from 16 schools was conducted. Students reported the foods/drinks selected and location of obtaining food/drink on the morning of data collection, parents reported household food security status using the 6-item Food Security Survey Module, and the school district provided SBP participation data during the fall semester of 2013. Multivariable linear regression models accounting for school-level clustering were used to examine differences in breakfast behaviors across 3 levels of household food security: food secure, low food secure, and very low food secure. Students participated in the SBP 31.2% of possible days, with 13% never participating in the SBP. One-fifth (19.4%) of students purchased something from a corner store for breakfast, and 16.9% skipped breakfast. Forty-six percent of students were food insecure; few differences in breakfast behaviors were observed across levels of food security. Despite universal access to the SBP, participation in the SBP is low. Breakfast skipping and selection of foods of low nutritional quality in the morning are common, regardless of household food security status. Additional novel implementation of the SBP and addressing students' breakfast preferences may be necessary to further reduce barriers to students obtaining a free, healthful breakfast. This trial was registered at clinicaltrials.gov as NCT01924130. © 2016 American Society for Nutrition.

  10. The association between food insecurity and academic achievement in Canadian school-aged children.

    PubMed

    Faught, Erin L; Williams, Patty L; Willows, Noreen D; Asbridge, Mark; Veugelers, Paul J

    2017-10-01

    Education is a crucial social determinant of health. Food insecurity can be detrimental to children's academic achievement, potentially perpetuating a cycle of poverty and food insecurity. We aimed to assess the relationship between food insecurity and academic achievement in Canadian school-aged children. Cross-sectional study of children and parents. Parents completed the short-form Household Food Security Survey Module and questions about income and education level (socio-economic status). Children completed FFQ. Data were prospectively linked to children's performance on standardized exams written one year later. Mixed-effect logistic regression was employed to assess the relationship between food insecurity and likelihood of meeting academic expectations adjusting for socio-economic status, diet quality and potential confounders. Nova Scotia, Canada in 2011-2012. Students (n 4105) in grade 5 (10-11 years; 2167 girls) and their parents. Low food security was reported by 9·8 % of households; very low food security by 7·1 % of households. Students from low-income households and reporting poor diet quality were less likely to do well in school. Children who lived in households reporting very low food security had 0·65 times the odds (OR=0·65; 95 % CI 0·44, 0·96) of meeting expectations for reading and 0·62 times the odds (OR=0·62; 95 % CI 0·45, 0·86) of meeting expectations for mathematics. Very low household insecurity is associated with poor academic achievement among children in Nova Scotia.

  11. Malware Mimics for Network Security Assessment

    DTIC Science & Technology

    2011-03-01

    Master’s Thesis 4 . TITLE AND SUBTITLE Malware Mimics for Network Security Assessment 6. AUTHOR(S) Taff, William R and Salevski, Paul M. 5...Communication Protocol .......................41 viii 4 . Graphical User Interface for MM-Server .......43 C. BUILDING THE TEST PLATFORM...Extension ...............71 2. More Advanced Modules ........................72 3. Increase Scale of Test Bed ...................73 4 . Security

  12. Household Food Security Study Summaries. 2001 Edition.

    ERIC Educational Resources Information Center

    Seavey, Dorie; Sullivan, Ashley F.

    This report provides the most recent data on the food security of United States households. Based on studies using the Food Security Core Module (FSCM), a tool facilitating direct documentation of the extent of food insecurity and hunger caused by income limitations, this report summarizes 35 studies representing 20 states and Canada. The report…

  13. Enhanced secure 4-D modulation space optical multi-carrier system based on joint constellation and Stokes vector scrambling.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2018-03-19

    This paper proposes and demonstrates an enhanced secure 4-D modulation optical generalized filter bank multi-carrier (GFBMC) system based on joint constellation and Stokes vector scrambling. The constellation and Stokes vectors are scrambled by using different scrambling parameters. A multi-scroll Chua's circuit map is adopted as the chaotic model. Large secure key space can be obtained due to the multi-scroll attractors and independent operability of subcarriers. A 40.32Gb/s encrypted optical GFBMC signal with 128 parallel subcarriers is successfully demonstrated in the experiment. The results show good resistance against the illegal receiver and indicate a potential way for the future optical multi-carrier system.

  14. How much does the Supplemental Nutrition Assistance Program alleviate food insecurity? Evidence from recent programme leavers.

    PubMed

    Nord, Mark

    2012-05-01

    To estimate the effect of the US Supplemental Nutrition Assistance Program (SNAP) on the food security (consistent access to adequate food) of recipients, net of the effect of the self-selection of more food-needy households into the programme. The food security of current SNAP recipients and recent leavers is compared in cross-sectional survey data, adjusting for economic and demographic differences using multivariate logistic regression methods. A similar analysis in 2-year longitudinal panels provides additional control for selection on unobserved variables based on food security status in the previous year. Household survey data collected for the US Department of Agriculture by the US Census Bureau. Households interviewed in the Current Population Survey Food Security Supplements from 2001 to 2009. The odds of very low food security among households that continued on SNAP through the end of a survey year were 28 % lower than among those that left SNAP prior to the 30-d period during which food security was assessed. In 2-year panels with controls for the severity of food insecurity in the previous year, the difference in odds was 45 %. The results are consistent with, or somewhat higher than, the estimates from the strongest previous research designs and suggest that the ameliorative effect of SNAP on very low food security is in the range of 20-50 %.

  15. Marine asset security and tracking (MAST) system

    DOEpatents

    Hanson, Gregory Richard [Clinton, TN; Smith, Stephen Fulton [Loudon, TN; Moore, Michael Roy [Corryton, TN; Dobson, Eric Lesley [Charleston, SC; Blair, Jeffrey Scott [Charleston, SC; Duncan, Christopher Allen [Marietta, GA; Lenarduzzi, Roberto [Knoxville, TN

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  16. Student Hunger on Campus: Food Insecurity Among College Students and Implications for Academic Institutions.

    PubMed

    Payne-Sturges, Devon C; Tjaden, Allison; Caldeira, Kimberly M; Vincent, Kathryn B; Arria, Amelia M

    2018-02-01

    To estimate the prevalence of food insecurity among students at a large mid-Atlantic publicly funded university; examine the association between food insecurity, demographic characteristics, potential financial risk factors, and self-reported physical and mental health and academic performance; and identify possible risk factors for food insecurity. Cross-sectional survey. Large, public mid-Atlantic university. Two hundred thirty-seven undergraduate students. US Department of Agriculture (USDA) 18-item Household Food Security Survey Module (HFSSM) and questions on demographics, student status, economic factors, housing stability, living arrangements, academic performance, and self-rated physical health and depression symptoms. Multivariate logistic regression analysis. Among students surveyed, 15% were food insecure; an additional 16% were at risk of food insecurity. Students who were African American, other race/ethnicity, receiving multiple forms of financial aid, or experiencing housing problems were more likely to be food insecure or at the risk of food insecurity (Adjusted Odds Ratio [AOR] = 4.00, 95% confidence interval [CI] = 1.83-8.71, P value < .0001; AOR = 5.26, 95% CI = 1.85-14.98, P value = .002; AOR = 3.43, 95% CI = 1.85-6.37, P value <.001; AOR = 8.00, 95% CI = 3.57-17.93, P value < .0001, respectively). Food secure students were less likely to report depression symptoms than at-risk or food insecure students. Food insecurity among college students is an important public health concern that might have implications for academic performance, retention, and graduation rates. Universities that measure food insecurity among their students will be better positioned to advocate for policy changes at state and federal levels regarding college affordability and student financial assistance.

  17. A novel 6-DOF parallel robot and its pose errors compensation

    NASA Astrophysics Data System (ADS)

    Shi, Zhixin; Ye, Meiyan; Luo, Yufeng

    2011-10-01

    In the traditional security solution conditions, software firewall cannot intercept and respond the invasion before being attacked. And because of the high cost, the hardware firewall does not apply to the security strategy of the end nodes, so we have designed a kind of solution of embedded firewall with hardware and software. With ARM embedding Linux operating system, we have designed packet filter module and intrusion detection module to implement the basic function of firewall. Experiments and results show that that firewall has the advantages of low cost, high processing speed, high safety and the application of the computer terminals. This paper focuses on packet filtering module design and implementation.

  18. Brief assessment of food insecurity accurately identifies high-risk US adults.

    PubMed

    Gundersen, Craig; Engelhard, Emily E; Crumbaugh, Amy S; Seligman, Hilary K

    2017-06-01

    To facilitate the introduction of food insecurity screening into clinical settings, we examined the test performance of two-item screening questions for food insecurity against the US Department of Agriculture's Core Food Security Module. We examined sensitivity, specificity and accuracy of various two-item combinations of questions assessing food insecurity in the general population and high-risk population subgroups. 2013 Current Population Survey December Supplement, a population-based US survey. All survey participants from the general population and high-risk subgroups. The test characteristics of multiple two-item combinations of questions assessing food insecurity had adequate sensitivity (>97 %) and specificity (>70 %) for widespread adoption as clinical screening measures. We recommend two specific items for clinical screening programmes based on their widespread current use and high sensitivity for detecting food insecurity. These items query how often the household 'worried whether food would run out before we got money to buy more' and how often 'the food that we bought just didn't last and we didn't have money to get more'. The recommended items have sensitivity across high-risk population subgroups of ≥97 % and a specificity of ≥74 % for food insecurity.

  19. Nuclear Security Objectives of an NMAC System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, Rebecca Lynn

    After completing this module, you should be able to: Describe the role of Nuclear Material Accounting and Control (NMAC) in comprehensive nuclear security at a facility; Describe purpose of NMAC; Identify differences between the use of NMAC for IAEA safeguards and for facility nuclear security; List NMAC elements and measures; and Describe process for resolution of irregularities

  20. The Relationship Between Developmental Assets and Food Security In Adolescents From A Low-Income Community

    PubMed Central

    Shtasel-Gottlieb, Zoë; Palakshappa, Deepak; Yang, Fanyu; Goodman, Elizabeth

    2014-01-01

    Purpose To explore the association between developmental assets (characteristics, experiences, and relationships that shape healthy development) and food insecurity among adolescents from a low-income, urban community. Methods This mixed methods study occurred in two phases. In Phase 1, using a census approach, 2350 6-12th graders from the public school district completed an anonymous survey that included the Development Assets Profile (DAP), youth self-report form of the Core Food Security Module, and demographic questions. Logistic and multinomial regression analyses determined independent associations between developmental assets and food security adjusting for demographics. In Phase 2, 20 adult key informant interviews and four semi-structured student focus groups were performed to explain findings from Phase 1. Results On average, DAP scores were consistent with national norms. Food insecurity was prevalent; 14.9% reported low food security and 8.6% very low food security (VLFS). Logistic regression revealed that higher DAP was associated with lower odds of food insecurity (OR=.96, 95% CI=.95-.97); family assets drove this association(OR=.93, 95% CI=.91-.95). In multinomial regression modeling, these associations persisted and, paradoxically, higher community assets were also associated with VLFS (ORVLFS=1.08, 95% CI=1.04-1.13). Qualitative analyses suggested that greater need among VLFS youth led to increased connections to community resources despite barriers to access such as stigma, home instability, and cultural differences. Conclusion Food insecurity is a pervasive problem among adolescents from low-income communities and is associated with lower developmental assets, particularly family assets. That community assets were higher among VLFS youth underscores the importance of community-level resources in struggling areas. PMID:25620305

  1. The relationship between developmental assets and food security in adolescents from a low-income community.

    PubMed

    Shtasel-Gottlieb, Zoë; Palakshappa, Deepak; Yang, Fanyu; Goodman, Elizabeth

    2015-02-01

    To explore the association between developmental assets (characteristics, experiences, and relationships that shape healthy development) and food insecurity among adolescents from a low-income urban community. This mixed-methods study occurred in two phases. In phase 1, using a census approach, 2,350 6th to 12th graders from the public school district completed an anonymous survey that included the developmental assets profile (DAP), the youth self-report form of the Core Food Security Module, and demographic questions. Logistic and multinomial regression analyses determined independent associations between developmental assets and food security adjusting for demographics. In phase 2, 20 adult key informant interviews and four semistructured student focus groups were performed to explain findings from phase 1. On average, DAP scores were consistent with national norms. Food insecurity was prevalent; 14.9% reported low food security and 8.6% very low food security (VLFS). Logistic regression revealed that higher DAP was associated with lower odds of food insecurity (odds ratio [OR], .96; 95% confidence interval [CI], .95-.97); family assets drove this association (OR, .93; 95% CI, .91-.95). In multinomial regression modeling, these associations persisted, and paradoxically, higher community assets were also associated with VLFS (ORVLFS, 1.08; 95% CI, 1.04-1.13). Qualitative analyses suggested that greater need among VLFS youth led to increased connections to community resources despite barriers to access such as stigma, home instability, and cultural differences. Food insecurity is a pervasive problem among adolescents from low-income communities and is associated with lower developmental assets, particularly family assets. The fact that community assets were higher among VLFS youth underscores the importance of community-level resources in struggling areas. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  2. Public perspectives on nuclear security. US national security surveys, 1993--1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, K.G.; Jenkins-Smith, H.C.

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between USmore » and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.« less

  3. Food insecurity among Iraqi refugees living in Lebanon, 10 years after the invasion of Iraq: data from a household survey.

    PubMed

    Ghattas, Hala; Sassine, AnnieBelle J; Seyfert, Karin; Nord, Mark; Sahyoun, Nadine R

    2014-07-14

    Iraqi refugees in Lebanon are vulnerable to food insecurity because of their limited rights and fragile livelihoods. The objective of the present study was to assess household food insecurity among Iraqi refugees living in Lebanon, almost 10 years after the invasion of Iraq. A representative survey of 800 UN High Commissioner for Refugees-registered refugee households in Lebanon was conducted using multi-stage cluster random sampling. We measured food insecurity using a modified US Department of Agriculture household food security module. We collected data on household demographic, socio-economic, health, housing and dietary diversity status and analysed these factors by food security status. Hb level was measured in a subset of children below 5 years of age (n 85). Weighted data were used in univariate and multivariate analyses. Among the Iraqi refugee households surveyed (n 630), 20·1% (95% CI 17·3, 23·2) were found to be food secure, 35·5% (95% CI 32·0, 39·2) moderately food insecure and 44·4% (95% CI 40·8, 48·1) severely food insecure. Severe food insecurity was associated with the respondent's good self-reported health (OR 0·3, 95% CI 0·2, 0·5), length of stay as a refugee (OR 1·1, 95% CI 1·0, 1·2), very poor housing quality (OR 3·3, 95% CI 1·6, 6·5) and the number of children in the household (OR 1·2, 95% CI 1·0, 1·4), and resulted in poor dietary diversity (P< 0·0001). Anaemia was found in 41% (95% CI 30·6, 51·9) of children below 5 years of age, but was not associated with food insecurity. High food insecurity, low diet quality and high prevalence of anaemia in Iraqi refugees living in Lebanon call for urgent programmes to address the food and health situation of this population with restricted rights.

  4. Health Instruction Packages: Dental Personnel.

    ERIC Educational Resources Information Center

    Hayes, Gary E.; And Others

    Text, illustrations, and exercises are utilized in this set of four learning modules designed to instruct non-professional dental personnel in selected job-related skills. The first module, by Gary E. Hayes, describes how to locate the hinge axis point of the jaw, place and secure a bitefork, and perform a facebow transfer. The second module,…

  5. Frogmen on Apollo command module boilerplate flotation collar during recovery

    NASA Image and Video Library

    1966-02-22

    Apollo command module boilerplate floats in the Atlantic Ocean during a practice recovery exercise. Frogmen in a liferaft and on the flotation collar secure the command module boilerplate for hoisting onto a nearby recovery ship. The exercise was conducted in preparation for the forthcoming Apollo-Saturn 201 (AS-201) mission.

  6. 78 FR 17220 - Request for Information (RFI) Regarding the Planned Biotechnology Development Module (BDM) As...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0018] Request for Information (RFI) Regarding the Planned Biotechnology Development Module (BDM) As Part of the National Bio and Agro-Defense... Development Module (BDM) a planned component of the National Bio and Agro-Defense Facility (NBAF) and...

  7. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  8. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 15 2014-01-01 2014-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  9. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  10. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  11. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  12. Securing electronic health records with novel mobile encryption schemes.

    PubMed

    Weerasinghe, Dasun; Elmufti, Kalid; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    2007-01-01

    Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.

  13. Amplifier Module for 260-GHz Band Using Quartz Waveguide Transitions

    NASA Technical Reports Server (NTRS)

    Padmanabhan, Sharmila; Fung, King Man; Kangaslahti, Pekka P.; Peralta, Alejandro; Soria, Mary M.; Pukala, David M.; Sin, Seth; Samoska, Lorene A.; Sarkozy, Stephen; Lai, Richard

    2012-01-01

    Packaging of MMIC LNA (monolithic microwave integrated circuit low-noise amplifier) chips at frequencies over 200 GHz has always been problematic due to the high loss in the transition between the MMIC chip and the waveguide medium in which the chip will typically be used. In addition, above 200 GHz, wire-bond inductance between the LNA and the waveguide can severely limit the RF matching and bandwidth of the final waveguide amplifier module. This work resulted in the development of a low-loss quartz waveguide transition that includes a capacitive transmission line between the MMIC and the waveguide probe element. This capacitive transmission line tunes out the wirebond inductance (where the wire-bond is required to bond between the MMIC and the probe element). This inductance can severely limit the RF matching and bandwidth of the final waveguide amplifier module. The amplifier module consists of a quartz E-plane waveguide probe transition, a short capacitive tuning element, a short wire-bond to the MMIC, and the MMIC LNA. The output structure is similar, with a short wire-bond at the output of the MMIC, a quartz E-plane waveguide probe transition, and the output waveguide. The quartz probe element is made of 3-mil quartz, which is the thinnest commercially available material. The waveguide band used is WR4, from 170 to 260 GHz. This new transition and block design is an improvement over prior art because it provides for better RF matching, and will likely yield lower loss and better noise figure. The development of high-performance, low-noise amplifiers in the 180-to- 700-GHz range has applications for future earth science and planetary instruments with low power and volume, and astrophysics array instruments for molecular spectroscopy. This frequency band, while suitable for homeland security and commercial applications (such as millimeter-wave imaging, hidden weapons detection, crowd scanning, airport security, and communications), also has applications to future NASA missions. The Global Atmospheric Composition Mission (GACM) in the NRC Decadel Survey will need low-noise amplifiers with extremely low noise temperatures, either at room temperature or for cryogenic applications, for atmospheric remote sensing.

  14. Automatic Response to Intrusion

    DTIC Science & Technology

    2002-10-01

    Computing Corporation Sidewinder Firewall [18] SRI EMERALD Basic Security Module (BSM) and EMERALD File Transfer Protocol (FTP) Monitors...the same event TCP Wrappers [24] Internet Security Systems RealSecure [31] SRI EMERALD IDIP monitor NAI Labs Generic Software Wrappers Prototype...included EMERALD , NetRadar, NAI Labs UNIX wrappers, ARGuE, MPOG, NetRadar, CyberCop Server, Gauntlet, RealSecure, and the Cyber Command System

  15. Quantum cryptography to satellites for global secure key distribution

    NASA Astrophysics Data System (ADS)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  16. What Can "Social Practice" Theory and "Socio-Cultural" Theory Contribute to Our Understanding of the Processes of Module Design?

    ERIC Educational Resources Information Center

    Binns, Carole

    2015-01-01

    This article discusses the data obtained from an online survey of academic staff who are involved in module design and who are employed within one university. The survey was used as a baselining tool to explore the nature of current module design practice within the survey sample. Do academics consistently employ the pragmatic approaches…

  17. Navy Occupational Health Information Management System (NOHIMS). Environmental Exposure Module. Users’ Manual

    DTIC Science & Technology

    1987-01-16

    menus , controls user and device access to the system, manages the security features associated with menus , devices, and users, provides...in the files, or the number of files in the system. 2-2 3.0 MODULE INPUT PROCESSES 3.1 Summary of Input Processes The EE module contains many menu ...Output Processes The EE module contains many menu options which enable the user to obtain needed information from the module. These options can be

  18. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    NASA Technical Reports Server (NTRS)

    Nguyen, Quang-Viet (Inventor); Kojima, Jun (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  19. Household food insecurity is associated with depressive symptoms among low-income pregnant Latinas

    PubMed Central

    Hromi-Fiedler, Amber; Bermúdez-Millán, Angela; Segura-Pérez, Sofia; Pérez-Escamilla, Rafael

    2010-01-01

    Latinas experience high rates of poverty, household food insecurity, and prenatal depression. To date, only one U.S. study has examined the relationship between household food insecurity and prenatal depression, yet it focused primarily on non-Latina white and non-Latina Black populations. Therefore, this study examined the independent association of household food insecurity with depressive symptoms among low-income pregnant Latinas. This cross-sectional study included 135 low income pregnant Latinas living in Hartford, Connecticut. Women were assessed at enrollment for household food security during pregnancy using an adapted and validated version of the U.S. Household Food Security Survey Module. Prenatal depressive symptoms were assessed using the Center for Epidemiological Studies Depression Scale (CES-D). A cutoff of ≥ 21 was used to indicate elevated levels of prenatal depressive symptoms (EPDS). Multivariate backwards stepwise logistic regression was used to identify risk factors for EPDS. Almost one third of participants had EPDS. Women who were food insecure were more likely to experience EPDS compared to food secure women (OR=2.59; 95% CI=1.03–6.52). Being primiparous, experiencing heartburn and reporting poor/fair health during pregnancy, as well as having a history of depression were also independent risk factors for experiencing EPDS. Findings from this study suggest the importance of assessing household food insecurity when evaluating depression risk among pregnant Latinas. PMID:20735732

  20. Food insecurity may lead to incomplete HIV viral suppression and less immune reconstitution among HIV/hepatitis C virus-coinfected people.

    PubMed

    Aibibula, W; Cox, J; Hamelin, A-M; Moodie, Eem; Naimi, A I; McLinden, T; Klein, M B; Brassard, P

    2018-02-01

    The aim of this study was to determine the impact of food insecurity (FI) on HIV viral load and CD4 count among people coinfected with HIV and hepatitis C virus (HCV). This study was conducted using data from the Food Security & HIV-HCV Sub-Study of the Canadian Co-Infection Cohort study. FI was measured using the adult scale of Health Canada's Household Food Security Survey Module and was classified into three categories: food security, moderate food insecurity and severe food insecurity. The association between FI, HIV viral load, and CD4 count was assessed using a stabilized inverse probability weighted marginal structural model. A total of 725 HIV/HCV-coinfected people with 1973 person-visits over 3 years of follow-up contributed to this study. At baseline, 23% of participants experienced moderate food insecurity and 34% experienced severe food insecurity. The proportion of people with undetectable HIV viral load was 75% and the median CD4 count was 460 [interquartile range (IQR): 300-665] cells/μL. People experiencing severe food insecurity had 1.47 times [95% confidence interval (CI): 1.14, 1.88] the risk of having detectable HIV viral load and a 0.91-fold (95% CI: 0.84, 0.98) increase in CD4 count compared with people who were food secure. These findings provide evidence of the negative impact of food insecurity on HIV viral load and CD4 count among HIV/HCV-coinfected people. © 2017 British HIV Association.

  1. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  2. A survey of pandemic influenza preparedness and response capabilities in Chicago area hospital security departments.

    PubMed

    Kimmerly, David P

    2009-01-01

    This article is a summary based on a December 2007 paper prepared by the author in partial fulfillment of the requirements for a master's degree in business and organizational security management at Webster University. The project described was intended to assess Chicago-area healthcare organization security departments' preparedness and response capabilities for a potential influenza pandemic. While the author says healthcare organizations are learning from the pandemics of the past, little research has been conducted on the requirements necessary within hospital security departments. The article explores staffing, planning, preparation and response capabilities within a healthcare security context to determine existing resources available to the healthcare security community. Eleven completed surveys were received from hospital security managers throughout the geographical Chicago area. They reveal that hospital security managers are conscious of the risks of a pandemic influenza outbreak. Yet, it was found that several gaps existed within hospital security department staffing and response capabilities, as hospital security departments may not have the available resources necessary to adequately maintain their operations during a pandemic incident.

  3. Secure communications system

    NASA Technical Reports Server (NTRS)

    Doland, G. D.

    1977-01-01

    System employs electronically randomized variant of quadraphase modulation and demodulation between two synchronized transceivers. System uses off-the-shelf components. It may be used with digital data, command signals, delta-modulated voice signals, digital television signals, or other data converted to digital form.

  4. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance... surveying travelers to measure customer satisfaction of aviation security in an effort to more efficiently.... Information Collection Requirement OMB Control Number 1652-0013; Aviation Security Customer Satisfaction...

  5. Clarifying Resilience in the Context of Homeland Security

    DTIC Science & Technology

    2013-03-01

    Resilience Is a Complex Adaptive System of Systems ( CASoS ) ....60 4. Resilience Is Experienced and Demonstrated in Different Ways ..60 5. Resilience Is...The inclusion of a resilience module into existing homeland security training programs broadens the practitioner’s knowledge base from a basic level...psychology offer several considerations for the homeland security practitioner. The first consideration maintains that a de -emphasis on the

  6. Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.

    PubMed

    Schoenfisch, Ashley L; Pompeii, Lisa A

    2016-06-27

    Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).

  7. Security Implications of Electronic Commerce: A Survey of Consumers and Businesses.

    ERIC Educational Resources Information Center

    Furnell, S. M.; Karweni, T.

    1999-01-01

    Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection.

  9. Security Risks and Protection in Online Learning: A Survey

    ERIC Educational Resources Information Center

    Chen, Yong; He, Wu

    2013-01-01

    This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…

  10. Food insecurity among psychiatric patients and welfare clients in Israel.

    PubMed

    Kaufman, Roni; Mirsky, Julia; Witztum, Eliezer; Grisaru, Nimrod

    2013-01-01

    Twenty-two percent of households in Israel experience food insecurity, and it is especially widespread in socio-economically distressed strata. Although their low socio-economic status renders psychiatric patients at risk for food insecurity, this issue has thus far been ignored in both practice and research. To explore food insecurity among psychiatric patients in comparison with welfare-services clients in order to raise awareness of food insecurity in this population. 114 respondents were recruited from among patients admitted to the emergency room and hospitalized in a mental health center in Beer Sheva; 555 respondents were recruited from among low-income clients of welfare service agencies in the Beer Sheva area. All respondents were surveyed with a self-report questionnaire and with the Food Security Core Survey Module (FSCSM). Forty percent of psychiatric patients and 59% of welfare-services clients reported food insecurity. The use of formal and informal support systems was lower among food-insecure psychiatric patients than among food-insecure welfare clients. Psychiatric patients appear to be a risk population for food insecurity; therefore planned interventions and specific food programs are called for.

  11. Human tracking over camera networks: a review

    NASA Astrophysics Data System (ADS)

    Hou, Li; Wan, Wanggen; Hwang, Jenq-Neng; Muhammad, Rizwan; Yang, Mingyang; Han, Kang

    2017-12-01

    In recent years, automated human tracking over camera networks is getting essential for video surveillance. The tasks of tracking human over camera networks are not only inherently challenging due to changing human appearance, but also have enormous potentials for a wide range of practical applications, ranging from security surveillance to retail and health care. This review paper surveys the most widely used techniques and recent advances for human tracking over camera networks. Two important functional modules for the human tracking over camera networks are addressed, including human tracking within a camera and human tracking across non-overlapping cameras. The core techniques of human tracking within a camera are discussed based on two aspects, i.e., generative trackers and discriminative trackers. The core techniques of human tracking across non-overlapping cameras are then discussed based on the aspects of human re-identification, camera-link model-based tracking and graph model-based tracking. Our survey aims to address existing problems, challenges, and future research directions based on the analyses of the current progress made toward human tracking techniques over camera networks.

  12. Three Essays on Information Security Policies

    ERIC Educational Resources Information Center

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  13. Ending the U.S. War in Iraq: The Final Transition, Operational Maneuver, and Disestablishment of United States Forces-Iraq

    DTIC Science & Technology

    2013-01-01

    management survey and ensure that all databases (military and contracted civilian), key leader engagement logs, assistance project files, and other...Princeton University Press, 2000; Michael I. Handel, War Termination—A Critical Survey , Jeru- salem: Hebrew University, 1978; Jane Holl Lute, From the...DoS did not plan to install permanent and more costly security measures.133 Security surveys undertaken collaboratively by USF-I and multiple

  14. Coherent pulse position modulation quantum cipher

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sohma, Masaki; Hirota, Osamu

    2014-12-04

    On the basis of fundamental idea of Yuen, we present a new type of quantum random cipher, where pulse position modulated signals are encrypted in the picture of quantum Gaussian wave form. We discuss the security of our proposed system with a phase mask encryption.

  15. Survey on Security Issues in File Management in Cloud Computing Environment

    NASA Astrophysics Data System (ADS)

    Gupta, Udit

    2015-06-01

    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

  16. An Investigation of the Factors Related to Low Parent-Adolescent Attachment Security in Taiwan.

    PubMed

    Chen, Chen-Jung; Sung, Huei-Chuan; Chen, Yi-Chang; Wang, Chih-Hung

    2017-09-01

    Adolescence may involve increases in many behavioral problems and psychosocial maladaptation. Adolescents must successfully cope with these challenges to achieve positive developmental milestones. To investigate whether low parental attachment security among adolescents in Taiwan is associated with their demographic characteristics, psychosocial maladaptation, and depression. A cross-sectional survey. A total of 335 adolescents completed the questionnaires. The Inventory of Parent and Peer Attachment, the Chinese version of the Youth Self-Report, and the Beck Depression Inventory-II were used to survey the participants. Correlation and multiple linear regressions, using low attachment security as the response variable, were used in the statistical analysis. The prevalence of Taiwanese adolescents with low parental attachment security was 38.5%. Low parental attachment security in adolescents was significantly associated with parental remarriage status and psychosocial maladaptation. By considering these risk factors, nursing educators and nurses could develop effective interventions to strengthen parent-adolescent attachment security.

  17. Design and implementation of modular home security system with short messaging system

    NASA Astrophysics Data System (ADS)

    Budijono, Santoso; Andrianto, Jeffri; Axis Novradin Noor, Muhammad

    2014-03-01

    Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile) mobile device using SMS (Short Messaging System) and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  18. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.

    PubMed

    Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek

    2015-10-14

    Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.

  19. The climate sensitivity of food security in Mali - a historical perspective on availability and access dimensions

    NASA Astrophysics Data System (ADS)

    Giannini, A.; Krishnamurthy, P. K.; Cousin, R.; Choularton, R. J.

    2011-12-01

    We present results based on an analysis of a 2005 livelihood survey of ~2000 rural households in ~200 villages scattered across Mali, a sparsely populated, large land-locked country in West Africa, to elucidate the role of climate variability and change in shaping availability and access dimensions of food security. The Comprehensive Food Security Vulnerability Analysis is a recurrent survey carried out by the World Food Programme and in-country partners to map out nutritional and socio-economic status during normal (~food secure) conditions in the hope of understanding underlying cause(s) and prevent the next food security crisis. We set the spatial characterization of food security that emerges from the CFSVA against the background of a varying climate, on intra-seasonal, interannual and multi-decadal time scales: through elucidation of the influence of climate on agricultural production we arrive at an interpretation of structural and conjunctural events affecting food security. We conclude with a discussion of possible interventions to reduce vulnerability.

  20. A concurrent resolution expressing the sense of Congress that the census surveys and the information derived from those surveys are crucial to the national welfare.

    THOMAS, 112th Congress

    Sen. Rockefeller, John D., IV [D-WV

    2012-08-02

    Senate - 08/29/2012 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. 2016 Emerging Technology Domains Risk Survey

    DTIC Science & Technology

    2016-04-05

    2016 Emerging Technology Domains Risk Survey Christopher King Dan Klinedinst Todd Lewellen Garret Wassermann April 2016 TECHNICAL REPORT...Unlimited [Checkoway 2011] Checkoway, Stephen; McCoy, Damon; Kantor, Brian; Anderson, Danny; Shacham, Hovav; Savage, Stefan. Comprehensive Experimental ...Koscher 2010] Koscher, Karl et al. “ Experimental Security Analysis of a Modern Automobile,” 447-462. IEEE Symposium on Security and Privacy

  2. Is Your Security Budget Used Effectively?

    ERIC Educational Resources Information Center

    Kaufer, Steve

    1997-01-01

    Presents survey information showing where school districts have invested their security budgets. Included are the rankings of the various threats school districts see as requiring security action and the areas most often covered by closed circuit television systems are pointed. (GR)

  3. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, andmore » views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.« less

  4. Cloud Computing Security Issue: Survey

    NASA Astrophysics Data System (ADS)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  5. FPGA based digital phase-coding quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Lu, XiaoMing; Zhang, LiJun; Wang, YongGang; Chen, Wei; Huang, DaJun; Li, Deng; Wang, Shuang; He, DeYong; Yin, ZhenQiang; Zhou, Yu; Hui, Cong; Han, ZhengFu

    2015-12-01

    Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phasecoding is an important approach to develop practical QKD systems in fiber channel. In order to improve the phase-coding modulation rate, we proposed a new digital-modulation method in this paper and constructed a compact and robust prototype of QKD system using currently available components in our lab to demonstrate the effectiveness of the method. The system was deployed in laboratory environment over a 50 km fiber and continuously operated during 87 h without manual interaction. The quantum bit error rate (QBER) of the system was stable with an average value of 3.22% and the secure key generation rate is 8.91 kbps. Although the modulation rate of the photon in the demo system was only 200 MHz, which was limited by the Faraday-Michelson interferometer (FMI) structure, the proposed method and the field programmable gate array (FPGA) based electronics scheme have a great potential for high speed QKD systems with Giga-bits/second modulation rate.

  6. Handheld portable real-time tracking and communications device

    DOEpatents

    Wiseman, James M [Albuquerque, NM; Riblett, Jr., Loren E.; Green, Karl L [Albuquerque, NM; Hunter, John A [Albuquerque, NM; Cook, III, Robert N.; Stevens, James R [Arlington, VA

    2012-05-22

    Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.

  7. 76 FR 72433 - Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ...] Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program AGENCY... operators and foreign air carriers submit to Secure Flight for the purposes of watch list matching... screening checkpoint which airport operators will submit to Secure Flight, and a survey of certain general...

  8. Bio-Security Proficiencies Project for Beginning Producers in 4-H

    ERIC Educational Resources Information Center

    Smith, Martin H.; Meehan, Cheryl L.; Borba, John A.

    2014-01-01

    Improving bio-security practices among 4-H members who raise and show project animals is important. Bio-security measures can reduce the risk of disease spread and mitigate potential health and economic risks of disease outbreaks involving animal and zoonotic pathogens. Survey data provided statistical evidence that the Bio-Security Proficiencies…

  9. Compliance with HIPAA security standards in U.S. Hospitals.

    PubMed

    Davis, Diane; Having, Karen

    2006-01-01

    With the widespread use of computer networks, the amount of information stored electronically has grown exponentially, resulting in increased concern for privacy and security of information. The healthcare industry has been put to the test with the federally mandated Health Insurance Portability and Accountability Act (HIPAA) of 1996. To assess the compliance status of HIPAA security standards, a random sample of 1,000 U.S. hospitals was surveyed in January 2004, yielding a return rate of 29 percent. One year later, a follow-up survey was sent to all previous respondents, with 50 percent replying. HIPAA officers'perceptions of security compliance in 2004 and 2005 are compared in this article. The security standards achieving the highest level of compliance in both 2004 and 2005 were obtaining required business associate agreements and physical safeguards to limit access to electronic information systems. Respondents indicated least compliance both years in performing periodic evaluation of security practices governed by the Security Rule. Roadblocks, threats, problems and solutions regarding HIPAA compliance are discussed. This information may be applied to current and future strategies toward maintaining security of information systems throughout the healthcare industry.

  10. The association between food insecurity and incident type 2 diabetes in Canada: A population-based cohort study.

    PubMed

    Tait, Christopher A; L'Abbé, Mary R; Smith, Peter M; Rosella, Laura C

    2018-01-01

    A pervasive and persistent finding is the health disadvantage experienced by those in food insecure households. While clear associations have been identified between food insecurity and diabetes risk factors, less is known about the relationship between food insecurity and incident type 2 diabetes. The objective of this study is to investigate the association between household food insecurity and the future development of type 2 diabetes. We used data from Ontario adult respondents to the 2004 Canadian Community Health Survey, linked to health administrative data (n = 4,739). Food insecurity was assessed with the Household Food Security Survey Module and incident type 2 diabetes cases were identified by the Ontario Diabetes Database. Multivariable adjusted Cox proportional hazards models were used to estimate hazard ratios (HRs) and 95% confidence intervals (CIs) for type 2 diabetes as a function of food insecurity. Canadians in food insecure households had more than 2 times the risk of developing type 2 diabetes compared to those in food secure households [HR = 2.40, 95% CI = 1.17-4.94]. Additional adjustment for BMI attenuated the association between food insecurity and type 2 diabetes [HR = 2.08, 95% CI = 0.99, 4.36]. Our findings indicate that food insecurity is independently associated with increased diabetes risk, even after adjustment for a broad set of measured confounders. Examining diabetes risk from a broader perspective, including a comprehensive understanding of socioeconomic and biological pathways is paramount for informing policies and interventions aimed at mitigating the future burden of type 2 diabetes.

  11. Prioritization of the essentials in the spending patterns of Canadian households experiencing food insecurity.

    PubMed

    Fafard St-Germain, Andrée-Anne; Tarasuk, Valerie

    2018-03-21

    Food insecurity is a potent determinant of health and indicator of material deprivation in many affluent countries. Food insecurity is associated with compromises in food and housing expenditures, but how it relates to other expenditures is unknown. The present study described households' resource allocation over a 12-month period by food insecurity status. Expenditure data from the 2010 Survey of Household Spending were aggregated into four categories (basic needs, other necessities, discretionary, investments/assets) and ten sub-categories (food, clothing, housing, transportation, household/personal care, health/education, leisure, miscellaneous, personal insurance/pension, durables/assets). A four-level food insecurity status was created using the adult-specific items of the Household Food Security Survey Module. Mean dollars spent and budget share by food insecurity status were estimated with generalized linear models adjusted first for household size and composition, and subsequently for after-tax income quartiles. Canada. Population-based sample of households from the ten provinces (n 9050). Food-secure households had higher mean total expenditures than marginally, moderately and severely food-insecure households (P-trend <0·0001). As severity of food insecurity increased, households spent less on all categories and sub-categories, except transportation, but they allocated a larger budget share to basic needs and smaller shares to discretionary spending and investments/assets. The downward trends for dollars spent on basic needs and other necessities became non-significant after accounting for income, but the upward trend in the budget shares for basic needs persisted. The spending patterns of food-insecure households suggest that they prioritized essential needs above all else.

  12. The design of automatic software testing module for civil aviation information system

    NASA Astrophysics Data System (ADS)

    Qi, Qi; Sun, Yang

    2018-05-01

    In this paper, the practical innovation design is carried out according to the urgent needs of the automatic testing module of civil aviation information system. Firstly, the background and significance of the automatic testing module of civil aviation information system is expounded, and the current research status of automatic testing module and the advantages and disadvantages of related software are analyzed. Then, from the three aspects of macro demand, module functional requirement and module nonfunctional demand, we further study the needs of automatic testing module of civil aviation information system. Finally, from the four aspects of module structure, module core function, database and security, we have made an innovative plan for the automatic testing module of civil aviation information system.

  13. HIPPO Unit Commitment Version 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2017-01-17

    Developed for the Midcontinent Independent System Operator, Inc. (MISO), HIPPO-Unit Commitment Version 1 is for solving security constrained unit commitment problem. The model was developed to solve MISO's cases. This version of codes includes I/O module to read in MISO's csv files, modules to create a state-based mixed integer programming formulation for solving MIP, and modules to test basic procedures to solve MIP via HPC.

  14. Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness

    DOE PAGES

    Vollmer, Todd; Manic, Milos; Linda, Ondrej

    2013-06-01

    The proliferation of digital devices in a networked industrial ecosystem, along with an exponential growth in complexity and scope, has resulted in elevated security concerns and management complexity issues. This paper describes a novel architecture utilizing concepts of Autonomic computing and a SOAP based IF-MAP external communication layer to create a network security sensor. This approach simplifies integration of legacy software and supports a secure, scalable, self-managed framework. The contribution of this paper is two-fold: 1) A flexible two level communication layer based on Autonomic computing and Service Oriented Architecture is detailed and 2) Three complementary modules that dynamically reconfiguremore » in response to a changing environment are presented. One module utilizes clustering and fuzzy logic to monitor traffic for abnormal behavior. Another module passively monitors network traffic and deploys deceptive virtual network hosts. These components of the sensor system were implemented in C++ and PERL and utilize a common internal D-Bus communication mechanism. A proof of concept prototype was deployed on a mixed-use test network showing the possible real world applicability. In testing, 45 of the 46 network attached devices were recognized and 10 of the 12 emulated devices were created with specific Operating System and port configurations. Additionally the anomaly detection algorithm achieved a 99.9% recognition rate. All output from the modules were correctly distributed using the common communication structure.« less

  15. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey

    PubMed Central

    Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.

    2017-01-01

    Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626

  16. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    PubMed

    Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A

    2017-01-01

    The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  17. Impact of Food Insecurity on Depressive Symptoms Among HIV-HCV Co-infected People.

    PubMed

    Aibibula, Wusiman; Cox, Joseph; Hamelin, Anne-Marie; Moodie, Erica E M; Naimi, Ashley I; McLinden, Taylor; Klein, Marina B; Brassard, Paul

    2017-12-01

    Food insecurity (FI) is associated with depressive symptoms among HIV mono-infected people. Our objective was to examine to what extent this association holds among HIV-hepatitis C virus (HCV) co-infected people. We used data from a prospective cohort study of HIV-HCV co-infected people in Canada. FI was measured using the ten-item adult scale of Health Canada's Household Food Security Survey Module and was classified into three categories: food secure, moderate FI, and severe FI. Depressive symptoms were measured using the Center for Epidemiologic Studies Depression Scale (CES-D-10) and was classified into absence or presence of depressive symptoms. FI, depressive symptoms, and other covariates were updated every 6 months. The association between FI and depressive symptoms was assessed using a stabilized inverse probability weighted marginal structural model. The study sample included 725 HIV-HCV co-infected people with 1973 person-visits over 3 years of follow up. At baseline, 23% of participants experienced moderate food insecurity, 34% experienced severe food insecurity and 52% had depressive symptoms. People experiencing moderate FI had 1.63 times (95% CI 1.44-1.86) the risk of having depressive symptoms and people experiencing severe FI had 2.01 times (95% CI 1.79-2.25) the risk of having depressive symptoms compared to people who were food secure. FI is a risk factor for developing depressive symptoms among HIV-HCV co-infected people. Food supplementation, psychosocial support and counseling may improve patient health outcomes.

  18. A Survey of Hardware and Software Technologies for the Rapid Development of Multimedia Instructional Modules

    ERIC Educational Resources Information Center

    Ganesan, Nanda

    2008-01-01

    A survey of hardware and software technologies was conducted to identify suitable technologies for the development of instructional modules representing various instructional approaches. The approaches modeled were short PowerPoint presentations, chalk-and-talk type of lectures and software tutorials. The survey focused on identifying application…

  19. The Effect of the Social Security Earnings Test on Male Labor Supply: New Evidence from Survey and Administrative Data

    ERIC Educational Resources Information Center

    Haider, Steven J.; Loughran, David S.

    2008-01-01

    Despite numerous empirical studies, there is surprisingly little agreement about whether the Social Security earnings test affects male labor supply. In this paper, we provide a comprehensive analysis of the labor supply effects of the earnings test using longitudinal administrative earnings data and more commonly used survey data. We find that…

  20. Trends and Correlates of Consenting to Provide Social Security Numbers: Longitudinal Findings from the General Social Survey (1993-2010)

    ERIC Educational Resources Information Center

    Kim, Jibum; Shin, Hee-Choon; Rosen, Zohn; Kang, Jeong-han; Dykema, Jennifer; Muennig, Peter

    2015-01-01

    Privacy and confidentiality are often of great concern to respondents answering sensitive questions posed by interviewers. Using the 1993-2010 General Social Survey, we examined trends in the provision of social security numbers (SSNs) and correlates of those responses. Results indicate that the rate of SSN provision has declined over the past…

  1. Dispatching power system for preventive and corrective voltage collapse problem in a deregulated power system

    NASA Astrophysics Data System (ADS)

    Alemadi, Nasser Ahmed

    Deregulation has brought opportunities for increasing efficiency of production and delivery and reduced costs to customers. Deregulation has also bought great challenges to provide the reliability and security customers have come to expect and demand from the electrical delivery system. One of the challenges in the deregulated power system is voltage instability. Voltage instability has become the principal constraint on power system operation for many utilities. Voltage instability is a unique problem because it can produce an uncontrollable, cascading instability that results in blackout for a large region or an entire country. In this work we define a system of advanced analytical methods and tools for secure and efficient operation of the power system in the deregulated environment. The work consists of two modules; (a) contingency selection module and (b) a Security Constrained Optimization module. The contingency selection module to be used for voltage instability is the Voltage Stability Security Assessment and Diagnosis (VSSAD). VSSAD shows that each voltage control area and its reactive reserve basin describe a subsystem or agent that has a unique voltage instability problem. VSSAD identifies each such agent. VS SAD is to assess proximity to voltage instability for each agent and rank voltage instability agents for each contingency simulated. Contingency selection and ranking for each agent is also performed. Diagnosis of where, why, when, and what can be done to cure voltage instability for each equipment outage and transaction change combination that has no load flow solution is also performed. A security constrained optimization module developed solves a minimum control solvability problem. A minimum control solvability problem obtains the reactive reserves through action of voltage control devices that VSSAD determines are needed in each agent to obtain solution of the load flow. VSSAD makes a physically impossible recommendation of adding reactive generation capability to specific generators to allow a load flow solution to be obtained. The minimum control solvability problem can also obtain solution of the load flow without curtailing transactions that shed load and generation as recommended by VSSAD. A minimum control solvability problem will be implemented as a corrective control, that will achieve the above objectives by using minimum control changes. The control includes; (1) voltage setpoint on generator bus voltage terminals; (2) under load tap changer tap positions and switchable shunt capacitors; and (3) active generation at generator buses. The minimum control solvability problem uses the VSSAD recommendation to obtain the feasible stable starting point but completely eliminates the impossible or onerous recommendation made by VSSAD. This thesis reviews the capabilities of Voltage Stability Security Assessment and Diagnosis and how it can be used to implement a contingency selection module for the Open Access System Dispatch (OASYDIS). The OASYDIS will also use the corrective control computed by Security Constrained Dispatch. The corrective control would be computed off line and stored for each contingency that produces voltage instability. The control is triggered and implemented to correct the voltage instability in the agent experiencing voltage instability only after the equipment outage or operating changes predicted to produce voltage instability have occurred. The advantages and the requirements to implement the corrective control are also discussed.

  2. An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard

    NASA Astrophysics Data System (ADS)

    Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi

    H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.

  3. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    PubMed

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data.

  4. Quantum key distribution using basis encoding of Gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua

    2018-04-01

    The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.

  5. Socioeconomic status, food security, and dental caries in US children: mediation analyses of data from the National Health and Nutrition Examination Survey, 2007-2008.

    PubMed

    Chi, Donald L; Masterson, Erin E; Carle, Adam C; Mancl, Lloyd A; Coldwell, Susan E

    2014-05-01

    We examined associations of household socioeconomic status (SES) and food security with children's oral health outcomes. We analyzed 2007 and 2008 US National Health and Nutrition Examination Survey data for children aged 5 to 17 years (n = 2206) to examine the relationship between food security and untreated dental caries and to assess whether food security mediates the SES-caries relationship. About 20.1% of children had untreated caries. Most households had full food security (62%); 13% had marginal, 17% had low, and 8% had very low food security. Higher SES was associated with significantly lower caries prevalence (prevalence ratio [PR] = 0.77; 95% confidence interval = 0.63, 0.94; P = .01). Children from households with low or very low food security had significantly higher caries prevalence (PR = 2.00 and PR = 1.70, respectively) than did children living in fully food-secure households. Caries prevalence did not differ among children from fully and marginally food-secure households (P = .17). Food insecurity did not appear to mediate the SES-caries relationship. Interventions and policies to ensure food security may help address the US pediatric caries epidemic.

  6. Research on web-based decision support system for sports competitions

    NASA Astrophysics Data System (ADS)

    Huo, Hanqiang

    2010-07-01

    This paper describes the system architecture and implementation technology of the decision support system for sports competitions, discusses the design of decision-making modules, management modules and security of the system, and proposes the development idea of building a web-based decision support system for sports competitions.

  7. 75 FR 70057 - Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-16

    ..., and deals with U.S. securities laws, regulations, sales practices and special products drawn from the standard Series 7 examination. The Series 37 version is for Canadian registrants who have successfully completed the basic core module of the CSI Global Education (``CSI'', formerly the Canadian Securities...

  8. 75 FR 70052 - Self-Regulatory Organizations; EDGX Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-16

    ..., and deals with U.S. securities laws, regulations, sales practices and special products drawn from the standard Series 7 examination. The Series 37 version is for Canadian registrants who have successfully completed the basic core module of the CSI Global Education (``CSI'', formerly the Canadian Securities...

  9. hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers

    NASA Astrophysics Data System (ADS)

    Li, Shujun; Sadeghi, Ahmad-Reza; Schmitz, Roland

    We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user's computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module.

  10. Food insecurity is associated with poor sleep outcomes among US adults.

    PubMed

    Ding, Meng; Keiley, Margaret K; Garza, Kimberly B; Duffy, Patricia A; Zizza, Claire A

    2015-03-01

    Although food insecure (FI) adults are at risk of chronic conditions, little research attention is given to their health behaviors, such as sleep. We examined the associations between adult food security status and sleep duration, sleep latency, and sleep complaints reported to a health care professional. Our population-based sample included 5637 men and 5264 women (≥22 y) who participated in the NHANES 2005-2010. Food security status was assessed with USDA's 10-item adult Food Security Survey Module. Self-reported information about sleep duration, sleep latency, and sleep complaints to a health care professional were used as sleep outcomes. Multiple linear, stratified by sex, and logistic regression models were used to estimate the association between food security status and the 3 sleep outcomes. Very low food secure (FS) women reported significantly shorter sleep duration than fully FS women (difference: -30 ± 5.2 min; P < 0.01); however, no relation to sleep duration was observed among men. Among men, participants who were marginally FS (4 ± 1.1 min), low FS (4 ± 1.7 min), and very low FS (5 ± 1.8 min) reported significantly longer sleep latency than fully FS men (P < 0.05), but no association with sleep latency was observed among women. The divergent patterns in sleep duration and latency were likely because of our reference groups reporting undesirable sleep outcomes; fully FS men reported inadequate sleep and fully FS women reported long sleep latency. Among both men and women, marginally FS (OR: 1.64; 95% CI: 1.24, 2.16), low FS (OR: 1.63; 95% CI: 1.16, 2.30), and very low FS (OR: 1.99; 95% CI: 1.36, 2.92) participants were more likely to report sleep complaints than their fully FS counterparts (P < 0.05). Poor sleep quantity and quality may predispose FI adults to adverse health outcomes. © 2015 American Society for Nutrition.

  11. 2012 California Household Travel Survey Supplement | Transportation Secure

    Science.gov Websites

    Data Center | NREL 2 California Household Travel Survey Supplement 2012 California Household Travel Survey Supplement The 2012 California Household Travel Survey Supplement focused on gathering . Called the "Augment Survey," it supplemented the 2010-2012 California Household Travel Survey

  12. Risk to Water Security on Small Islands

    NASA Astrophysics Data System (ADS)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map of the risk to water security throughout Andros Island. It evaluates risk to water security for current and future scenarios and will enable water resource managers to effectively adapt to future impacts on water security.

  13. A data-driven model for estimating industry average numbers of hospital security staff.

    PubMed

    Vellani, Karim H; Emery, Robert J; Reingle Gonzalez, Jennifer M

    2015-01-01

    In this article the authors report the results of an expanded survey, financed by the International Healthcare Security and Safety Foundation (IHSSF), applied to the development of a model for determining the number of security officers required by a hospital.

  14. Security and privacy issues in implantable medical devices: A comprehensive survey.

    PubMed

    Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E

    2015-06-01

    Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. Mobile Device Security: Perspectives of Future Healthcare Workers

    PubMed Central

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992

  16. Mobile Device Security: Perspectives of Future Healthcare Workers.

    PubMed

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.

  17. Analysis of secured Optical Orthogonal Frequency Division Multiplexed System

    NASA Astrophysics Data System (ADS)

    Gill, Harsimranjit Singh; Bhatia, Kamaljit Singh; Gill, Sandeep Singh

    2017-05-01

    In this paper, security issues for optical orthogonal frequency division multiplexed (OFDM) systems are emphasized. The encryption has been done on the data of coded OFDM symbols using data encryption standard (DES) algorithm before transmitting through the fiber. The results obtained justify that the DES provides better security to the input data without further bandwidth requirement. The data is transmitted to a distance of 1,000 km in a single-mode fiber with 16-quadrature amplitude modulation. The peak-to-average power ratio and optical signal-to-noise ratio of secure coded OFDM signal is fairly better than the conventional OFDM signal.

  18. Security analysis of orthogonal-frequency-division-multiplexing-based continuous-variable quantum key distribution with imperfect modulation

    NASA Astrophysics Data System (ADS)

    Zhang, Hang; Mao, Yu; Huang, Duan; Li, Jiawei; Zhang, Ling; Guo, Ying

    2018-05-01

    We introduce a reliable scheme for continuous-variable quantum key distribution (CV-QKD) by using orthogonal frequency division multiplexing (OFDM). As a spectrally efficient multiplexing technique, OFDM allows a large number of closely spaced orthogonal subcarrier signals used to carry data on several parallel data streams or channels. We place emphasis on modulator impairments which would inevitably arise in the OFDM system and analyze how these impairments affect the OFDM-based CV-QKD system. Moreover, we also evaluate the security in the asymptotic limit and the Pirandola-Laurenza-Ottaviani-Banchi upper bound. Results indicate that although the emergence of imperfect modulation would bring about a slight decrease in the secret key bit rate of each subcarrier, the multiplexing technique combined with CV-QKD results in a desirable improvement on the total secret key bit rate which can raise the numerical value about an order of magnitude.

  19. 75 FR 11552 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Aviation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ... From OMB of One Current Public Collection of Information: Aviation Security Customer Satisfaction.... The collection involves surveying travelers to measure customer satisfaction of aviation security in... OMB Control Number 1652-0013; Aviation Security Customer Satisfaction Performance Measurement...

  20. HOW TO SELECT THE PROPER SECURITY AND EQUIPMENT SURVEILLANCE SYSTEMS TO PROTECT YOUR FACILITIES.

    ERIC Educational Resources Information Center

    Honeywell, Inc., Minneapolis, Minn.

    IN PRESENTING A SURVEY OF MODERN SECURITY SYSTEMS, THIS BOOKLET DISCUSSES THE REQUIREMENTS FOR SURVEILLANCE AND PROTECTION OF AREAS, PERIMETER, AND OBJECTS. A VARIETY OF EQUIPMENT IS DESCRIBED WITH DISCUSSION OF OPERATING PROCEDURES, COSTS, AND RECENT DEVELOPMENTS IN SECURITY SYSTEMS. (JT)

  1. Surveillance systems for intermodal transportation

    NASA Astrophysics Data System (ADS)

    Jakovlev, Sergej; Voznak, Miroslav; Andziulis, Arunas

    2015-05-01

    Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.

  2. European Service Module Structural Test Article Load onto Guppy for Transport to Denver Colorado

    NASA Image and Video Library

    2017-06-23

    At Kennedy Space Center's Shuttle Landing Facility in Florida, workers move the Orion service module structural test article for Exploration Mission-1 (EM-1), built by the European Space Agency, inside NASA's Super Guppy aircraft. The module is secured inside the aircraft and shipped to Lockheed Martin's Denver facility to undergo testing. The Orion spacecraft will launch atop the agency's Space Launch System rocket on EM-1 in 2019

  3. Secure optical generalized filter bank multi-carrier system based on cubic constellation masked method.

    PubMed

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun

    2015-06-15

    A secure optical generalized filter bank multi-carrier (GFBMC) system with carrier-less amplitude-phase (CAP) modulation is proposed in this Letter. The security is realized through cubic constellation-masked method. Large key space and more flexibility masking can be obtained by cubic constellation masking aligning with the filter bank. An experiment of 18 Gb/s encrypted GFBMC/CAP system with 25-km single-mode fiber transmission is performed to demonstrate the feasibility of the proposed method.

  4. 2013 California Vehicle Survey | Transportation Secure Data Center | NREL

    Science.gov Websites

    3 California Vehicle Survey 2013 California Vehicle Survey The 2013 California Vehicle Survey (CVS Agency On behalf of the California Energy Commission, ICF International conducted the survey. Methodology Approximately 8,000 respondents, comprised of California households and businesses, completed the survey. A

  5. 2004 Kansas City Regional Household Travel Survey | Transportation Secure

    Science.gov Websites

    Data Center | NREL 04 Kansas City Regional Household Travel Survey 2004 Kansas City Regional Household Travel Survey The 2004 Regional Household Travel Survey documented the travel behavior data survey, which was conducted in collaboration with NuStats. Methodology The survey entailed the collection

  6. 2001-2002 Southern California Regional Travel Survey | Transportation

    Science.gov Websites

    Secure Data Center | NREL 01-2002 Southern California Regional Travel Survey 2001-2002 Southern California Regional Travel Survey The 2001-2002 Southern California Regional Travel Survey collected data on conduct the survey following the 2000 decennial census. Methodology Survey data collection occurred in

  7. Food security in South Africa: a review of national surveys.

    PubMed

    Labadarios, Demetre; McHiza, Zandile June-Rose; Steyn, Nelia Patricia; Gericke, Gerda; Maunder, Eleni Maria Winifred; Davids, Yul Derek; Parker, Whadi-ah

    2011-12-01

    To assess the status of food security--i.e., access to food, food availability and food utilization--in South Africa. A systematic search of national surveys that used the Community Childhood Hunger Identification Project (CCHIP) index to measure food security in South Africa over a period of 10 years (1999-2008) was conducted. Anthropometric data for children aged 1-9 years were used to assess food utilization, and household food inventory data were used to assess food availability. Only three national surveys had used the CCHIP index, namely, the 1999 and 2005 National Food Consumption Surveys (NFCS) and the 2008 South African Social Attitudes Survey. These surveys showed a relatively large decrease in food insecurity between 1999 and 2008. However, the consistent emerging trend indicated that in poorer households women were either feeding their children a poor diet or skipping meals so their children could eat. In terms of food access and availability, the 1999 NFCS showed that households that enjoyed food security consumed an average of 16 different food items over 24 hours, whereas poorer households spent less money on food and consumed fewer than 8 different food items. Moreover, children had low mean scores for dietary diversity (3.58; standard deviation, SD: ± 1.37) and dietary variety (5.52; SD: ± 2.54) scores. In terms of food utilization, the NFCS showed that stunting in children decreased from 21.6% in 1999 to 18% in 2005. The South African government must implement measures to improve the undesirably high level of food insecurity in poorer households.

  8. Medical devices made into weapons by prisoners: an unrecognized risk.

    PubMed

    Hayden, J W; Laney, C; Kellermann, A L

    1995-12-01

    The alteration of a knee immobilizer into a sharp weapon by a prisoner prompted us to survey neighboring penal institutions to determine the frequency of such events. We mailed a nine-item survey to all detention facilities in Tennessee, Arkansas, and Mississippi. A second survey was sent to nonresponding institutions 6 weeks after the initial mailing. The Regional Medical Center at Memphis, the designated facility for evaluation and treatment of prisoners from the county jail and state penitentiary. Survey respondents included 25 state penitentiaries, 31 county jails, 1 state minimum-security facility, 1 state maximum-security facility, 1 work-release center, 1 county detention center for drunken-driving offenders, and 1 federal penitentiary. Of the 81 institutions surveyed, 77% responded to one of the two mailings. Forty percent responded in the affirmative when asked whether stolen or unauthorized medical equipment from outside their institutions had been discovered among inmates. When respondents were questioned as to whether medical equipment, prescribed or not, had been used or altered in a criminal manner, 34% responded "yes." Medications and medical appliances were listed in the responses. A survey of 81 local and neighboring penal institutions in a three-state area revealed that the illicit use of medicine and medical devices by prisoners is a legitimate safety concern of prison personnel and health care workers when medical care for inmates must be sought outside the security of their institutions. The modification of medical equipment into weapons by incarcerated patients, although clearly recognized as a security and safety problem by police authorities, appears to be unappreciated by health care workers providing episodic care to inmates.

  9. Food security and metabolic syndrome in U.S. adults and adolescents: findings from the National Health and Nutrition Examination Survey, 1999-2006.

    PubMed

    Parker, Emily D; Widome, Rachel; Nettleton, Jennifer A; Pereira, Mark A

    2010-05-01

    We sought to examine the association of food security and metabolic syndrome in a representative sample of U.S. adults and adolescents. We hypothesized that compared with those in food-secure households, adolescents and adults living in food-insecure households would have increased odds of (MetS). Data from the National Health and Nutrition Examination Surveys from 1999 to 2006 were combined and analyzed cross-sectionally. Logistic regression was used to compute odds ratios and 95% confidence intervals (95% CI) in the association of household food security (fully food secure, marginal, low, and very low food security) and MetS. Compared with those who were food secure, adults in households with marginal food security had 1.80-fold increased odds of MetS (95% CI, 1.30-2.49), and those with very low food security had a 1.65-fold increased odds of MetS (95% CI 1.12-2.42). There was no association with low food security. The association of marginal household food security and MetS was not significant in adolescents. In adults and adolescents, very low was food security not associated with increased odds of MetS compared with those who were food secure. Members of households with marginal and very low food security are at increased risk of MetS. A mechanism may be that foods that are inexpensive and easily accessible tend to be energy dense and nutrient poor. 2010 Elsevier Inc. All rights reserved.

  10. Developing Sensitive and Selective Nanosensors: A Single Molecule - Multiple Excitation Source Approach. Altairnano Lithium Ion Nano-scaled Titanate Oxide Cell and Module Abuse Testing

    DTIC Science & Technology

    2012-03-13

    Source Approach Part II. Altairnano Lithium Ion Nano-scaled Titanate Oxide Cell and Module Abuse Testing 14. ABSTRACT 16. SECURITY CLASSIFICATION OF...Lithium Ion Nano-scaled Titanate Oxide Cell and Module Abuse Testing Report Title ABSTRACT This final report for Contract W911NF-09-C-0135 transmits the...prototype development. The second (Part II.) is "Altairnano Lithium Ion Nano-scaled Titanate Oxide Cell and Module Abuse Test Report". The

  11. Food Insecurity, Poor Diet Quality, and Obesity among Food Pantry Participants in Hartford, CT

    ERIC Educational Resources Information Center

    Robaina, Kate A.; Martin, Katie S.

    2013-01-01

    Objective: Examine relationships between food security, diet quality, and body mass index (BMI) among food pantry users. Methods: Convenience sample of 212 food pantry clients in Hartford, CT from June, 2010 to May, 2011. Main outcomes included food security (United States Department of Agriculture module), fruit and vegetable consumption (Block…

  12. 75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...

  13. School Safety Gets the Ax

    ERIC Educational Resources Information Center

    Eisele-Dyrli, Kurt

    2010-01-01

    A new informal federal survey has found that for many districts, budget cuts have had a profound effect on school safety and security measures. Administrators have been forced to cut safety and security staffing and programs, reorganize security departments and find alternative sources of funding in order to maintain levels of safety and security…

  14. 75 FR 5994 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... and OMB Number: Voice of Industry Survey; OMB Control Number 0704-TBD. Type of Request: New. Number of... Security Program (NISP)'' Section 202(a) stipulates that the Secretary of Defense shall serve as the... Security Agency (CSA), designated by the NISPOM, is responsible for determining the frequency of Security...

  15. Building Security and Personal Safety. SPEC Kit 150.

    ERIC Educational Resources Information Center

    Bingham, Karen Havill

    This report on a survey of Association of Research Libraries (ARL) member libraries on building security and personal safety policies examines three areas in detail: (1) general building security (access to the building, key distribution, patrols or monitors, intrusion prevention, lighting, work environment after dark); (2) problem behavior…

  16. Maternal Strategies to Access Food Differ by Food Security Status.

    PubMed

    Gorman, Kathleen S; McCurdy, Karen; Kisler, Tiffani; Metallinos-Katsaras, Elizabeth

    2017-01-01

    Household food insecurity is associated with health and behavior risk. Much less is known about how food insecurity is related to strategies that adults use in accessing food: how and where they shop, use of alternative food sources, and their ability to manage resources. To examine how maternal behaviors, including shopping, accessing alternative sources of food, and managing resources, are related to household food security status (HHFSS). Cross-sectional study collecting survey data on HHFSS, shopping behaviors, use of alternative food sources, and managing resources obtained from low-income mothers of preschool-aged children. One hundred sixty-four low-income mothers of young children (55% Hispanic) from two communities in Rhode Island. HHFSS was measured using 10 items from the 18-item Core Food Security Module to assess adult food security. Mothers were surveyed about where, when, and how often they shopped; the strategies they use when shopping; their use of alternative sources of food, including federal, state, and local assistance; and their ability to manage their resources. Analysis of variance and χ 2 analyses assessed the associations between demographic variables, shopping, accessing alternative food sources, and managing resources, and HHFSS. Multivariate logistic regression assessed the associations between HHFSS and maternal demographic variables, food shopping, strategies, alternative sources of food, and ability to manage resources. Maternal age and language spoken at home were significantly associated with HHFSS; food insecurity was 10% more likely among older mothers (adjusted odds ratio [aOR] 1.10, 95% CI 1.03 to 1.17) and 2.5 times more likely among Spanish-speaking households (compared with non-Spanish speaking [aOR 3.57, 95% CI 1.25 to 10.18]). Food insecurity was more likely among mothers reporting more informal strategies (aOR 1.98, 95% CI 1.28 to 3.01; P<0.05) and perceiving greater inability to manage resources (aOR 1.60, 95% CI 1.30 to 1.98; P<0.05). The results suggest that low-income mothers use a variety of strategies to feed their families and that the strategies they use vary by HHFSS. Community nutrition programs and providers will need to consider these strategies when counseling families at risk for food insecurity and provide guidance to minimize the influence on healthy food choices. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  17. Maternal Strategies to Access Food Differ by Food Security Status

    PubMed Central

    Gorman, Kathleen S.; McCurdy, Karen; Kisler, Tiffani; Metallinos-Katsaras, Elizabeth

    2016-01-01

    Background Household food insecurity is associated with health and behavior risk. Much less is known about how food insecurity is related to strategies that adults use in accessing food: how and where they shop, use of alternative food sources and their ability to manage resources. Objective To examine how maternal behaviors including shopping, accessing alternative sources of food and managing resources are related to household food security status (HHFSS). Design Cross-sectional study collecting survey data on HHFSS, shopping behaviors, use of alternative food sources and managing resources obtained from low income mothers of preschoolers. Participants 164 low-income mothers of young children (55% Hispanic) from two communities in Rhode Island. Measures HHFSS was measured using ten items from the 18-item Core Food Security Module to assess adult food security. Mothers were surveyed about where, when and how often they shopped; the strategies they use when shopping; their use of alternative sources of food including federal, state and local assistance; and their ability to manage their resources. Statistical analyses Analysis of Variance and Chi-square analyses assessed the associations between demographic variables, shopping, accessing alternative food sources and managing resources, and HHFSS. Multivariate logistic regression assessed the associations between HHFSS and maternal demographic variables, food shopping strategies, alternative sources of food and ability to manage resources. Results Maternal age and language spoken at home were significantly associated with HHFSS; food insecurity was 10% more likely among older mothers (AOR=1.10; 95% CI 1.03-1.17) and 2.5 times more likely among Spanish speaking households (compared to non-Spanish speaking-AOR=3.57; 95% CI 1.25-10.18). Food insecurity was more likely among mothers reporting more informal strategies (AOR=1.98; 95% CI 1.28-3.01, p<.05) and perceiving greater inability to manage resources (AOR=1.60; 95% CI 1.30-1.98, p<.05). Conclusions The results suggest that low-income mothers use a variety of strategies in order to feed their families and that the strategies they use vary by HHFSS. Community nutrition programs and providers will need to consider these strategies when counseling families at risk for food insecurity and provide guidance to minimize the impact on healthy food choices. PMID:27614689

  18. Food Security and Cardiovascular Disease Risk Among Adults in the United States: Findings From the National Health and Nutrition Examination Survey, 2003–2008

    PubMed Central

    2013-01-01

    Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003–2008 was conducted. Four levels of food security status were defined by using 10 questions. Results Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P < .001). No significant associations between food security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31–4.31). Conclusion Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk. PMID:24309090

  19. Food security and cardiovascular disease risk among adults in the United States: findings from the National Health and Nutrition Examination Survey, 2003-2008.

    PubMed

    Ford, Earl S

    2013-12-05

    Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003-2008 was conducted. Four levels of food security status were defined by using 10 questions. Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P < .001). No significant associations between food security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31-4.31). Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk.

  20. 2017 National Household Travel Survey - California Add-On |

    Science.gov Websites

    Transportation Secure Data Center | NREL 7 National Household Travel Survey - California Add-On 2017 National Household Travel Survey - California Add-On The California add-on survey supplements the 2017 National Household Travel Survey (NHTS) with additional household samples and detailed travel

  1. Enforcing the Minimum Drinking Age Law: A Survey of College Administrators and Security Chiefs. Current Research Summary. Bulletin Series: Alcohol and Other Drug Prevention.

    ERIC Educational Resources Information Center

    Wechsler, Henry; Moeykens, Barbara A.; DeJong, William

    This bulletin reviews the results of a survey of college administrators and security officials by the Harvard School of Public Health concerning their schools' policies regarding alcohol problems on campus. A total of 529 respondents from 347 public and private four-year institutions were asked to complete a mailed questionnaire which examined…

  2. Studies in Income Distribution. Estimation of Social Security Taxes on the March Current Population Survey. No. 4.

    ERIC Educational Resources Information Center

    Bridges, Benjamin, Jr.; Johnston, Mary P.

    The impact of the tax-transfer system on the distribution of income among economic units is the subject of a number of studies by the Office of Research and Statistics of the Social Security Administration. One of the most important data sources for the work is the Census Bureau's March Current Population Survey (CPS). To conduct such studies, the…

  3. 76 FR 34087 - Broad Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-10

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0027] Broad Stakeholder Survey AGENCY... Survey. DATES: Comments are encouraged and will be accepted until August 9, 2011. This process is... Stakeholder Survey is designed to gather stakeholder feedback on the effectiveness of OEC services and to...

  4. 77 FR 50144 - Broad Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-20

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0042] Broad Stakeholder Survey AGENCY... Survey. DATES: Comments are encouraged and will be accepted until October 19, 2012. This process is.... The Broad Stakeholder Survey is designed to gather stakeholder feedback on the effectiveness of OEC...

  5. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 30... Collection Request, Protected Critical Infrastructure Information (PCII) Stakeholder Survey. DHS previously... homeland security duties. This survey is designed to gather information from PCII Officers that can be used...

  6. 78 FR 20119 - Broad Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-03

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0042] Broad Stakeholder Survey AGENCY... concerning the Broad Stakeholder Survey. DHS previously published this ICR in the Federal Register on August... across the Nation. The Broad Stakeholder Survey is designed to gather stakeholder feedback on the...

  7. KSC-08pd1109

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, dawn reveals the arrival of space shuttle Discovery, secured atop the mobile launch platform below, at Launch Pad 39A to begin prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  8. KSC-08pd1106

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, space shuttle Discovery, secured atop the mobile launch platform below, arrives at Launch Pad 39A to begin prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  9. KSC-08pd1105

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- This aerial view of NASA's Kennedy Space Center shows space shuttle Discovery, secured atop a mobile launch platform as it is moved into position at Launch Pad 39A to prepare for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  10. KSC-08pd1110

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, the sun rises upon the arrival of space shuttle Discovery, secured atop the mobile launch platform below, at Launch Pad 39A to begin prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  11. Economic Hardship and Depression Among Women in Latino Farmworker Families.

    PubMed

    Pulgar, Camila A; Trejo, Grisel; Suerken, Cynthia; Ip, Edward H; Arcury, Thomas A; Quandt, Sara A

    2016-06-01

    Farmworker family members risk poor mental health due to stressors including poverty, relocation, and documentation status. This paper explores the relationship between farm-work related stressors and depressive symptoms in women of Latino farmworker families. 248 mothers of young children completed fixed-response interviews in Spanish. Measures included the Center for Epidemiologic Studies-Depression Scale, Migrant Farmworker Stress Inventory, and USDA Household Food Security Survey Module. Bivariate analyses indicated greater depressive symptoms with more economic hardship, more farm work-related stressors, greater age, and being unmarried. In multivariable logistic regression, economic hardship remained the only factor associated with depressive symptoms. Greater economic hardship, but not general farm work-related stress, is a main factor associated with depression in women of Latino farmworker families. Maternal depression can have consequences for both mothers and families. Mental health services for women in farmworker families should be targeted to those with the greatest economic challenges.

  12. Food insecurity in Canadian adults receiving diabetes care.

    PubMed

    Galesloot, Suzanne; McIntyre, Lynn; Fenton, Tanis; Tyminski, Sheila

    2012-01-01

    The prevalence of adult-level household food insecurity was examined among clients receiving outpatient diabetes health care services. Participants were adults diagnosed with diabetes mellitus, who attended individual counselling sessions at Calgary's main clinic from January to April 2010. Clinicians were trained to administer the Household Food Security Survey Module (HFSSM), and did so with clients' assent during their scheduled sessions. The prevalence of adult-level household food insecurity among 314 respondents was 15.0% (95% confidence interval [CI], 11.2 to 19.4); 6.7% (95% CI, 4.2 to 10.0) of clinic attendees were categorized as severely food insecure. The comparable rates obtained in Alberta in 2007 using the same instrument (HFSSM) were 5.6% and 1.2%, respectively. Household food insecurity rates among individuals with diabetes in active care are higher than rates reported in Canadian population surveys. Severe food insecurity, indicating reduced food intake and disrupted eating patterns, may affect this population's ability to follow a pattern of healthy eating necessary for effective diabetes management. This study reinforces the importance of assessing clients' inability to access food because of financial constraints, and indicates that screening with a validated measure may facilitate identification of clients at risk.

  13. Food Insecurity in Homeless Families in the Paris Region (France): Results from the ENFAMS Survey

    PubMed Central

    Martin-Fernandez, Judith; Lioret, Sandrine; Vuillermoz, Cécile; Vandentorren, Stéphanie

    2018-01-01

    The number of families living in shelters in the Paris region (France) has increased by a factor of three in 10 years. In 2013, a survey was performed on homeless families in order to characterize their living conditions, their health needs, and the developmental problems in children. This probability survey was conducted in 17 languages among 801 homeless families sheltered in emergency centers for asylum-seekers, emergency housing centers, social rehabilitation centers, and social hotels in the Paris region. Among the 772 families that provided data on food security only 14.0% were with food security, whereas 43.3% were with low food security and 9.8% with very low food security (a situation where children are also affected). Stratified multivariate robust Poisson models showed that some characteristics are associated with a higher risk of food insecurity and/or of falling into very low food security, such as residential instability, single parenthood, having more than three children, depressive symptoms, housing in social hostels, and difficult access to cheap or free food locally. Given the wealth of the Paris region, resources and programs should be concentrated on improving the living situation of this vulnerable population. It needs better detection of these families, a closer social follow-up, and an increase in food aid. PMID:29495563

  14. Food Insecurity and Metabolic Control Among U.S. Adults With Diabetes

    PubMed Central

    Berkowitz, Seth A.; Baggett, Travis P.; Wexler, Deborah J.; Huskey, Karen W.; Wee, Christina C.

    2013-01-01

    OBJECTIVE We sought to determine whether food insecurity is associated with worse glycemic, cholesterol, and blood pressure control in adults with diabetes. RESEARCH DESIGN AND METHODS We conducted a cross-sectional analysis of data from participants of the 1999–2008 National Health and Nutrition Examination Survey. All adults with diabetes (type 1 or type 2) by self-report or diabetes medication use were included. Food insecurity was measured by the Adult Food Security Survey Module. The outcomes of interest were proportion of patients with HbA1c >9.0% (75 mmol/mol), LDL cholesterol >100 mg/dL, and systolic blood pressure >140 mmHg or diastolic blood pressure >90 mmHg. We used multivariable logistic regression for analysis. RESULTS Among the 2,557 adults with diabetes in our sample, a higher proportion of those with food insecurity (27.0 vs. 13.3%, P < 0.001) had an HbA1c >9.0% (75 mmol/mol). After adjustment for age, sex, educational attainment, household income, insurance status and type, smoking status, BMI, duration of diabetes, diabetes medication use and type, and presence of a usual source of care, food insecurity remained significantly associated with poor glycemic control (odds ratio [OR] 1.53 [95% CI 1.07–2.19]). Food insecurity was also associated with poor LDL control before (68.8 vs. 49.8, P = 0.002) and after (1.86 [1.01–3.44]) adjustment. Food insecurity was not associated with blood pressure control. CONCLUSIONS Food insecurity is significantly associated with poor metabolic control in adults with diabetes. Interventions that address food security as well as clinical factors may be needed to successfully manage chronic disease in vulnerable adults. PMID:23757436

  15. The Relation between Food Insecurity and Mental Health Care Service Utilization in Ontario.

    PubMed

    Tarasuk, Valerie; Cheng, Joyce; Gundersen, Craig; de Oliveira, Claire; Kurdyak, Paul

    2018-01-01

    To determine the relationship between household food insecurity status over a 12-month period and adults' use of publicly funded health care services in Ontario for mental health reasons during this period. Data for 80,942 Ontario residents, 18 to 64 years old, who participated in the Canadian Community Health Survey in 2005, 2007-2008, 2009-2010, or 2011-2012 were linked to administrative health care data to determine individuals' hospitalizations, emergency department visits, and visits to psychiatrists and primary care physicians for mental health reasons. Household food insecurity over the past 12 months was assessed using the Household Food Security Survey Module. Logistic regression models were used to estimate the odds of mental health service utilization in the past 12 months by household food insecurity status, adjusting for sociodemographic factors and prior use of mental health services. In our fully adjusted models, in comparison to food-secure individuals, the odds of any mental health care service utilization over the past 12 months were 1.15 (95% confidence interval [CI], 1.04 to 1.29) for marginally food-insecure individuals, 1.39 (95% CI, 1.19 to 1.42) for moderately food-insecure individuals, and 1.50 (95% CI, 1.35 to 1.68) for severely food-insecure individuals. A similar pattern persisted across individual types of services, with odds of utilization highest with severe food insecurity. Household food insecurity status is a robust predictor of mental health service utilization among working-age adults in Ontario. Policy interventions are required to address the underlying causes of food insecurity and the particular vulnerability of individuals with mental illness.

  16. Food insecurity, food assistance and weight status in US youth: new evidence from NHANES 2007-08.

    PubMed

    Kohn, M J; Bell, J F; Grow, H M G; Chan, G

    2014-04-01

    To investigate food assistance participation as a risk factor for overweight and obesity in youth, and food insecurity as an effect modifier. The sample included youth ages 4-17, in families ≤200% of the federal poverty line in the 2007-2008 National Health and Nutrition Examination Survey (n = 1321). Food insecurity was measured with the US Department of Agriculture survey module. Food assistance participation was assessed for Supplemental Nutrition Assistance Program, Special Supplemental Nutrition Program for Women, Infants and Children and school meals. Body size was classified by age- and sex-specific body mass index (BMI) percentile, BMI z-score and waist circumference percentile. Regression models with direct covariate adjustment and programme-specific propensity scores, stratified by food insecurity, estimated associations between food assistance participation and body size. Food assistance participation was not associated with increased body size among food-insecure youth in models with direct covariate adjustment or propensity scores. Compared with low-income, food-secure youth not participating in food assistance, BMI z-scores were higher among participants in models with direct covariate adjustment (0.27-0.38 SD and 0.41-0.47 SD, for boys and girls, respectively). Using propensity scores, results were similar for boys, but less so for girls. Food assistance programme participation is associated with increased body size in food-secure youth, but not food-insecure youth. Using both direct covariate adjustment and a propensity score approach, self-selection bias may explain some, but not all, of the associations. Providing healthy food assistance that improves diet quality without contributing to excessive intake remains an important public health goal. © 2013 The Authors. Pediatric Obesity © 2013 International Association for the Study of Obesity.

  17. The GMOD Drupal bioinformatic server framework.

    PubMed

    Papanicolaou, Alexie; Heckel, David G

    2010-12-15

    Next-generation sequencing technologies have led to the widespread use of -omic applications. As a result, there is now a pronounced bioinformatic bottleneck. The general model organism database (GMOD) tool kit (http://gmod.org) has produced a number of resources aimed at addressing this issue. It lacks, however, a robust online solution that can deploy heterogeneous data and software within a Web content management system (CMS). We present a bioinformatic framework for the Drupal CMS. It consists of three modules. First, GMOD-DBSF is an application programming interface module for the Drupal CMS that simplifies the programming of bioinformatic Drupal modules. Second, the Drupal Bioinformatic Software Bench (biosoftware_bench) allows for a rapid and secure deployment of bioinformatic software. An innovative graphical user interface (GUI) guides both use and administration of the software, including the secure provision of pre-publication datasets. Third, we present genes4all_experiment, which exemplifies how our work supports the wider research community. Given the infrastructure presented here, the Drupal CMS may become a powerful new tool set for bioinformaticians. The GMOD-DBSF base module is an expandable community resource that decreases development time of Drupal modules for bioinformatics. The biosoftware_bench module can already enhance biologists' ability to mine their own data. The genes4all_experiment module has already been responsible for archiving of more than 150 studies of RNAi from Lepidoptera, which were previously unpublished. Implemented in PHP and Perl. Freely available under the GNU Public License 2 or later from http://gmod-dbsf.googlecode.com.

  18. Food Insecurity and Perceived Diet Quality Among Low-Income Older Americans with Functional Limitations.

    PubMed

    Chang, Yunhee; Hickman, Haley

    2018-05-01

    To evaluate how functional limitations are associated with food insecurity and perceived diet quality in low-income older Americans. Nationwide repeated cross-sectional surveys regarding health and nutritional status. The National Health and Nutrition Examination Surveys, 2007-2008, 2009-2010, and 2011-2012. Individuals aged ≥65 years with household incomes ≤130% of the federal poverty level (n = 1,323). Dependent variables included dichotomous indicators of food insecurity and poor-quality diet, measured with the household food security survey module and respondents' own ratings, respectively. Independent variable was presence of limitations in physical functioning. Weighted logistic regressions with nested controls and interaction terms. Functional limitations in low-income older adults were associated with 1.69 times higher odds of food insecurity (P < .01) and 1.65 times higher odds of poor-quality diet (P < .01) after accounting for individuals' health care needs and socioeconomic conditions. These associations were greatest among those living alone (odds ratio = 3.38 for food insecurity; 3.07 for poor-quality diet; P < .05) and smallest among those living with a partner. Low-income older adults who live alone with functional limitations are exposed to significant nutritional risk. Resources should be directed to facilitating their physical access to healthful foods. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  19. Interpreter composition issues in the formal verification of a processor-memory module

    NASA Technical Reports Server (NTRS)

    Fura, David A.; Cohen, Gerald C.

    1994-01-01

    This report describes interpreter composition techniques suitable for the formal specification and verification of a processor-memory module using the HOL theorem proving system. The processor-memory module is a multichip subsystem within a fault-tolerant embedded system under development within the Boeing Defense and Space Group. Modeling and verification methods were developed that permit provably secure composition at the transaction-level of specification, significantly reducing the complexity of the hierarchical verification of the system.

  20. 2014 Southern Nevada Household Travel Survey | Transportation Secure Data

    Science.gov Websites

    Center | NREL 14 Southern Nevada Household Travel Survey 2014 Southern Nevada Household Travel Survey The 2014 Southern Nevada Household Travel Survey collected information from residents in the Las conduct the survey. Methodology The survey was conducted in two phases-from March to May 2014 and from

  1. Federated Security: The Shibboleth Approach

    ERIC Educational Resources Information Center

    Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken

    2004-01-01

    The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…

  2. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    ERIC Educational Resources Information Center

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  3. Perceptions of Job Security in Europe's Ageing Workforce

    ERIC Educational Resources Information Center

    Hank, Karsten; Erlinghagen, Marcel

    2011-01-01

    Using data from the 2004 Survey of Health, Ageing and Retirement in Europe, this paper investigates older workers' perceptions of job security in eleven countries. We describe cross-national patterns and estimate multilevel models to analyse individual and societal determinants of self-perceived job security in the older labour force. While there…

  4. Collective attacks and unconditional security in continuous variable quantum key distribution.

    PubMed

    Grosshans, Frédéric

    2005-01-21

    We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.

  5. Wheelchair and Occupant Restraint on School Buses

    DOT National Transportation Integrated Search

    1990-05-01

    This report presents the findings of a literature survey, wheelchair hardware survey, wheelchair usage on school buses survey and assessment of current worldwide standards to address securement of wheelchairs on school buses and other modes of public...

  6. Public Perspectives of Mobile Phones’ Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey

    PubMed Central

    Richardson, Joshua E.; Ancker, Jessica S.

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246

  7. Public Perspectives of Mobile Phones' Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey.

    PubMed

    Richardson, Joshua E; Ancker, Jessica S

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.

  8. 2010-2012 California Household Travel Survey | Transportation Secure Data

    Science.gov Websites

    Center | NREL 0-2012 California Household Travel Survey 2010-2012 California Household Travel Survey The 2010-2012 California Household Travel Survey (CHTS) collected demographics and travel behavior regional or statewide survey ever conducted in the United States. Data Collection Agency The California

  9. 2011 Atlanta, Georgia, Regional Travel Survey | Transportation Secure Data

    Science.gov Websites

    Center | NREL Atlanta, Georgia, Regional Travel Survey 2011 Atlanta, Georgia, Regional Travel Survey To improve regional travel demand forecasts, the 2011 Regional Travel Survey collected trip data the Atlanta Regional Commission (ARC), the survey was conducted by PTV NuStats, GeoStats, and PG

  10. 2012-2013 Delaware Valley Household Travel Survey | Transportation Secure

    Science.gov Websites

    Data Center | NREL 12-2013 Delaware Valley Household Travel Survey 2012-2013 Delaware Valley Household Travel Survey The 2012-2013 Delaware Valley Household Travel Survey collected data for multiple ) sponsored the survey in collaboration with AbtSRBI. Methodology A sampling strategy was designed to recruit

  11. 2002-2015 Texas Regional Travel Surveys | Transportation Secure Data

    Science.gov Websites

    have passed through NREL's drive cycle processing and filtering routines. Survey Records Survey records include 5,825 households. More Information Survey reports are available for the following areas: Abilene . Transportation data are available as zipped files. Download Winzip. Abilene Full Survey Data (excluding any GPS

  12. 2007 Chicago Regional Household Travel Inventory | Transportation Secure

    Science.gov Websites

    period. In addition to traditional survey-based data collection, this study featured a sub-sample of processing and filtering routines. Survey Records Survey records include 460 households. More Information For more information about the survey, see the CMAP Regional Travel Survey Final Report. Transportation

  13. 2011 Atlanta and Seattle Tolling Impact Survey | Transportation Secure Data

    Science.gov Websites

    Center | NREL Atlanta and Seattle Tolling Impact Survey 2011 Atlanta and Seattle Tolling Impact Survey The 2011 Tolling Impact Survey measured the impact of tolling on travel behavior in Atlanta Transportation and the Urban Partnership Agreement, the Volpe Center conducted the survey. Methodology The

  14. A Chaos MIMO-OFDM Scheme for Mobile Communication with Physical-Layer Security

    NASA Astrophysics Data System (ADS)

    Okamoto, Eiji

    Chaos communications enable a physical-layer security, which can enhance the transmission security in combining with upper-layer encryption techniques, or can omit the upper-layer secure protocol and enlarges the transmission efficiency. However, the chaos communication usually degrades the error rate performance compared to unencrypted digital modulations. To achieve both physical-layer security and channel coding gain, we have proposed a chaos multiple-input multiple-output (MIMO) scheme in which a rate-one chaos convolution is applied to MIMO multiplexing. However, in the conventional study only flat fading is considered. To apply this scheme to practical mobile environments, i.e., multipath fading channels, we propose a chaos MIMO-orthogonal frequency division multi-plexing (OFDM) scheme and show its effectiveness through computer simulations.

  15. Fine-Structure Artifact of the Velocity Distribution of Cs Beam Tubes as Measured by the Pulsed Microwave Power Technique

    DTIC Science & Technology

    1990-10-15

    Officer MOIE Program manager SSD/MSSB AFSTC/WCO OL-AB UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY...34 Metrologia , 9, 1973, pp. 107-112. 2. H. Hellwig, S. Jarvis, D. J. Glaze, D. Halford, and H. E. Bell, "Time domain velocity selection modulation as a

  16. Introducing AgilePQ DCM (Digital Conversion Module) - Video Text Version

    Science.gov Websites

    monolith. There's not one thing you do to make things digitally secure. We talk in terms of confidentiality enable these nonfunctional attributes. There's not, as I said, one thing you can do to satisfy the whole subject of cyber security. And there's not one thing you can do to fully enable these nonfunctional

  17. Striding Towards Better Physical Therapy

    NASA Technical Reports Server (NTRS)

    2003-01-01

    This paper presents a discussion on a new rehabilitative device that promises to improve physical therapy for patients working to regain the ability to walk after facing traumatic injuries or a degenerative illness. Produced by Enduro Medical Technology, of East Hartford, Connecticut, the Secure Ambulation Module (S.A.M.) creates a stable and secure environment for patients as they stand during ambulation therapy.

  18. Taking "The Math You Need When You Need It" Modules Beyond Introductory Geology Courses

    NASA Astrophysics Data System (ADS)

    Baer, E. M.; Wenner, J. M.; Burn, H. E.

    2012-12-01

    "The Math You Need, When You Need It" (TMYN) modules are finding use well beyond the courses for which they were originally written. However, faculty survey responses indicate that the modules are used in similar ways, suggesting that the overall design of the modules is effective. TMYN modules are online resources designed to help students develop quantitative skills in conjunction with introductory geology courses. Since 2010, 29 faculty members at 26 institutions used these asynchronous resources at in 68 different courses nationwide, impacting about 3000 students. After each use of the modules, instructors responded to a survey about their use of the modules and the impact on each course and student cohort. Of the 29 instructors, 16 responded with a total of 36 implementations, a 52% response rate. Survey responses indicate use of TMYN modules in classes well beyond their original design. The modules were originally designed for students in introductory geology classes, especially those targeted at non-geoscience majors. Sixty-nine percent (22/32) of TMYN courses included introductory geology courses such as Physical Geology, Earth System Science and Environmental Geology. The remainder of courses included multiple uses in oceanography and meteorology courses and more specialized geoscience courses such as geomorphology, structural geology and hydrology. Surveys suggest that only 63% of courses that used TMYN (20/32) were targeted to students in general education courses. Nine percent (3/32) of courses were targeted to STEM majors and 19% (6/32) were specifically targeted to geoscience majors, including upper-level courses. Despite the wide variety of institutions, instructors, classes, and student educational goals, faculty incorporated the modules into their curriculum in as originally designed, indicating that the overall design of the modules is effective. Twenty-two respondents indicate that modules were assigned immediately prior to using a skill in the classroom (either in lab exercises or a lecture period). Almost all instructors employed pre- and posttests to gauge learning. More than ¾ of survey respondents introduced the modules within the first week of class. In all but one instance, students were instructed to complete an online quiz immediately after working through the online modules and most (77%) designed these post-module quizzes as formative assessments allowing at least 3 attempts. The grades on these modules contributed to students' grades but were relatively low stakes with 88% reporting that the modules contributed to less than 10% of a student's course grade. Given the use beyond the introductory geology classroom and the similarity of the use of these modules in a wide variety of courses, it appears that the design of the modules is sound. However, previous studies have indicated that mathematical skills are not easily transferred (e.g. Bassok. and Holyoak, 1989) suggesting the adaptation of the modules for use outside the geosciences.

  19. Water System Adaptation to Hydrological Changes: Module 2, Stormwater Management and Sewer Performance under Intense Storms: Case Study from Lawrence, Massachusetts, U.S.A.

    EPA Science Inventory

    This course focuses on water system adaptation to short-term and long-term climate and hydrologic stressors that affect water availability, water quality, security, and resilience. The course is organized into 15 sequential modules. The lectures will be augmented by weekly assign...

  20. Water System Adaptation To Hydrological Changes: Module 3, Consequences of Prolonged Drought on Urban Water System Resilience: Case Study from Las Vegas, Nevada, USA

    EPA Science Inventory

    This course focuses on water system adaptation to short-term and long-term climate and hydrologic stressors that affect water availability, water quality, security, and resilience. The course is organized into 15 sequential modules. The lectures will be augmented by weekly assign...

  1. Water System Adaptations To Hydrological Changes: Module 4, Water Quality Response to Land-use and Precipitation Changes : Case Study of Ohio River Valley, USA

    EPA Science Inventory

    This course focuses on water system adaptation to short-term and long-term climate and hydrologic stressors that affect water availability, water quality, security, and resilience. The course is organized into 15 sequential modules. The lectures will be augmented by weekly assign...

  2. Food security in South Africa: a review of national surveys

    PubMed Central

    Labadarios, Demetre; Steyn, Nelia Patricia; Gericke, Gerda; Maunder, Eleni Maria Winifred; Davids, Yul Derek; Parker, Whadi-ah

    2011-01-01

    Abstract Objective To assess the status of food security – i.e. access to food, food availability and food utilization – in South Africa. Methods A systematic search of national surveys that used the Community Childhood Hunger Identification Project (CCHIP) index to measure food security in South Africa over a period of 10 years (1999–2008) was conducted. Anthropometric data for children aged 1–9 years were used to assess food utilization, and household food inventory data were used to assess food availability. Findings Only three national surveys had used the CCHIP index, namely, the 1999 and 2005 National Food Consumption Surveys (NFCS) and the 2008 South African Social Attitudes Survey. These surveys showed a relatively large decrease in food insecurity between 1999 and 2008. However, the consistent emerging trend indicated that in poorer households women were either feeding their children a poor diet or skipping meals so their children could eat. In terms of food access and availability, the 1999 NFCS showed that households that enjoyed food security consumed an average of 16 different food items over 24 hours, whereas poorer households spent less money on food and consumed fewer than 8 different food items. Moreover, children had low mean scores for dietary diversity (3.58; standard deviation, SD: ± 1.37) and dietary variety (5.52; SD: ± 2.54) scores. In terms of food utilization, the NFCS showed that stunting in children decreased from 21.6% in 1999 to 18% in 2005. Conclusion The South African government must implement measures to improve the undesirably high level of food insecurity in poorer households. PMID:22271946

  3. 2013 New Mexico Mid-Region Travel Survey | Transportation Secure Data

    Science.gov Websites

    Center | NREL 3 New Mexico Mid-Region Travel Survey 2013 New Mexico Mid-Region Travel Survey The 2013 New Mexico Mid-Region Travel Survey assessed travel behavior patterns to update a travel ) contracted with Westat to conduct the survey. Methodology The survey included the collection of socio

  4. Orion EM-1 Crew Module Adapter Move to Clean Room

    NASA Image and Video Library

    2016-11-29

    Inside the Neil Armstrong Operations and Checkout Building high bay at NASA's Kennedy Space Center in Florida, Lockheed Martin technicians secure a protective cover around the Orion crew module adapter (CMA) for Exploration Mission 1 (EM-1) for its move to a clean room. The CMA will undergo propellant and environmental control and life support system tube installation and welding. The adapter will connect the Orion crew module to the European Space Agency-provided service module. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission, in late 2018.

  5. Orion EM-1 Crew Module Adapter Move to Clean Room

    NASA Image and Video Library

    2016-11-29

    Inside the Neil Armstrong Operations and Checkout Building high bay at NASA’s Kennedy Space Center in Florida, a Lockheed Martin technician secures a protective cover around the Orion crew module adapter (CMA) for Exploration Mission 1 (EM-1) for its move to a clean room The CMA will undergo propellant and environmental control and life support system tube installation and welding. The adapter will connect the Orion crew module to the European Space Agency-provided service module. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission, in late 2018.

  6. Orion EM-1 Crew Module Adapter Move to Clean Room

    NASA Image and Video Library

    2016-11-29

    Inside the Neil Armstrong Operations and Checkout Building high bay at NASA’s Kennedy Space Center in Florida, Lockheed Martin technicians secure a protective cover around the Orion crew module adapter (CMA) for Exploration Mission 1 (EM-1) for its move to a clean room. The CMA will undergo propellant and environmental control and life support system tube installation and welding. The adapter will connect the Orion crew module to the European Space Agency-provided service module. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission, in late 2018.

  7. Orion EM-1 Crew Module Adapter Move to Clean Room

    NASA Image and Video Library

    2016-11-29

    Inside the Neil Armstrong Operations and Checkout Building high bay at NASA's Kennedy Space Center in Florida, Lockheed Martin technicians secure a protective cover around the Orion crew module adapter (CMA) for Exploration Mission 1 (EM-1) for its move to a clean. The CMA will undergo propellant and environmental control and life support system tube installation and welding. The adapter will connect the Orion crew module to the European Space Agency-provided service module. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission, in late 2018.

  8. Orion EM-1 Crew Module Adapter Move to Clean Room

    NASA Image and Video Library

    2016-11-29

    Inside the Neil Armstrong Operations and Checkout Building high bay at NASA’s Kennedy Space Center in Florida, the Orion crew module adapter (CMA) for Exploration Mission 1 (EM-1) is in a clean room with protective walls secured around it. The adapter will undergo propellant and environmental control and life support system tube installation and welding. The adapter will connect the Orion crew module to the European Space Agency-provided service module. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission, in late 2018.

  9. 46 CFR 167.05-40 - Underwater survey.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Underwater survey. 167.05-40 Section 167.05-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-40 Underwater survey. Underwater survey means the examination of the vessel's underwater...

  10. 46 CFR 167.05-40 - Underwater survey.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Underwater survey. 167.05-40 Section 167.05-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-40 Underwater survey. Underwater survey means the examination of the vessel's underwater...

  11. 46 CFR 167.05-40 - Underwater survey.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Underwater survey. 167.05-40 Section 167.05-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-40 Underwater survey. Underwater survey means the examination of the vessel's underwater...

  12. 46 CFR 167.05-40 - Underwater survey.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Underwater survey. 167.05-40 Section 167.05-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-40 Underwater survey. Underwater survey means the examination of the vessel's underwater...

  13. 46 CFR 167.05-40 - Underwater survey.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Underwater survey. 167.05-40 Section 167.05-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-40 Underwater survey. Underwater survey means the examination of the vessel's underwater...

  14. Photovoltaic panel clamp

    DOEpatents

    Mittan, Margaret Birmingham [Oakland, CA; Miros, Robert H. J. [Fairfax, CA; Brown, Malcolm P [San Francisco, CA; Stancel, Robert [Loss Altos Hills, CA

    2012-06-05

    A photovoltaic panel clamp includes an upper and lower section. The interface between the assembled clamp halves and the module edge is filled by a flexible gasket material, such as EPDM rubber. The gasket preferably has small, finger like protrusions that allow for easy insertion onto the module edge while being reversed makes it more difficult to remove them from the module once installed. The clamp includes mounting posts or an integral axle to engage a bracket. The clamp also may include a locking tongue to secure the clamp to a bracket.

  15. Photovoltaic panel clamp

    DOEpatents

    Brown, Malcolm P.; Mittan, Margaret Birmingham; Miros, Robert H. J.; Stancel, Robert

    2013-03-19

    A photovoltaic panel clamp includes an upper and lower section. The interface between the assembled clamp halves and the module edge is filled by a flexible gasket material, such as EPDM rubber. The gasket preferably has small, finger like protrusions that allow for easy insertion onto the module edge while being reversed makes it more difficult to remove them from the module once installed. The clamp includes mounting posts or an integral axle to engage a bracket. The clamp also may include a locking tongue to secure the clamp to a bracket.

  16. Programmable Multi-Chip Module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2005-05-24

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  17. Programmable Multi-Chip Module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2004-11-16

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  18. Programmable multi-chip module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2004-03-02

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  19. 77 FR 33809 - Survey of Foreign Ownership of U.S. Securities as of June 30, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... government, and any agency, corporation, financial institution, or other entity or instrumentality thereof... equities, short-term debt securities (including selected money market instruments), and long-term debt...

  20. 78 FR 18678 - Survey of Foreign Ownership of U.S. Securities as of June 30, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... government, and any agency, corporation, financial institution, or other entity or instrumentality thereof... equities, short-term debt securities (including selected money market instruments), and long-term debt...

  1. 76 FR 37888 - Survey of Foreign Ownership of U.S. Securities as of June 30, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-28

    ... government, and any agency, corporation, financial institution, or other entity or instrumentality thereof... equities, short-term debt securities (including selected money market instruments), and long-term debt...

  2. The Use of BS7799 Information Security Standard to Construct Mechanisms for the Management of Medical Organization Information Security

    NASA Astrophysics Data System (ADS)

    Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung

    According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.

  3. Military veterans and Social Security.

    PubMed

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  4. Looking beyond Maternal Sensitivity: Mother-Child Correlates of Attachment Security among Children with Intellectual Disabilities in Urban India

    ERIC Educational Resources Information Center

    John, Aesha; Morris, Amanda Sheffield; Halliburton, Amy L.

    2012-01-01

    This study examined correlates of attachment security among children with intellectual disabilities in urban India. Survey and observational data were gathered from 47 children, mothers, and teachers on children's attachment security, adaptive functioning, and mother-child emotional availability. The data were analyzed to examine whether child…

  5. Information and the War against Terrorism, Part IV: Civil Liberties versus Security in the Age of Terrorism.

    ERIC Educational Resources Information Center

    Strickland, Lee S.

    2002-01-01

    Discussion of information and the war on terrorism following the September 11th attacks focuses on a survey of legal provisions and new security-related practices in government and business as security competes with civil liberties. Topics include the Fourth Amendment overseas; Department of Justice legal initiatives; military tribunals; security…

  6. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    ERIC Educational Resources Information Center

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holley, W H

    This report describes the results of the literature search, interviews, and site visits conducted during the first six months of this subcontract. This survey was conducted to establish a baseline of information about thermal and photothermal degradation of EVA and case history surveys on discoloration (yellowing/browning) of EVA-based encapsulants in fielded flat-plate PV modules. The literature search revealed that EVA will undergo thermolysis of the acetate groups at temperatures of 130{degrees}C to 150{degrees}C and above, leading to formation of double bonds in the backbone of the copolymer. The survey of case histories of EVA-based encapsulant discoloration in fielded modules inmore » the United States revealed that the problem is limited to those areas of the west and southwest that have comparatively high solar insolation and ambient temperature. It is clear that the discoloration problem is not limited to the modules of any one manufacturer. Discoloration in the EVA encapsulant was experienced in fielded modules from all major US module producers.« less

  8. Oven wall panel construction

    DOEpatents

    Ellison, Kenneth; Whike, Alan S.

    1980-04-22

    An oven roof or wall is formed from modular panels, each of which comprises an inner fabric and an outer fabric. Each such fabric is formed with an angle iron framework and somewhat resilient tie-bars or welded at their ends to flanges of the angle irons to maintain the inner and outer frameworks in spaced disposition while minimizing heat transfer by conduction and permitting some degree of relative movement on expansion and contraction of the module components. Suitable thermal insulation is provided within the module. Panels or skins are secured to the fabric frameworks and each such skin is secured to a framework and projects laterally so as slidingly to overlie the adjacent frame member of an adjacent panel in turn to permit relative movement during expansion and contraction.

  9. KSC-08pd1113

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, the rotating service structure, at left, at Launch Pad 39A has been rolled back for the delivery of space shuttle Discovery, secured atop the mobile launch platform below, for final prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  10. KSC-08pd1101

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, a crawler transporter moves space shuttle Discovery, secured atop a mobile launch platform, along the crawlerway from the Vehicle Assembly Building to Launch Pad 39A to prepare for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  11. KSC-08pd1111

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, access arms from the fixed service structure at Launch Pad 39A are in place against space shuttle Discovery, secured atop the mobile launch platform below, as final prelaunch processing for the STS-124 mission begins at the pad. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  12. KSC-08pd1108

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At Launch Pad 39A at NASA's Kennedy Space Center, the payload for the STS-124 mission, secured in the payload changeout room on the rotating service structure, at left, awaits installation into the payload bay of space shuttle Discovery. Discovery's 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  13. KSC-08pd1102

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, space shuttle Discovery, secured atop a mobile launch platform, is reflected in water beside the crawlerway as it is moved from the Vehicle Assembly Building to Launch Pad 39A to prepare for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  14. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenariosmore » are presented with calculations showing the application of such a metric.« less

  15. 2014-2015 Puget Sound Regional Travel Study | Transportation Secure Data

    Science.gov Websites

    a college-population travel survey in fall 2014. In spring 2015, a second household data collection sample of longitudinal data from households that completed the 2014 survey. Survey Records Survey records include a total of 794 participants. More Information Learn more about the PSRC Household Travel Survey

  16. Implementation Strategies for a Universal Acquisition and Tracking Channel Applied to Real GNSS Signals.

    PubMed

    Fortin, Marc-Antoine; Landry, René

    2016-05-02

    This paper presents a universal GNSS receiver channel capable of tracking any civil GNSS signal. This fundamentally differs from dedicated channels, each customized for a given signal. A mobile device could integrate fewer universal channels to harvest all available signals. This would allow securing signal availability, while minimizing power consumption and chip size, thus maximizing battery lifetime. In fact, the universal channel allows sequential acquisition and tracking of any chipping rate, carrier frequency, FDMA channel, modulation, or constellation, and is totally configurable (any integration time, any discriminator, etc.). It can switch from one signal to another in 1.07 ms, making it possible for the receiver to rapidly adapt to its sensed environment. All this would consume 3.5 mW/channel in an ASIC implementation, i.e., with a slight overhead compared to the original GPS L1 C/A dedicated channel from which it was derived. After extensive surveys on GNSS signals and tracking channels, this paper details the implementation strategies that led to the proposed universal channel architecture. Validation is achieved using GNSS signals issued from different constellations, frequency bands, modulations and spreading code schemes. A discussion on acquisition approaches and conclusive remarks follow, which open up a new signal selection challenge, rather than satellite selection.

  17. Implementation Strategies for a Universal Acquisition and Tracking Channel Applied to Real GNSS Signals

    PubMed Central

    Fortin, Marc-Antoine; Landry, René

    2016-01-01

    This paper presents a universal GNSS receiver channel capable of tracking any civil GNSS signal. This fundamentally differs from dedicated channels, each customized for a given signal. A mobile device could integrate fewer universal channels to harvest all available signals. This would allow securing signal availability, while minimizing power consumption and chip size, thus maximizing battery lifetime. In fact, the universal channel allows sequential acquisition and tracking of any chipping rate, carrier frequency, FDMA channel, modulation, or constellation, and is totally configurable (any integration time, any discriminator, etc.). It can switch from one signal to another in 1.07 ms, making it possible for the receiver to rapidly adapt to its sensed environment. All this would consume 3.5 mW/channel in an ASIC implementation, i.e., with a slight overhead compared to the original GPS L1 C/A dedicated channel from which it was derived. After extensive surveys on GNSS signals and tracking channels, this paper details the implementation strategies that led to the proposed universal channel architecture. Validation is achieved using GNSS signals issued from different constellations, frequency bands, modulations and spreading code schemes. A discussion on acquisition approaches and conclusive remarks follow, which open up a new signal selection challenge, rather than satellite selection. PMID:27144569

  18. Participation rates, response bias and response behaviours in the community survey of the Swiss Spinal Cord Injury Cohort Study (SwiSCI).

    PubMed

    Fekete, Christine; Segerer, Wolfgang; Gemperli, Armin; Brinkhof, Martin W G

    2015-10-08

    Surveying persons with disabilities is challenging, as targeted subjects may experience specific barriers to survey participation. Here we report on participation rates and response behaviour in a community survey of people with spinal cord injury (SCI) in Switzerland. The cross-sectional survey was implemented as part of the Swiss Spinal Cord Injury Cohort Study (SwiSCI) and represents the largest population-based SCI survey in Europe including nearly 2000 persons. Design features to enhance participation rates included the division of the questionnaire volume over three successive modules; recurrent and mixed-mode reminding of non-responders; and mixed-mode options for response. We describe participation rates of the SwiSCI community survey (absolute and cumulative cooperation, contact, response, and attrition rates) and report on response rates in relation to recruitment efforts. Potential non-response bias and the association between responders' characteristics and response behaviour (response speed: reminding until participation; response mode: paper-pencil vs. online completion) were assessed using regression modelling. Over the successive modules, absolute response rates were 61.1, 80.6 and 87.3% which resulted in cumulative response rates of 49.3 and 42.6% for the second and third modules. Written reminders effectively increased response rates, with the first reminder showing the largest impact. Telephone reminders, partly with direct telephone interviewing, enhanced response rate to the first module, but were essentially redundant in subsequent modules. Non-response to the main module was related to current age, membership of Swiss Paraplegic Association (SPA) and time since injury, but not to gender, lesion level and preferred language of response. Response speed increased with household income, but was not associated to other sociodemographic factors, lesion characteristics or health indicators. We found significant associations between online completion and male gender, younger age, higher education, higher income, SPA membership, tetraplegia, longer time since injury, higher quality of life, and more participation restrictions. In this sample with little non-response bias, recurrent and mixed-mode reminding and mixed-mode options for response were key features of optimizing survey design.

  19. Attitudes of health care students about computer-aided neuroanatomy instruction.

    PubMed

    McKeough, D Michael; Bagatell, Nancy

    2009-01-01

    This study examined students' attitudes toward computer-aided instruction (CAI), specifically neuroanatomy learning modules, to assess which components were primary in establishing these attitudes and to discuss the implications of these attitudes for successfully incorporating CAI in the preparation of health care providers. Seventy-seven masters degree, entry-level, health care professional students matriculated in an introductory neuroanatomy course volunteered as subjects for this study. Students independently reviewed the modules as supplements to lecture and completed a survey to evaluate teaching effectiveness. Responses to survey statements were compared across the learning modules to determine if students viewed the modules differently. Responses to individual survey statements were averaged to measure the strength of agreement or disagreement with the statement. Responses to open-ended questions were theme coded, and frequencies and percentages were calculated for each. Students saw no differences between the learning modules. Students perceived the learning modules as valuable; they enjoyed using the modules but did not prefer CAI over traditional lecture format. The modules were useful in learning or reinforcing neuroanatomical concepts and improving clinical problem-solving skills. Students reported that the visual representation of the neuroanatomical systems, computer animation, ability to control the use of the modules, and navigational fidelity were key factors in determining attitudes. The computer-based learning modules examined in this study were effective as adjuncts to lecture in helping entry-level health care students learn and make clinical applications of neuroanatomy information.

  20. High-Resolution and Lightweight X-ray Optics for the X-Ray Surveyor

    NASA Astrophysics Data System (ADS)

    Zhang, William

    Envisioned in "Enduring Quest, Daring Visions" and under study by NASA as a potential major mission for the 2020s, the X-ray Surveyor mission will likely impose three requirements on its optics: (1) high angular resolution: 0.5 PSF, (2) large effective area: e10,000 cm2 or more, and (3) affordable production cost: $500M. We propose a technology that can meet these requirements by 2020. It will help the X-ray Surveyor secure the endorsement of the coming decadal survey and enable its implementation following WFIRST. The technology comprises four elements: (1) fabrication of lightweight single crystal silicon mirrors, (2) coating these mirrors with iridium to maximize effective area without figure degradation, (3) alignment and bonding of these mirrors to form meta-shells that will be integrated to make a mirror assembly, and (4) systems engineering to ensure that the mirror assembly meet all science performance and spaceflight environmental requirements. This approach grows out of our existing approach based on glass slumping. Using glass slumping technology, we have been able to routinely build and test mirror modules of 10half-power diameter (HPD). While comparable in HPD to XMM-Newtons electroformed nickel mirrors, these mirror modules are 10 times lighter. Likewise, while comparable in weight to Suzakus epoxy-replicated aluminum foil mirrors, these modules have 10 times better HPD. These modules represent the current state of the art of lightweight X-ray optics. Although both successful and mature, the glass slumping technology has reached its limit and cannot achieve sub-arc second HPD. Therefore, we are pursuing the new approach based on polishing single crystal silicon. The new approach will enable the building and testing of mirror modules, called meta-shells, capable of 3HPD by 2018 and 1HPD by 2020, and has the potential to reach diffraction limits ( 0.1) in the 2020s.

  1. Final Report of the Development of an International Adult Learning Module (OECD AL Module): Recommendations on Methods, Concepts and Questions in International Adult Learning Surveys. OECD Education Working Papers, No. 21

    ERIC Educational Resources Information Center

    Kuwan, Helmut; Larsson, Ann-Charlotte

    2008-01-01

    Policy interest in international surveys on Adult Learning (AL) has increased strongly. AL survey data are used as benchmarks for a country's educational system. However, results of key indicators like participation in learning activities often vary remarkably between different data sources. Stating that these differences are due to varying…

  2. Consumers Are Ready to Accept the Transition to Online and Electronic Records If They Can Be Assured of the Security Measures

    PubMed Central

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-01

    Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. Conclusions The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated.The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for “cradle to the grave” treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system. PMID:17435617

  3. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures.

    PubMed

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-11

    Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated. The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for "cradle to the grave" treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system.

  4. Radiation-Induced Immune Modulation in Prostate Cancer

    DTIC Science & Technology

    2008-01-01

    cancers. 15. SUBJECT TERMS Radiation, Dendritic Cells , Cytokines, PSA 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...radiation is more than a cytotoxic agent. Our recent study has shown that radiation modulates the immune system by affecting dendritic cell (DC...translate radiation-induced tumor cell death into generation of tumor immunity in the hope of optimizing therapy for localized and disseminated prostate

  5. 75 FR 80895 - Office of the Assistant Secretary for International Affairs; Survey of U.S. Ownership of Foreign...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... government, and any agency, corporation, financial institution, or other entity or instrumentality thereof... debt securities, and short-term debt securities (including selected money market instruments). How to...

  6. 76 FR 69798 - Survey of U.S. Ownership of Foreign Securities as of December 31, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-09

    ... United States Government, a State or local government, and any agency, corporation, financial institution..., and short-term debt securities (including selected money market instruments). How to Report: Completed...

  7. Food Insecurity and Depression Among Adults With Diabetes: Results From the National Health and Nutrition Examination Survey (NHANES).

    PubMed

    Montgomery, Joshua; Lu, Juan; Ratliff, Scott; Mezuk, Briana

    2017-06-01

    Purpose While both food insecurity and depression have been linked to risk of type 2 diabetes, little is known about the relationship between food insecurity and depression among adults with diabetes. Research Design and Methods Cross-sectional analyses of the National Health and Nutrition Examination Survey (2011-2014), a nationally representative, population-based survey. Analytic sample was limited to adults aged ≥20 with diabetes determined by either fasting plasma glucose (≥126 mg/dL) or self-report (n = 1724) and adults age ≥20 with prediabetes determined by fasting plasma glucose (100-125 mg/dL) or self-report (n = 2004). Food insecurity was measured using the US Food Security Survey Module. Depression was assessed using the Patient Health Questionnaire-9 (PHQ-9). Logistic regression was used to assess the relationship between food insecurity and depression while accounting for sociodemographic characteristics and health behaviors. Results Approximately 10% of individuals with diabetes and 8.5% of individuals with prediabetes had severe food insecurity in the past year; an additional 20.3% of individuals with diabetes and 14.3% of those with prediabetes had mild food insecurity. Among individuals with diabetes, both mild and severe food insecurity were associated with elevated odds of depression These relationships were similar in magnitude among individuals with prediabetes. Conclusions Food insecurity is significantly associated with depressive symptoms in people with diabetes and prediabetes. Results point to the need to address economic issues in conjunction with psychosocial issues for comprehensive diabetes care.

  8. The Association between Food Insecurity and Obesity in Children-The National Health and Nutrition Examination Survey.

    PubMed

    Kaur, Jasbir; Lamb, Molly M; Ogden, Cynthia L

    2015-05-01

    Food insecurity can put children at greater risk of obesity because of altered food choices and nonuniform consumption patterns. We examined the association between obesity and both child-level food insecurity and personal food insecurity in US children. Data from 9,701 participants in the National Health and Nutrition Examination Survey, 2001-2010, aged 2 to 11 years were analyzed. Child-level food insecurity was assessed with the US Department of Agriculture's Food Security Survey Module based on eight child-specific questions. Personal food insecurity was assessed with five additional questions. Obesity was defined, using physical measurements, as body mass index (calculated as kg/m²) greater than or equal to the age- and sex-specific 95th percentile of the Centers for Disease Control and Prevention growth charts. Logistic regressions adjusted for sex, race/ethnic group, poverty level, and survey year were conducted to describe associations between obesity and food insecurity. Obesity was significantly associated with personal food insecurity for children aged 6 to 11 years (odds ratio=1.81; 95% CI 1.33 to 2.48), but not in children aged 2 to 5 years (odds ratio=0.88; 95% CI 0.51 to 1.51). Child-level food insecurity was not associated with obesity among 2- to 5-year-olds or 6- to 11-year-olds. Personal food insecurity is associated with an increased risk of obesity only in children aged 6 to 11 years. Personal food-insecurity measures may give different results than aggregate food-insecurity measures in children. Published by Elsevier Inc.

  9. The GMOD Drupal Bioinformatic Server Framework

    PubMed Central

    Papanicolaou, Alexie; Heckel, David G.

    2010-01-01

    Motivation: Next-generation sequencing technologies have led to the widespread use of -omic applications. As a result, there is now a pronounced bioinformatic bottleneck. The general model organism database (GMOD) tool kit (http://gmod.org) has produced a number of resources aimed at addressing this issue. It lacks, however, a robust online solution that can deploy heterogeneous data and software within a Web content management system (CMS). Results: We present a bioinformatic framework for the Drupal CMS. It consists of three modules. First, GMOD-DBSF is an application programming interface module for the Drupal CMS that simplifies the programming of bioinformatic Drupal modules. Second, the Drupal Bioinformatic Software Bench (biosoftware_bench) allows for a rapid and secure deployment of bioinformatic software. An innovative graphical user interface (GUI) guides both use and administration of the software, including the secure provision of pre-publication datasets. Third, we present genes4all_experiment, which exemplifies how our work supports the wider research community. Conclusion: Given the infrastructure presented here, the Drupal CMS may become a powerful new tool set for bioinformaticians. The GMOD-DBSF base module is an expandable community resource that decreases development time of Drupal modules for bioinformatics. The biosoftware_bench module can already enhance biologists' ability to mine their own data. The genes4all_experiment module has already been responsible for archiving of more than 150 studies of RNAi from Lepidoptera, which were previously unpublished. Availability and implementation: Implemented in PHP and Perl. Freely available under the GNU Public License 2 or later from http://gmod-dbsf.googlecode.com Contact: alexie@butterflybase.org PMID:20971988

  10. Method for secure electronic voting system: face recognition based approach

    NASA Astrophysics Data System (ADS)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  11. PREMIX: PRivacy-preserving EstiMation of Individual admiXture.

    PubMed

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.

  12. A methodology for secure recovery of spacecrafts based on a trusted hardware platform

    NASA Astrophysics Data System (ADS)

    Juliato, Marcio; Gebotys, Catherine

    2017-02-01

    This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.

  13. Invisible Security Printing on Photoresist Polymer Readable by Terahertz Spectroscopy.

    PubMed

    Shin, Hee Jun; Lim, Min-Cheol; Park, Kisang; Kim, Sae-Hyung; Choi, Sung-Wook; Ok, Gyeongsik

    2017-12-06

    We experimentally modulate the refractive index and the absorption coefficient of an SU-8 dry film in the terahertz region by UV light (362 nm) exposure with time dependency. Consequently, the refractive index of SU-8 film is increased by approximately 6% after UV light exposure. Moreover, the absorption coefficient also changes significantly. Using the reflective terahertz imaging technique, in addition, we can read security information printed by UV treatment on an SU-8 film that is transparent in the visible spectrum. From these results, we successfully demonstrate security printing and reading by using photoresist materials and the terahertz technique. This investigation would provide a new insight into anti-counterfeiting applications in fields that need security.

  14. A Simulated Hospital Pharmacy Module Using an Electronic Medical Record in a Pharmaceutical Care Skills Laboratory Course

    PubMed Central

    DiVall, Margarita V.; Guerra, Christina; Brown, Todd

    2013-01-01

    Objectives. To implement and evaluate the effects of a simulated hospital pharmacy module using an electronic medical record on student confidence and abilities to perform hospital pharmacist duties. Design. A module was developed that simulated typical hospital pharmacist tasks. Learning activities were modified based upon student feedback and instructor assessment. Assessments. Ninety-seven percent of respondents reported full-time hospital internship experience and 72% had electronic medical record experience prior to completing the module. Mean scores on confidence with performing typical hospital pharmacist tasks significantly increased from the pre-module survey to the post-module survey from 1.5-2.9 (low comfort/confidence) to 2.0-3.4 (moderate comfort/confidence). Course assessments confirmed student achievement of covered competencies. Conclusions. A simulated hospital pharmacy module improved pharmacy students’ hospital practice skills and their perceived comfort and confidence in completing the typical duties of a hospital pharmacist. PMID:23610480

  15. Eating when there is not enough to eat: eating behaviors and perceptions of food among food-insecure youths.

    PubMed

    Widome, Rachel; Neumark-Sztainer, Dianne; Hannan, Peter J; Haines, Jess; Story, Mary

    2009-05-01

    We explored differences in adolescents' eating habits, perceptions, and dietary intakes by food security status. As part of Project EAT (Eating Among Teens), we surveyed 4746 multiethnic middle and high school students in 31 primarily urban schools in the Minneapolis-St. Paul, Minnesota, area during the 1998-1999 academic year. Participants completed in-class surveys. We used multiple regression analysis to characterize associations between behaviors, perceptions, nutritional intake, and food security status. Compared with food-secure youths, food-insecure youths were more likely to perceive that eating healthfully was inconvenient and that healthy food did not taste good. Additionally, food-insecure youths reported eating more fast food but fewer family meals and breakfasts per week than did youths who were food secure. Food-insecure and food-secure youths perceived similar benefits from eating healthfully (P = .75). Compared with those who were food secure, food-insecure youths had higher fat intakes (P < .01). Food-insecure youths were more likely to have a body mass index above the 95th percentile. The eating patterns of food-insecure adolescents differ in important ways from the eating patterns of those who are food secure. Policies and interventions focusing on improving the foods that these youths eat deserve further examination.

  16. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  17. [Security agents on the front line against Ebola: roles, perceptions and knowledge in Fann Teaching Hospital, Dakar, Senegal].

    PubMed

    Lanièce, C; Sow, K; Desclaux, A

    2016-10-01

    Security agents are on the front line when patients arrive at health facilities, giving them a potential role to play in an Ebola virus disease (EVD) outbreak. The position of security agents within health services is poorly documented. A survey was conducted to clarify their understanding of Ebola pathology, to assess their need for information and to determine their role in patient management. The survey included both qualitative and quantitative aspects. 80 security agents of the Fann teaching hospital (Dakar) completed questionnaires, and 11 were interviewed. Qualitative analysis was performed with Dedoose and the quantitative analysis using Excel. The results show that security agents' activities go beyond their mission of security and control. They are involved in informing, orienting and assisting patients and those accompanying them in the hospital. The security agents have basic knowledge of EVD, but overestimate the risk of transmission. They want to be more informed and to have access to protective material. These results suggest that these professionals should be taken into account when developing response strategies to Ebola outbreaks. Their knowledge of and protection against the disease must be strengthened. Non-health professionals working in health facilities should be trained in order to be able to relay information to the public.

  18. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    PubMed

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  19. Drive Cycle Data | Transportation Secure Data Center | NREL

    Science.gov Websites

    one file. Download Individual Survey and Study Drive Cycle Data Below you'll find drive cycle data download files for individual surveys and studies. Greater Fairbanks, Alaska, Transportation Survey Drive Cycle Data by Vehicle (24-hour period of operation) Download Learn more about the survey. California

  20. 33 CFR 149.697 - What are the requirements for a noise level survey?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... noise level survey? 149.697 Section 149.697 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: DESIGN, CONSTRUCTION, AND EQUIPMENT Design and Equipment Noise Limits § 149.697 What are the requirements for a noise level survey? (a) A survey...

  1. 33 CFR 149.697 - What are the requirements for a noise level survey?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... noise level survey? 149.697 Section 149.697 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: DESIGN, CONSTRUCTION, AND EQUIPMENT Design and Equipment Noise Limits § 149.697 What are the requirements for a noise level survey? (a) A survey...

  2. 33 CFR 149.697 - What are the requirements for a noise level survey?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... noise level survey? 149.697 Section 149.697 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: DESIGN, CONSTRUCTION, AND EQUIPMENT Design and Equipment Noise Limits § 149.697 What are the requirements for a noise level survey? (a) A survey...

  3. 33 CFR 149.697 - What are the requirements for a noise level survey?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... noise level survey? 149.697 Section 149.697 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: DESIGN, CONSTRUCTION, AND EQUIPMENT Design and Equipment Noise Limits § 149.697 What are the requirements for a noise level survey? (a) A survey...

  4. 33 CFR 149.697 - What are the requirements for a noise level survey?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... noise level survey? 149.697 Section 149.697 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: DESIGN, CONSTRUCTION, AND EQUIPMENT Design and Equipment Noise Limits § 149.697 What are the requirements for a noise level survey? (a) A survey...

  5. Measurement issues associated with using survey data matched with administrative data from the Social Security Administration.

    PubMed

    Davies, Paul S; Fisher, T Lynn

    2009-01-01

    Researchers using survey data matched with administrative data benefit from the rich demographic and economic detail available from survey data combined with detailed programmatic data from administrative records. The research benefits of using these matched data are too numerous to mention. But there are drawbacks as well, and those drawbacks have received less systematic attention from researchers. We focus on survey data matched with administrative data from the Social Security Administration and address the strengths and weaknesses of each in four specific areas: (1) program participation and benefits, (2) disability and health information, (3) earnings, and (4) deferred compensation. We discuss the implications of these strengths and weaknesses for decisions that researchers must make regarding the appropriate data source and definition for the concepts in question. From this discussion, some general conclusions are drawn about measurement issues associated with using matched survey and administrative data for research, policy evaluation, and statistics.

  6. Food insecurity is associated with HIV, sexually transmitted infections and drug use among men in the United States

    PubMed Central

    PALAR, Kartika; LARAIA, Barbara; TSAI, Alexander C.; JOHNSON, Mallory; WEISER, Sheri D.

    2016-01-01

    Objective To examine the population-level association between food insecurity, HIV risk factors, and HIV serostatus among men, the group representing the majority of HIV diagnoses in the United States (US). Design Cross-sectional secondary data analysis using the National Health and Nutrition Examination Survey (NHANES) 1999-2012, a nationally representative survey of the civilian non-institutionalized US population. Methods Logistic regression with design weights and complex survey commands was used to estimate nationally-representative associations between food insecurity and HIV serostatus (primary outcome), herpes simplex virus 2 (HSV-2), self-reported STIs, and past-year illicit drug use among men, adjusting for potential confounders. Food security was measured using the 18-item Household Food Security Survey. Results We analyzed data for 9150 men representing 61 million individuals in the US. Unadjusted HIV prevalence was 1.5% among food insecure men, compared to 0.4% among food secure men (p<0.001). In adjusted models, food insecure men had over 2 times higher odds of HIV seropositivity compared to food secure men (adjusted odds ratio (AOR)=2.10; 95% CI 1.01 - 4.37; p<0.05). Food insecurity was associated with higher odds of HSV-2 seropositivity (AOR=1.28; 95% CI 1.04 - 1.57; p<0.05), self-reported STIs (AOR=1.54; 95% CI 1.08 - 2.20; p<0.05), and illicit drug use (AOR=1.57; 95% CI 1.14 - 2.15; p<0.01). Results were robust to sensitivity analyses restricted to lower incomes. Conclusions Food insecurity is associated with prevalent HIV, STIs and illicit drug use among men in the US. Further research is needed to establish whether and through what mechanisms improved food security may help prevent new HIV infections. PMID:26990632

  7. Children's Food Security and Intakes from School Meals. Final Report. Contractor and Cooperator Report No. 61

    ERIC Educational Resources Information Center

    Potamites, Elizabeth; Gordon, Anne

    2010-01-01

    Using 2005 data from the U.S. Department of Agriculture's Third School Nutrition Dietary Assessment survey, this study examines the contribution of school meals to the food and nutrient intake of children in food-secure, marginally secure, and food-insecure households. The study finds that children from food-insecure and marginally secure…

  8. Navy-wide Personnel Survey (NPS) 2005: Summary of Survey Results

    DTIC Science & Technology

    2008-11-01

    Personnel Survey Strategy. The NPS focuses on quality of work life topics including satisfaction with Navy life, work climate, morale, organizational...commitment, leadership, communication, job security, Navy image, fairness, detailing, duty assignments, job satisfaction , career development...Ph.D. Director v Summary The Navy Personnel Survey (NPS) is a multi-faceted survey that focuses on topics such as satisfaction with Navy

  9. Work-related violence against security guards--who is most at risk?

    PubMed

    Leino, Tuula; Selin, Risto; Summala, Heikki; Virtanen, Marianna

    2011-01-01

    Studies on violence in the work of security guards are largely lacking. This study is unique in that it focuses on security guards (n=1,010) in Finland, and assesses the different forms, prevalence, and risk factors of the work-related violence they often face. Information to a survey instrument was obtained by first interviewing 30 volunteers. Then we made a cross-sectional mailed survey that was sent to a randomized group of 2,000 security guards. The response rate was 52. We found the prevalence of verbal aggression, threats of assault, and physical acts against security guards at least once a month to be 39%, 19%, and 15% respectively. As regards risk factors and who is most at risk, our results show that male gender, young age, low work experience, late working hours, and time pressure were associated with all three forms of work-related violence. Unlike other forms of violence, verbal aggression was highly prevalent outside the metropolitan area and directed towards both more and less experienced security guards. In prevention policies for violence, it is important to identify high-risk groups such as those who have less work experience.

  10. 75 FR 56527 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... manufactured, shipped, and/or imported solar thermal collectors and/or photovoltaic modules and cells. The EIA... request. SUMMARY: The EIA has submitted the forms EIA-63A, ``Annual Solar Thermal Collector Manufacturers Survey,'' EIA-63B, ``Annual Photovoltaic Module/Cell Manufacturers Survey,'' and the EIA-902, ``Annual...

  11. 75 FR 33885 - Office of International Affairs; Survey of Foreign Ownership of U.S. Securities as of June 30, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... any agency, corporation, financial institution, or other entity or instrumentality thereof, including... equities, short-term debt securities (including selected money market instruments), and long-term debt...

  12. Children's Food and Drink Purchasing Behaviour "Beyond the School Gate": The Development of a Survey Module.

    PubMed

    Wills, Wendy J; Macdiarmid, Jennie I; Masson, Lindsey F; Bromley, Catherine; Craig, Leone; McNeill, Geraldine

    2013-01-01

    Many children eat a diet which supplies a higher than recommended amount of nonmilk extrinsic sugars and saturated fatty acids. The school setting is often targeted for nutrition intervention as many children consume food at school. In Scotland, attempts have been made to improve the nutritional content of food in schools and attention has now turned to food and drink available "beyond the school gate." This paper describes the development of a module on food and drink purchasing behaviour. The Food Purchasing Module was designed to collect data, for the first time, from a representative sample of children aged 8-16 years about food and drinks purchased on the way to/from school, during break time/free periods, and at lunchtime, from outlets around schools. Cognitive testing of the module highlighted that younger children find self-completion questionnaires problematic. Older children have fewer problems with self-completion questionnaires but many do not follow question routing, which has implications for the delivery of future surveys. Development of this survey module adds much needed evidence about effectively involving children in surveys. Further research exploring food and drinks purchased beyond the school gate is needed to continue to improve the nutritional quality of children's diets.

  13. Children's Food and Drink Purchasing Behaviour “Beyond the School Gate”: The Development of a Survey Module

    PubMed Central

    Wills, Wendy J.; Macdiarmid, Jennie I.; Masson, Lindsey F.; McNeill, Geraldine

    2013-01-01

    Many children eat a diet which supplies a higher than recommended amount of nonmilk extrinsic sugars and saturated fatty acids. The school setting is often targeted for nutrition intervention as many children consume food at school. In Scotland, attempts have been made to improve the nutritional content of food in schools and attention has now turned to food and drink available “beyond the school gate.” This paper describes the development of a module on food and drink purchasing behaviour. The Food Purchasing Module was designed to collect data, for the first time, from a representative sample of children aged 8–16 years about food and drinks purchased on the way to/from school, during break time/free periods, and at lunchtime, from outlets around schools. Cognitive testing of the module highlighted that younger children find self-completion questionnaires problematic. Older children have fewer problems with self-completion questionnaires but many do not follow question routing, which has implications for the delivery of future surveys. Development of this survey module adds much needed evidence about effectively involving children in surveys. Further research exploring food and drinks purchased beyond the school gate is needed to continue to improve the nutritional quality of children's diets. PMID:24959546

  14. Power system security enhancement through direct non-disruptive load control

    NASA Astrophysics Data System (ADS)

    Ramanathan, Badri Narayanan

    The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two different algorithms based on dynamic programming are proposed for air-conditioner loads, while a decision-tree based algorithm is proposed for water-heater loads. An optimization framework has been developed employing the above algorithms. Monte Carlo simulations have been performed using this framework with the objective of studying the impact of different parameters and constraints on the effectiveness as well as the effect of control. The conclusions drawn from this research strongly advocate direct load control for stability enhancement from the perspectives of robustness and coordination, as well as economic viability and the developments towards availability of the institutional framework for load participation in providing system reliability services.

  15. Household food insecurity is positively associated with depression among low-income supplemental nutrition assistance program participants and income-eligible nonparticipants.

    PubMed

    Leung, Cindy W; Epel, Elissa S; Willett, Walter C; Rimm, Eric B; Laraia, Barbara A

    2015-03-01

    Food insecurity is associated with adverse mental health outcomes. Given that federal food assistance programs, such as the Supplemental Nutrition Assistance Program (SNAP), aim to alleviate food insecurity, there may be heterogeneity in the association between food insecurity and depression by SNAP participation status. With the use of data from the 2005-2010 NHANES, we examined the associations between household food security and depression and whether these differed by SNAP participation. The study population was restricted to 3518 adults with household incomes ≤130% of the federal poverty level. Food insecurity was assessed with the 18-item US Household Food Security Survey Module; a score of ≥3 was considered food insecure. Depression was assessed with the 9-item Patient Health Questionnaire and was defined as a score of ≥10. Multivariate logistic regression models examined the associations between food insecurity and depression, adjusting for sociodemographic and health characteristics. The overall prevalence of depression was 9.3%, ranging from 6.7% among SNAP nonparticipants to 12.8% among SNAP participants. For every depressive symptom, there was a dose-response relation, such that a higher prevalence was observed with worsening food insecurity. After multivariate adjustment, food insecurity was positively associated with depression (P-trend < 0.0001), but SNAP participation modified this relation (P-interaction = 0.03). Among low-income, eligible nonparticipants, very low food security was significantly associated with higher odds of depression (OR: 5.10; 95% CI: 3.09, 8.41). Among SNAP participants, very low food security was also associated with higher odds of depression but at a lower magnitude (OR: 2.21; 95% CI: 1.54, 3.17). The complex relation between food insecurity and mental health may vary on the basis of SNAP participation status. Programmatic efforts to address the risk of depression among their beneficiaries may positively affect the mental health of low-income adults. © 2015 American Society for Nutrition.

  16. Archiving data from new survey technologies: Enabling research with high-precision data while preserving participant privacy

    DOE PAGES

    Gonder, Jeffrey; Burton, Evan; Murakami, Elaine

    2015-12-29

    Despite the significant effort and expense to collect high-resolution Global Positioning System (GPS) data in travel surveys, privacy concerns often lead to its underutilization. This paper describes development of the Transportation Secure Data Center (TSDC) to address this dilemma of providing data access while preserving privacy. Furthermore, the TSDC operating structure was developed in consultation with an advisory committee and includes: a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using amore » variety of tools and reference information.« less

  17. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    NASA Astrophysics Data System (ADS)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  18. Teaching Structure from Motion to Undergraduates: New Learning Module for Field Geoscience Courses

    NASA Astrophysics Data System (ADS)

    Pratt-Sitaula, B. A.; Shervais, K.; Crosby, C. J.; Douglas, B. J.; Crosby, B. T.; Charlevoix, D. J.

    2016-12-01

    With photogrammetry use expanding rapidly, it is essential to integrate these methods into undergraduate geosciences courses. The NSF-funded "GEodetic Tools for Societal Issues" (GETSI) project has recently published a module for field geoscience courses called "Analyzing High Resolution Topography with TLS and SfM" (serc.carleton.edu/getsi/teaching_materials/high-rez-topo/index.html). Structure from motion (SfM) and terrestrial laser scanning (TLS) are two valuable methods for generating high-resolution topographic landscape models. In addition to teaching the basic surveying methods, the module includes several specific applications that are tied to societally important geoscience research questions. The module goals are that students will be able to: 1) design and conduct a complex TLS and/or SfM survey to address a geologic research question; 2) articulate the societal impetus for answering a given research question; and 3) justify why TLS and/or SfM is the appropriate method in some circumstances. The module includes 6 units: Unit 1-TLS Introduction, Unit 1-SfM Introduction, Unit 2 Stratigraphic Section Survey, Unit 3 Fault Scarp Survey, Unit 4 Geomorphic Change Detection Survey, and Unit 5 Summative Assessment. One or both survey methods can be taught. Instructors choose which application/s to use from Units 2-4. Unit 5 Summative Assessment is flexibly written and can be used to assess any of the learned applications or others such as dinosaur tracks or seismic trench photomosaics. Prepared data sets are also provided for courses unable to visit the field. The included SfM learning manuals may also be of interest to researchers seeking to start with SfM; these are "SfM Guide of Instructors and Investigators" and "SfM Data Exploration and Processing Manual (Agisoft)". The module is appropriate for geoscience courses with field components such as field methods, geomorphology, geophysics, tectonics, and structural geology. All GETSI modules are designed and developed by teams of faculty and content experts and undergo rigorous review and classroom testing. GETSI is a collaborative project by UNAVCO (which runs NSF's Geodetic Facility), Indiana University, and Idaho State University. The Science Education Resource Center (SERC) provides assessment and evaluation expertise and webhosting.

  19. Advanced technologies for encryption of satellite links

    NASA Astrophysics Data System (ADS)

    McMahan, Sherry S.

    The use of encryption on satellite links is discussed. Advanced technology exists to provide transmission security for large earth station with data rates up to 50 megabits per second. One of the major concerns in the use of encryption equipment with very small aperture terminals (VSAT) is the key management issue and the related operational costs. The low cost requirement and the lack of physical protection of remote VSATs place severe constraints on the design of encryption equipment. Encryption may be accomplished by embedding a tamper proof encryption module into the baseband unit of each VSAT. VSAT networks are usually star networks where there is a single large earth station that serves as a hub and all satellite communications takes place between each VSAT and the hub earth station. The hub earth station has the secret master key of each VSAT. These master keys are used to downline load encrypted session keys to each VSAT. A more secure alternative is to use public key techniques where each embedded VSAT encryption module internally generates its own secret and public numbers. The secret number never leaves the module while the public number is sent to the hub at the time of initialization of the encryption module into the VSAT. Physical access control to encryption modules of VSAT systems can be implemented using passwords, smart cards or biometrics.

  20. Optical smart card using semipassive communication.

    PubMed

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  1. Optical smart card using semipassive communication

    NASA Astrophysics Data System (ADS)

    Glaser, I.; Green, Shlomo; Dimkov, Ilan

    2006-03-01

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  2. Orion EM-1 Crew Module Structural Test Article loaded onto Guppy

    NASA Image and Video Library

    2017-04-25

    NASA's Super Guppy aircraft has been closed and secured at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The Orion Exploration Mission-1 (EM-1) structural test article is secured inside the Super Guppy and will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.

  3. Finding Effective Responses Against Cyber Attacks for Divided Nations

    DTIC Science & Technology

    2015-12-01

    Coordination Center LTE Long Term Evolution MAC Media Access Control MCRC Master Control and Reporting Center MEI Ministry of Electronics...satellites that aid Internet connections. Individual users can access the Internet via not only a wired connection up to 1 Gbps, but also by 4G LTE ...operate air-gapped intranets with security measures such as cryptographic modules that correspond to security levels. The MND does maintain the public

  4. Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Liu, Weiqi; Huang, Peng; Peng, Jinye; Fan, Jianping; Zeng, Guihua

    2018-02-01

    For supporting practical quantum key distribution (QKD), it is critical to stabilize the physical parameters of signals, e.g., the intensity, phase, and polarization of the laser signals, so that such QKD systems can achieve better performance and practical security. In this paper, an approach is developed by integrating a support vector regression (SVR) model to optimize the performance and practical security of the QKD system. First, a SVR model is learned to precisely predict the time-along evolutions of the physical parameters of signals. Second, such predicted time-along evolutions are employed as feedback to control the QKD system for achieving the optimal performance and practical security. Finally, our proposed approach is exemplified by using the intensity evolution of laser light and a local oscillator pulse in the Gaussian modulated coherent state QKD system. Our experimental results have demonstrated three significant benefits of our SVR-based approach: (1) it can allow the QKD system to achieve optimal performance and practical security, (2) it does not require any additional resources and any real-time monitoring module to support automatic prediction of the time-along evolutions of the physical parameters of signals, and (3) it is applicable to any measurable physical parameter of signals in the practical QKD system.

  5. Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment

    NASA Astrophysics Data System (ADS)

    Borgohain, Tuhin; Borgohain, Amardeep; Borgohain, Rajdeep; Sanyal, Sugata

    2015-02-01

    The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid

  6. Secure communications of CAP-4 and OOK signals over MMF based on electro-optic chaos.

    PubMed

    Ai, Jianzhou; Wang, Lulu; Wang, Jian

    2017-09-15

    Chaos-based secure communication can provide a high level of privacy in data transmission. Here, we experimentally demonstrate secure signal transmission over two kinds of multimode fiber (MMF) based on electro-optic intensity chaos. High-quality synchronization is achieved in an electro-optic feedback configuration. Both 5  Gbit/s carrier-less amplitude/phase (CAP-4) modulation and 10  Gbit/s on-off key (OOK) signals are recovered efficiently in electro-optic chaos-based communication systems. Degradations of chaos synchronization and communication system due to mismatch of various hardware keys are also discussed.

  7. Digital watermarking in telemedicine applications--towards enhanced data security and accessibility.

    PubMed

    Giakoumaki, Aggeliki L; Perakis, Konstantinos; Tagaris, Anastassios; Koutsouris, Dimitris

    2006-01-01

    Implementing telemedical solutions has become a trend amongst the various research teams at an international level. Yet, contemporary information access and distribution technologies raise critical issues that urgently need to be addressed, especially those related to security. The paper suggests the use of watermarking in telemedical applications in order to enhance security of the transmitted sensitive medical data, familiarizes the users with a telemedical system and a watermarking module that have already been developed, and proposes an architecture that will enable the integration of the two systems, taking into account a variety of use cases and application scenarios.

  8. Enhancement of the Logistics Battle Command Model: Architecture Upgrades and Attrition Module Development

    DTIC Science & Technology

    2017-01-05

    module. 15. SUBJECT TERMS Logistics, attrition, discrete event simulation, Simkit, LBC 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION...stochastics, and discrete event model programmed in Java building largely on the Simkit library. The primary purpose of the LBC model is to support...equations makes them incompatible with the discrete event construct of LBC. Bullard further advances this methodology by developing a stochastic

  9. Encryption method based on pseudo random spatial light modulation for single-fibre data transmission

    NASA Astrophysics Data System (ADS)

    Kowalski, Marcin; Zyczkowski, Marek

    2017-11-01

    Optical cryptosystems can provide encryption and sometimes compression simultaneously. They are increasingly attractive for information securing especially for image encryption. Our studies shown that the optical cryptosystems can be used to encrypt optical data transmission. We propose and study a new method for securing fibre data communication. The paper presents a method for optical encryption of data transmitted with a single optical fibre. The encryption process relies on pseudo-random spatial light modulation, combination of two encryption keys and the Compressed Sensing framework. A linear combination of light pulses with pseudo-random patterns provides a required encryption performance. We propose an architecture to transmit the encrypted data through the optical fibre. The paper describes the method, presents the theoretical analysis, design of physical model and results of experiment.

  10. Orion is Taken From Ship & Put in Shipping Container

    NASA Image and Video Library

    2014-12-10

    The Orion crew module has been lowered and secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover is being lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts.

  11. Orion is Taken From Ship & Put in Shipping Container

    NASA Image and Video Library

    2014-12-10

    The Orion crew module has been secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover has been lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts.

  12. KSC-08pd1112

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, tread marks from the shoes on the crawler-transporter are visible along the crawlerway leading up to the hardstand on Launch Pad 39A. Space shuttle Discovery, secured atop the mobile launch platform below, has just arrived for final prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  13. KSC-08pd1107

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, access arms from the fixed service structure at Launch Pad 39A are extended toward space shuttle Discovery, secured atop the mobile launch platform below, as final prelaunch processing for the STS-124 mission gets under way at the pad. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  14. 78 FR 27472 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... Approved For Collection And Use: Airfield lighting and vault. Runway 21 extension--preliminary design...--80 facility modification design and build-out. Access control enhancements. Security fence replacement. Airfield pavement survey. Jet bridge refurbishment. Security checkpoint modification. Friction...

  15. Swiss national community survey on functioning after spinal cord injury: Protocol, characteristics of participants and determinants of non-response.

    PubMed

    Brinkhof, Martin W G; Fekete, Christine; Chamberlain, Jonviea D; Post, Marcel W M; Gemperli, Armin

    2016-02-01

    To detail the protocol, recruitment, study population, response, and data quality of the first population-based community survey of the Swiss Spinal Cord Injury (SwiSCI) Cohort Study. The survey consisted of 3 successive modules administered between September 2011 and March 2013. The first two modules queried demographics, lesion characteristics and key domains of functioning. The third module collected information on psychological personal factors and health behaviour; work integration; or health services and aging. Community-dwelling persons with chronic spinal cord injury in Switzerland. Descriptive analyses of the recruitment process, participant characteristics, and correspondence between self-reported and clinical data. Determinants for participation and the impact of non-response on survey results were assessed. Out of 3,144 eligible persons 1,549 participated in the first two modules (cumulative response rate 49.3%). Approximately three-quarters of participants were male, with a median age of 53 years, and 78% had traumatic spinal cord injury. Record-linkage with medical records demonstrated substantial agreement with self-reported demographic and lesion characteristics. A minimal non-response bias was found. The community survey was effective in recruiting an unbiased sample, thus providing valuable information to study functioning, health maintenance, and quality of life in the Swiss SCI community.

  16. Catatonia Education: Needs Assessment and Brief Online Intervention.

    PubMed

    Cooper, Joseph J; Roig Llesuy, Joan

    2017-06-01

    There are no studies investigating physicians' knowledge of catatonia. The authors aimed to assess and increase physicians' awareness of catatonia. A survey with clinical questions about catatonia was administered, followed by a brief online teaching module about catatonia and a post-education survey. Twenty-one psychiatry residents (response rate, 70%) and 36 internal medicine residents (response rate, 34%) participated in the pre-education survey. Psychiatry residents identified 75% of the correct answers about catatonia, compared to 32% correct by internal medicine residents (p < 0.001). Twenty participants (response rate, 35%) completed the online education module and second survey, which resulted in a significant improvement in correct response rates from 60 to 83% in all the participants (p < 0.001). Residents' baseline knowledge of catatonia is low, particularly among internal medicine residents. A brief online module improved resident physicians' knowledge of catatonia. Educational strategies to improve recognition of catatonia should be implemented.

  17. European Service Module Structural Test Article Load onto Transport Truck

    NASA Image and Video Library

    2017-06-21

    The Orion service module structural test article for Exploration Mission-1 (EM-1), built by the European Space Agency, is prepared for shipment to Lockheed Martin's Denver facility to undergo testing. Inside the Neil Armstrong Operations and Checkout Building high bay at NASA's Kennedy Space Center in Florida, a crane lifts the module onto a transport truck, where it is secured to be moved to the Shuttle Landing Facility for shipment. The Orion spacecraft will launch atop the agency's Space Launch System rocket on EM-1 in 2019.

  18. The U.S. Navy Littoral Combat Ship: Current Issues and How to Employ It in the Future

    DTIC Science & Technology

    2012-03-07

    Ship: NIA Curr-ent Issues and How to Deploy It in the Future 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER N/A 6. AUTHORCSl 5d. PROJECT NUMBER...Lieutenant Commander Gregory M Zimmerman, United States Navy N/A 5e. TASK NUMBER N/A 5f. WORK UNIT NUMBER NIA 7. PERFORMING ORGANIZATION NAME(S...Launch Module, MH-60R helicopter, UAV (Fire Scout), Mission Package Application Software Module, and the optional Maritime Security Module. 27 LCS can

  19. Civilian First Responder Decontamination Equipment Characteristics Survey Results

    DTIC Science & Technology

    2010-01-01

    EQUIPMENT CHARACTERISTICS SURVEY RESULTS Scott Kooistra Shawn Bowen John Walther PROGRAM INTEGRATION DIRECTORATE Michael B. DeZearn ENGINEERING...COVERED (From - To) Mar 2007-Feb 2008 4. TITLE AND SUBTITLE Civilian First Responder Decontamination Equipment Characteristics Survey Results 5a...Department of Homeland Security/National Institute of Standards and Technology (DHS/NIST) Standards Development Team to develop a survey to

  20. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  1. Image-based electronic patient records for secured collaborative medical applications.

    PubMed

    Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

  2. Continuities and Discontinuities in Accounting Systems: 1998 Survey of ASBO International Membership in North America.

    ERIC Educational Resources Information Center

    Henstock, Thomas F.

    1999-01-01

    Based on a survey of Association of School Business Officials members, this article focuses on 10 accounting system modules and how respondents felt about their system's operation and integration. Results showed solid continuity among general ledger, accounts payable, and payroll modules and discontinuities among fixed-asset and student accounting…

  3. Conducting Sanitary Surveys of Water Supply Systems. Student Workbook.

    ERIC Educational Resources Information Center

    1976

    This workbook is utilized in connection with a 40-hour course on sanitary surveys of water supply systems for biologists, chemists, and engineers with experience as a water supply evaluator. Practical training is provided in each of the 21 self-contained modules. Each module outlines the purpose, objectives and content for that section. The course…

  4. Food Insecurity and Depression Among Adults With Diabetes

    PubMed Central

    Montgomery, Joshua; Lu, Juan; Ratliff, Scott; Mezuk, Briana

    2017-01-01

    Purpose While both food insecurity and depression have been linked to risk of type 2 diabetes, little is known about the relationship between food insecurity and depression among adults with diabetes. Research Design and Methods Cross-sectional analyses of the National Health and Nutrition Examination Survey (2011–2014), a nationally representative, population-based survey. Analytic sample was limited to adults aged ≥20 with diabetes determined by either fasting plasma glucose (≥126 mg/dL) or self-report (n = 1724) and adults age ≥20 with prediabetes determined by fasting plasma glucose (100–125 mg/dL) or self-report (n = 2004). Food insecurity was measured using the US Food Security Survey Module. Depression was assessed using the Patient Health Questionnaire-9 (PHQ-9). Logistic regression was used to assess the relationship between food insecurity and depression while accounting for sociodemographic characteristics and health behaviors. Results Approximately 10% of individuals with diabetes and 8.5% of individuals with prediabetes had severe food insecurity in the past year; an additional 20.3% of individuals with diabetes and 14.3% of those with prediabetes had mild food insecurity. Among individuals with diabetes, both mild and severe food insecurity were associated with elevated odds of depression These relationships were similar in magnitude among individuals with prediabetes. Conclusions Food insecurity is significantly associated with depressive symptoms in people with diabetes and prediabetes. Results point to the need to address economic issues in conjunction with psychosocial issues for comprehensive diabetes care. PMID:28436293

  5. Feasibility of continuous-variable quantum key distribution with noisy coherent states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Usenko, Vladyslav C.; Department of Optics, Palacky University, CZ-772 07 Olomouc; Filip, Radim

    2010-02-15

    We address security of the quantum key distribution scheme based on the noisy modulation of coherent states and investigate how it is robust against noise in the modulation regardless of the particular technical implementation. As the trusted preparation noise is shown to be security breaking even for purely lossy channels, we reveal the essential difference between two types of trusted noise, namely sender-side preparation noise and receiver-side detection noise, the latter being security preserving. We consider the method of sender-side state purification to compensate the preparation noise and show its applicability in the realistic conditions of channel loss, untrusted channelmore » excess noise, and trusted detection noise. We show that purification makes the scheme robust to the preparation noise (i.e., even the arbitrary noisy coherent states can in principle be used for the purpose of quantum key distribution). We also take into account the effect of realistic reconciliation and show that the purification method is still efficient in this case up to a limited value of preparation noise.« less

  6. Asynchronous error-correcting secure communication scheme based on fractional-order shifting chaotic system

    NASA Astrophysics Data System (ADS)

    Chao, Luo

    2015-11-01

    In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.

  7. Documentation of the dynamic parameter, water-use, stream and lake flow routing, and two summary output modules and updates to surface-depression storage simulation and initial conditions specification options with the Precipitation-Runoff Modeling System (PRMS)

    USGS Publications Warehouse

    Regan, R. Steve; LaFontaine, Jacob H.

    2017-10-05

    This report documents seven enhancements to the U.S. Geological Survey (USGS) Precipitation-Runoff Modeling System (PRMS) hydrologic simulation code: two time-series input options, two new output options, and three updates of existing capabilities. The enhancements are (1) new dynamic parameter module, (2) new water-use module, (3) new Hydrologic Response Unit (HRU) summary output module, (4) new basin variables summary output module, (5) new stream and lake flow routing module, (6) update to surface-depression storage and flow simulation, and (7) update to the initial-conditions specification. This report relies heavily upon U.S. Geological Survey Techniques and Methods, book 6, chapter B7, which documents PRMS version 4 (PRMS-IV). A brief description of PRMS is included in this report.

  8. Prevalence and correlates of food insecurity among students attending a midsize rural university in Oregon.

    PubMed

    Patton-López, Megan M; López-Cevallos, Daniel F; Cancel-Tirado, Doris I; Vazquez, Leticia

    2014-01-01

    To examine the prevalence and identify correlates of food insecurity among students attending a rural university in Oregon. Cross-sectional nonprobability survey of 354 students attending a midsize rural university in Oregon during May, 2011. The main outcome was food insecurity measured using the US Department of Agriculture Household Food Security Survey Module: 6-Item Short Form. Socioeconomic and demographic variables were included in multivariate logistic regression models. Over half of students (59%) were food insecure at some point during the previous year. Having fair/poor health (odds ratio [OR], 2.08; 95% confidence interval [CI], 1.07-4.63), being employed (OR, 1.73; 95% CI, 1.04-2.88), and having an income < $15,000/y (OR, 2.23; 95% CI, 1.07-4.63) were associated with food insecurity. In turn, good academic performance (grade point average of ≥ 3.1) was inversely associated with food insecurity. Food insecurity seems to be a significant issue for college students. It is necessary to expand research on different campus settings and further strengthen support systems to increase access to nutritious foods for this population. Copyright © 2014 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  9. Stretching Food and Being Creative: Caregiver Responses to Child Food Insecurity.

    PubMed

    Burke, Michael P; Martini, Lauren H; Blake, Christine E; Younginer, Nicholas A; Draper, Carrie L; Bell, Bethany A; Liese, Angela D; Jones, Sonya J

    2017-04-01

    To examine the strategies and behaviors caregivers use to manage the household food supply when their children experience food insecurity as measured by the US Department of Agriculture's Household Food Security Survey Module. Cross-sectional survey with open-ended questions collected in person. Urban and nonurban areas, South Carolina, US. Caregivers who reported food insecurity among their children (n = 746). Strategies and behaviors used to manage the household food supply. Emergent and thematic qualitative coding of open-ended responses. The top 3 strategies and behaviors to change meals were (1) changes in foods purchased or obtained for the household, (2) monetary and shopping strategies, and (3) adaptations in home preparation. The most frequently mentioned foods that were decreased were protein foods (eg, meat, eggs, beans), fruits, and vegetables. The most frequently mentioned foods that were increased were grains and starches (eg, noodles), protein foods (eg, beans, hot dogs), and mixed foods (eg, sandwiches). Caregivers use a wide variety of strategies and behaviors to manage the household food supply when their children are food insecure. Future work should examine how these strategies might affect dietary quality and well-being of food-insecure children. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  10. ‘Stretching’ Food and Being Creative: Caregiver Responses to Child Food Insecurity

    PubMed Central

    Burke, Michael P.; Martini, Lauren H.; Blake, Christine E.; Younginer, Nicholas A.; Draper, Carrie L.; Bell, Bethany A.; Liese, Angela D.; Jones, Sonya J.

    2017-01-01

    Objective To examine the strategies and behaviors caregivers use to manage the household food supply when their children experience food insecurity as measured by the US Department of Agriculture’s Household Food Security Survey Module. Design Cross-sectional survey with open-ended questions collected in-person. Setting Urban and non-urban areas, South Carolina, United States of America. Participants Caregivers who reported food insecurity among their children (n=746). Phenomenon of Interest Strategies and behaviors used to manage the household food supply. Analysis Emergent and thematic qualitative coding of open-ended responses. Results The top three strategies and behaviors to change meals were 1) changes in foods purchased or obtained for the household; 2) monetary and shopping strategies; and 3) adaptations in home preparation. The most frequently mentioned foods that were decreased were protein foods (e.g., meat, eggs, beans), fruits and vegetables. The most frequently mentioned foods that were increased were grains and starches (e.g., noodles), protein foods (e.g., beans, hot dogs) and mixed foods (e.g., sandwiches). Conclusions and Implications Caregivers use a wide variety of strategies and behaviors to manage the household food supply when their children are food insecure. Future work should examine how these strategies might affect dietary quality and well-being of food-insecure children. PMID:28073623

  11. 7 CFR 601.1 - Functions assigned.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) National Resources Inventory (NRI) that is a statistically-based survey designed and implemented using... both the provisions of the Food Security Act and Section 404 of the Clean Water Act. (ii) Soil surveys.... Soil surveys are based on scientific analysis and classification of the soils and are used to determine...

  12. 7 CFR 601.1 - Functions assigned.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) National Resources Inventory (NRI) that is a statistically-based survey designed and implemented using... both the provisions of the Food Security Act and Section 404 of the Clean Water Act. (ii) Soil surveys.... Soil surveys are based on scientific analysis and classification of the soils and are used to determine...

  13. 7 CFR 601.1 - Functions assigned.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) National Resources Inventory (NRI) that is a statistically-based survey designed and implemented using... both the provisions of the Food Security Act and Section 404 of the Clean Water Act. (ii) Soil surveys.... Soil surveys are based on scientific analysis and classification of the soils and are used to determine...

  14. 7 CFR 601.1 - Functions assigned.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) National Resources Inventory (NRI) that is a statistically-based survey designed and implemented using... both the provisions of the Food Security Act and Section 404 of the Clean Water Act. (ii) Soil surveys.... Soil surveys are based on scientific analysis and classification of the soils and are used to determine...

  15. 7 CFR 601.1 - Functions assigned.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) National Resources Inventory (NRI) that is a statistically-based survey designed and implemented using... both the provisions of the Food Security Act and Section 404 of the Clean Water Act. (ii) Soil surveys.... Soil surveys are based on scientific analysis and classification of the soils and are used to determine...

  16. Developing measures of food and nutrition security within an Australian context.

    PubMed

    Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca

    2017-10-01

    To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.

  17. Analysis of interference of QPSK and QDPSK modulation signals by mathematical

    NASA Astrophysics Data System (ADS)

    Li, Dairuo; Xu, Kai

    2017-03-01

    In today's society, with the rapid development and extensive application of the information technology of the network central station and the integrated information system technology, information plays an important role in the military communication, mastering the information right to the competition Important role, how to protect one's own security, smooth access to and transmission of information, and to maximize the elimination of interference has become an important issue at home and abroad. QPSK modulation and its improved QPSK modulation as the mainstream signal modulation, the most widely used. In this paper, the principle of QPSK and QDPSK modulation and demodulation are introduced in this paper. Then, how to interfere with QPSK modulation signal is analyzed, and the interference of QPSK modulation signal is simulated by Matlab scripting program, which can be used in the next step. And to study the next step of anti-jamming measures provided the basis and preparatory work.

  18. Serum trans-fatty acids level are positively associated with lower food security among american adults.

    PubMed

    Mazidi, Mohsen; Vatanparast, Hassan

    2018-03-07

    In the current study we aimed to assess whether the food security is associated with serum trans-fatty acids (TFAs) and dietary fat. Analyses were restricted to participants (from the US National Health and Nutrition Examination Survey) with data available on serum and diet TFAs and food security status from 2009 to 2010. All statistical analyses (analysis of covariance and linear regression) accounted for the survey design and sample weights. We included 3876 participants, overall (48.6%) participants were men, and (51.4%) were women, generally (69.0%) had high food security. Subjects with higher food security had a higher level of education as well (p < 0.001). Age-adjusted, sex-adjusted, race-adjusted, education-adjusted mean of trans 9-octadecenoic acid and trans-9, trans-12-octadecadienoic acid were higher in plasma of participants with lower food security (all p < 0.001), moreover in same model there was a significant positive association between plasma level of trans-11-octadecenoic acid, trans-9-octadecenoic acid and trans-9, trans-12-octadecadienoic acid and score of food security. Further, age, sex, race, education, and energy intake adjusted mean of dietary fatty acids show that total polyunsaturated fatty acids are higher in subjects with higher food security (p = 0.026) while, cholesterol consumption is higher in subjects with lower food security (p = 0.039). Our findings provide more evidence on the association between food insecurity and the higher level of TFAs in serum and different type of fat in the diet.

  19. Micro-Controllable, Multi-Functional Interface Module for Digital MP: A Wearable Computer Security Application

    DTIC Science & Technology

    2004-05-01

    Army Soldier System Command: http://www.natick.armv.mil Role Name Facial Recognition Program Manager, Army Technical Lead Mark Chandler...security force with a facial recognition system. Mike Holloran, technology officer with the 6 Fleet, directed LCDR Hoa Ho and CAPT(s) Todd Morgan to...USN 6th Fleet was accomplished with the admiral expressing his support for continuing the evaluation of the a facial recognition system. This went

  20. Nonlinear Detection, Estimation, and Control for Free-Space Optical Communication

    DTIC Science & Technology

    2008-08-17

    original message. The promising features of this communication scheme such as high-bandwidth, power efficiency, and security, render it a viable means...bandwidth, power efficiency, and security, render it a viable means for high data rate point-to-point communication. In this dissertation, we adopt a...Department of Electrical and Computer Engineering In free-space optical communication, the intensity of a laser beam is modulated by a message, the beam

  1. GSM module for wireless radiation monitoring system via SMS

    NASA Astrophysics Data System (ADS)

    Rahman, Nur Aira Abd; Hisyam Ibrahim, Noor; Lombigit, Lojius; Azman, Azraf; Jaafar, Zainudin; Arymaswati Abdullah, Nor; Hadzir Patai Mohamad, Glam

    2018-01-01

    A customised Global System for Mobile communication (GSM) module is designed for wireless radiation monitoring through Short Messaging Service (SMS). This module is able to receive serial data from radiation monitoring devices such as survey meter or area monitor and transmit the data as text SMS to a host server. It provides two-way communication for data transmission, status query, and configuration setup. The module hardware consists of GSM module, voltage level shifter, SIM circuit and Atmega328P microcontroller. Microcontroller provides control for sending, receiving and AT command processing to GSM module. The firmware is responsible to handle task related to communication between device and host server. It process all incoming SMS, extract, and store new configuration from Host, transmits alert/notification SMS when the radiation data reach/exceed threshold value, and transmits SMS data at every fixed interval according to configuration. Integration of this module with radiation survey/monitoring device will create mobile and wireless radiation monitoring system with prompt emergency alert at high-level radiation.

  2. A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop.

    PubMed

    Zhang, Lifu; Zhang, Heng

    2016-03-26

    Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas.

  3. 46 CFR 42.09-50 - Repairs or alterations to vessel after it has been surveyed.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Repairs or alterations to vessel after it has been surveyed. 42.09-50 Section 42.09-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD...-50 Repairs or alterations to vessel after it has been surveyed. (a) After any survey of the vessel...

  4. Amplitude-Phase Modulation, Topological Horseshoe and Scaling Attractor of a Dynamical System

    NASA Astrophysics Data System (ADS)

    Li, Chun-Lai; Li, Wen; Zhang, Jing; Xie, Yuan-Xi; Zhao, Yi-Bo

    2016-09-01

    A three-dimensional autonomous chaotic system is discussed in this paper. Some basic dynamical properties of the system, including phase portrait, Poincaré map, power spectrum, Kaplan-Yorke dimension, Lyapunov exponent spectra, signal amplitude and topological horseshoe are studied theoretically and numerically. The main finding by analysis is that the signal amplitude can be modulated via controlling the coefficients of the linear term, cross-product term and squared term simultaneously or respectively, and the phase of x3 can be modulated by the product of the coefficients of the linear term and cross-product term. Furthermore, scaling chaotic attractors of this system are achieved by modified projective synchronization with an optimization-based linear coupling method, which is safer for secure communications than the existed synchronization scheme since the scaling factors can be regarded as the security encoding key. Supported by Hunan Provincial Natural Science Foundation of China under Grant No. 2016JJ4036, University Natural Science Foundation of Jiangsu Province under Grant No. 14KJB120007 and the National Natural Science Foundation of China under Grant Nos. 11504176 and 11602084

  5. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  6. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  7. Information Assurance in Saudi Organizations - An Empirical Study

    NASA Astrophysics Data System (ADS)

    Nabi, Syed Irfan; Mirza, Abdulrahman A.; Alghathbar, Khaled

    This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and information assurance management. The results provide deep insights in to the existing level of information assurance in various sectors that can be helpful in better understanding the intricate details of the prevalent information security in the Kingdom. Also, the results can be very useful for information assurance policy makers in the government as well as private sector organizations. There are few empirical studies on information assurance governance available in literature, especially about the Middle East and Saudi Arabia, therefore, the results are invaluable for information security researchers in improving the understanding of information assurance in this region and the Kingdom.

  8. Technology analysis for internet of things using big data learning

    NASA Astrophysics Data System (ADS)

    Senthilkumar, K.; Ellappan, Vijayan; Ajay

    2017-11-01

    We implemented a n efficient smart home automation system through the Internet of Things (IoT) including different type of sensors, this whole module will helps to the human beings to understand and provide the information about their home security system we are also going to apply Big Data Analysis to analyze the data that we are getting from different type of sensors in this module. We are using some sensors in our module to sense some type of things or object that makes our home standard and also introducing the face recognition system with an efficient algorithm into the module to make it more impressive and provide standardization in advance era.

  9. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

    PubMed

    Khan, Muhammad Khurram; Alghathbar, Khaled

    2010-01-01

    User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  10. Internet research in an international context.

    PubMed

    Baernholdt, Marianne; Clarke, Sean P

    2006-02-01

    Computers and the Internet provide researchers with new options in surveying. When using electronic surveys, several practical and methodological issues need to be considered such as whether the majority of the surveyed population has Internet access and whether an e-mail or a Web-based survey is most appropriate. Other important considerations relate to Internet security issues and, in international research, the possibility of language barriers. Despite these challenges, electronic surveys offer a promising alternative to conventional mail surveys.

  11. Implementation of continuous-variable quantum key distribution with discrete modulation

    NASA Astrophysics Data System (ADS)

    Hirano, Takuya; Ichikawa, Tsubasa; Matsubara, Takuto; Ono, Motoharu; Oguri, Yusuke; Namiki, Ryo; Kasai, Kenta; Matsumoto, Ryutaroh; Tsurumaru, Toyohiro

    2017-06-01

    We have developed a continuous-variable quantum key distribution (CV-QKD) system that employs discrete quadrature-amplitude modulation and homodyne detection of coherent states of light. We experimentally demonstrated automated secure key generation with a rate of 50 kbps when a quantum channel is a 10 km optical fibre. The CV-QKD system utilises a four-state and post-selection protocol and generates a secure key against the entangling cloner attack. We used a pulsed light source of 1550 nm wavelength with a repetition rate of 10 MHz. A commercially available balanced receiver is used to realise shot-noise-limited pulsed homodyne detection. We used a non-binary LDPC code for error correction (reverse reconciliation) and the Toeplitz matrix multiplication for privacy amplification. A graphical processing unit card is used to accelerate the software-based post-processing.

  12. KSC-2014-4816

    NASA Image and Video Library

    2014-12-10

    SAN DIEGO, Calif. -- The Orion crew module has been secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover has been lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts. For more information, visit www.nasa.gov/orion Photo credit: NASA/Cory Huston

  13. KSC-2014-4815

    NASA Image and Video Library

    2014-12-10

    SAN DIEGO, Calif. -- The Orion crew module has been lowered and secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover is being lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts. For more information, visit www.nasa.gov/orion Photo credit: NASA/Cory Huston

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

    The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. Themore » complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.« less

  15. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    PubMed

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  16. Using digital watermarking to enhance security in wireless medical image transmission.

    PubMed

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  17. Spline-Screw Payload-Fastening System

    NASA Technical Reports Server (NTRS)

    Vranish, John M.

    1994-01-01

    Payload handed off securely between robot and vehicle or structure. Spline-screw payload-fastening system includes mating female and male connector mechanisms. Clockwise (or counter-clockwise) rotation of splined male driver on robotic end effector causes connection between robot and payload to tighten (or loosen) and simultaneously causes connection between payload and structure to loosen (or tighten). Includes mechanisms like those described in "Tool-Changing Mechanism for Robot" (GSC-13435) and "Self-Aligning Mechanical and Electrical Coupling" (GSC-13430). Designed for use in outer space, also useful on Earth in applications needed for secure handling and secure mounting of equipment modules during storage, transport, and/or operation. Particularly useful in machine or robotic applications.

  18. 77 FR 17406 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... surveys distributed to determine the impact on national security. Affected Public: Businesses and other...: Bureau of Industry and Security. Title: Request for Investigation Under Section 232 of the Trade.... Needs and Uses: Upon request, BIS will initiate an investigation to determine the effects of imports of...

  19. Training in the Post-Terrorism Era.

    ERIC Educational Resources Information Center

    Caudron, Shari

    2002-01-01

    A survey of training professionals revealed how the terrorist attacks of September 11, 2001 changed employee attitudes toward training. Decreased travel, increased use of distance technologies, development of security and evacuation plans, and emphasis on such topics as diversity, stress management, and security are some of the changes. (JOW)

  20. Report: Survey Results on Information Used by Water Utilities to Conduct Vulnerability Assessments

    EPA Pesticide Factsheets

    Report #2004-M-0001, November 21, 2003. EPA developed a Strategic Plan for Homeland Security (Plan), dated Sept 2002, which states that EPA will work with the States, tribes, drinking water utilities, and others to enhance the security of water utilities.

  1. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses

    NASA Astrophysics Data System (ADS)

    Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa

    2018-03-01

    Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.

  2. 46 CFR 42.09-30 - Additional survey requirements for steel-hull vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 2 2012-10-01 2012-10-01 false Additional survey requirements for steel-hull vessels. 42.09-30 Section 42.09-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD...-30 Additional survey requirements for steel-hull vessels. (a) In addition to the requirements in § 42...

  3. 46 CFR 42.09-30 - Additional survey requirements for steel-hull vessels.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 2 2014-10-01 2014-10-01 false Additional survey requirements for steel-hull vessels. 42.09-30 Section 42.09-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD...-30 Additional survey requirements for steel-hull vessels. (a) In addition to the requirements in § 42...

  4. 46 CFR 42.09-30 - Additional survey requirements for steel-hull vessels.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 2 2013-10-01 2013-10-01 false Additional survey requirements for steel-hull vessels. 42.09-30 Section 42.09-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD...-30 Additional survey requirements for steel-hull vessels. (a) In addition to the requirements in § 42...

  5. KSC-2012-3565

    NASA Image and Video Library

    2012-06-28

    CAPE CANAVERAL, Fla. - Secured inside a transportation container, the Orion crew module arrives at the Operations and Checkout Building at NASA's Kennedy Space Center in Florida. Slated for Exploration Flight Test-1, an uncrewed mission planned for 2014, the capsule will travel farther into space than any human spacecraft has gone in more than 40 years. NASA's Michoud Assembly Facility in New Orleans built the crew module pressure vessel. The Orion production team will prepare the module for flight by installing heat-shielding thermal protection systems, avionics and other subsystems. For more information, visit http://www.nasa.gov/orion. Photo credit: NASA/Jim Grossmann

  6. Comparing Different Suicide Prevention Measures at Bridges and Buildings: Lessons We Have Learned from a National Survey in Switzerland

    PubMed Central

    Hemmer, Alexander; Meier, Philipp; Reisch, Thomas

    2017-01-01

    The goal of the study was to compare the effectiveness of different suicide prevention measures implemented on bridges and other high structures in Switzerland. A national survey identified all jumping hotspots that have been secured in Switzerland; of the 15 that could be included in this study, 11 were secured by vertical barriers and 4 were secured by low-hanging horizontal safety nets. The study made an overall and individual pre-post analysis by using Mantel-Haenszel Tests, regression methods and calculating rate ratios. Barriers and safety nets were both effective, with mean suicide reduction of 68.7% (barriers) and 77.1% (safety nets), respectively. Measures that do not secure the whole hotspot and still allow jumps of 15 meters or more were less effective. Further, the analyses revealed that barriers of at least 2.3 m in height and safety-nets fixed significantly below pedestrian level deterred suicidal jumps. Secured bridgeheads and inbound angle barriers seemed to enhance the effectiveness of the measure. Findings can help to plan and improve the effectiveness of future suicide prevention measures on high structures. PMID:28060950

  7. Informal work, unemployment and health in Brazilian metropolitan areas, 1998 and 2003.

    PubMed

    Giatti, Luana; Barreto, Sandhi Maria; César, Cibele Comini

    2008-10-01

    This study investigates whether employment with no social security, as well as short and long term unemployment are associated with worse health among Brazilians. The representative study sample was taken from two National Health Surveys and included men aged between 15 and 64 who lived in one of the eight metropolitan regions of Brazil in 1998 (n = 31,870) and 2003 (n = 32,887). Both surveys showed that full and part time workers with no social security, as well as those in short and long term (> 12 months) unemployment had worse health indicators, regardless of age or schooling, when compared with full-time workers (> 40 hours/week) who had some form of social security through their employment. Hepatic cirrhosis was the disease most strongly associated with labor market status. Its prevalence was higher among individuals in long term unemployment and those with no social security. Labor market status was also negatively associated with the use of health care services, especially medical visits. The present study shows that the absence of social security at work, unemployment and length of unemployment, characterize heterogeneous groups of individuals in relation to health. Results reinforce the need to incorporate labor market status in research into health inequalities.

  8. Statistical Models for Predicting Threat Detection From Human Behavior.

    PubMed

    Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking.

  9. Vehicle security encryption based on unlicensed encryption

    NASA Astrophysics Data System (ADS)

    Huang, Haomin; Song, Jing; Xu, Zhijia; Ding, Xiaoke; Deng, Wei

    2018-03-01

    The current vehicle key is easy to be destroyed and damage, proposing the use of elliptical encryption algorithm is improving the reliability of vehicle security system. Based on the encryption rules of elliptic curve, the chip's framework and hardware structure are designed, then the chip calculation process simulation has been analyzed by software. The simulation has been achieved the expected target. Finally, some issues pointed out in the data calculation about the chip's storage control and other modules.

  10. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It featuresmore » millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.« less

  11. External Survey from Windows in Mini-Research Modules and Pirs Docking Compartment

    NASA Image and Video Library

    2013-04-03

    ISS035-E-013901 (3 April 2013) --- This close-up picture of a Zvezda Service Module array, reflecting bright rays of the sun, thus creating an artistic scene, was photographed on April 3 by one of the Expedition 35 crew members as part of an External Survey from International Space Station windows that was recently added to the crew's task list.

  12. Cache Hardware Approaches to Multiple Independent Levels of Security (MILS)

    DTIC Science & Technology

    2012-10-01

    systems that require that several multicore processors be connected together in a single system. However, no such boards were available on the market ...available concerning each module. However, the availability of modules seems to significantly lag the time when the corresponding hardware hits the market ...version of real mode often referred to as “Unreal mode” can be entered by loading a Local Descriptor Table (LDT) and Global Descriptor Table (GDT

  13. Preliminary Analysis of a Trusted Platform Module (TPM) Initialization Process

    DTIC Science & Technology

    2007-06-01

    during system startup. For a laptop, extra precaution must be taken to prevent the machine from transitioning into a Sleep or Hibernate mode, since... hibernate mode [81]. D. TEST AND AUDIT After the system has gone through the predefined initialization and configuration processes, it needs to go...Conference on Computer and Communications Security, 2004, pp. 308-317. [45] L. Sarmenta, “TPM/J java -based API for the Trusted Platform Module (TPM

  14. Army Sustainment. Volume 44, Issue 2, March-April 2012

    DTIC Science & Technology

    2012-04-01

    b.a. deGree in criMinal justice adMinistration froM con- cordia colleGe in MicHiGan. He is leVel iii certified in loGistics ManaGeMent and leVel ii...book and unit supply), plant maintenance, finance, and Defense Forces and Public Security (DFPS). Together, these modules provide enhanced...maintenance-related information for all assigned assets. The plant maintenance module provides users with equipment readiness and enhanced personnel

  15. Electrical Transport and Channel Length Modulation in Semiconducting Carbon Nanotube Field-Effect Transistors

    DTIC Science & Technology

    2013-11-25

    a ballistic one-dimensional conductor is / = £>(£) ■ VgiE)[fR(E) - fdEME , (1) where Vg(E) is the group velocity, D(E) is the density of states... AEROSPACE REPORT NO. ATR-2013-01138 Electrical Transport and Channel Length Modulation in Semiconducting Carbon Nanotube Field-Effect Transistors...SCIENCES LABORATORIES The Aerospace Corporation functions as an "architect-engineer" for national security programs, specializing in advanced military

  16. Orion EM-1 Crew Module Move from Clean Room to Work Station

    NASA Image and Video Library

    2017-05-11

    The Orion crew module for NASA’s Exploration Mission 1 (EM-1) is secured in a work station in the Neil Armstrong Operations and Checkout Building high bay at NASA’s Kennedy Space Center in Florida. Orion will undergo additional processing to prepare it for launch in 2019. The spacecraft is being prepared for its first integrated flight atop the Space Launch System rocket on Exploration Mission-1.

  17. Orion EM-1 Crew Module Move from Clean Room to Work Station

    NASA Image and Video Library

    2017-05-11

    The Orion crew module for NASA’s Exploration Mission 1 (EM-1) is being secured in a work station in the Neil Armstrong Operations and Checkout Building high bay at NASA’s Kennedy Space Center in Florida. Orion will undergo additional processing to prepare it for launch in 2019. The spacecraft is being prepared for its first integrated flight atop the Space Launch System rocket on Exploration Mission-1.

  18. Terrestrial Laser Scanning and Structure from Motion teaching resources for undergraduate field education courses

    NASA Astrophysics Data System (ADS)

    Pratt-Sitaula, B. A.; Shervais, K.; Crosby, C. J.; Douglas, B. J.; Niemi, N. A.; Wang, G.; Charlevoix, D. J.

    2015-12-01

    Fieldwork is an integral part of the geosciences and there is a longstanding tradition of teaching field methods as part of the undergraduate curriculum. As new technology changes the ways in which we scientifically examine the Earth, and as workforce development demands evolve, there is growing interest in introducing these new technologies into field education courses. In collaboration with field education instructors, UNAVCO, the National Science Foundation's geodetic facility, has developed a module of teaching resources to integrate terrestrial lidar scanning into field courses. An NSF facility is well positioned to develop scalable resources that can then be distributed or adapted for broader implementation. The modules can also be accomplished using Structure from Motion methods in place of lidar scanning. Modules goals are for students to be able to: (A) design and conduct a complex TLS survey to address a geologic research question and (B) articulate the societal impetus for answering these research questions and identify why TLS is the appropriate method in some circumstances. The module is comprised of five units: (1) Introduction to survey design, (2) Stratigraphic section analysis, (3) Fault scarp analysis, (4) Geomorphic change detection, (5) Student-led survey design summative assessment. The modules, apart from the Introduction, are independent, thus select modules can be employed in a given field setting. Prototype module materials were developed from the last five years of UNAVCO support of undergraduate field courses. The current versions of the modules were tested in summer 2015 at the Indiana University and University of Michigan field camps. Results show that the majority of students are able to achieve the intended learning goals. Module materials are available on the UNAVCO Education and Community Engagement website.

  19. Supplemental nutrition assistance program participation and child food security.

    PubMed

    Mabli, James; Worthington, Julie

    2014-04-01

    This article investigates the association between Supplemental Nutrition Assistance Program (SNAP) participation and child food security by using data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 3000 households with children and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 months. Next, by using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 months later. Multivariate logistic regression analysis was used to estimate associations between SNAP and child food security. SNAP participation was associated with an approximately one-third decrease in the odds of children being food insecure in both samples. In the cross-sectional analysis only, SNAP was also associated with a decrease in the odds of children experiencing severe food insecurity (designated very low food security). Findings were qualitatively robust to different empirical specifications. After controlling for other possible confounders, we found children in households that had participated in SNAP for 6 months experienced improvements in food security. On the basis of these findings, we conclude SNAP serves a vital role in improving the health and well-being of low-income children by increasing food security. Future research is needed to determine whether specific groups of children experience differential improvements in food security.

  20. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    PubMed

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  1. Household Food Security and Fruit and Vegetable Intake among Low-Income Fourth-Graders

    ERIC Educational Resources Information Center

    Grutzmacher, Stephanie; Gross, Susan

    2011-01-01

    Objective: To examine the relationship between household food security and children's and parents' fruit, vegetable, and breakfast consumption and fruit and vegetable availability. Design: Cross-sectional study using matched parent-child surveys. Setting: Title I elementary schools in Maryland. Participants: Ninety-two low-income parent-child…

  2. Pathways to Economic Security: Gender and Nonstandard Employment in Contemporary Japan

    ERIC Educational Resources Information Center

    Gottfried, Heidi

    2008-01-01

    Compiling data from several government surveys, this article identifies key social indicators of economic security associated with nonstandard employment in Japan. Empirical trends of nonstandard employment are contextualized in the development of Japanese coordinated capitalism from the economic boom during the 1960s through the recession of the…

  3. Security and Crime Prevention Strategies in California Public Schools.

    ERIC Educational Resources Information Center

    Nieto, Marcus

    Key findings are presented from a survey conducted by the California Research Bureau showing that most California school districts incorporate violence prevention program curricula with a strong police and security presence. Many schools have installed closed circuit video surveillance cameras, canine searches, and metal detectors. Unfortunately,…

  4. Wireless Protection.

    ERIC Educational Resources Information Center

    Conforti, Fred

    2003-01-01

    Discusses wireless access-control equipment in the school and university setting, particularly the integrated reader lock at the door with a panel interface module at the control panel. Describes its benefits, how it works, and its reliability and security. (EV)

  5. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  6. A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop

    PubMed Central

    Zhang, Lifu; Zhang, Heng

    2016-01-01

    Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas. PMID:27023559

  7. Survey of holographic security systems

    NASA Astrophysics Data System (ADS)

    Kontnik, Lewis T.; Lancaster, Ian M.

    1990-04-01

    The counterfeiting of products and financial instruments is a major problem throughout the world today. The dimensions of the problem are growing, accelerated by the expanding availability of production technologies to sophisticated counterfeiters and the increasing capabilities of these technologies. Various optical techniques, including holography, are beingused in efforts to mark authentic products and to distinguish them from copies. Industry is recognizing that the effectiveness of these techniques depends on such factors as the economics of the counterfeiting process and the distribution channels for the products involved, in addition to the performance of the particular optical security technologies used. This paper surveys the nature of the growing counterfeit market place and reviews the utility of holographic optical security systems. In particular, we review the use of holograms on credit cards and other products; and outline certain steps the holography industry should take to promote these application.

  8. Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?

    NASA Technical Reports Server (NTRS)

    Sweet, Kathleen M.

    2007-01-01

    The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.

  9. Measuring Poverty for Food Security Analysis: Consumption- Versus Asset-Based Approaches.

    PubMed

    Hjelm, Lisa; Mathiassen, Astrid; Wadhwa, Amit

    2016-06-22

    Poverty and food insecurity are intrinsically linked as poor households often lack the resources required to access sufficient nutritious food to live an active and healthy life. Consumption and expenditure surveys are typically used to identify poor versus nonpoor households but are detailed and costly. Measures of wealth based on asset ownership and housing characteristics can be generated from lighter, less costly surveys. To examine whether indices based on asset ownership and housing characteristics (stock) complement household consumption (flow) when used to analyze inequalities in food security outcomes. Comprehensive data from Nepal, Malawi, Tanzania, Uganda, and Madagascar are used to examine correlations and overlaps in classification between indices of household wealth and consumption per capita. Inequality in food security indicators representing quantity, quality, and vulnerability is examined across wealth and consumption per capita quintiles. Wealth indices are correlated with consumption per capita, with coefficients between 0.5 and 0.6. The prevalence of food insecurity decreases from poorer to wealthier quintiles for all variables and for all food security measures in all countries. Energy deficiency varies much more across consumption quintiles than wealth index quintiles. Interestingly, inequalities in the share of consumption of food are more pronounced across the wealth index quintiles than per capita consumption. Although wealth indices and consumption per capita are related and both are drivers of food security, they cannot be used interchangeably for food security analysis. Each inequality measure is important for describing different aspects of food security. © The Author(s) 2016.

  10. Dyslipidemia and Food Security in Low-Income US Adolescents: National Health and Nutrition Examination Survey, 2003-2010.

    PubMed

    Tester, June M; Laraia, Barbara A; Leung, Cindy W; Mietus-Snyder, Michele L

    2016-02-11

    Low levels of food security are associated with dyslipidemia and chronic disease in adults, particularly in women. There is a gap in knowledge about the relationship between food security among youth and dyslipidemia and chronic disease. We investigated the relationship between food security status and dyslipidemia among low-income adolescents. We analyzed data from adolescents aged 12 to 18 years (N = 1,072) from households with incomes at or below 200% of the federal poverty level from the National Health and Nutrition Examination Survey (NHANES) 2003-2010. We used logistic regression to examine the relationship between household food security status and the odds of having abnormalities with fasting total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), serum triglycerides (TGs), high-density lipoprotein cholesterol (HDL-C), TG/HDL-C ratio, and apolipoprotein B (Apo B). Models included age, sex, race/ethnicity, smoking status, partnered status in the household, and maternal education, with additional adjustment for adiposity. Household food security status was not associated with elevated TC or LDL-C. Adolescents with marginal food security were more likely than food-secure peers to have elevated TGs (odds ratio [OR] = 1.86; 95% confidence interval [CI], 1.14-3.05), TG/HDL-C ratio (OR = 1.74; 95% CI, 1.11-2.82), and Apo B (OR = 1.98; 95% CI, 1.17-3.36). Female adolescents with marginal food security had greater odds than male adolescents of having low HDL-C (OR = 2.69; 95% CI, 1.14-6.37). No elevated odds of dyslipidemia were found for adolescents with low or very low food security. Adjustment for adiposity did not attenuate estimates. In this nationally representative sample, low-income adolescents living in households with marginal food security had increased odds of having a pattern consistent with atherogenic dyslipidemia, which represents a cardiometabolic burden above their risk from adiposity alone.

  11. Dyslipidemia and Food Security in Low-Income US Adolescents: National Health and Nutrition Examination Survey, 2003–2010

    PubMed Central

    Laraia, Barbara A.; Leung, Cindy W.; Mietus-Snyder, Michele L.

    2016-01-01

    Introduction Low levels of food security are associated with dyslipidemia and chronic disease in adults, particularly in women. There is a gap in knowledge about the relationship between food security among youth and dyslipidemia and chronic disease. We investigated the relationship between food security status and dyslipidemia among low-income adolescents. Methods We analyzed data from adolescents aged 12 to 18 years (N = 1,072) from households with incomes at or below 200% of the federal poverty level from the National Health and Nutrition Examination Survey (NHANES) 2003–2010. We used logistic regression to examine the relationship between household food security status and the odds of having abnormalities with fasting total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), serum triglycerides (TGs), high-density lipoprotein cholesterol (HDL-C), TG/HDL-C ratio, and apolipoprotein B (Apo B). Models included age, sex, race/ethnicity, smoking status, partnered status in the household, and maternal education, with additional adjustment for adiposity. Results Household food security status was not associated with elevated TC or LDL-C. Adolescents with marginal food security were more likely than food-secure peers to have elevated TGs (odds ratio [OR] = 1.86; 95% confidence interval [CI], 1.14–3.05), TG/HDL-C ratio (OR = 1.74; 95% CI, 1.11–2.82), and Apo B (OR = 1.98; 95% CI, 1.17–3.36). Female adolescents with marginal food security had greater odds than male adolescents of having low HDL-C (OR = 2.69; 95% CI, 1.14–6.37). No elevated odds of dyslipidemia were found for adolescents with low or very low food security. Adjustment for adiposity did not attenuate estimates. Conclusion In this nationally representative sample, low-income adolescents living in households with marginal food security had increased odds of having a pattern consistent with atherogenic dyslipidemia, which represents a cardiometabolic burden above their risk from adiposity alone. PMID:26866948

  12. Vandalism Survey and Report. Suburban Cook County School Districts.

    ERIC Educational Resources Information Center

    Educational Service Region of Cook County, Chicago, IL.

    The statistics on vandalism compiled in this report were obtained from a survey of all 717 schools in suburban Cook County and give a broad overview of the extent, frequency, and financial costs incurred as a result of vandalism in the schools. The survey includes information on methods of protection and surveillance such as security personnel,…

  13. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 2 2013-10-01 2013-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  14. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 2 2012-10-01 2012-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  15. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 2 2014-10-01 2014-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  16. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  17. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 2 2011-10-01 2011-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  18. Development of a Microsoft Excel tool for one-parameter Rasch model of continuous items: an application to a safety attitude survey.

    PubMed

    Chien, Tsair-Wei; Shao, Yang; Kuo, Shu-Chun

    2017-01-10

    Many continuous item responses (CIRs) are encountered in healthcare settings, but no one uses item response theory's (IRT) probabilistic modeling to present graphical presentations for interpreting CIR results. A computer module that is programmed to deal with CIRs is required. To present a computer module, validate it, and verify its usefulness in dealing with CIR data, and then to apply the model to real healthcare data in order to show how the CIR that can be applied to healthcare settings with an example regarding a safety attitude survey. Using Microsoft Excel VBA (Visual Basic for Applications), we designed a computer module that minimizes the residuals and calculates model's expected scores according to person responses across items. Rasch models based on a Wright map and on KIDMAP were demonstrated to interpret results of the safety attitude survey. The author-made CIR module yielded OUTFIT mean square (MNSQ) and person measures equivalent to those yielded by professional Rasch Winsteps software. The probabilistic modeling of the CIR module provides messages that are much more valuable to users and show the CIR advantage over classic test theory. Because of advances in computer technology, healthcare users who are familiar to MS Excel can easily apply the study CIR module to deal with continuous variables to benefit comparisons of data with a logistic distribution and model fit statistics.

  19. 6 in 10 Americans Think College Sports Are Overemphasized, Survey Finds: Opinion Survey.

    ERIC Educational Resources Information Center

    Chronicle of Higher Education, 1985

    1985-01-01

    The results of a public opinion poll concerning the emphasis on college athletics, coaches' job security, paying students for competing, academic standards for athletes, and gambling by both the public and the athletes, are presented. (MSE)

  20. Association Between Bereaved Families' Sense of Security and Their Experience of Death in Cancer Patients: Cross-Sectional Population-Based Study.

    PubMed

    Igarashi, Ayumi; Miyashita, Mitsunori; Morita, Tatsuya; Akizuki, Nobuya; Akiyama, Miki; Shirahige, Yutaka; Sato, Kazuki; Yamamoto-Mitani, Noriko; Eguchi, Kenji

    2016-05-01

    The sense of security scale was developed to indicate care quality within the community. Bereaved families have perspective to evaluate the quality of the care system. The aim was to examine associations between end-of-life care and sense of security regarding regional cancer care among bereaved families. A cross-sectional population-based survey was conducted with families of cancer patients who died in regional areas of Japan. A total of 1046 family caregivers of patients responded to surveys (effective response rate of 65%). In multiple regression analyses, the families' higher age (P < 0.001), home death (P = 0.039), better health status of the family at patients' end of life (P = 0.016), lower caregiving burden (P < 0.001), and elements of perceived good patient death, including being free from physical distress (P < 0.001), trusting the physician (P < 0.001), living in calm circumstances (P = 0.042), and feeling that one's life was fulfilling (P = 0.035), were associated with a higher sense of security. Quality of death and lower burden on family caregivers were associated with families' sense of security. This suggests strategies for improving care quality for each patient to improve the sense of security. Copyright © 2016 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  1. Security Behavior Observatory: Infrastructure for Long-term Monitoring of Client Machines

    DTIC Science & Technology

    2014-07-14

    desired data. In Wmdows, this is most often a .NET language (e.g., C#, PowerShell), a command-line batch script, or Java . 3) Least privilege: To ensure...modules are written in Java , and thus should be easily-portable to any OS. B. Deployment There are several high-level requirements the SBO must meet...practically feasible with such solutions. Instead, one researcher with access to all the clients’ keys (stored in an isolated and secured MySQL database

  2. Secure chaotic transmission of electrocardiography signals with acousto-optic modulation under profiled beam propagation.

    PubMed

    Almehmadi, Fares S; Chatterjee, Monish R

    2015-01-10

    Electrocardiography (ECG) signals are used for both medical purposes and identifying individuals. It is often necessary to encrypt this highly sensitive information before it is transmitted over any channel. A closed-loop acousto-optic hybrid device acting as a chaotic modulator is applied to ECG signals to achieve this encryption. Recently improved modeling of this approach using profiled optical beams has shown it to be very sensitive to key parameters that characterize the encryption and decryption process, exhibiting its potential for secure transmission of analog and digital signals. Here the encryption and decryption is demonstrated for ECG signals, both analog and digital versions, illustrating strong encryption without significant distortion. Performance analysis pertinent to both analog and digital transmission of the ECG waveform is also carried out using output signal-to-noise, signal-to-distortion, and bit-error-rate measures relative to the key parameters and presence of channel noise in the system.

  3. Asymmetric optical image encryption using Kolmogorov phase screens and equal modulus decomposition

    NASA Astrophysics Data System (ADS)

    Kumar, Ravi; Bhaduri, Basanta; Quan, Chenggen

    2017-11-01

    An asymmetric technique for optical image encryption is proposed using Kolmogorov phase screens (KPSs) and equal modulus decomposition (EMD). The KPSs are generated using the power spectral density of Kolmogorov turbulence. The input image is first randomized and then Fresnel propagated with distance d. Further, the output in the Fresnel domain is modulated with a random phase mask, and the gyrator transform (GT) of the modulated image is obtained with an angle α. The EMD is operated on the GT spectrum to get the complex images, Z1 and Z2. Among these, Z2 is reserved as a private key for decryption and Z1 is propagated through a medium consisting of four KPSs, located at specified distances, to get the final encrypted image. The proposed technique provides a large set of security keys and is robust against various potential attacks. Numerical simulation results validate the effectiveness and security of the proposed technique.

  4. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.

    PubMed

    Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B

    2018-04-30

    We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.

  5. Continuous variable quantum key distribution with modulated entangled states.

    PubMed

    Madsen, Lars S; Usenko, Vladyslav C; Lassen, Mikael; Filip, Radim; Andersen, Ulrik L

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising avenue for extending the distance for which secure communication is possible.

  6. A New Cloud Architecture of Virtual Trusted Platform Modules

    NASA Astrophysics Data System (ADS)

    Liu, Dongxi; Lee, Jack; Jang, Julian; Nepal, Surya; Zic, John

    We propose and implement a cloud architecture of virtual Trusted Platform Modules (TPMs) to improve the usability of TPMs. In this architecture, virtual TPMs can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have physical TPMs in their local platforms. Moreover, the TPM cloud allows users to access their keys and data in the same virtual TPM even if they move to untrusted platforms. The TPM cloud is easy to access for applications in different languages since cloud computing delivers services in standard protocols. The functionality of the TPM cloud is demonstrated by applying it to implement the Needham-Schroeder public-key protocol for web authentications, such that the strong security provided by TPMs is integrated into high level applications. The chain of trust based on the TPM cloud is discussed and the security properties of the virtual TPMs in the cloud is analyzed.

  7. Compact storage of medical images with patient information.

    PubMed

    Acharya, R; Anand, D; Bhat, S; Niranjan, U C

    2001-12-01

    Digital watermarking is a technique of hiding specific identification data for copyright authentication. This technique is adapted here for interleaving patient information with medical images to reduce storage and transmission overheads. The text data are encrypted before interleaving with images to ensure greater security. The graphical signals are compressed and subsequently interleaved with the image. Differential pulse-code-modulation and adaptive-delta-modulation techniques are employed for data compression, and encryption and results are tabulated for a specific example.

  8. RF Photonic Link Test Bed

    DTIC Science & Technology

    2004-09-01

    TEST BED 6. AUTHOR(S) 1Lt Charles Ware, Paul Payson, Richard Michalak and George Brost 5 . FUNDING NUMBERS C - N/A PE - 62204F...modulator [ 5 ]. As can be deduced from the above equation, biasing the modulator at Vπ/2, or quadrature, allows the device to operate in the most linear...is desirable to have access to the secure surveillance facility added to your 5 RRS badge, since room F-251 is in this area. This allows unescorted

  9. Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol

    NASA Astrophysics Data System (ADS)

    Huang, Duan; Huang, Peng; Wang, Tao; Li, Huasheng; Zhou, Yingming; Zeng, Guihua

    2016-09-01

    We propose and experimentally demonstrate a continuous-variable quantum key distribution (CV-QKD) protocol using dual-phase-modulated coherent states. We show that the modulation scheme of our protocol works equivalently to that of the Gaussian-modulated coherent-states (GMCS) protocol, but shows better experimental feasibility in the plug-and-play configuration. Besides, it waives the necessity of propagation of a local oscillator (LO) between legitimate users and generates a real local LO for quantum measurement. Our protocol is proposed independent of the one-way GMCS QKD without sending a LO [Opt. Lett. 40, 3695 (2015), 10.1364/OL.40.003695; Phys. Rev. X 5, 041009 (2015), 10.1103/PhysRevX.5.041009; Phys. Rev. X 5, 041010 (2015), 10.1103/PhysRevX.5.041010]. In those recent works, the system stability will suffer the impact of polarization drifts induced by environmental perturbations, and two independent frequency-locked laser sources are necessary to achieve reliable coherent detection. In the proposed protocol, these previous problems can be resolved. We derive the security bounds for our protocol against collective attacks, and we also perform a proof-of-principle experiment to confirm the utility of our proposal in real-life applications. Such an efficient scheme provides a way of removing the security loopholes associated with the transmitting LO, which have been a notoriously hard problem in continuous-variable quantum communication.

  10. Secure Image Transmission over DFT-precoded OFDM-VLC systems based on Chebyshev Chaos scrambling

    NASA Astrophysics Data System (ADS)

    Wang, Zhongpeng; Qiu, Weiwei

    2017-08-01

    This paper proposes a physical layer image secure transmission scheme for discrete Fourier transform (DFT) precoded OFDM-based visible light communication systems by using Chebyshev chaos maps. In the proposed scheme, 256 subcarriers and QPSK modulation are employed. The transmitted digital signal of the image is encrypted with a Chebyshev chaos sequence. The encrypted signal is then transformed by a DFT precoding matrix to reduce the PAPR of the OFDM signal. After that, the encrypted and DFT-precoded OFDM are transmitted over a VLC channel. The simulation results show that the proposed image security transmission scheme can not only protect the DFT-precoded OFDM-based VLC from eavesdroppers but also improve BER performance.

  11. Who is food-insecure in California? Findings from the California Women's Health Survey, 2004.

    PubMed

    Kaiser, Lucia; Baumrind, Nikki; Dumbauld, Sheila

    2007-06-01

    To identify factors associated with food insecurity in California women. The California Women's Health Survey is an ongoing annual telephone survey that collects data about health-related attitudes and behaviours from a randomly selected sample of women. Food insecurity of the women was measured by a 6-item subset of the Food Security Module. Statistical procedures included chi-square tests, t-tests, logistic regression analysis and analysis of covariance. California, USA. Four thousand and thirty-seven women (18 years or older). Prevalence of food insecurity was 25.7%. After controlling for income, factors associated with greater food insecurity were Hispanic or Black race/ethnicity; less than a 12th grade education; being unmarried; less than 55 years old; being Spanish-speaking; having spent less than half of one's life in the USA; sadness/depression; feeling overwhelmed; poor physical/mental health interfering with activities; and fair to poor general health. Among Food Stamp Program (FSP) participants, 71% were food-insecure. Among FSP-eligible women who had not applied for the programme, the prevalence of food insecurity was lower among women responding that they did not need food stamps than in women giving other reasons for not applying (23.9% vs. 66.9%, P < 0.001). Factors associated with food insecurity in FSP recipients included being unable to make food stamps last for 30 days, feeling overwhelmed, and having a birthplace in Mexico or Central America. Along with several socio-economic variables, poor physical and mental health is associated with food insecurity. Whether food insecurity is a cause or effect of poor health remains in question.

  12. Advancing the Use of Earth Observations to Benefit Global Food Security and Agriculture

    USDA-ARS?s Scientific Manuscript database

    USDA plays an important role as “fair broker” of information on the status and security of the United States and global food supply. USDA surveys and farmer relationships are the source of much of the “ground-truth” required for statistical assessments of crop area, yield, and production domestical...

  13. Problematic Sexual Behaviour in a Secure Psychiatric Setting: Challenges and Developing Solutions

    ERIC Educational Resources Information Center

    Hughes, Gareth V.; Hebb, Jo

    2005-01-01

    Sexually abusive behaviours are common in a forensic psychiatric population, both before admission and while hospitalized. A survey of our medium security facility found that 41% of patients had a history of sexually abusive behaviours, ranging from convictions for sexual assault through to current episodes of sexual harassment. Most forensic…

  14. Male Pregnancy Intendedness and Children's Mental Proficiency and Attachment Security during Toddlerhood

    ERIC Educational Resources Information Center

    Bronte-Tinkew, Jacinta; Scott, Mindy E.; Horowitz, Allison

    2009-01-01

    Using a sample of biological resident fathers and their children from the Early Childhood Longitudinal Study Birth Cohort (ECLS-B) 9- and 24-month surveys (N = 5,300), this study examines associations and the direct and indirect pathways through which men's pregnancy intentions influence toddlers' mental proficiency and attachment security.…

  15. Management of Library Security. SPEC Kit 247 and SPEC Flyer 247.

    ERIC Educational Resources Information Center

    Soete, George J., Comp.; Zimmerman, Glen, Comp.

    This SPEC (Systems and Procedures Exchange Center) Kit and Flyer reports results of a survey conducted in January 1999 that examined how ARL (Association of Research Libraries) member libraries assure the safety and security of persons, library materials, physical facilities, furnishings, computer equipment, etc. Forty-five of the 122 ARL member…

  16. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    ERIC Educational Resources Information Center

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  17. FARM LABOR MARKET DEVELOPMENT.

    ERIC Educational Resources Information Center

    Department of Labor, Washington, DC.

    PART ONE OF THE REPORT CONSISTED OF AN ANALYSIS OF TRENDS BETWEEN 1960 AND 1961 IN WAGES OF UNITED STATES FARM WORKERS IN MAJOR AREAS USING MEXICAN NATIONALS. THE DATA WERE DERIVED FROM PREVAILING-WAGE REPORTS RECEIVED BY THE BUREAU OF EMPLOYMENT SECURITY FROM AFFILIATED STATE EMPLOYMENT SECURITY AGENCIES. THE SURVEY RATES WERE USED BY THE…

  18. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  19. Looking beyond maternal sensitivity: mother-child correlates of attachment security among children with intellectual disabilities in urban India.

    PubMed

    John, Aesha; Morris, Amanda Sheffield; Halliburton, Amy L

    2012-11-01

    This study examined correlates of attachment security among children with intellectual disabilities in urban India. Survey and observational data were gathered from 47 children, mothers, and teachers on children's attachment security, adaptive functioning, and mother-child emotional availability. The data were analyzed to examine whether child emotional availability mediates the links between maternal emotional availability and child attachment security, and between child functioning and attachment security. The results supported full mediation, indicating that children's emotional availability was a primary mechanism through which maternal emotional availability and child functioning were linked to attachment security among children in our sample. The study findings are discussed in the context of implications for family interventions and research on socio-emotional development among children with intellectual disabilities.

  20. Mathematics for Drafting.

    ERIC Educational Resources Information Center

    Clary, Joseph R.; Nery, Karen P.

    This set of three modules was designed for use primarily to help teach and reinforce the basic mathematics skills in drafting classes. The modules are based on the needs of drafting students in beginning courses as determined by a survey of teachers across North Carolina. Each module consists of basic information and examples and problem sheets…

  1. Dynamic e-Learning Modules for Student Lecture Preparation

    ERIC Educational Resources Information Center

    McIntyre, Timothy; Wegener, Margaret; McGrath, Dominic

    2018-01-01

    We have developed and demonstrated the effectiveness of a set of online interactive learning modules to accompany physics courses at first- and second-year university levels. Students access the modules prior to attending lectures to familiarize themselves with content which is then discussed and reaffirmed in class. Student surveys and access…

  2. 78 FR 16837 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... listed under ``COMMERCE/ PAT-TM-20 Customer Call Center, Assistance and Satisfaction Survey Records... notices. The amended Privacy Act system of records notice, ``COMMERCE/PAT- TM-20 Customer Call Center... name: Customer Call Center, Assistance and Satisfaction Survey Records. Security classification...

  3. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    NASA Astrophysics Data System (ADS)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  4. The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.

    PubMed

    Shahri, Ahmad Bakhtiyari; Ismail, Zuraini; Mohanna, Shahram

    2016-11-01

    The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.

  5. Orion Underway Recovery Test 5 (URT-5)

    NASA Image and Video Library

    2016-10-26

    A test version of the Orion crew module is secured in the well deck of the USS San Diego for Underway Recovery Test 5 in the Pacific Ocean off the coast of California. In view is the winch system that will be used to help retrieve the crew module during a series of tests in open waters. NASA's Ground Systems Development and Operations Program and the U.S. Navy will practice retrieving and securing the crew module in the well deck of the ship using a set of tethers and the winch system to prepare for recovery of Orion on its return from deep space missions. The testing will allow the team to demonstrate and evaluate recovery processes, procedures, hardware and personnel in open waters. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and NASA's Journey to Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. Orion is scheduled to launch on NASA's Space Launch System in late 2018. For more information, visit http://www.nasa.gov/orion.

  6. Safety assessment of a home-based telecare system for adults with developmental disabilities in Indiana: a multi-stakeholder perspective.

    PubMed

    Brewer, Jeffrey L; Taber-Doughty, Teresa; Kubik, Sara

    2010-01-01

    We investigated the perceptions of people about the safety, security and privacy of a telecare monitoring system for adults with developmental disabilities living in residential settings. The telecare system was used by remote caregivers overnight, when staff were not present in the homes. We surveyed 127 people from different stakeholder groups in the state of Indiana. The people surveyed included those with knowledge or experience of telecare, and those without. The stakeholders were clients, their advocates, service provider administrators and independent case coordinators. The responses in each category for every group were positive except one: only 4 of the 11 telecare case coordinators agreed that the telecare system provided a secure environment. Overall, the telecare system was perceived to be as safe, secure and private as the conventional alternative of having staff in the home.

  7. Food Insecurity among American Indians and Alaska Natives: A National Profile using the Current Population Survey-Food Security Supplement.

    PubMed

    Jernigan, Valarie Blue Bird; Huyser, Kimberly R; Valdes, Jimmy; Simonds, Vanessa Watts

    2017-01-01

    Food insecurity increases the risk for obesity, diabetes, hypertension, and cancer-conditions highly prevalent among American Indians and Alaska Natives (AI/ANs). Using the Current Population Survey Food Security Supplement, we analyzed the food insecurity trends of AI/ANs compared to other racial and ethnic groups in the United States from 2000 to 2010. From 2000 to 2010, 25% of AI/ANs remained consistently food insecure and AI/ANs were twice as likely to be food insecure compared to whites. Urban AI/ANs were more likely to experience food insecurity than rural AI/ANs. Our findings highlight the need for national and tribal policies that expand food assistance programs; promote and support increased access to healthy foods and community food security, in both rural and urban areas; and reduce the burden of diet-related disparities on low-income and racial/ethnic minority populations.

  8. KSC-2012-3566

    NASA Image and Video Library

    2012-06-28

    CAPE CANAVERAL, Fla. - Secured inside a transportation container, the Orion crew module is moved through the open high-bay door to the Operations and Checkout Building at NASA's Kennedy Space Center in Florida. Slated for Exploration Flight Test-1, an uncrewed mission planned for 2014, the capsule will travel farther into space than any human spacecraft has gone in more than 40 years. NASA's Michoud Assembly Facility in New Orleans built the crew module pressure vessel. The Orion production team will prepare the module for flight by installing heat-shielding thermal protection systems, avionics and other subsystems. For more information, visit http://www.nasa.gov/orion. Photo credit: NASA/Jim Grossmann

  9. KSC-2012-3568

    NASA Image and Video Library

    2012-06-28

    CAPE CANAVERAL, Fla. - At NASA's Kennedy Space Center in Florida, workers inside the Operations and Checkout Building high bay prepare to lift the Orion crew module, secured inside the transportation container at left. Slated for Exploration Flight Test-1, an uncrewed mission planned for 2014, the capsule will travel farther into space than any human spacecraft has gone in more than 40 years. NASA's Michoud Assembly Facility in New Orleans built the crew module pressure vessel. The Orion production team will prepare the module for flight by installing heat-shielding thermal protection systems, avionics and other subsystems. For more information, visit http://www.nasa.gov/orion. Photo credit: NASA/Charisse Nahser

  10. Measurement of the dimensions of food insecurity in developed countries: a systematic literature review.

    PubMed

    Ashby, Stephanie; Kleve, Suzanne; McKechnie, Rebecca; Palermo, Claire

    2016-11-01

    Food insecurity is a salient health issue comprised of four dimensions - food access, availability, utilization and stability over time. The aim of the present study was to conduct a systematic literature review to identify all multi-item tools that measure food insecurity and explore which of the dimensions they assess. Five databases were searched (CENTRAL, CINAHL plus, EMBASE, MEDLINE, TRIP) for studies published in English since 1999. Inclusion criteria included human studies using multi-item tools to measure food security and studies conducted in developed countries. Manuscripts describing the US Department of Agriculture Food Security Survey Module, that measures 'food access', were excluded due to wide acceptance of the validity and reliability of this instrument. Two authors extracted data and assessed the quality of the included studies. Data were summarized against the dimensions of food insecurity. A systematic review of the literature. The majority of tools were developed in the USA and had been used in different age groups and cultures. Eight multi-item tools were identified. All of the tools assessed the 'food access' dimension and two partially assessed the dimensions 'food utilization' and 'stability over time', respectively. 'Food availability' was not assessed by existing tools. Current tools available for measuring food insecurity are subjective, limited in scope, with a majority assessing only one dimension of food insecurity (access). To more accurately assess the true burden of food insecurity, tools should be adapted or developed to assess all four dimensions of food insecurity.

  11. Experiences of Latino immigrant families in North Carolina help explain elevated levels of food insecurity and hunger.

    PubMed

    Quandt, Sara A; Shoaf, John I; Tapia, Janeth; Hernández-Pelletier, Mercedes; Clark, Heather M; Arcury, Thomas A

    2006-10-01

    Household food insecurity is higher among minority households in the U.S., but few data exist on households of recent minority immigrants, in part because such households are difficult to sample. Four studies of a total of 317 Latino immigrant families were conducted in different regions and during different seasons in North Carolina. A Spanish translation of the 18-item U.S. Food Security Survey Module was used to assess the prevalence of food insecurity and hunger. In 3 of the studies, a total of 76 in-depth interviews were conducted to gather information on immigrants' experiences of food insecurity. Households in the 4 studies classified as food secure ranged from 28.7 to 50.9%, compared with 82.4% in the U.S. in 2004. Food insecurity without hunger ranged from 35.6% to 41.8%, compared with 13.3% in the U.S. The highest rates of hunger reported were 18.8% (moderate hunger) and 16.8% (severe hunger) in an urban sample. Qualitative data indicate that food insecurity has both quantitative and qualitative effects on diet. Immigrants experience adverse psychological effects of food insecurity. They report experiencing a period of adjustment to food insecurity leading to empowerment to resolve the situation. Reactions to food insecurity differ from those reported by others, possibly because immigrants encounter a new and not chronic situation. Overall, these findings suggest that immigrant Latinos experience significant levels of food insecurity that are not addressed by current governmental programs.

  12. Automating Small Libraries.

    ERIC Educational Resources Information Center

    Swan, James

    1996-01-01

    Presents a four-phase plan for small libraries strategizing for automation: inventory and weeding, data conversion, implementation, and enhancements. Other topics include selecting a system, MARC records, compatibility, ease of use, industry standards, searching capabilities, support services, system security, screen displays, circulation modules,…

  13. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ...), assembly, transponder key amplifier, security indicator, ignition key and Electronic control module (ECM... been verified, the immobilizer allows the ECM to start the engine. Toyota also stated that there will...

  14. Microcomputer-Based Acquisitions.

    ERIC Educational Resources Information Center

    Desmarais, Norman

    1986-01-01

    This discussion of three automated acquisitions systems--Bib-Base/Acq, The Book Trak Ordering System, and Card Datalog Acquisitions Module--covers searching and updating, editing, acquisitions functions and statistics, purchase orders and order file, budgeting and accounts maintenance, defining parameters, documentation, security, printing, and…

  15. Spatial Data from Transportation Studies and Surveys | Transportation

    Science.gov Websites

    transportation studies and surveys, submit an application for approval to connect to a restricted secure portal environment. For a list of studies and surveys, see cleansed data. Application Process For accessing spatial data, learn about the application and approval process. If you'd like to apply to access the spatial

  16. Social Media Use of Cooperative Extension Family Economics Educators: Online Survey Results and Implications

    ERIC Educational Resources Information Center

    O'Neill, Barbara; Zumwalt, Andrew; Bechman, Janet

    2011-01-01

    This article describes results of an online survey conducted by the eXtension Financial Security for All (FSA) Community of Practice (CoP) to determine the social media capacity and activity of its members. The survey was conducted to inform two subsequent FSA CoP programs: an archived webinar on social media programs and impact evaluation methods…

  17. Does employment security modify the effect of housing affordability on mental health?

    PubMed

    Bentley, Rebecca; Baker, Emma; LaMontagne, Anthony; King, Tania; Mason, Kate; Kavanagh, Anne

    2016-12-01

    This paper uses longitudinal data to examine the interrelationship between two central social determinants of mental health - employment security and housing affordability. Data from ten annual waves of the longitudinal Household, Income and Labour Dynamics in Australia (HILDA) survey (which commenced in 2000/1 and is ongoing) were analysed using fixed-effects longitudinal linear regression. Change in the SF-36 Mental Component Summary (MCS) score of working age individuals (25-64 years) (51,885 observations of 10,776 people), associated with changes in housing affordability was examined. Models were adjusted for income, age, survey year, experience of serious injury/illness and separation/divorce. We tested for an additive interaction between the security of a household's employment arrangements and housing affordability. People in insecurely employed households appear more vulnerable than people in securely employed households to negative mental health effects of housing becoming unaffordable. In adjusted models, people in insecurely employed households whose housing became unaffordable experienced a decline in mental health (B=-1.06, 95% CI -1.75 to -0.38) while people in securely employed households experienced no difference on average. To progress our understanding of the Social Determinants of Health this analysis provides evidence of the need to bridge the (largely artificial) separation of social determinants, and understand how they are related.

  18. Food insecurity and food consumption by season in households with children in an Arctic city: a cross-sectional study.

    PubMed

    Huet, Catherine; Ford, James D; Edge, Victoria L; Shirley, Jamal; King, Nia; Harper, Sherilee L

    2017-06-15

    High rates of food insecurity are documented among Inuit households in Canada; however, data on food insecurity prevalence and seasonality for Inuit households with children are lacking, especially in city centres. This project: (1) compared food consumption patterns for households with and without children, (2) compared the prevalence of food insecurity for households with and without children, (3) compared food consumption patterns and food insecurity prevalence between seasons, and (4) identified factors associated with food insecurity in households with children in Iqaluit, Nunavut, Canada. Randomly selected households were surveyed in Iqaluit in September 2012 and May 2013. Household food security status was determined using an adapted United States Department of Agriculture Household Food Security Survey Module. Univariable logistic regressions were used to examine unconditional associations between food security status and demographics, socioeconomics, frequency of food consumption, and method of food preparation in households with children by season. Households with children (n = 431) and without children (n = 468) participated in the survey. Food insecurity was identified in 32.9% (95% CI: 28.5-37.4%) of households with children; this was significantly higher than in households without children (23.2%, 95% CI: 19.4-27.1%). The prevalence of household food insecurity did not significantly differ by season. Demographic and socioeconomic characteristics of the person responsible for food preparation, including low formal education attainment (OR Sept  = 4.3, 95% CI: 2.3-8.0; OR May  = 3.2, 95% CI: 1.8-5.8), unemployment (OR Sept  = 1.1, 95% CI: 1.1-1.3; OR May  = 1.3, 95% CI: 1.1-1.5), and Inuit identity (OR Sept  = 8.9, 95% CI: 3.4-23.5; OR May  = 21.8, 95% CI: 6.6-72.4), were associated with increased odds of food insecurity in households with children. Fruit and vegetable consumption (OR Sept  = 0.4, 95% CI: 0.2-0.8; OR May  = 0.5, 95% CI: 0.2-0.9), as well as eating cooked (OR Sept  = 0.5, 95% CI: 0.3-1.0; OR May  = 0.5, 95% CI: 0.3-0.9) and raw (OR Sept  = 1.7, 95% CI: 0.9-3.0; OR May  = 1.8, 95% CI: 1.0-3.1) fish were associated with decreased odds of food insecurity among households with children, while eating frozen meat and/or fish (OR Sept  = 2.6, 95% CI: 1.4-5.0; OR May  = 2.0, 95% CI: 1.1-3.7) was associated with increased odds of food insecurity. Food insecurity is high among households with children in Iqaluit. Despite the partial subsistence livelihoods of many Inuit in the city, we found no seasonal differences in food security and food consumption for households with children. Interventions aiming to decrease food insecurity in these households should consider food consumption habits, and the reported demographic and socioeconomic determinants of food insecurity.

  19. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  20. A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment

    NASA Astrophysics Data System (ADS)

    Ula, M.; Ula, M.; Fuadi, W.

    2017-02-01

    As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.

  1. CTEPP STANDARD OPERATING PROCEDURE FOR RECORDING DATA COLLECTION FORMS (SOP-2.22)

    EPA Science Inventory

    This SOP describes the method for recording information onto the data collection forms. The data collection forms are organized into 10 modules: Recruitment Survey; House/Building Characteristics Observation Survey; Day Care Center/Building Characteristics Observation Survey; Par...

  2. Food Insecurity and Health Care Expenditures in the United States, 2011-2013.

    PubMed

    Berkowitz, Seth A; Basu, Sanjay; Meigs, James B; Seligman, Hilary K

    2018-06-01

    To determine whether food insecurity, limited or uncertain food access owing to cost, is associated with greater health care expenditures. Nationally representative sample of the civilian noninstitutionalized population of the United States (2011 National Health Interview Survey [NHIS] linked to 2012-2013 Medication Expenditure Panel Survey [MEPS]). Longitudinal retrospective cohort. A total of 16,663 individuals underwent assessment of food insecurity, using the 10-item adult 30-day food security module, in the 2011 NHIS. Their total health care expenditures in 2012 and 2013 were recorded in MEPS. Expenditure data were analyzed using zero-inflated negative binomial regression and adjusted for age, gender, race/ethnicity, education, income, insurance, and residence area. Fourteen percent of individuals reported food insecurity, representing 41,616,255 Americans. Mean annualized total expenditures were $4,113 (standard error $115); 9.2 percent of all individuals had no health care expenditures. In multivariable analyses, those with food insecurity had significantly greater estimated mean annualized health care expenditures ($6,072 vs. $4,208, p < .0001), an extra $1,863 in health care expenditure per year, or $77.5 billion in additional health care expenditure annually. Food insecurity was associated with greater subsequent health care expenditures. Future studies should determine whether food insecurity interventions can improve health and reduce health care costs. © Health Research and Educational Trust.

  3. 46 CFR 189.40-5 - Notice and plans required.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS INSPECTION... examination, or underwater survey or whenever repairs are made to the vessel's hull. (c) Each barge that holds... barge undergoes a drydock examination, internal structural examination, or underwater survey or whenever...

  4. 46 CFR 189.40-5 - Notice and plans required.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS INSPECTION... examination, or underwater survey or whenever repairs are made to the vessel's hull. (c) Each barge that holds... barge undergoes a drydock examination, internal structural examination, or underwater survey or whenever...

  5. 46 CFR 189.40-5 - Notice and plans required.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS INSPECTION... examination, or underwater survey or whenever repairs are made to the vessel's hull. (c) Each barge that holds... barge undergoes a drydock examination, internal structural examination, or underwater survey or whenever...

  6. 46 CFR 189.40-5 - Notice and plans required.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS INSPECTION... examination, or underwater survey or whenever repairs are made to the vessel's hull. (c) Each barge that holds... barge undergoes a drydock examination, internal structural examination, or underwater survey or whenever...

  7. 46 CFR 189.40-5 - Notice and plans required.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS INSPECTION... examination, or underwater survey or whenever repairs are made to the vessel's hull. (c) Each barge that holds... barge undergoes a drydock examination, internal structural examination, or underwater survey or whenever...

  8. NOAA's National Geodetic Survey Utilization of Aerial Sensors for Emergency Response Efforts

    NASA Technical Reports Server (NTRS)

    White, Stephen

    2007-01-01

    Remote Sensing Division has a Coastal Mapping program and a Airport Survey program and research and development that support both programs. NOAA/NGS/RSD plans to acquire remotely sensed data to support the agency's homeland security and emergency response requirements.

  9. Via generalized function projective synchronization in nonlinear Schrödinger equation for secure communication

    NASA Astrophysics Data System (ADS)

    Zhao, L. W.; Du, J. G.; Yin, J. L.

    2018-05-01

    This paper proposes a novel secured communication scheme in a chaotic system by applying generalized function projective synchronization of the nonlinear Schrödinger equation. This phenomenal approach guarantees a secured and convenient communication. Our study applied the Melnikov theorem with an active control strategy to suppress chaos in the system. The transmitted information signal is modulated into the parameter of the nonlinear Schrödinger equation in the transmitter and it is assumed that the parameter of the receiver system is unknown. Based on the Lyapunov stability theory and the adaptive control technique, the controllers are designed to make two identical nonlinear Schrödinger equation with the unknown parameter asymptotically synchronized. The numerical simulation results of our study confirmed the validity, effectiveness and the feasibility of the proposed novel synchronization method and error estimate for a secure communication. The Chaos masking signals of the information communication scheme, further guaranteed a safer and secured information communicated via this approach.

  10. SecureCPS: Defending a nanosatellite cyber-physical system

    NASA Astrophysics Data System (ADS)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  11. Orion EM-1 Crew Module Structural Test Article Move to Birdcage

    NASA Image and Video Library

    2016-11-16

    Inside the Neil Armstrong Operations and Checkout Building at NASA’s Kennedy Space Center in Florida, the Orion crew module structural test article (STA) is secured on a test tool called the birdcage. The STA arrived aboard NASA's Super Guppy aircraft at the Shuttle Landing Facility operated by Space Florida. The test article will undergo further testing in the high bay. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission, in late 2018.

  12. A profile of social security child beneficiaries and their families: sociodemographic and economic characteristics.

    PubMed

    Tamborini, Christopher R; Cupito, Emily; Shoffner, Dave

    2011-01-01

    Using a rich dataset that links the Census Bureau's Survey of Income and Program Participation calendar-year 2004 file with Social Security benefit records, this article provides a portrait of the sociodemographic and economic characteristics of Social Security child beneficiaries. We find that the incidence ofbenefit receipt in the child population differs substantially across individual and family-level characteristics. Average benefit amounts also vary across subgroups and benefit types. The findings provide a better understanding of the importance of Social Security to families with beneficiary children. Social Security is a major source of family income for many child beneficiaries, particularly among those with low income or family heads with lower education and labor earnings.

  13. Statistical Models for Predicting Threat Detection From Human Behavior

    PubMed Central

    Kelley, Timothy; Amon, Mary J.; Bertenthal, Bennett I.

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking. PMID:29713296

  14. Practical challenges in quantum key distribution

    DOE PAGES

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...

    2016-11-08

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  15. A License to Produce? Farmer Interpretations of the New Food Security Agenda

    ERIC Educational Resources Information Center

    Fish, Rob; Lobley, Matt; Winter, Michael

    2013-01-01

    Drawing on the findings of empirical research conducted in the South West of England, this paper explores how farmers make sense of re-emerging imperatives for "food security" in UK policy and political discourse. The analysis presented is based on two types of empirical inquiry. First, an extensive survey of 1543 farmers, exploring the…

  16. 78 FR 31472 - Medicare and Medicaid Programs; Survey, Certification and Enforcement Procedures; Extension of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...). These revisions would implement certain provisions under the Medicare Improvements for Patients and... with the Social Security Act. The comment period for the proposed rule, which would have ended on June... Stop C4-26-05, 7500 Security Boulevard, Baltimore, MD 21244-1850. 4. By hand or courier. If you prefer...

  17. McDonald and Company Securities Library User Survey, 1996.

    ERIC Educational Resources Information Center

    Wolfgram, Derek E.

    The library of McDonald and Company Securities is important to the success of the business and its employees. This study assesses the needs and expectations of the library users, and analyzes how well the current library services are meeting those needs and expectations. A questionnaire was distributed to a large random sample of the firm's…

  18. Practical challenges in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  19. Transportation Secure Data Center | NREL

    Science.gov Websites

    Data Center The Transportation Secure Data Center (TSDC) provides free access to detailed transportation data from a variety of travel surveys and studies. Data include global positioning system (GPS demographics. Learn more about the TSDC. Cleansed Data by State and Region Use the map to access cleansed data

  20. An Agile Enterprise Regulation Architecture for Health Information Security Management

    PubMed Central

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

Top