Cross-layer shared protection strategy towards data plane in software defined optical networks
NASA Astrophysics Data System (ADS)
Xiong, Yu; Li, Zhiqiang; Zhou, Bin; Dong, Xiancun
2018-04-01
In order to ensure reliable data transmission on the data plane and minimize resource consumption, a novel protection strategy towards data plane is proposed in software defined optical networks (SDON). Firstly, we establish a SDON architecture with hierarchical structure of data plane, which divides the data plane into four layers for getting fine-grained bandwidth resource. Then, we design the cross-layer routing and resource allocation based on this network architecture. Through jointly considering the bandwidth resource on all the layers, the SDN controller could allocate bandwidth resource to working path and backup path in an economical manner. Next, we construct auxiliary graphs and transform the shared protection problem into the graph vertex coloring problem. Therefore, the resource consumption on backup paths can be reduced further. The simulation results demonstrate that the proposed protection strategy can achieve lower protection overhead and higher resource utilization ratio.
Benefit of adaptive FEC in shared backup path protected elastic optical network.
Guo, Hong; Dai, Hua; Wang, Chao; Li, Yongcheng; Bose, Sanjay K; Shen, Gangxiang
2015-07-27
We apply an adaptive forward error correction (FEC) allocation strategy to an Elastic Optical Network (EON) operated with shared backup path protection (SBPP). To maximize the protected network capacity that can be carried, an Integer Linear Programing (ILP) model and a spectrum window plane (SWP)-based heuristic algorithm are developed. Simulation results show that the FEC coding overhead required by the adaptive FEC scheme is significantly lower than that needed by a fixed FEC allocation strategy resulting in higher network capacity for the adaptive strategy. The adaptive FEC allocation strategy can also significantly outperform the fixed FEC allocation strategy both in terms of the spare capacity redundancy and the average FEC coding overhead needed per optical channel. The proposed heuristic algorithm is efficient and not only performs closer to the ILP model but also does much better than the shortest-path algorithm.
Heuristic approaches for energy-efficient shared restoration in WDM networks
NASA Astrophysics Data System (ADS)
Alilou, Shahab
In recent years, there has been ongoing research on the design of energy-efficient Wavelength Division Multiplexing (WDM) networks. The explosive growth of Internet traffic has led to increased power consumption of network components. Network survivability has also been a relevant research topic, as it plays a crucial role in assuring continuity of service with no disruption, regardless of network component failure. Network survivability mechanisms tend to utilize considerable resources such as spare capacity in order to protect and restore information. This thesis investigates techniques for reducing energy demand and enhancing energy efficiency in the context of network survivability. We propose two novel heuristic energy-efficient shared protection approaches for WDM networks. These approaches intend to save energy by setting on sleep mode devices that are not being used while providing shared backup paths to satisfy network survivability. The first approach exploits properties of a math series in order to assign weight to the network links. It aims at reducing power consumption at the network indirectly by aggregating traffic on a set of nodes and links with high traffic load level. Routing traffic on links and nodes that are already under utilization makes it possible for the links and nodes with no load to be set on sleep mode. The second approach is intended to dynamically route traffic through nodes and links with high traffic load level. Similar to the first approach, this approach computes a pair of paths for every newly arrived demand. It computes these paths for every new demand by comparing the power consumption of nodes and links in the network before the demand arrives with their potential power consumption if they are chosen along the paths of this demand. Simulations of two different networks were used to compare the total network power consumption obtained using the proposed techniques against a standard shared-path restoration scheme. Shared-path restoration is a network survivability method in which a link-disjoint backup path and wavelength is reserved at the time of call setup for a working path. However, in order to reduce spare capacity consumption, this reserved backup path and wavelength may be shared with other backup paths. Pool Sharing Scheme (PSS) is employed to implement shared-path restoration scheme [1]. In an optical network, the failure of a single link leads to the failure of all the lightpaths that pass through that particular link. PSS ensures that the amount of backup bandwidth required on a link to restore the failed connections will not be more than the total amount of reserved backup bandwidth on that link. Simulation results indicate that the proposed approaches lead to up to 35% power savings in WDM networks when traffic load is low. However, power saving decreases to 14% at high traffic load level. Furthermore, in terms of the total capacity consumption for working paths, PSS outperforms the two proposed approaches, as expected. In terms of total capacity consumption all the approaches behave similarly. In general, at low traffic load level, the two proposed approaches behave similar to PSS in terms of average link load, and the ratio of block demands. Nevertheless, at high traffic load, the proposed approaches result in higher ratio of blocked demands than PSS. They also lead to higher average link load than PSS for the equal number of generated demands.
Wall, Stephen P; Lee, David C; Frangos, Spiros G; Sethi, Monica; Heyer, Jessica H; Ayoung-Chee, Patricia; DiMaggio, Charles J
2016-01-01
We conducted individual and ecologic analyses of prospectively collected data from 839 injured bicyclists who collided with motorized vehicles and presented to Bellevue Hospital, an urban Level-1 trauma center in New York City, from December 2008 to August 2014. Variables included demographics, scene information, rider behaviors, bicycle route availability, and whether the collision occurred before the road segment was converted to a bicycle route. We used negative binomial modeling to assess the risk of injury occurrence following bicycle path or lane implementation. We dichotomized U.S. National Trauma Data Bank Injury Severity Scores (ISS) into none/mild (0-8) versus moderate, severe, or critical (>8) and used adjusted multivariable logistic regression to model the association of ISS with collision proximity to sharrows (i.e., bicycle lanes designated for sharing with cars), painted bicycle lanes, or physically protected paths. Negative binomial modeling of monthly counts, while adjusting for pedestrian activity, revealed that physically protected paths were associated with 23% fewer injuries. Painted bicycle lanes reduced injury risk by nearly 90% (IDR 0.09, 95% CI 0.02-0.33). Holding all else equal, compared to no bicycle route, a bicycle injury nearby sharrows was nearly twice as likely to be moderate, severe, or critical (adjusted odds ratio 1.94; 95% confidence interval (CI) 0.91-4.15). Painted bicycle lanes and physically protected paths were 1.52 (95% CI 0.85-2.71) and 1.66 (95% CI 0.85-3.22) times as likely to be associated with more than mild injury respectively.
A Method to Analyze and Optimize the Load Sharing of Split Path Transmissions
NASA Technical Reports Server (NTRS)
Krantz, Timothy L.
1996-01-01
Split-path transmissions are promising alternatives to the common planetary transmissions for rotorcraft. Heretofore, split-path designs proposed for or used in rotorcraft have featured load-sharing devices that add undesirable weight and complexity to the designs. A method was developed to analyze and optimize the load sharing in split-path transmissions without load-sharing devices. The method uses the clocking angle as a design parameter to optimize for equal load sharing. In addition, the clocking angle tolerance necessary to maintain acceptable load sharing can be calculated. The method evaluates the effects of gear-shaft twisting and bending, tooth bending, Hertzian deformations within bearings, and movement of bearing supports on load sharing. It was used to study the NASA split-path test gearbox and the U.S. Army's Comanche helicopter main rotor gearbox. Acceptable load sharing was found to be achievable and maintainable by using proven manufacturing processes. The analytical results compare favorably to available experimental data.
NASA Astrophysics Data System (ADS)
Yadav, Dharmendra Singh; Babu, Sarath; Manoj, B. S.
2018-03-01
Spectrum conflict during primary and backup routes assignment in elastic optical networks results in increased resource consumption as well as high Bandwidth Blocking Probability. In order to avoid such conflicts, we propose a new scheme, Quasi Path Restoration (QPR), where we divide the available spectrum into two: (1) primary spectrum (for primary routes allocation) and (2) backup spectrum (for rerouting the data on link failures). QPR exhibits three advantages over existing survivable strategies such as Shared Path Protection (SPP), Primary First Fit Backup Last Fit (PFFBLF), Jointly Releasing and re-establishment Defragmentation SPP (JRDSSPP), and Path Restoration (PR): (1) the conflict between primary and backup spectrum during route assignment is completely eliminated, (2) upon a link failure, connection recovery requires less backup resources compared to SPP, PFFBLF, and PR, and (3) availability of the same backup spectrum on each link improves the recovery guarantee. The performance of our scheme is analyzed with different primary backup spectrum partitions on varying connection-request demands and number of frequency slots. Our results show that QPR provides better connection recovery guarantee and Backup Resources Utilization (BRU) compared to bandwidth recovery of PR strategy. In addition, we compare QPR with Shared Path Protection and Primary First-Fit Backup Last Fit strategies in terms of Bandwidth Blocking Probability (BBP) and average frequency slots per connection request. Simulation results show that BBP of SPP, PFFBLF, and JRDSPP varies between 18.59% and 14.42%, while in QPR, BBP ranges from 2.55% to 17.76% for Cost239, NSFNET, and ARPANET topologies. Also, QPR provides bandwidth recovery between 93.61% and 100%, while in PR, the recovery ranges from 86.81% to 98.99%. It is evident from our analysis that QPR provides a reasonable trade-off between bandwidth blocking probability and connection recoverability.
NASA Technical Reports Server (NTRS)
Johnson, James E.; Conley, Cassie; Siegel, Bette
2015-01-01
As systems, technologies, and plans for the human exploration of Mars and other destinations beyond low Earth orbit begin to coalesce, it is imperative that frequent and early consideration is given to how planetary protection practices and policy will be upheld. While the development of formal planetary protection requirements for future human space systems and operations may still be a few years from fruition, guidance to appropriately influence mission and system design will be needed soon to avoid costly design and operational changes. The path to constructing such requirements is a journey that espouses key systems engineering practices of understanding shared goals, objectives and concerns, identifying key stakeholders, and iterating a draft requirement set to gain community consensus. This paper traces through each of these practices, beginning with a literature review of nearly three decades of publications addressing planetary protection concerns with respect to human exploration. Key goals, objectives and concerns, particularly with respect to notional requirements, required studies and research, and technology development needs have been compiled and categorized to provide a current 'state of knowledge'. This information, combined with the identification of key stakeholders in upholding planetary protection concerns for human missions, has yielded a draft requirement set that might feed future iteration among space system designers, exploration scientists, and the mission operations community. Combining the information collected with a proposed forward path will hopefully yield a mutually agreeable set of timely, verifiable, and practical requirements for human space exploration that will uphold international commitment to planetary protection.
Experimental Study of Split-Path Transmission Load Sharing
NASA Technical Reports Server (NTRS)
Krantz, Timothy L.; Delgado, Irebert R.
1996-01-01
Split-path transmissions are promising, attractive alternatives to the common planetary transmissions for helicopters. The split-path design offers two parallel paths for transmitting torque from the engine to the rotor. Ideally, the transmitted torque is shared equally between the two load paths; however, because of manufacturing tolerances, the design must be sized to allow for other than equal load sharing. To study the effect of tolerances, experiments were conducted using the NASA split-path test gearbox. Two gearboxes, nominally identical except for manufacturing tolerances, were tested. The clocking angle was considered to be a design parameter and used to adjust the load sharing of an otherwise fixed design. The torque carried in each path was measured for a matrix of input torques and clocking angles. The data were used to determine the optimal value and a tolerance for the clocking angles such that the most heavily loaded split path carried no greater than 53 percent of an input shaft torque of 367 N-m. The range of clocking angles satisfying this condition was -0.0012 +/- 0.0007 rad for box 1 and -0.0023 +/- 0.0009 rad for box 2. This study indicates that split-path gearboxes can be used successfully in rotorcraft and can be manufactured with existing technology.
Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility.
Smith, Kenneth; Jajodia, Sushil; Swarup, Vipin; Hoyt, Jeffrey; Hamilton, Gail; Faatz, Donald; Cornett, Todd
2004-08-01
The sharing of neuroimagery data offers great benefits to science, however, data owners sharing their data face substantial custodial responsibilities, such as ensuring data sets are correctly interpreted in their new shared context, protecting the identity and privacy of human research participants, and safeguarding the understood order of use. Given choices of sharing widely or not at all, the result will often be no sharing, due to the inability of data owners to control their exposure to the risks associated with data sharing. In this context, data sharing is enabled by providing data owners with well-defined intermediate levels of data visibility, progressing incrementally toward public visibility. In this paper, we define a novel and general data sharing model, Structured Sharing Communities (SSC), meeting this requirement. Arbitrary visibility levels representing collaborative agreements, consortium memberships, research organizations, and other affiliations are structured into a policy space through explicit paths of permissible information flow. Operations enable users and applications to manage the visibility of data and enforce access permissions and restrictions. We show how a policy space can be implemented in realistic neuroinformatic architectures with acceptable assurance of correctness, and briefly describe an open source implementation effort.
The impact of environmental factors on cycling speed on shared paths.
Boufous, Soufiane; Hatfield, Julie; Grzebieta, Raphael
2018-01-01
Despite the importance of cycling speed on shared paths to the amenity and safety of users, few studies have systematically measured it, nor examined circumstances surrounding it. Speed was measured for 5421 riders who were observed cycling on shared paths across 12 metropolitan and regional locations in Sydney, Australia. Multivariate regression analysis was carried out to examine rider and environmental factors that contribute to riders cycling above the median speed. The study found that observed riders travelled at a median speed of 16km/h (mean 18.4km/h). Nearly 80% of riders travelled at 20km/h or less and 7.8% at speeds of more than 30km/h. Riders were significantly less likely to cycle above the median speed on shared paths that had an average volume of over 20 pedestrians/hour. Riders were significantly more likely to travel above the median speed on paths that had a centreline (OR: 1.71, 95% CI: 1.41-2.07), on wider paths (over 3.5m) (OR: 1.34, 95% CI: 1.12-1.59) and on paths with visual segregation between cyclists and pedestrians. Visual segregation, where cycling and walking areas are differentiated by the type of material or by paint colour used, was the strongest predictor of travelling above median speed on shared paths (OR: 3.9, 95% CI: 3.1-4.8). The findings suggest that riders adjust their speeds to accommodate pedestrians and path conditions. Path characteristics that support separation from pedestrians may allow relatively higher speeds, and associated amenity, without substantial loss of safety. Copyright © 2017 Elsevier Ltd. All rights reserved.
Symbiotic Navigation in Multi-Robot Systems with Remote Obstacle Knowledge Sharing
Ravankar, Abhijeet; Ravankar, Ankit A.; Kobayashi, Yukinori; Emaru, Takanori
2017-01-01
Large scale operational areas often require multiple service robots for coverage and task parallelism. In such scenarios, each robot keeps its individual map of the environment and serves specific areas of the map at different times. We propose a knowledge sharing mechanism for multiple robots in which one robot can inform other robots about the changes in map, like path blockage, or new static obstacles, encountered at specific areas of the map. This symbiotic information sharing allows the robots to update remote areas of the map without having to explicitly navigate those areas, and plan efficient paths. A node representation of paths is presented for seamless sharing of blocked path information. The transience of obstacles is modeled to track obstacles which might have been removed. A lazy information update scheme is presented in which only relevant information affecting the current task is updated for efficiency. The advantages of the proposed method for path planning are discussed against traditional method with experimental results in both simulation and real environments. PMID:28678193
Maroli, Malena; Vadell, María Victoria; Iglesias, Ayelén; Padula, Paula Julieta; Gómez Villafañe, Isabel Elisa
2015-09-01
Abundance, distribution, movement patterns, and habitat selection of a reservoir species influence the dispersal of zoonotic pathogens, and hence, the risk for humans. Movements and microhabitat use of rodent species, and their potential role in the transmission of hantavirus were studied in Otamendi Natural Reserve, Buenos Aires, Argentina. Movement estimators and qualitative characteristics of rodent paths were determined by means of a spool and line device method. Sampling was conducted during November and December 2011, and March, April, June, October, and December 2012. Forty-six Oxymycterus rufus, 41 Akodon azarae, 10 Scapteromys aquaticus and 5 Oligoryzomys flavescens were captured. Movement patterns and distances varied according to sex, habitat type, reproductive season, and body size among species. O. flavescens, reservoir of the etiologic agent of hantavirus pulmonary syndrome in the region, moved short distances, had the most linear paths and did not share paths with other species. A. azarae had an intermediate linearity index, its movements were longer in the highland grassland than in the lowland marsh and the salty grassland, and larger individuals traveled longer distances. O. rufus had the most tortuous paths and the males moved more during the non-breeding season. S. aquaticus movements were associated with habitat type with longer distances traveled in the lowland marsh than in the salty grassland. Hantavirus antibodies were detected in 20% of A. azarae and were not detected in any other species. Seropositive individuals were captured during the breeding season and 85% of them were males. A. azarae moved randomly and shared paths with all the other species, which could promote hantavirus spillover events.
... Boolean useRights, FileShare share, Int32 bufferSize, FileOptions options, SECURITY_ATTRIBUTES secAttrs, String msgPath, Boolean bFromProxy) at System.IO.FileStream..ctor(String path, FileMode mode, FileAccess ...
Evaluation of Safety, Design, and Operation of Shared-Use Paths
DOT National Transportation Integrated Search
2006-03-01
This TechBrief summarizes the final report of the same title (FHWA-HRT-05-137). Shared-use paths are paved, off-street travelways that serve bicyclists, pedestrians, and other nonmotorized modes of travel. The Federal Highway Administration (FHWA) ha...
76 FR 17064 - Shared Use Path Accessibility Guidelines
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... industry professionals regarding matters covered in this notice. In particular, the Board invites comments... shared use path surfaces, either light-on-dark or dark-on-light. Size. Detectable warning surfaces shall... information on any additional areas that should be addressed in the guidelines. Regulatory Process Matters The...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Redman, R.S.; Rodriguez, R.J.; Clifton, D.R.
1999-02-01
A nonpathogenic mutant of Colletotrichum magna (path-1) was previously shown to protect watermelon (Citrullus lanatus) and cucumber (Cucumis sativus) seedlings from anthracnose disease elicited by wild-type C. magna. Disease protection was observed in stems of path-1-colonized cucurbits but not in cotyledons, indicating that path-1 conferred tissue-specific and/or localized protection. Plant biochemical indicators of a localized and systemic (peroxidase, phenylalanine ammonia-lyase, lignin, and salicylic acid) plant-defense response were investigated in anthracnose-resistant and-susceptible cultivars of cucurbit seedlings exposed to four treatments: (1) water (control), (2) path-1 conidia, (3) wild-type conidia, and (4) challenge conditions (inoculation into path-1 conidia for 48 h andmore » then exposure to wild-type conidia). Collectively, these analyses indicated that disease protection in path-1-colonized plants was correlated with the ability of these plants to mount a defense response more rapidly and to equal or greater levels than plants exposed to wild-type C. magna alone. Watermelon plants colonized with path-1 were also protected against disease caused by Colletotrichum orbiculare and Fusarium oxysporum. A model based on the kinetics of plant-defense activation is presented to explain the mechanism of path-1-conferred disease protection.« less
Redman, R.S.; Freeman, S.; Clifton, D.R.; Morrel, J.; Brown, G.; Rodriguez, R.J.
1999-01-01
A nonpathogenic mutant of Colletotrichum magna (path-1) was previously shown to protect watermelon (Citrullus lanatus) and cucumber (Cucumis sativus) seedlings from anthracnose disease elicited by wild-type C. magna. Disease protection was observed in stems of path-1-colonized cucurbits but not in cotyledons, indicating that path-1 conferred tissue-specific and/or localized protection. Plant biochemical indicators of a localized and systemic (peroxidase, phenylalanine ammonia-lyase, lignin, and salicylic acid) 'plant-defense' response were investigated in anthracnose-resistant and -susceptible cultivars of cucurbit seedlings exposed to four treatments: (1) water (control), (2) path-1 conidia, (3) wild-type conidia, and (4) challenge conditions (inoculation into path-1 conidia for 48 h and then exposure to wild-type conidia). Collectively, these analyses indicated that disease protection in path-1 colonized plants was correlated with the ability of these plants to mount a defense response more rapidly and to equal or greater levels than plants exposed to wild-type C. magna alone. Watermelon plants colonized with path-1 were also protected against disease caused by Colletotrichum orbiculare and Fusarium oxysporum. A model based on the kinetics of plant-defense activation is presented to explain the mechanism of path-1-conferred disease protection.
Protecting food security when facing uncertain climate: Opportunities for Afghan communities
NASA Astrophysics Data System (ADS)
Salman, Dina; Amer, Saud A.; Ward, Frank A.
2017-11-01
Climate change, population growth, and weakly developed water management institutions in many of the world's dry communities have raised the importance of designing innovative water allocation methods that adapt to water supply fluctuations while respecting cultural sensitivities. For example, Afghanistan faces an ancient history of water supply fluctuations that have contributed to periodic food shortage and famine. Poorly designed and weakly enforced water allocation methods continue to result in agriculture sector underperformance and periodic food shortages when water shortfalls occur. To date, little research has examined alternative water sharing rules on a multi-basin scale to protect food security for a subsistence irrigation society when the community faces water shortage. This paper's contribution examines the economic performance of three water-sharing mechanisms for three basins in Afghanistan with the goal of protecting food security for crop irrigation under ongoing threats of drought, while meeting growing demands for food in the face of anticipated population growth. We achieved this by formulating an integrated empirical optimization model to identify water-sharing measures that minimize economic losses while protecting food security when water shortages occur. Findings show that implementation of either a water trading policy or a proportional shortage policy that respects cultural sensitivities has the potential to raise economic welfare in each basin. Such a policy can reduce food insecurity risks for all trading provinces within each basin, thus being a productive institution for adapting to water shortage when it occurs. Total economic welfare gains are highest when drought is the most severe for which suffering would otherwise be greatest. Gains would be considerably higher if water storage reservoirs were built to store wet year flows for use in dry years. Our results light a path for policy makers, donors, water administrators, and farm managers, who shoulder the burden of protecting food security and rural livelihoods in the world's poor dry communities.
Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions
NASA Astrophysics Data System (ADS)
Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.
2016-05-01
The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.
Low profile, highly configurable, current sharing paralleled wide band gap power device power module
McPherson, Brice; Killeen, Peter D.; Lostetter, Alex; Shaw, Robert; Passmore, Brandon; Hornberger, Jared; Berry, Tony M
2016-08-23
A power module with multiple equalized parallel power paths supporting multiple parallel bare die power devices constructed with low inductance equalized current paths for even current sharing and clean switching events. Wide low profile power contacts provide low inductance, short current paths, and large conductor cross section area provides for massive current carrying. An internal gate & source kelvin interconnection substrate is provided with individual ballast resistors and simple bolted construction. Gate drive connectors are provided on either left or right size of the module. The module is configurable as half bridge, full bridge, common source, and common drain topologies.
Compact atom interferometer using single laser
NASA Astrophysics Data System (ADS)
Chiow, Sheng-wey; Yu, Nan
2018-06-01
A typical atom interferometer requires vastly different laser frequencies at different stages of operation, e.g., near resonant light for laser cooling and far detuned light for atom optics, such that multiple lasers are typically employed. The number of laser units constrains the achievable minimum size and power in practical devices for resource critical environments such as space. We demonstrate a compact atom interferometer accelerometer operated by a single diode laser. This is achieved by dynamically changing the laser output frequency in GHz range while maintaining spectroscopic reference to an atomic transition via a sideband generated by phase modulation. At the same time, a beam path sharing configuration is also demonstrated for a compact sensor head design, in which atom interferometer beams share the same path as that of the cooling beam. This beam path sharing also significantly simplifies three-axis atomic accelerometry in microgravity using single sensor head.
The Critical Path Institute's approach to precompetitive sharing and advancing regulatory science.
Woosley, R L; Myers, R T; Goodsaid, F
2010-05-01
Many successful large industries, such as computer-chip manufacturers, the cable television industry, and high-definition television developers,(1) have established successful precompetitive collaborations focusing on standards, applied science, and technology that advance the field for all stakeholders and benefit the public.(2) The pharmaceutical industry, however, has a well-earned reputation for fierce competition and did not demonstrate willingness to share data or knowledge until the US Food and Drug Administration (FDA) launched the Critical Path Initiative in 2004 (ref. 3).
Processor Would Find Best Paths On Map
NASA Technical Reports Server (NTRS)
Eberhardt, Silvio P.
1990-01-01
Proposed very-large-scale integrated (VLSI) circuit image-data processor finds path of least cost from specified origin to any destination on map. Cost of traversal assigned to each picture element of map. Path of least cost from originating picture element to every other picture element computed as path that preserves as much as possible of signal transmitted by originating picture element. Dedicated microprocessor at each picture element stores cost of traversal and performs its share of computations of paths of least cost. Least-cost-path problem occurs in research, military maneuvers, and in planning routes of vehicles.
Examining Factors That Affect Students' Knowledge Sharing within Virtual Teams
ERIC Educational Resources Information Center
He, Jinxia; Gunter, Glenda
2015-01-01
The purpose of this study was to examine factors that might impact student knowledge sharing within virtual teams through online discussion boards. These factors include: trust, mutual influence, conflict, leadership, and cohesion. A path model was developed to determine whether relationships exist among knowledge sharing from asynchronous group…
Analytical Study of different types Of network failure detection and possible remedies
NASA Astrophysics Data System (ADS)
Saxena, Shikha; Chandra, Somnath
2012-07-01
Faults in a network have various causes,such as the failure of one or more routers, fiber-cuts, failure of physical elements at the optical layer, or extraneous causes like power outages. These faults are usually detected as failures of a set of dependent logical entities and the links affected by the failed components. A reliable control plane plays a crucial role in creating high-level services in the next-generation transport network based on the Generalized Multiprotocol Label Switching (GMPLS) or Automatically Switched Optical Networks (ASON) model. In this paper, approaches to control-plane survivability, based on protection and restoration mechanisms, are examined. Procedures for the control plane state recovery are also discussed, including link and node failure recovery and the concepts of monitoring paths (MPs) and monitoring cycles (MCs) for unique localization of shared risk linked group (SRLG) failures in all-optical networks. An SRLG failure is a failure of multiple links due to a failure of a common resource. MCs (MPs) start and end at same (distinct) monitoring location(s). They are constructed such that any SRLG failure results in the failure of a unique combination of paths and cycles. We derive necessary and sufficient conditions on the set of MCs and MPs needed for localizing an SRLG failure in an arbitrary graph. Procedure of Protection and Restoration of the SRLG failure by backup re-provisioning algorithm have also been discussed.
NASA Astrophysics Data System (ADS)
Dao, Thanh Hai
2018-01-01
Network coding techniques are seen as the new dimension to improve the network performances thanks to the capability of utilizing network resources more efficiently. Indeed, the application of network coding to the realm of failure recovery in optical networks has been marking a major departure from traditional protection schemes as it could potentially achieve both rapid recovery and capacity improvement, challenging the prevailing wisdom of trading capacity efficiency for speed recovery and vice versa. In this context, the maturing of all-optical XOR technologies appears as a good match to the necessity of a more efficient protection in transparent optical networks. In addressing this opportunity, we propose to use a practical all-optical XOR network coding to leverage the conventional 1 + 1 optical path protection in transparent WDM optical networks. The network coding-assisted protection solution combines protection flows of two demands sharing the same destination node in supportive conditions, paving the way for reducing the backup capacity. A novel mathematical model taking into account the operation of new protection scheme for optimal network designs is formulated as the integer linear programming. Numerical results based on extensive simulations on realistic topologies, COST239 and NSFNET networks, are presented to highlight the benefits of our proposal compared to the conventional approach in terms of wavelength resources efficiency and network throughput.
ERIC Educational Resources Information Center
He, Jinxia
2009-01-01
This study examined factors that might impact student knowledge sharing within virtual teams through online discussion boards. These factors included: trust, mutual influence, conflict, leadership, and cohesion. A path model was developed to determine whether relationships exist among knowledge sharing from asynchronous group discussion and the…
40 CFR 33.404 - When must a recipient negotiate fair share objectives with EPA?
Code of Federal Regulations, 2010 CFR
2010-07-01
... share objectives with EPA? 33.404 Section 33.404 Protection of Environment ENVIRONMENTAL PROTECTION... STATES ENVIRONMENTAL PROTECTION AGENCY PROGRAMS Fair Share Objectives § 33.404 When must a recipient negotiate fair share objectives with EPA? A recipient must submit its proposed MBE and WBE fair share...
From zero to the ERC starting grant and what is next?
NASA Astrophysics Data System (ADS)
Tajcmanova, Lucie
2016-04-01
A decision to follow the academic path and to stay on that path is sometimes adventurous. Working in academy has, as every job, its pros and cons. On one hand, it gives us a certain working flexibility and on the other hand a successful academic path commonly requires mobility without a guarantee of a permanent job. In my contribution, I would like to share briefly how the path was for me. How did I decide to become a scientist? What were the key steps and what were the downs and ups for me during my academic career? What is my main driving force for staying in science? Furthermore, I will touch briefly why my way of working is different from most of my colleagues. I will also mention why mentoring was important for me and why I am actively involved in the mentoring of the young generation. I would also like to share what is my opinion on gender issues in academic field and what, I think, would help to improve it.
Earth Entry Vehicle Design for Sample Return Missions Using M-SAPE
NASA Technical Reports Server (NTRS)
Samareh, Jamshid
2015-01-01
Most mission concepts that return sample material to Earth share one common element: an Earth entry vehicle (EEV). The primary focus of this paper is the examination of EEV design space for relevant sample return missions. Mission requirements for EEV concepts can be divided into three major groups: entry conditions (e.g., velocity and flight path angle), payload (e.g., mass, volume, and g-load limit), and vehicle characteristics (e.g., thermal protection system, structural topology, and landing concepts). The impacts of these requirements on the EEV design have been studied with an integrated system analysis tool, and the results will be discussed in details. In addition, through sensitivities analyses, critical design drivers that have been identified will be reviewed.
Cyclist Path Choices Through Shared Space Intersections in England
DOT National Transportation Integrated Search
2016-07-01
In the last several years, there has been growing worldwide interest in making streets safer for all users pedestrians, cyclists, and motorists. One approach, shared space, is a traffic calming technique as well as urban design concept. This techn...
Trinh, Lan Anh; Ekström, Mikael; Cürüklü, Baran
2018-01-01
Recent industrial developments in autonomous systems, or agents, which assume that humans and the agents share the same space or even work in close proximity, open for new challenges in robotics, especially in motion planning and control. In these settings, the control system should be able to provide these agents a reliable path following control when they are working in a group or in collaboration with one or several humans in complex and dynamic environments. In such scenarios, these agents are not only moving to reach their goals, i.e., locations, they are also aware of the movements of other entities to find a collision-free path. Thus, this paper proposes a dependable, i.e., safe, reliable and effective, path planning algorithm for a group of agents that share their working space with humans. Firstly, the method employs the Theta * algorithm to initialize the paths from a starting point to a goal for a set of agents. As Theta * algorithm is computationally heavy, it only reruns when there is a significant change of the environment. To deal with the movements of the agents, a static flow field along the configured path is defined. This field is used by the agents to navigate and reach their goals even if the planned trajectories are changed. Secondly, a dipole field is calculated to avoid the collision of agents with other agents and human subjects. In this approach, each agent is assumed to be a source of a magnetic dipole field in which the magnetic moment is aligned with the moving direction of the agent. The magnetic dipole-dipole interactions between these agents generate repulsive forces to help them to avoid collision. The effectiveness of the proposed approach has been evaluated with extensive simulations. The results show that the static flow field is able to drive agents to the goals with a small number of requirements to update the path of agents. Meanwhile, the dipole flow field plays an important role to prevent collisions. The combination of these two fields results in a safe path planning algorithm, with a deterministic outcome, to navigate agents to their desired goals.
Challenging prior evidence for a shared syntactic processor for language and music.
Perruchet, Pierre; Poulin-Charronnat, Bénédicte
2013-04-01
A theoretical landmark in the growing literature comparing language and music is the shared syntactic integration resource hypothesis (SSIRH; e.g., Patel, 2008), which posits that the successful processing of linguistic and musical materials relies, at least partially, on the mastery of a common syntactic processor. Supporting the SSIRH, Slevc, Rosenberg, and Patel (Psychonomic Bulletin & Review 16(2):374-381, 2009) recently reported data showing enhanced syntactic garden path effects when the sentences were paired with syntactically unexpected chords, whereas the musical manipulation had no reliable effect on the processing of semantic violations. The present experiment replicated Slevc et al.'s (2009) procedure, except that syntactic garden paths were replaced with semantic garden paths. We observed the very same interactive pattern of results. These findings suggest that the element underpinning interactions is the garden path configuration, rather than the implication of an alleged syntactic module. We suggest that a different amount of attentional resources is recruited to process each type of linguistic manipulations, hence modulating the resources left available for the processing of music and, consequently, the effects of musical violations.
Prediction of contact path and load sharing in spiral bevel gears
NASA Technical Reports Server (NTRS)
Bibel, George D.; Tiku, Karuna; Kumar, Ashok
1994-01-01
A procedure is presented to perform a contact analysis of spiral bevel gears in order to predict the contact path and the load sharing as the gears roll through mesh. The approach utilizes recent advances in automated contact methods for nonlinear finite element analysis. A sector of the pinion and gear is modeled consisting of three pinion teeth and four gear teeth in mesh. Calculation of the contact force and stresses through the gear meshing cycle are demonstrated. Summary of the results are presented using three dimensional plots and tables. Issues relating to solution convergence and requirements for running large finite element analysis on a supercomputer are discussed.
Ecomuseum itineraries, a path of rediscovery and enhancement of the territory
NASA Astrophysics Data System (ADS)
La Longa, Federica; Lanza, Tiziana; Crescimbene, Massimo
2013-04-01
Geoethics has among its objectives to promote the recognition and enhancement of geological culture, as a wealth of knowledge that can contribute to the construction of a proper social knowledge, strengthening the link between population and territory and offering the opportunity to teach, especially the young, good behavior towards the geosphere. The work here proposed is an example of how to promote knowledge, awareness and appreciation of its territory by use of innovative and multidisciplinary educational programs; paths that allow young people to redraw the places to returning them to the communities that live there as a common heritage to be lived and protect. The experience described refers to the realization of the pilot project "Towards an Eco Museum of the Castelli Romani". The project, proposed and implemented by a group of researchers of the Laboratory of Education and Science Communication of National Institute of Geophysics and Volcanology (INGV) in collaboration with the Regional Park of the Castelli Romani, involved students of the Classic and Psycho-Pedagogical High School of the Mancinelli Falcone Institute of Velletri (RM). Educational activities carried out in the academic year 2009-2010, were structured on multidisciplinary training programs designed to create eco museum routes. These training programs have been grouped into three main areas (historical, archaeological and literary, geological and town planning, ecological and naturalistic) that are particularly representative of the complexity of geological and anthropological territory of the Nemi Lake. The eco-museum is a revolutionary concept compared to traditional museum because it adds to the traditional museum the social dimension. The environment is described through history, culture, landscapes, activities, society putting in relation to aspects of life, material and spiritual, and tying them to the places, territories and the culture that created them. Very often the age of globalization takes us to lose sight of the concept of place in favor of the non-place, an environment free of characteristics and boundaries. This trend, if on one hand helps to share problems and solutions related to environmental protection, other hand risks producing a variety of effects that lead communities to disown the values of their territory. Instead the experience realized takes us in an opposite direction. We believe that educational projects structured on eco museum itineraries can promote in young people an experiential path of rediscovery and enhancement of the territory (genius loci). The active techniques used in the project (dramatization, creative writing, music, etc.) favored boys in the acquisition of knowledge and skills that allow enhance of territorial resources and sharing it with the community.
47 CFR 27.1180 - The cost-sharing formula.
Code of Federal Regulations, 2014 CFR
2014-10-01
... system with which it interferes is entitled to pro rata reimbursement based on the cost-sharing formula... system, and includes, but is not limited to, such items as: Radio terminal equipment (TX and/or RX...; monitoring or control equipment; engineering costs (design/path survey); installation; systems testing; FCC...
47 CFR 27.1180 - The cost-sharing formula.
Code of Federal Regulations, 2012 CFR
2012-10-01
...-sharing formula. (a) An AWS licensee that relocates a BRS system with which it interferes is entitled to... this section. (b) C is the actual cost of relocating the system, and includes, but is not limited to... (design/path survey); installation; systems testing; FCC filing costs; site acquisition and civil works...
47 CFR 27.1180 - The cost-sharing formula.
Code of Federal Regulations, 2013 CFR
2013-10-01
... § 27.1180 The cost-sharing formula. (a) An AWS licensee that relocates a BRS system with which it... forth in paragraph (b) of this section. (b) C is the actual cost of relocating the system, and includes... equipment; engineering costs (design/path survey); installation; systems testing; FCC filing costs; site...
47 CFR 27.1180 - The cost-sharing formula.
Code of Federal Regulations, 2011 CFR
2011-10-01
...-sharing formula. (a) An AWS licensee that relocates a BRS system with which it interferes is entitled to... this section. (b) C is the actual cost of relocating the system, and includes, but is not limited to... (design/path survey); installation; systems testing; FCC filing costs; site acquisition and civil works...
40 CFR 501.19 - Sharing of information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Sharing of information. 501.19 Section 501.19 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SEWAGE SLUDGE STATE SLUDGE MANAGEMENT PROGRAM REGULATIONS Development and Submission of State Programs § 501.19 Sharing of...
40 CFR 35.705 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.705 Section 35.705 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...) § 35.705 Maximum federal share. The Regional Administrator may provide Tribes and Intertribal Consortia...
Willems, Roel M.; Hagoort, Peter
2016-01-01
Many studies have revealed shared music–language processing resources by finding an influence of music harmony manipulations on concurrent language processing. However, the nature of the shared resources has remained ambiguous. They have been argued to be syntax specific and thus due to shared syntactic integration resources. An alternative view regards them as related to general attention and, thus, not specific to syntax. The present experiments evaluated these accounts by investigating the influence of language on music. Participants were asked to provide closure judgements on harmonic sequences in order to assess the appropriateness of sequence endings. At the same time participants read syntactic garden-path sentences. Closure judgements revealed a change in harmonic processing as the result of reading a syntactically challenging word. We found no influence of an arithmetic control manipulation (experiment 1) or semantic garden-path sentences (experiment 2). Our results provide behavioural evidence for a specific influence of linguistic syntax processing on musical harmony judgements. A closer look reveals that the shared resources appear to be needed to hold a harmonic key online in some form of syntactic working memory or unification workspace related to the integration of chords and words. Overall, our results support the syntax specificity of shared music–language processing resources. PMID:26998339
40 CFR 35.265 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.265 Section 35.265 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE....265 Maximum federal share. The Regional Administrator may provide up to 60 percent of the approved...
40 CFR 35.715 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.715 Section 35.715 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... Monitoring (section 28) § 35.715 Maximum federal share. The Regional Administrator may provide up to 75...
40 CFR 35.295 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.295 Section 35.295 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... Maximum federal share. The Regional Administrator may provide State agencies up to 50 percent of the...
40 CFR 35.649 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.649 Section 35.649 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... and Training (section 23(a)(2)) § 35.649 Maximum federal share. The Regional Administrator may provide...
40 CFR 35.245 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.245 Section 35.245 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... (section 23(a)(2)) § 35.245 Maximum federal share. The Regional Administrator may provide up to 50 percent...
40 CFR 35.385 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.385 Section 35.385 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...)(3)) § 35.385 Maximum federal share. EPA may provide up to 75 percent of the approved work plan costs...
40 CFR 35.235 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.235 Section 35.235 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...)(1)) § 35.235 Maximum federal share. The Regional Administrator may provide up to 100 percent of the...
40 CFR 35.642 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.642 Section 35.642 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... (section 23(a)(1)) § 35.642 Maximum federal share. The Regional Administrator may provide up to 100 percent...
40 CFR 35.315 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.315 Section 35.315 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... 28) § 35.315 Maximum federal share. The Regional Administrator may provide up to 75 percent of the...
40 CFR 35.615 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.615 Section 35.615 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... (section 104(b)(3)) § 35.615 Maximum federal share. EPA may provide up to 75 percent of the approved work...
40 CFR 35.175 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.175 Section 35.175 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...)) § 35.175 Maximum federal share. The Regional Administrator may provide a maximum of 75 percent of the...
40 CFR 35.215 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.215 Section 35.215 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...)) § 35.215 Maximum federal share. The Regional Administrator may provide up to 75 percent of the approved...
40 CFR 35.195 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.195 Section 35.195 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... 1443(b)) § 35.195 Maximum federal share. The Regional Administrator may provide a maximum of 75 percent...
40 CFR 35.725 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.725 Section 35.725 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... Grants (pub.l. 105-276) § 35.725 Maximum federal share. The Regional Administrator may provide up to 100...
40 CFR 35.335 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.335 Section 35.335 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...)(2)) § 35.335 Maximum federal share. The Regional Administrator may provide up to 75 percent of the...
40 CFR 35.659 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.659 Section 35.659 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE... (section 23(a)(1)) § 35.659 Maximum federal share. The Regional Administrator may provide up to 100 percent...
40 CFR 35.252 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.252 Section 35.252 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...)(1)) § 35.252 Maximum federal share. The Regional Administrator may provide up to 100 percent of the...
NASA Astrophysics Data System (ADS)
Showalter, L. M.
2017-12-01
The Gulf Research Program (GRP) was developed as part of legal settlements with the companies involved in the Deepwater Horizon (DWH) disaster. The Federal Government asked the National Academy of Sciences to establish a new program to fund and conduct activities to enhance offshore energy system safety and protect human health and the environment in the Gulf of Mexico and other regions along the U.S. outer continental shelf. An important part of the program is a commitment to open data and data sharing among the variety of disciplines it funds. The DWH disaster produced a major influx of funding for the Gulf region and various groups and organizations are collaborating to ensure that the science being conducted via these funding streams is not duplicative. A number of data focused sub groups have formed and are working to leverage existing efforts to strengthen data sharing and collaboration in the region. For its part, the GRP is developing a data program that encourages researchers to share data openly while providing avenues for acknowledgement of data sharing and research collaborations. A main problem with collaborative data sharing is often not the technologies available but instead the human component. The "traditional" path for scientific research has not generally involved making data widely or readily available in a short time frame. It takes a lot of effort to challenge this norm and change the way researchers view data sharing and its value for them and the world at large. The GRP data program aims to build a community of researchers that not only share their data but who also help show the value of this practice to the greater scientific community. To this end, the GRP will support a variety of education and training opportunities to help develop a base of researchers more informed on issues related to open data and data sharing and working to leverage the technology and expertise of others to develop a culture of data sharing in the Gulf of Mexico.
NASA Astrophysics Data System (ADS)
Liao, Luhua; Li, Lemin; Wang, Sheng
2006-12-01
We investigate the protection approach for dynamic multicast traffic under shared risk link group (SRLG) constraints in meshed wavelength-division-multiplexing optical networks. We present a shared protection algorithm called dynamic segment shared protection for multicast traffic (DSSPM), which can dynamically adjust the link cost according to the current network state and can establish a primary light-tree as well as corresponding SRLG-disjoint backup segments for a dependable multicast connection. A backup segment can efficiently share the wavelength capacity of its working tree and the common resources of other backup segments based on SRLG-disjoint constraints. The simulation results show that DSSPM not only can protect the multicast sessions against a single-SRLG breakdown, but can make better use of the wavelength resources and also lower the network blocking probability.
The Path to Presidency: Tips for Teaching Elementary Students about the Election Process
ERIC Educational Resources Information Center
Conrad, Marika
2016-01-01
Teaching about presidential elections at the elementary level can seem a bit daunting at times. Students are quick to share their strong opinions on the current candidates running for office. These opinions often involve repeating feelings and phrases shared by parents around the dinner table the night before. For the average seven- or…
ERIC Educational Resources Information Center
Eidizadeh, Rosa; Salehzadeh, Reza; Chitsaz Esfahani, Ali
2017-01-01
Purpose: This paper aims to study the role of business intelligence, knowledge sharing and organisational innovation on gaining competitive advantage. Design/Methodology/Approach: The statistical population of the study was the managers and the specialists of some export companies of which 213 persons participated in this research. Path analysis…
78 FR 18451 - Education and Sharing Day, U.S.A., 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... must we pass on the common values that help define us as a people. On Education and Sharing Day, U.S.A... our youth. We know education is essential to putting our children on the path to good jobs and a... men and women the importance of education and good character. His work strengthened ties between...
About Personal Protective Equipment (PPE)
... Equipment for Infection Control Questions About Personal Protective Equipment (PPE) Share Tweet Linkedin Pin it More sharing ... Print Q1. How do manufacturers ensure personal protective equipment (PPE) is safe and effective? A1. To help ...
42 CFR 600.520 - General cost-sharing protections.
Code of Federal Regulations, 2014 CFR
2014-10-01
... income. (b) Cost-sharing protections to ensure enrollment of Indians. A State must ensure that standard health plans meet the standards in accordance with 45 CFR 156.420(b)(1) and (d). (c) Cost-sharing... 156.420(c) and (e); and (2) The cost-sharing reduction standards in accordance with 45 CFR 156.420(a...
Multipath Very-Simplified Estimate of Adversary Sequence Interruption v. 2.1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Snell, Mark K.
2017-10-10
MP VEASI is a training tool that models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.
Fundamental changes to EPA's research enterprise: the path forward.
Anastas, Paul T
2012-01-17
Environmental protection in the United States has reached a critical juncture. It has become clear that to address the complex and interrelated environmental challenges we face, we must augment our traditional approaches. The scientific community must build upon its deep understanding of risk assessment, risk management, and reductionism with tools, technologies, insights and approaches to pursue sustainability. The U.S. Environmental Protection Agency (EPA) has recognized this need for systemic change by implementing a new research paradigm called "The Path Forward." This paper outlines the principles of the Path Forward and the actions taken since 2010 to align EPA's research efforts with the goal of sustainability.
MapMaker and PathTracer for tracking carbon in genome-scale metabolic models
Tervo, Christopher J.; Reed, Jennifer L.
2016-01-01
Constraint-based reconstruction and analysis (COBRA) modeling results can be difficult to interpret given the large numbers of reactions in genome-scale models. While paths in metabolic networks can be found, existing methods are not easily combined with constraint-based approaches. To address this limitation, two tools (MapMaker and PathTracer) were developed to find paths (including cycles) between metabolites, where each step transfers carbon from reactant to product. MapMaker predicts carbon transfer maps (CTMs) between metabolites using only information on molecular formulae and reaction stoichiometry, effectively determining which reactants and products share carbon atoms. MapMaker correctly assigned CTMs for over 97% of the 2,251 reactions in an Escherichia coli metabolic model (iJO1366). Using CTMs as inputs, PathTracer finds paths between two metabolites. PathTracer was applied to iJO1366 to investigate the importance of using CTMs and COBRA constraints when enumerating paths, to find active and high flux paths in flux balance analysis (FBA) solutions, to identify paths for putrescine utilization, and to elucidate a potential CO2 fixation pathway in E. coli. These results illustrate how MapMaker and PathTracer can be used in combination with constraint-based models to identify feasible, active, and high flux paths between metabolites. PMID:26771089
40 CFR 35.349 - Maximum federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 35.349 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Pollution Prevention State Grants (section 6605) § 35.349 Maximum federal share. The federal share for Pollution Prevention State Grants will not exceed...
40 CFR 35.669 - Maximum federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 35.669 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Pollution Prevention Grants (section 6605) § 35.669 Maximum federal share. The federal share for Pollution Prevention Grants will not exceed...
40 CFR 35.669 - Maximum federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 35.669 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Pollution Prevention Grants (section 6605) § 35.669 Maximum federal share. The federal share for Pollution Prevention Grants will not exceed...
40 CFR 35.349 - Maximum federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 35.349 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Pollution Prevention State Grants (section 6605) § 35.349 Maximum federal share. The federal share for Pollution Prevention State Grants will not exceed...
E-Center: A Collaborative Platform for Wide Area Network Users
NASA Astrophysics Data System (ADS)
Grigoriev, M.; DeMar, P.; Tierney, B.; Lake, A.; Metzger, J.; Frey, M.; Calyam, P.
2012-12-01
The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.
47 CFR 24.243 - The cost-sharing formula.
Code of Federal Regulations, 2010 CFR
2010-10-01
...; monitoring or control equipment; engineering costs (design/path survey); installation; systems testing; FCC filing costs; site acquisition and civil works; zoning costs; training; disposal of old equipment; test...
Heinold, Mark R.; Berger, John F.; Loper, Milton H.; Runkle, Gary A.
2015-12-29
Systems and methods permit discriminate access to nuclear reactors. Systems provide penetration pathways to irradiation target loading and offloading systems, instrumentation systems, and other external systems at desired times, while limiting such access during undesired times. Systems use selection mechanisms that can be strategically positioned for space sharing to connect only desired systems to a reactor. Selection mechanisms include distinct paths, forks, diverters, turntables, and other types of selectors. Management methods with such systems permits use of the nuclear reactor and penetration pathways between different systems and functions, simultaneously and at only distinct desired times. Existing TIP drives and other known instrumentation and plant systems are useable with access management systems and methods, which can be used in any nuclear plant with access restrictions.
An object-based storage model for distributed remote sensing images
NASA Astrophysics Data System (ADS)
Yu, Zhanwu; Li, Zhongmin; Zheng, Sheng
2006-10-01
It is very difficult to design an integrated storage solution for distributed remote sensing images to offer high performance network storage services and secure data sharing across platforms using current network storage models such as direct attached storage, network attached storage and storage area network. Object-based storage, as new generation network storage technology emerged recently, separates the data path, the control path and the management path, which solves the bottleneck problem of metadata existed in traditional storage models, and has the characteristics of parallel data access, data sharing across platforms, intelligence of storage devices and security of data access. We use the object-based storage in the storage management of remote sensing images to construct an object-based storage model for distributed remote sensing images. In the storage model, remote sensing images are organized as remote sensing objects stored in the object-based storage devices. According to the storage model, we present the architecture of a distributed remote sensing images application system based on object-based storage, and give some test results about the write performance comparison of traditional network storage model and object-based storage model.
Shared control of a medical robot with haptic guidance.
Xiong, Linfei; Chng, Chin Boon; Chui, Chee Kong; Yu, Peiwu; Li, Yao
2017-01-01
Tele-operation of robotic surgery reduces the radiation exposure during the interventional radiological operations. However, endoscope vision without force feedback on the surgical tool increases the difficulty for precise manipulation and the risk of tissue damage. The shared control of vision and force provides a novel approach of enhanced control with haptic guidance, which could lead to subtle dexterity and better maneuvrability during MIS surgery. The paper provides an innovative shared control method for robotic minimally invasive surgery system, in which vision and haptic feedback are incorporated to provide guidance cues to the clinician during surgery. The incremental potential field (IPF) method is utilized to generate a guidance path based on the anatomy of tissue and surgical tool interaction. Haptic guidance is provided at the master end to assist the clinician during tele-operative surgical robotic task. The approach has been validated with path following and virtual tumor targeting experiments. The experiment results demonstrate that comparing with vision only guidance, the shared control with vision and haptics improved the accuracy and efficiency of surgical robotic manipulation, where the tool-position error distance and execution time are reduced. The validation experiment demonstrates that the shared control approach could help the surgical robot system provide stable assistance and precise performance to execute the designated surgical task. The methodology could also be implemented with other surgical robot with different surgical tools and applications.
40 CFR 35.415 - Maximum federal share.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Maximum federal share. 35.415 Section 35.415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Water Quality Management Planning Grants...
40 CFR 35.364 - Maximum federal share.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Maximum federal share. 35.364 Section 35.364 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Water Quality Cooperative Agreements (section...
40 CFR 35.364 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.364 Section 35.364 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Water Quality Cooperative Agreements (section...
40 CFR 35.415 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.415 Section 35.415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Water Quality Management Planning Grants...
40 CFR 35.421 - Maximum federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Maximum federal share. 35.421 Section 35.421 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants State Response Program Grants (cercla Section...
40 CFR 35.738 - Maximum federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Maximum federal share. 35.738 Section 35.738 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Tribal Response Program Grants...
40 CFR 35.421 - Maximum federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Maximum federal share. 35.421 Section 35.421 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants State Response Program Grants (cercla Section...
40 CFR 35.738 - Maximum federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Maximum federal share. 35.738 Section 35.738 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Tribal Response Program Grants...
40 CFR 35.738 - Maximum federal share.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Maximum federal share. 35.738 Section 35.738 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Tribal Response Program Grants...
40 CFR 35.421 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.421 Section 35.421 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants State Response Program Grants (cercla Section...
40 CFR 35.421 - Maximum federal share.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Maximum federal share. 35.421 Section 35.421 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants State Response Program Grants (cercla Section...
40 CFR 35.738 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.738 Section 35.738 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Tribal Response Program Grants...
40 CFR 35.738 - Maximum federal share.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Maximum federal share. 35.738 Section 35.738 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Tribal Response Program Grants...
40 CFR 35.421 - Maximum federal share.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Maximum federal share. 35.421 Section 35.421 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants State Response Program Grants (cercla Section...
NASA Astrophysics Data System (ADS)
Kuri, Josu�; Gagnaire, Maurice; Puech, Nicolas
2005-10-01
Virtual concatenation (VCAT) is a Synchronous Digital Hierarchy (SDH)/Synchronous Optical Network (SONET) network functionality recently standardized by the International Telecommunication Union Telecommunication Standardization Sector (ITU-T). VCAT provides the flexibility required to efficiently allocate network resources to Ethernet, Fiber Channel (FC), Enterprise System Connection (ESCON), and other important data traffic signals. In this article, we assess the resources' gain provided by VCAT with respect to contiguous concatenation (CCAT) in SDH/SONET mesh transport networks bearing protected scheduled connection demands (SCDs).
42 CFR 447.70 - General alternative cost sharing protections.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 4 2011-10-01 2011-10-01 false General alternative cost sharing protections. 447.70 Section 447.70 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under...
42 CFR 447.70 - General alternative cost sharing protections.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 4 2010-10-01 2010-10-01 false General alternative cost sharing protections. 447.70 Section 447.70 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under...
42 CFR 447.70 - General alternative cost sharing protections.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 4 2013-10-01 2013-10-01 false General alternative cost sharing protections. 447.70 Section 447.70 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under...
42 CFR 447.70 - General alternative cost sharing protections.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 4 2012-10-01 2012-10-01 false General alternative cost sharing protections. 447.70 Section 447.70 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under...
A Dynamic Resilience Approach for WDM Optical Networks
NASA Astrophysics Data System (ADS)
Garg, Amit Kumar
2017-12-01
Optical fibres have been developed as a transmission medium to carry traffic in order to provide various services in telecommunications platform. Failure of this fibre caused loss of data which can interrupt communication services. This paper has been focused only on survivable schemes in order to guarantee both protection and restoration in WDM optical networks. In this paper, a dynamic resilience approach has been proposed whose objective is to route the flows in a way which minimizes the total amount of bandwidth used for working and protection paths. In the proposed approach, path-based protection is utilized because it yields lower overhead and is also suitable for global optimization where, in case of a single link failure, all the flows utilizing the failed link are re-routed to a pre-computed set of paths. The simulation results demonstrate that proposed approach is much more efficient as it provides better quality of services (QoS) in terms of network resource utilization, blocking probability etc. as compared to conventional protection and restoration schemes. The proposed approach seems to offer an attractive combination of features, with both ring like speed and mesh-like efficiency.
40 CFR 35.6235 - Cost sharing.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Cost sharing. 35.6235 Section 35.6235 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Core Program...
40 CFR 35.6235 - Cost sharing.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Cost sharing. 35.6235 Section 35.6235 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Core Program...
40 CFR 35.6235 - Cost sharing.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Cost sharing. 35.6235 Section 35.6235 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Core Program...
40 CFR 35.2152 - Federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Federal share. 35.2152 Section 35.2152 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL... a primary, secondary, or advanced treatment facility or its interceptors, or infiltration/inflow...
40 CFR 35.2152 - Federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Federal share. 35.2152 Section 35.2152 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL... a primary, secondary, or advanced treatment facility or its interceptors, or infiltration/inflow...
40 CFR 35.2152 - Federal share.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Federal share. 35.2152 Section 35.2152 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL... a primary, secondary, or advanced treatment facility or its interceptors, or infiltration/inflow...
40 CFR 35.735 - Maximum federal share.
Code of Federal Regulations, 2011 CFR
2011-07-01
... percent of the approved work plan costs. Tribal Response Program Grants (CERCLA Section 128(A)) Source: 74... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Maximum federal share. 35.735 Section 35.735 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...
40 CFR 35.735 - Maximum federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... percent of the approved work plan costs. Tribal Response Program Grants (CERCLA Section 128(A)) Source: 74... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Maximum federal share. 35.735 Section 35.735 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...
40 CFR 35.735 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... percent of the approved work plan costs. Tribal Response Program Grants (CERCLA Section 128(A)) Source: 74... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.735 Section 35.735 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...
40 CFR 35.735 - Maximum federal share.
Code of Federal Regulations, 2012 CFR
2012-07-01
... percent of the approved work plan costs. Tribal Response Program Grants (CERCLA Section 128(A)) Source: 74... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Maximum federal share. 35.735 Section 35.735 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...
40 CFR 35.735 - Maximum federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... percent of the approved work plan costs. Tribal Response Program Grants (CERCLA Section 128(A)) Source: 74... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Maximum federal share. 35.735 Section 35.735 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE...
Barnert, Elizabeth S; Perry, Raymond; Azzi, Veronica F; Shetgiri, Rashmi; Ryan, Gery; Dudovitz, Rebecca; Zima, Bonnie; Chung, Paul J
2015-07-01
We sought to understand incarcerated youths' perspectives on the role of protective factors and risk factors for juvenile offending. We performed an in-depth qualitative analysis of interviews (conducted October-December 2013) with 20 incarcerated youths detained in the largest juvenile hall in Los Angeles. The adolescent participants described their homes, schools, and neighborhoods as chaotic and unsafe. They expressed a need for love and attention, discipline and control, and role models and perspective. Youths perceived that when home or school failed to meet these needs, they spent more time on the streets, leading to incarceration. They contrasted the path through school with the path to jail, reporting that the path to jail felt easier. All of them expressed the insight that they had made bad decisions and that the more difficult path was not only better but also still potentially achievable. Breaking cycles of juvenile incarceration will require that the public health community partner with legislators, educators, community leaders, and youths to determine how to make success, rather than incarceration, the easier path for disadvantaged adolescents.
Perry, Raymond; Azzi, Veronica F.; Shetgiri, Rashmi; Ryan, Gery; Dudovitz, Rebecca; Zima, Bonnie; Chung, Paul J.
2015-01-01
Objectives. We sought to understand incarcerated youths’ perspectives on the role of protective factors and risk factors for juvenile offending. Methods. We performed an in-depth qualitative analysis of interviews (conducted October–December 2013) with 20 incarcerated youths detained in the largest juvenile hall in Los Angeles. Results. The adolescent participants described their homes, schools, and neighborhoods as chaotic and unsafe. They expressed a need for love and attention, discipline and control, and role models and perspective. Youths perceived that when home or school failed to meet these needs, they spent more time on the streets, leading to incarceration. They contrasted the path through school with the path to jail, reporting that the path to jail felt easier. All of them expressed the insight that they had made bad decisions and that the more difficult path was not only better but also still potentially achievable. Conclusions. Breaking cycles of juvenile incarceration will require that the public health community partner with legislators, educators, community leaders, and youths to determine how to make success, rather than incarceration, the easier path for disadvantaged adolescents. PMID:25521878
Traffic protection in MPLS networks using an off-line flow optimization model
NASA Astrophysics Data System (ADS)
Krzesinski, Anthony E.; Muller, Karen E.
2002-07-01
MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in an MPLS network. Two MPLS-based recovery models have been proposed: IP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. IP re-routing is robust and frugal since no resources are pre-committed but is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. We present a model of protection switching in MPLS networks. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. The traffic is routed over a set of working LSPs. Global repair is implemented by reserving a set of pre-established recovery LSPs. An analytic model is used to evaluate the MPLS-based recovery mechanisms in response to bi-directional link failures. A simulation model is used to evaluate the MPLS recovery cycle in terms of the time needed to restore the traffic after a uni-directional link failure. The models are applied to evaluate the effectiveness of protection switching in networks consisting of between 20 and 100 nodes.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false May a recipient designate a lead agency for fair share objective negotiation purposes? 33.406 Section 33.406 Protection of Environment... recipient designate a lead agency for fair share objective negotiation purposes? If an Indian Tribal, State...
Law, Rebecca; Dollard, Maureen F; Tuckey, Michelle R; Dormann, Christian
2011-09-01
Psychosocial safety climate (PSC) is defined as shared perceptions of organizational policies, practices and procedures for the protection of worker psychological health and safety, that stem largely from management practices. PSC theory extends the Job Demands-Resources (JD-R) framework and proposes that organizational level PSC determines work conditions and subsequently, psychological health problems and work engagement. Our sample was derived from the Australian Workplace Barometer project and comprised 30 organizations, and 220 employees. As expected, hierarchical linear modeling showed that organizational PSC was negatively associated with workplace bullying and harassment (demands) and in turn psychological health problems (health impairment path). PSC was also positively associated with work rewards (resources) and in turn work engagement (motivational path). Accordingly, we found that PSC triggered both the health impairment and motivational pathways, thus justifying extending the JD-R model in a multilevel way. Further we found that PSC, as an organization-based resource, moderated the positive relationship between bullying/harassment and psychological health problems, and the negative relationship between bullying/harassment and engagement. The findings provide evidence for a multilevel model of PSC as a lead indicator of workplace psychosocial hazards (high demands, low resources), psychological health and employee engagement, and as a potential moderator of psychosocial hazard effects. PSC is therefore an efficient target for primary and secondary intervention. Copyright © 2011 Elsevier Ltd. All rights reserved.
40 CFR 33.410 - Can a recipient be penalized for failing to meet its fair share objectives?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Can a recipient be penalized for failing to meet its fair share objectives? 33.410 Section 33.410 Protection of Environment ENVIRONMENTAL... penalized for failing to meet its fair share objectives? A recipient cannot be penalized, or treated by EPA...
40 CFR 33.410 - Can a recipient be penalized for failing to meet its fair share objectives?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Can a recipient be penalized for failing to meet its fair share objectives? 33.410 Section 33.410 Protection of Environment ENVIRONMENTAL... penalized for failing to meet its fair share objectives? A recipient cannot be penalized, or treated by EPA...
40 CFR 33.410 - Can a recipient be penalized for failing to meet its fair share objectives?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Can a recipient be penalized for failing to meet its fair share objectives? 33.410 Section 33.410 Protection of Environment ENVIRONMENTAL... penalized for failing to meet its fair share objectives? A recipient cannot be penalized, or treated by EPA...
40 CFR 33.410 - Can a recipient be penalized for failing to meet its fair share objectives?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Can a recipient be penalized for failing to meet its fair share objectives? 33.410 Section 33.410 Protection of Environment ENVIRONMENTAL... penalized for failing to meet its fair share objectives? A recipient cannot be penalized, or treated by EPA...
40 CFR 33.410 - Can a recipient be penalized for failing to meet its fair share objectives?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Can a recipient be penalized for failing to meet its fair share objectives? 33.410 Section 33.410 Protection of Environment ENVIRONMENTAL... penalized for failing to meet its fair share objectives? A recipient cannot be penalized, or treated by EPA...
Autonomous Navigation by a Mobile Robot
NASA Technical Reports Server (NTRS)
Huntsberger, Terrance; Aghazarian, Hrand
2005-01-01
ROAMAN is a computer program for autonomous navigation of a mobile robot on a long (as much as hundreds of meters) traversal of terrain. Developed for use aboard a robotic vehicle (rover) exploring the surface of a remote planet, ROAMAN could also be adapted to similar use on terrestrial mobile robots. ROAMAN implements a combination of algorithms for (1) long-range path planning based on images acquired by mast-mounted, wide-baseline stereoscopic cameras, and (2) local path planning based on images acquired by body-mounted, narrow-baseline stereoscopic cameras. The long-range path-planning algorithm autonomously generates a series of waypoints that are passed to the local path-planning algorithm, which plans obstacle-avoiding legs between the waypoints. Both the long- and short-range algorithms use an occupancy-grid representation in computations to detect obstacles and plan paths. Maps that are maintained by the long- and short-range portions of the software are not shared because substantial localization errors can accumulate during any long traverse. ROAMAN is not guaranteed to generate an optimal shortest path, but does maintain the safety of the rover.
PESTEL Model Analysis and Legal Guarantee of Tourism Environmental Protection in China
NASA Astrophysics Data System (ADS)
Zhiyong, Xian
2017-08-01
On the basis of summarizing the general situation of tourism environmental protection in China, this paper analyses the macro factors of tourism environmental protection by using PESTEL model. On this basis, this paper explores the improvement paths of tourism environmental protection based on PESTEL model. Finally, it puts forward the legal guarantee suggestion of tourism environment protection.
Sikorsky Aircraft Advanced Rotorcraft Transmission (ART) program
NASA Technical Reports Server (NTRS)
Kish, Jules G.
1993-01-01
The objectives of the Advanced Rotorcraft Transmission program were to achieve a 25 percent weight reduction, a 10 dB noise reduction, and a 5,000 hour mean time between removals (MTBR). A three engine Army Cargo Aircraft (ACA) of 85,000 pounds gross weight was used as the baseline. Preliminary designs were conducted of split path and split torque transmissions to evaluate weight, reliability, and noise. A split path gearbox was determined to be 23 percent lighter, greater than 10 dB quieter, and almost four times more reliable than the baseline two stage planetary design. Detail design studies were conducted of the chosen split path configuration, and drawings were produced of a 1/2 size gearbox consisting of a single engine path of the split path section. Fabrication and testing was then conducted on the 1/2 size gearbox. The 1/2 size gearbox testing proved that the concept of the split path gearbox with high reduction ratio double helical output gear was sound. The improvements were attributed to extensive use of composites, spring clutches, advanced high hot hardness gear steels, the split path configuration itself, high reduction ratio, double helical gearing on the output stage, elastomeric load sharing devices, and elimination of accessory drives.
47 CFR 27.1164 - The cost-sharing formula.
Code of Federal Regulations, 2011 CFR
2011-10-01
... control equipment; engineering costs (design/path survey); installation; systems testing; FCC filing costs... plant upgrade (if required); electrical grounding systems; Heating Ventilation and Air Conditioning (HVAC) (if required); alternate transport equipment; and leased facilities. Increased recurring costs...
47 CFR 27.1164 - The cost-sharing formula.
Code of Federal Regulations, 2012 CFR
2012-10-01
... control equipment; engineering costs (design/path survey); installation; systems testing; FCC filing costs... plant upgrade (if required); electrical grounding systems; Heating Ventilation and Air Conditioning (HVAC) (if required); alternate transport equipment; and leased facilities. Increased recurring costs...
Netest: A Tool to Measure the Maximum Burst Size, Available Bandwidth and Achievable Throughput
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jin, Guojun; Tierney, Brian
2003-01-31
Distinguishing available bandwidth and achievable throughput is essential for improving network applications' performance. Achievable throughput is the throughput considering a number of factors such as network protocol, host speed, network path, and TCP buffer space, where as available bandwidth only considers the network path. Without understanding this difference, trying to improve network applications' performance is like ''blind men feeling the elephant'' [4]. In this paper, we define and distinguish bandwidth and throughput, and debate which part of each is achievable and which is available. Also, we introduce and discuss a new concept - Maximum Burst Size that is crucial tomore » the network performance and bandwidth sharing. A tool, netest, is introduced to help users to determine the available bandwidth, and provides information to achieve better throughput with fairness of sharing the available bandwidth, thus reducing misuse of the network.« less
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false May a recipient designate a lead agency for fair share objective negotiation purposes? 33.406 Section 33.406 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE PARTICIPATION BY DISADVANTAGED BUSINESS ENTERPRISES IN UNITED STATES ENVIRONMENTAL...
Protective carrier for microcircuit devices
Robinson, Lyle A.
1976-10-26
An improved protective carrier for microcircuit devices having beam leads wherein a compressible member is disposed on the carrier base beneath and overlapping the periphery of an aperture in a flexible circuit element, the element being adapted to receive and make electrical contact with microcircuit device beam leads, the compressible member disposed or arranged to achieve flexing of the circuit element against the microcircuit device beam leads to conform to variations in thicknesses of the device beam leads or circuit element electrical paths and thereby insure electrical connection between the beam leads and the electrical paths.
Lightning protection of wind turbines
NASA Technical Reports Server (NTRS)
Dodd, C. W.
1982-01-01
Possible damages to wind turbine components due to lightning strikes are discussed and means to prevent the damage are presented. A low resistance path to the ground is noted to be essential for any turbine system, including metal paths on nonmetal blades to conduct the strike. Surge arrestors are necessary to protect against overvoltages both from utility lines in normal operation and against lightning damage to control equipment and contactors in the generator. MOS structures are susceptible to static discharge injury, as are other semiconductor devices, and must be protected by the presence of static protection circuitry. It is recommended that the electronics be analyzed for the circuit transient response to a lightning waveform, to induced and dc current injection, that input/output leads be shielded, everything be grounded, and lightning-resistant components be chosen early in the design phase.
Lightning protection of wind turbines
NASA Astrophysics Data System (ADS)
Dodd, C. W.
1982-05-01
Possible damages to wind turbine components due to lightning strikes are discussed and means to prevent the damage are presented. A low resistance path to the ground is noted to be essential for any turbine system, including metal paths on nonmetal blades to conduct the strike. Surge arrestors are necessary to protect against overvoltages both from utility lines in normal operation and against lightning damage to control equipment and contactors in the generator. MOS structures are susceptible to static discharge injury, as are other semiconductor devices, and must be protected by the presence of static protection circuitry. It is recommended that the electronics be analyzed for the circuit transient response to a lightning waveform, to induced and dc current injection, that input/output leads be shielded, everything be grounded, and lightning-resistant components be chosen early in the design phase.
Developing Privacy Solutions for Sharing and Analyzing Healthcare Data
Motiwalla, Luvai; Li, Xiao-Bai
2013-01-01
The extensive use of electronic health data has increased privacy concerns. While most healthcare organizations are conscientious in protecting their data in their databases, very few organizations take enough precautions to protect data that is shared with third party organizations. Recently the regulatory environment has tightened the laws to enforce privacy protection. The goal of this research is to explore the application of data masking solutions for protecting patient privacy when data is shared with external organizations for research, analysis and other similar purposes. Specifically, this research project develops a system that protects data without removing sensitive attributes. Our application allows high quality data analysis with the masked data. Dataset-level properties and statistics remain approximately the same after data masking; however, individual record-level values are altered to prevent privacy disclosure. A pilot evaluation study on large real-world healthcare data shows the effectiveness of our solution in privacy protection. PMID:24285983
14 CFR 420.71 - Lightning protection.
Code of Federal Regulations, 2011 CFR
2011-01-01
... path connecting an air terminal to an earth electrode system. (iii) Earth electrode system. An earth... to the initiation of explosives by lightning. (1) Elements of a lighting protection system. Unless an... facilities shall have a lightning protection system to ensure explosives are not initiated by lightning. A...
14 CFR 420.71 - Lightning protection.
Code of Federal Regulations, 2012 CFR
2012-01-01
... path connecting an air terminal to an earth electrode system. (iii) Earth electrode system. An earth... to the initiation of explosives by lightning. (1) Elements of a lighting protection system. Unless an... facilities shall have a lightning protection system to ensure explosives are not initiated by lightning. A...
14 CFR 420.71 - Lightning protection.
Code of Federal Regulations, 2014 CFR
2014-01-01
... path connecting an air terminal to an earth electrode system. (iii) Earth electrode system. An earth... to the initiation of explosives by lightning. (1) Elements of a lighting protection system. Unless an... facilities shall have a lightning protection system to ensure explosives are not initiated by lightning. A...
14 CFR 420.71 - Lightning protection.
Code of Federal Regulations, 2013 CFR
2013-01-01
... path connecting an air terminal to an earth electrode system. (iii) Earth electrode system. An earth... to the initiation of explosives by lightning. (1) Elements of a lighting protection system. Unless an... facilities shall have a lightning protection system to ensure explosives are not initiated by lightning. A...
Via Dialogue or Messaging: How Air Force Public Affairs Is Leveraging Social Media
2010-12-01
or “blogs”; (2) content-sharing sites (e.g., YouTube, Flickr, Wikis); (3) Micro-blogs (Twitter, Google Buzz); and (4) Social networking sites (e.g...aforementioned categories of social media (blogs, content sharing, micro-blogs, social networking sites , and the optional “other”) are to the overall PA...The results indicate that social networking sites (e.g., Facebook, LinkedIn) were clearly the most utilized by respondents, in terms of posting and
Simple techniques for forecasting bicycle and pedestrian demand.
DOT National Transportation Integrated Search
2009-01-01
Bicycle lanes, sidewalks, and shared-use paths are some of the most : commonly requested transportation improvements in many parts of : the country. Increased fuel costs, desire to fit exercise into personal : routines, and land-use changes all are d...
47 CFR 24.243 - The cost-sharing formula.
Code of Federal Regulations, 2014 CFR
2014-10-01
...; monitoring or control equipment; engineering costs (design/path survey); installation; systems testing; FCC... control; power plant upgrade (if required); electrical grounding systems; Heating Ventilation and Air Conditioning (HVAC) (if required); alternate transport equipment; and leased facilities. C also includes...
47 CFR 24.243 - The cost-sharing formula.
Code of Federal Regulations, 2013 CFR
2013-10-01
...; monitoring or control equipment; engineering costs (design/path survey); installation; systems testing; FCC... control; power plant upgrade (if required); electrical grounding systems; Heating Ventilation and Air Conditioning (HVAC) (if required); alternate transport equipment; and leased facilities. C also includes...
47 CFR 24.243 - The cost-sharing formula.
Code of Federal Regulations, 2012 CFR
2012-10-01
...; monitoring or control equipment; engineering costs (design/path survey); installation; systems testing; FCC... control; power plant upgrade (if required); electrical grounding systems; Heating Ventilation and Air Conditioning (HVAC) (if required); alternate transport equipment; and leased facilities. C also includes...
47 CFR 24.243 - The cost-sharing formula.
Code of Federal Regulations, 2011 CFR
2011-10-01
...; monitoring or control equipment; engineering costs (design/path survey); installation; systems testing; FCC... control; power plant upgrade (if required); electrical grounding systems; Heating Ventilation and Air Conditioning (HVAC) (if required); alternate transport equipment; and leased facilities. C also includes...
Scaling Law of Urban Ride Sharing.
Tachet, R; Sagarra, O; Santi, P; Resta, G; Szell, M; Strogatz, S H; Ratti, C
2017-03-06
Sharing rides could drastically improve the efficiency of car and taxi transportation. Unleashing such potential, however, requires understanding how urban parameters affect the fraction of individual trips that can be shared, a quantity that we call shareability. Using data on millions of taxi trips in New York City, San Francisco, Singapore, and Vienna, we compute the shareability curves for each city, and find that a natural rescaling collapses them onto a single, universal curve. We explain this scaling law theoretically with a simple model that predicts the potential for ride sharing in any city, using a few basic urban quantities and no adjustable parameters. Accurate extrapolations of this type will help planners, transportation companies, and society at large to shape a sustainable path for urban growth.
Genetic conversion of a fungal plant pathogen to a non-pathogenic, endophytic mutualist
Freeman, Stanley; Rodriguez, Rusty J.
1993-01-01
The filamentous fungal ascomycete Colletotrichum magna causes anthracnose in cucurbit plants. Isolation of a nonpathogenic mutant of this species (path-1) resulted in maintained wild-type levels of in vitro sporulation, spore adhesion, appressorial formation, and infection. Path-1 grew throughout host tissues as an endophyte and retained the wild-type host range, which indicates that the genetics involved in pathogenicity and host specificity are distinct. Prior infection with path-1 protected plants from disease caused by Colletotrichum and Fusarium.Genetic analysis of a cross between path-1 and wild-type strains indicated mutation of a single locus.
Sobel, E.; Lange, K.
1996-01-01
The introduction of stochastic methods in pedigree analysis has enabled geneticists to tackle computations intractable by standard deterministic methods. Until now these stochastic techniques have worked by running a Markov chain on the set of genetic descent states of a pedigree. Each descent state specifies the paths of gene flow in the pedigree and the founder alleles dropped down each path. The current paper follows up on a suggestion by Elizabeth Thompson that genetic descent graphs offer a more appropriate space for executing a Markov chain. A descent graph specifies the paths of gene flow but not the particular founder alleles traveling down the paths. This paper explores algorithms for implementing Thompson's suggestion for codominant markers in the context of automatic haplotyping, estimating location scores, and computing gene-clustering statistics for robust linkage analysis. Realistic numerical examples demonstrate the feasibility of the algorithms. PMID:8651310
Tuning of Muscle Synergies During Walking Along Rectilinear and Curvilinear Trajectories in Humans.
Chia Bejarano, Noelia; Pedrocchi, Alessandra; Nardone, Antonio; Schieppati, Marco; Baccinelli, Walter; Monticone, Marco; Ferrigno, Giancarlo; Ferrante, Simona
2017-05-01
The aim of this study was to develop a methodology based on muscle synergies to investigate whether rectilinear and curvilinear walking shared the same neuro-motor organization, and how this organization was fine-tuned by the walking condition. Thirteen healthy subjects walked on rectilinear and curvilinear paths. Electromyographic data from thirteen back and lower-limb muscles were acquired, together with kinematic data using inertial sensors. Four macroscopically invariant muscle synergies, extracted through non-negative matrix factorization, proved a shared modular organization across conditions. The fine-tuning of muscle synergies was studied through non-negative matrix reconstruction, applied by fixing muscle weights or activation profiles to those of the rectilinear condition. The activation profiles tended to be recruited for a longer period and with a larger amplitude during curvilinear walking. The muscles of the posterior side of the lower limb were those mainly influenced by the fine-tuning, with the muscles inside the rotation path being more active than the outer muscles. This study shows that rectilinear and curvilinear walking share a unique motor command. However, a fine-tuning in muscle synergies is introduced during curvilinear conditions, adapting the kinematic strategy to the new biomechanical needs.
40 CFR 35.145 - Maximum federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 35.145 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Air Pollution Control (section 105) § 35.145 Maximum federal share. (a) The Regional Administrator may provide air pollution control agencies, as...
40 CFR 35.145 - Maximum federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 35.145 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Air Pollution Control (section 105) § 35.145 Maximum federal share. (a) The Regional Administrator may provide air pollution control agencies, as...
40 CFR 35.145 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 35.145 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Air Pollution Control (section 105) § 35.145 Maximum federal share. (a) The Regional Administrator may provide air pollution control agencies, as...
Path Dependency and the Politics of Socialized Health Care.
Brady, David; Marquardt, Susanne; Gauchat, Gordon; Reynolds, Megan M
2016-06-01
Rich democracies exhibit vast cross-national and historical variation in the socialization of health care. Yet, cross-national analyses remain relatively rare in the health policy literature, and health care remains relatively neglected in the welfare state literature. We analyze pooled time series models of the public share of total health spending for eighteen rich democracies from 1960 to 2010. Building on path dependency theory, we present a strategy for modeling the relationship between the initial 1960 public share and the current public share. We also examine two contrasting accounts for how the 1960 public share interacts with conventional welfare state predictors: the self-reinforcing hypothesis expecting positive feedbacks and the counteracting hypothesis expecting negative feedbacks. We demonstrate that most of the variation from 1960 to 2010 in the public share can be explained by a country's initial value in 1960. This 1960 value has a large significant effect in models of 1961-2010, and including the 1960 value alters the coefficients of conventional welfare state predictors. To investigate the mechanism whereby prior social policy influences public opinion about current social policy, we use the 2006 International Social Survey Programme (ISSP). This analysis confirms that the 1960 values predict individual preferences for government spending on health. Returning to the pooled time series, we demonstrate that the 1960 values interact significantly with several conventional welfare state predictors. Some interactions support the self-reinforcing hypothesis, while others support the counteracting hypothesis. Ultimately, this study illustrates how historical legacies of social policy exert substantial influence on the subsequent politics of social policy. Copyright © 2016 by Duke University Press.
Levin, Lia; Schwartz-Tayri, Talia
2017-06-01
Partnerships between service users and social workers are complex in nature and can be driven by both personal and contextual circumstances. This study sought to explore the relationship between social workers' involvement in shared decision making with service users, their attitudes towards service users in poverty, moral standards and health and social care organizations' policies towards shared decision making. Based on the responses of 225 licensed social workers from health and social care agencies in the public, private and third sectors in Israel, path analysis was used to test a hypothesized model. Structural attributions for poverty contributed to attitudes towards people who live in poverty, which led to shared decision making. Also, organizational support in shared decision making, and professional moral identity, contributed to ethical behaviour which led to shared decision making. The results of this analysis revealed that shared decision making may be a scion of branched roots planted in the relationship between ethics, organizations and Stigma. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.
"I share, therefore I am": personality traits, life satisfaction, and Facebook check-ins.
Wang, Shaojung Sharon
2013-12-01
This study explored whether agreeableness, extraversion, and openness function to influence self-disclosure behavior, which in turn impacts the intensity of checking in on Facebook. A complete path from extraversion to Facebook check-in through self-disclosure and sharing was found. The indirect effect from sharing to check-in intensity through life satisfaction was particularly salient. The central component of check-in is for users to disclose a specific location selectively that has implications on demonstrating their social lives, lifestyles, and tastes, enabling a selective and optimized self-image. Implications on the hyperpersonal model and warranting principle are discussed.
Nuclear cloning and direct reprogramming: the long and the short path to Stockholm.
Jaenisch, Rudolf
2012-12-07
The two winners of the 2012 Nobel Prize in Physiology or Medicine share more than just this honor; they are both also fearless adventurers, in science and beyond. Copyright © 2012 Elsevier Inc. All rights reserved.
3 CFR 8991 - Proclamation 8991 of May 31, 2013. National Oceans Month, 2013
Code of Federal Regulations, 2014 CFR
2014-01-01
... critical role in nearly every part of our national life. They connect us to countries around the world, and... promote economic growth. The plan charts a path to better decision-making through science and data sharing...
... Wellness Staying Healthy Pets and Animals Cat and Dog Bites Cat and Dog Bites Share Print Cat and dog bites are common injuries. A family pet or ... bites. Path to safety If a cat or dog bites you, you should: Wash the wound gently ...
NASA Technical Reports Server (NTRS)
Keesler, E. L.
1974-01-01
The functional paths of the Orbital Maneuver Subsystem (OMS) is defined. The operational flight instrumentation required for performance monitoring, fault detection, and annunciation is described. The OMS is a pressure fed rocket engine propulsion subsystem. One complete OMS shares each of the two auxiliary propulsion subsystem pods with a reaction control subsystem. Each OMS is composed of a pressurization system, a propellant tanking system, and a gimbaled rocket engine. The design, development, and operation of the system are explained. Diagrams of the system are provided.
NASA Astrophysics Data System (ADS)
Abeywickrama, Sandu; Furdek, Marija; Monti, Paolo; Wosinska, Lena; Wong, Elaine
2016-12-01
Core network survivability affects the reliability performance of telecommunication networks and remains one of the most important network design considerations. This paper critically examines the benefits arising from utilizing dual-homing in the optical access networks to provide resource-efficient protection against link and node failures in the optical core segment. Four novel, heuristic-based RWA algorithms that provide dedicated path protection in networks with dual-homing are proposed and studied. These algorithms protect against different failure scenarios (i.e. single link or node failures) and are implemented with different optimization objectives (i.e., minimization of wavelength usage and path length). Results obtained through simulations and comparison with baseline architectures indicate that exploiting dual-homed architecture in the access segment can bring significant improvements in terms of core network resource usage, connection availability, and power consumption.
PathVisio 3: an extendable pathway analysis toolbox.
Kutmon, Martina; van Iersel, Martijn P; Bohler, Anwesha; Kelder, Thomas; Nunes, Nuno; Pico, Alexander R; Evelo, Chris T
2015-02-01
PathVisio is a commonly used pathway editor, visualization and analysis software. Biological pathways have been used by biologists for many years to describe the detailed steps in biological processes. Those powerful, visual representations help researchers to better understand, share and discuss knowledge. Since the first publication of PathVisio in 2008, the original paper was cited more than 170 times and PathVisio was used in many different biological studies. As an online editor PathVisio is also integrated in the community curated pathway database WikiPathways. Here we present the third version of PathVisio with the newest additions and improvements of the application. The core features of PathVisio are pathway drawing, advanced data visualization and pathway statistics. Additionally, PathVisio 3 introduces a new powerful extension systems that allows other developers to contribute additional functionality in form of plugins without changing the core application. PathVisio can be downloaded from http://www.pathvisio.org and in 2014 PathVisio 3 has been downloaded over 5,500 times. There are already more than 15 plugins available in the central plugin repository. PathVisio is a freely available, open-source tool published under the Apache 2.0 license (http://www.apache.org/licenses/LICENSE-2.0). It is implemented in Java and thus runs on all major operating systems. The code repository is available at http://svn.bigcat.unimaas.nl/pathvisio. The support mailing list for users is available on https://groups.google.com/forum/#!forum/wikipathways-discuss and for developers on https://groups.google.com/forum/#!forum/wikipathways-devel.
Research on Green Manufacturing Innovation Based on Resource Environment Protection
NASA Astrophysics Data System (ADS)
Jie, Xu
2017-11-01
Green manufacturing is a trend of manufacturing industry in the future, and is of great significance to resource protection and environmental protection. This paper first studies the green manufacturing innovation system, and then decomposes the green manufacturing innovation dimensions, and constructs the green manufacturing innovation dimension space. Finally, from the view of resource protection and environmental protection, this paper explores the path of green manufacturing innovation.
Privacy-preserving photo sharing based on a public key infrastructure
NASA Astrophysics Data System (ADS)
Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj
2015-09-01
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.
The growth and gaps of genetic data sharing policies in the United States
Arias, Jalayne J.; Pham-Kanter, Genevieve; Campbell, Eric G.
2014-01-01
The 1996 Bermuda Principles launched a new era in data sharing, reflecting a growing belief that the rapid public dissemination of research data was crucial to scientific progress in genetics. A historical review of data sharing policies in the field of genetics and genomics reflects changing scientific norms and evolving views of genomic data, particularly related to human subjects’ protections and privacy concerns. The 2013 NIH Draft Genomic Data Sharing (GDS) Policy incorporates the most significant protections and guidelines to date. The GDS Policy, however, will face difficult challenges ahead as geneticists seek to balance the very real concerns of research participants and the scientific norms that propel research forward. This article provides a novel evaluation of genetic and GDS policies’ treatment of human subjects’ protections. The article examines not only the policies, but also some of the most pertinent scientific, legal, and regulatory developments that occurred alongside data sharing policies. This historical perspective highlights the challenges that future data sharing policies, including the recently disseminated NIH GDS Draft Policy, will encounter. PMID:27774180
47 CFR 27.1164 - The cost-sharing formula.
Code of Federal Regulations, 2010 CFR
2010-10-01
... control equipment; engineering costs (design/path survey); installation; systems testing; FCC filing costs; site acquisition and civil works; zoning costs; training; disposal of old equipment; test equipment... a replacement system, such as equipment and engineering expenses. C may not exceed $250,000 per...
47 CFR 27.1164 - The cost-sharing formula.
Code of Federal Regulations, 2014 CFR
2014-10-01
... systems; Heating Ventilation and Air Conditioning (HVAC) (if required); alternate transport equipment; and.../path survey); installation; systems testing; FCC filing costs; site acquisition and civil works; zoning... defined as the actual costs associated with providing a replacement system, such as equipment and...
Stakeholders' views on data sharing in multicenter studies.
Mazor, Kathleen M; Richards, Allison; Gallagher, Mia; Arterburn, David E; Raebel, Marsha A; Nowell, W Benjamin; Curtis, Jeffrey R; Paolino, Andrea R; Toh, Sengwee
2017-09-01
To understand stakeholders' views on data sharing in multicenter comparative effectiveness research studies and the value of privacy-protecting methods. Semistructured interviews with five US stakeholder groups. We completed 11 interviews, involving patients (n = 15), researchers (n = 10), Institutional Review Board and regulatory staff (n = 3), multicenter research governance experts (n = 2) and healthcare system leaders (n = 4). Perceptions of the benefits and value of research were the strongest influences toward data sharing; cost and security risks were primary influences against sharing. Privacy-protecting methods that share summary-level data were acknowledged as being appealing, but there were concerns about increased cost and potential loss of research validity. Stakeholders were open to data sharing in multicenter studies that offer value and minimize security risks.
Project Scheduling Based on Risk of Gas Transmission Pipe
NASA Astrophysics Data System (ADS)
Silvianita; Nurbaity, A.; Mulyadi, Y.; Suntoyo; Chamelia, D. M.
2018-03-01
The planning of a project has a time limit on which must be completed before or right at a predetermined time. Thus, in a project planning, it is necessary to have scheduling management that is useful for completing a project to achieve maximum results by considering the constraints that will exists. Scheduling management is undertaken to deal with uncertainties and negative impacts of time and cost in project completion. This paper explains about scheduling management in gas transmission pipeline project Gresik-Semarang to find out which scheduling plan is most effectively used in accordance with its risk value. Scheduling management in this paper is assissted by Microsoft Project software to find the critical path of existing project scheduling planning data. Critical path is the longest scheduling path with the fastest completion time. The result is found a critical path on project scheduling with completion time is 152 days. Furthermore, the calculation of risk is done by using House of Risk (HOR) method and it is found that the critical path has a share of 40.98 percent of all causes of the occurence of risk events that will be experienced.
47 CFR 27.60 - TV/DTV interference protection criteria.
Code of Federal Regulations, 2013 CFR
2013-10-01
... the radio path horizon will be calculated assuming smooth earth. If the distance so determined equals... Section 27.60 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Technical Standards § 27.60 TV/DTV interference protection...
47 CFR 27.60 - TV/DTV interference protection criteria.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the radio path horizon will be calculated assuming smooth earth. If the distance so determined equals... Section 27.60 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Technical Standards § 27.60 TV/DTV interference protection...
47 CFR 27.60 - TV/DTV interference protection criteria.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the radio path horizon will be calculated assuming smooth earth. If the distance so determined equals... Section 27.60 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Technical Standards § 27.60 TV/DTV interference protection...
47 CFR 27.60 - TV/DTV interference protection criteria.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the radio path horizon will be calculated assuming smooth earth. If the distance so determined equals... Section 27.60 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Technical Standards § 27.60 TV/DTV interference protection...
Fast and accurate estimation of the covariance between pairwise maximum likelihood distances.
Gil, Manuel
2014-01-01
Pairwise evolutionary distances are a model-based summary statistic for a set of molecular sequences. They represent the leaf-to-leaf path lengths of the underlying phylogenetic tree. Estimates of pairwise distances with overlapping paths covary because of shared mutation events. It is desirable to take these covariance structure into account to increase precision in any process that compares or combines distances. This paper introduces a fast estimator for the covariance of two pairwise maximum likelihood distances, estimated under general Markov models. The estimator is based on a conjecture (going back to Nei & Jin, 1989) which links the covariance to path lengths. It is proven here under a simple symmetric substitution model. A simulation shows that the estimator outperforms previously published ones in terms of the mean squared error.
Fast and accurate estimation of the covariance between pairwise maximum likelihood distances
2014-01-01
Pairwise evolutionary distances are a model-based summary statistic for a set of molecular sequences. They represent the leaf-to-leaf path lengths of the underlying phylogenetic tree. Estimates of pairwise distances with overlapping paths covary because of shared mutation events. It is desirable to take these covariance structure into account to increase precision in any process that compares or combines distances. This paper introduces a fast estimator for the covariance of two pairwise maximum likelihood distances, estimated under general Markov models. The estimator is based on a conjecture (going back to Nei & Jin, 1989) which links the covariance to path lengths. It is proven here under a simple symmetric substitution model. A simulation shows that the estimator outperforms previously published ones in terms of the mean squared error. PMID:25279263
Novel Diffusivity Measurement Technique
NASA Technical Reports Server (NTRS)
Rashidnia, Nasser
2001-01-01
A common-path interferometer (CPI) system was developed to measure the diffusivity of liquid pairs. The CPI is an optical technique that can be used to measure changes in the gradient of the refraction index of transparent materials. This system uses a shearing interferometer that shares the same optical path from a laser light source to the final imaging plane. Hence, the molecular diffusion coefficient of liquids can be determined using the physical relations between changes in the optical path length and the liquid phase properties. The data obtained with this interferometer were compared with similar results from other techniques and demonstrated that the instrument is superior in measuring the diffusivity of miscible liquids while keeping the system very compact and robust. CPI can also be used for studies in interface dynamics and other diffusion-dominated-process applications.
Comparison of two paradigms for distributed shared memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Levelt, W.G.; Kaashoek, M.F.; Bal, H.E.
1990-08-01
The paper compares two paradigms for Distributed Shared Memory on loosely coupled computing systems: the shared data-object model as used in Orca, a programming language specially designed for loosely coupled computing systems and the Shared Virtual Memory model. For both paradigms the authors have implemented two systems, one using only point-to-point messages, the other using broadcasting as well. They briefly describe these two paradigms and their implementations. Then they compare their performance on four applications: the traveling salesman problem, alpha-beta search, matrix multiplication and the all pairs shortest paths problem. The measurements show that both paradigms can be used efficientlymore » for programming large-grain parallel applications. Significant speedups were obtained on all applications. The unstructured Shared Virtual Memory paradigm achieves the best absolute performance, although this is largely due to the preliminary nature of the Orca compiler used. The structured shared data-object model achieves the highest speedups and is much easier to program and to debug.« less
Nursing 1000: a mosaic of lessons learned from patients.
Quinlan-Colwell, Ann
2010-09-01
Throughout my nursing career, I have been most grateful for the education and lessons that I received from the many gifted women and men faculty in the nursing programs I attended. From learning how to give a bed bath and intramuscular injections to writing a doctoral research proposal, the information, wisdom, guidance, and resources they shared with me are invaluable. I also am fortunate to have had the privilege of caring for many patients from whom I also learned invaluable lessons. Together, this latter group of women and men formed the faculty of Nursing 1000. They are the patients who were instrumental in shaping me and my nursing career. Many of them are no longer alive, and all of our paths have diverged, yet they remain influential in how I work with patients on a daily basis. The lessons they taught me form a most special montage. This mosaic article is a way to share with others what the faculty of Nursing 1000 taught me. It is also, in a small way, a tribute to all of the unique men and women with whom, as a nurse, I have shared transpersonal caring experiences and from whom I have learned much. The faculty of Nursing 1000 is composed of a variety of patients for whom I cared and who taught me valuable lessons that guided me in how to better care for patients in the future. Although the Nursing 1000 faculty are no longer physically part of my life, each day they continue to influence how I interact with others. The lessons they taught form a very special mosaic. To protect their confidentiality, all patient names are pseudonyms.
Robert Slevc, L.; Rosenberg, Jason C.; Patel, Aniruddh D.
2009-01-01
Linguistic processing–especially syntactic processing–is often considered a hallmark of human cognition, thus the domain-specificity or domain-generality of syntactic processing has attracted considerable debate. These experiments address this issue by simultaneously manipulating syntactic processing demands in language and music. Participants performed self-paced reading of garden-path sentences in which structurally unexpected words cause temporary syntactic processing difficulty. A musical chord accompanied each sentence segment, with the resulting sequence forming a coherent chord progression. When structurally unexpected words were paired with harmonically unexpected chords, participants showed substantially enhanced garden-path effects. No such interaction was observed when the critical words violated semantic expectancy, nor when the critical chords violated timbral expectancy. These results support a prediction of the shared syntactic integration resource hypothesis (SSIRH, Patel, 2003), which suggests that music and language draw on a common pool of limited processing resources for integrating incoming elements into syntactic structures. PMID:19293110
Building a Shared Definitional Model of Long Duration Human Spaceflight
NASA Technical Reports Server (NTRS)
Arias, Diana; Orr, Martin; Whitmire, Alexandra; Leveton, Lauren; Sandoval, Luis
2012-01-01
Objective: To establish the need for a shared definitional model of long duration human spaceflight, that would provide a framework and vision to facilitate communication, research and practice In 1956, on the eve of human space travel, Hubertus Strughold first proposed a "simple classification of the present and future stages of manned flight" that identified key factors, risks and developmental stages for the evolutionary journey ahead. As we look to new destinations, we need a current shared working definitional model of long duration human space flight to help guide our path. Here we describe our preliminary findings and outline potential approaches for the future development of a definition and broader classification system
SE Requirements Development Tool User Guide
DOE Office of Scientific and Technical Information (OSTI.GOV)
Benson, Faith Ann
2016-05-13
The LANL Systems Engineering Requirements Development Tool (SERDT) is a data collection tool created in InfoPath for use with the Los Alamos National Laboratory’s (LANL) SharePoint sites. Projects can fail if a clear definition of the final product requirements is not performed. For projects to be successful requirements must be defined early in the project and those requirements must be tracked during execution of the project to ensure the goals of the project are met. Therefore, the focus of this tool is requirements definition. The content of this form is based on International Council on Systems Engineering (INCOSE) and Departmentmore » of Defense (DoD) process standards and allows for single or collaborative input. The “Scoping” section is where project information is entered by the project team prior to requirements development, and includes definitions and examples to assist the user in completing the forms. The data entered will be used to define the requirements and once the form is filled out, a “Requirements List” is automatically generated and a Word document is created and saved to a SharePoint document library. SharePoint also includes the ability to download the requirements data defined in the InfoPath from into an Excel spreadsheet. This User Guide will assist you in navigating through the data entry process.« less
Professional Certification in Counseling Psychology.
ERIC Educational Resources Information Center
Fretz, Bruce R.; And Others
1980-01-01
Certification procedures protect consumers, but when licensing institutions become monopolistic, alternative paths to credentialing need to be considered. A series of articles examine third party payments, a changing job market and consumer protection concerns, all of which have had an impact on credentialing problems. (JAC)
47 CFR 27.60 - TV/DTV interference protection criteria.
Code of Federal Regulations, 2014 CFR
2014-10-01
... average terrain, the distance to the radio path horizon will be calculated assuming smooth earth. If the... Section 27.60 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Technical Standards § 27.60 TV/DTV interference protection...
Crespin, Silvio J; García-Villalta, Jorge E
2014-10-01
Nations with little remaining natural habitat and small extent are challenged when trying to achieve biodiversity targets. We show that the Central American nation of El Salvador cannot viably sustain populations of 87 % of its extant carnivores, especially in the case of large-bodied species with low population densities. Current land-sparing strategies will not suffice; therefore we propose that land-sharing strategies be implemented in tandem with protected areas to expand current conservation efforts via new regional networks. In Central America such a network can be established by linking international protected area systems in a way that implements the existing vision for the Mesoamerican Biological Corridor. Specifically, we propose a re-envisioning of the Mesoamerican Biological Corridor in which land-sharing practices are adopted throughout the agricultural matrix while ensuring formal protection of the remaining natural habitat. Such an integration of land-sparing and land-sharing could result in the creation of an effective network of protected areas, thereby increasing the probability of safeguarding species with populations that overlap national borders.
Exploring team working and shared leadership in multi-disciplinary cancer care.
Willcocks, Stephen George
2018-02-05
Purpose The purpose of this paper is to explore the relevance of shared leadership to multi-disciplinary cancer care. It examines the policy background and applies concepts from shared leadership to this context. It includes discussion of the implications and recommendations. Design/methodology/approach This is a conceptual paper examining policy documents and secondary literature on the topic. While it focuses on the UK National Health Services, it is also relevant to other countries given they follow a broadly similar path with regard to multi-disciplinary working. Findings The paper suggests that shared leadership is a possible way forward for multi-disciplinary cancer care, particularly as policy developments are supportive of this. It shows that a shared perspective is likely to be beneficial to the further development of multi-disciplinary working. Research limitations/implications Adopting shared leadership needs to be explored further using appropriate empirical research. Practical implications The paper offers comments on the implications of introducing shared leadership and makes recommendations including being aware of the barriers to its implementation. Originality/value The paper offers an alternative view on leadership in the health-care context.
Nudges, Pulls, and Serendipity: Multiple Pathways to Faculty Development
ERIC Educational Resources Information Center
Stockley, Denise; McDonald, Jeanette; Hoessler, Carolyn
2015-01-01
Building on the rich faculty development literature worldwide, recent scholarship on the advancement, professionalism, and career paths of individuals entering the field has received greater attention. Through focus group discussions, faculty developers from colleges and universities around the world shared their pathways into and through faculty…
47 CFR 27.1180 - The cost-sharing formula.
Code of Federal Regulations, 2010 CFR
2010-10-01
...); towers and/or modifications; back-up power equipment; monitoring or control equipment; engineering costs (design/path survey); installation; systems testing; FCC filing costs; site acquisition and civil works... as equipment and engineering expenses. There is no cap on the actual costs of relocation. (c) An AWS...
75 FR 60164 - Notice of Final Federal Agency Actions on Proposed Shared-Use Path in New York State
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-29
.... Social and Economic: Civil Rights Act of 1964 [42 U.S.C. 2000(d)-2000(d)(1)]; American Indian Religious... and Enhancement of Cultural Resources; E.O. 13007 Indian Sacred Sites; E.O. 13287 Preserve America; E...
Evaluation of shared lane markings in Miami Beach, Florida [summary].
DOT National Transportation Integrated Search
2012-01-01
On urban streets, bicyclists must often ride in the narrow gap between traffic and parked cars, where they may become victims of a "dooring" crash, in which the door of a parked car opens suddenly into the bicyclist's path. The bicyclist can be injur...
14 CFR 420.71 - Lightning protection.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Lightning protection. 420.71 Section 420.71 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... path connecting an air terminal to an earth electrode system. (iii) Earth electrode system. An earth...
NASA Technical Reports Server (NTRS)
Raofi, Behzad
2005-01-01
This paper describes the methods used to estimate the statistical deltaV requirements for the propulsive maneuvers that will deliver the spacecraft to its target landing site while satisfying planetary protection requirements. the paper presents flight path control analysis results for three different trajectories, open, middle, and close of launch period for the mission.
Land-Sparing Agriculture Best Protects Avian Phylogenetic Diversity.
Edwards, David P; Gilroy, James J; Thomas, Gavin H; Uribe, Claudia A Medina; Haugaasen, Torbjørn
2015-09-21
The conversion of natural habitats to farmland is a major driver of the global extinction crisis. Two strategies are promoted to mitigate the impacts of agricultural expansion on biodiversity: land sharing integrates wildlife-friendly habitats within farmland landscapes, and land sparing intensifies farming to allow the offset of natural reserves. A key question is which strategy would protect the most phylogenetic diversity--the total evolutionary history shared across all species within a community. Conserving phylogenetic diversity decreases the chance of losing unique phenotypic and ecological traits and provides benefits for ecosystem function and stability. Focusing on birds in the threatened Chocó-Andes hotspot of endemism, we tested the relative benefits of each strategy for retaining phylogenetic diversity in tropical cloud forest landscapes threatened by cattle pastures. Using landscape simulations, we find that land sharing would protect lower community-level phylogenetic diversity than land sparing and that with increasing distance from forest (from 500 to >1,500 m), land sharing is increasingly inferior to land sparing. Isolation from forest also leads to the loss of more evolutionarily distinct species from communities within land-sharing landscapes, which can be avoided with effective land sparing. Land-sharing policies that promote the integration of small-scale wildlife-friendly habitats might be of limited benefit without the simultaneous protection of larger blocks of natural habitat, which is most likely to be achieved via land-sparing measures. Copyright © 2015 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Utama, Briandhika; Purqon, Acep
2016-08-01
Path Integral is a method to transform a function from its initial condition to final condition through multiplying its initial condition with the transition probability function, known as propagator. At the early development, several studies focused to apply this method for solving problems only in Quantum Mechanics. Nevertheless, Path Integral could also apply to other subjects with some modifications in the propagator function. In this study, we investigate the application of Path Integral method in financial derivatives, stock options. Black-Scholes Model (Nobel 1997) was a beginning anchor in Option Pricing study. Though this model did not successfully predict option price perfectly, especially because its sensitivity for the major changing on market, Black-Scholes Model still is a legitimate equation in pricing an option. The derivation of Black-Scholes has a high difficulty level because it is a stochastic partial differential equation. Black-Scholes equation has a similar principle with Path Integral, where in Black-Scholes the share's initial price is transformed to its final price. The Black-Scholes propagator function then derived by introducing a modified Lagrange based on Black-Scholes equation. Furthermore, we study the correlation between path integral analytical solution and Monte-Carlo numeric solution to find the similarity between this two methods.
Chargé, Pascal; Bazzi, Oussama; Ding, Yuehua
2018-01-01
A parametric scheme for spatially correlated sparse multiple-input multiple-output (MIMO) channel path delay estimation in scattering environments is presented in this paper. In MIMO outdoor communication scenarios, channel impulse responses (CIRs) of different transmit–receive antenna pairs are often supposed to be sparse due to a few significant scatterers, and share a common sparse pattern, such that path delays are assumed to be equal for every transmit–receive antenna pair. In some existing works, an exact common support condition is exploited, where the path delays are considered equal for every transmit–receive antenna pair, meanwhile ignoring the influence of scattering. A more realistic channel model is proposed in this paper, where due to scatterers in the environment, the received signals are modeled as clusters of multi-rays around a nominal or mean time delay at different antenna elements, resulting in a non-strictly exact common support phenomenon. A method for estimating the channel mean path delays is then derived based on the subspace approach, and the tracking of the effective dimension of the signal subspace that changes due to the wireless environment. The proposed method shows an improved channel mean path delays estimation performance in comparison with the conventional estimation methods. PMID:29734797
Mohydeen, Ali; Chargé, Pascal; Wang, Yide; Bazzi, Oussama; Ding, Yuehua
2018-05-06
A parametric scheme for spatially correlated sparse multiple-input multiple-output (MIMO) channel path delay estimation in scattering environments is presented in this paper. In MIMO outdoor communication scenarios, channel impulse responses (CIRs) of different transmit⁻receive antenna pairs are often supposed to be sparse due to a few significant scatterers, and share a common sparse pattern, such that path delays are assumed to be equal for every transmit⁻receive antenna pair. In some existing works, an exact common support condition is exploited, where the path delays are considered equal for every transmit⁻receive antenna pair, meanwhile ignoring the influence of scattering. A more realistic channel model is proposed in this paper, where due to scatterers in the environment, the received signals are modeled as clusters of multi-rays around a nominal or mean time delay at different antenna elements, resulting in a non-strictly exact common support phenomenon. A method for estimating the channel mean path delays is then derived based on the subspace approach, and the tracking of the effective dimension of the signal subspace that changes due to the wireless environment. The proposed method shows an improved channel mean path delays estimation performance in comparison with the conventional estimation methods.
40 CFR 35.675 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.675 Section... (section 1443(a) and Section 1451) § 35.675 Maximum federal share. (a) The Regional Administrator may... maximum federal share if the Tribe or Intertribal Consortium can demonstrate in writing to the...
40 CFR 35.575 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.575 Section...) § 35.575 Maximum federal share. (a) For Tribes and Intertribal Consortia eligible under § 35.573(a... the maximum federal share to 90 percent if the Regional Administrator determines that the Tribe or...
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
NASA Astrophysics Data System (ADS)
Chen, Liqun; Escalante B., Alberto N.; Löhr, Hans; Manulis, Mark; Sadeghi, Ahmad-Reza
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et al. (FC 2005), introduced an unforgeable privacy-protecting MC system with constant complexity for issuing and redemption of MCs, that discourages sharing of coupons through a property called weak unsplittability, where sharing of a single coupon implies sharing of the whole multi-coupon (all-or-nothing sharing). Both schemes still lack some features required by many applications in practice, and also stronger forms of unsplittability are desirable. In this paper, we propose a new security model for MC systems with stronger definitions, followed by a concrete realization where single coupons within a MC may represent different goods or services, have independent validity periods, and must be redeemed sequentially ensuring a stronger version of unsplittability compared to all-or-nothing sharing. The complexity of the proposed scheme is linear in k for the generation of multi-coupons and constant for each redeemed single coupon.
Patellar fixation protected with a load-sharing cable: a mechanical and clinical study.
Perry, C R; McCarthy, J A; Kain, C C; Pearson, R L
1988-01-01
The stability of patellar fracture fixation protected with a load-sharing cable was studied in cadavers. A transverse patellar osteotomy was produced and stabilized with standard patellar fixation with or without a figure-of-eight cable that extends from the proximal pole of the patella to the tibial tubercle. Standard fixation techniques (interfragmentary cancellous screws or modified tension-band wiring) alone failed after significantly fewer cycles of flexion and extension than did the same fixation when supplemented with a load-sharing cable. In the clinical evaluation of the load-sharing cable, 14 consecutive patients with displaced patellar fractures were treated. No immobilization was used and the patients were started on passive and active range of motion and weight-bearing ambulation in the early postoperative period. Thirteen fractures healed uneventfully. The increased stability of patellar fracture fixation protected with a load-sharing cable offers three advantages: (a) adjunctive casting is unnecessary, (b) comminuted fractures can be "pieced" together anatomically with less concern for loss of fixation, and (c) early postoperative passive and active range of motion can be achieved.
NASA Astrophysics Data System (ADS)
Ozaki, Hirokazu; Kara, Atsushi; Cheng, Zixue
2012-05-01
In this article, we investigate the reliability of M-for-N (M:N) shared protection systems. We focus on the reliability that is perceived by an end user of one of N units. We assume that any failed unit is instantly replaced by one of the M units (if available). We describe the effectiveness of such a protection system in a quantitative manner under the condition that the failed units are not repairable. Mathematical analysis gives the closed-form solution of the reliability and mean time to failure (MTTF). We also analyse several numerical examples of the reliability and MTTF. This result can be applied, for example, to the analysis and design of an integrated circuit consisting of redundant backup components. In such a device, repairing a failed component is unrealistic. The analysis provides useful information for the design for general shared protection systems in which the failed units are not repaired.
New device architecture of a thermoelectric energy conversion for recovering low-quality heat
NASA Astrophysics Data System (ADS)
Kim, Hoon; Park, Sung-Geun; Jung, Buyoung; Hwang, Junphil; Kim, Woochul
2014-03-01
Low-quality heat is generally discarded for economic reasons; a low-cost energy conversion device considering price per watt, /W, is required to recover this waste heat. Thin-film based thermoelectric devices could be a superior alternative for this purpose, based on their low material consumption; however, power generated in conventional thermoelectric device architecture is negligible due to the small temperature drop across the thin film. To overcome this challenge, we propose new device architecture, and demonstrate approximately 60 Kelvin temperature differences using a thick polymer nanocomposite. The temperature differences were achieved by separating the thermal path from the electrical path; whereas in conventional device architecture, both electrical charges and thermal energy share same path. We also applied this device to harvest body heat and confirmed its usability as an energy conversion device for recovering low-quality heat.
Dialogue as Moral Paradigm: Paths toward Intercultural Transformation
ERIC Educational Resources Information Center
Keller, J. Gregory
2011-01-01
The Council of Europe's 2008 "White Paper on Intercultural Dialogue: 'living together as equals in dignity'" points to the need for shared values upon which intercultural dialogue might rest. In order, however, to overcome the monologic separateness that threatens community, we must educate ourselves to recognize the dialogism of our…
Lean in and Lift up: Female Superintendents Share Their Career Path Choices
ERIC Educational Resources Information Center
Kelsey, Cheryl; Allen, Kathy; Coke, Kelly; Ballard, Glenda
2014-01-01
The purpose of the research was to inform professional practice pertaining to the preparation of female administrators as future school superintendents. Twenty female superintendents in Texas were interviewed using a qualitative research approach. Strategies, career experiences and perception of barriers were identified using open-ended questions.…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-13
... guidelines would apply to the design, construction, and alteration of pedestrian facilities in the public... guidelines for the design, construction, and alteration of facilities covered by the Americans with... required to adopt accessibility standards for the design, construction, and alteration of facilities...
Counterfactual quantum erasure: spooky action without entanglement
NASA Astrophysics Data System (ADS)
Salih, Hatim
2018-02-01
We combine the eyebrow-raising quantum phenomena of erasure and counterfactuality for the first time, proposing a simple yet unusual quantum eraser: A distant Bob can decide to erase which-path information from Alice's photon, dramatically restoring interference-without previously shared entanglement, and without Alice's photon ever leaving her laboratory.
Counterfactual quantum erasure: spooky action without entanglement.
Salih, Hatim
2018-02-01
We combine the eyebrow-raising quantum phenomena of erasure and counterfactuality for the first time, proposing a simple yet unusual quantum eraser: A distant Bob can decide to erase which-path information from Alice's photon, dramatically restoring interference-without previously shared entanglement, and without Alice's photon ever leaving her laboratory.
Virtually Unpacking Your Backpack: Educational Philosophy and Pedagogical Praxis
ERIC Educational Resources Information Center
Franklin, Yvette
2014-01-01
In this autoethnographic, conceptual philosophical reflection, the author inquires: "Can my students and I, in a technologically mediated virtual space, harness the work of philosophy of education scholars to engage in a shared experience of (re)considering paths to sensitivity to diversity for equity and equality?" The author engages…
Scientific career paths - part I.
Gemayel, Rita
2017-02-01
In this instalment of the Words of Advice series, PhD-level scientists working in a wide range of disciplines share with us their insider's view on their roles, the steps they took to enter these professions and the attributes needed for a successful career. © 2017 Federation of European Biochemical Societies.
Santiago-Rivas, Marimer; Velicer, Wayne F; Redding, Colleen
2015-01-01
Mediation analyses of sun protection were conducted testing structural equation models using longitudinal data with three waves. An effect was said to be mediated if the standardised path between processes of change, decisional balance and sun protection outcomes was significant. Longitudinal models of sun protection using data from individuals in the precontemplation (N = 964) and preparation (N = 463) stages who participated of an expert system intervention. Nine processes of change for sun protection, decisional balance constructs of sun protection (pros and cons), sun avoidance behaviour and sunscreen use. With the exception of two processes in the preparation stage, processes of change predicted the pros (r = .126-.614), and the pros predicted the outcomes (r = .181-.272). Three models with the cons as mediator in the preparation stage, and none in the precontemplation stage, showed a mediated relationship between processes and outcomes. In general, mediation analyses found both the process of change-to-pros and pros-to-behaviour paths significant for both precontemplation and preparation stages, and for both sun avoidance and sunscreen use outcomes. Findings provide support for the importance of assessing the role of underlying risk cognitions in improving sun protection adherence.
Velicer, Wayne F.; Redding, Colleen
2015-01-01
Objective Mediation analyses of sun protection were conducted testing structural equation models using longitudinal data with three waves. An effect was said to be mediated if the standardized path between processes of change, decisional balance, and sun protection outcomes were significant. Design Longitudinal models of sun protection using data from individuals in the precontemplation (N=964) and preparation (N =463) stages who participated of an expert system intervention. Main Outcome Measures Nine processes of change for sun protection, decisional balance constructs of sun protection (pros and cons), sun avoidance behavior, and sunscreen use. Results With the exception of two processes in the preparation stage, processes of change predicted the pros (r= .126 to .614), and the pros predicted the outcomes (r= .181 to .272). Three models with the cons as mediator in the preparation stage, and none in the precontemplation stage, showed a mediated relationship between processes and outcomes. Conclusion In general, mediation analyses found both the process of change-to-pros and pros-to-behavior paths significant for both precontemplation and preparation stages, and for both sun avoidance and sunscreen use outcomes. Findings provide support for the importance of assessing the role of underlying risk cognitions in improving sun protection adherence. PMID:26040293
Sharing health-related data: a privacy test?
Dyke, Stephanie OM; Dove, Edward S; Knoppers, Bartha M
2016-01-01
Greater sharing of potentially sensitive data raises important ethical, legal and social issues (ELSI), which risk hindering and even preventing useful data sharing if not properly addressed. One such important issue is respecting the privacy-related interests of individuals whose data are used in genomic research and clinical care. As part of the Global Alliance for Genomics and Health (GA4GH), we examined the ELSI status of health-related data that are typically considered ‘sensitive’ in international policy and data protection laws. We propose that ‘tiered protection’ of such data could be implemented in contexts such as that of the GA4GH Beacon Project to facilitate responsible data sharing. To this end, we discuss a Data Sharing Privacy Test developed to distinguish degrees of sensitivity within categories of data recognised as ‘sensitive’. Based on this, we propose guidance for determining the level of protection when sharing genomic and health-related data for the Beacon Project and in other international data sharing initiatives. PMID:27990299
40 CFR 35.6235 - Cost sharing.
Code of Federal Regulations, 2010 CFR
2010-07-01
... § 35.6285 (c), (d), and (f) regarding credit, excess cash cost share contributions/over match, and... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Cost sharing. 35.6235 Section 35.6235... Cooperative Agreements § 35.6235 Cost sharing. A State must provide at least ten percent of the direct and...
Lightning discharge protection rod
NASA Technical Reports Server (NTRS)
Bryan, Charles F., Jr. (Inventor)
1987-01-01
A system for protecting an in-air vehicle from damage due to a lighning strike is disclosed. It is an extremely simple device consisting of a sacrificial graphite composite rod, approximately the diameter of a pencil with a length of about five inches. The sacrificial rod is constructed with the graphite fibers running axially within the rod in a manner that best provides a path of conduction axially from the trailing edge of an aircraft to the trailing end of the rod. The sacrificial rod is inserted into an attachment hole machined into trailing edges of aircraft flight surfaces, such as a vertical fin cap and attached with adhesive in a manner not prohibiting the conduction path between the rod and the aircraft. The trailing end of the rod may be tapered for aerodynamic and esthetic requirements. This rod is sacrificial but has the capability to sustain several lightning strikes and still provide protection.
Childhood Predictors of Teen Dating Violence Victimization
Maas, Carl D.; Fleming, Charles B.; Herrenkohl, Todd I.; Catalano, Richard F.
2009-01-01
Most research on predictors of teen dating violence (TDV) has used cross-sectional data, which weakens predictive modeling and hypothesis testing analyses. This study uses prospective and retrospective longitudinal data on a community sample to examine previously identified predictors of TDV victimization and pathways from childhood risk and protection to TDV victimization. Data are from 941 participants in the Raising Healthy Children project. Bivariate analyses found associations in the expected direction between potential predictors and TDV victimization. For girls, a multivariate path model indicated that higher levels of bonding to parents and social skills protected against TDV victimizations, partly by reducing early adolescent alcohol use. While externalizing and internalizing behaviors in early adolescence were predicted by childhood risk and protective factors for girls, neither uniquely predicted TDV victimization. For boys, there was an indirect path from childhood bonding to parents to TDV victimization through early adolescent externalizing behavior. PMID:20514813
... medlineplus.gov/ency/patientinstructions/000447.htm Personal protective equipment To use the sharing features on this page, please enable JavaScript. Personal protective equipment is special equipment you wear to create a ...
Zhong, Shi-Yu; Wu, Qing; Li, Yu; Cheng, Jin-Ping
2012-11-01
Based on the source-sink landscape theory and the principles of ecosystem services, the minimum cumulative resistance (MCR) model was modified, where the urban center construction land was taken as the expansion source, and the contribution rate of ecological land ecosystem services value was considered as the resistance coefficient. With the modified MCR, the urban spatial expansion process of Xintang Town, Guangzhou City was successfully simulated, and, based on the protection of ecological security pattern, the optimum path for reconstructing urban land space was put forward. The simulated urban spatial expansion short path in 1988-2008 was in accordance with the real situation. By the modified MCR, the urban space was divided into four zones of high, higher, medium, and low resistance, with the area of 80.84, 78.90, 24.26, and 61.88 km2, respectively. The expansion path of the urban space was along the route from low to medium and then to high resistance zones successively. The land suitable for eco-protection and construction had an area of 159.74 km2 and 86.14 km2, while the ecological conflict area (17.37 km2) was mainly located in higher and high resistance zones, being 10.38 and 6.99 km2, respectively. The modified MCR could not only effectively reflect the distribution area of urban land use and the conflict relationship between urban construction and ecological protection, but also reasonably judge the best developmental short path for urban spatial expansion.
Evaluating the risk of industrial espionage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bott, T.F.
1998-12-31
A methodology for estimating the relative probabilities of different compromise paths for protected information by insider and visitor intelligence collectors has been developed based on an event-tree analysis of the intelligence collection operation. The analyst identifies target information and ultimate users who might attempt to gain that information. The analyst then uses an event tree to develop a set of compromise paths. Probability models are developed for each of the compromise paths that user parameters based on expert judgment or historical data on security violations. The resulting probability estimates indicate the relative likelihood of different compromise paths and provide anmore » input for security resource allocation. Application of the methodology is demonstrated using a national security example. A set of compromise paths and probability models specifically addressing this example espionage problem are developed. The probability models for hard-copy information compromise paths are quantified as an illustration of the results using parametric values representative of historical data available in secure facilities, supplemented where necessary by expert judgment.« less
Hong, Wuyang; Yang, Chengyun; Chen, Liuxin; Zhang, Fangfang; Shen, Shaoqing; Guo, Renzhong
2017-04-15
Ecological control line is a system innovation in the field of ecological environment protection in China and it has become as an important strategy of national ecological protection. Ten years have passed since the first ecological control line in Shenzhen was delimited in 2005. This study examines the connotations of ecological control line and the current study status in China and abroad, and then takes a brief description about the delimitation background and existing problems of the ecological control line in Shenzhen. The problem-solving strategy is gradually transforming from extensive management to refined management. This study proposes a differential ecological space management model that merges the space system, management system, and support system. The implementation paths include the following five aspects: delimiting ecological bottom lines to protect core ecological resources; formulating access systems for new construction projects to strictly control new construction; implementing construction land inventory reclamation assisted by market means; regulating boundary adjusting procedures and processes; and constructing ecological equity products by using multiple means to implement rights relief. Finally, this study illustrates the progress of the implementation and discusses the rigorousness and flexibility problems of ecological control line and calls for the promotion of the legislation. The management model and implementation paths proposed in this study have referential significance for developing countries and megacities to achieve ecological protection and sustainable development. Copyright © 2017 Elsevier Ltd. All rights reserved.
... Offices Regional Offices Labs and Research Centers Radiation Protection Contact Us Share Dose Calculator Use the Radiation ... the Office of Air and Radiation (OAR) Radiation Protection Radiation Sources and Doses Calculate Your Radiation Dose ...
Hanna, K M; Dashiff, C J; Stump, T E; Weaver, M T
2013-09-01
Parent-adolescent shared responsibility for diabetes care is advocated by experts to achieve beneficial diabetes and psychosocial outcomes for adolescents with type 1 diabetes. Parental autonomy support may be a way to facilitate this sharing. In this dyadic study, we examined parental diabetes-specific autonomy support experienced by adolescents with type 1 diabetes and their parents (n = 89 dyads), and its association with their experience of shared diabetes care responsibility. Path analysis was used to test an Actor-Partner Interdependence Model for parental autonomy support effects on shared responsibility. This was a secondary analysis of data from 89 parent-early/mid-adolescent dyads. Actor effects were identified. Parents' and adolescents' perceptions of parental autonomy support were associated with their respective reports of shared diabetes care responsibility. One partner effect was identified. Adolescents' reports of parental autonomy support were associated with parents' reports of shared responsibility. Parents and adolescents held similar views of autonomy support but discrepant views of shared responsibility. Older adolescents perceived less parental autonomy support. Increasing parental autonomy support may facilitate parent-adolescent sharing of diabetes care responsibility. Adolescent and parent perceptions influence each other and need to be considered when working with them to strengthen parental autonomy support. © 2012 John Wiley & Sons Ltd.
Developing a competency framework for U.S. state food and feed testing laboratory personnel.
Kaml, Craig; Weiss, Christopher C; Dezendorf, Paul; Ishida, Maria; Rice, Daniel H; Klein, Ron; Salfinger, Yvonne
2014-01-01
A competency-based training curriculum framework for U.S. state food and feed testing laboratories personnel is being developed by the International Food Protection Training Institute (IFPTI) and three partners. The framework will help laboratories catalog existing training courses/modules, identify training gaps, inform training curricula, and create career-spanning professional development learning paths, ensuring consistent performance expectations and increasing confidence in shared test results. Ultimately, the framework will aid laboratories in meeting the requirements of ISO/IEC 17025 (2005) international accreditation and the U.S. Food Safety Modernization Act (U.S. Public Law 111-353). In collaboration with the Association of Food and Drug Officials, the Association of Public Health Laboratories, and the Association of American Feed Control Officials, IFPTI is carrying out the project in two phases. In 2013, an expert panel of seven subject matter experts developed competency and curriculum frameworks for five professional levels (entry, mid-level, expert, supervisor/manager, and senior administration) across four competency domains (technical, communication, programmatic, and leadership) including approximately 80 competencies. In 2014 the expert panel will elicit feedback from peers and finalize the framework.
Protecting personal data in epidemiological research: DataSHIELD and UK law.
Wallace, Susan E; Gaye, Amadou; Shoush, Osama; Burton, Paul R
2014-01-01
Data from individual collections, such as biobanks and cohort studies, are now being shared in order to create combined datasets which can be queried to ask complex scientific questions. But this sharing must be done with due regard for data protection principles. DataSHIELD is a new technology that queries nonaggregated, individual-level data in situ but returns query data in an anonymous format. This raises questions of the ability of DataSHIELD to adequately protect participant confidentiality. An ethico-legal analysis was conducted that examined each step of the DataSHIELD process from the perspective of UK case law, regulations, and guidance. DataSHIELD reaches agreed UK standards of protection for the sharing of biomedical data. All direct processing of personal data is conducted within the protected environment of the contributing study; participating studies have scientific, ethics, and data access approvals in place prior to the analysis; studies are clear that their consents conform with this use of data, and participants are informed that anonymisation for further disclosure will take place. DataSHIELD can provide a flexible means of interrogating data while protecting the participants' confidentiality in accordance with applicable legislation and guidance. © 2014 S. Karger AG, Basel.
The European Union's Adequacy Approach to Privacy and International Data Sharing in Health Research.
Stoddart, Jennifer; Chan, Benny; Joly, Yann
2016-03-01
The European Union (EU) approach to data protection consists of assessing the adequacy of the data protection offered by the laws of a particular jurisdiction against a set of principles that includes purpose limitation, transparency, quality, proportionality, security, access, and rectification. The EU's Data Protection Directive sets conditions on the transfer of data to third countries by prohibiting Member States from transferring to such countries as have been deemed inadequate in terms of the data protection regimes. In theory, each jurisdiction is evaluated similarly and must be found fully compliant with the EU's data protection principles to be considered adequate. In practice, the inconsistency with which these evaluations are made presents a hurdle to international data-sharing and makes difficult the integration of different data-sharing approaches; in the 20 years since the Directive was first adopted, the laws of only five countries from outside of the EU, Economic Area, or the European Free Trade Agreement have been deemed adequate to engage in data transfers without the need for further administrative safeguards. © 2016 American Society of Law, Medicine & Ethics.
76 FR 66012 - Partner's Distributive Share
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
[email protected] . SUPPLEMENTARY INFORMATION: Background Subchapter K is intended to permit taxpayers to... Revenue Code provides that a partner's distributive share of income, gain, loss, deduction, or credit... that a partner's distributive share of income, gain, loss, deduction, or credit (or item thereof) shall...
Counterfactual quantum erasure: spooky action without entanglement
2018-01-01
We combine the eyebrow-raising quantum phenomena of erasure and counterfactuality for the first time, proposing a simple yet unusual quantum eraser: A distant Bob can decide to erase which-path information from Alice’s photon, dramatically restoring interference—without previously shared entanglement, and without Alice’s photon ever leaving her laboratory. PMID:29515845
Scenario Planning at College of Marin.
ERIC Educational Resources Information Center
College of Marin, Kentfield, CA.
This article reviews the scenario planning process implemented at the College of Marin (California). Scenario planning is a creative process in which a group of people who share a common fate develop stories about different ways their future might unfold, and use these stories to make decisions about what path to take. The Global Business Network…
75 FR 51750 - Accessibility Guidelines for Shared Use Paths
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... public information meeting in conjunction with the ProWalk/ProBike 2010 Conference to provide an... 5 p.m. ADDRESSES: The public information meeting will be held in conjunction with the ProWalk/Pro... on September 13, 2010 in conjunction with the ProWalk/ProBike 2010 Conference to provide an...
Vocational Training and Professional Development: A Capability Perspective
ERIC Educational Resources Information Center
Lambert, Marion; Vero, Josiane; Zimmermann, Benedicte
2012-01-01
Lifelong learning has become one of the keys to making workers' career paths more secure at both the French and the European policy level. However, the implementation of these policy lines raises delicate questions as to how the responsibility for vocational training should be shared among employees, employers and public institutions. The…
A framework for understanding shared substrates of airway protection
TROCHE, Michelle Shevon; BRANDIMORE, Alexandra Essman; GODOY, Juliana; HEGLAND, Karen Wheeler
2014-01-01
Deficits of airway protection can have deleterious effects to health and quality of life. Effective airway protection requires a continuum of behaviors including swallowing and cough. Swallowing prevents material from entering the airway and coughing ejects endogenous material from the airway. There is significant overlap between the control mechanisms for swallowing and cough. In this review we will present the existing literature to support a novel framework for understanding shared substrates of airway protection. This framework was originally adapted from Eccles' model of cough28 (2009) by Hegland, et al.42 (2012). It will serve to provide a basis from which to develop future studies and test specific hypotheses that advance our field and ultimately improve outcomes for people with airway protective deficits. PMID:25141195
Slevc, L Robert; Rosenberg, Jason C; Patel, Aniruddh D
2009-04-01
Linguistic processing, especially syntactic processing, is often considered a hallmark of human cognition; thus, the domain specificity or domain generality of syntactic processing has attracted considerable debate. The present experiments address this issue by simultaneously manipulating syntactic processing demands in language and music. Participants performed self-paced reading of garden path sentences, in which structurally unexpected words cause temporary syntactic processing difficulty. A musical chord accompanied each sentence segment, with the resulting sequence forming a coherent chord progression. When structurally unexpected words were paired with harmonically unexpected chords, participants showed substantially enhanced garden path effects. No such interaction was observed when the critical words violated semantic expectancy or when the critical chords violated timbral expectancy. These results support a prediction of the shared syntactic integration resource hypothesis (Patel, 2003), which suggests that music and language draw on a common pool of limited processing resources for integrating incoming elements into syntactic structures. Notations of the stimuli from this study may be downloaded from pbr.psychonomic-journals.org/content/supplemental.
Chasing the shadows, a trip to spice island
NASA Astrophysics Data System (ADS)
Yamani, A.; Soegijoko, W.; Baskoro, A. A.; Satyaningsih, R.; Simatupang, F. M.; Maulana, F.; Suherli, J.; Syamara, R.; Canas, L.; Stevenson, T.; Oktariani, F.; Santosa, I.; Ariadi, F.; Carvalho, N.; Soegijoko, K.
2016-11-01
The 2016 Total Solar Eclipse provided us an opportunity to introduce astronomy to a much wider audience. The path of totality crossed the Indonesia from Sumatra to the Maluku Islands and ended its journey in the Pacific Ocean. Its path crossed over 4 major islands, 12 provinces and many cities. Most of the cities have minimum exposure to astronomy. langitselatan travelled to observe the eclipse and to do astronomy outreach at the eastern most island under the eclipse path. We chose Maba, a small village in East Halmahera, North Maluku as our site to observe the eclipse as well as conduct a workshop for teachers and students. The aim of the workshop is to introduce astronomy taking advantage of the eclipse as well as raise awareness and curiosity among students. In this paper, we will share a short report regarding the whole trip and event in Maba.
Automatic Match between Delimitation Line and Real Terrain Based on Least-Cost Path Analysis
NASA Astrophysics Data System (ADS)
Feng, C. Q.; Jiang, N.; Zhang, X. N.; Ma, J.
2013-11-01
Nowadays, during the international negotiation on separating dispute areas, manual adjusting is lonely applied to the match between delimitation line and real terrain, which not only consumes much time and great labor force, but also cannot ensure high precision. Concerning that, the paper mainly explores automatic match between them and study its general solution based on Least -Cost Path Analysis. First, under the guidelines of delimitation laws, the cost layer is acquired through special disposals of delimitation line and terrain features line. Second, a new delimitation line gets constructed with the help of Least-Cost Path Analysis. Third, the whole automatic match model is built via Module Builder in order to share and reuse it. Finally, the result of automatic match is analyzed from many different aspects, including delimitation laws, two-sided benefits and so on. Consequently, a conclusion is made that the method of automatic match is feasible and effective.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
Priming of reach trajectory when observing actions: Hand-centred effects
Griffiths, Debra; Tipper, Steven P.
2009-01-01
When another person's actions are observed it appears that these actions are simulated, such that similar motor processes are triggered in the observer. Much evidence suggests that such simulation concerns the achievement of behavioural goals, such as grasping a particular object, and is less concerned with the specific nature of the action, such as the path the hand takes to reach the goal object. We demonstrate that when observing another person reach around an obstacle, an observer's subsequent reach has an increased curved trajectory, reflecting motor priming of reach path. This priming of reach trajectory via action observation can take place under a variety of circumstances: with or without a shared goal, and when the action is seen from a variety of perspectives. However, of most importance, the reach path priming effect is only evoked if the obstacle avoided by another person is within the action (peripersonal) space of the observer. PMID:19731190
Authenticated sensor interface device
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
Issues and Experiences in Logistics Collaboration
NASA Astrophysics Data System (ADS)
Lehoux, Nadia; Audy, Jean-François; D‘Amours, Sophie; Rönnqvist, Mikael
Collaborative logistics is becoming more important in today’s industry. This is driven by increased environmental concerns, improved efficiency through collaborative planning supporting resources sharing and new business models implementation. This paper explores collaborative logistics and reports on business applications within the forest products industry in Sweden and Canada. It first describes current opportunities in collaborative planning. It then discusses issues related to building the coalition as well as sharing resources and benefits. Three business cases are described and used to support the discussion around these main issues. Finally, different challenges are detailed, opening new paths for researchers in the field.
All new custom path photo book creation
NASA Astrophysics Data System (ADS)
Wang, Wiley; Muzzolini, Russ
2012-03-01
In this paper, we present an all new custom path to allow consumers to have full control to their photos and the format of their books, while providing them with guidance to make their creation fast and easy. The users can choose to fully automate the initial creation, and then customize every page. The system manage many design themes along with numerous design elements, such as layouts, backgrounds, embellishments and pattern bands. The users can also utilize photos from multiple sources including their computers, Shutterfly accounts, Shutterfly Share sites and Facebook. The users can also use a photo as background, add, move and resize photos and text - putting what they want where they want instead of being confined to templates. The new path allows users to add embellishments anywhere in the book, and the high-performance platform can support up to 1,000 photos per book and up to 25 pictures per page. The path offers either Smart Autofill or Storyboard features allowing customers to populate their books with photos so they can add captions and customize the pages.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Cost-sharing. 624.7 Section 624.7 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WATERSHED PROTECTION § 624.7 Cost-sharing. (a) Except as provided in...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 6 2014-01-01 2014-01-01 false Cost-sharing. 624.7 Section 624.7 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WATERSHED PROTECTION § 624.7 Cost-sharing. (a) Except as provided in...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Cost-sharing. 624.7 Section 624.7 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WATERSHED PROTECTION § 624.7 Cost-sharing. (a) Except as provided in...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Cost-sharing. 624.7 Section 624.7 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WATERSHED PROTECTION § 624.7 Cost-sharing. (a) Except as provided in...
Accountability as a Way Forward for Privacy Protection in the Cloud
NASA Astrophysics Data System (ADS)
Pearson, Siani; Charlesworth, Andrew
The issue of how to provide appropriate privacy protection for cloud computing is important, and as yet unresolved. In this paper we propose an approach in which procedural and technical solutions are co-designed to demonstrate accountability as a path forward to resolving jurisdictional privacy and security risks within the cloud.
Students' Perspectives on University Experiences; The Role of Protective Factors in Students' Lives
ERIC Educational Resources Information Center
Jdaitawi, Malek; Maya-Panorama; Nawafleh, Ahmad; Nabrawi, Ismaeel; Talafha, Feras; Mohd, Amani
2013-01-01
This study examined the relationship between protective factors and students' university experiences among 289 first year university students. The study made use of exploratory and confirmatory factor analyses to reveal initial support for the research variables. In addition, path analysis was utilized to investigate the relationship among the…
Safety behavior of in-line skaters
Osberg, J; Stiles, S.
2000-01-01
Objectives and setting—Injuries from in-line skating have risen sharply in many cities around the world. To understand risk taking behavior and safety practices associated with urban in-line skating, 2210 outdoor skaters were observed in Boston, Massachusetts. Methods—Estimated age, gender, use of helmets, wrist guards, elbow and kneepads were recorded. Skaters were coded as beginner, average, or advanced, and skating locations were classified as street, sidewalk, or bicycle path. Results—About 60% of skaters wore wrist guards, but only 5.7% wore helmets. Males wore less protective equipment than females, and were more likely to skate on streets. Beginners and advanced skaters wore more protective gear than average skaters. Surprisingly, street skaters wore less protective gear than skaters on sidewalks or paths. Conclusions—Renewed focus on the importance of wearing helmets is needed. Given the higher injury risks for males, clinicians and public health experts need to target male skaters in prevention efforts. In addition, average and advanced skaters need to be convinced that even though they have improved, it is still important to wear protective gear. PMID:11003191
Regional Issue: Social Policy Developments in Australia and New Zealand
Deeming, Christopher
2013-01-01
In his celebrated work of comparative policy, Francis Castles argued that a radical wage-earning model of welfare had evolved in Australia and New Zealand over the course of the 20th century. The Castles' thesis is shown to have two parts: first, the ‘fourth world of welfare’ argument that rests upon protection of workers; and, second, an emphasis on the path-dependent nature of social policy. It is perfectly possible to accept the second premise of the argument without the first, and indeed many do so. It is also possible to accept the importance of wage level protection concerns in Australasian social policy without accepting the complete fourth world thesis. This article explores the path of social democracy in Australia and New Zealand and the continuing importance of labour market regulation, as well as considering the extent to which that emphasis still makes Australasian social policy distinctive in the modern age. The argument focuses on the data and policies relating to labour market protection and wages, as well the systems of welfare and social protection, and the comparative information on poverty and inequality. PMID:24436502
Game theory and shared water resource management
NASA Astrophysics Data System (ADS)
Najafi, H.; Bagheri, A.
2011-12-01
Based on the "New Periodic Table" (NPT) of 2×2 order games by Robinson and Goforth (2005) this study explores all possible game structures, representing a conflict over a shared water resource between two countries. Each game is analyzed to find the possible outcomes (equilibria), Pareto-optimal outcomes, as well as dominant strategies of the players. It is explained why in practice, parties may behave in a way, resulting in Pareto-inferior outcomes and how parties may change their behavior with the structural changes of the game. Further, how parties may develop cooperative solutions through negotiations and involvement of third parties. This work provides useful policy insights into shared water resource problems and identifies the likely structure of such games in the future and the evolution path of the games.
Privacy protection for personal health information and shared care records.
Neame, Roderick L B
2014-01-01
The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.
NASA Astrophysics Data System (ADS)
Klimasewski, A.; Sahakian, V. J.; Baltay, A.; Boatwright, J.; Fletcher, J. B.; Baker, L. M.
2017-12-01
A large source of epistemic uncertainty in Ground Motion Prediction Equations (GMPEs) is derived from the path term, currently represented as a simple geometric spreading and intrinsic attenuation term. Including additional physical relationships between the path properties and predicted ground motions would produce more accurate and precise, region-specific GMPEs by reclassifying some of the random, aleatory uncertainty as epistemic. This study focuses on regions of Southern California, using data from the Anza network and Southern California Seismic network to create a catalog of events magnitude 2.5 and larger from 1998 to 2016. The catalog encompasses regions of varying geology and therefore varying path and site attenuation. Within this catalog of events, we investigate several collections of event region-to-station pairs, each of which share similar origin locations and stations so that all events have similar paths. Compared with a simple regional GMPE, these paths consistently have high or low residuals. By working with events that have the same path, we can isolate source and site effects, and focus on the remaining residual as path effects. We decompose the recordings into source and site spectra for each unique event and site in our greater Southern California regional database using the inversion method of Andrews (1986). This model represents each natural log record spectra as the sum of its natural log event and site spectra, while constraining each record to a reference site or Brune source spectrum. We estimate a regional, path-specific anelastic attenuation (Q) and site attenuation (t*) from the inversion site spectra and corner frequency from the inversion event spectra. We then compute the residuals between the observed record data, and the inversion model prediction (event*site spectra). This residual is representative of path effects, likely anelastic attenuation along the path that varies from the regional median attenuation. We examine the residuals for our different sets independently to see how path terms differ between event-to-station collections. The path-specific information gained from this can inform development of terms for regional GMPEs, through understanding of these seismological phenomena.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-13
... Amendment No. 3 Thereto, Relating to the Listing and Trading of Shares of the WisdomTree Emerging Markets...\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade shares of the WisdomTree... proposes to list and trade shares (``Shares'') of the WisdomTree Emerging Markets Inflation Protection Bond...
2013-07-18
VA) • DFAS • Human Resources - HR Shared Services (Indianapolis, IN) • Personnel Security - HR Shared Services (Indianapolis, IN) DHRA...Security (Camp Lejeune) No Yes Yes AAFES Human Resources No No No Force Protection Yes Yes Yes DFAS Human Resources - HR Shared Services No...No No Personnel Security - HR Shared Services Yes Yes Yes DLA Human Resources No No Yes Personnel Security Yes Yes Yes DoDEA Human
42 CFR 438.108 - Cost sharing.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 4 2010-10-01 2010-10-01 false Cost sharing. 438.108 Section 438.108 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE Enrollee Rights and Protections § 438.108 Cost sharing. The contract must...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 6 2010-01-01 2010-01-01 false Cost-sharing. 624.7 Section 624.7 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WATERSHED PROTECTION § 624.7 Cost-sharing. (a) Except as provided in paragraph (b) of this section, the Federal contribution toward the implementation of emergency measures may...
Paths from socioemotional behavior in middle childhood to personality in middle adulthood.
Pulkkinen, Lea; Kokko, Katja; Rantanen, Johanna
2012-09-01
Continuity in individual differences from socioemotional behavior in middle childhood to personality characteristics in middle adulthood was examined on the assumption that they share certain temperament-related elements. Socioemotional characteristics were measured using teacher ratings at ages 8 (N = 369; 53% males) and 14 (95% of the initial sample). Personality was assessed at age 42 (63% of the initial sample; 50% males) using a shortened version of the NEO Personality Inventory (NEO-PI); the Karolinska Scales of Personality (KSP); and the Adult Temperament Questionnaire (ATQ). Three models were tested using structural equation modeling. The results confirmed paths (a) from behavioral activity to adult Extraversion and Openness (NEO-PI), sociability (KSP), and surgency (ATQ); (b) from well-controlled behavior to adult conformity (KSP) and Conscientiousness (NEO-PI); and (c) from negative emotionality to adult aggression (KSP). The paths were significant only for one gender, and more frequently for males than for females. The significant male paths from behavioral activity to all indicators of adult activity and from well-controlled behavior to adult conformity started at age 8, whereas significant female paths from behavioral activity to adult sociability and from well-controlled behavior to adult Conscientiousness started at age 14. PsycINFO Database Record (c) 2012 APA, all rights reserved.
Comprehensive Nuclear-Test-Ban Treaty: Updated ’Safeguards’ and Net Assessments
2009-06-03
measures that this nation can take unilaterally within the treaty to protect its nuclear security. To compensate for “disadvantages and risk” they...and strategic forces, and could be augmented with implementation measures . While Safeguards may be part of a future CTBT debate, both supporters and...A second path involves efforts to alter the net assessment through measures intended to mitigate perceived risks of the treaty. This path has been
7 CFR 1410.3 - General description.
Code of Federal Regulations, 2012 CFR
2012-01-01
... of the CRP are to cost-effectively reduce water and wind erosion, protect the Nation's long-term... addition to any payments under this part, receive cost-share assistance, rental or easement payments, tax.... However, a participant may not receive or retain CRP cost-share assistance if other Federal cost-share...
7 CFR 1410.3 - General description.
Code of Federal Regulations, 2014 CFR
2014-01-01
... of the CRP are to cost-effectively reduce water and wind erosion, protect the Nation's long-term... addition to any payments under this part, receive cost-share assistance, rental or easement payments, tax.... However, a participant may not receive or retain CRP cost-share assistance if other Federal cost-share...
7 CFR 1410.3 - General description.
Code of Federal Regulations, 2013 CFR
2013-01-01
... of the CRP are to cost-effectively reduce water and wind erosion, protect the Nation's long-term... addition to any payments under this part, receive cost-share assistance, rental or easement payments, tax.... However, a participant may not receive or retain CRP cost-share assistance if other Federal cost-share...
7 CFR 1410.3 - General description.
Code of Federal Regulations, 2011 CFR
2011-01-01
... of the CRP are to cost-effectively reduce water and wind erosion, protect the Nation's long-term... addition to any payments under this part, receive cost-share assistance, rental or easement payments, tax.... However, a participant may not receive or retain CRP cost-share assistance if other Federal cost-share...
7 CFR 1410.3 - General description.
Code of Federal Regulations, 2010 CFR
2010-01-01
... of the CRP are to cost-effectively reduce water and wind erosion, protect the Nation's long-term... addition to any payments under this part, receive cost-share assistance, rental or easement payments, tax.... However, a participant may not receive or retain CRP cost-share assistance if other Federal cost-share...
40 CFR 35.635 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.635 Section... (sections 319(h) and 518(f)) § 35.635 Maximum federal share. (a) The Regional Administrator may provide up... be provided from non-federal sources. (b) The Regional Administrator may increase the maximum federal...
40 CFR 35.685 - Maximum federal share.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Maximum federal share. 35.685 Section... (section 1443(b)) § 35.685 Maximum federal share. (a) The Regional Administrator may provide up to 75 percent of the approved work plan costs. (b) The Regional Administrator may increase the maximum federal...
Redman, R.S.; Roossinck, M.J.; Maher, S.; Rodriguez, R.J.
2002-01-01
Path-1 is a UV-induced non-pathogenic mutant of a virulent Colletotrichum magna isolate that establishes mutualistic symbioses with cucurbit and tomato species. Under laboratory conditions, this mutualism results in plant growth enhancement, drought tolerance, and disease protection against fungal pathogens. This study focuses on the efficacy of this symbiosis and the symbiotic lifestyle expressed by path-1 under field conditions in the absence of disease stress. The effects of colonization by path-1 on fruit yields and growth was measured in field plots with four cucurbit species including four watermelon cultivars, and two tomato cultivars, over four growing seasons. The persistence of the symbiosis, extent of colonization, and path-1 transmission were also assessed. Yields from path-1 infected plants were equivalent to or greater than yields from non-inoculated control plants and path-1 systemically colonized plants throughout each growing season. Path-1 also increased the growth rates of tomato plants and was not transmitted to uncolonized plants. The results indicate that there are no metabolic costs of this symbiosis and the symbiosis is maintained under field conditions.
Navigating Graduate School: Insights and Recommendations for a Productive Degree Path
ERIC Educational Resources Information Center
Cambria, Jenna
2015-01-01
Beginning graduate school can be an exciting experience; however, given the new social and intellectual experiences, there will be unique challenges that arise during your graduate program. Within this article, the author shares what was useful, helpful suggestions others have offered her, and pieces of advice she wishes she knew going in. In the…
ERIC Educational Resources Information Center
Tyner, Scott M.
2013-01-01
The growing number of children diagnosed with Autism Spectrum Disorder (ASD) warrants better understanding of how clinicians and families work together following a child's diagnosis. Individuals with ASD share pronounced differences in communication and styles of social interaction along with the presence of repetitive behaviors and…
Building Consensus toward a Shared Purpose: A Profile of President David Gray
ERIC Educational Resources Information Center
Dessoff, Alan
2011-01-01
The author presents a profile of APPA president David Gray. One might say that David Gray's path into higher education facilities management was anything but traditional. Today, Gray is the assistant vice president of facilities services at Middle Tennessee State University. His professional career, however, actually began in banking. In 1993 he…
NASA Astrophysics Data System (ADS)
Udías, Agustín
2001-04-01
Agustín Udías reflects on the Jesuit scientific tradition in astronomy and geophysics, by considering those who were also Fellows of the RAS. The Society of Jesus has a venerable tradition of scientific observation and enquiry, as has the Royal Astronomical Society. Their paths have frequently crossed over the years and this tradition of shared enquiry continues to this day.
John C. Mather, the Big Bang, and the COBE
Additional Information * Videos John C. Mather Courtesy of NASA "Dr. John C. Mather of NASA's Goddard excerpt from NASA Scientist Shares Nobel Prize for Physics 2Edited excerpt from John Mather: The Path to a Spacecraft Courtesy of Lawrence Berkeley National Laboratory Additional Web Pages: Dr. John C Mather, NASA
Opening up the Decision-Making Process through Shared Governance.
ERIC Educational Resources Information Center
Messina, Robert C., Jr.; And Others
A formal governance system was adopted by the Board of Trustees in April 1991 at Burlington County College in New Jersey after the Commission on Higher Education and the Middle States Association of Colleges and Schools observed that it was lacking. The policy defines the path for maintaining a governance structure which fosters clear and timely…
ERIC Educational Resources Information Center
Rice, Robert; Coll, Kenneth
While America's two-year colleges are diverse in function, mission, clientele, and organizational structure, they share a common identity in their commitment to a developmental philosophy. A rarely used, but nonetheless tenable and cost-saving path to development involves exploring strategies which simultaneously contribute to faculty, student,…
Focusing on the Experience: Exploring Alternative Paths for Research
ERIC Educational Resources Information Center
Stubley, Eleanor; Arho, Anneli; Jarvio, Paivi; Mali, Tuomas
2006-01-01
Writing and speaking are essential means of understanding, studying, and sharing music in the Western art music tradition. The papers presented in this symposium were the outgrowth of authors' dialogue during the summer of 2004. Each of them worked independently, yet each of them was also aware of the direction, the themes, and the ways of the…
ERIC Educational Resources Information Center
Symonette, Hazel
2004-01-01
In this article, the author shares insights derived from her journey as an evaluation practitioner and as a capacity-building evaluation facilitator committed to demystifying evaluation as a core development resource. The author weaves in some foundational stories that have shaped and informed her path. Through her work and praxis, she has been…
Connect. Risk. Ask. Share. Lead!
ERIC Educational Resources Information Center
Lieberman, Daina S.
2014-01-01
Teachers are encouraged to "Step into Leadership" because they have a lot to offer, but also a lot to learn. However, many teachers need a push to get started on the path to teacher leadership beyond their classroom walls; therefore, this article provides teachers 10 tips on how to get started and where to look to expand their effect on…
Career Guidance and Therapeutic Counselling: Sharing "What Works" in Practice with Young People
ERIC Educational Resources Information Center
Westergaard, Jane
2012-01-01
Many young people in the UK and across the world, where austerity measures are biting deep, find themselves at a time of crisis and uncertainty in their lives. The assumptions previously held of clear and straightforward career paths are being challenged and "career" has come to mean more than simply "work" or…
ERIC Educational Resources Information Center
Janke, Emily; Holland, Barbara; Medlin, Kristin
2016-01-01
Once an institution has chosen to recognize and reward community-engaged scholarship in its university-wide promotion and tenure policy, what are some strategies for aligning unit and department policies as well? This chapter describes the path followed at The University of North Carolina at Greensboro to align policies across all units and…
Costa, Gabriela M C; Gualda, Dulce M R
2010-12-01
The article discusses anthropology, ethnographic method, and narrative as possible ways of coming to know subjects' experiences and the feelings they attribute to them. From an anthropological perspective, the sociocultural universe is taken as a point of reference in understanding the meaning of the processes of health and sickness, using a dense ethnographic description from an interpretivist analytical approach. In this context, narratives afford possible paths to understanding how subjective human experiences are shared and how behavior is organized, with a special focus on meaning, the process by which stories are produced, relations between narrator and other subjects, processes of knowledge, and the manifold ways in which experience can be captured.
Peer Victimization among Young Children with Disabilities: Early Risk and Protective Factors
ERIC Educational Resources Information Center
Son, Esther; Peterson, N. Andrew; Pottick, Kathleen J.; Zippay, Allison; Parish, Susan L.; Lohrmann, Sharon
2014-01-01
The purpose of this study was to examine the risk and protective factors of peer victimization among young children with disabilities. This study analyzed data from the Pre-Elementary Education Longitudinal Study (n =1,130) to test a path model that included child, family, and school characteristics at Year 1 and peer-relation difficulties and…
Privacy Protection Standards for the Information Sharing Environment
2009-09-01
enable ISE participants to share information and data (see ISE Implementation Plan, p. 51, ISE Enterprise Architecture Framework, pp. 67, 73–74 and...of frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises. 2. The exercise...5 U.S.C. § 552a, as amended. Program Manager-Information Sharing Environment. (2008). Information Sharing Enterprise Architecture Framework
Development of computer-based analytical tool for assessing physical protection system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mardhi, Alim, E-mail: alim-m@batan.go.id; Chulalongkorn University, Faculty of Engineering, Nuclear Engineering Department, 254 Phayathai Road, Pathumwan, Bangkok Thailand. 10330; Pengvanich, Phongphaeth, E-mail: ppengvan@gmail.com
Assessment of physical protection system effectiveness is the priority for ensuring the optimum protection caused by unlawful acts against a nuclear facility, such as unauthorized removal of nuclear materials and sabotage of the facility itself. Since an assessment based on real exercise scenarios is costly and time-consuming, the computer-based analytical tool can offer the solution for approaching the likelihood threat scenario. There are several currently available tools that can be used instantly such as EASI and SAPE, however for our research purpose it is more suitable to have the tool that can be customized and enhanced further. In this work,more » we have developed a computer–based analytical tool by utilizing the network methodological approach for modelling the adversary paths. The inputs are multi-elements in security used for evaluate the effectiveness of the system’s detection, delay, and response. The tool has capability to analyze the most critical path and quantify the probability of effectiveness of the system as performance measure.« less
Development of computer-based analytical tool for assessing physical protection system
NASA Astrophysics Data System (ADS)
Mardhi, Alim; Pengvanich, Phongphaeth
2016-01-01
Assessment of physical protection system effectiveness is the priority for ensuring the optimum protection caused by unlawful acts against a nuclear facility, such as unauthorized removal of nuclear materials and sabotage of the facility itself. Since an assessment based on real exercise scenarios is costly and time-consuming, the computer-based analytical tool can offer the solution for approaching the likelihood threat scenario. There are several currently available tools that can be used instantly such as EASI and SAPE, however for our research purpose it is more suitable to have the tool that can be customized and enhanced further. In this work, we have developed a computer-based analytical tool by utilizing the network methodological approach for modelling the adversary paths. The inputs are multi-elements in security used for evaluate the effectiveness of the system's detection, delay, and response. The tool has capability to analyze the most critical path and quantify the probability of effectiveness of the system as performance measure.
Takai-Igarashi, Takako; Kinoshita, Kengo; Nagasaki, Masao; Ogishima, Soichi; Nakamura, Naoki; Nagase, Sachiko; Nagaie, Satoshi; Saito, Tomo; Nagami, Fuji; Minegishi, Naoko; Suzuki, Yoichi; Suzuki, Kichiya; Hashizume, Hiroaki; Kuriyama, Shinichi; Hozawa, Atsushi; Yaegashi, Nobuo; Kure, Shigeo; Tamiya, Gen; Kawaguchi, Yoshio; Tanaka, Hiroshi; Yamamoto, Masayuki
2017-07-06
With the goal of realizing genome-based personalized healthcare, we have developed a biobank that integrates personal health, genome, and omics data along with biospecimens donated by volunteers of 150,000. Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper reports on our plans, current attempts, and accomplishments in addressing security problems involved in data sharing to ensure donor privacy while promoting scientific advancement. Biospecimens and data have been collected in prospective cohort studies with the comprehensive agreement. The sample size of 150,000 participants was required for multiple researches including genome-wide screening of gene by environment interactions, haplotype phasing, and parametric linkage analysis. We established the T ohoku M edical M egabank (TMM) data sharing policy: a privacy protection rule that requires physical, personnel, and technological safeguards against privacy violation regarding the use and sharing of data. The proposed policy refers to that of NCBI and that of the Sanger Institute. The proposed policy classifies shared data according to the strength of re-identification risks. Local committees organized by TMM evaluate re-identification risk and assign a security category to a dataset. Every dataset is stored in an assigned segment of a supercomputer in accordance with its security category. A security manager should be designated to handle all security problems at individual data use locations. The proposed policy requires closed networks and IP-VPN remote connections. The mission of the biobank is to distribute biological resources most productively. This mission motivated us to collect biospecimens and health data and simultaneously analyze genome/omics data in-house. The biobank also has the mission of improving the quality and quantity of the contents of the biobank. This motivated us to request users to share the results of their research as feedback to the biobank. The TMM data sharing policy has tackled every security problem originating with the missions. We believe our current implementation to be the best way to protect privacy in data sharing.
Overload protection circuit for output driver
Stewart, Roger G.
1982-05-11
A protection circuit for preventing excessive power dissipation in an output transistor whose conduction path is connected between a power terminal and an output terminal. The protection circuit includes means for sensing the application of a turn on signal to the output transistor and the voltage at the output terminal. When the turn on signal is maintained for a period of time greater than a given period without the voltage at the output terminal reaching a predetermined value, the protection circuit decreases the turn on signal to, and the current conduction through, the output transistor.
Rotational symmetric HMD with eye-tracking capability
NASA Astrophysics Data System (ADS)
Liu, Fangfang; Cheng, Dewen; Wang, Qiwei; Wang, Yongtian
2016-10-01
As an important auxiliary function of head-mounted displays (HMDs), eye tracking has an important role in the field of intelligent human-machine interaction. In this paper, an eye-tracking HMD system (ET-HMD) is designed based on the rotational symmetric system. The tracking principle in this paper is based on pupil-corneal reflection. The ET-HMD system comprises three optical paths for virtual display, infrared illumination, and eye tracking. The display optics is shared by three optical paths and consists of four spherical lenses. For the eye-tracking path, an extra imaging lens is added to match the image sensor and achieve eye tracking. The display optics provides users a 40° diagonal FOV with a ״ 0.61 OLED, the 19 mm eye clearance, and 10 mm exit pupil diameter. The eye-tracking path can capture 15 mm × 15 mm of the users' eyes. The average MTF is above 0.1 at 26 lp/mm for the display path, and exceeds 0.2 at 46 lp/mm for the eye-tracking path. Eye illumination is simulated using LightTools with an eye model and an 850 nm near-infrared LED (NIR-LED). The results of the simulation show that the illumination of the NIR-LED can cover the area of the eye model with the display optics that is sufficient for eye tracking. The integrated optical system HMDs with eye-tracking feature can help improve the HMD experience of users.
ERIC Educational Resources Information Center
Anstey, Kaarin J.; Low, Lee-Fay; Christensen, Helen; Sachdev, Perminder
2009-01-01
There is a lack of information on how cognitive ability relates to both health behaviors and change in health behaviors over time. This study examined verbal ability and processing speed as predictors of health behaviors in the PATH Through Life Study that includes cohorts aged in their 20s, 40s and 60s. Higher cognitive scores were associated…
30 CFR 280.73 - Will MMS share data and information with coastal States?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Data Requirements Protections § 280.73 Will MMS share data and information with coastal States? (a) We... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS share data and information with coastal States? 280.73 Section 280.73 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE...
30 CFR 580.73 - Will BOEM share data and information with coastal States?
Code of Federal Regulations, 2012 CFR
2012-07-01
... CONTINENTAL SHELF Data Requirements Protections § 580.73 Will BOEM share data and information with coastal... 30 Mineral Resources 2 2012-07-01 2012-07-01 false Will BOEM share data and information with coastal States? 580.73 Section 580.73 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, DEPARTMENT OF...
30 CFR 580.73 - Will BOEM share data and information with coastal States?
Code of Federal Regulations, 2014 CFR
2014-07-01
... CONTINENTAL SHELF Data Requirements Protections § 580.73 Will BOEM share data and information with coastal... 30 Mineral Resources 2 2014-07-01 2014-07-01 false Will BOEM share data and information with coastal States? 580.73 Section 580.73 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, DEPARTMENT OF...
Shared wilderness, shared responsibility, shared vision: Protecting migratory wildlife
Will Meeks; Jimmy Fox; Nancy Roeper
2011-01-01
Wilderness plays a vital role in global and landscape-level conservation of wildlife. Millions of migratory birds and mammals rely on wilderness lands and waters during critical parts of their life. As large, ecologically intact landscapes, wilderness areas also play a vital role in addressing global climate change by increasing carbon sequestration, reducing...
40 CFR 33.402 - Are there special rules for loans under EPA financial assistance agreements?
Code of Federal Regulations, 2010 CFR
2010-07-01
... agreement to capitalize revolving loan funds must either apply its own fair share objectives negotiated with... UNITED STATES ENVIRONMENTAL PROTECTION AGENCY PROGRAMS Fair Share Objectives § 33.402 Are there special... negotiate separate fair share objectives with entities receiving identified loans, as long as such separate...
30 CFR 580.73 - Will BOEM share data and information with coastal States?
Code of Federal Regulations, 2013 CFR
2013-07-01
... CONTINENTAL SHELF Data Requirements Protections § 580.73 Will BOEM share data and information with coastal... 30 Mineral Resources 2 2013-07-01 2013-07-01 false Will BOEM share data and information with coastal States? 580.73 Section 580.73 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, DEPARTMENT OF...
78 FR 32651 - Agency Information Collection Activities; Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... dealers, and its shared enforcement with the Consumer Financial Protection Bureau (``CFPB'') of the...: Monique Einhorn, Attorney, Division of Privacy and Identity Protection, Bureau of Consumer Protection... Reform and Consumer Protection Act (Pub. L. 111-203, 124 Stat. 1376 (2010)) that are predominantly...
User-Perceived Reliability of M-for-N (M: N) Shared Protection Systems
NASA Astrophysics Data System (ADS)
Ozaki, Hirokazu; Kara, Atsushi; Cheng, Zixue
In this paper we investigate the reliability of general type shared protection systems i.e. M for N (M: N) that can typically be applied to various telecommunication network devices. We focus on the reliability that is perceived by an end user of one of N units. We assume that any failed unit is instantly replaced by one of the M units (if available). We describe the effectiveness of such a protection system in a quantitative manner. The mathematical analysis gives the closed-form solution of the availability, the recursive computing algorithm of the MTTFF (Mean Time to First Failure) and the MTTF (Mean Time to Failure) perceived by an arbitrary end user. We also show that, under a certain condition, the probability distribution of TTFF (Time to First Failure) can be approximated by a simple exponential distribution. The analysis provides useful information for the analysis and the design of not only the telecommunication network devices but also other general shared protection systems that are subject to service level agreements (SLA) involving user-perceived reliability measures.
Gender differences in retirement planning: A longitudinal study among Spanish Registered Nurses.
Topa, Gabriela; Segura, Adrián; Pérez, Sergio
2018-02-21
Consistent patterns of gender differences in retirement planning behaviours have been shown but little is known about these behaviours among nurses. To analyse the antecedents of the behaviours to prepare for retirement in nurses older than 55 and to identify differences as a function of gender. A two-wave longitudinal study with Spanish nurses (n = 132). Statistically significant gender differences were revealed. Specifically, paths from financial knowledge to public protection and self-insurance as well as paths from goals clarity to public protection all differed by gender. Patterns of retirement planning differentiated by gender apparently continue to emerge. The study adds evidence showing that female nurses continue to rely on public protection as a solid support for their retirement. Despite their greater awareness of the importance of health care and social relations, savings and finance are more neglected by female nurses. Intervention should be aimed at fostering financial literacy of the entire nursing population, but particularly, the access of women to this training. Secondly, given that the differences persist, advance planning of social actions to protect those who will be living alone and economically helpless in old age. © 2018 John Wiley & Sons Ltd.
ERIC Educational Resources Information Center
Wisconsin Department of Public Instruction, 2009
2009-01-01
The Next Generation Assessment Task Force was convened to formulate Wisconsin's path forward. Task force members listened to leaders from business and technology sectors as well as leaders from PK-12 and higher education. This summary shares the process, definitions, assumptions, and recommendations of the task force. This paper aims to use these…
ERIC Educational Resources Information Center
Johnson, R. E.
2009-01-01
The author shares a story told to him by a colleague more than thirty years ago. The dean of a midsized American university was explaining the path to tenure to a roomful of newly appointed assistant professors. "We know you boys can all "field"," he declared. "Now we want to see if you can hit." A lot has changed over the intervening decades. If…
NASA Technical Reports Server (NTRS)
2000-01-01
New Hampshire-based Creare, Inc. used a NASA SBIR contract with Dryden to develop "middleware" known commercially as DataTurbine. DataTurbine acts as "glueware" allowing communication between dissimilar computer platforms and analysis, storage and acquisition of shared data. DataTurbine relies on Ring Buffered Network Bus technology, which is a software server providing a buffered network path between suppliers and consumers of information.
An Alternative Path to Becoming a Successful Middle Grades Math and Science Teacher
ERIC Educational Resources Information Center
Jeanpierre, Bobby; Lewis, Nancy
2007-01-01
In 2003, the University of Central Florida began a Transition to Mathematics and Science Teaching (T-MAST) program, a one-year, fast-track program that prepares and certifies bachelor's degree holders who will work as teachers in a job-sharing paid internship, while completing a Master of Arts degree in middle grades (5-9) mathematics education or…
Viniece Jennings; Jessica Yun; Lincoln Larson
2016-01-01
Decades of research have documented continuous tension between anthropocentric needs and the environmentâs capacity to accommodate those needs and support basic human welfare. The way in which society perceives, manages, and ultimately utilizes natural resources can be influenced by underlying environmental ethics, or the moral relationship that humans share with the...
Managing Situation Awareness on the Flight Deck
NASA Technical Reports Server (NTRS)
Chappell, Sheryl L.; Connell, Linda (Technical Monitor)
1996-01-01
Awareness is required of the plane, the path and the people, both now and in the future. The steps to situation awareness are to monitor and evaluate the current situation. Anticipate the future to stay ahead of the airplane and consider contingencies, having a plan for 'what if situations. Continually update and modify the plan and share it with all crew members.
ERIC Educational Resources Information Center
Nyambe, John; Wilmot, Di
2015-01-01
This paper reports on an aspect of a broader study that investigated teacher educators' uptake of learner-centred pedagogy in post-apartheid Namibia. The paper shares part of the study that illuminated the path traversed by Namibian teacher education policy from 1990 to 2010, two decades into the country's post-apartheid self-rule. It argues that,…
Women: The Path to Equal Employment. Research Report No. 56.
ERIC Educational Resources Information Center
Humphrey, Melvin
A study of female employment in the private sector between 1966 and 1975 was done (1) to measure the progress of women toward fair-share goals in level of employment, job quality, and salary level and (2) to project when employment gaps will close. The data utilized was reported by those employers who are required to and did file Employer…
Zhao, Yueren
2011-01-01
A female patient in her sixties with schizophrenia had secretly disposed of all her medication and was not cooperating with hospital staff for about four months. During one of our consultations she mentioned that she wanted to be out of hospital by a certain date. That date happened to be her grandchild's birthday. It was at this point that she shared her goals with us, and voluntarily started having treatment. She was able to return home three months later, just in time to celebrate her grandchild's birthday with her family. A male patient in his sixties was able to leave the seclusion room after 10 years. The first doctor in charge and other hospital staff had firmly believed that releasing him from the seclusion room wasn't a possibility. However the patient decided he wanted to be discharged and was interested in finding out how to go about it. The moment he realized it was possible, his outlook changed immensely. He gradually started to open up and communicate better with his new doctor in charge, and was able to work towards his newly found goals. Staff members were also surprised when he was able to leave the seclusion room. They realized this patient was another person like them who had dreams and goals, and stopped stereotyping patients who seemed to be 'difficult to handle'. I have always experienced the power of goal sharing at clinical scenes, and have noticed its importance for patients making a start on the road to recovery. In order to discuss goals and the way to go about achieving them, I use a simple drawing of a mountain. I call this mountain 'A Personal Goal Map'. I like to think of myself (the doctor) as the mountain guide, and my patient as the mountain climber. The three key philosophies are acknowledging individuality, diversity and freedom. These are important when we think about where we are now, where we are going, and where we want to be. Firstly at the start point, we need to define the patient's problem and discuss ideas and goals, which help us along the Trust Path. The more patients and staff trust and understand each other the easier it is to climb up the Initial Treatment Path. We need to build up trustful relations so we can share personal goals and make a proper assessment and diagnosis, and talk about the safety, efficacy, cost and suitability of the initial treatment. Secondly, we need to take a rest and make more plans for the Recovery Path. It is on this path that we decide on comprehensive treatment together. We may be able to improve the patient's cognitive functions by using atypical anti-psychotic agents. We can then give them information, instructions and warnings about medicine usage so the patient is able to understand their condition. It is only after the patient can understand these things fully and act positively that we can start to climb the final path, the Achievement Path. We should review the suitability and efficacy of the treatment again, and it is at this stage that the mountain guide steps back and watches the mountain climber take the final steps towards the mountain peak goal. Lastly, the patient will feel elation and a sense of fulfillment and self-pride, and no doubt will be ready to look for the next mountain peak to climb. In order for you to enjoy the benefits at the clinical scene, all you need is a piece of paper, a pen, and a limitless imagination for better personal goal sharing. At Meisei hospital we promote the 'Minotake Team Approach', which calls for flexible management so we hospital staff can help each other as professionals. We treat patients as individuals using words and expressions they understand (such as local dialect and nonmedical terms), and give them access to easy to understand resources such as leaflets delivered by universities or pharmaceutical companies. We ask our staff to act naturally with the patients, and to just do what they can do to help the patients work towards their personal goals.
Precompetitive Data Sharing as a Catalyst to Address Unmet Needs in Parkinson’s Disease 1
Stephenson, Diane; Hu, Michele T.; Romero, Klaus; Breen, Kieran; Burn, David; Ben-Shlomo, Yoav; Bhattaram, Atul; Isaac, Maria; Venuto, Charles; Kubota, Ken; Little, Max A.; Friend, Stephen; Lovestone, Simon; Morris, Huw R.; Grosset, Donald; Sutherland, Margaret; Gallacher, John; Williams-Gray, Caroline; Bain, Lisa J.; Avilés, Enrique; Marek, Ken; Toga, Arthur W.; Stark, Yafit; Forrest Gordon, Mark; Ford, Steve
2015-01-01
Abstract Parkinson’s disease is a complex heterogeneous disorder with urgent need for disease-modifying therapies. Progress in successful therapeutic approaches for PD will require an unprecedented level of collaboration. At a workshop hosted by Parkinson’s UK and co-organized by Critical Path Institute’s (C-Path) Coalition Against Major Diseases (CAMD) Consortiums, investigators from industry, academia, government and regulatory agencies agreed on the need for sharing of data to enable future success. Government agencies included EMA, FDA, NINDS/NIH and IMI (Innovative Medicines Initiative). Emerging discoveries in new biomarkers and genetic endophenotypes are contributing to our understanding of the underlying pathophysiology of PD. In parallel there is growing recognition that early intervention will be key for successful treatments aimed at disease modification. At present, there is a lack of a comprehensive understanding of disease progression and the many factors that contribute to disease progression heterogeneity. Novel therapeutic targets and trial designs that incorporate existing and new biomarkers to evaluate drug effects independently and in combination are required. The integration of robust clinical data sets is viewed as a powerful approach to hasten medical discovery and therapies, as is being realized across diverse disease conditions employing big data analytics for healthcare. The application of lessons learned from parallel efforts is critical to identify barriers and enable a viable path forward. A roadmap is presented for a regulatory, academic, industry and advocacy driven integrated initiative that aims to facilitate and streamline new drug trials and registrations in Parkinson’s disease. PMID:26406139
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-05
... and Trading of Shares of the WisdomTree Emerging Markets Inflation Protection Bond Fund Under NYSE... Change The Exchange proposes to list and trade the shares of the following fund of the WisdomTree Trust (``Trust'') under NYSE Arca Equities Rule 8.600 (``Managed Fund Shares''): WisdomTree Emerging Markets...
40 CFR 33.411 - Who may be exempted from this subpart?
Code of Federal Regulations, 2010 CFR
2010-07-01
... PROTECTION AGENCY PROGRAMS Fair Share Objectives § 33.411 Who may be exempted from this subpart? (a) General... $250,000 or less in any one fiscal year, is not required to apply the fair share objective requirements of this subpart. This exemption is limited to the fair share objective requirements of this subpart...
Lingafelter, J.W.
1960-04-01
An apparatus is described in which a welding arc created between an annular electrode and a workpiece moves under the influence of an electromagnetic field about the electrode in a closed or annular path. This mode of welding is specially suited to the enclosing of nuclear-fuel slugs in a protective casing. For example, a uranium slug is placed in an aluminum can, and an aluminum closure is welded to the open end of the can along a closed or annular path conforming to the periphery of the end closure.
Discharge source with gas curtain for protecting optics from particles
Fornaciari, Neal R.; Kanouff, Michael P.
2004-03-30
A gas curtain device is employed to deflect debris that is generated by an extreme ultraviolet and soft x-ray radiation discharge source such as an electric discharge plasma source. The gas curtain device projects a stream of gas over the path of the radiation to deflect debris particles into a direction that is different from that of the path of the radiation. The gas curtain can be employed to prevent debris accumulation on the optics used in photolithography.
Impact of Bicycle Route Type on Exposure to Traffic-Related Air Pollution
MacNaughton, Piers; Melly, Steven; Vallarino, Jose; Adamkiewicz, Gary; Spengler, John D.
2017-01-01
Cyclists are exposed to traffic-related air pollution (TRAP) during their commutes due to their proximity to vehicular traffic. Two of the main components of TRAP are black carbon (BC) and nitrogen dioxide (NO2), which have both been causally associated with increased mortality. To assess the impact of cyclists’ exposure to TRAP, a battery-powered mobile monitoring station was designed to sample air pollutants along five bike routes in Boston, Massachusetts. The bike routes were categorized into three types: bike paths, which are separated from vehicle traffic; bike lanes, which are adjacent to traffic; and designated bike lanes, which are shared traffic lanes for buses and cyclists. Bike lanes were found to have significantly higher concentrations of BC and NO2 than bike paths in both adjusted and unadjusted generalized linear models. Higher concentrations were observed in designated bike lanes than bike paths; however, this association was only significant for NO2. After adjusting for traffic density, background concentration, and proximity to intersections, bike lanes were found to have concentrations of BC and NO2 that were approximately 33% higher than bike paths. Distance from the road, vegetation barriers, and reduced intersection density appear to influence these variations. These findings suggest that cyclists can reduce their exposure to TRAP during their commute by using bike paths preferentially over bike lanes regardless of the potential increase of traffic near these routes. PMID:24840278
Localization Decisions of Entrepreneurs: The Role of Path Dependency and Market Forces
NASA Astrophysics Data System (ADS)
Pylak, Korneliusz; Majerek, Dariusz
2017-10-01
The purpose of this research is to determine the role of path dependency and market forces in the localization decisions of entrepreneurs from different industries. We hypothesize that most industries develop new entities based on the number of companies from the same industry that already exist in a region. We also hypothesize that entrepreneurs create new entities based on related industries operating within the same knowledge pool. To test these hypotheses, we used the machine learning decision tree method. The input variables are the number of companies from 86 industries located in 2,531 communities in Poland in 2009. The target values are the number of new companies from these industries created in the years 2009-2015. The principal results show that localization decisions are mostly based on demand and supply industries, in which manufacturing industries play crucial role. Path dependency appears in less than half of the industries’ models and thus is not the main factor influencing decisions regarding the creation of new companies. The highest share of path-dependent industries is in manufacturing sector, but the degree of the dependence is lower than in the service sector. The service sector seems to be the least path-dependent, as services usually serve other industries. Competition in industries is a rare factor in new company creation; however, if it appears, it usually shrinks the industry.
Sample path analysis of contribution and reward in cooperative groups.
Toyoizumi, Hiroshi
2009-02-07
Explaining cooperative behavior is one of the major challenges in both biology and human society. The individual reward in cooperative group depends on how we share the rewards in the group. Thus, the group size dynamics in a cooperative group and reward-allocation rule seem essential to evaluate the emergence of cooperative groups. We apply a sample path-based analysis called an extension of Little's formula to general cooperative group. We show that the expected reward is insensitive to the specific reward-allocation rule and probabilistic structure of group dynamics, and the simple productivity condition guarantees the expected reward to be larger than the average contribution. As an example, we take social queues to see the insensitivity result in detail.
ARPA-E: Guiding Technologies to Commercial Success
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tuttle, John; Aizenberg, Joanna; Madrone, Leila
ARPA-E’s Technology-to-Market Advisors work closely with each ARPA-E project team to develop and execute a commercialization strategy. ARPA-E requires our teams to focus on their commercial path forward, because we understand that to have an impact on our energy mission, technologies must have a viable path into the marketplace. ARPA-E Senior Commercialization Advisor Dr. John Tuttle discusses what this Tech-to-Market guidance in practice looks like with reference to two project teams. OPEN 2012 awardees from Harvard University and Sunfolding share their stories of how ARPA-E worked with their teams to analyze market conditions and identify commercial opportunities that ultimately convincedmore » them to pivot their technologies towards market applications with greater potential.« less
Patient-shared TCRβ-CDR3 clonotypes correlate with favorable prognosis in chronic hepatitis B.
Jiang, Qiong; Zhao, Tingting; Zheng, Wenhong; Zhou, Jijun; Wang, Haoliang; Dong, Hui; Chen, Yongwen; Tang, Xiaoqin; Liu, Cong; Ye, Lilin; Mao, Qing; Wang, Chunlin; Han, Jian; Shang, Xiaoyun; Wu, Yuzhang
2018-06-01
The presence of shared T cell clonotypes was found in several different diseases, but its relationship with the progression of disease remains unclear. By sequencing the complementary determining region 3 of T cell receptor (TCR) β chains from the purified antigen-experienced CD8 + T cells, we characterized the T cell repertoire in a prospective cohort study among 75 patients with chronic hepatitis B in China, as well as a healthy control and a validation cohort. We found that most T cell clones from patients harbored the 'patient-specific' TCR sequences. However, 'patient-shared' TCR clonotypes were also widely found, which correlated with the favorable turnover of disease. Interestingly, the frequency of the 'patient-shared' clonotypes can serve as a biomarker for favorable prognosis. Based on the clonotypes in those patients with favorable outcomes, we created a database including several clusters of protective anti-HBV CD8 + T cell clonotypes that might be a reasonable target for therapeutic vaccine development or adoptive cell transfer therapy. These findings were validated in an additional independent cohort of patients. These results suggest that the 'patient-shared' TCR clonotypes may serve as a valuable prognostic tool in the treatment of chronic hepatitis B and possibly other chronic viral diseases. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
Zeng, Lingping; Collins, Kimberlee C.; Hu, Yongjie; ...
2015-11-27
Heat conduction in semiconductors and dielectrics depends upon their phonon mean free paths that describe the average travelling distance between two consecutive phonon scattering events. Nondiffusive phonon transport is being exploited to extract phonon mean free path distributions. Here, we describe an implementation of a nanoscale thermal conductivity spectroscopy technique that allows for the study of mean free path distributions in optically absorbing materials with relatively simple fabrication and a straightforward analysis scheme. We pattern 1D metallic grating of various line widths but fixed gap size on sample surfaces. The metal lines serve as both heaters and thermometers in time-domainmore » thermoreflectance measurements and simultaneously act as wiregrid polarizers that protect the underlying substrate from direct optical excitation and heating. We demonstrate the viability of this technique by studying length-dependent thermal conductivities of silicon at various temperatures. The thermal conductivities measured with different metal line widths are analyzed using suppression functions calculated from the Boltzmann transport equation to extract the phonon mean free path distributions with no calibration required. Furthermore, this table-top ultrafast thermal transport spectroscopy technique enables the study of mean free path spectra in a wide range of technologically important materials.« less
Drill string transmission line
Hall, David R.; Hall, Jr., H. Tracy; Pixton, David S.; Bradford, Kline; Fox, Joe
2006-03-28
A transmission line assembly for transmitting information along a downhole tool comprising a pin end, a box end, and a central bore traveling between the pin end and the box end, is disclosed in one embodiment of the invention as including a protective conduit. A transmission line is routed through the protective conduit. The protective conduit is routed through the central bore and the ends of the protective conduit are routed through channels formed in the pin end and box end of the downhole tool. The protective conduit is elastically forced into a spiral or other non-linear path along the interior surface of the central bore by compressing the protective conduit to a length within the downhole tool shorter than the protective conduit.
Genomes in the cloud: balancing privacy rights and the public good.
Ohno-Machado, Lucila; Farcas, Claudiu; Kim, Jihoon; Wang, Shuang; Jiang, Xiaoqian
2013-01-01
The NIH-funded iDASH1 National Center for Biomedical Computing was created in 2010 with the goal of developing infrastructure, algorithms, and tools to integrate Data for Analysis, 'anonymization,' and SHaring. iDASH is based on the premise that, while a strong case for not sharing information to preserve individual privacy can be made, an equally compelling case for sharing genome information for the public good (i.e., to support new discoveries that promote health or alleviate the burden of disease) should also be made. In fact, these cases do not need to be mutually exclusive: genome data sharing on a cloud does not necessarily have to compromise individual privacy, although current practices need significant improvement. So far, protection of subject data from re-identification and misuse has been relying primarily on regulations such as HIPAA, the Common Rule, and GINA. However, protection of biometrics such as a genome requires specialized infrastructure and tools.
Life Paths into Effective Environmental Action.
ERIC Educational Resources Information Center
Chawla, Louise
1999-01-01
Explores interviews with environmentalists in Kentucky (n=30) and Norway (n=26) who represented a broad range of issues from wilderness protection to urban planning to determine the sources of their environmental commitment. (Author/CCM)
2016-03-01
Simpson. 2009. Development of guidelines for ammonia in estuarine and marine water systems. Marine Pollution Bulletin 58:1472–1476. Boardman, G. D...waters of the United States and ocean waters is a shared responsibility of the USACE and U.S. Environmental Protection Agency (USEPA) under the Marine ...waters of the United States and ocean waters is a shared responsibility of USEPA and the USACE. The Marine Protection, Research, and Sanctuaries Act
McKinley, Duncan C.; Miller-Rushing, Abe J.; Ballard, Heidi L.; Bonney, Rick; Brown, Hutch; Cook-Patton, Susan; Evans, Daniel M.; French, Rebecca A.; Parrish, Julia; Phillips, Tina B.; Ryan, Sean F.; Shanley, Lea A.; Shirk, Jennifer L.; Stepenuck, Kristine F.; Weltzin, Jake F.; Wiggins, Andrea; Boyle, Owen D.; Briggs, Russell D.; Chapin, Stuart F.; Hewitt, David A.; Preuss, Peter W.; Soukup, Michael A.
2017-01-01
Citizen science has advanced science for hundreds of years, contributed to many peer-reviewed articles, and informed land management decisions and policies across the United States. Over the last 10 years, citizen science has grown immensely in the United States and many other countries. Here, we show how citizen science is a powerful tool for tackling many of the challenges faced in the field of conservation biology. We describe the two interwoven paths by which citizen science can improve conservation efforts, natural resource management, and environmental protection. The first path includes building scientific knowledge, while the other path involves informing policy and encouraging public action. We explore how citizen science is currently used and describe the investments needed to create a citizen science program. We find that:Citizen science already contributes substantially to many domains of science, including conservation, natural resource, and environmental science. Citizen science informs natural resource management, environmental protection, and policymaking and fosters public input and engagement.Many types of projects can benefit from citizen science, but one must be careful to match the needs for science and public involvement with the right type of citizen science project and the right method of public participation.Citizen science is a rigorous process of scientific discovery, indistinguishable from conventional science apart from the participation of volunteers. When properly designed, carried out, and evaluated, citizen science can provide sound science, efficiently generate high-quality data, and help solve problems.
Engineering paradigms and anthropogenic global change
NASA Astrophysics Data System (ADS)
Bohle, Martin
2016-04-01
This essay discusses 'paradigms' as means to conceive anthropogenic global change. Humankind alters earth-systems because of the number of people, the patterns of consumption of resources, and the alterations of environments. This process of anthropogenic global change is a composite consisting of societal (in the 'noosphere') and natural (in the 'bio-geosphere') features. Engineering intercedes these features; e.g. observing stratospheric ozone depletion has led to understanding it as a collateral artefact of a particular set of engineering choices. Beyond any specific use-case, engineering works have a common function; e.g. civil-engineering intersects economic activity and geosphere. People conceive their actions in the noosphere including giving purpose to their engineering. The 'noosphere' is the ensemble of social, cultural or political concepts ('shared subjective mental insights') of people. Among people's concepts are the paradigms how to shape environments, production systems and consumption patterns given their societal preferences. In that context, engineering is a means to implement a given development path. Four paradigms currently are distinguishable how to make anthropogenic global change happening. Among the 'engineering paradigms' for anthropogenic global change, 'adaptation' is a paradigm for a business-as-usual scenario and steady development paths of societies. Applying this paradigm implies to forecast the change to come, to appropriately design engineering works, and to maintain as far as possible the current production and consumption patterns. An alternative would be to adjust incrementally development paths of societies, namely to 'dovetail' anthropogenic and natural fluxes of matter and energy. To apply that paradigm research has to identify 'natural boundaries', how to modify production and consumption patterns, and how to tackle process in the noosphere to render alterations of common development paths acceptable. A further alternative, the paradigm of 'ecomodernism' implies to accentuate some of the current development paths of societies with the goal to 'decouple' anthropogenic and natural fluxes of matter and energy. Applying the paradigm 'geoengineering', engineering works shall 'modulate' natural fluxes of matter to counter the effect of anthropogenic fluxes of matter instead to alter the development paths of societies. Thus, anthropogenic global change is a composite process in which engineering intercedes the 'noosphere' and in the 'bio-geosphere'. Paradigms 'how to engineering earth systems' reflect different concepts ('shared subjective insights') how to combine knowledge with use, function and purpose. Currently, four paradigms are distinguishable how to engineer anthropogenic global change. They convene recipes human activity and bio-geosphere should intersect.
Kuchinke, Wolfgang; Krauth, Christian; Bergmann, René; Karakoyun, Töresin; Woollard, Astrid; Schluender, Irene; Braasch, Benjamin; Eckert, Martin; Ohmann, Christian
2016-07-07
In an unprecedented rate data in the life sciences is generated and stored in many different databases. An ever increasing part of this data is human health data and therefore falls under data protected by legal regulations. As part of the BioMedBridges project, which created infrastructures that connect more than 10 ESFRI research infrastructures (RI), the legal and ethical prerequisites of data sharing were examined employing a novel and pragmatic approach. We employed concepts from computer science to create legal requirement clusters that enable legal interoperability between databases for the areas of data protection, data security, Intellectual Property (IP) and security of biosample data. We analysed and extracted access rules and constraints from all data providers (databases) involved in the building of data bridges covering many of Europe's most important databases. These requirement clusters were applied to five usage scenarios representing the data flow in different data bridges: Image bridge, Phenotype data bridge, Personalised medicine data bridge, Structural data bridge, and Biosample data bridge. A matrix was built to relate the important concepts from data protection regulations (e.g. pseudonymisation, identifyability, access control, consent management) with the results of the requirement clusters. An interactive user interface for querying the matrix for requirements necessary for compliant data sharing was created. To guide researchers without the need for legal expert knowledge through legal requirements, an interactive tool, the Legal Assessment Tool (LAT), was developed. LAT provides researchers interactively with a selection process to characterise the involved types of data and databases and provides suitable requirements and recommendations for concrete data access and sharing situations. The results provided by LAT are based on an analysis of the data access and sharing conditions for different kinds of data of major databases in Europe. Data sharing for research purposes must be opened for human health data and LAT is one of the means to achieve this aim. In summary, LAT provides requirements in an interactive way for compliant data access and sharing with appropriate safeguards, restrictions and responsibilities by introducing a culture of responsibility and data governance when dealing with human data.
Elastomeric load sharing device
NASA Technical Reports Server (NTRS)
Isabelle, Charles J. (Inventor); Kish, Jules G. (Inventor); Stone, Robert A. (Inventor)
1992-01-01
An elastomeric load sharing device, interposed in combination between a driven gear and a central drive shaft to facilitate balanced torque distribution in split power transmission systems, includes a cylindrical elastomeric bearing and a plurality of elastomeric bearing pads. The elastomeric bearing and bearing pads comprise one or more layers, each layer including an elastomer having a metal backing strip secured thereto. The elastomeric bearing is configured to have a high radial stiffness and a low torsional stiffness and is operative to radially center the driven gear and to minimize torque transfer through the elastomeric bearing. The bearing pads are configured to have a low radial and torsional stiffness and a high axial stiffness and are operative to compressively transmit torque from the driven gear to the drive shaft. The elastomeric load sharing device has spring rates that compensate for mechanical deviations in the gear train assembly to provide balanced torque distribution between complementary load paths of split power transmission systems.
Continuing Caritas Journey-Reflections Upon a Shared Private Pilgrimage.
Watson, Jean
2014-09-01
This manuscript is a continuing saga of an earlier walking pilgrimage (El Camino in northern Spain): now a journey to Nepal, Bhutan, and Tibet, this time with others instead of alone. As I journeyed in close company with five others we experienced and expressed surprises about our selves and each other-our shared vulnerability, tolerance, and humility-uncovering lessons in living Caritas. As I trekked through these inner and outer adventures, Bhutan was discovered as a light of hope-a living metaphor of a people and a culture that hold and practice Caritas principles of loving-kindness, compassion, and equanimity for all sentient beings. Bhutan, a small country bordered by China and India, the only country in the world with a gross national happiness index and shared Caritas consciousness of oneness and connectedness of all, serves as a sacred path for humanity-a geographic Bodhisattva. © The Author(s) 2014.
Echols, Leslie
2014-01-01
This study examined the influence of academic teaming (i.e., sharing academic classes with the same classmates) on the relationship between social preference and peer victimization among 6th grade students in middle school. Approximately 1,000 participants were drawn from 5 middle schools that varied in their practice of academic teaming. A novel methodology for measuring academic teaming at the individual level was employed, in which students received their own teaming score based on the unique set of classmates with whom they shared academic courses in their class schedule. Using both peer- and self-reports of victimization, the results of two path models indicated that students with low social preference in highly teamed classroom environments were more victimized than low preference students who experienced less teaming throughout the school day. This effect was exaggerated in higher performing classrooms. Implications for the practice of academic teaming were discussed. PMID:25937668
Carlsund, Asa; Eriksson, Ulrika; Löfstedt, Petra; Sellström, Eva
2013-02-01
The increase in shared physical custody in Sweden has been dramatic; 20 years ago only a small percentage of adolescents lived in shared physical custody, but currently ∼30% of the adolescents whose parents have separated or divorced divide their residence between parents. We hypothesized that living in shared physical custody or in a single-parent family is associated with a higher prevalence of adolescent risk behaviour than living in a two-parent family. Data on 15-year-old adolescents from the 2005/2006 to 2009/2010 Swedish Health Behaviour in School-aged Children (HBSC) survey were analysed using logistic regression. Adolescents living in shared physical custody had slightly higher rates of risk behaviour compared with adolescents from two-parent families, but significantly lower rates than their counterparts from single-parent families. Their odds of being a smoker or having been drunk were 60 and 50% higher, respectively, than those of their counterparts in two-parent families. Shared physical custody after marriage break-up seems to constitute a health protective factor for adolescents' health and problem behaviour. In order to deepen our understanding of the positive and negative aspects of shared physical custody, our study should be followed by qualitative analyses and longitudinal studies of adolescents' experiences.
An Image Secret Sharing Method
2006-07-01
the secret image in lossless manner and (2) any or fewer image shares cannot get sufficient information to reveal the ... secret image. It is an effective, reliable and secure method to prevent the secret image from being lost, stolen or corrupted. In comparison with...other image secret sharing methods, this approach’s advantages are its large compression rate on the size of the image shares, its strong protection of the secret image and its ability for real-time
Let’s Dance Together: Synchrony, Shared Intentionality and Cooperation
Reddish, Paul; Fischer, Ronald; Bulbulia, Joseph
2013-01-01
Previous research has shown that the matching of rhythmic behaviour between individuals (synchrony) increases cooperation. Such synchrony is most noticeable in music, dance and collective rituals. As well as the matching of behaviour, such collective performances typically involve shared intentionality: performers actively collaborate to produce joint actions. Over three experiments we examined the importance of shared intentionality in promoting cooperation from group synchrony. Experiment 1 compared a condition in which group synchrony was produced through shared intentionality to conditions in which synchrony or asynchrony were created as a by-product of hearing the same or different rhythmic beats. We found that synchrony combined with shared intentionality produced the greatest level of cooperation. To examinef the importance of synchrony when shared intentionality is present, Experiment 2 compared a condition in which participants deliberately worked together to produce synchrony with a condition in which participants deliberately worked together to produce asynchrony. We found that synchrony combined with shared intentionality produced the greatest level of cooperation. Experiment 3 manipulated both the presence of synchrony and shared intentionality and found significantly greater cooperation with synchrony and shared intentionality combined. Path analysis supported a reinforcement of cooperation model according to which perceiving synchrony when there is a shared goal to produce synchrony provides immediate feedback for successful cooperation so reinforcing the group’s cooperative tendencies. The reinforcement of cooperation model helps to explain the evolutionary conservation of traditional music and dance performances, and furthermore suggests that the collectivist values of such cultures may be an essential part of the mechanisms by which synchrony galvanises cooperative behaviours. PMID:23951106
Dialog on a country path: the qualitative research journey.
Sorrell, Jeanne M; Cangelosi, Pamela R; Dinkins, Christine S
2014-03-01
There is little information in the literature describing how students learn qualitative research. This article describes an approach to learning that is based on the pedagogical approach of Dinkins' Socratic-Hermeneutic Shared Inquiry. This approach integrates shared dialog as an essential aspect of learning. The qualitative pedagogy described in this article focused on three questions: What is knowing in qualitative research? How do we come to know qualitative research? What can we do with qualitative research? Students learned the basics of qualitative research within a context that fostered interpretive inquiry. In this way, the course framework mirrored the combination of interviewing, storytelling, and journeying toward understanding that constitute qualitative research. © 2013.
Voss, James E.; Macauley, Matthew S.; Rogers, Kenneth A.; Villinger, Francois; Duan, Lijie; Shang, Liang; Fink, Elizabeth A.; Andrabi, Raiees; Colantonio, Arnaud D.; Robinson, James E.; Johnson, R. Paul; Burton, Dennis R.; Haase, Ashley T.
2016-01-01
Vaccination with SIVmac239Δnef provides robust protection against subsequent challenge with wild type SIV, but safety issues have precluded designing an HIV-1 vaccine based on a live attenuated virus concept. Safe immunogens and adjuvants that could reproduce identified immune correlates of SIVmac239Δnef protection therefore offer an alternative path for development of an HIV vaccine. Here we describe SIV envelope trimeric gp41 (gp41t) immunogens based on a protective correlate of antibodies to gp41t concentrated on the path of virus entry by the neonatal Fc receptor (FcRn) in cervical vaginal epithelium. We developed a gp41t immunogen-MPLA adjuvant liposomal nanoparticle for intra-muscular immunization and a gp41t-Fc immunogen for intranasal immunization for pilot studies in mice, rabbits, and rhesus macaques. Repeated immunizations to mimic persistent antigen exposure in infection elicited gp41t antibodies in rhesus macaques that were detectable in FcRn+ cervical vaginal epithelium, thus recapitulating one key feature of SIVmac239Δnef vaccinated and protected animals. While this strategy did not reproduce the system of local production of antibody in SIVmac239Δnef-vaccinated animals, passive immunization experiments supported the concept that sufficiently high levels of antibody can be concentrated by the FcRn at mucosal frontlines, thus setting the stage for assessing protection against vaginal challenge by gp41t immunization. PMID:27428745
42 CFR 480.143 - QIO involvement in shared health data systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... HUMAN SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) Disclosure of Confidential Information § 480.143 QIO involvement in shared health data...
42 CFR 480.143 - QIO involvement in shared health data systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... HUMAN SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) Disclosure of Confidential Information § 480.143 QIO involvement in shared health data...
42 CFR 480.143 - QIO involvement in shared health data systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... HUMAN SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) Disclosure of Confidential Information § 480.143 QIO involvement in shared health data...
As Libraries Go Digital, Sharing of Data Is at Odds with Tradition of Privacy
ERIC Educational Resources Information Center
Parry, Marc
2012-01-01
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Identifying Solution Paths in Cognitive Diagnosis.
1985-03-01
the clinical tradi- tion. Psychoanalysis gets its distinctive flavor to a large extent from the various diagnostic techniques pioneered by Freud and...his disciples: free association, dream analysis, and pro- jective tests. These methods are content-oriented, and aim at a detailed description of the...Also, Psychoanalysis shares with Test Psychology the ambition to find out about stable properties of the individual, properties of his mental life
ERIC Educational Resources Information Center
Zheng, Qian; Liang, Chang-Yong
2017-01-01
New information technology (new IT) plays an increasingly important role in the field of education, which greatly enriches the teaching means and promotes the sharing of education resources. However, because of the New Digital Divide existing, the impact of new IT on educational equality has yet to be discussed. Based on Information System Success…
ERIC Educational Resources Information Center
Bruce, Mary; Bridgeland, John
2014-01-01
This report shares the findings from the first nationally representative survey of young people's perspectives on mentoring. While mentoring is needed and wanted by young people to help them stay on the path to high school graduation, college success, and productive adulthood, a significant mentoring gap exists in America, especially for at-risk…
Oh, the Places They Went: SBOs Share Their Career Paths
ERIC Educational Resources Information Center
George, Patricia
2013-01-01
"Oh the Places You'll Go!" That Dr. Seuss book is a standard gift for graduates as they are sent out into the world-whether it's off to college or into the world of work. "You can steer yourself any direction you choose." What direction did school business officials take to get where they are today? The most recent…
... Offices Labs and Research Centers Contact Us Share Ozone Layer Protection The stratospheric ozone layer is Earth’s “ ... to ozone-depleting substances, and sun safety. Stratospheric Ozone Layer Basic Ozone Layer Science Health and Environmental ...
... Size Email Print Share Protecting Your Baby from RSV Page Content Article Body RSV is the most ... Your Baby's Chances of Developing a More Serious RSV Infection: Having people wash their hands with warm ...
77 FR 13959 - National Consumer Protection Week, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-08
....NCPW.gov . With the leadership of the Consumer Financial Protection Bureau (CFPB) and Director Richard... the CFPB. To share your own experience with consumer financial products, file a complaint, or find...
Salmonella in Wild Birds Utilizing Protected and Human Impacted Habitats, Uganda.
Afema, Josephine Azikuru; Sischo, William M
2016-09-01
As human populations in Africa expand, humans encroach and modify wildlife habitats for farming, fishing, tourism, or settlement. Anthropogenic activities in shared environments may promote transmission of zoonotic pathogens between humans, domestic animals, and wildlife. Between July 2012 and February 2014, we evaluated Salmonella prevalence, serovars, genotypes, and antibiotic resistant phenotypes in resident and migratory birds utilizing human-impacted habitats in northwestern Lake Victoria and protected habitats in Queen Elisabeth National Park. Salmonella occurrence in the urban environment was assessed by sampling storm-water and wastewater from a channel that drains Kampala City into Lake Victoria. Salmonella was detected in 4.3% pooled bird fecal samples, and 57.1% of environmental samples. While birds in impacted and protected areas shared serovars, the genotypes were distinct. We found distinct strains in birds and the environment suggesting some strains in birds are host adapted, and strains circulating in the environment may not necessarily disseminate to birds. Conversely, birds in both impacted and protected areas shared strains with the urban environment, suggesting Salmonella disseminates between impacted environments and birds across sites. Overall, more strains were observed in the urban environment compared to birds, and poses risk of Salmonella reemergence in birds and transmission across species and space.
GLOBAL ALTERNATIVE FUTURE SCENARIOS
One way to examine possible future outcomes for environmental protection is through the development and analysis of alternative future scenarios. This type of assessment postulates two or more different paths that social and environmental development might take, using correspond...
Li, Ting; Hong, Jun; Zhang, Jinhua; Guo, Feng
2014-03-15
The improvement of the resolution of brain signal and the ability to control external device has been the most important goal in BMI research field. This paper describes a non-invasive brain-actuated manipulator experiment, which defined a paradigm for the motion control of a serial manipulator based on motor imagery and shared control. The techniques of component selection, spatial filtering and classification of motor imagery were involved. Small-world neural network (SWNN) was used to classify five brain states. To verify the effectiveness of the proposed classifier, we replace the SWNN classifier by a radial basis function (RBF) networks neural network, a standard multi-layered feed-forward backpropagation network (SMN) and a multi-SVM classifier, with the same features for the classification. The results also indicate that the proposed classifier achieves a 3.83% improvement over the best results of other classifiers. We proposed a shared control method consisting of two control patterns to expand the control of BMI from the software angle. The job of path building for reaching the 'end' point was designated as an assessment task. We recorded all paths contributed by subjects and picked up relevant parameters as evaluation coefficients. With the assistance of two control patterns and series of machine learning algorithms, the proposed BMI originally achieved the motion control of a manipulator in the whole workspace. According to experimental results, we confirmed the feasibility of the proposed BMI method for 3D motion control of a manipulator using EEG during motor imagery. Copyright © 2013 Elsevier B.V. All rights reserved.
Retrieving and routing quantum information in a quantum network
NASA Astrophysics Data System (ADS)
Sazim, S.; Chiranjeevi, V.; Chakrabarty, I.; Srinathan, K.
2015-12-01
In extant quantum secret sharing protocols, once the secret is shared in a quantum network ( qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instance, if the dealer is part of the two qnets, say {{Q}}_1 and {{Q}}_2 and he/she subsequently finds that {{Q}}_2 is more reliable than {{Q}}_1, he/she may wish to transfer all her secrets from {{Q}}_1 to {{Q}}_2. Known protocols are inadequate to address such a revocation. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, the no-cloning theorem automatically ensures that the secret is no longer shared in the network. The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous qnets. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the qnet. For example, we show that a source S can send quantum information to a destination R even though (a) S and R share no quantum resource, (b) R's identity is unknown to S at the time of sending the message, but is subsequently decided, (c) S herself can be R at a later date and/or in a different location to bequeath her information (`backed-up' in the qnet) and (d) importantly, the path chosen for routing the secret may hit a dead end due to resource constraints, congestion, etc., (therefore the information needs to be back-tracked and sent along an alternate path). Another implication of our technique is the possibility of using insecure resources. For instance, if the quantum memory within an organization is insufficient, it may safely store (using our protocol) its private information with a neighboring organization without (a) revealing critical data to the host and (b) losing control over retrieving the data. Putting the two implications together, namely routing and secure storage, it is possible to envision applications like quantum mail (qmail) as an outsourced service.
42 CFR 480.143 - QIO involvement in shared health data systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... HUMAN SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION REVIEW INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) Disclosure of Confidential Information § 480.143 QIO involvement in shared health data...
42 CFR 480.143 - QIO involvement in shared health data systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... HUMAN SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION REVIEW INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) Disclosure of Confidential Information § 480.143 QIO involvement in shared health data...
Alternative Fuels Data Center: Coalition Leader Establishes Unique
Initiatives to Effect Change and Protect Ecosystem Coalition Leader Establishes Unique Initiatives to Effect Change and Protect Ecosystem to someone by E-mail Share Alternative Fuels Data Center : Coalition Leader Establishes Unique Initiatives to Effect Change and Protect Ecosystem on Facebook Tweet
Transatlantic Collaboration: Government Policies, Industry Perspectives
1993-01-01
nations would be better able to rationalize, standardize, and increase the interoperability (RSI) of their forces. RSI was seen as a positive outcome for...peacetime, it was hoped that collaboration would also increase NATO burden-sharing. Concern over burden-sharing and RSI led Congress to pass three...to increase RSI and burden-sharing. Protective trade barriers and Buy America provisions make collaborative programs less, rather than more, feasible
Optimizing End-to-End Big Data Transfers over Terabits Network Infrastructure
Kim, Youngjae; Atchley, Scott; Vallee, Geoffroy R.; ...
2016-04-05
While future terabit networks hold the promise of significantly improving big-data motion among geographically distributed data centers, significant challenges must be overcome even on today's 100 gigabit networks to realize end-to-end performance. Multiple bottlenecks exist along the end-to-end path from source to sink, for instance, the data storage infrastructure at both the source and sink and its interplay with the wide-area network are increasingly the bottleneck to achieving high performance. In this study, we identify the issues that lead to congestion on the path of an end-to-end data transfer in the terabit network environment, and we present a new bulkmore » data movement framework for terabit networks, called LADS. LADS exploits the underlying storage layout at each endpoint to maximize throughput without negatively impacting the performance of shared storage resources for other users. LADS also uses the Common Communication Interface (CCI) in lieu of the sockets interface to benefit from hardware-level zero-copy, and operating system bypass capabilities when available. It can further improve data transfer performance under congestion on the end systems using buffering at the source using flash storage. With our evaluations, we show that LADS can avoid congested storage elements within the shared storage resource, improving input/output bandwidth, and data transfer rates across the high speed networks. We also investigate the performance degradation problems of LADS due to I/O contention on the parallel file system (PFS), when multiple LADS tools share the PFS. We design and evaluate a meta-scheduler to coordinate multiple I/O streams while sharing the PFS, to minimize the I/O contention on the PFS. Finally, with our evaluations, we observe that LADS with meta-scheduling can further improve the performance by up to 14 percent relative to LADS without meta-scheduling.« less
Optimizing End-to-End Big Data Transfers over Terabits Network Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Youngjae; Atchley, Scott; Vallee, Geoffroy R.
While future terabit networks hold the promise of significantly improving big-data motion among geographically distributed data centers, significant challenges must be overcome even on today's 100 gigabit networks to realize end-to-end performance. Multiple bottlenecks exist along the end-to-end path from source to sink, for instance, the data storage infrastructure at both the source and sink and its interplay with the wide-area network are increasingly the bottleneck to achieving high performance. In this study, we identify the issues that lead to congestion on the path of an end-to-end data transfer in the terabit network environment, and we present a new bulkmore » data movement framework for terabit networks, called LADS. LADS exploits the underlying storage layout at each endpoint to maximize throughput without negatively impacting the performance of shared storage resources for other users. LADS also uses the Common Communication Interface (CCI) in lieu of the sockets interface to benefit from hardware-level zero-copy, and operating system bypass capabilities when available. It can further improve data transfer performance under congestion on the end systems using buffering at the source using flash storage. With our evaluations, we show that LADS can avoid congested storage elements within the shared storage resource, improving input/output bandwidth, and data transfer rates across the high speed networks. We also investigate the performance degradation problems of LADS due to I/O contention on the parallel file system (PFS), when multiple LADS tools share the PFS. We design and evaluate a meta-scheduler to coordinate multiple I/O streams while sharing the PFS, to minimize the I/O contention on the PFS. Finally, with our evaluations, we observe that LADS with meta-scheduling can further improve the performance by up to 14 percent relative to LADS without meta-scheduling.« less
Electronic Resources for Security Related Information, CIAC-2307 R.1
1994-12-01
administrators NETwork - Statistics about the network NODEntry node1 <node2 <…>> - BITEARN NODES entry for the specified node(s) NODEntry node1 / abc */xyz...Just the “:xyz.” tag and all tags whose name starts with “ abc ” PATHs snode node1 <node2 <…>> - BITNET path between “snode” and the specified node(s...protect their data and sytems . The mention of vendors or product names does not imply criticism or endorsement by the National Institute of Standards
Are Data Sharing and Privacy Protection Mutually Exclusive?
Joly, Yann; Dyke, Stephanie O M; Knoppers, Bartha M; Pastinen, Tomi
2016-11-17
We review emerging strategies to protect the privacy of research participants in international epigenome research: open consent, genome donation, registered access, automated procedures, and privacy-enhancing technologies. Copyright © 2016 Elsevier Inc. All rights reserved.
Insect Repellents: Protect Your Child from Insect Bites
... Print Share Choosing an Insect Repellent for Your Child Page Content Mosquitoes, biting flies, and tick bites ... container with you. Other Ways to Protect Your Child from Insect Bites While you can’t prevent ...
Pre-configured polyhedron based protection against multi-link failures in optical mesh networks.
Huang, Shanguo; Guo, Bingli; Li, Xin; Zhang, Jie; Zhao, Yongli; Gu, Wanyi
2014-02-10
This paper focuses on random multi-link failures protection in optical mesh networks, instead of single, the dual or sequential failures of previous studies. Spare resource efficiency and failure robustness are major concerns in link protection strategy designing and a k-regular and k-edge connected structure is proved to be one of the optimal solutions for link protection network. Based on this, a novel pre-configured polyhedron based protection structure is proposed, and it could provide protection for both simultaneous and sequential random link failures with improved spare resource efficiency. Its performance is evaluated in terms of spare resource consumption, recovery rate and average recovery path length, as well as compared with ring based and subgraph protection under probabilistic link failure scenarios. Results show the proposed novel link protection approach has better performance than previous works.
Spatially modulated interferometer and beam shearing device therefor
NASA Technical Reports Server (NTRS)
Reininger, Francis M. (Inventor)
2004-01-01
A spatially modulated interferometer incorporates a beam shearing system having a plurality of reflective surfaces defining separate light paths of equal optical path length for two separate output beams. The reflective surfaces are arranged such that when the two beams emerge from the beam shearing system they contain more than 50 percent of the photon flux within the selected spectral pass band. In one embodiment, the reflective surfaces are located on a number of prism elements combined to form a beam shearing prism structure. The interferometer utilizing the beam sharing system of the invention includes fore-optics for collecting light and focusing it into a beam to be sheared, and a detector located at an exit pupil of the device. In a preferred embodiment, the interferometer has no moving parts.
Computing Maximum Cardinality Matchings in Parallel on Bipartite Graphs via Tree-Grafting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Azad, Ariful; Buluc, Aydn; Pothen, Alex
It is difficult to obtain high performance when computing matchings on parallel processors because matching algorithms explicitly or implicitly search for paths in the graph, and when these paths become long, there is little concurrency. In spite of this limitation, we present a new algorithm and its shared-memory parallelization that achieves good performance and scalability in computing maximum cardinality matchings in bipartite graphs. This algorithm searches for augmenting paths via specialized breadth-first searches (BFS) from multiple source vertices, hence creating more parallelism than single source algorithms. Algorithms that employ multiple-source searches cannot discard a search tree once no augmenting pathmore » is discovered from the tree, unlike algorithms that rely on single-source searches. We describe a novel tree-grafting method that eliminates most of the redundant edge traversals resulting from this property of multiple-source searches. We also employ the recent direction-optimizing BFS algorithm as a subroutine to discover augmenting paths faster. Our algorithm compares favorably with the current best algorithms in terms of the number of edges traversed, the average augmenting path length, and the number of iterations. Here, we provide a proof of correctness for our algorithm. Our NUMA-aware implementation is scalable to 80 threads of an Intel multiprocessor and to 240 threads on an Intel Knights Corner coprocessor. On average, our parallel algorithm runs an order of magnitude faster than the fastest algorithms available. The performance improvement is more significant on graphs with small matching number.« less
Computing Maximum Cardinality Matchings in Parallel on Bipartite Graphs via Tree-Grafting
Azad, Ariful; Buluc, Aydn; Pothen, Alex
2016-03-24
It is difficult to obtain high performance when computing matchings on parallel processors because matching algorithms explicitly or implicitly search for paths in the graph, and when these paths become long, there is little concurrency. In spite of this limitation, we present a new algorithm and its shared-memory parallelization that achieves good performance and scalability in computing maximum cardinality matchings in bipartite graphs. This algorithm searches for augmenting paths via specialized breadth-first searches (BFS) from multiple source vertices, hence creating more parallelism than single source algorithms. Algorithms that employ multiple-source searches cannot discard a search tree once no augmenting pathmore » is discovered from the tree, unlike algorithms that rely on single-source searches. We describe a novel tree-grafting method that eliminates most of the redundant edge traversals resulting from this property of multiple-source searches. We also employ the recent direction-optimizing BFS algorithm as a subroutine to discover augmenting paths faster. Our algorithm compares favorably with the current best algorithms in terms of the number of edges traversed, the average augmenting path length, and the number of iterations. Here, we provide a proof of correctness for our algorithm. Our NUMA-aware implementation is scalable to 80 threads of an Intel multiprocessor and to 240 threads on an Intel Knights Corner coprocessor. On average, our parallel algorithm runs an order of magnitude faster than the fastest algorithms available. The performance improvement is more significant on graphs with small matching number.« less
NASA Astrophysics Data System (ADS)
Wu, Wenli; Radosevich, Andrew J.; Eshein, Adam; Nguyen, The-Quyen; Backman, Vadim
2016-03-01
Diverging beam illumination is widely used in many optical techniques especially in fiber optic applications and coherence phenomenon is one of the most important properties to consider for these applications. Until now, people have used Monte Carlo simulations to study the backscattering coherence phenomenon in collimated beam illumination only. We are the first one to study the coherence phenomenon under the exact diverging beam geometry by taking into account the impossibility of the existence for the exact time-reversed path pairs of photons, which is the main contribution to the backscattering coherence pattern in collimated beam. In this work, we present a Monte Carlo simulation that considers the influence of the illumination numerical aperture. The simulation tracks the electric field for the unique paths of forward path and reverse path in time-reversed pairs of photons as well as the same path shared by them. With this approach, we can model the coherence pattern formed between the pairs by considering their phase difference at the collection plane directly. To validate this model, we use the Low-coherence Enhanced Backscattering Spectroscopy, one of the instruments looking at the coherence pattern using diverging beam illumination, as the benchmark to compare with. In the end, we show how this diverging configuration would significantly change the coherent pattern under coherent light source and incoherent light source. This Monte Carlo model we developed can be used to study the backscattering phenomenon in both coherence and non-coherence situation with both collimated beam and diverging beam setups.
Pedestrian flow-path modeling to support tsunami-evacuation planning
NASA Astrophysics Data System (ADS)
Wood, N. J.; Jones, J. M.; Schmidtlein, M.
2015-12-01
Near-field tsunami hazards are credible threats to many coastal communities throughout the world. Along the U.S. Pacific Northwest coast, low-lying areas could be inundated by a series of catastrophic tsunamis potentially arriving in a matter of minutes following a Cascadia subduction zone (CSZ) earthquake. We developed a geospatial-modeling method for characterizing pedestrian-evacuation flow paths and evacuation basins to support evacuation and relief planning efforts for coastal communities in this region. We demonstrate this approach using the coastal communities of Aberdeen, Hoquiam, and Cosmopolis in southwestern Grays Harbor County, Washington (USA), where previous research suggests approximately 20,500 people (99% of the residents in tsunami-hazard zones) will likely have enough time to evacuate before tsunami-wave arrival. Geospatial, anisotropic, path distance models were developed to map the most efficient pedestrian paths to higher ground from locations within the tsunami-hazard zone. This information was then used to identify evacuation basins, outlining neighborhoods sharing a common evacuation pathway to safety. We then estimated the number of people traveling along designated evacuation pathways and arriving at pre-determined safe assembly areas, helping determine shelter demand and relief support (e.g., for elderly individuals or tourists). Finally, we assessed which paths may become inaccessible due to earthquake-induced ground failures, a factor which may impact an individual's success in reaching safe ground. The presentation will include a discussion of the implications of our analysis for developing more comprehensive coastal community tsunami-evacuation planning strategies worldwide.
Hart, Kristen M.; Lamont, Margaret M.; Fujisaki, Ikuko; Tucker, Anton D.; Carthy, Raymond R.
2012-01-01
Designing conservation strategies that protect wide-ranging marine species is a significant challenge, but integrating regional telemetry datasets and synthesizing modeled movements and behavior offer promise for uncovering distinct at-sea areas that are important habitats for imperiled marine species. Movement paths of 10 satellite-tracked female loggerheads (Caretta caretta) from three separate subpopulations in the Gulf of Mexico, USA, revealed migration to discrete foraging sites in two common areas at-sea in 2008, 2009, and 2010. Foraging sites were 102–904 km away from nesting and tagging sites, and located off southwest Florida and the northern Yucatan Peninsula, Mexico. Within 3–35 days, turtles migrated to foraging sites where they all displayed high site fidelity over time. Core-use foraging areas were 13.0–335.2 km2 in size, in water <50 m deep, within a mean distance to nearest coastline of 58.5 km, and in areas of relatively high net primary productivity. The existence of shared regional foraging sites highlights an opportunity for marine conservation strategies to protect important at-sea habitats for these imperiled marine turtles, in both USA and international waters. Until now, knowledge of important at-sea foraging areas for adult loggerheads in the Gulf of Mexico has been limited. To better understand the spatial distribution of marine turtles that have complex life-histories, we propose further integration of disparate tracking data-sets at the oceanic scale along with modeling of movements to identify critical at-sea foraging habitats where individuals may be resident during non-nesting periods.
3 CFR 8941 - Proclamation 8941 of March 21, 2013. Education and Sharing Day, U.S.A., 2013
Code of Federal Regulations, 2014 CFR
2014-01-01
... did in 1785: that just as we oweour children a strong start in the classroom, so must we pass on the... education is essential to putting our children on the path to good jobs and a decent living. It is a simple... parents, teachers, and mentors to make sure our children grow up practicing the values we preach. We have...
Air Force Space Situational Awareness
2018-03-13
knowledge sharing vital to innovation. CyberWorx deliberately reaches across specialties to bring diverse perspectives to a problem in a non -threatening...design sprint to lay out a fast, viable path forward for the AF to enable better experimentation and unity of efforts toward the future. Participants in...in industry and even in their personal lives. CyberWorx was asked to address the challenges of incorporating non - traditional (open source, academic
High Dynamic Range Nonlinear Measurement using Analog Cancellation
2012-10-01
shield around sensitive areas. The target may also be sensitive to radiated coupling from the system and will benefit from a shield box or Faraday ... cage , if it is not already enclosed. On the shared measurement path and through the target, cross-channel coupling cannot be prevented, so low-PIM...testing is desired, traditional filtering is recommended, as the primary benefits of the analog canceller are effectively nullified. 2.4 Wideband
Air Force Command and Control: The Path Ahead. Volume 1: Summary
2000-12-01
benefits of an integrated approach to implementation. The organization, management, and process are not in place to carry out the evolution in...critical support for successful EAF operations. 9 Air Force Space Operations Center (AFSPACE) AOC. The 14th Air Force AFSPACE AOC is an in- place ...right times and places , so that they can pass consistent data that convert to shared understanding, ultimately producing cooperative decision making
Emerging immunotherapies for rheumatoid arthritis
Reynolds, Gary; Cooles, Faye AH; Isaacs, John D; Hilkens, Catharien MU
2014-01-01
Novel treatments in development for rheumatoid arthritis target 3 broad areas: cytokines, cells, and signaling pathways. Therapies from each domain share common advantages (for example previously demonstrated efficacy, potential long-term immunomodulation, and oral administration respectively) that have stimulated research in each area but also common obstacles to their development. In this review recent progress in each area will be discussed alongside the factors that have impeded their path to clinical use. PMID:24535556
Alvarez, Blanca Beatriz; Delfino, Giovanni; Nosi, Daniele; Terreni, Alessandro
2005-02-01
Serous (poison) cutaneous glands of the leptodactylid species Physalaemus albonotatus and Leptodactylus chaquensis were compared using light and transmission electron microscopy. Glands in the two species share structural traits common in anurans, including the peripheral contractile sheath (myoepithelium) and the syncytial secretory unit that produces, stores, and modifies the poison. At the ultrastructural level, early steps of poison production are also similar and fit the usual path of proteosynthesis, involving rough endoplasmic reticulum (RER) and Golgi stacks (dictyosomes) in the peripheral syncytial cytoplasm. However, several differences are obvious during the maturational processes that lead post-Golgian products to their ultimate ultrastructural traits. In P. albonotatus, the dense product released from the dictyosomes acquires a thick repeating substructure, which, however, becomes looser in the inner portion of the syncytium. In L. chaquensis, serous maturation involves gradual condensation, and opaque, somewhat "vacuolized" granules are formed. These different maturational paths expressed during poison manufacturing in the two species agree with the polyphyletic origin of the family Leptodactylidae. On the other hand, data collected for P. albonotatus fit previous findings from P. biligonigerus and stress the view that poisons produced by congeneric species share similar (or identical) ultrastructural features. Copyright 2004 Wiley-Liss, Inc.
Micalizzi, Lauren; Ronald, Angelica; Saudino, Kimberly J.
2015-01-01
A genetically informed cross-lagged model was applied to twin data to explore etiological links between autistic-like traits and affective problems in early childhood. The sample comprised 310 same-sex twin pairs (143 monozygotic and 167 dizygotic; 53% male). Autistic-like traits and affective problems were assessed at ages 2 and 3 using parent ratings. Both constructs were related within and across age (r = .30−.53) and showed moderate stability (r = .45−.54). Autistic-like traits and affective problems showed genetic and environmental influences at both ages. Whereas at age 2, the covariance between autistic-like traits and affective problems was entirely due to environmental influences (shared and nonshared), at age 3, genetic factors also contributed to the covariance between constructs. The stability paths, but not the cross-lagged paths, were significant, indicating that there is stability in both autistic-like traits and affective problems but they do not mutually influence each other across age. Stability effects were due to genetic, shared, and nonshared environmental influences. Substantial novel genetic and nonshared environmental influences emerge at age 3 and suggest change in the etiology of these constructs over time. During early childhood, autistic-like traits tend to occur alongside affective problems and partly overlapping genetic and environmental influences explain this association. PMID:26456961
Eclipse Across America: Through the Eyes of NASA
NASA Astrophysics Data System (ADS)
Young, C. Alex; Heliophysics Education Consortium
2018-01-01
Monday, August 21, 2017, marked the first total solar eclipse to cross the continental United States coast-to-coast in almost a century. NASA scientists and educators, working alongside many partners, were spread across the entire country, both inside and outside the path of totality. Like many other organizations, NASA prepared for this eclipse for several years. The August 21 eclipse was NASA's biggest media event in recent history, and was made possible by the work of thousands of volunteers, collaborators and NASA employees. The agency supported science, outreach, and media communications activities along the path of totality and across the country. This culminated in a 3 ½-hour broadcast from Charleston, SC, showcasing the sights and sounds of the eclipse – starting with the view from a plane off the coast of Oregon and ending with images from the International Space Station as the Moon's inner shadow left the US East Coast. Along the way, NASA shared experiments and research from different groups of scientists, including 11 NASA-supported studies, 50+ high-altitude balloon launches, and 12 NASA and partner space-based assets. This talk shares the timeline of this momentous event from NASA's perspective, describing outreach successes and providing a glimpse at some of the science results available and yet to come.
Historical Trauma and Substance Use among Native Hawaiian College Students
Pokhrel, Pallav; Herzog, Thaddeus A.
2016-01-01
Objectives To test the relationships among historical trauma, perceived discrimination, and substance use (cigarette, alcohol, and marijuana use) among Native Hawaiians. Methods Cross sectional self-report data were collected online from 128 Native Hawaiian community college students (M age = 27.5; SD = 9.5; 65% Women). Hypotheses were tested using structural equation modeling. Results Historical trauma had 2 paths to substance use: an indirect path to higher substance use through higher perceived discrimination and a direct path to lower substance use. Conclusions Thoughts, knowledge, or experience associated with historical trauma may enhance substance use behavior via increased perceived discrimination and may also be protective against substance use, possibly via increased pride in one's cultural heritage. This research has implications for historical trauma, discrimination, and substance use research concerning Native Hawaiians. PMID:24636038
Promises and Limitations of RFI Canceling Solutions
NASA Astrophysics Data System (ADS)
Fisher, J. R.
2004-05-01
Recent years have seen a kindling of interest in signal processing solutions to radio frequency interference (RFI) to astronomical observations. Over a dozen refereed papers and several dozen conference presentations on the subject are now in the astronomical and engineering literature. This work builds on several decades of signal processing development in the fields of acoustics and communications for which there are a number of standard texts. Radio astronomy has the unique requirement that interference must be suppressed below very low detection thresholds before the scientific results of observations can be considered reliable. These detection thresholds are several orders of magnitude lower than is typical of communications signal levels. Initial trials of coherent cancellation of TV and satellite signals and blanking of pulsed interference, such as radar and aircraft signals, are encouraging, but the signal processing power required for useful bandwidths is sobering. Simultaneous cancellation of many signals and compensation for multi-path propagation effects of distant transmitters add to the processing load and are challenges that remain to be tackled. Spectrum management is becoming increasingly complex with greater emphasis on spectrum sharing in the time and spacial domains. This requires a better understanding of long-distance propagation effects and the techniques and economics of signal separation to guide the protection of the scientific use of the radio spectrum. The traditional concept of frequency allocations will be only one aspect of spectrum management in the coming years. Active users of the spectrum will expect us to devote some of our engineering and managerial resources to spectrum sharing agreements, Hence, we need to continually build a firm technical footing upon which to base our negotiating positions. The NRAO is operated for the National Science Foundation (NSF) by Associated Universities, Inc. (AUI), under a cooperative agreement.
How strong are passwords used to protect personal health information in clinical trials?
El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth
2011-02-11
Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.
The Effect of Share 35 on Biliary Complications: an Interrupted Time Series Analysis.
Fleming, J N; Taber, D J; Axelrod, D; Chavin, K D
2018-05-16
The purpose of the Share 35 allocation policy was to improve liver transplant waitlist mortality, targeting high MELD waitlisted patients. However, policy changes may also have unintended consequences that must be balanced with the primary desired outcome. We performed an interrupted time series assessing the impact of Share 35 on biliary complications in a select national liver transplant population using the Vizient CDB/RM ™ database. Liver transplants that occurred between October 2012 and September 2015 were included. There was a significant change in the incident-rate of biliary complications between Pre-Share 35 (n=3,018) and Post-Share 35 (n=9,984) cohorts over time (p=0.023, r2=0.44). As a control, a subanalysis was performed throughout the same time period in Region 9 transplant centers, where a broad sharing agreement had previously been implemented. In the subanalysis, there was no change in the incident-rate of biliary complications between the two time periods. Length of stay and mean direct cost demonstrated a change after implementation of Share 35, although they did not meet statistical difference. While the target of improved waitlist mortality is of utmost importance for the equitable allocation of organs, unintended consequences of policy changes should be studied for a full assessment of a policy's impact. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
To share or not to share? Expected pros and cons of data sharing in radiological research.
Sardanelli, Francesco; Alì, Marco; Hunink, Myriam G; Houssami, Nehmat; Sconfienza, Luca M; Di Leo, Giovanni
2018-06-01
The aims of this paper are to illustrate the trend towards data sharing, i.e. the regulated availability of the original patient-level data obtained during a study, and to discuss the expected advantages (pros) and disadvantages (cons) of data sharing in radiological research. Expected pros include the potential for verification of original results with alternative or supplementary analyses (including estimation of reproducibility), advancement of knowledge by providing new results by testing new hypotheses (not explored by the original authors) on pre-existing databases, larger scale analyses based on individual-patient data, enhanced multidisciplinary cooperation, reduced publication of false studies, improved clinical practice, and reduced cost and time for clinical research. Expected cons are outlined as the risk that the original authors could not exploit the entire potential of the data they obtained, possible failures in patients' privacy protection, technical barriers such as the lack of standard formats, and possible data misinterpretation. Finally, open issues regarding data ownership, the role of individual patients, advocacy groups and funding institutions in decision making about sharing of data and images are discussed. • Regulated availability of patient-level data of published clinical studies (data-sharing) is expected. • Expected benefits include verification/advancement of knowledge, reduced cost/time of research, clinical improvement. • Potential drawbacks include faults in patients' identity protection and data misinterpretation.
How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?
Moreau, Katherine; Jonker, Elizabeth
2011-01-01
Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106
Tracing the Potential Flow of Consumer Data: A Network Analysis of Prominent Health and Fitness Apps
Held, Fabian P; Bero, Lisa A
2017-01-01
Background A great deal of consumer data, collected actively through consumer reporting or passively through sensors, is shared among apps. Developers increasingly allow their programs to communicate with other apps, sensors, and Web-based services, which are promoted as features to potential users. However, health apps also routinely pose risks related to information leaks, information manipulation, and loss of information. There has been less investigation into the kinds of user data that developers are likely to collect, and who might have access to it. Objective We sought to describe how consumer data generated from mobile health apps might be distributed and reused. We also aimed to outline risks to individual privacy and security presented by this potential for aggregating and combining user data across apps. Methods We purposively sampled prominent health and fitness apps available in the United States, Canada, and Australia Google Play and iTunes app stores in November 2015. Two independent coders extracted data from app promotional materials on app and developer characteristics, and the developer-reported collection and sharing of user data. We conducted a descriptive analysis of app, developer, and user data collection characteristics. Using structural equivalence analysis, we conducted a network analysis of sampled apps’ self-reported sharing of user-generated data. Results We included 297 unique apps published by 231 individual developers, which requested 58 different permissions (mean 7.95, SD 6.57). We grouped apps into 222 app families on the basis of shared ownership. Analysis of self-reported data sharing revealed a network of 359 app family nodes, with one connected central component of 210 app families (58.5%). Most (143/222, 64.4%) of the sampled app families did not report sharing any data and were therefore isolated from each other and from the core network. Fifteen app families assumed more central network positions as gatekeepers on the shortest paths that data would have to travel between other app families. Conclusions This cross-sectional analysis highlights the possibilities for user data collection and potential paths that data is able to travel among a sample of prominent health and fitness apps. While individual apps may not collect personally identifiable information, app families and the partners with which they share data may be able to aggregate consumer data, thus achieving a much more comprehensive picture of the individual consumer. The organizations behind the centrally connected app families represent diverse industries, including apparel manufacturers and social media platforms that are not traditionally involved in health or fitness. This analysis highlights the potential for anticipated and voluntary but also possibly unanticipated and involuntary sharing of user data, validating privacy and security concerns in mobile health. PMID:28659254
OPTICAL REMOTE SENSING FOR AIR QUALITY MONITORING
The paper outlines recent developments in using optical remote sensing (ORS) instruments for air quality monitoring both for gaseous pollutants and airborne particulate matter (PM). The U.S. Environmental Protection Agency (EPA) has been using open-path Fourier transform infrared...
Effects of eHealth Literacy on General Practitioner Consultations: A Mediation Analysis
Fitzpatrick, Mary Anne; Hess, Alexandra; Sudbury-Riley, Lynn; Hartung, Uwe
2017-01-01
Background Most evidence (not all) points in the direction that individuals with a higher level of health literacy will less frequently utilize the health care system than individuals with lower levels of health literacy. The underlying reasons of this effect are largely unclear, though people’s ability to seek health information independently at the time of wide availability of such information on the Internet has been cited in this context. Objective We propose and test two potential mediators of the negative effect of eHealth literacy on health care utilization: (1) health information seeking and (2) gain in empowerment by information seeking. Methods Data were collected in New Zealand, the United Kingdom, and the United States using a Web-based survey administered by a company specialized on providing online panels. Combined, the three samples resulted in a total of 996 baby boomers born between 1946 and 1965 who had used the Internet to search for and share health information in the previous 6 months. Measured variables include eHealth literacy, Internet health information seeking, the self-perceived gain in empowerment by that information, and the number of consultations with one’s general practitioner (GP). Path analysis was employed for data analysis. Results We found a bundle of indirect effect paths showing a positive relationship between health literacy and health care utilization: via health information seeking (Path 1), via gain in empowerment (Path 2), and via both (Path 3). In addition to the emergence of these indirect effects, the direct effect of health literacy on health care utilization disappeared. Conclusions The indirect paths from health literacy via information seeking and empowerment to GP consultations can be interpreted as a dynamic process and an expression of the ability to find, process, and understand relevant information when that is necessary. PMID:28512081
Thioarsenides: A case for long-range Lewis acid-base-directed van der Waals interactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gibbs, Gerald V.; Wallace, Adam F.; Downs, R. T.
2011-04-01
Electron density distributions, bond paths, Laplacian and local energy density properties have been calculated for a number of As4Sn (n = 3,4,5) thioarsenide molecular crystals. On the basis of the distributions, the intramolecular As-S and As-As interactions classify as shared bonded interactions and the intermolecular As-S, As-As and S-S interactions classify as closed-shell van der Waals bonded interactions. The bulk of the intermolecular As-S bond paths link regions of locally concentrated electron density (Lewis base regions) with aligned regions of locally depleted electron density (Lewis acid regions) on adjacent molecules. The paths are comparable with intermolecular paths reported for severalmore » other molecular crystals that link aligned Lewis base and acid regions in a key-lock fashion, interactions that classified as long range Lewis acid-base directed van der Waals interactions. As the bulk of the intermolecular As-S bond paths (~70%) link Lewis acid-base regions on adjacent molecules, it appears that molecules adopt an arrangement that maximizes the number of As-S Lewis acid-base intermolecular bonded interactions. The maximization of the number of Lewis acid-base interactions appears to be connected with the close-packed array adopted by molecules: distorted cubic close-packed arrays are adopted for alacránite, pararealgar, uzonite, realgar and β-AsS and the distorted hexagonal close-packed arrays adopted by α- and β-dimorphite. A growth mechanism is proposed for thioarsenide molecular crystals from aqueous species that maximizes the number of long range Lewis acid-base vdW As-S bonded interactions with the resulting directed bond paths structuralizing the molecules as a molecular crystal.« less
A community effort to protect genomic data sharing, collaboration and outsourcing.
Wang, Shuang; Jiang, Xiaoqian; Tang, Haixu; Wang, Xiaofeng; Bu, Diyue; Carey, Knox; Dyke, Stephanie Om; Fox, Dov; Jiang, Chao; Lauter, Kristin; Malin, Bradley; Sofia, Heidi; Telenti, Amalio; Wang, Lei; Wang, Wenhao; Ohno-Machado, Lucila
2017-01-01
The human genome can reveal sensitive information and is potentially re-identifiable, which raises privacy and security concerns about sharing such data on wide scales. In 2016, we organized the third Critical Assessment of Data Privacy and Protection competition as a community effort to bring together biomedical informaticists, computer privacy and security researchers, and scholars in ethical, legal, and social implications (ELSI) to assess the latest advances on privacy-preserving techniques for protecting human genomic data. Teams were asked to develop novel protection methods for emerging genome privacy challenges in three scenarios: Track (1) data sharing through the Beacon service of the Global Alliance for Genomics and Health. Track (2) collaborative discovery of similar genomes between two institutions; and Track (3) data outsourcing to public cloud services. The latter two tracks represent continuing themes from our 2015 competition, while the former was new and a response to a recently established vulnerability. The winning strategy for Track 1 mitigated the privacy risk by hiding approximately 11% of the variation in the database while permitting around 160,000 queries, a significant improvement over the baseline. The winning strategies in Tracks 2 and 3 showed significant progress over the previous competition by achieving multiple orders of magnitude performance improvement in terms of computational runtime and memory requirements. The outcomes suggest that applying highly optimized privacy-preserving and secure computation techniques to safeguard genomic data sharing and analysis is useful. However, the results also indicate that further efforts are needed to refine these techniques into practical solutions.
Lightning protection system for a wind turbine
Costin, Daniel P [Chelsea, VT; Petter, Jeffrey K [Williston, VT
2008-05-27
In a wind turbine (104, 500, 704) having a plurality of blades (132, 404, 516, 744) and a blade rotor hub (120, 712), a lightning protection system (100, 504, 700) for conducting lightning strikes to any one of the blades and the region surrounding the blade hub along a path around the blade hub and critical components of the wind turbine, such as the generator (112, 716), gearbox (708) and main turbine bearings (176, 724).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rodenbeck, Christopher T; Girardi, Michael
Internal nodes of a constituent integrated circuit (IC) package of a multichip module (MCM) are protected from excessive charge during plasma cleaning of the MCM. The protected nodes are coupled to an internal common node of the IC package by respectively associated discharge paths. The common node is connected to a bond pad of the IC package. During MCM assembly, and before plasma cleaning, this bond pad receives a wire bond to a ground bond pad on the MCM substrate.
Yu, Xi; Li, Ce; Gao, Xueqin; Liu, Furong; Lin, Ping
2018-04-20
To explore the relationship between the medication environment and the unsafe medication behavior of nurses and to analyze its influence path. Unsafe medication behavior is the direct cause of medication error. The organizational environment is the foundation of and plays a guiding role in work behavior. Whether the medication environment correlates with the unsafe medication behavior of nurses remains unclear. This study used a correlative design with self-administered questionnaires, and the SHEL model, an acronym of its elements of software, hardware, environment, and liveware, was used as the framework for the medication environment. A survey was conducted among 1012 clinical nurses from five tertiary hospitals in China using the nurse unsafe medication behavior scale (NUMBS) and the nurses' perceptions of the medication environment scale (NPMES). Data were collected from January to February 2017. Path analyses were used to examine the hypothesized model. The medication environment correlated negatively with unsafe medication behavior (r=-0.48, p<0.001). The path analysis showed that software, liveware and nurses' personal factors directly affected unsafe medication behavior. Software, hardware and the environment indirectly influenced unsafe medication behavior, and nurses' personal factors played a mediating role in the relationships of unsafe medication behavior with software, hardware, and the environment. The unsafe medication behavior of nurses should be further improved. The medication environment was a predictor of unsafe medication behavior. Care managers should actively improve the medication environment to reduce the incidence of unsafe medication behaviors. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
Shared decision making as part of value based care: New U.S. policies challenge our readiness.
Spatz, Erica S; Elwyn, Glyn; Moulton, Benjamin W; Volk, Robert J; Frosch, Dominick L
2017-06-01
Shared decision making in the United States is increasingly being recognized as part of value-based care. During the last decade, several state and federal initiatives have linked shared decision making with reimbursement and increased protection from litigation. Additionally, private and public foundations are increasingly funding studies to identify best practices for moving shared decision making from the research world into clinical practice. These shifts offer opportunities and challenges for ensuring effective implementation. Copyright © 2017. Published by Elsevier GmbH.
Planetary Defense: Options for Deflection of Near Earth Objects
NASA Technical Reports Server (NTRS)
Adams, R. B.; Statham, G.; Hopkins, R.; Chapman, J.; White, S.; Bonometti, J.; Alexander, R.; Fincher, S.; Polsgrove, T.; Kalkstein, M.
2003-01-01
Several recent near-miss encounters with asteroids and comets have focused attention on the threat of a catastrophic impact with the Earth. This document reviews the historical impact record and current understanding of the number and location of Near Earth Objects (NEO's) to address their impact probability. Various ongoing projects intended to survey and catalog the NEO population are also reviewed. Details are then given of an MSFC-led study, intended to develop and assess various candidate systems for protection of the Earth against NEOs. An existing program, used to model the NE0 threat, was extensively modified and is presented here. Details of various analytical tools, developed to evaluate the performance of proposed technologies for protection against the NEO threat, are also presented. Trajectory tools, developed to model the outbound path a vehicle would take to intercept or rendezvous with a target asteroid or comet, are described. Also, details are given of a tool that was created to model both the un-deflected inbound path of an NE0 as well as the modified, post-deflection, path. The number of possible options available for protection against the NE0 threat was too numerous for them to all be addressed within the study; instead, a representative selection were modeled and evaluated. The major output from this work was a novel process by which the relative effectiveness of different threat mitigation concepts can be evaluated during future, more detailed, studies. In addition, several new or modified mathematical models were developed to analyze various proposed protection systems. A summary of the major lessons learned during this study is presented, as are recommendations for future work. It is hoped that this study will serve to raise the level attention about this very real threat and also demonstrate that successful defense is both possible and practicable, provided appropriate steps are taken.
Education Matters, August 2011
ERIC Educational Resources Information Center
Beckner, Gary, Ed.
2011-01-01
"Education Matters" is the monthly newsletter of the Association of American Educators (AAE), an organization dedicated to advancing the American teaching profession through personal growth, professional development, teacher advocacy and protection. This issue of the newsletter includes: (1) Creating New Paths, Attracting New Teachers: Why…
DIETARY INTAKE OF YOUNG CHILDREN
Dietary exposure research supports the requirements of the Food Quality Protection Act (FQPA) of 1996 by improving methods of aggregate and cumulative exposure assessments for children. The goal of this research is to reduce the level of uncertainty in assessing the dietary path...
An adaptive multi-level simulation algorithm for stochastic biological systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lester, C., E-mail: lesterc@maths.ox.ac.uk; Giles, M. B.; Baker, R. E.
2015-01-14
Discrete-state, continuous-time Markov models are widely used in the modeling of biochemical reaction networks. Their complexity often precludes analytic solution, and we rely on stochastic simulation algorithms (SSA) to estimate system statistics. The Gillespie algorithm is exact, but computationally costly as it simulates every single reaction. As such, approximate stochastic simulation algorithms such as the tau-leap algorithm are often used. Potentially computationally more efficient, the system statistics generated suffer from significant bias unless tau is relatively small, in which case the computational time can be comparable to that of the Gillespie algorithm. The multi-level method [Anderson and Higham, “Multi-level Montemore » Carlo for continuous time Markov chains, with applications in biochemical kinetics,” SIAM Multiscale Model. Simul. 10(1), 146–179 (2012)] tackles this problem. A base estimator is computed using many (cheap) sample paths at low accuracy. The bias inherent in this estimator is then reduced using a number of corrections. Each correction term is estimated using a collection of paired sample paths where one path of each pair is generated at a higher accuracy compared to the other (and so more expensive). By sharing random variables between these paired paths, the variance of each correction estimator can be reduced. This renders the multi-level method very efficient as only a relatively small number of paired paths are required to calculate each correction term. In the original multi-level method, each sample path is simulated using the tau-leap algorithm with a fixed value of τ. This approach can result in poor performance when the reaction activity of a system changes substantially over the timescale of interest. By introducing a novel adaptive time-stepping approach where τ is chosen according to the stochastic behaviour of each sample path, we extend the applicability of the multi-level method to such cases. We demonstrate the efficiency of our method using a number of examples.« less
Veilleux, Sophie; Noiseux, Isabelle; Lachapelle, Nathalie; Kohen, Rita; Vachon, Luc; Guay, Brian White; Bitton, Alain; Rioux, John D
2018-02-01
This study aims to characterize the relationships between the quality of the information given by the physician, the involvement of the patient in shared decision making (SDM), and outcomes in terms of satisfaction and anxiety pertaining to the treatment of inflammatory bowel disease (IBD). A Web survey was conducted among 200 Canadian patients affected with IBD. The theoretical model of SDM was adjusted using path analysis. SAS software was used for all statistical analyses. The quality of the knowledge transfer between the physician and the patient is significantly associated with the components of SDM: information comprehension, patient involvement and decision certainty about the chosen treatment. In return, patient involvement in SDM is significantly associated with higher satisfaction and, as a result, lower anxiety as regards treatment selection. This study demonstrates the importance of involving patients in shared treatment decision making in the context of IBD. Understanding shared decision making may motivate patients to be more active in understanding the relevant information for treatment selection, as it is related to their level of satisfaction, anxiety and adherence to treatment. This relationship should encourage physicians to promote shared decision making. Copyright © 2017 Elsevier B.V. All rights reserved.
2016-02-17
diverse organization, working together as one professional team, recognized as leaders in our field. For more information about whistleblower protection...Administrative Support Services SOP Standard Operating Procedures SoS Subscription of Services Whistleblower Protection U.S. Department of Defense The... Whistleblower Protection Enhancement Act of 2012 requires the Inspector General to designate a Whistleblower Protection Ombudsman to educate agency
Shared protection based virtual network mapping in space division multiplexing optical networks
NASA Astrophysics Data System (ADS)
Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie
2018-05-01
Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.
Creativity and psychopathology: a shared vulnerability model.
Carson, Shelley H
2011-03-01
Creativity is considered a positive personal trait. However, highly creative people have demonstrated elevated risk for certain forms of psychopathology, including mood disorders, schizophrenia spectrum disorders, and alcoholism. A model of shared vulnerability explains the relation between creativity and psychopathology. This model, supported by recent findings from neuroscience and molecular genetics, suggests that the biological determinants conferring risk for psychopathology interact with protective cognitive factors to enhance creative ideation. Elements of shared vulnerability include cognitive disinhibition (which allows more stimuli into conscious awareness), an attentional style driven by novelty salience, and neural hyperconnectivity that may increase associations among disparate stimuli. These vulnerabilities interact with superior meta-cognitive protective factors, such as high IQ, increased working memory capacity, and enhanced cognitive flexibility, to enlarge the range and depth of stimuli available in conscious awareness to be manipulated and combined to form novel and original ideas.
Injuries and risk factors for injuries from the 29 May 1982 tornado, Marion, Illinois.
Duclos, P J; Ing, R T
1989-03-01
On 29 May 1982, a tornado struck Marion, Illinois. As a result, ten people were killed, 38 were hospitalized, and 196 were examined in hospital emergency rooms. In order to describe injuries and to identify risk factors that might have increased or reduced the risk of injuries, we (1) conducted a telephone survey of all persons we could identify who were in the path of the tornado and (2) reviewed the emergency room logs and records and admission files of hospitals that provided initial care. Overall, 19.3% of people who were in the path of the tornado were injured during the impact. Only 39.0% of people examined in emergency rooms were injured as a direct result of the impact. The remainder were injured while rescuing, cleaning up, or just walking in the disaster area. Behaviours that were most protective were being in a house on the lowest floor, staying underground in a basement, protecting one's body with something like a blanket, and staying away from windows. Neither lying down nor opening doors or windows seemed to decrease the risk of being injured. Our results emphasize the need for early warnings and public education about protective behaviours.
Humans, Sharks and the Shared Environment in the Contemporary Eco-Doc
ERIC Educational Resources Information Center
Hughes, Helen
2011-01-01
Focussing on the film "Sharkwater" directed by Rob Stewart (2006), this article discusses formal interpretive aspects of recent environmental documentaries which are intended to raise awareness about environmental issues. It is argued that contemporary environmental documentaries seek to persuade audiences to protect the shared physical…
48 CFR 1516.303-75 - Amount of cost-sharing.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... 1516.303-75 Section 1516.303-75 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CONTRACTING METHODS AND CONTRACT TYPES TYPES OF CONTRACTS Cost-Reimbursement Contracts 1516.303-75 Amount of... market share position; (3) The time and risk necessary to achieve success; (4) If the results of the...
ERIC Educational Resources Information Center
Vega, Silvia P. Rodriguez
2011-01-01
In this article, the author shares the story of her life as a DREAM Act student who acted beyond the barriers. The DREAM Act, defined as the Development, Relief, and Education for Alien Minors Act, is an effort to establish a path to citizenship for some children of illegal immigrants. Her story begins like the thousands of other students who are…
Shared Compromise -- Future US-Mexican Border Security Initiatives
2011-10-28
improve regional economic performance. Following the passage of the North American Free Trade Agreement (NAFTA), to eliminate barriers to trade and...investment between the U.S., Canada, and Mexico, the United States and Mexico were on a path to balance trade and security. For example, from 1996...2006 the agricultural trade between our countries increased by 3 more than $13 billion. 2 The events of September 11, 2001 changed all of that. The
NASA Astrophysics Data System (ADS)
Chen, Chia-Chin; Maier, Joachim
2018-05-01
In the version of this Perspective originally published, in the sentence "It is worthy of note that the final LiF-free situation characterized by MnO taking up the holes and the (F- containing) MnO surface taking up the lithium ions is also a subcase of the job-sharing concept23.", the word `holes' should have been `electrons'. This has now been corrected.
Pedretti, Kevin
2008-11-18
A compute processor allocator architecture for allocating compute processors to run applications in a multiple processor computing apparatus is distributed among a subset of processors within the computing apparatus. Each processor of the subset includes a compute processor allocator. The compute processor allocators can share a common database of information pertinent to compute processor allocation. A communication path permits retrieval of information from the database independently of the compute processor allocators.
ERIC Educational Resources Information Center
Adams, John S.; And Others
This report is the second in a series on What the 1990 Census Says about Minnesota. A group of urban specialists gathered to examine a set of metropolitan areas that share important features that were thought to be related to central-city decline as evidenced in Minnesota's Twin Cities, Minneapolis and Saint Paul. Six cities were identified as…
Open innovation: Towards sharing of data, models and workflows.
Conrado, Daniela J; Karlsson, Mats O; Romero, Klaus; Sarr, Céline; Wilkins, Justin J
2017-11-15
Sharing of resources across organisations to support open innovation is an old idea, but which is being taken up by the scientific community at increasing speed, concerning public sharing in particular. The ability to address new questions or provide more precise answers to old questions through merged information is among the attractive features of sharing. Increased efficiency through reuse, and increased reliability of scientific findings through enhanced transparency, are expected outcomes from sharing. In the field of pharmacometrics, efforts to publicly share data, models and workflow have recently started. Sharing of individual-level longitudinal data for modelling requires solving legal, ethical and proprietary issues similar to many other fields, but there are also pharmacometric-specific aspects regarding data formats, exchange standards, and database properties. Several organisations (CDISC, C-Path, IMI, ISoP) are working to solve these issues and propose standards. There are also a number of initiatives aimed at collecting disease-specific databases - Alzheimer's Disease (ADNI, CAMD), malaria (WWARN), oncology (PDS), Parkinson's Disease (PPMI), tuberculosis (CPTR, TB-PACTS, ReSeqTB) - suitable for drug-disease modelling. Organized sharing of pharmacometric executable model code and associated information has in the past been sparse, but a model repository (DDMoRe Model Repository) intended for the purpose has recently been launched. In addition several other services can facilitate model sharing more generally. Pharmacometric workflows have matured over the last decades and initiatives to more fully capture those applied to analyses are ongoing. In order to maximize both the impact of pharmacometrics and the knowledge extracted from clinical data, the scientific community needs to take ownership of and create opportunities for open innovation. Copyright © 2017 Elsevier B.V. All rights reserved.
30 CFR 219.410 - What does this subpart contain?
Code of Federal Regulations, 2010 CFR
2010-07-01
... coastal protection, including conservation, coastal restoration, hurricane protection, and infrastructure directly affected by coastal wetland losses. (2) Mitigation of damage to fish, wildlife, or natural... coastal political subdivisions within those States; and to the Land and Water Conservation Fund. Shared...
40 CFR 35.575 - Maximum federal share.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 35.575 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Air Pollution Control (section 105... approved costs of planning, developing, establishing, or improving an air pollution control program, and up...
40 CFR 35.575 - Maximum federal share.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 35.575 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants for Tribes Air Pollution Control (section 105... approved costs of planning, developing, establishing, or improving an air pollution control program, and up...
Baldwin, Thomas T; Basenko, Evelina; Harb, Omar; Brown, Neil A; Urban, Martin; Hammond-Kosack, Kim E; Bregitzer, Phil P
2018-06-01
There is no comprehensive storage for generated mutants of Fusarium graminearum or data associated with these mutants. Instead, researchers relied on several independent and non-integrated databases. FgMutantDb was designed as a simple spreadsheet that is accessible globally on the web that will function as a centralized source of information on F. graminearum mutants. FgMutantDb aids in the maintenance and sharing of mutants within a research community. It will serve also as a platform for disseminating prepublication results as well as negative results that often go unreported. Additionally, the highly curated information on mutants in FgMutantDb will be shared with other databases (FungiDB, Ensembl, PhytoPath, and PHI-base) through updating reports. Here we describe the creation and potential usefulness of FgMutantDb to the F. graminearum research community, and provide a tutorial on its use. This type of database could be easily emulated for other fungal species. Published by Elsevier Inc.
A Dynamic Approach to Rebalancing Bike-Sharing Systems
2018-01-01
Bike-sharing services are flourishing in Smart Cities worldwide. They provide a low-cost and environment-friendly transportation alternative and help reduce traffic congestion. However, these new services are still under development, and several challenges need to be solved. A major problem is the management of rebalancing trucks in order to ensure that bikes and stalls in the docking stations are always available when needed, despite the fluctuations in the service demand. In this work, we propose a dynamic rebalancing strategy that exploits historical data to predict the network conditions and promptly act in case of necessity. We use Birth-Death Processes to model the stations’ occupancy and decide when to redistribute bikes, and graph theory to select the rebalancing path and the stations involved. We validate the proposed framework on the data provided by New York City’s bike-sharing system. The numerical simulations show that a dynamic strategy able to adapt to the fluctuating nature of the network outperforms rebalancing schemes based on a static schedule. PMID:29419771
Inductance effects in the high-power transmitter crowbar system
NASA Technical Reports Server (NTRS)
Daeges, J.; Bhanji, A.
1987-01-01
The effective protection of a klystron in a high-power transmitter requires the diversion of all stored energy in the protected circuit through an alternate low-impedance path, the crowbar, such that less than 1 joule of energy is dumped into the klystron during an internal arc. A scheme of adding a bypass inductor in the crowbar-protected circuit of the high-power transmitter was tested using computer simulations and actual measurements under a test load. Although this scheme has several benefits, including less power dissipation in the resistor, the tests show that the presence of inductance in the portion of the circuit to be protected severely hampers effective crowbar operation.
Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis
NASA Technical Reports Server (NTRS)
Malin, Jane T.; Fleming, Land
2006-01-01
We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.
My Path Into X-Ray, Optics and Pressure: Experiences and Achievements
NASA Astrophysics Data System (ADS)
Evans, William
2013-04-01
A successful career path in science is rarely formulaic or achieved by following a predefined set of actions. Sustained commitment, perseverance, performance and relationships are all key ingredients. Judicious selection of opportunities (research projects, employers, etc.) can lead to significant scientific accomplishments and career advancements. In this presentation I will review the trajectory of my scientific career spanning my experiences from the Westinghouse STS and ISEF, through Caltech and Harvard to my current position of High Pressure Physics Group Leader at Lawrence Livermore National Laboratory. I will discuss my involvement in some exciting research projects using x-ray synchrotron sources and optical spectroscopy to study static and dynamic properties of materials at high-pressures. In addition, I will share my perspectives on the importance of excellence, preparedness and the value of professional relationships.
Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations
Ahn, David K; Unde, Bhagyashree; Gage, H Donald; Carr, J Jeffrey
2013-01-01
Background Current image sharing is carried out by manual transportation of CDs by patients or organization-coordinated sharing networks. The former places a significant burden on patients and providers. The latter faces challenges to patient privacy. Objective To allow healthcare providers efficient access to medical imaging data acquired at other unaffiliated healthcare facilities while ensuring strong protection of patient privacy and minimizing burden on patients, providers, and the information technology infrastructure. Methods An image sharing framework is described that involves patients as an integral part of, and with full control of, the image sharing process. Central to this framework is the Patient Controlled Access-key REgistry (PCARE) which manages the access keys issued by image source facilities. When digitally signed by patients, the access keys are used by any requesting facility to retrieve the associated imaging data from the source facility. A centralized patient portal, called a PCARE patient control portal, allows patients to manage all the access keys in PCARE. Results A prototype of the PCARE framework has been developed by extending open-source technology. The results for feasibility, performance, and user assessments are encouraging and demonstrate the benefits of patient-controlled image sharing. Discussion The PCARE framework is effective in many important clinical cases of image sharing and can be used to integrate organization-coordinated sharing networks. The same framework can also be used to realize a longitudinal virtual electronic health record. Conclusion The PCARE framework allows prior imaging data to be shared among unaffiliated healthcare facilities while protecting patient privacy with minimal burden on patients, providers, and infrastructure. A prototype has been implemented to demonstrate the feasibility and benefits of this approach. PMID:22886546
Advanced Monitoring Technology: Opportunities and Challenges - A Path Forward for EPA and States
Rapid changes in monitoring technology have the potential to dramatically improve environmental protection by providing industry, government, and the public with more complete and real-time information on pollution releases and environmental conditions. With more real-time monito...
Having graduated with a PhD in wetland ecology and recently completed a post-doctorate fellowship with Mary E. Kentula at the US Environmental Protection Agency, I have a lot of practical advice for undergraduates who are interested in pursuing a career in aquatic sciences. The g...
Science to Policy: Many Roads to Travel (Invited)
NASA Astrophysics Data System (ADS)
Eriksson, S. C.; McCaughey, J.
2013-12-01
Transferring scientific discoveries to policies and their implementation is not a narrow, one-way road. The complexities of policy-making are not normally within the purview of either scientists or science educators and communicators. Politics, bureaucracy, economics, culture, religion, and local knowledge are a few areas that help determine how policies are made. These factors are compounded by differences in cultures among scientists, educators/communicators, and governments. To complicate this further, bodies of knowledge which could be brought to bear upon improved policies and implementation lie within different disciplines, e.g. natural sciences, disaster risk reduction, development, psychology, social science, communications, education and more. In a scientific research institution, we have found many potential paths to help transfer knowledge back and forth between scientists and decision-makers. Some of these paths are short with an end in sight. Others are longer, and the destination can't be seen. Some of these paths include a) education and discussion with various government agencies, b) educating students who will return to various agencies and educational institutions in their home countries, c) sharing scientific knowledge with research colleagues, d) consulting, e) working with NGOs, and media, f) working with colleagues in other fields, e.g. development, risk, regional consortia. Recognizing and transferring knowledge among different disciplines, learning the needs of various players, finding the most productive paths, and thinking about varying time frames are important in prioritizing the transference of science into action.
Advanced e-Infrastructures for Civil Protection applications: the CYCLOPS Project
NASA Astrophysics Data System (ADS)
Mazzetti, P.; Nativi, S.; Verlato, M.; Ayral, P. A.; Fiorucci, P.; Pina, A.; Oliveira, J.; Sorani, R.
2009-04-01
During the full cycle of the emergency management, Civil Protection operative procedures involve many actors belonging to several institutions (civil protection agencies, public administrations, research centers, etc.) playing different roles (decision-makers, data and service providers, emergency squads, etc.). In this context the sharing of information is a vital requirement to make correct and effective decisions. Therefore a European-wide technological infrastructure providing a distributed and coordinated access to different kinds of resources (data, information, services, expertise, etc.) could enhance existing Civil Protection applications and even enable new ones. Such European Civil Protection e-Infrastructure should be designed taking into account the specific requirements of Civil Protection applications and the state-of-the-art in the scientific and technological disciplines which could make the emergency management more effective. In the recent years Grid technologies have reached a mature state providing a platform for secure and coordinated resource sharing between the participants collected in the so-called Virtual Organizations. Moreover the Earth and Space Sciences Informatics provide the conceptual tools for modeling the geospatial information shared in Civil Protection applications during its entire lifecycle. Therefore a European Civil Protection e-infrastructure might be based on a Grid platform enhanced with Earth Sciences services. In the context of the 6th Framework Programme the EU co-funded Project CYCLOPS (CYber-infrastructure for CiviL protection Operative ProcedureS), ended in December 2008, has addressed the problem of defining the requirements and identifying the research strategies and innovation guidelines towards an advanced e-Infrastructure for Civil Protection. Starting from the requirement analysis CYCLOPS has proposed an architectural framework for a European Civil Protection e-Infrastructure. This architectural framework has been evaluated through the development of prototypes of two operative applications used by the Italian Civil Protection for Wild Fires Risk Assessment (RISICO) and by the French Civil Protection for Flash Flood Risk Management (SPC-GD). The results of these studies and proof-of-concepts have been used as the basis for the definition of research and innovation strategies aiming to the detailed design and implementation of the infrastructure. In particular the main research themes and topics to be addressed have been identified and detailed. Finally the obstacles to the innovation required for the adoption of this infrastructure and possible strategies to overcome them have been discussed.
ENDANGERED SPECIES SENSITIVITY AND ECOLOGICAL RISK ASSESSMENT
he U.S. Environmental Protection Agency (EPA), U.S. Fish & Wildlife Service, and National Marine Fisheries Service share a common responsibility for the protection of our nation's aquatic species under the Endangered Species Act (ESA) of 1973. The EPA, under the Federal Insectici...
NASA Technical Reports Server (NTRS)
Stefanski, Philip L.; Soler-Luna, Adrian
2017-01-01
This presentation discusses recent work being conducted by the National Aeronautics and Space Administration (NASA) at Marshall Space Flight Center (MSFC) to evaluate various methods that could be employed to provide for planetary protection of those solar system bodies that are candidates for extraterrestrial life, thus preventing contamination of such bodies. MSFC is presently involved in the development phase of the Europa Lander De-Orbital Stage (DOS) braking motor. In order to prevent bio-contamination of this Jovian satellite, three paths are currently being considered. The first is (1) Bio-Reduction of those microscopic organisms in or on the vehicle (in this case a solid rocket motor (SRM)) that might otherwise be transported during the mission. Possible methods being investigated include heat sterilization, application or incorporation of biocide materials, and irradiation. While each method can be made to work, effects on the SRM's components (propellant, liner, insulation, etc.) could well prove deleterious. A second path would be use of (2) Bio-Barrier material(s). So long as such barrier(s) can maintain their integrity, planetary protection should be afforded. Under the harsh conditions encountered during extended spaceflight (vacuum, temperature extremes, radiation), however, such barrier(s) could well experience a breach. Finally, a third path would be to perform (3) Pyrotechnic Sterilization of the SRM during its end-of-mission phase. Multiple pyrotechnic units would be triggered to ensure activation of such an event and provide for a final sterilization before vehicle impact. In light of Europa's stringent bio-reduction targets, the final and best choice to minimize risk will probably be some combination of the above.
Operationalizing universal health coverage in Nigeria through social health insurance
Okpani, Arnold Ikedichi; Abimbola, Seye
2015-01-01
Nigeria faces challenges that delay progress toward the attainment of the national government's declared goal of universal health coverage (UHC). One such challenge is system-wide inequities resulting from lack of financial protection for the health care needs of the vast majority of Nigerians. Only a small proportion of Nigerians have prepaid health care. In this paper, we draw on existing evidence to suggest steps toward reforming health care financing in Nigeria to achieve UHC through social health insurance. This article sets out to demonstrate that a viable path to UHC through expanding social health insurance exists in Nigeria. We argue that encouraging the states which are semi-autonomous federating units to setup and manage their own insurance schemes presents a unique opportunity for rapidly scaling up prepaid coverage for Nigerians. We show that Nigeria's federal structure which prescribes a sharing of responsibilities for health care among the three tiers of government presents serious challenges for significantly extending social insurance to uncovered groups. We recommend that rather than allowing this governance structure to impair progress toward UHC, it should be leveraged to accelerate the process by supporting the states to establish and manage their own insurance funds while encouraging integration with the National Health Insurance Scheme. PMID:26778879
A Web-based geographic information system for monitoring animal welfare during long journeys.
Ippoliti, Carla; Di Pasquale, Adriano; Fiore, Gianluca; Savini, Lara; Conte, Annamaria; Di Gianvito, Federica; Di Francesco, Cesare
2007-01-01
Animal welfare protection during long journeys is mandatory according to European Union regulations designed to ensure that animals are transported in accordance with animal welfare requirements and to provide control bodies with a regulatory tool to react promptly in cases of non-compliance and to ensure a safe network between products, animals and farms. Regulation 1/2005/EC foresees recourse to a system of traceability within European Union member states. The Joint Research Centre of the European Commission (JRC) has developed a prototype system fulfilling the requirements of the Regulation which is able to monitor compliance with animal welfare requirements during transportation, register electronic identification of transported animals and store data in a central database shared with the other member states through a Web-based application. Test equipment has recently been installed on a vehicle that records data on vehicle position (geographic coordinates, date/time) and animal welfare conditions (measurements of internal temperature of the vehicle, etc.). The information is recorded at fixed intervals and transmitted to the central database. The authors describe the Web-based geographic information system, through which authorised users can visualise instantly the real-time position of the vehicle, monitor the sensor-recorded data and follow the time-space path of the truck during journeys.
Knowledge management for the protection of information in electronic medical records.
Lea, Nathan; Hailes, Stephen; Austin, Tony; Kalra, Dipak
2008-01-01
This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for electronic medical records. These systems have increasingly powerful sharing capabilities at the point of clinical care, in medical research and for clinical and managerial audit. The potential for sharing raises concerns about the protection of individual patient privacy and challenges the duty of confidentiality by which medical practitioners are ethically and legally bound. By analysing the protection requirements and discussing the need to apply policy-based controls to discrete items of medical information in a record, this paper suggests that this is a problem for which existing privacy management solutions are not sufficient or appropriate to the protection requirements. It proposes that a knowledge management approach is required and it introduces a new framework based on the knowledge management techniques now being used to manage electronic medical record data. The background, existing work in this area, initial investigation methods, results to date and discussion are presented, and the paper is concluded with the authors' comments on the ramifications of the work.
Malin, Bradley A
2005-01-01
The incorporation of genomic data into personal medical records poses many challenges to patient privacy. In response, various systems for preserving patient privacy in shared genomic data have been developed and deployed. Although these systems de-identify the data by removing explicit identifiers (e.g., name, address, or Social Security number) and incorporate sound security design principles, they suffer from a lack of formal modeling of inferences learnable from shared data. This report evaluates the extent to which current protection systems are capable of withstanding a range of re-identification methods, including genotype-phenotype inferences, location-visit patterns, family structures, and dictionary attacks. For a comparative re-identification analysis, the systems are mapped to a common formalism. Although there is variation in susceptibility, each system is deficient in its protection capacity. The author discovers patterns of protection failure and discusses several of the reasons why these systems are susceptible. The analyses and discussion within provide guideposts for the development of next-generation protection methods amenable to formal proofs.
Malin, Bradley A.
2005-01-01
The incorporation of genomic data into personal medical records poses many challenges to patient privacy. In response, various systems for preserving patient privacy in shared genomic data have been developed and deployed. Although these systems de-identify the data by removing explicit identifiers (e.g., name, address, or Social Security number) and incorporate sound security design principles, they suffer from a lack of formal modeling of inferences learnable from shared data. This report evaluates the extent to which current protection systems are capable of withstanding a range of re-identification methods, including genotype–phenotype inferences, location–visit patterns, family structures, and dictionary attacks. For a comparative re-identification analysis, the systems are mapped to a common formalism. Although there is variation in susceptibility, each system is deficient in its protection capacity. The author discovers patterns of protection failure and discusses several of the reasons why these systems are susceptible. The analyses and discussion within provide guideposts for the development of next-generation protection methods amenable to formal proofs. PMID:15492030
The ethics of the affordability of health insurance.
Saloner, Brendan; Daniels, Norman
2011-10-01
In this essay we argue that the concept of affordable health insurance is rooted in a social obligation to protect fair equality of opportunity. Specifically, health insurance plays a limited but significant role in protecting opportunity in two ways: it helps keep people functioning normally and it protects their financial security. Together these benefits enable household members to exercise reasonable choices about their plans of life. To achieve truly affordable coverage, society must be able to contain the overall cost of health care, and health insurance must be progressively financed, meaning that those who are best able to pay for coverage should pay the largest share. While the recently passed Patient Protection and Affordable Care Act (ACA) falls short on both of these counts, we argue that it makes important contributions toward household affordability through the use of subsidies and regulations. The main shortcoming of the ACA is an insufficient protection against burdensome cost sharing, which we illustrate using several hypothetical scenarios. We conclude with recommendations about how to make opportunity-enhancing expansions to the current coverage subsidies.
Should Researchers Protect the Good Name and Reputation of Institutions in Which Research Is Done?
ERIC Educational Resources Information Center
Uys, L. R.
2008-01-01
The article explores the issue of protecting the good name and reputation of institutions and organisations in which research is being done. It explores current ethical codes in this regard, as well as legal provision for such protection. The issue of balancing the right of the researchers to share information about institutions in which research…
Peitzsch, Erich H.; Fagre, Daniel B.; Dundas, Mark
2010-01-01
Snow avalanche paths are key geomorphologic features in Glacier National Park, Montana, and an important component of mountain ecosystems: they are isolated within a larger ecosystem, they are continuously disturbed, and they contain unique physical characteristics (Malanson and Butler, 1984). Avalanches impact subalpine forest structure and function, as well as overall biodiversity (Bebi et al., 2009). Because avalanches are dynamic phenomena, avalanche path geometry and spatial extent depend upon climatic regimes. The USGS/GNP Avalanche Program formally began in 2003 as an avalanche forecasting program for the spring opening of the ever-popular Going-to-the-Sun Road (GTSR), which crosses through 37 identified avalanche paths. Avalanche safety and forecasting is a necessary part of the GTSR spring opening procedures. An avalanche atlas detailing topographic parameters and oblique photographs was completed for the GTSR corridor in response to a request from GNP personnel for planning and resource management. Using ArcMap 9.2 GIS software, polygons were created for every avalanche path affecting the GTSR using aerial imagery, field-based observations, and GPS measurements of sub-meter accuracy. Spatial attributes for each path were derived within the GIS. Resulting products include an avalanche atlas book for operational use, a geoPDF of the atlas, and a Google Earth flyover illustrating each path and associated photographs. The avalanche atlas aids park management in worker safety, infrastructure planning, and natural resource protection by identifying avalanche path patterns and location. The atlas was created for operational and planning purposes and is also used as a foundation for research such as avalanche ecology projects and avalanche path runout modeling.
Code of Federal Regulations, 2013 CFR
2013-01-01
... CURRENCY, DEPARTMENT OF THE TREASURY ORGANIZATION AND FUNCTIONS, AVAILABILITY AND RELEASE OF INFORMATION... Information § 4.39 Notification of parties and procedures for sharing and using OCC records in litigation. (a... OCC information obtained pursuant to this subpart, and, upon entry of a protective order, shall...
Code of Federal Regulations, 2012 CFR
2012-01-01
... CURRENCY, DEPARTMENT OF THE TREASURY ORGANIZATION AND FUNCTIONS, AVAILABILITY AND RELEASE OF INFORMATION... Information § 4.39 Notification of parties and procedures for sharing and using OCC records in litigation. (a... OCC information obtained pursuant to this subpart, and, upon entry of a protective order, shall...
Code of Federal Regulations, 2014 CFR
2014-01-01
... CURRENCY, DEPARTMENT OF THE TREASURY ORGANIZATION AND FUNCTIONS, AVAILABILITY AND RELEASE OF INFORMATION... Information § 4.39 Notification of parties and procedures for sharing and using OCC records in litigation. (a... OCC information obtained pursuant to this subpart, and, upon entry of a protective order, shall...
30 CFR 280.73 - Will MMS share data and information with coastal States?
Code of Federal Regulations, 2011 CFR
2011-07-01
... coastal States? 280.73 Section 280.73 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND... THE OUTER CONTINENTAL SHELF Data Requirements Protections § 280.73 Will MMS share data and information with coastal States? (a) We can disclose proprietary data, information, and samples submitted to us by...
Lemaire, Robin H; Bailey, Linda; Leischow, Scott J
2015-11-01
We explored whether various key stakeholders considered cost sharing with state telephone-based tobacco cessation quitlines, because including tobacco cessation services as part of the required essential health benefits is a new requirement of the Patient Protection and Affordable Care Act (ACA). We analyzed qualitative data collected from interviews conducted in April and May of 2014 with representatives of state health departments, quitline service providers, health plans, and insurance brokers in 4 US states. State health departments varied in the strategies they considered the role their state quitline would play in meeting the ACA requirements. Health plans and insurance brokers referred to state quitlines because they were perceived as effective and free, but in 3 of the 4 states, the private stakeholder groups did not consider cost sharing. If state health departments are going to initiate cost-sharing agreements with private insurance providers, then they will need to engage a broad array of stakeholders and will need to overcome the perception that state quitline services are free.
Bailey, Linda; Leischow, Scott J.
2015-01-01
Objectives. We explored whether various key stakeholders considered cost sharing with state telephone-based tobacco cessation quitlines, because including tobacco cessation services as part of the required essential health benefits is a new requirement of the Patient Protection and Affordable Care Act (ACA). Methods. We analyzed qualitative data collected from interviews conducted in April and May of 2014 with representatives of state health departments, quitline service providers, health plans, and insurance brokers in 4 US states. Results. State health departments varied in the strategies they considered the role their state quitline would play in meeting the ACA requirements. Health plans and insurance brokers referred to state quitlines because they were perceived as effective and free, but in 3 of the 4 states, the private stakeholder groups did not consider cost sharing. Conclusions. If state health departments are going to initiate cost-sharing agreements with private insurance providers, then they will need to engage a broad array of stakeholders and will need to overcome the perception that state quitline services are free. PMID:26447918
Van Schipstal, Inge; Berning, Moritz; Murray, Hayley
2016-01-01
This article focuses on how recreational drug users in the Netherlands and in online communities navigate the risks and reduce the harms they associate with psychoactive drug use. To do so, we examined the protective practices they invent, use, and share with their immediate peers and with larger drug experimenting communities online. The labor involved in protective practices and that which ultimately informs harm reduction from below follows three interrelated trajectories: (1) the handling and sharing of drugs to facilitate hassle-free drug use, (2) creating pleasant and friendly spaces that we highlight under the practices of drug use attunements, and (3) the seeking and sharing of information in practices to spread the good high. We focus not only on users’ concerns but also on how these concerns shape their approach to drugs, what young people do to navigate uncertainties, and how they reach out to and create different sources of knowledge to minimize adversities and to improve highs. Harm reduction from below, we argue, can best be seen in the practices of sharing around drug use and in the caring for the larger community of drug-using peers. PMID:27721525
Code of Federal Regulations, 2010 CFR
2010-07-01
... measurement data pairs. Administrator means the Administrator of the Environmental Protection Agency (EPA) or... storing and reporting of information relating to ambient air quality data. Approved regional method (ARM... of an open path analyzer in which a high-concentration test or audit standard gas contained in a...
NASA Technical Reports Server (NTRS)
Jones, N. D.; Kinsinger, R. E.; Harris, L. P.
1974-01-01
Fast-acting current limiting device provides current overload protection for vulnerable circuit elements and then re-establishes conduction path within milliseconds. Fuse can also perform as fast-acting switch to clear transient circuit overloads. Fuse takes advantage of large increase in electrical resistivity that occurs when liquid metal vaporizes.
Evaluating the intersection of a regional wildlife connectivity network with highways.
Cushman, Samuel A; Lewis, Jesse S; Landguth, Erin L
2013-01-01
Reliable predictions of regional-scale population connectivity are needed to prioritize conservation actions. However, there have been few examples of regional connectivity models that are empirically derived and validated. The central goals of this paper were to (1) evaluate the effectiveness of factorial least cost path corridor mapping on an empirical resistance surface in reflecting the frequency of highway crossings by American black bear, (2) predict the location and predicted intensity of use of movement corridors for American black bear, and (3) identify where these corridors cross major highways and rank the intensity of these crossings. We used factorial least cost path modeling coupled with resistant kernel analysis to predict a network of movement corridors across a 30.2 million hectare analysis area in Montana and Idaho, USA. Factorial least cost path corridor mapping was associated with the locations of actual bear highway crossings. We identified corridor-highway intersections and ranked these based on corridor strength. We found that a major wildlife crossing overpass structure was located close to one of the most intense predicted corridors, and that the vast majority of the predicted corridor network was "protected" under federal management. However, narrow, linear corridors connecting the Greater Yellowstone Ecosystem to the rest of the analysis area had limited protection by federal ownership, making these additionally vulnerable to habitat loss and fragmentation. Factorial least cost path modeling coupled with resistant kernel analysis provides detailed, synoptic information about connectivity across populations that vary in distribution and density in complex landscapes. Specifically, our results could be used to quantify the structure of the connectivity network, identify critical linkage nodes and core areas, map potential barriers and fracture zones, and prioritize locations for mitigation, restoration and conservation actions.
Aseptic Handling of the MOMA Mass Spectrometer After Dry Heat Microbial Reduction
NASA Technical Reports Server (NTRS)
Lalime, Erin
2017-01-01
Mars Organic Molecule Analyzer Mass Spectrometer (MOMA-MS) is an instrument in the larger MOMA instrument suite for the European Space Agency (ESA) ExoMars 2020 Rover. As a life-detection instrument on a Mars landing mission, MOMA-MS has very stringent Planetary Protection (PP) bioburden requirements. Within the MOMA instrument suite, the hardware surfaces of the sample path must be cleaned to a level of 0.03 spore/sq m. To meet this requirement, a process called Dry Heat Microbial Reduction (DHMR) is used to decrease the number of viable spores by 4 orders of magnitude. Before DHMR, the hardware is handled using standard cleanroom practices, while after DHMR, all sample path surfaces must be handled aseptically when exposed. Aseptic handling of the sample path involves a number of strategies and protocols including working only in an aseptic ISO class 5 work space, limiting the amount of time of exposure, using sterile garmenting with sterile gloves, and using sterile tools. Before work begins, the aseptic workspace will be tested for bioburden and particle fallout, and all tools that will contact sample path surfaces must be sterilized. During the exposure activity, sterile garments will be worn, sterile tools will be handled in a 2 person set up so that the operator touches only the sterile tool and not the exterior surfaces of the sterile pouch, and the environment will be monitored with active and passive fallout for bioburden and particle levels. Any breach in the planetary protection cleanliness can necessitate repeating DHMR, which not only has significant cost and schedule implications, it also become a risk to hardware that is not rated for repeated long exposures to high temperatures.
NASA Technical Reports Server (NTRS)
Hirasaki, P. N.
1971-01-01
Shielding a spacecraft from the severe thermal environment of an atmospheric entry requires a sophisticated thermal protection system (TPS). Thermal computer program models were developed for two such TPS designs proposed for the space shuttle orbiter. The multilayer systems, a reusable surface insulation TPS, and a re-radiative metallic skin TPS, were sized for a cross-section of trajectories in the entry corridor. This analysis indicates the relative influence of the entry parameters on the weight of each TPS concept. The results are summarized graphically. The trajectory variables considered were down-range, cross-range, orbit inclination, entry interface velocity and flight path angle, maximum heating rate level, angle of attack, and ballistic coefficient. Variations in cross-range and flight path angle over the ranges considered had virtually no effect on the required entry TPS weight. The TPS weight was significantly more sensitive to variations in angle of attack than to dispersions in the other trajectory considered.
To the Brain and Back: Migratory Paths of Dendritic Cells in Multiple Sclerosis.
De Laere, Maxime; Berneman, Zwi N; Cools, Nathalie
2018-03-01
Migration of dendritic cells (DC) to the central nervous system (CNS) is a critical event in the pathogenesis of multiple sclerosis (MS). While up until now, research has mainly focused on the transmigration of DC through the blood-brain barrier, experimental evidence points out that also the choroid plexus and meningeal vessels represent important gateways to the CNS, especially in early disease stages. On the other hand, DC can exit the CNS to maintain immunological tolerance to patterns expressed in the CNS, a process that is perturbed in MS. Targeting trafficking of immune cells, including DC, to the CNS has demonstrated to be a successful strategy to treat MS. However, this approach is known to compromise protective immune surveillance of the brain. Unravelling the migratory paths of regulatory and pathogenic DC within the CNS may ultimately lead to the design of new therapeutic strategies able to selectively interfere with the recruitment of pathogenic DC to the CNS, while leaving host protective mechanisms intact. © 2018 American Association of Neuropathologists, Inc.
Rumination's effect on suicide ideation through grit and gratitude: A path analysis study.
White, Evan J; Kraines, Morganne A; Tucker, Raymond P; Wingate, LaRicka R; Wells, Tony T; Grant, DeMond M
2017-05-01
The current study documents the relationship between suicide ideation, grit and gratitude, and rumination subtypes of brooding and reflection. The relationship between rumination and suicide ideation has been well documented and previous research has demonstrated that grit and gratitude are protective factors against suicide. We hypothesized that both subtypes of rumination would have an indirect effect on suicide ideation through levels of grit and gratitude. Results of a conditional indirect effects path analysis indicated that brooding was indirectly related to suicide ideation through gratitude. Brooding interacted with grit such that it only predicted suicide ideation at low levels of grit. Reflection interacted with gratitude to predict levels of grit. Results suggest that brooding may impact suicide risk and resilience through its effect on gratitude, indicating important cognitive-behavioral targets for suicide prevention strategies. These results extend the literature about the relationship between well known risk factors for suicide and protective factors. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.
Autonomy and Privacy in Clinical Laboratory Science Policy and Practice.
Leibach, Elizabeth Kenimer
2014-01-01
Rapid advancements in diagnostic technologies coupled with growth in testing options and choices mandate the development of evidence-based testing algorithms linked to the care paths of the major chronic diseases and health challenges encountered most frequently. As care paths are evaluated, patient/consumers become partners in healthcare delivery. Clinical laboratory scientists find themselves firmly embedded in both quality improvement and clinical research with an urgent need to translate clinical laboratory information into knowledge required by practitioners and patient/consumers alike. To implement this patient-centered care approach in clinical laboratory science, practitioners must understand their roles in (1) protecting patient/consumer autonomy in the healthcare informed consent process and (2) assuring patient/consumer privacy and confidentiality while blending quality improvement study findings with protected health information. A literature review, describing the current ethical environment, supports a consultative role for clinical laboratory scientists in the clinical decision-making process and suggests guidance for policy and practice regarding the principle of autonomy and its associated operational characteristics: informed consent and privacy.
The Tension Between Data Sharing and the Protection of Privacy in Genomics Research
Kaye, Jane
2014-01-01
Next-generation sequencing and global data sharing challenge many of the governance mechanisms currently in place to protect the privacy of research participants. These challenges will make it more difficult to guarantee anonymity for participants, provide information to satisfy the requirements of informed consent, and ensure complete withdrawal from research when requested. To move forward, we need to improve the current governance systems for research so that they are responsive to individual privacy concerns but can also be effective at a global level. We need to develop a system of e-governance that can complement existing governance systems but that places greater reliance on the use of technology to ensure compliance with ethical and legal requirements. These new governance structures must be able to address the concerns of research participants while at the same time ensuring effective data sharing that promotes public trust in genomics research. PMID:22404490
The tension between data sharing and the protection of privacy in genomics research.
Kaye, Jane
2012-01-01
Next-generation sequencing and global data sharing challenge many of the governance mechanisms currently in place to protect the privacy of research participants. These challenges will make it more difficult to guarantee anonymity for participants, provide information to satisfy the requirements of informed consent, and ensure complete withdrawal from research when requested. To move forward, we need to improve the current governance systems for research so that they are responsive to individual privacy concerns but can also be effective at a global level. We need to develop a system of e-governance that can complement existing governance systems but that places greater reliance on the use of technology to ensure compliance with ethical and legal requirements. These new governance structures must be able to address the concerns of research participants while at the same time ensuring effective data sharing that promotes public trust in genomics research.
Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential
Cologne, John; Grant, Eric J.; Nakashima, Eiji; ...
2012-01-01
Objective . Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. Methods . We investigated a simple approach based on measures of disclosure risk and analytical utility that are straightforward for epidemiologic researchers to derive. The method is illustrated using data from the Japanese Atomic-bomb Survivor population. Results . Masking by modest rounding did not adequately enhance security but rounding to remove several digits of relativemore » accuracy effectively reduced the risk of identification without substantially reducing utility. Grouping or adding random noise led to noticeable bias. Conclusions . When sharing epidemiologic data, it is recommended that masking be performed using rounding. Specific treatment should be determined separately in individual situations after consideration of the disclosure risks and analysis needs.« less
Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential
Cologne, John; Grant, Eric J.; Nakashima, Eiji; Chen, Yun; Funamoto, Sachiyo; Katayama, Hiroaki
2012-01-01
Objective. Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. Methods. We investigated a simple approach based on measures of disclosure risk and analytical utility that are straightforward for epidemiologic researchers to derive. The method is illustrated using data from the Japanese Atomic-bomb Survivor population. Results. Masking by modest rounding did not adequately enhance security but rounding to remove several digits of relative accuracy effectively reduced the risk of identification without substantially reducing utility. Grouping or adding random noise led to noticeable bias. Conclusions. When sharing epidemiologic data, it is recommended that masking be performed using rounding. Specific treatment should be determined separately in individual situations after consideration of the disclosure risks and analysis needs. PMID:22505949
Protecting privacy of shared epidemiologic data without compromising analysis potential.
Cologne, John; Grant, Eric J; Nakashima, Eiji; Chen, Yun; Funamoto, Sachiyo; Katayama, Hiroaki
2012-01-01
Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. We investigated a simple approach based on measures of disclosure risk and analytical utility that are straightforward for epidemiologic researchers to derive. The method is illustrated using data from the Japanese Atomic-bomb Survivor population. Masking by modest rounding did not adequately enhance security but rounding to remove several digits of relative accuracy effectively reduced the risk of identification without substantially reducing utility. Grouping or adding random noise led to noticeable bias. When sharing epidemiologic data, it is recommended that masking be performed using rounding. Specific treatment should be determined separately in individual situations after consideration of the disclosure risks and analysis needs.
Electro-optical propagation measurements during the MINOTAUROS experiment in the Cretan Sea
NASA Astrophysics Data System (ADS)
Eisele, Christian; Sucher, Erik; Wendelstein, Norbert; Stein, Karin
2017-09-01
We report on propagation measurements performed during the MINOTAUROS (Maritime INvestigations On Targets and Atmosphere Under Reduction of Optical Signatures) experiment on Crete, Greece, in late summer of 2016. The field trial has been organized by NATO STO Task Group SET-211 on Naval Platform Protection in the EO/IR Domain with strong support of the Hellenic Navy. Besides meteorological measurements, the experiment included measurements of turbulence using a boundary layer scintillometer on a slant path (d = 8 km) across the entry of Souda Bay (Crete). These are compared to values obtained by a 3D sonic anemometer, which was deployed at one end of the propagation path. Refraction effects have been measured using a 17.5 km path from Drapanos to Gerani. Two meteorological buoys along the path were used to gather information about the atmospheric conditions. An overview and a first analysis of the results are presented. The refraction measurements are compared to simulations using MORTICIA (Model of Range and Transmission in Coastal Inland Atmospheres), a new software tool currently under development in a collaboration of Fraunhofer IOSB and TNO.
40 CFR 60.434 - Monitoring of operations and recordkeeping.
Code of Federal Regulations, 2011 CFR
2011-07-01
... recordkeeping. 60.434 Section 60.434 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... affected facility using waterborne ink systems or solvent-borne ink systems with solvent recovery systems...) If affected facilities share the same raw ink storage/handling system with existing facilities...
40 CFR 60.434 - Monitoring of operations and recordkeeping.
Code of Federal Regulations, 2010 CFR
2010-07-01
... recordkeeping. 60.434 Section 60.434 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... affected facility using waterborne ink systems or solvent-borne ink systems with solvent recovery systems...) If affected facilities share the same raw ink storage/handling system with existing facilities...
Final Environmental Assessment for Shared Use Paths (SUP), Eglin Air Force Base, Florida
2011-07-01
NEPA; 40 Code of Federal Regulations [CFR] 1500-1508); the USAF environmental impact analysis process as effectuated by 32 CFR Part 989; and DoD...alternatives were considered, but not carried forward for analysis . Alternative B This alternative would consist of constructing a 10’ wide SUP...EA Section 2.3.1, page 12) No-Action Alternative This alternative also was carried forward for analysis . (EA Section 2.4.1, page 16) ENVIRONMENTAL
Bulk Current Injection Testing of Close Proximity Cable Current Return, 1kHz to 1 MHz
NASA Technical Reports Server (NTRS)
Bradley, Arthur T.; Lee, William M.; Singh, Vivek; Yavoich, Brian
2010-01-01
This paper presents the results of an experiment examining the percentage of current that returns on adjacent wires or through a surrounding cable shield rather than through a shared conducting chassis. Simulation and measurement data are compared from 1 kHz 1 MHz for seven common cable configurations. The phenomenon is important to understand, because minimizing the return current path is vital in developing systems with low radiated emissions.
A combined radar-radiometer with variable polarization
NASA Technical Reports Server (NTRS)
Martin, D. P.
1972-01-01
An instrument is described that provides both radar and radiometer data at the same time. The antenna and receiver are time shared for the two sensor functions. The antenna polarization can be electronically scanned at rates up to 5000 changes for both the transmit and receive signal paths. This equipment is to investigate target signatures for remote sensing applications. The function of the equipment is described and the results for observations of asphalt, grass, and gravel surfaces are presented.
LADS: Optimizing Data Transfers using Layout-Aware Data Scheduling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Youngjae; Atchley, Scott; Vallee, Geoffroy R
While future terabit networks hold the promise of signifi- cantly improving big-data motion among geographically distributed data centers, significant challenges must be overcome even on today s 100 gigabit networks to real- ize end-to-end performance. Multiple bottlenecks exist along the end-to-end path from source to sink. Data stor- age infrastructure at both the source and sink and its in- terplay with the wide-area network are increasingly the bottleneck to achieving high performance. In this paper, we identify the issues that lead to congestion on the path of an end-to-end data transfer in the terabit network en- vironment, and we presentmore » a new bulk data movement framework called LADS for terabit networks. LADS ex- ploits the underlying storage layout at each endpoint to maximize throughput without negatively impacting the performance of shared storage resources for other users. LADS also uses the Common Communication Interface (CCI) in lieu of the sockets interface to use zero-copy, OS-bypass hardware when available. It can further im- prove data transfer performance under congestion on the end systems using buffering at the source using flash storage. With our evaluations, we show that LADS can avoid congested storage elements within the shared stor- age resource, improving I/O bandwidth, and data transfer rates across the high speed networks.« less
NASA Technical Reports Server (NTRS)
Berenji, Hamid R.; Vengerov, David
1999-01-01
Successful operations of future multi-agent intelligent systems require efficient cooperation schemes between agents sharing learning experiences. We consider a pseudo-realistic world in which one or more opportunities appear and disappear in random locations. Agents use fuzzy reinforcement learning to learn which opportunities are most worthy of pursuing based on their promise rewards, expected lifetimes, path lengths and expected path costs. We show that this world is partially observable because the history of an agent influences the distribution of its future states. We consider a cooperation mechanism in which agents share experience by using and-updating one joint behavior policy. We also implement a coordination mechanism for allocating opportunities to different agents in the same world. Our results demonstrate that K cooperative agents each learning in a separate world over N time steps outperform K independent agents each learning in a separate world over K*N time steps, with this result becoming more pronounced as the degree of partial observability in the environment increases. We also show that cooperation between agents learning in the same world decreases performance with respect to independent agents. Since cooperation reduces diversity between agents, we conclude that diversity is a key parameter in the trade off between maximizing utility from cooperation when diversity is low and maximizing utility from competitive coordination when diversity is high.
Wang, Na; Zeng, Jiwen
2017-03-17
Wireless sensor networks are deployed to monitor the surrounding physical environments and they also act as the physical environments of parasitic sensor networks, whose purpose is analyzing the contextual privacy and obtaining valuable information from the original wireless sensor networks. Recently, contextual privacy issues associated with wireless communication in open spaces have not been thoroughly addressed and one of the most important challenges is protecting the source locations of the valuable packages. In this paper, we design an all-direction random routing algorithm (ARR) for source-location protecting against parasitic sensor networks. For each package, the routing process of ARR is divided into three stages, i.e., selecting a proper agent node, delivering the package to the agent node from the source node, and sending it to the final destination from the agent node. In ARR, the agent nodes are randomly chosen in all directions by the source nodes using only local decisions, rather than knowing the whole topology of the networks. ARR can control the distributions of the routing paths in a very flexible way and it can guarantee that the routing paths with the same source and destination are totally different from each other. Therefore, it is extremely difficult for the parasitic sensor nodes to trace the packages back to the source nodes. Simulation results illustrate that ARR perfectly confuses the parasitic nodes and obviously outperforms traditional routing-based schemes in protecting source-location privacy, with a marginal increase in the communication overhead and energy consumption. In addition, ARR also requires much less energy than the cloud-based source-location privacy protection schemes.
Summary of Technical Meeting To Compare US/French Approaches for Physical Protection Test Beds
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mack, Thomas Kimball; Martinez, Ruben; Thomas, Gerald
In September 2015, representatives of the US Department of Energy/National Nuclear Security Administration, including test bed professionals from Sandia National Laboratories, and representatives of the French Alternative Energies and Atomic Energy Commission participated in a one-week workshop to share best practices in design, organization, operations, utilization, improvement, and performance testing of physical protection test beds. The intended workshop outcomes were to (1) share methods of improving respective test bed methodologies and programs and (2) prepare recommendations for standards regarding creating and operating testing facilities for nations new to nuclear operations. At the workshop, the French and American subject matter expertsmore » compared best practices as developed at their respective test bed sites; discussed access delay test bed considerations; and presented the limitations/ constraints of physical protection test beds.« less
Nonchamber, Root-Side, Inert-Gas Purging During Welding
NASA Technical Reports Server (NTRS)
Mcgee, William F.; Rybicki, Daniel J.
1995-01-01
Improved apparatus distributes inert gas to protect against oxidation on root side of weld during welding and after welding while joint remains hot. Simple and lightweight; readily moved along weld path in synchronism with torch. Because it concentrates inert gas where needed, consumes gas at relatively low rate, and not necessary to monitor oxygen content of protective atmosphere. Apparatus does not obscure view of root side of weld. Used for full-penetration plasma-arc welding of such reactive metals as aluminum/lithium alloys and titanium.
NASA Technical Reports Server (NTRS)
Brooks, Carolyn A.
1992-01-01
The Salad Machine Research has continued to be a two path effort with the research at Marshall Space Flight Center (MSFC) focusing on the design, construction, and operation of a semiautomated system (Salad Machine) for the production of salad vegetables within a standard rack. Boeing Corporation in cooperation with NASA MSFC constructed a four drawer Salad Machine which was occasionally placed within the Space Station Freedom Mockup facility for view by selected visitors. Final outfitting of the Salad Machine is awaiting the arrival of parts for the nutrient delivery system. Research at the Alabama A&M facilities focused on compatibility of radish and lettuce plants when grown on the same nutrient solution. Lettuce fresh weight shoot yield was significantly enhanced when lettuce plants were grown on nutrient solution which was shared with radish. Radish tuber production was not significantly affected although there was a trend for radish from shared solutions to be heavier than those grown on separate nutrient solutions. The effect of sharing nutrient solutions on carbohydrate partitioning reflected the effect of sharing solution on fresh weight yield. Lettuce shoot dry weight was significantly greater for plants from shared solutions than from separate. There was no significant effect on sharing nutrient solution on radish tuber dry weight. Partitioning of nitrogen, calcium, magnesium, and potassium was not affected by sharing, there was, however, a disproportionate amount of potassium in the tissues, suggesting luxury consumption of potassium in all plants and tissues. It is concluded that lettuce plants benefit from sharing nutrient solution with radish and that radish is not harmed.
Grundy, Quinn; Held, Fabian P; Bero, Lisa A
2017-06-28
A great deal of consumer data, collected actively through consumer reporting or passively through sensors, is shared among apps. Developers increasingly allow their programs to communicate with other apps, sensors, and Web-based services, which are promoted as features to potential users. However, health apps also routinely pose risks related to information leaks, information manipulation, and loss of information. There has been less investigation into the kinds of user data that developers are likely to collect, and who might have access to it. We sought to describe how consumer data generated from mobile health apps might be distributed and reused. We also aimed to outline risks to individual privacy and security presented by this potential for aggregating and combining user data across apps. We purposively sampled prominent health and fitness apps available in the United States, Canada, and Australia Google Play and iTunes app stores in November 2015. Two independent coders extracted data from app promotional materials on app and developer characteristics, and the developer-reported collection and sharing of user data. We conducted a descriptive analysis of app, developer, and user data collection characteristics. Using structural equivalence analysis, we conducted a network analysis of sampled apps' self-reported sharing of user-generated data. We included 297 unique apps published by 231 individual developers, which requested 58 different permissions (mean 7.95, SD 6.57). We grouped apps into 222 app families on the basis of shared ownership. Analysis of self-reported data sharing revealed a network of 359 app family nodes, with one connected central component of 210 app families (58.5%). Most (143/222, 64.4%) of the sampled app families did not report sharing any data and were therefore isolated from each other and from the core network. Fifteen app families assumed more central network positions as gatekeepers on the shortest paths that data would have to travel between other app families. This cross-sectional analysis highlights the possibilities for user data collection and potential paths that data is able to travel among a sample of prominent health and fitness apps. While individual apps may not collect personally identifiable information, app families and the partners with which they share data may be able to aggregate consumer data, thus achieving a much more comprehensive picture of the individual consumer. The organizations behind the centrally connected app families represent diverse industries, including apparel manufacturers and social media platforms that are not traditionally involved in health or fitness. This analysis highlights the potential for anticipated and voluntary but also possibly unanticipated and involuntary sharing of user data, validating privacy and security concerns in mobile health. ©Quinn Grundy, Fabian P Held, Lisa A Bero. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 28.06.2017.
Secondary traumatic stress among domestic violence advocates: workplace risk and protective factors.
Slattery, Suzanne M; Goodman, Lisa A
2009-11-01
This study identified workplace factors associated with secondary traumatic stress (STS) in a sample of 148 domestic violence advocates working in diverse settings. Findings indicate that coworker support and quality clinical supervision are critical to emotional well-being and that an environment in which there is shared power-that is, respect for diversity, mutuality, and consensual decision making-provides better protection for advocates than more traditional, hierarchical organizational models. Furthermore, shared power emerged as the only workplace variable to significantly predict STS above and beyond individual factors. The discussion includes implications for practice and policy as well as directions for future research.
Wilkins, Natalie; Myers, Lindsey; Kuehl, Tomei; Bauman, Alice; Hertz, Marci
Violence takes many forms, including intimate partner violence, sexual violence, child abuse and neglect, bullying, suicidal behavior, and elder abuse and neglect. These forms of violence are interconnected and often share the same root causes. They can also co-occur together in families and communities and can happen at the same time or at different stages of life. Often, due to a variety of factors, separate, "siloed" approaches are used to address each form of violence. However, understanding and implementing approaches that prevent and address the overlapping root causes of violence (risk factors) and promote factors that increase the resilience of people and communities (protective factors) can help practitioners more effectively and efficiently use limited resources to prevent multiple forms of violence and save lives. This article presents approaches used by 2 state health departments, the Maryland Department of Health and Mental Hygiene and the Colorado Department of Public Health and Environment, to integrate a shared risk and protective factor approach into their violence prevention work and identifies key lessons learned that may serve to inform crosscutting violence prevention efforts in other states.
Wilkins, Natalie; Myers, Lindsey; Kuehl, Tomei; Bauman, Alice; Hertz, Marci
2018-01-01
Violence takes many forms, including intimate partner violence, sexual violence, child abuse and neglect, bullying, suicidal behavior, and elder abuse and neglect. These forms of violence are interconnected and often share the same root causes. They can also co-occur together in families and communities and can happen at the same time or at different stages of life. Often, due to a variety of factors, separate, “siloed” approaches are used to address each form of violence. However, understanding and implementing approaches that prevent and address the overlapping root causes of violence (risk factors) and promote factors that increase the resilience of people and communities (protective factors) can help practitioners more effectively and efficiently use limited resources to prevent multiple forms of violence and save lives. This article presents approaches used by 2 state health departments, the Maryland Department of Health and Mental Hygiene and the Colorado Department of Public Health and Environment, to integrate a shared risk and protective factor approach into their violence prevention work and identifies key lessons learned that may serve to inform crosscutting violence prevention efforts in other states. PMID:29189502
Three Case Studies in Making Fair Choices on the Path to Universal Health Coverage.
Voorhoeve, Alex; Edejer, Tessa T T; Kapiriri, Lydia; Norheim, Ole F; Snowden, James; Basenya, Olivier; Bayarsaikhan, Dorjsuren; Chentaf, Ikram; Eyal, Nir; Folsom, Amanda; Tun Hussein, Rozita Halina; Morales, Cristian; Ostmann, Florian; Ottersen, Trygve; Prakongsai, Phusit; Saenz, Carla; Saleh, Karima; Sommanustweechai, Angkana; Wikler, Daniel; Zakariah, Afisah
2016-12-01
The goal of achieving Universal Health Coverage (UHC) can generally be realized only in stages. Moreover, resource, capacity, and political constraints mean governments often face difficult trade-offs on the path to UHC. In a 2014 report, Making fair choices on the path to UHC , the WHO Consultative Group on Equity and Universal Health Coverage articulated principles for making such trade-offs in an equitable manner. We present three case studies which illustrate how these principles can guide practical decision-making. These case studies show how progressive realization of the right to health can be effectively guided by priority-setting principles, including generating the greatest total health gain, priority for those who are worse off in a number of dimensions (including health, access to health services, and social and economic status), and financial risk protection. They also demonstrate the value of a fair and accountable process of priority setting.
Surface Hold Advisor Using Critical Sections
NASA Technical Reports Server (NTRS)
Law, Caleb Hoi Kei (Inventor); Hsiao, Thomas Kun-Lung (Inventor); Mittler, Nathan C. (Inventor); Couluris, George J. (Inventor)
2013-01-01
The Surface Hold Advisor Using Critical Sections is a system and method for providing hold advisories to surface controllers to prevent gridlock and resolve crossing and merging conflicts among vehicles traversing a vertex-edge graph representing a surface traffic network on an airport surface. The Advisor performs pair-wise comparisons of current position and projected path of each vehicle with other surface vehicles to detect conflicts, determine critical sections, and provide hold advisories to traffic controllers recommending vehicles stop at entry points to protected zones around identified critical sections. A critical section defines a segment of the vertex-edge graph where vehicles are in crossing or merging or opposite direction gridlock contention. The Advisor detects critical sections without reference to scheduled, projected or required times along assigned vehicle paths, and generates hold advisories to prevent conflicts without requiring network path direction-of-movement rules and without requiring rerouting, rescheduling or other network optimization solutions.
Three Case Studies in Making Fair Choices on the Path to Universal Health Coverage
Edejer, Tessa T.T.; Kapiriri, Lydia; Norheim, Ole F.; Snowden, James; Basenya, Olivier; Bayarsaikhan, Dorjsuren; Chentaf, Ikram; Eyal, Nir; Folsom, Amanda; Tun Hussein, Rozita Halina; Morales, Cristian; Ostmann, Florian; Ottersen, Trygve; Prakongsai, Phusit; Saenz, Carla; Saleh, Karima; Sommanustweechai, Angkana; Wikler, Daniel; Zakariah, Afisah
2016-01-01
Abstract The goal of achieving Universal Health Coverage (UHC) can generally be realized only in stages. Moreover, resource, capacity, and political constraints mean governments often face difficult trade-offs on the path to UHC. In a 2014 report, Making fair choices on the path to UHC, the WHO Consultative Group on Equity and Universal Health Coverage articulated principles for making such trade-offs in an equitable manner. We present three case studies which illustrate how these principles can guide practical decision-making. These case studies show how progressive realization of the right to health can be effectively guided by priority-setting principles, including generating the greatest total health gain, priority for those who are worse off in a number of dimensions (including health, access to health services, and social and economic status), and financial risk protection. They also demonstrate the value of a fair and accountable process of priority setting. PMID:28559673
The clinical development process for a novel preventive vaccine: An overview.
Singh, K; Mehta, S
2016-01-01
Each novel vaccine candidate needs to be evaluated for safety, immunogenicity, and protective efficacy in humans before it is licensed for use. After initial safety evaluation in healthy adults, each vaccine candidate follows a unique development path. This article on clinical development gives an overview on the development path based on the expectations of various guidelines issued by the World Health Organization (WHO), the European Medicines Agency (EMA), and the United States Food and Drug Administration (USFDA). The manuscript describes the objectives, study populations, study designs, study site, and outcome(s) of each phase (Phase I-III) of a clinical trial. Examples from the clinical development of a malaria vaccine candidate, a rotavirus vaccine, and two vaccines approved for human papillomavirus (HPV) have also been discussed. The article also tabulates relevant guidelines, which can be referred to while drafting the development path of a novel vaccine candidate.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Forinash, Betsy; Schultheisz, Daniel; Peake, Tom
2013-07-01
Following the decision to withdraw the Yucca Mountain license application, the Department of Energy created a Blue Ribbon Commission (BRC) on America's Nuclear Future, tasked with recommending a national strategy to manage the back end of the nuclear fuel cycle. The BRC issued its final report in January 2012, with recommendations covering transportation, storage and disposal of spent nuclear fuel (SNF); potential reprocessing; and supporting institutional measures. The BRC recommendations on disposal of SNF and high-level waste (HLW) are relevant to the U.S. Environmental Protection Agency (EPA), which shares regulatory responsibility with the Nuclear Regulatory Commission (NRC): EPA issues 'generallymore » applicable' performance standards for disposal repositories, which are then implemented in licensing. For disposal, the BRC endorses developing one or more geological repositories, with siting based on an approach that is adaptive, staged and consent-based. The BRC recommends that EPA and NRC work cooperatively to issue generic disposal standards-applying equally to all sites-early in any siting process. EPA previously issued generic disposal standards that apply to all sites other than Yucca Mountain. However, the BRC concluded that the existing regulations should be revisited and revised. The BRC proposes a number of general principles to guide the development of future regulations. EPA continues to review the BRC report and to assess the implications for Agency action, including potential regulatory issues and considerations if EPA develops new or revised generic disposal standards. This review also involves preparatory activities to define potential process and public engagement approaches. (authors)« less
Spray shadowing for stress relief and mechanical locking in thick protective coatings
Hollis, Kendall [Los Alamos, NM; Bartram, Brian [Los Alamos, NM
2007-05-22
A method for applying a protective coating on an article, comprising the following steps: selecting an article with a surface for applying a coating thickness; creating undercut grooves on the article, where the grooves depend beneath the surface to a bottom portion with the grooves having an upper width on the surface and a lower width on the bottom portion connected by side walls, where at least one of the side walls connects the upper width and the lower width to form an undercut angle with the surface less than 90.degree.; and, applying the protective coating onto the article to fill the undercut grooves and cover the surface, thereby forming weak paths within the protective coating.
MOBLAB: a mobile laboratory for testing real-time vision-based systems in path monitoring
NASA Astrophysics Data System (ADS)
Cumani, Aldo; Denasi, Sandra; Grattoni, Paolo; Guiducci, Antonio; Pettiti, Giuseppe; Quaglia, Giorgio
1995-01-01
In the framework of the EUREKA PROMETHEUS European Project, a Mobile Laboratory (MOBLAB) has been equipped for studying, implementing and testing real-time algorithms which monitor the path of a vehicle moving on roads. Its goal is the evaluation of systems suitable to map the position of the vehicle within the environment where it moves, to detect obstacles, to estimate motion, to plan the path and to warn the driver about unsafe conditions. MOBLAB has been built with the financial support of the National Research Council and will be shared with teams working in the PROMETHEUS Project. It consists of a van equipped with an autonomous power supply, a real-time image processing system, workstations and PCs, B/W and color TV cameras, and TV equipment. This paper describes the laboratory outline and presents the computer vision system and the strategies that have been studied and are being developed at I.E.N. `Galileo Ferraris'. The system is based on several tasks that cooperate to integrate information gathered from different processes and sources of knowledge. Some preliminary results are presented showing the performances of the system.
ERIC Educational Resources Information Center
Wahle, Nira; Ponizovsky-Bergelson, Yael; Dayan, Yael; Erlichman, Orly; Roer-Strier, Dorit
2017-01-01
This article explores children's perspectives on risk and protection in the context of war, exclusion, political conflict and immigration via the example of the excluded Ethiopian immigrant community in Israel. Thirty children of Ethiopian origin, aged four to six, shared their views on risk and protection with the aid of photography, drawings and…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-11
... its shared enforcement authority with the Consumer Financial Protection Bureau (``CFPB'') for information collection requirements contained in the CFPB's Regulation O. That clearance expires on January 31... to Rebecca Unruh, Attorney, Division of Financial Practices, Bureau of Consumer Protection, Federal...
... the virus to their babies. Babies born to mothers infected with HIV are also given special medicines to try to prevent HIV infection. Protecting Yourself The best way to protect yourself from HIV is to abstain from oral, vaginal, and anal sex and to not share needles. If you do ...
SOCIO-ECONOMIC IMPACT EVALUATION OF LAKE IMPROVEMENT PROJECTS AND LAKE MANAGEMENT GUIDELINES
Under Public Law 92-500, the U.S. Environmental Protection Agency embarked on a major program of cost sharing grants to implement lake rehabilitation and protection projects. Improvement of water quality impacts the lives of people and organizations; however, the methods used to ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... also its vulnerabilities to emerging threats. Cyber incidents can have devastating consequences on both... against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between government and the private sector, and protecting the privacy...
NASA Technical Reports Server (NTRS)
Webster, Christopher R.; Sander, Stanley P.; Beer, Reinhard; May, Randy D.; Knollenberg, Robert G.
1990-01-01
A new instrument, the Probe Infrared Laser Spectrometer (PIRLS), is described for in situ sensing of the gas composition and particle size distribution of Titan's atmosphere on the NASA/ESA Cassini mission. For gas composition measurements, several narrow-band (0.0001/cm) tunable lead-salt diode lasers operating near 80 K at selected mid-IR wavelengths are directed over a path length defined by a small reflector extending over the edge of the probe spacecraft platform; volume mixing ratios of 10 to the -9th should be measurable for several species of interest. A cloud-particle-size spectrometer using a diode laser source at 780 nm shares the optical path and deployed reflector; a combination of imaging and light scattering techniques is used to determine sizes of haze and cloud particles and their number density as a function of altitude.
Multi-scale computation methods: Their applications in lithium-ion battery research and development
NASA Astrophysics Data System (ADS)
Siqi, Shi; Jian, Gao; Yue, Liu; Yan, Zhao; Qu, Wu; Wangwei, Ju; Chuying, Ouyang; Ruijuan, Xiao
2016-01-01
Based upon advances in theoretical algorithms, modeling and simulations, and computer technologies, the rational design of materials, cells, devices, and packs in the field of lithium-ion batteries is being realized incrementally and will at some point trigger a paradigm revolution by combining calculations and experiments linked by a big shared database, enabling accelerated development of the whole industrial chain. Theory and multi-scale modeling and simulation, as supplements to experimental efforts, can help greatly to close some of the current experimental and technological gaps, as well as predict path-independent properties and help to fundamentally understand path-independent performance in multiple spatial and temporal scales. Project supported by the National Natural Science Foundation of China (Grant Nos. 51372228 and 11234013), the National High Technology Research and Development Program of China (Grant No. 2015AA034201), and Shanghai Pujiang Program, China (Grant No. 14PJ1403900).
Hicks, Ramona; Johnson, Stephen; Porter, Amy; Zatzick, Douglas F; One Mind Summit Panel Participants, The
2017-03-29
Advances in science frequently precede changes in clinical care by several years or even decades. To better understand the path to translation, we invited experts to share their perspectives at the 5th Annual One Mind Summit: "Science Informing Brain Health Policies and Practice", which was held on May 24-25, 2016 in Crystal City, VA. While the translation of brain research throughout the pipeline - from basic science research to patient care - was discussed, the focus was on the implementation of "best evidence" into patient care. The Summit identified key steps, including the need for professional endorsement and clinical guidelines or policies, acceptance by regulators and payers, dissemination and training for clinicians, patient advocacy, and learning healthcare models. The path to implementation was discussed broadly, as well as in the context of a specific project to implement concussion screening in emergency and urgent care centers throughout the U.S.
Computer-aided design/computer-aided manufacturing skull base drill.
Couldwell, William T; MacDonald, Joel D; Thomas, Charles L; Hansen, Bradley C; Lapalikar, Aniruddha; Thakkar, Bharat; Balaji, Alagar K
2017-05-01
The authors have developed a simple device for computer-aided design/computer-aided manufacturing (CAD-CAM) that uses an image-guided system to define a cutting tool path that is shared with a surgical machining system for drilling bone. Information from 2D images (obtained via CT and MRI) is transmitted to a processor that produces a 3D image. The processor generates code defining an optimized cutting tool path, which is sent to a surgical machining system that can drill the desired portion of bone. This tool has applications for bone removal in both cranial and spine neurosurgical approaches. Such applications have the potential to reduce surgical time and associated complications such as infection or blood loss. The device enables rapid removal of bone within 1 mm of vital structures. The validity of such a machining tool is exemplified in the rapid (< 3 minutes machining time) and accurate removal of bone for transtemporal (for example, translabyrinthine) approaches.
Thermal elastohydrodynamic lubrication of spur gears
NASA Technical Reports Server (NTRS)
Wang, K. L.; Cheng, H. S.
1980-01-01
An analysis and computer program called TELSGE were developed to predict the variations of dynamic load, surface temperature, and lubricant film thickness along the contacting path during the engagement of a pair of involute spur gears. The analysis of dynamic load includes the effect of gear inertia, the effect of load sharing of adjacent teeth, and the effect of variable tooth stiffness which are obtained by a finite-element method. Results obtained from TELSGE for the dynamic load distributions along the contacting path for various speeds of a pair of test gears show patterns similar to that observed experimentally. Effects of damping ratio, contact ratio, tip relief, and tooth error on the dynamic load were examined. In addition, two dimensionless charts are included for predicting the maximum equilibrium surface temperature, which can be used to estimate directly the lubricant film thickness based on well established EHD analysis.
The path from student to mentor and from chromosomes to replication to genomics.
Gerbi, Susan A
2016-11-01
The American Society for Cell Biology Women in Cell Biology Sandra Masur Senior Award recognizes leadership in scientific accomplishments and in mentoring, which are intertwined. My development as a scientist reflects important mentors in my life, including my father and Joe Gall, who is my "Doktor Vater." In turn, as an established investigator, my scientific successes in researching 1) chromosomes, their replication and genomics, and 2) ribosomes, their structure, evolution, and biogenesis, reflects the hard work of my students and postdocs, for whom I act as a mentor, guiding them in their research and along their career paths. © 2016 Gerbi. This article is distributed by The American Society for Cell Biology under license from the author(s). Two months after publication it is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).
Advanced Rotorcraft Transmission (ART) program summary
NASA Technical Reports Server (NTRS)
Krantz, T. L.; Kish, J. G.
1992-01-01
The Advanced Rotorcraft Transmission (ART) Program was initiated to advance the state of the art for rotorcraft transmissions. The goal of the ART Program was to develop and demonstrate the technologies needed to reduce transmission weight by 25 pct. and reduce noise by 10 dB while obtaining a 5000 hr 'mean time between failure'. The research done under the ART Program is summarized. A split path design was selected as best able to meet the program goals. Key part technologies needed for this design were identified, studied, and developed. Two of these technologies are discussed in detail: the load sharing of split path designs including the use of a compliant elastomeric torque splitter and the application of a high ratio, low pitch line velocity gear mesh. Development of an angular contact spherical roller bearing, transmission error analysis, and fretting fatigue testing are discussed. The technologies for a light weight, quiet, and reliable rotorcraft transmission were demonstrated.
Prioritizing investments in innovations to protect women from the leading causes of maternal death
2014-01-01
PATH, an international nonprofit organization, assessed nearly 40 technologies for their potential to reduce maternal mortality from postpartum hemorrhage and preeclampsia and eclampsia in low-resource settings. The evaluation used a new Excel-based prioritization tool covering 22 criteria developed by PATH, the Maternal and Neonatal Directed Assessment of Technology (MANDATE) model, and consultations with experts. It identified five innovations with especially high potential: technologies to improve use of oxytocin, a uterine balloon tamponade, simplified dosing of magnesium sulfate, an improved proteinuria test, and better blood pressure measurement devices. Investments are needed to realize the potential of these technologies to reduce mortality. PMID:24405972
Prioritizing investments in innovations to protect women from the leading causes of maternal death.
Herrick, Tara M; Harner-Jay, Claudia M; Levisay, Alice M; Coffey, Patricia S; Free, Michael J; LaBarre, Paul D
2014-01-09
PATH, an international nonprofit organization, assessed nearly 40 technologies for their potential to reduce maternal mortality from postpartum hemorrhage and preeclampsia and eclampsia in low-resource settings. The evaluation used a new Excel-based prioritization tool covering 22 criteria developed by PATH, the Maternal and Neonatal Directed Assessment of Technology (MANDATE) model, and consultations with experts. It identified five innovations with especially high potential: technologies to improve use of oxytocin, a uterine balloon tamponade, simplified dosing of magnesium sulfate, an improved proteinuria test, and better blood pressure measurement devices. Investments are needed to realize the potential of these technologies to reduce mortality.
Protection of Medical Equipment against Electromagnetic Pulse (EMP): phase I
1986-06-12
case condition. The current in the power cord path due to the EMP pin threat is computed frorn: VEMP I(RS+RBI +RB2+RL+RB3 +ZC+RB4+R+RB5 R +RB6 + RB 7...base-emitter, causing darage. 44 I NN4154 100 B-C vEMP _ 2N4401 S B-E 2N4401 270 Figure 7.5 ESA: Patient monitor path to ground. 45 7.1.3 Foot Switch...computed from: VEMP Z Rs. RB) VVBD (7.5) 1800 = l(100 25) + 50 (7.6) The resulting threat current is 14A. The rectifier diode threshold is 3.7A at f
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-22
... relation to market price and net asset value (``NAV'') per common share) and the relationship between the... relation to NAV per share). Applicants state that the Independent Directors also considered what conflicts... appropriate in the public interest and consistent with the protection of investors and the purposes fairly...
Code of Federal Regulations, 2010 CFR
2010-01-01
... CURRENCY, DEPARTMENT OF THE TREASURY ORGANIZATION AND FUNCTIONS, AVAILABILITY AND RELEASE OF INFORMATION... Information § 4.39 Notification of parties and procedures for sharing and using OCC records in litigation. (a... information obtained pursuant to this subpart, and, upon entry of a protective order, shall provide copies of...
ERIC Educational Resources Information Center
Foerster, Carl A.
2013-01-01
The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…
Bertzky, Monika; Stoll-Kleemann, Susanne
2009-01-01
Protected areas present a global heritage. Assessing conservation achievements in protected areas is of crucial importance with respect to the on-time delivery of international biodiversity conservation targets. However, monitoring data from publicly accessible databases for comparative studies of conservation achievements in the protected areas of the world are very scarce, if not non-existent. At first glance this is surprising because, with regards to protected areas, at least according to well established protected area management guidelines and widely accepted public mandates, a great deal of monitoring work and data gathering is to be conducted. This would imply that data on changes of biodiversity in protected areas could be expected to exist, and the constant progress in information technologies and Web tools engenders hope that some of it might even be available online for the global public. This review article presents the results of an extensive online search and review of existing monitoring data from freely accessible online databases for its use in an assessment of conservation achievements in a larger sample of protected areas. Results show two contrary sides to the status quo of accessible data from the World Wide Web for conservation science: data overkill and data scarcity with poor metadata provision. While ever more research is, in fact, based on open-access online data, such as extrapolations of species ranges used in conservation management and planning, it remains almost impossible to obtain a basic set of information for an assessment of conservation achievements within a larger number of protected areas. This awareness has triggered a detailed discussion about the discrepancies in sharing data at the level of protected areas; mismatching relationships between expected activities in protected areas and the capacity for delivering these requirements are certainly among the main challenges. In addition, the fear of data misuse potentially resulting in harm for nature, careers, and competencies still seems to be a critical barrier strictly controlling the willingness to share data. Various initiatives aimed at tackling technical and cultural obstacles are introduced and discussed to reach the goal of a modern resource management based on adaptive management using digital opportunities of the new millennium for a sustainable global village.
Mediators of the childhood emotional abuse-hopelessness association in African American women.
Lamis, Dorian A; Wilson, Christina K; Shahane, Amit A; Kaslow, Nadine J
2014-08-01
Although there is an association between experiencing childhood emotional abuse and feeling hopeless as an adult, it is critical to understand the factors that may be protective in this relationship. The goal of this study was to determine if two protective factors, namely spiritual well-being, including both religious and existential well-being, and positive self-esteem, served to mediate the association between childhood emotional abuse and adult hopelessness. The sample for this investigation was low-income African American women suicide attempters who were abused by a partner in the prior year (N=121). A path analysis revealed that in this sample, the childhood emotional abuse-hopelessness link was mediated by existential well-being and positive self-esteem, as well as by the two-mediator path of emotional abuse on existential well-being on self-esteem on hopelessness. Results suggested that existential well-being may be a more salient protective factor for hopelessness than religious well-being among abused, suicidal African American women who experienced childhood emotional abuse. Findings highlight the value of culturally relevant strategies for enhancing existential well-being and self-esteem in this at-risk population to reduce their vulnerability to feelings of hopelessness. Copyright © 2013 Elsevier Ltd. All rights reserved.
A CLS-based survivable and energy-saving WDM-PON architecture
NASA Astrophysics Data System (ADS)
Zhu, Min; Zhong, Wen-De; Zhang, Zhenrong; Luan, Feng
2013-11-01
We propose and demonstrate an improved survivable and energy-saving WDM-PON with colorless ONUs. It incorporates both energy-saving and self-healing operations. A simple effective energy-saving scheme is proposed by including an energy-saving control unit in the OLT and a control unit at each ONU. The energy-saving scheme realizes both dozing and sleep (offline) modes, which greatly improves the energy-saving efficiency for WDM-PONs. An intelligent protection switching scheme is designed in the OLT, which can distinguish if an ONU is in dozing/sleep (offline) state or a fiber is faulty. Moreover, by monitoring the optical power of each channel on both working and protection paths, the OLT can know the connection status of every fiber path, thus facilitating an effective protection switching and a faster failure recovery. The improved WDM-PON architecture not only significantly reduces energy consumption, but also performs self-healing operation in practical operation scenarios. The scheme feasibility is experimentally verified with 10 Gbit/s downstream and 1.25 Gbit/s upstream transmissions. We also examine the energy-saving efficiency of our proposed energy-saving scheme by simulation, which reveals that energy saving mainly arises from the dozing mode, not from the sleep mode when the ONU is in the online state.
40 CFR 35.147 - Minimum cost share for a Performance Partnership Grant.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Partnership Grant. 35.147 Section 35.147 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Air Pollution Control... Grant, whichever is greater. (b) If an air pollution control agency includes its section 105 air program...
40 CFR 35.147 - Minimum cost share for a Performance Partnership Grant.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Partnership Grant. 35.147 Section 35.147 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Air Pollution Control... Grant, whichever is greater. (b) If an air pollution control agency includes its section 105 air program...
42 CFR 447.66 - General alternative premium protections.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 4 2011-10-01 2011-10-01 false General alternative premium protections. 447.66 Section 447.66 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under Sectio...
42 CFR 447.66 - General alternative premium protections.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 4 2012-10-01 2012-10-01 false General alternative premium protections. 447.66 Section 447.66 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under Sectio...
42 CFR 447.66 - General alternative premium protections.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 4 2013-10-01 2013-10-01 false General alternative premium protections. 447.66 Section 447.66 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under Sectio...
42 CFR 447.66 - General alternative premium protections.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 4 2010-10-01 2010-10-01 false General alternative premium protections. 447.66 Section 447.66 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PAYMENTS FOR SERVICES Payments: General Provisions Alternative Premiums and Cost Sharing Under Sectio...
40 CFR 35.147 - Minimum cost share for a Performance Partnership Grant.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Partnership Grant. 35.147 Section 35.147 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Environmental Program Grants Air Pollution Control... Grant, whichever is greater. (b) If an air pollution control agency includes its section 105 air program...
Conservation: saving Florida's manatees
Bonde, Robert K.
2008-01-01
Robert K. Bonde of the U.S. Geological Survey writes about the protected population of manatees in Crystal River, Florida, including information about the threats they face as they migrate in and out of protected waters. Photographer Carol Grant shares images of "Angel," a newborn manatee she photographed early one winter morning.
. Protecting the present through resource management The Laboratory actively manages and protects resources on shared land. Through biological monitoring, the Laboratory strives to minimize operational impacts to plants and animals. Through collaboration with its stakeholders and local tribal governments, the
32 CFR Appendix A to Part 223 - Procedures for Identifying and Controlling DoD UCNI
Code of Federal Regulations, 2011 CFR
2011-07-01
... security measures, including security plans, procedures, and equipment, for the physical protection of DoD... stand-alone personal computers, or shared-logic work processing systems, if protection from unauthorized... and security by increasing significantly the likelihood of the illegal production of nuclear weapons...
75 FR 80367 - Share Insurance and Appendix
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-22
.... SUMMARY: Section 343 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act) \\1... were transferred prior to the time of failure. For example, if pursuant to an agreement between an... Accounts In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act, through December...
Essentials of the disclosure review process: a federal perspective.
Zarate, Alvan O; Zayatz, Laura
2006-09-01
MANY RESEARCHERS NEED TO MAKE arrangements to share de-identified electronic data files. However, the ways in which respondent identity may be protected are not well understood or are assumed to be the special province of large statistical agencies or specialized statisticians. Approaches to data sharing and protecting respondent identity have been pioneered by federal agencies which gather data vital to political and economic decision making. These agencies are required by statutory law both to assure confidentiality and to share data in usable form with other governmental agencies and with scholars who perform needed analyses of those data. The basic principles of disclosure limitation developed by the Census Bureau, the National Center for Health Statistics, and other federal agencies are fundamental to meeting new funding requirements to share and deidentify data, and are often referred to in the literature on data sharing. We describe how these principles are employed by the Disclosure Review Boards (DRBs) of these two agencies, and then state these principles in more general terms that are applicable to any disclosure review process. The kinds of data that academic institutions share may call for less complex or stringent DRBs and specific nondisclosure procedures different from those employed by federal agencies, but the same general principles apply. Specific application of these six principles by non-government researchers will depend on the nature of their data, their own institutional resources, and the likely future usefulness of their data.
Applying the take-grant protection model
NASA Technical Reports Server (NTRS)
Bishop, Matt
1990-01-01
The Take-Grant Protection Model has in the past been used to model multilevel security hierarchies and simple protection systems. The models are extended to include theft of rights and sharing information, and additional security policies are examined. The analysis suggests that in some cases the basic rules of the Take-Grant Protection Model should be augmented to represent the policy properly; when appropriate, such modifications are made and their efforts with respect to the policy and its Take-Grant representation are discussed.
Effects of eHealth Literacy on General Practitioner Consultations: A Mediation Analysis.
Schulz, Peter Johannes; Fitzpatrick, Mary Anne; Hess, Alexandra; Sudbury-Riley, Lynn; Hartung, Uwe
2017-05-16
Most evidence (not all) points in the direction that individuals with a higher level of health literacy will less frequently utilize the health care system than individuals with lower levels of health literacy. The underlying reasons of this effect are largely unclear, though people's ability to seek health information independently at the time of wide availability of such information on the Internet has been cited in this context. We propose and test two potential mediators of the negative effect of eHealth literacy on health care utilization: (1) health information seeking and (2) gain in empowerment by information seeking. Data were collected in New Zealand, the United Kingdom, and the United States using a Web-based survey administered by a company specialized on providing online panels. Combined, the three samples resulted in a total of 996 baby boomers born between 1946 and 1965 who had used the Internet to search for and share health information in the previous 6 months. Measured variables include eHealth literacy, Internet health information seeking, the self-perceived gain in empowerment by that information, and the number of consultations with one's general practitioner (GP). Path analysis was employed for data analysis. We found a bundle of indirect effect paths showing a positive relationship between health literacy and health care utilization: via health information seeking (Path 1), via gain in empowerment (Path 2), and via both (Path 3). In addition to the emergence of these indirect effects, the direct effect of health literacy on health care utilization disappeared. The indirect paths from health literacy via information seeking and empowerment to GP consultations can be interpreted as a dynamic process and an expression of the ability to find, process, and understand relevant information when that is necessary. ©Peter Johannes Schulz, Mary Anne Fitzpatrick, Alexandra Hess, Lynn Sudbury-Riley, Uwe Hartung. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 16.05.2017.
2016-02-01
Ralph Kahn Maniac Lecture, February 1, 2016 NASA climate scientist Ralph Kahn presented a Maniac lecture entitled, "The Stories Data Tell." At an early age, Ralph found that separating causality from coincidence can be the lynchpin of understanding, and at times can help identify prerogatives or highlight the path toward the better options. Ralph shared his experiences, professional, personal, and at the intersection of the two, where the difference seemed to matter. And how data can help address this challenge, providing evidence one way or the other - sometimes!
Enter AGU student contest to win free Fall Meeting registration
NASA Astrophysics Data System (ADS)
Smedley, Kara
2012-07-01
AGU is excited to announce its first Student Video and Student T-shirt Design competitions. This is an opportunity for students to display their artistic sides and share their creativity and love of science with the world. Entries could highlight an aspect of Earth or space science in an educational and/or entertaining way or showcase a career path in geophysical sciences. Winners of these student-only competitions will be awarded free registration to the 2012 Fall Meeting in San Francisco, Calif.
Metal flame spray coating protects electrical cables in extreme environment
NASA Technical Reports Server (NTRS)
Brady, R. D.; Fox, H. A.
1967-01-01
Metal flame spray coating prevents EMF measurement error in sheathed instrumentation cables which are externally attached to cylinders which were cooled on the inside, but exposed to gamma radiation on the outside. The coating provides a thermoconductive path for radiation induced high temperatures within the cables.
Permeable reactive barrier (PRB) technology is gradually being accepted as a viable alternative to conventional groundwater remediation systems such as pump and treat. PRB technology involves the placement or formation of a reactive treatment zone in the path of a dissolved conta...
Sanders, G Lawrence
2017-01-01
Background Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. Objective This study investigated the factors that influence individuals’ intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient’s interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals’ intentions. Methods This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. Results We find that privacy concern has the most influence on individuals’ intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Conclusions Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI during the sharing process. It is paramount to address this factor to increase information flow and identify how patients can assure that their privacy is protected. The outcome of this study is a set of recommendations for motivating the sharing of PHI. The goal of this research is to increase the health profile of the patients by integrating the testing and diagnoses of various doctors across health care providers and, thus, bring patients closer to the physicians. PMID:28903895
Yu, Fei; Ji, Zhanglong
2014-01-01
In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.
2014-01-01
In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods. PMID:25521367