NASA Technical Reports Server (NTRS)
Niebur, D.; Germond, A.
1993-01-01
This report investigates the classification of power system states using an artificial neural network model, Kohonen's self-organizing feature map. The ultimate goal of this classification is to assess power system static security in real-time. Kohonen's self-organizing feature map is an unsupervised neural network which maps N-dimensional input vectors to an array of M neurons. After learning, the synaptic weight vectors exhibit a topological organization which represents the relationship between the vectors of the training set. This learning is unsupervised, which means that the number and size of the classes are not specified beforehand. In the application developed in this report, the input vectors used as the training set are generated by off-line load-flow simulations. The learning algorithm and the results of the organization are discussed.
Supporting secure programming in web applications through interactive static analysis.
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2014-07-01
Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.
Supporting secure programming in web applications through interactive static analysis
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2013-01-01
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513
ERIC Educational Resources Information Center
Chu, Chi Meng; Thomas, Stuart D. M.; Ogloff, James R. P.; Daffern, Michael
2013-01-01
Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study…
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
Li, Shancang; Tryfonas, Theo; Russell, Gordon; Andriotis, Panagiotis
2016-08-01
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire system.
Chu, Chi Meng; Thomas, Stuart D M; Ogloff, James R P; Daffern, Michael
2013-04-01
Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study sought to compare the predictive accuracy of dynamic risk assessment measures for violence with static risk assessment measures over the short term (up to 1 month) and medium term (up to 6 months) in a forensic psychiatric inpatient setting. Results showed that dynamic measures were generally more accurate than static measures for short- to medium-term predictions of inpatient aggression. These findings highlight the necessity of using risk assessment measures that are sensitive to important clinical risk state variables to improve the short- to medium-term prediction of aggression within the forensic inpatient setting. Such knowledge can assist with the development of more accurate and efficient risk assessment procedures, including the selection of appropriate risk assessment instruments to manage and prevent the violence of offenders with mental illnesses during inpatient treatment.
Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan
2013-06-01
Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.
Evaluation of power system security and development of transmission pricing method
NASA Astrophysics Data System (ADS)
Kim, Hyungchul
The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.
Dynamic Attack Tree Tool for Risk Assessments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Black, Karl
2012-03-13
DATT enables interactive visualization, qualitative analysis and recording of cyber and other forms of risk. It facilitates dynamic risk-based approaches (as opposed to static compliance-based) to security and risk management in general. DATT allows decision makers to consistently prioritize risk mitigation strategies and quickly see where attention is most needed across the enterprise.
Secure communication of static information by electronic means
Gritton, Dale G.
1994-01-01
A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.
DARKDROID: Exposing the Dark Side of Android Marketplaces
2016-06-01
Moreover, our approaches can detect apps containing both intentional and unintentional vulnerabilities, such as unsafe code loading mechanisms and...Security, Static Analysis, Dynamic Analysis, Malware Detection , Vulnerability Scanning 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...applications in a DoD context. ................... 1 1.2.2 Develop sophisticated whole-system static analyses to detect malicious Android applications
33 CFR 183.580 - Static pressure test for fuel tanks.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Static pressure test for fuel... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Fuel Systems Tests § 183.580 Static pressure test for fuel tanks. A fuel tank is tested by performing the following procedures in the following...
33 CFR 183.580 - Static pressure test for fuel tanks.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Static pressure test for fuel... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Fuel Systems Tests § 183.580 Static pressure test for fuel tanks. A fuel tank is tested by performing the following procedures in the following...
33 CFR 183.580 - Static pressure test for fuel tanks.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Static pressure test for fuel... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Fuel Systems Tests § 183.580 Static pressure test for fuel tanks. A fuel tank is tested by performing the following procedures in the following...
33 CFR 183.580 - Static pressure test for fuel tanks.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Static pressure test for fuel... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Fuel Systems Tests § 183.580 Static pressure test for fuel tanks. A fuel tank is tested by performing the following procedures in the following...
33 CFR 183.580 - Static pressure test for fuel tanks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Static pressure test for fuel... SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Fuel Systems Tests § 183.580 Static pressure test for fuel tanks. A fuel tank is tested by performing the following procedures in the following...
Shape-based human detection for threat assessment
NASA Astrophysics Data System (ADS)
Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.
2004-07-01
Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.
An Overview of ANN Application in the Power Industry
NASA Technical Reports Server (NTRS)
Niebur, D.
1995-01-01
The paper presents a survey on the development and experience with artificial neural net (ANN) applications for electric power systems, with emphasis on operational systems. The organization and constraints of electric utilities are reviewed, motivations for investigating ANN are identified, and a current assessment is given from the experience of 2400 projects using ANN for load forecasting, alarm processing, fault detection, component fault diagnosis, static and dynamic security analysis, system planning, and operation planning.
Dynamic security contingency screening and ranking using neural networks.
Mansour, Y; Vaahedi, E; El-Sharkawi, M A
1997-01-01
This paper summarizes BC Hydro's experience in applying neural networks to dynamic security contingency screening and ranking. The idea is to use the information on the prevailing operating condition and directly provide contingency screening and ranking using a trained neural network. To train the two neural networks for the large scale systems of BC Hydro and Hydro Quebec, in total 1691 detailed transient stability simulation were conducted, 1158 for BC Hydro system and 533 for the Hydro Quebec system. The simulation program was equipped with the energy margin calculation module (second kick) to measure the energy margin in each run. The first set of results showed poor performance for the neural networks in assessing the dynamic security. However a number of corrective measures improved the results significantly. These corrective measures included: 1) the effectiveness of output; 2) the number of outputs; 3) the type of features (static versus dynamic); 4) the number of features; 5) system partitioning; and 6) the ratio of training samples to features. The final results obtained using the large scale systems of BC Hydro and Hydro Quebec demonstrates a good potential for neural network in dynamic security assessment contingency screening and ranking.
Security system signal supervision
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chritton, M.R.; Matter, J.C.
1991-09-01
This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.
A Dynamic Framework for Water Security
NASA Astrophysics Data System (ADS)
Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu
2017-04-01
Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.
Automated Support for Rapid Coordination of Joint UUV Operation
2015-03-01
automata , dead-reckoning, static plan, nmtime plan, rapid deployment, GPS 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...STATE MACHINES, MOORE AUTOMATA ..........................................9 A. MOORE AUTOMATA ...9 B. UUV PLANS AS MOORE AUTOMATA ...................................................11 C. SAMPLING RATE
Detection Of Malware Collusion With Static Dependence Analysis On Inter-App Communication
2016-12-08
DETECTION OF MALWARE COLLUSION WITH STATIC DEPENDENCE ANALYSIS ON INTER-APP COMMUNICATION VIRGINIA TECH DECEMBER 2016 FINAL TECHNICAL REPORT... DEPENDENCE ANALYSIS ON INTER-APP COMMUNICATION 5a. CONTRACT NUMBER FA8750-15-2-0076 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 61101E 6. AUTHOR(S...exploited. 15. SUBJECT TERMS Malware Collusion; Inter-App Communication; Static Dependence Analysis 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF
46 CFR 111.01-19 - Inclination of the vessel.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Inclination of the vessel. 111.01-19 Section 111.01-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS...) 15 degrees static list, 22.5 degrees dynamic roll; and (2) 7.5 degrees static trim. (b) All emergency...
Security, protection, and control of power systems with large-scale wind power penetration
NASA Astrophysics Data System (ADS)
Acharya, Naresh
As the number of wind generation facilities in the utility system is fast increasing, many issues associated with their integration into the power system are beginning to emerge. Of the various issues, this dissertation deals with the development of new concepts and computational methods to handle the transmission issues and voltage issues caused by large-scale integration of wind turbines. This dissertation also formulates a probabilistic framework for the steady-state security assessment of wind power incorporating the forecast uncertainty and correlation. Transmission issues are mainly related to the overloading of transmission lines, when all the wind power generated cannot be delivered in full due to prior outage conditions. To deal with this problem, a method to curtail the wind turbine outputs through Energy Management System facilities in the on-line operational environment is proposed. The proposed method, which is based on linear optimization, sends the calculated control signals via the Supervisory Control and Data Acquisition system to wind farm controllers. The necessary ramping of the wind farm outputs is implemented either by the appropriate blade pitch angle control at the turbine level or by switching a certain number of turbines. The curtailment strategy is tested with an equivalent system model of MidAmerican Energy Company. The results show that the line overload in high wind areas can be alleviated by controlling the outputs of the wind farms step-by-step over an allowable period of time. A low voltage event during a system fault can cause a large number of wind turbines to trip, depending on voltages at the wind turbine terminals during the fault and the under-voltage protection setting of wind turbines. As a result, an N-1 contingency may evolve into an N-(K+1) contingency, where K is the number of wind farms tripped due to low voltage conditions. Losing a large amount of wind power following a line contingency might lead to system instabilities. It is important for the system operator to be aware of such limiting events during system operation and be prepared to take proper control actions. This can be achieved by incorporating the wind farm tripping status for each contingency as part of the static security assessment. A methodology to calculate voltages at the wind farm buses during a worst case line fault is proposed, which, along with the protection settings of wind turbines, can be used to determine the tripping of wind farms. The proposed algorithm is implemented in MATLAB and tested with MidAmerican Energy reduced network. The result shows that a large amount of wind capacity can be tripped due to a fault in the lines. Therefore, the technique will find its application in the static security assessment where each line fault can be associated with the tripping of wind farms as determined from the proposed method. A probabilistic framework to handle the uncertainty in day-ahead forecast error in order to correctly assess the steady-state security of the power system is presented. Stochastic simulations are conducted by means of Latin hypercube sampling along with the consideration of correlations. The correlation is calculated from the historical distribution of wind power forecast errors. The results from the deterministic simulation based on point forecast and the stochastic simulation show that security assessment based solely on deterministic simulations can lead to incorrect assessment of system security. With stochastic simulations, each outcome can be assigned a probability and the decision regarding control actions can be made based on the associated probability.
Finding the ’RITE’ Acquisition Environment for Navy C2 Software
2015-05-01
Boiler plate contract language - Gov purpose Rights • Adding expectation of quality to contracting language • Template SOW’s created Pr...Debugger MCCABE IQ Static Analysis Cyclomatic Complexity and KSLOC. All Languages HP Fortify Security Scan STIG and Vulnerabilities Security & IA...GSSAT (GOTS) Security Scan STIG and Vulnerabilities AutoIT Automated Test Scripting Engine for Automation Functional Testing TestComplete Automated
Location Management in Distributed Mobile Environments
1994-09-01
carried out to evaluate the performanceof di erent static strategies for various communica-tion and mobility patterns. Simulation results indi-cate...results ofsimulations carried out to evaluate the performanceof proposed static location management strategies forvarious call and mobility patterns...Systems, Austin, Sept. 1994. U.S. Government or Federal Rights License 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17
Static Dissipative Cable Ties, Such as for Radiation Belt Storm Probes
NASA Technical Reports Server (NTRS)
Langley, Patrick T. (Inventor); Siddique, Fazle E. (Inventor)
2013-01-01
Methods of cyclically heating and cooling an article formed of a static dissipative ETFE resin, such as to reduce an electrical resistivity and/or to increase a tensile strength of the article, and methods of irradiating an article formed of a static dissipative ETFE resin, such as to increase a tensile strength of the article. Also disclosed herein are articles formed of a static dissipative ETFE resin, and processed in accordance with methods disclosed herein. Such an article may include, for example and without limitation, a cable strap to wrap, support, and/or secure one or more wires or cables, such as a cable tie.
Static Dissipative Cable Ties, Such as for Radiation Belt Storm Probes
NASA Technical Reports Server (NTRS)
Langley, Patrick T. (Inventor); Siddique, Fazle E. (Inventor)
2015-01-01
An article, such as, but not limited to, a cable strap to wrap, support, or secure one or more wires or cables, is formed by cyclically heating and cooling and/or irradiating an article formed of a static dissipative ethylene tetrafluoroethylen (ETFE) resin, to reduce an electrical resistivity and/or to increase a tensile strength of the article.
NASA Astrophysics Data System (ADS)
Salloum, Ahmed
Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models. Various scenarios were investigated to capture and compare between the impacts of base-case and post-contingency relaxations on real-time system performance, including the presence of both relaxations simultaneously. The effect of penalty prices on the number and magnitude of relaxations was investigated as well.
AC Current Driven Dynamic Vortex State in YBa2Cu3O7-x (Postprint)
2012-02-01
coexisting steady states of driven vortex motion with different characteristics: a quasi-static disordered glassy state in the sample interior and a...coexisting, vortex, plastic, dynamic, calculations, disordered , hysteretic, model, films, edges 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...characteris- tics: a quasi-static disordered glassy state in the sample interior and a dynamic state of plastic motion near the edges. Finite- element
Design and implementation of a secure workflow system based on PKI/PMI
NASA Astrophysics Data System (ADS)
Yan, Kai; Jiang, Chao-hui
2013-03-01
As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.
NASA Astrophysics Data System (ADS)
Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni
2013-04-01
Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).
Certified In-lined Reference Monitoring on .NET
2006-06-01
Introduction Language -based approaches to computer security have employed two major strategies for enforcing security policies over untrusted programs. • Low...automatically verify IRM’s using a static type-checker. Mobile (MOnitorable BIL with Effects) is an exten- sion of BIL (Baby Intermediate Language ) [15], a...AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES Proceedings of the 2006 Programming Languages and
2017-03-01
FINAL REPORT Demonstration of Energy Savings in Commercial Buildings for Tiered Trim and Respond Method in Resetting Static Pressure for VAV...release Page Intentionally Left Blank This report was prepared under contract to the Department of Defense Environmental Security Technology...Certification Program (ESTCP). The publication of this report does not indicate endorsement by the Department of Defense, nor should the contents be
Kim, Bo-Ram; Chow, Sy-Miin; Bray, Bethany; Teti, Douglas M.
2017-01-01
The present study examined observations of parenting quality (mothers' emotional availability - EA) during infant bedtimes at 4 points across the infants' first year, assessing relations between levels and trajectories of emotional availability and infant attachment at 12 months and the role of infant temperament in moderating these associations. The sample (N = 128) was predominantly Euro-American (82.5%) and at low socioeconomic risk. Latent growth curve modeling with latent basis coefficients indicated substantial individual differences in initial levels and slopes in EA trajectories across the first year. Both levels of maternal EA and EA trajectories across the first year predicted 12-month infant attachment security. Although maternal EA tended to decrease across the first year in the full sample, EA trajectories that showed a “bounce-back” between 6 and 12 months, suggesting more successful maternal adaptation to an expanding infant developmental repertoire, predicted greater infant security at 12 months. In addition, linkages between latent EA trajectories and 12-month attachment were moderated by 3-month infant temperamental reactivity and regulation. These findings indicate that infant attachment security is sensitive to both static and dynamic aspects of parenting quality across the first year, and that infant temperament can interact with both in predicting infant attachment. PMID:27852132
Kim, Bo-Ram; Chow, Sy-Miin; Bray, Bethany; Teti, Douglas M
2017-02-01
The present study examined observations of parenting quality (mothers' emotional availability - EA) during infant bedtimes at 4 points across the infants' first year, assessing relations between levels and trajectories of EA and infant attachment at 12 months and the role of infant temperament in moderating these associations. The sample (N = 128) was predominantly Euro-American (82.5%) and at low socioeconomic risk. Latent growth curve modeling with latent basis coefficients indicated substantial individual differences in initial levels and slopes in EA trajectories across the first year. Both levels of maternal EA and EA trajectories across the first year predicted 12-month infant attachment security. Although maternal EA tended to decrease across the first year in the full sample, EA trajectories that showed a "bounce-back" between 6 and 12 months, suggesting more successful maternal adaptation to an expanding infant developmental repertoire, predicted greater infant security at 12 months. In addition, linkages between latent EA trajectories and 12-month attachment were moderated by 3-month infant temperamental reactivity and regulation. These findings indicate that infant attachment security is sensitive to both static and dynamic aspects of parenting quality across the first year, and that infant temperament can interact with both in predicting infant attachment.
Dynamic Response of Reinforced Soil Systems. Volume 1. Report
1993-03-01
include Security Clas~sification) DYNAMIC RWSPC!SE OF REIFý1Cý SOIL SYSTEM~, VCTJI4E I OF II: PREPO~r . PERSONAL AUTHOR($) BMW3U, R.C.; FRAWASZY...protected by a burster slab. These protection measures are costly, time consuming to construct, and sensitive to multiple strikes. Soil has been used to...characterize the static load-deflection behavior of the reinforced soil. Dynamic pullout tests were then performed using the same parameters as the static
Assessment of Marine Coatings at a Central California Static Immersion Test Site
2016-10-27
VA 220600-6218 RE: Contract Number N00014-15-1-2321 Assessment of Marine Coatings at a Central California Static Immersion Test Site Principal...Technical Report 05/01/2015 - 07/29/2016 Assessment of Marine Coatings at a Central California Static Immersion Test Site Dean E. Wendt Cal Poly...to test the relationships between the recruitment of fouling organisms to intersite panels and water quality parameters. The static immersion site
Security Analysis of Session Initiation Protocol
2010-06-01
traffic as Bob@biloxi.com), a VPN was established with OpenVPN 2.1_rc19 between all relevant entities. Configuration files used by the clients and...static key is created by running the command ’ openvpn --genkey --secret static.key.’ By 22 rerouting all SIP traffic through VPNs as needed, a network... OpenVPN , and VM 2’s routing table is modified so that all IP packets except those addressed to VM 1’s publicly facing IP are routed through the OpenVPN
ERIC Educational Resources Information Center
Lofthouse, Rachael E.; Lindsay, William R.; Totsika, Vasiliki; Hastings, Richard P.; Boer, Douglas P.; Haaven, James L.
2013-01-01
Background: The purpose of the present study was to add to the literature on the predictive accuracy of a dynamic intellectual disability specific risk assessment tool. Method: A dynamic risk assessment for sexual reoffending (ARMIDILO-S), a static risk assessment for sexual offending (STATIC-99), and a static risk assessment for violence…
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
Test stand for Titan 34D SRM static firing
NASA Technical Reports Server (NTRS)
Glozman, Vladimir; Shipway, George
1988-01-01
An existing liquid engine test stand at the AF Astronautics Laboratory was refurbished and extensively modified to accommodate the static firing of the Titan 34D solid rocket motor (SRM) in the vertical nozzle down orientation. The main load restraint structure was designed and built to secure the SRM from lifting off during the firing. In addition, the structure provided weather protection, temperature conditioning of the SRM, and positioning of the measurement and recording equipment. The structure was also used for stacking/de-stacking of SRM segments and other technological processes. The existing stand, its foundation and anchorage were thoroughly examined and reanalyzed. Necessary stand modifications were carried out to comply with the requirements of the Titan 34D SRM static firing.
Open Source Software Projects Needing Security Investments
2015-06-19
modtls, BouncyCastle, gpg, otr, axolotl. 7. Static analyzers: Clang, Frama-C. 8. Nginx. 9. OpenVPN . It was noted that the funding model may be similar...to OpenSSL, where consulting funds the company. It was also noted that OpenVPN needs to correctly use OpenSSL in order to be secure, so focusing on...Dovecot 4. Other high-impact network services: OpenSSH, OpenVPN , BIND, ISC DHCP, University of Delaware NTPD 5. Core infrastructure data parsers
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Smithline, Howard A; Caglar, Selin; Blank, Fidela S J
2010-01-01
This study assessed the convergent validity of 2 dyspnea measures, the transition measure and the change measure, by comparing them with each other in patients admitted to the hospital with acute decompensated heart failure. Static measures of dyspnea were obtained at baseline (pre-static measure) and at time 1 hour and 4 hour (post-static measures). The change measure was calculated as the difference between the pre-static and post-static measures. Transition measures were obtained at time 1 hour and 4 hour. Visual analog scales and Likert scales were used. Both physicians and patients measured the dyspnea independently. A total of 112 patients had complete data sets at time 0 and 1 hour and 86 patients had complete data sets at all 3 time points. Correlations were calculated between the transition measures and static measures (pre-static, post-static, and change measure). Bland-Altman plots were generated and the mean difference and limits of agreement between the transition measures and the change measures were calculated. In general, short-term dyspnea assessment using transition measures and serial static measures can not be used to validate each other in this population of patients being admitted with acute decompensated heart failure. © 2010 Wiley Periodicals, Inc.
Assessment of current AASHTO LRFD methods for static pile capacity analysis in Rhode Island soils.
DOT National Transportation Integrated Search
2013-07-01
This report presents an assessment of current AASHTO LRFD methods for static pile capacity analysis in Rhode : Island soils. Current static capacity methods and associated resistance factors are based on pile load test data in sands : and clays. Some...
Utility of the Static-99 and Static-99R With Latino Sex Offenders.
Leguízamo, Alejandro; Lee, Seung C; Jeglic, Elizabeth L; Calkins, Cynthia
2017-12-01
The predictive validity of the Static-99 measures with ethnic minorities in the United States has only recently been assessed with mixed results. We assessed the predictive validity of the Static-99 and Static-99R with a sample of Latino sex offenders ( N = 483) as well as with two subsamples (U.S.-born, including Puerto Rico, and non-U.S.-born). The overall sexual recidivism rate was very low (1.9%). Both the Static-99 measures were able to predict sexual recidivism for offenders born in the United States and Puerto Rico, but neither was effective in doing so for other Latino immigrants. Calibration analyses ( N = 303) of the Static-99R were consistent with the literature and provided support for the potential use of the measure with Latinos born in the United States and Puerto Rico. These findings and their implications are discussed as they pertain to the assessment of Latino sex offenders.
Dynamic assessment of word learning skills of pre-school children with primary language impairment.
Camilleri, Bernard; Law, James
2014-10-01
Dynamic assessment has been shown to have considerable theoretical and clinical significance in the assessment of socially disadvantaged and culturally and linguistically diverse children. In this study it is used to enhance assessment of pre-school children with primary language impairment. The purpose of the study was to determine whether a dynamic assessment (DA) has the potential to enhance the predictive capacity of a static measure of receptive vocabulary in pre-school children. Forty pre-school children were assessed using the static British Picture Vocabulary Scale (BPVS), a DA of word learning potential and an assessment of non-verbal cognitive ability. Thirty-seven children were followed up 6 months later and re-assessed using the BPVS. Although the predictive capacity of the static measure was found to be substantial, the DA increased this significantly especially for children with static scores below the 25th centile. The DA of children's word learning has the potential to add value to the static assessment of the child with low language skills, to predict subsequent receptive vocabulary skills and to increase the chance of correctly identifying children in need of ongoing support.
2016-03-01
constraints problem. Game rules described valid moves allowing player to generate a memory graph performing improved C program verification . 15. SUBJECT...TERMS Formal Verification , Static Analysis, Abstract Interpretation, Pointer Analysis, Fixpoint Iteration 16. SECURITY CLASSIFICATION OF: 17...36 3.4.12 Example: Game Play . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 3.4.13 Verification
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
ERIC Educational Resources Information Center
Ehresman, Paul
1995-01-01
A precane device, called the "free-standing cane," was developed to help children with blindness along with other disabilities. The cane detects obstacles; guides the user's hands into a relaxed, static position in front of the hips; facilitates postural security and control; and offers tactile and kinesthetic feedback. (JDD)
46 CFR 62.25-30 - Environmental design standards.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., and shutdown. (b) Low voltage electronics must be designed with due consideration for static discharge...-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION General Requirements for All Automated Vital Systems § 62.25-30 Environmental design standards. (a...
46 CFR 62.25-30 - Environmental design standards.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., and shutdown. (b) Low voltage electronics must be designed with due consideration for static discharge...-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION General Requirements for All Automated Vital Systems § 62.25-30 Environmental design standards. (a...
46 CFR 62.25-30 - Environmental design standards.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., and shutdown. (b) Low voltage electronics must be designed with due consideration for static discharge...-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION General Requirements for All Automated Vital Systems § 62.25-30 Environmental design standards. (a...
46 CFR 62.25-30 - Environmental design standards.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., and shutdown. (b) Low voltage electronics must be designed with due consideration for static discharge...-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION General Requirements for All Automated Vital Systems § 62.25-30 Environmental design standards. (a...
Helix Project Testbed - Towards the Self-Regenerative Incorruptible Enterprise
2011-09-14
hardware implementation with a microkernel in a way that allows information flow properties of the entire construction to be statically verified all the way...secure architectural skeleton. This skeleton couples a critical slice of the low level hardware implementation with a microkernel in a way that
46 CFR 108.239 - Fuel transfer equipment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Fuel transfer equipment. 108.239 Section 108.239 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN... static grounding device. (d) Each electric fuel transfer pump must have a control with a fuel transfer...
29 CFR 1917.114 - Cargo doors.
Code of Federal Regulations, 2010 CFR
2010-07-01
... counterweights shall be guarded. (2) Lift trucks and cranes shall not be used to move mechanically operated doors.... (1) The door shall be connected to its lifting tackle with shackles or equally secure means. (2) Lifting bridles and tackles shall have a safety factor of five, based upon maximum anticipated static...
46 CFR 154.460 - Design criteria.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 5 2012-10-01 2012-10-01 false Design criteria. 154.460 Section 154.460 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Secondary Barrier § 154.460 Design criteria. At static...
46 CFR 154.460 - Design criteria.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Design criteria. 154.460 Section 154.460 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Secondary Barrier § 154.460 Design criteria. At static...
46 CFR 154.460 - Design criteria.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 5 2013-10-01 2013-10-01 false Design criteria. 154.460 Section 154.460 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Secondary Barrier § 154.460 Design criteria. At static...
Type-Based Access Control in Data-Centric Systems
NASA Astrophysics Data System (ADS)
Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio
Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.
The marginal cost of public funds with an aging population.
Wildasin, D E
1991-05-01
"As populations in the United States and other advanced economies grow older, the burden of social security and health care financing is expected to rise markedly. Payroll, income, and other taxes on working populations are projected to rise accordingly. The marginal welfare cost to workers of social security and other public expenditures is analyzed within the context of a two-period life cycle model. By relaxing separability assumptions that have become common in the literature, the theoretical structure properly incorporates the effect of these public expenditures on labor supply. Comparative statics results indicate that changing age structure is likely to raise the marginal welfare to workers of social security, education, and other public expenditures. Illustrative calculations for the United States confirm this result, suggesting that the cost to workers of incremental social security benefits may easily double by 2025-2050." excerpt
Smallbone, Stephen; Rallings, Mark
2013-06-01
Actuarial risk assessment (Static-99 and Static-99-R) scores were obtained for 399 Australian adult sexual offenders who were subsequently released from prison and followed up with searches of police arrest records (mean follow-up period = 29 months; range = 15-53 months). Indigenous offenders (n = 67; 16.8%) scored significantly higher on both the Static-99 (M = 4.04 vs. 2.89, p < .001) and Static-99-R (M = 3.72 vs. 2.22, p < .001), were more than twice as likely to be arrested for sexual offenses (9.0% vs. 4.1%, ns), and were significantly more likely to be arrested for nonsexual violent (28.4% vs. 1.9%, p < .001), any violent (including sexual; 37% vs. 5.9%, p < .001), and any offenses (58.2% vs. 21.6%, p < .001). For the combined groups, predictive accuracy of both instruments was comparable to results reported elsewhere. Predictive accuracy of the Static-99 was similar for indigenous and nonindigenous offenders. The Static-99-R was only marginally predictive of any violent recidivism (AUC = .65, 95% CI = [.52, .79]), and did not predict sexual (AUC = .61, 95% CI = [.45, .77]) or nonsexual violent recidivism (AUC = .65, 95% CI = [.48, .78]), for indigenous offenders. Higher risk scores, indigenous race, and unsupervised release all contributed unique variance to any violent recidivism. Results suggest that the Static-99 may be appropriate for assessing Australian indigenous sexual offenders, but more research is needed to test the validity of the Static-99-R for this population. We conclude that practitioners should consider the potential effects of racial differences and postrelease factors, as well as static risk factors, in their assessments.
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
Dynamic drought risk assessment using crop model and remote sensing techniques
NASA Astrophysics Data System (ADS)
Sun, H.; Su, Z.; Lv, J.; Li, L.; Wang, Y.
2017-02-01
Drought risk assessment is of great significance to reduce the loss of agricultural drought and ensure food security. The normally drought risk assessment method is to evaluate its exposure to the hazard and the vulnerability to extended periods of water shortage for a specific region, which is a static evaluation method. The Dynamic Drought Risk Assessment (DDRA) is to estimate the drought risk according to the crop growth and water stress conditions in real time. In this study, a DDRA method using crop model and remote sensing techniques was proposed. The crop model we employed is DeNitrification and DeComposition (DNDC) model. The drought risk was quantified by the yield losses predicted by the crop model in a scenario-based method. The crop model was re-calibrated to improve the performance by the Leaf Area Index (LAI) retrieved from MODerate Resolution Imaging Spectroradiometer (MODIS) data. And the in-situ station-based crop model was extended to assess the regional drought risk by integrating crop planted mapping. The crop planted area was extracted with extended CPPI method from MODIS data. This study was implemented and validated on maize crop in Liaoning province, China.
Artificial Diversity and Defense Security (ADDSec) Final Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.; Hamlet, Jason; Stout, William M.S.
Critical infrastructure systems continue to foster predictable communication patterns and static configurations over extended periods of time. The static nature of these systems eases the process of gathering reconnaissance information that can be used to design, develop, and launch attacks by adversaries. In this research effort, the early phases of an attack vector will be disrupted by randomizing application port numbers, IP addresses, and communication paths dynamically through the use of overlay networks within Industrial Control Systems (ICS). These protective measures convert static systems into "moving targets," adding an additional layer of defense. Additionally, we have developed a framework thatmore » automatically detects and defends against threats within these systems using an ensemble of machine learning algorithms that classify and categorize abnormal behavior. Our proof-of-concept has been demonstrated within a representative ICS environment. Performance metrics of our proof-of-concept have been captured with latency impacts of less than a millisecond, on average.« less
DHS S&T First Responders Group and NATO Counter UAS Proposal Interest Response.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Salton, Jonathan R.
The capability, speed, size, and widespread availability of small unmanned aerial systems (sUAS) makes them a serious security concern. The enabling technologies for sUAS are rapidly evolving and so too are the threats they pose to national security. Potential threat vehicles have a small cross-section, and are difficult to reliably detect using purely ground-based systems (e.g. radar or electro-optical) and challenging to target using conventional anti-aircraft defenses. Ground-based sensors are static and suffer from interference with the earth, vegetation and other man-made structures which obscure objects at low altitudes. Because of these challenges, sUAS pose a unique and rapidly evolvingmore » threat to national security.« less
Scholz, Timo; Zech, Astrid; Wegscheider, Karl; Lezius, Susanne; Braumann, Klaus-Michael; Sehner, Susanne; Hollander, Karsten
2017-09-01
Measurement of the medial longitudinal foot arch in children is a controversial topic, as there are many different methods without a definite standard procedure. The purpose of this study was to 1) investigate intraday and interrater reliability regarding dynamic arch index and static arch height, 2) explore the correlation between both arch indices, and 3) examine the variation of the medial longitudinal arch at two different times of the day. Eighty-six children (mean ± SD age, 8.9 ± 1.9 years) participated in the study. Dynamic footprint data were captured with a pedobarographic platform. For static arch measurements, a specially constructed caliper was used to assess heel-to-toe length and dorsum height. A mixed model was established to determine reliability and variation. Reliability was found to be excellent for the static arch height index in sitting (intraday, 0.90; interrater, 0.80) and standing positions (0.88 and 0.85) and for the dynamic arch index (both 1.00). There was poor correlation between static and dynamic assessment of the medial longitudinal arch (standing dynamic arch index, r = -0.138; sitting dynamic arch index, r = -0.070). Static measurements were found to be significantly influenced by the time of day (P < .001), whereas the dynamic arch index was unchanged (P = .845). This study revealed some further important findings. The static arch height index is influenced by gender (P = .004), whereas dynamic arch index is influenced by side (P = .011) and body mass index (P < .001). Dynamic and static foot measurements are reliable for medial longitudinal foot arch assessment in children. The variation of static arch measurements during the day has to be kept in mind. For clinical purposes, static and dynamic arch data should be interpreted separately.
Modern strategy for operational excellence: building agile and adaptive organizations.
Gerwitz, Raymond J
2016-10-01
Healthcare security leaders who serve in an industry built on traditional and static protection and response protocols must become more agile and adaptive in planning and responding to evolving threat and risk profiles, the author states. In this article, he tells how to use operational excellence to continuously improve performance.
NASA Astrophysics Data System (ADS)
Hakim, Lukmanul; Kubokawa, Junji; Yorino, Naoto; Zoka, Yoshifumi; Sasaki, Yutaka
Advancements have been made towards inclusion of both static and dynamic security into transfer capability calculation. However, to the authors' knowledge, work on considering corrective controls into the calculation has not been reported yet. Therefore, we propose a Total Transfer Capability (TTC) assessment considering transient stability corrective controls. The method is based on the Newton interior point method for nonlinear programming and transfer capability is approached as a maximization of power transfer with both static and transient stability constraints are incorporated into our Transient Stability Constrained Optimal Power Flow (TSCOPF) formulation. An interconnected power system is simulated to be subjected to a severe unbalanced 3-phase 4-line to ground fault and following the fault, generator and load are shed in a pre-defined sequence to mimic actual corrective controls. In a deregulated electricity market, both generator companies and large load customers are encouraged to actively participate in maintaining power system stability as corrective controls upon agreement of compensation for being shed following a disturbance. Implementation of this proposal on the actual power system operation should be carried out through combining it with the existing transient stabilization controller system. Utilization of these corrective controls results in increasing TTC as suggested in our numerical simulation. As Lagrange multipliers can also describe sensitivity of both inequality and equality constraints to the objective function, then selection of which generator or load to be shed can be carried out on the basis of values of Lagrange multipliers of its respective generator's rotor angle stability and active power balance equation. Hence, the proposal in this paper can be utilized by system operator to assess the maximum TTC for specific loads and network conditions.
Relative effects of posture and activity on human height estimation from surveillance footage.
Ramstrand, Nerrolyn; Ramstrand, Simon; Brolund, Per; Norell, Kristin; Bergström, Peter
2011-10-10
Height estimations based on security camera footage are often requested by law enforcement authorities. While valid and reliable techniques have been established to determine vertical distances from video frames, there is a discrepancy between a person's true static height and their height as measured when assuming different postures or when in motion (e.g., walking). The aim of the research presented in this report was to accurately record the height of subjects as they performed a variety of activities typically observed in security camera footage and compare results to height recorded using a standard height measuring device. Forty-six able bodied adults participated in this study and were recorded using a 3D motion analysis system while performing eight different tasks. Height measurements captured using the 3D motion analysis system were compared to static height measurements in order to determine relative differences. It is anticipated that results presented in this report can be used by forensic image analysis experts as a basis for correcting height estimations of people captured on surveillance footage. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Research on key technologies of data processing in internet of things
NASA Astrophysics Data System (ADS)
Zhu, Yangqing; Liang, Peiying
2017-08-01
The data of Internet of things (IOT) has the characteristics of polymorphism, heterogeneous, large amount and processing real-time. The traditional structured and static batch processing method has not met the requirements of data processing of IOT. This paper studied a middleware that can integrate heterogeneous data of IOT, and integrated different data formats into a unified format. Designed a data processing model of IOT based on the Storm flow calculation architecture, integrated the existing Internet security technology to build the Internet security system of IOT data processing, which provided reference for the efficient transmission and processing of IOT data.
Azarpaikan, Atefeh; Taheri Torbati, Hamidreza
2017-10-23
The aim of this study was to assess the effectiveness of balance training with somatosensory and neurofeedback training on dynamic and static balance in healthy, elderly adults. The sample group consisted of 45 healthy adults randomly assigned to one of the three test groups: somatosensory, neurofeedback, and a control. Individualization of the balance program started with pre-tests for static and dynamic balances. Each group had 15- and 30-min training sessions. All groups were tested for static (postural stability) and dynamic balances (Berg Balance Scale) in acquisition and transfer tests (fall risk of stability and timed up and go). Improvements in static and dynamic balances were assessed by somatosensory and neurofeedback groups and then compared with the control group. Results indicated significant improvements in static and dynamic balances in both test groups in the acquisition test. Results revealed a significant improvement in the transfer test in the neurofeedback and somatosensory groups, in static and dynamic conditions, respectively. The findings suggest that these methods of balance training had a significant influence on balance. Both the methods are appropriate to prevent falling in adults. Neurofeedback training helped the participants to learn static balance, while somatosensory training was effective on dynamic balance learning. Further research is needed to assess the effects of longer and discontinuous stimulation with somatosensory and neurofeedback training on balance in elderly adults.
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
2008-02-14
g. Material. 5.1.7 Wheel Geometry. a. Camber angle. b. Caster angle. c. Pivot angle. d. Static toe-in. e. Turning angles...the vehicle characteristics to be obtained during testing of wheeled and tracked vehicles and their components. Physical characterization of test...frontal area Characteristic data sheet Power train Suspention Wheel geometry Vehicle clearance angles Armament Gun control systems 16. SECURITY
MONTAGE: A Methodology for Designing Composable End-to-End Secure Distributed Systems
2012-08-01
83 7.6 Formal Model of Loc Separation . . . . . . . . . . . . . . . . . . . . . . . . . 84 7.6.1 Static Partitions...Next, we derive five requirements (called Loc Separation, Implicit Parameter Separation, Error Signaling Separation, Conf Separation, and Next Call...hypervisors and hardware) and a real cloud (with shared hypervisors and hardware) that satisfies these requirements. Finally we study Loc Separation
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... must successfully complete a security threat assessment or comparable security threat assessment...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
Atmospheric stability analysis over statically and dynamically rough surfaces
NASA Astrophysics Data System (ADS)
Maric, Emina; Metzger, Meredith; Singha, Arindam; Sadr, Reza
2011-11-01
The ratio of buoyancy flux to turbulent kinetic energy production in the atmospheric surface layer is investigated experimentally for air flow over two types of surfaces characterized by static and dynamic roughness. In this study, ``static'' refers to the time-invariant nature of naturally-occurring roughness over a mud/salt playa; while, ``dynamic'' refers to the behavior of water waves along an air-water interface. In both cases, time-resolved measurements of the momentum and heat fluxes were acquired from synchronized 3D sonic anemometers mounted on a vertical tower. Field campaigns were conducted at two sites, representing the ``statically'' and ``dynamically'' rough surfaces, respectively: (1) the SLTEST facility in Utah's western desert, and (2) the new Doha airport in Qatar under construction along the coast of the Persian Gulf. Note, at site 2, anemometers were located directly above the water by extension from a tower secured to the end of a 1 km-long pier. Comparisons of the Monin-Obukhov length, flux Richardson number, and gradient Richardson number are presented, and discussed in the context of the observed evolution of the turbulent spectra in response to diurnal variations of atmospheric stability. Supported by the Qatar National Research Fund.
Dynamic XRD, Shock and Static Compression of CaF2
NASA Astrophysics Data System (ADS)
Kalita, Patricia; Specht, Paul; Root, Seth; Sinclair, Nicholas; Schuman, Adam; White, Melanie; Cornelius, Andrew; Smith, Jesse; Sinogeikin, Stanislav
2017-06-01
The high-pressure behavior of CaF2 is probed with x-ray diffraction (XRD) combined with both dynamic compression, using a two-stage light gas gun, and static compression, using diamond anvil cells. We use XRD to follow the unfolding of a shock-driven, fluorite to cotunnite phase transition, on the timescale of nanoseconds. The dynamic behavior of CaF2 under shock loading is contrasted with that under static compression. This work leverages experimental capabilities at the Advanced Photon Source: dynamic XRD and shock experiments at the Dynamic Compression Sector, as well as XRD and static compression in diamond anvil cell at the High-Pressure Collaborative Access Team. These experiments and cross-platform comparisons, open the door to an unprecedented understanding of equations of state and phase transitions at the microstructural level and at different time scales and will ultimately improve our capability to simulate the behavior of materials at extreme conditions. Sandia National Laboratories is a multi-mission laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
Balance Performance Is Task Specific in Older Adults.
Dunsky, Ayelet; Zeev, Aviva; Netz, Yael
2017-01-01
Balance ability among the elderly is a key component in the activities of daily living and is divided into two types: static and dynamic. For clinicians who wish to assess the risk of falling among their elderly patients, it is unclear if more than one type of balance test can be used to measure their balance impairment. In this study, we examined the association between static balance measures and two dynamic balance field tests. One hundred and twelve community-dwelling older adults (mean age 74.6) participated in the study. They underwent the Tetrax static postural assessment and then performed the Timed Up and Go (TUG) and the Functional Reach (FR) Test as dynamic balance tests. In general, low-moderate correlations were found between the two types of balance tests. For women, age and static balance parameters explained 28.1-40.4% of the variance of TUG scores and 14.6-24% of the variance of FR scores. For men, age and static balance parameters explained 9.5-31.2% of the variance of TUG scores and 23.9-41.7% of the variance of FR scores. Based on our findings, it is suggested that a combination of both static and dynamic tests be used for assessing postural balance ability.
Seethaler, Pamela M.; Fuchs, Lynn S.; Fuchs, Douglas; Compton, Donald L.
2015-01-01
The purpose of this study was to assess the added value of dynamic assessment (DA) beyond more conventional static measures for predicting individual differences in year-end 1st-grade calculation (CA) and word-problem (WP) performance, as a function of limited English proficiency (LEP) status. At the start of 1st grade, students (129 LEP; 163 non-LEP) were assessed on a brief static mathematics test, an extended static mathematics test, static tests of domain-general abilities associated with CAs and WPs (vocabulary; reasoning), and DA. Near end of 1st grade, they were assessed on CA and WP. Regression analyses indicated that the value of the predictor depends on the predicted outcome and LEP status. In predicting CAs, the extended mathematics test and DA uniquely explained variance for LEP children, with stronger predictive value for the extended mathematics test; for non-LEP children, the extended mathematics test was the only significant predictor. However, in predicting WPs, only DA and vocabulary were uniquely predictive for LEP children, with stronger value for DA; for non-LEP children, the extended mathematics test and DA were comparably uniquely predictive. Neither the brief static mathematics test nor reasoning was significant in predicting either outcome. The potential value of a gated screening process, using an extended mathematics assessment to predict CAs and using DA to predict WPs, is discussed. PMID:26523068
Static innominate asymmetry and leg length discrepancy in asymptomatic collegiate athletes.
Krawiec, C J; Denegar, C R; Hertel, J; Salvaterra, G F; Buckley, W E
2003-11-01
The objectives of the study were to assess: (1) static innominate asymmetry in the sagittal plane, (2) leg length discrepancy (LLD), and (3) the relationship between static innominate rotation and LLD in asymptomatic collegiate athletes. The study was an observational study by design which took place in a University athletic training research laboratory. The participants were twenty-four male and 20 female asymptomatic intercollegiate athletes who volunteered to take part in the study. Static innominate asymmetry was assessed with a caliper/inclinometer tool and LLD was measured with a tape measure using standard clinical methods. Results showed that forty-two subjects (95%) demonstrated some degree of static innominate asymmetry. In 32 subjects (73%), the right innominate was more anteriorly rotated than the left. Nearly all subjects were determined to have unequal leg lengths with a majority, 30 subjects (68%), showing a slightly longer left leg. Weak correlations (r=0.33 - 0.44) were identified between static innominate asymmetry and LLD. In Conclusion static innominate asymmetry and LLD are common among asymptomatic collegiate athletes. This information provides clinicians with normative data of common clinical measures in a physically active population.
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.
Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun
2018-03-15
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information
Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun
2018-01-01
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773
Leland, Azadeh; Tavakol, Kamran; Scholten, Joel; Bakhshi, Simin; Kelarestaghi, Kaveh
2018-04-01
Traditionally, the diagnosis of postural instability relies on the clinical examination of static balance. In recent years, computerized technologies have provided a new approach for the accurate detection of positional changes during functional balance. The aim of this study was to investigate the similarities and differences between two electronic systems, NeuroCom and BioSensics , and their application in the clinical assessment of impaired balance in American veterans. We examined the sway around the center of mass during static balance conditions in 25 veterans with mild traumatic brain injury, using the two electronic systems. These patients met the inclusion criteria and were assessed for their impaired balance at the District of Columbia Veterans Affair Medical Center, Washington, DC, USA. There were six static balance tests conducted on either NeuroCom or BioSensics system in triplicate. Of the data for 36 sets of statistical data analyses, there were significant correlations among those for eight data sets (22.2%) between the two systems. The strongest positive correlation between the data from the two systems was found during the baseline test, when inputs from visual, vestibular and sensorymotor sources were uninterrupted. The data from the remaining experimental conditions did not correlate significantly with one another. Both NeuroCom and BioSensics provided comparable data in eight out of 36 experimental conditions in the assessment of static balance in patients with mild traumatic brain injury. The findings clarified the ambiguities in the application of NeuroCom versus BioSensics, provided new knowledge for the field of physical medicine and rehabilitation, and improved the clinical assessment of static balance in patients with mTBI.
Qualification of security printing features
NASA Astrophysics Data System (ADS)
Simske, Steven J.; Aronoff, Jason S.; Arnabat, Jordi
2006-02-01
This paper describes the statistical and hardware processes involved in qualifying two related printing features for their deployment in product (e.g. document and package) security. The first is a multi-colored tiling feature that can also be combined with microtext to provide additional forms of security protection. The color information is authenticated automatically with a variety of handheld, desktop and production scanners. The microtext is authenticated either following magnification or manually by a field inspector. The second security feature can also be tile-based. It involves the use of two inks that provide the same visual color, but differ in their transparency to infrared (IR) wavelengths. One of the inks is effectively transparent to IR wavelengths, allowing emitted IR light to pass through. The other ink is effectively opaque to IR wavelengths. These inks allow the printing of a seemingly uniform, or spot, color over a (truly) uniform IR emitting ink layer. The combination converts a uniform covert ink and a spot color to a variable data region capable of encoding identification sequences with high density. Also, it allows the extension of variable data printing for security to ostensibly static printed regions, affording greater security protection while meeting branding and marketing specifications.
Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.
Hirschfeld, Katherine
Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
49 CFR 1540.209 - Fees for security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...
Appraising the risk matrix 2000 static sex offender risk assessment tool.
Tully, Ruth J; Browne, Kevin D
2015-02-01
This critical appraisal explores the reliability and validity of the Risk Matrix 2000 static sex offender risk assessment tool that is widely used in the United Kingdom. The Risk Matrix 2000 has to some extent been empirically validated for use with adult male sex offenders; however, this review highlights that further research into the validity of this static tool with sex offender subgroups or types is necessary in order to improve practical utility. The Risk Matrix 2000 relies on static risk predictors, thus it is limited in scope. This article argues that the addition of dynamic items that have been shown to be predictive of sexual recidivism would further enhance the tool. The paper argues that adding dynamic risk items would fit better with a rehabilitative approach to sex offender risk management and assessment. This would also provide a means by which to effectively plan sex offender treatment and evaluate individual offenders' progress in treatment; however, difficulties remain in identifying and assessing dynamic risk factors of sexual offending and so further research is required. © The Author(s) 2013.
Relationship between static foot posture and foot mobility
2011-01-01
Background It is not uncommon for a person's foot posture and/or mobility to be assessed during a clinical examination. The exact relationship, however, between static posture and mobility is not known. Objective The purpose of this study was to determine the degree of association between static foot posture and mobility. Method The static foot posture and foot mobility of 203 healthy individuals was assessed and then analyzed to determine if low arched or "pronated" feet are more mobile than high arched or "supinated" feet. Results The study demonstrated that those individuals with a lower standing dorsal arch height and/or a wider standing midfoot width had greater mobility in their foot. In addition, those individuals with higher Foot Posture Index (FPI) values demonstrated greater mobility and those with lower FPI values demonstrated less mobility. Finally, the amount of foot mobility that an individual has can be predicted reasonably well using either a 3 or 4 variable linear regression model. Conclusions Because of the relationship between static foot posture and mobility, it is recommended that both be assessed as part of a comprehensive evaluation of a individual with foot problems. PMID:21244705
Generic framework for vessel detection and tracking based on distributed marine radar image data
NASA Astrophysics Data System (ADS)
Siegert, Gregor; Hoth, Julian; Banyś, Paweł; Heymann, Frank
2018-04-01
Situation awareness is understood as a key requirement for safe and secure shipping at sea. The primary sensor for maritime situation assessment is still the radar, with the AIS being introduced as supplemental service only. In this article, we present a framework to assess the current situation picture based on marine radar image processing. Essentially, the framework comprises a centralized IMM-JPDA multi-target tracker in combination with a fully automated scheme for track management, i.e., target acquisition and track depletion. This tracker is conditioned on measurements extracted from radar images. To gain a more robust and complete situation picture, we are exploiting the aspect angle diversity of multiple marine radars, by fusing them a priori to the tracking process. Due to the generic structure of the proposed framework, different techniques for radar image processing can be implemented and compared, namely the BLOB detector and SExtractor. The overall framework performance in terms of multi-target state estimation will be compared for both methods based on a dedicated measurement campaign in the Baltic Sea with multiple static and mobile targets given.
49 CFR 1540.205 - Procedures for security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...
Temporally Aware Reactive Systems
2005-03-01
programming language , as does O’Haskell. However, there are signi cant di erences. In Ocaml , state, objects and concurrency are orthogonal aspects. They...dif- ference between the two languages is that Ocaml is strict, while expression evaluation in O’Haskell is lazy. That dif- ference, however, is not... languages ; Static Checking; Overload tolerance; Graceful degradation 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON (Monitor) a
2009-09-01
Review, 39:962, 1964. [8] D. Chaum . Secret ballot receipts: True voter-verifiable elections. IEEE J. Security and Privacy, pages 38–47, 2004. [9...TCC 2005), pages 363–385, 2005. [10] David Clark, Sebastian Hunt, and Pasquale Malacaria. A static analysis for quantifying in- formation flow in a... David Buckingham, editor, MacArthur Foundation Series on Digital Learning– Youth, Identity, Digital Media Volume, Cambridge, MA, 2007. MIT Press. 11
Comparison of Measures of Risk for Recidivism in Sexual Offenders
ERIC Educational Resources Information Center
Looman, Jan; Abracen, Jeffrey
2010-01-01
Data for both sexual and violent recidivism for the Static-99, Risk Matrix 2000 (RM 2000), Rapid Risk Assessment for Sex Offense Recidivism (RRASOR), and Static-2002 are reported for 419 released sexual offenders assessed at the Regional Treatment Centre Sexual Offender Treatment Program. Data are analyzed by offender type as well as the group as…
ERIC Educational Resources Information Center
Legenbauer, Tanja; Vocks, Silja; Betz, Sabrina; Puigcerver, Maria Jose Baguena; Benecke, Andrea; Troje, Nikolaus F.; Ruddel, Heinz
2011-01-01
Various components of body image were measured to assess body image disturbances in patients with obesity. To overcome limitations of previous studies, a photo distortion technique and a biological motion distortion device were included to assess static and dynamic aspects of body image. Questionnaires assessed cognitive-affective aspects, bodily…
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC... Transportation Worker Identification Credential and must undergo a security threat assessment under 49 CFR part...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for each proprietor..., or owner of the entity must successfully complete a security threat assessment or comparable security... owner of the entity has successfully completed a Security Threat Assessment under part 1540, subpart C...
Bressel, Eadric; Yonker, Joshua C; Kras, John; Heath, Edward M
2007-01-01
Context: How athletes from different sports perform on balance tests is not well understood. When prescribing balance exercises to athletes in different sports, it may be important to recognize performance variations. Objective: To compare static and dynamic balance among collegiate athletes competing or training in soccer, basketball, and gymnastics. Design: A quasi-experimental, between-groups design. Independent variables included limb (dominant and nondominant) and sport played. Setting: A university athletic training facility. Patients or Other Participants: Thirty-four female volunteers who competed in National Collegiate Athletic Association Division I soccer (n = 11), basketball (n = 11), or gymnastics (n = 12). Intervention(s): To assess static balance, participants performed 3 stance variations (double leg, single leg, and tandem leg) on 2 surfaces (stiff and compliant). For assessment of dynamic balance, participants performed multidirectional maximal single-leg reaches from a unilateral base of support. Main Outcome Measure(s): Errors from the Balance Error Scoring System and normalized leg reach distances from the Star Excursion Balance Test were used to assess static and dynamic balance, respectively. Results: Balance Error Scoring System error scores for the gymnastics group were 55% lower than for the basketball group (P = .01), and Star Excursion Balance Test scores were 7% higher in the soccer group than the basketball group (P = .04). Conclusions: Gymnasts and soccer players did not differ in terms of static and dynamic balance. In contrast, basketball players displayed inferior static balance compared with gymnasts and inferior dynamic balance compared with soccer players. PMID:17597942
Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M
Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Petersen, Douglas B.; Allen, Melissa M.; Spencer, Trina D.
2016-01-01
The purpose of this study was to examine and compare the classification accuracy of early static prereading measures and early dynamic assessment reading measures administered to 600 kindergarten students. At the beginning of kindergarten, all of the participants were administered two commonly used static prereading measures. The participants were…
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable security...
NASA Technical Reports Server (NTRS)
Krueger, Ronald
2012-01-01
The application of benchmark examples for the assessment of quasi-static delamination propagation capabilities is demonstrated for ANSYS. The examples are independent of the analysis software used and allow the assessment of the automated delamination propagation in commercial finite element codes based on the virtual crack closure technique (VCCT). The examples selected are based on two-dimensional finite element models of Double Cantilever Beam (DCB), End-Notched Flexure (ENF), Mixed-Mode Bending (MMB) and Single Leg Bending (SLB) specimens. First, the quasi-static benchmark examples were recreated for each specimen using the current implementation of VCCT in ANSYS . Second, the delamination was allowed to propagate under quasi-static loading from its initial location using the automated procedure implemented in the finite element software. Third, the load-displacement relationship from a propagation analysis and the benchmark results were compared, and good agreement could be achieved by selecting the appropriate input parameters. The benchmarking procedure proved valuable by highlighting the issues associated with choosing the input parameters of the particular implementation. Overall the results are encouraging, but further assessment for three-dimensional solid models is required.
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226
Security threat assessment of an Internet security system using attack tree and vague sets.
Chang, Kuei-Hu
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
A High Speed Finger-Print Optical Scanning Method
2000-01-01
biometrics technologies for authentication, from the view point of convenience and higher security, dactyloscopy is by far the best, much better than the...sensing technologies using static capacitance, thermal or optical detection, the optical detection is by far with the most potential to meet the...present time due to the low resolution of the inherent nature of thermal imaging technique. Besides, this method is easily influenced by environmental
2016-03-14
DoD Department of Defense EMI electromagnetic induction ESTCP Environmental Security Technology Certification Program ft. foot GPS global...three primary objectives: Test and validate detection and discrimination capabilities of a currently available advanced electromagnetic induction ... induction (EMI) sensors in dynamic and static data acquisition modes and associated analysis software. To achieve these objectives, a controlled test was
Predicting Attack-Prone Components with Source Code Static Analyzers
2009-05-01
models to determine if additional metrics are required to increase the accuracy of the model: non-security SCSA warnings, code churn and size, the count...code churn and size, the count of faults found manually during development, and the measure of coupling between components. The dependent variable...is the count of vulnerabilities reported by testing and those found in the field. We evaluated our model on three commercial telecommunications
Static Fatigue of a Siliconized Silicon Carbide
1987-03-01
flexitral stress rupture and stepped temperature stress rupture (STSR) testing were performed to assess the static fatigue and creep resistances. Isothermal... stress rupture experiments were performed at 1200 0C in air for com- parison to previous results. - 10 STSR experiments 15 were under deadweight...temperature and stress levels that static fatigue and creep processes are active. The applied stresses were computed on the basis of the elastic
49 CFR 1572.9 - Applicant information required for HME security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... threat assessment. 1572.9 Section 1572.9 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.9 Applicant information required for HME security threat assessment. An applicant must supply the information...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
Alamdaran, Seyed Ali; Kazemi, Sahar; Parsa, Ali; Moghadam, Mohammad Hallaj; Feyzi, Ali; Mardani, Reza
2016-01-01
Background: Developmental dysplasia of hip (DDH) is a common childhood disorder, and ultrasonography examination is routinely used for screening purposes. In this study, we aimed to evaluate a modified combined static and dynamic ultrasound technique for the detection of DDH and to compare with the results of static and dynamic ultrasound techniques. Methods: In this cross-sectional study, during 2013- 2015, 300 high-risk infants were evaluated by ultrasound for DDH. Both hips were examined with three techniques: static, dynamic and single view static and dynamic technique. Statistical analysis was performed using SPSS version 11.5. Results: Patients aged 9 days to 83 weeks. 75% of the patients were 1 to 3 months old. Among 600 hip joints, about 5% were immature in static sonography and almost all of them were unstable in dynamic techniques. 0.3% of morphologically normal hips were unstable in dynamic sonography and 9% of unstable hips had normal morphology. The mean β angle differences in coronal view before and after stress maneuver was 14.43±5.47° in unstable hips. Single view static and dynamic technique revealed that all cases with acetabular dysplasia, instability and dislocation, except two dislocations, were detected by dynamic transverse view. For two cases, Ortolani maneuver showed femoral head reversibility in dislocated hips. Using single view static and dynamic technique was indicative and applicable for detection of more than 99% of cases. Conclusion: Single view static and dynamic technique not only is a fast and easy technique, but also it is of high diagnostic value in assessment of DDH. PMID:27847852
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
Forrest, Ewan H; Atkinson, Stephen R; Richardson, Paul; Masson, Steven; Ryder, Stephen; Thursz, Mark R; Allison, Michael
2018-03-01
'Static' prognostic models in alcoholic hepatitis, using data from a single time point, include the discriminant function (DF), Glasgow alcoholic hepatitis score (GAHS), the age, serum bilirubin, international normalized ratio and serum creatinine (ABIC) score and the model of end-stage liver disease (MELD). 'Dynamic' scores, incorporating evolution of bilirubin at seven days, include the Lille score. The aim of this study was to assess these scores' performance in patients from the STOPAH trial. Predictive performance of scores was assessed by area under the receiver operating curve (AUC). The effect of different therapeutic strategies upon survival was assessed by Kaplan-Meier analysis and tested using the log-rank test. A total of 1,068 patients were studied. The AUCs for the DF were significantly lower than for MELD, ABIC and GAHS for both 28- and 90-day outcomes: 90-day values were 0.670, 0.704, 0.726 and 0.713, respectively. 'Dynamic' scores and change in 'static' scores by Day 7 had similar AUCs. Patients with consistently low 'static' scores had low 28-day mortalities that were not improved with prednisolone (MELD <25: 8.6%; ABIC <6.71: 6.6%; GAHS <9: 5.9%). In patients with high 'static' scores without gastrointestinal bleeding or sepsis, prednisolone reduced 28-day mortality (MELD: 22.2% vs. 28.9%, p = 0.13; ABIC 14.6% vs. 21%, p = 0.02; GAHS 21% vs. 29.3%, p = 0.04). Overall mortality from treating all patients with a DF ≥32 and Lille assessment (90-day mortality 26.8%) was greater than combining newer 'static' and 'dynamic' scores (90-day mortality: MELD/Lille 21.8%; ABIC/Lille 23.7%; GAHS/Lille 20.6%). MELD, ABIC and GAHS are superior to the DF in alcoholic hepatitis. Consistently low scores have a favourable outcome not improved with prednisolone. Combined baseline 'static' and Day 7 scores reduce the number of patients exposed to corticosteroids and improve 90-day outcome. Alcoholic hepatitis is a life-threatening condition. Several scores exist to determine the outcome of these patients as well as to identify those who may benefit from treatment. This study looked at the performance of existing scores in patients who had been recruited to the largest alcoholic hepatitis clinical trial: STOPAH. 'Static' scores are calculable at the start of assessment. The three newer static scores (ABIC, GAHS and MELD) were shown to be superior to the oldest score (DF). ABIC and GAHS could also identify patients who had a survival benefit 28 days after starting prednisolone treatment. 'Dynamic' scores relate to the change in disease over the first week of treatment. Combination of the 'static' scores 'with the 'dynamic' scores or change in 'static' scores allowed identification of patients who could benefit from prednisolone up to 90 days. Crown Copyright © 2017. Published by Elsevier B.V. All rights reserved.
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability... of security vulnerability assessments. (a) Review and Approval. The Department will review and approve in writing all Security Vulnerability Assessments that satisfy the requirements of § 27.215...
Code of Federal Regulations, 2010 CFR
2010-10-01
... information requested by TSA concerning Security Threat Assessments. (viii) A statement acknowledging and ensuring that each individual will successfully complete a Security Threat Assessment under § 1549.111... Security Coordinator for an applicant successfully completes a security threat assessment, TSA will provide...
On the relationship between ontogenetic and static allometry.
Pélabon, Christophe; Bolstad, Geir H; Egset, Camilla K; Cheverud, James M; Pavlicev, Mihaela; Rosenqvist, Gunilla
2013-02-01
Ontogenetic and static allometries describe how a character changes in size when the size of the organism changes during ontogeny and among individuals measured at the same developmental stage, respectively. Understanding the relationship between these two types of allometry is crucial to understanding the evolution of allometry and, more generally, the evolution of shape. However, the effects of ontogenetic allometry on static allometry remain largely unexplored. Here, we first show analytically how individual variation in ontogenetic allometry and body size affect static allometry. Using two longitudinal data sets on ontogenetic and static allometry, we then estimate variances and covariances for the different parameters of the ontogenetic allometry defined in our model and assess their relative contribution to the static allometric slope. The mean ontogenetic allometry is the main parameter that determines the static allometric slope, while the covariance between the ontogenetic allometric slope and body size generates most of the discrepancies between ontogenetic and static allometry. These results suggest that the apparent evolutionary stasis of the static allometric slope is not generated by internal (developmental) constraints but more likely results from external constraints imposed by selection.
Indentation-flexure and low-velocity impact damage in graphite/epoxy laminates
NASA Technical Reports Server (NTRS)
Kwon, Young S.; Sankar, Bhavani V.
1992-01-01
Static indentation and low velocity impact tests were performed on quasi-isotropic and cross ply graphite/epoxy composite laminates. The load deflection relations in static tests and impact force history in the impact tests were recorded. The damage was assessed by using ultrasonic C-scanning and photomicrographic techniques. The static behavior of the laminates and damage progression during loading, unloading, and reloading were explained by a simple plate delamination model. A good correlation existed between the static and impact responses. It was found that results from a few static indentation-flexture tests can be used to predict the response and damage in composite laminates due to a class of low velocity impact events.
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Security threat assessment. 1540.203 Section 1540.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES...
49 CFR 1515.3 - Terms used in this part.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... Applicant means an individual who has applied for one of the security threat assessments identified in 49... for the security threat assessment but TSA later determined that the individual poses a security.... Security threat assessment means the threat assessment for which the applicant has applied, as described in...
7 CFR 331.7 - Registration and related security risk assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 5 2010-01-01 2010-01-01 false Registration and related security risk assessments... AGENTS AND TOXINS § 331.7 Registration and related security risk assessments. (a) Unless exempted under... be approved by the Administrator or the HHS Secretary based on a security risk assessment by the...
6 CFR 27.210 - Submissions schedule.
Code of Federal Regulations, 2010 CFR
2010-01-01
... in any subsequent Federal Register notice. (2) Security Vulnerability Assessment. Unless otherwise notified, a covered facility must complete and submit a Security Vulnerability Assessment within 90... Department's approval of the facility's Site Security Plan. (2) Security Vulnerability Assessment. Unless...
ERIC Educational Resources Information Center
Cummings, E. Mark
2003-01-01
Advocates renewed efforts toward assessing attachment on a single continuum of emotional security. Contends that theory is essential to guide attachment assessment and that the constructs of secure base and emotional security provide the needed conceptual foundation. Addresses challenges to the scoring of attachment on a security continuum.…
6 CFR 27.235 - Alternative security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The... Security Vulnerability Assessment or using the procedure specified in § 27.245 if the ASP is intended to...
Code of Federal Regulations, 2010 CFR
2010-10-01
... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...
49 CFR 1540.209 - Fees for security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Fees for security threat assessment. 1540.209 Section 1540.209 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY...
49 CFR 15.5 - Sensitive security information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... requirements of Federal law. (5) Vulnerability assessments. Any vulnerability assessment directed, created... security requirements of Federal law that could reveal a security vulnerability, including the identity of... Guard responsible for conducting vulnerability assessments, security boardings, or engaged in operations...
Polyethylene wear debris in modular acetabular prostheses.
Chen, P C; Mead, E H; Pinto, J G; Colwell, C W
1995-08-01
The longevity of total hip arthroplasty has brought forth the recognition of aseptic loosening of prosthetic components as the leading cause of implant failure. Modularity of implants, although a significant improvement in versatility, may increase debris formation, a recognized cause of implant failure. This study was designed to measure the relative motion, and to assess the polyethylene wear debris production at the interface between the metal acetabular shell and the back side of the polyethylene liner, in modular hip prostheses. Five models from 4 manufacturers with different locking mechanisms and acetabular shell surface treatments were tested under long-term simultaneous sinusoidal and static loading (10(7) cycles at 3 Hz with +/- 2.5 Nmeter and 220 N static load). Results showed that there were marked differences in the security of the acetabular shell and polyethylene liner locking mechanism, wear pattern, damage sites, and amount of polyethylene debris on the acetabular shell and polyethylene liner surfaces. The range of polyethylene liner motion observed among the 5 models during 1 cycle of testing varied from an average of 0.96 degrees to movement too small to be detected by the test machines. Image and scanning electron microscopy analysis showed different wear patterns and a wide range in the average polyethylene liner surface wear area (0.26 cm2-4.61 cm2). In general, a stable locking mechanism and a smooth acetabular shell surface are essential in minimizing polyethylene liner wear and polyethylene debris production.
In vitro assessment of competency for different lingual brackets in sliding mechanics.
Lalithapriya, S; Kumaran, N Kurunji; Rajasigamani, K
2015-01-01
To determine the static frictional resistance of different lingual brackets at different second order angulations when coupled with stainless steel (SS) archwire in dry and wet conditions. Using a modified jig, frictional resistance was evaluated under different conditions for a total of 270 upper premolar lingual brackets (0.018″ × 0.025″ - conventional - 7(th) generation and STb, self-ligating - evolution) with no in-built tip or torque together with 0.016″ × 0.022″ straight length SS archwires. For conventional brackets, the archwire was secured with 0.008″ preformed SS short ligature ties. One way analysis of variance with Tukey HSD as post-hoc test was applied for degree wise and bracket wise comparison within dry condition and wet condition. For pair wise comparison Student's t-test was used. Under both conditions the static frictional resistance is significantly higher for self-ligating brackets at 0°, while at 5° and 10° it is higher for 7(th) generation brackets. Statistically, significant difference does not exist at 0° between conventional brackets and the same was found at 5° and 10° between STb and self-ligating brackets. With an increase in second order angulations, all the evaluated samples exhibited an increased frictional value. Wet condition samples obtained a higher value than their corresponding dry condition. The self-ligating bracket evaluated in this in vitro study is not beneficial in reducing friction during en-mass retraction due to its interactive clip type.
Objective Integrated Assessment of Functional Outcomes in Reduction Mammaplasty
Passaro, Ilaria; Malovini, Alberto; Faga, Angela; Toffola, Elena Dalla
2013-01-01
Background: The aim of our study was an objective integrated assessment of the functional outcomes of reduction mammaplasty. Methods: The study involved 17 women undergoing reduction mammaplasty from March 2009 to June 2011. Each patient was assessed before surgery and 2 months postoperatively with the original association of 4 subjective and objective assessment methods: a physiatric clinical examination, the Roland Morris Disability Questionnaire, the Berg Balance Scale, and a static force platform analysis. Results: All of the tests proved multiple statistically significant associated outcomes demonstrating a significant improvement in the functional status following reduction mammaplasty. Surgical correction of breast hypertrophy could achieve both spinal pain relief and recovery of performance status in everyday life tasks, owing to a muscular postural functional rearrangement with a consistent antigravity muscle activity sparing. Pain reduction in turn could reduce the antalgic stiffness and improved the spinal range of motion. In our sample, the improvement of the spinal range of motion in flexion matched a similar improvement in extension. Recovery of a more favorable postural pattern with reduction of the anterior imbalance was demonstrated by the static force stabilometry. Therefore, postoperatively, all of our patients narrowed the gap between the actual body barycenter and the ideal one. The static force platform assessment also consistently confirmed the effectiveness of an accurate clinical examination of functional impairment from breast hypertrophy. Conclusions: The static force platform assessment might help the clinician to support the diagnosis of functional impairment from a breast hypertrophy with objectively based data. PMID:25289256
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.400 General. (a) The Area Maritime Security (AMS) Committee will ensure that a risk based AMS Assessment, is completed and meets the...
49 CFR 1572.13 - State responsibilities for issuance of hazardous materials endorsement.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Information System (CDLIS) operator of the results of the security threat assessment. (3) Revoke or deny the... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.13... security threat assessment in 49 CFR 1572.5 and issues an Initial Determination of Threat Assessment and...
Making DidFail Succeed: Enhancing the CERT Static Taint Analyzer for Android App Sets
2015-03-01
privileged task for an application without permissions. The Epicc [3] tool precisely analyzes inter-app communication in Android . By looking at intents...security. By placing adjustable limitations on what resources applications can use, Android allows users a large degree of control over how much trust...the user’s location, contacts, and other personal details. One of the core assumptions of the Android permission system is that an application that
Making DidFail Succeed: Enhancing the CERT Static Taint Analyzer for Android App Sets
2015-03-31
privileged task for an application without permissions. The Epicc [3] tool precisely analyzes inter-app communication in Android . By looking at intents...security. By placing adjustable limitations on what resources applications can use, Android allows users a large degree of control over how much trust...the user’s location, contacts, and other personal details. One of the core assumptions of the Android permission system is that an application that
Application Analysis and Decision with Dynamic Analysis
2014-12-01
pushes the application file and the JSON file containing the metadata from the database . When the 2 files are in place, the consumer thread starts...human analysts and stores it in a database . It would then use some of these data to generate a risk score for the application. However, static analysis...and store them in the primary A2D database for future analysis. 15. SUBJECT TERMS Android, dynamic analysis 16. SECURITY CLASSIFICATION OF: 17
2010-11-01
that a program is bug free. Also, and this is an important issue in getting people 29 to use them, static checkers tend to have false positives...enormous variety of non-standard dialects took a huge amount of work to get what they describe as full version-specific bug compatibility.) Model...coincident detection by T-cells. In- cidentally, this is why it is enough to get rid of T-cells that bind self-peptides without similarly culling B-cells
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.300 General. (a) The Vessel Security Assessment... used in any aspect of the VSA if they have the appropriate skills and if the Company Security Officer...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.300 General. (a) The Vessel Security Assessment... used in any aspect of the VSA if they have the appropriate skills and if the Company Security Officer...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.300 General. (a) The Vessel Security Assessment... used in any aspect of the VSA if they have the appropriate skills and if the Company Security Officer...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.300 General. (a) The Vessel Security Assessment... used in any aspect of the VSA if they have the appropriate skills and if the Company Security Officer...
49 CFR 1522.107 - Application.
Code of Federal Regulations, 2010 CFR
2010-10-01
... security threat assessments. (8) A statement acknowledging that all personnel of the applicant who must successfully complete a security threat assessment under the requirements of this part must do so before the... the Security Coordinator successfully completes a security threat assessment, TSA will provide to the...
76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...
What are we assessing when we measure food security? A compendium and review of current metrics.
Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L
2013-09-01
The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.
What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12
Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.
2013-01-01
The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241
NASA Technical Reports Server (NTRS)
Gilliam, D. P.; Powell, J. D.
2002-01-01
This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.
Contemori, Samuele; Biscarini, Andrea; Botti, Fabio Massimo; Busti, Daniele; Panichi, Roberto; Pettorossi, Vito Enrico
2017-06-12
Isolated infraspinatus muscle atrophy (IIMA) only affects the hitting shoulder of overhead-activity athletes, and is caused by suprascapular nerve neuropathy. No study has assessed the static and dynamic stability of the shoulder in overhead professional athletes with IIMA to reveal possible shoulder sensorimotor alterations. To assess the shoulder static stability, dynamic stability, and strength in professional volleyball players with IIMA and in healthy control players. Cross-sectional study. Research laboratory. Twenty-four male professional volleyball players (12 players with diagnosed IIMA and 12 healthy players) recruited from local volleyball teams. Static stability was evaluated with two independent force platforms and dynamic stability was assessed with the "Upper Quarter Y Balance Test". The static stability assessment was conducted in different support (single hand and both hand) and vision (open and closed eyes) conditions. Data from each test were analyzed with ANOVA and paired t-test models, to highlight statistical differences within and between groups. In addition to reduced abduction and external rotation strength, athletes with IIMA consistently demonstrated significant less static (P < 0.001) and dynamic stability (P < 0,001), compared with the contralateral shoulder and with healthy athletes. Closed eyes condition significantly enhanced the static stability deficit of the shoulder with IIMA (P = 0.039 and P = 0.034 for both hand and single hand support, respectively), but had no effect in healthy contralateral and healthy players' shoulders. This study highlights an impairment of the sensorimotor control system of the shoulder with IIMA, which likely results from both proprioceptive and strength deficits. This condition could yield subtle alteration in the functional use of the shoulder and predispose it to acute or overuse injuries. The results of this study may help athletic trainers and physical/physiotherapists to prevent shoulder injuries and create specific proprioceptive and neuromuscular training programs.
Some effects of sleep deprivation on tracking performance in static and dynamic environments.
DOT National Transportation Integrated Search
1976-01-01
The influence of approximately 34 and 55 h of sleep deprivation on performance scores derived from manually tracking the localizer needle on an aircraft instrument was assessed under both static (no motion) and dynamic (whole-body angular acceleratio...
NASA Astrophysics Data System (ADS)
Xu, Tengfei; Castel, Arnaud
2016-04-01
In this paper, a model, initially developed to calculate the stiffness of cracked reinforced concrete beams under static loading, is used to assess the dynamic stiffness. The model allows calculating the average inertia of cracked beams by taking into account the effect of bending cracks (primary cracks) and steel-concrete bond damage (i.e. interfacial microcracks). Free and forced vibration experiments are used to assess the performance of the model. The respective influence of bending cracks and steel-concrete bond damage on both static and dynamic responses is analyzed. The comparison between experimental and simulated deflections confirms that the effects of both bending cracks and steel-concrete bond loss should be taken into account to assess reinforced concrete stiffness under service static loading. On the contrary, comparison of experimental and calculated dynamic responses reveals that localized steel-concrete bond damages do not influence significantly the dynamic stiffness and the fundamental frequency.
49 CFR 1540.205 - Procedures for security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Procedures for security threat assessment. 1540.205 Section 1540.205 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Verifying the secure setup of Unix client/servers and detection of network intrusion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feingold, R.; Bruestle, H.R.; Bartoletti, T.
1995-07-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less
Aviation Security: Vulnerabilities in, and Alternatives for, Preboard Screening Security Operations
2001-09-25
establishing the certification program. This regulation is particularly significant because it is to include requirements mandated by the Airport Security Improvement...Assessment of Airport Security Screener Performance and Retention, Sept. 15, 2000. Page 8 GAO-01-1171T Criteria for Assessing Shifting responsibility for...airline and airport security officials to assess each option for reassigning screening responsibility against the key criteria- Specifically, we asked
Revising two-point discrimination assessment in normal aging and in patients with polyneuropathies.
van Nes, S I; Faber, C G; Hamers, R M T P; Harschnitz, O; Bakkers, M; Hermans, M C E; Meijer, R J; van Doorn, P A; Merkies, I S J
2008-07-01
To revise the static and dynamic normative values for the two-point discrimination test and to examine its applicability and validity in patients with a polyneuropathy. Two-point discrimination threshold values were assessed in 427 healthy controls and 99 patients mildly affected by a polyneuropathy. The controls were divided into seven age groups ranging from 20-29, 30-39,..., up to 80 years and older; each group consisted of at least 30 men and 30 women. Two-point discrimination examination took place under standardised conditions on the index finger. Correlation studies were performed between the scores obtained and the values derived from the Weinstein Enhanced Sensory Test (WEST) and the arm grade of the Overall Disability SumScore (ODSS) in the patients' group (validity studies). Finally, the sensitivity to detect patients mildly affected by a polyneuropathy was evaluated for static and dynamic assessments. There was a significant age-dependent increase in the two-point discrimination values. No significant gender difference was found. The dynamic threshold values were lower than the static scores. The two-point discrimination values obtained correlated significantly with the arm grade of the ODSS (static values: r = 0.33, p = 0.04; dynamic values: r = 0.37, p = 0.02) and the scores of the WEST in patients (static values: r = 0.58, p = 0.0001; dynamic values: r = 0.55, p = 0.0002). The sensitivity for the static and dynamic threshold values was 28% and 33%, respectively. This study provides age-related normative two-point discrimination threshold values using a two-point discriminator (an aesthesiometer). This easily applicable instrument could be used as part of a more extensive neurological sensory evaluation.
Static aeroelastic analysis and tailoring of a single-element racing car wing
NASA Astrophysics Data System (ADS)
Sadd, Christopher James
This thesis presents the research from an Engineering Doctorate research programme in collaboration with Reynard Motorsport Ltd, a manufacturer of racing cars. Racing car wing design has traditionally considered structures to be rigid. However, structures are never perfectly rigid and the interaction between aerodynamic loading and structural flexibility has a direct impact on aerodynamic performance. This interaction is often referred to as static aeroelasticity and the focus of this research has been the development of a computational static aeroelastic analysis method to improve the design of a single-element racing car wing. A static aeroelastic analysis method has been developed by coupling a Reynolds-Averaged Navier-Stokes CFD analysis method with a Finite Element structural analysis method using an iterative scheme. Development of this method has included assessment of CFD and Finite Element analysis methods and development of data transfer and mesh deflection methods. Experimental testing was also completed to further assess the computational analyses. The computational and experimental results show a good correlation and these studies have also shown that a Navier-Stokes static aeroelastic analysis of an isolated wing can be performed at an acceptable computational cost. The static aeroelastic analysis tool was used to assess methods of tailoring the structural flexibility of the wing to increase its aerodynamic performance. These tailoring methods were then used to produce two final wing designs to increase downforce and reduce drag respectively. At the average operating dynamic pressure of the racing car, the computational analysis predicts that the downforce-increasing wing has a downforce of C[1]=-1.377 in comparison to C[1]=-1.265 for the original wing. The computational analysis predicts that the drag-reducing wing has a drag of C[d]=0.115 in comparison to C[d]=0.143 for the original wing.
Detection of Visual Field Loss in Pituitary Disease: Peripheral Kinetic Versus Central Static
Rowe, Fiona J.; Cheyne, Christopher P.; García-Fiñana, Marta; Noonan, Carmel P.; Howard, Claire; Smith, Jayne; Adeoye, Joanne
2015-01-01
Abstract Visual field assessment is an important clinical evaluation for eye disease and neurological injury. We evaluated Octopus semi-automated kinetic peripheral perimetry (SKP) and Humphrey static automated central perimetry for detection of neurological visual field loss in patients with pituitary disease. We carried out a prospective cross-sectional diagnostic accuracy study comparing Humphrey central 30-2 SITA threshold programme with a screening protocol for SKP on Octopus perimetry. Humphrey 24-2 data were extracted from 30-2 results. Results were independently graded for presence/absence of field defect plus severity of defect. Fifty patients (100 eyes) were recruited (25 males and 25 females), with mean age of 52.4 years (SD = 15.7). Order of perimeter assessment (Humphrey/Octopus first) and order of eye tested (right/left first) were randomised. The 30-2 programme detected visual field loss in 85%, the 24-2 programme in 80%, and the Octopus combined kinetic/static strategy in 100% of eyes. Peripheral visual field loss was missed by central threshold assessment. Qualitative comparison of type of visual field defect demonstrated a match between Humphrey and Octopus results in 58%, with a match for severity of defect in 50%. Tests duration was 9.34 minutes (SD = 2.02) for Humphrey 30-2 versus 10.79 minutes (SD = 4.06) for Octopus perimetry. Octopus semi-automated kinetic perimetry was found to be superior to central static testing for detection of pituitary disease-related visual field loss. Where reliant on Humphrey central static perimetry, the 30-2 programme is recommended over the 24-2 programme. Where kinetic perimetry is available, this is preferable to central static programmes for increased detection of peripheral visual field loss. PMID:27928344
Nordez, Antoine; Cornu, Christophe; McNair, Peter
2006-08-01
The aim of this study was to assess the effects of static stretching on hamstring passive stiffness calculated using different data reduction methods. Subjects performed a maximal range of motion test, five cyclic stretching repetitions and a static stretching intervention that involved five 30-s static stretches. A computerised dynamometer allowed the measurement of torque and range of motion during passive knee extension. Stiffness was then calculated as the slope of the torque-angle relationship fitted using a second-order polynomial, a fourth-order polynomial, and an exponential model. The second-order polynomial and exponential models allowed the calculation of stiffness indices normalized to knee angle and passive torque, respectively. Prior to static stretching, stiffness levels were significantly different across the models. After stretching, while knee maximal joint range of motion increased, stiffness was shown to decrease. Stiffness decreased more at the extended knee joint angle, and the magnitude of change depended upon the model used. After stretching, the stiffness indices also varied according to the model used to fit data. Thus, the stiffness index normalized to knee angle was found to decrease whereas the stiffness index normalized to passive torque increased after static stretching. Stretching has significant effects on stiffness, but the findings highlight the need to carefully assess the effect of different models when analyzing such data.
Forte, Roberta; Boreham, Colin A G; De Vito, Giuseppe; Ditroilo, Massimiliano; Pesce, Caterina
2014-12-01
Age-related reductions in strength and power are considered to negatively impact balance control, but the existence of a direct association is still an issue of debate. This is possibly due to the fact that balance assessment is complex, reflects different underlying physiologic mechanisms and involves quantitative measurements of postural sway or timing of performance during balance tasks. The present study evaluated the moderator effect of static postural control on the association of power and strength with dynamic balance tasks. Fifty-seven healthy 65-75 year old individuals performed tests of dynamic functional balance (walking speed under different conditions) and of strength, power and static postural control. Dynamic balance performance (walking speed) was associated with lower limb strength and power, as well as postural control under conditions requiring postural adjustments (narrow surface walking r(2) = 0.31, p < 0.001). An interaction effect between strength and static postural control was found with narrow surface walking and talking while walking (change of β 0.980, p < 0.001 in strength for 1 SD improvements in static postural control for narrow walking, and [Formula: see text] -0.730, p < 0.01 in talking while walking). These results indicate that good static postural control facilitates the utilisation of lower limb strength to better perform complex, dynamic functional balance tasks. Practical implications for assessment and training are discussed.
Bowman, J D; Thomas, D C; London, S J; Peters, J M
1995-01-01
We present a hypothesis that the risk of childhood leukemia is related to exposure to specific combinations of static and extremely-low-frequency (ELF) magnetic fields. Laboratory data from calcium efflux and diatom mobility experiments were used with the gyromagnetic equation to predict combinations of 60 Hz and static magnetic fields hypothesized to enhance leukemia risk. The laboratory data predicted 19 bands of the static field magnitude with a bandwidth of 9.1 microT that, together with 60 Hz magnetic fields, are expected to have biological activity. We then assessed the association between this exposure metric and childhood leukemia using data from a case-control study in Los Angeles County. ELF and static magnetic fields were measured in the bedrooms of 124 cases determined from a tumor registry and 99 controls drawn from friends and random digit dialing. Among these subjects, 26 cases and 20 controls were exposed to static magnetic fields lying in the predicted bands of biological activity centered at 38.0 microT and 50.6 microT. Although no association was found for childhood leukemia in relation to measured ELF or static magnetic fields alone, an increasing trend of leukemia risk with measured ELF fields was found for subjects within these static field bands (P for trend = 0.041). The odds ratio (OR) was 3.3 [95% confidence interval (CI) = 0.4-30.5] for subjects exposed to static fields within the derived bands and to ELF magnetic field above 0.30 microT (compared to subjects exposed to static fields outside the bands and ELF magnetic fields below 0.07 microT). When the 60 Hz magnetic fields were assessed according to the Wertheimer-Leeper code for wiring configurations, leukemia risks were again greater with the hypothesized exposure conditions (OR = 9.2 for very high current configurations within the static field bands; 95% CI = 1.3-64.6). Although the risk estimates are based on limited magnetic field measurements for a small number of subjects, these findings suggest that the risk of childhood leukemia may be related to the combined effects of the static and ELF magnetic fields. Further tests of the hypothesis are proposed.
Hoffman, Scott E; Peltz, Cathryn D; Haladik, Jeffrey A; Divine, George; Nurse, Matthew A; Bey, Michael J
2015-03-01
Running-related injuries are common and previous research has suggested that the magnitude and/or rate of pronation may contribute to the development of these injuries. Accurately and directly measuring pronation can be challenging, and therefore previous research has often relied on navicular drop (under both static and dynamic conditions) as an indirect assessment of pronation. The objectives of this study were to use dynamic, biplane X-ray imaging to assess the effects of three footwear conditions (barefoot, minimalist shoes, motion control shoes) on the magnitude and rate of navicular drop during running, and to determine the association between static and dynamic measures of navicular drop. Twelve healthy distance runners participated in this study. The magnitude and rate of navicular drop were determined by tracking the 3D position of the navicular from biplane radiographic images acquired at 60Hz during the stance phase of overground running. Static assessments of navicular drop and foot posture were also recorded in each subject. Footwear condition was not found to have a significant effect on the magnitude of navicular drop (p=0.22), but motion control shoes had a slower navicular drop rate than running barefoot (p=0.05) or in minimalist shoes (p=0.05). In an exploratory analysis, static assessments of navicular drop and foot posture were found to be poor predictors of dynamic navicular drop in all footwear conditions (p>0.18). Copyright © 2015 Elsevier B.V. All rights reserved.
2016-09-23
Acquisition and Data Analysis). EMI sensors, MetalMapper, man-portable Time-domain Electromagnetic Multi-sensor Towed Array Detection System (TEMTADS...California Department of Toxic Substances Control EM61 EM61-MK2 EMI electromagnetic induction ESTCP Environmental Security Technology Certification...SOP Standard Operating Procedure v TEMTADS Time-domain Electromagnetic Multi-sensor Towed Array Detection System man-portable 2x2 TOI target(s
Adapting Digital Libraries to Continual Evolution
NASA Technical Reports Server (NTRS)
Barkstrom, Bruce R.; Finch, Melinda; Ferebee, Michelle; Mackey, Calvin
2002-01-01
In this paper, we describe five investment streams (data storage infrastructure, knowledge management, data production control, data transport and security, and personnel skill mix) that need to be balanced against short-term operating demands in order to maximize the probability of long-term viability of a digital library. Because of the rapid pace of information technology change, a digital library cannot be a static institution. Rather, it has to become a flexible organization adapted to continuous evolution of its infrastructure.
2015-12-22
not shown). The relatively small differences were likely associated with differences in surface albedo and longwave radiation from soil surface. Ground...SECURITY CLASSIFICATION OF: Soil density is commonly treated as static in studies on land surface property dynamics. Magnitudes of errors associated...with this assumption are largely unknown. Objectives of this preliminary investigation were to: i) quantify effects of soil density variation on soil
Effects of video compression on target acquisition performance
NASA Astrophysics Data System (ADS)
Espinola, Richard L.; Cha, Jae; Preece, Bradley
2008-04-01
The bandwidth requirements of modern target acquisition systems continue to increase with larger sensor formats and multi-spectral capabilities. To obviate this problem, still and moving imagery can be compressed, often resulting in greater than 100 fold decrease in required bandwidth. Compression, however, is generally not error-free and the generated artifacts can adversely affect task performance. The U.S. Army RDECOM CERDEC Night Vision and Electronic Sensors Directorate recently performed an assessment of various compression techniques on static imagery for tank identification. In this paper, we expand this initial assessment by studying and quantifying the effect of various video compression algorithms and their impact on tank identification performance. We perform a series of controlled human perception tests using three dynamic simulated scenarios: target moving/sensor static, target static/sensor static, sensor tracking the target. Results of this study will quantify the effect of video compression on target identification and provide a framework to evaluate video compression on future sensor systems.
Speckle dynamics under ergodicity breaking
NASA Astrophysics Data System (ADS)
Sdobnov, Anton; Bykov, Alexander; Molodij, Guillaume; Kalchenko, Vyacheslav; Jarvinen, Topias; Popov, Alexey; Kordas, Krisztian; Meglinski, Igor
2018-04-01
Laser speckle contrast imaging (LSCI) is a well-known and versatile approach for the non-invasive visualization of flows and microcirculation localized in turbid scattering media, including biological tissues. In most conventional implementations of LSCI the ergodic regime is typically assumed valid. However, most composite turbid scattering media, especially biological tissues, are non-ergodic, containing a mixture of dynamic and static centers of light scattering. In the current study, we examined the speckle contrast in different dynamic conditions with the aim of assessing limitations in the quantitative interpretation of speckle contrast images. Based on a simple phenomenological approach, we introduced a coefficient of speckle dynamics to quantitatively assess the ratio of the dynamic part of a scattering medium to the static one. The introduced coefficient allows one to distinguish real changes in motion from the mere appearance of static components in the field of view. As examples of systems with static/dynamic transitions, thawing and heating of Intralipid samples were studied by the LSCI approach.
Shin, Ji-won; Song, Gui-bin; Ko, Jooyeon
2017-01-01
[Purpose] The purpose of this case series was to examination the effects of trunk and neck stabilization exercise on the static, dynamic trunk balance abilities of children with cerebral palsy. [Subjects and Methods] The study included 11 school aged children diagnosed with paraplegia due to a premature birth. Each child engaged in exercise treatments twice per week for eight weeks; each treatment lasted for 45 minutes. After conducting a preliminary assessment, exercise treatments were designed based on each child’s level of functioning. Another assessment was conducted after the eight weeks of treatment. [Results] The Trunk Control Measurement Scale evaluation showed that the exercise treatments had a significant effect on static sitting balance, selective movement control, dynamic reaching, and total Trunk Control Measurement Scale scores. [Conclusion] The results indicate that neck and trunk stabilization exercises that require children’s active participation are helpful for improving static and dynamic balance ability among children diagnosed with cerebral palsy. PMID:28533628
Petri, Anne-Kathrin; Schmiedchen, Kristina; Stunder, Dominik; Dechent, Dagmar; Kraus, Thomas; Bailey, William H; Driessen, Sarah
2017-04-17
High-voltage direct current (HVDC) lines are the technology of choice for the transport of large amounts of energy over long distances. The operation of these lines produces static electric fields (EF), but the data reviewed in previous assessments were not sufficient to assess the need for any environmental limit. The aim of this systematic review was to update the current state of research and to evaluate biological effects of static EF. Using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-analyses) recommendations, we collected and evaluated experimental and epidemiological studies examining biological effects of exposure to static EF in humans (n = 8) and vertebrates (n = 40). There is good evidence that humans and animals are able to perceive the presence of static EF at sufficiently high levels. Hair movements caused by electrostatic forces may play a major role in this perception. A large number of studies reported responses of animals (e.g., altered metabolic, immunologic or developmental parameters) to a broad range of static EF strengths as well, but these responses are likely secondary physiological responses to sensory stimulation. Furthermore, the quality of many of the studies reporting physiological responses is poor, which raises concerns about confounding. The weight of the evidence from the literature reviewed did not indicate that static EF have adverse biological effects in humans or animals. The evidence strongly supported the role of superficial sensory stimulation of hair and skin as the basis for perception of the field, as well as reported indirect behavioral and physiological responses. Physical considerations also preclude any direct effect of static EF on internal physiology, and reports that some physiological processes are affected in minor ways may be explained by other factors. While this literature does not support a level of concern about biological effects of exposure to static EF, the conditions that affect thresholds for human detection and possible annoyance at suprathreshold levels should be investigated.
Assessment of global water security: moving beyond water scarcity assessment
NASA Astrophysics Data System (ADS)
Wada, Y.; Gain, A. K.; Giupponi, C.
2015-12-01
Water plays an important role in underpinning equitable, stable and productive societies, and the ecosystems on which we depend. Many international river basins are likely to experience 'low water security' over the coming decades. Hence, ensuring water security along with energy and food securities has been recognised as priority goals in Sustainable Development Goals (SDGs) by the United Nations. This water security is not rooted only in the limitation of physical resources, i.e. the shortage in the availability of freshwater relative to water demand, but also on social and economic factors (e.g. flawed water planning and management approaches, institutional incapability to provide water services, unsustainable economic policies). Until recently, advanced tools and methods are available for assessment of global water scarcity. However, integrating both physical and socio-economic indicators assessment of water security at global level is not available yet. In this study, we present the first global understanding of water security using a spatial multi-criteria analysis framework that goes beyond available water scarcity assessment. For assessing water security at global scale, the term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The Water security index is calculated by aggregating the indicators using both simple additive weighting (SAW) and ordered weighted average (OWA).
Patel, Dipesh E; Cumberland, Phillippa M; Walters, Bronwen C; Russell-Eggitt, Isabelle; Brookes, John; Papadopoulos, Maria; Khaw, Peng Tee; Viswanathan, Ananth C; Garway-Heath, David; Cortina-Borja, Mario; Rahi, Jugnoo S
2018-02-01
There is limited evidence to support the development of guidance for visual field testing in children with glaucoma. To compare different static and combined static/kinetic perimetry approaches in children with glaucoma. Cross-sectional, observational study recruiting children prospectively between May 2013 and June 2015 at 2 tertiary specialist pediatric ophthalmology centers in London, England (Moorfields Eye Hospital and Great Ormond Street Hospital). The study included 65 children aged 5 to 15 years with glaucoma (108 affected eyes). A comparison of test quality and outcomes for static and combined static/kinetic techniques, with respect to ability to quantify glaucomatous loss. Children performed perimetric assessments using Humphrey static (Swedish Interactive Thresholding Algorithm 24-2 FAST) and Octopus combined static tendency-oriented perimetry/kinetic perimetry (isopter V4e, III4e, or I4e) in a single sitting, using standardized clinical protocols, administered by a single examiner. Information was collected about test duration, completion, and quality (using automated reliability indices and our qualitative Examiner-Based Assessment of Reliability score). Perimetry outputs were scored using the Aulhorn and Karmeyer classification. One affected eye in 19 participants was retested with Swedish Interactive Thresholding Algorithm 24-2 FAST and 24-2 standard algorithms. Sixty-five children (33 girls [50.8%]), with a median age of 12 years (interquartile range, 9-14 years), were tested. Test quality (Examiner-Based Assessment of Reliability score) improved with increasing age for both Humphrey and Octopus strategies and were equivalent in children older than 10 years (McNemar test, χ2 = 0.33; P = .56), but better-quality tests with Humphrey perimetry were achieved in younger children (McNemar test, χ2 = 4.0; P = .05). Octopus and Humphrey static MD values worse than or equal to -6 dB showed disagreement (Bland-Altman, mean difference, -0.70; limit of agreement, -7.74 to 6.35) but were comparable when greater than this threshold (mean difference, -0.03; limit of agreement, -2.33 to 2.27). Visual field classification scores for static perimetry tests showed substantial agreement (linearly weighted κ, 0.79; 95% CI, 0.65-0.93), although 25 of 80 (31%) were graded with a more severe defect for Octopus static perimetry. Of the 7 severe cases of visual field loss (grade 5), 5 had lower kinetic than static classification scores. A simple static perimetry approach potentially yields high-quality results in children younger than 10 years. For children older than 10 years, without penalizing quality, the addition of kinetic perimetry enabled measurement of far-peripheral sensitivity, which is particularly useful in children with severe visual field restriction.
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2010 CFR
2010-10-01
... with security-related duties. (a) Security threat assessments. Each certified cargo screening facility... certified cargo screening facility complete a security threat assessment or comparable security threat... acuity, physical coordination, and motor skills to the extent required to effectively operate cargo...
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2012 CFR
2012-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2014 CFR
2014-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2011 CFR
2011-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
A New Three Dimensional Based Key Generation Technique in AVK
NASA Astrophysics Data System (ADS)
Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak
2017-08-01
In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.
NASA Astrophysics Data System (ADS)
Zhou, W.; Qiu, G. Y.; Oodo, S. O.; He, H.
2013-03-01
An increasing interest in wind energy and the advance of related technologies have increased the connection of wind power generation into electrical grids. This paper proposes an optimization model for determining the maximum capacity of wind farms in a power system. In this model, generator power output limits, voltage limits and thermal limits of branches in the grid system were considered in order to limit the steady-state security influence of wind generators on the power system. The optimization model was solved by a nonlinear primal-dual interior-point method. An IEEE-30 bus system with two wind farms was tested through simulation studies, plus an analysis conducted to verify the effectiveness of the proposed model. The results indicated that the model is efficient and reasonable.
Incorporating Yearly Derived Winter Wheat Maps Into Winter Wheat Yield Forecasting Model
NASA Technical Reports Server (NTRS)
Skakun, S.; Franch, B.; Roger, J.-C.; Vermote, E.; Becker-Reshef, I.; Justice, C.; Santamaría-Artigas, A.
2016-01-01
Wheat is one of the most important cereal crops in the world. Timely and accurate forecast of wheat yield and production at global scale is vital in implementing food security policy. Becker-Reshef et al. (2010) developed a generalized empirical model for forecasting winter wheat production using remote sensing data and official statistics. This model was implemented using static wheat maps. In this paper, we analyze the impact of incorporating yearly wheat masks into the forecasting model. We propose a new approach of producing in season winter wheat maps exploiting satellite data and official statistics on crop area only. Validation on independent data showed that the proposed approach reached 6% to 23% of omission error and 10% to 16% of commission error when mapping winter wheat 2-3 months before harvest. In general, we found a limited impact of using yearly winter wheat masks over a static mask for the study regions.
Information security system quality assessment through the intelligent tools
NASA Astrophysics Data System (ADS)
Trapeznikov, E. V.
2018-04-01
The technology development has shown the automated system information security comprehensive analysis necessity. The subject area analysis indicates the study relevance. The research objective is to develop the information security system quality assessment methodology based on the intelligent tools. The basis of the methodology is the information security assessment model in the information system through the neural network. The paper presents the security assessment model, its algorithm. The methodology practical implementation results in the form of the software flow diagram are represented. The practical significance of the model being developed is noted in conclusions.
Placing Ecosystem Sustainability Within the Context of Dynamic Earth Systems
Because the concept of ecosystem sustainability and the practice of sustainable land management both have long-term foci, it is necessary to view these from the perspective of dynamic rather than static systems. In addition to the typical static system approach for assessing ecos...
77 FR 28894 - Maritime Vulnerability Self-Assessment Tool
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA... conducting vulnerability assessments became available and usage of the TMSARM has dropped off considerably...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of security vulnerability...
Augmenting Traditional Static Analysis With Commonly Available Metadata
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cook, Devin
Developers and security analysts have been using static analysis for a long time to analyze programs for defects and vulnerabilities with some success. Generally a static analysis tool is run on the source code for a given program, flagging areas of code that need to be further inspected by a human analyst. These areas may be obvious bugs like potential bu er over flows, information leakage flaws, or the use of uninitialized variables. These tools tend to work fairly well - every year they find many important bugs. These tools are more impressive considering the fact that they only examinemore » the source code, which may be very complex. Now consider the amount of data available that these tools do not analyze. There are many pieces of information that would prove invaluable for finding bugs in code, things such as a history of bug reports, a history of all changes to the code, information about committers, etc. By leveraging all this additional data, it is possible to nd more bugs with less user interaction, as well as track useful metrics such as number and type of defects injected by committer. This dissertation provides a method for leveraging development metadata to find bugs that would otherwise be difficult to find using standard static analysis tools. We showcase two case studies that demonstrate the ability to find 0day vulnerabilities in large and small software projects by finding new vulnerabilities in the cpython and Roundup open source projects.« less
DOT National Transportation Integrated Search
1969-08-01
This study concerned the rate of presentation of stimuli on a task involving the monitoring of a static process of the kind represented by aircraft warning light indicators. The task was performed concurrently with various combinations of tasks requi...
49 CFR 238.203 - Static end strength.
Code of Federal Regulations, 2014 CFR
2014-10-01
... inches by 24 inches. The alternative specified in this paragraph is not applicable to a cab car or an MU... use of the equipment; and (v) A quantitative risk assessment, incorporating the design information... Equipment § 238.203 Static end strength. (a)(1) Except as further specified in this paragraph or in...
49 CFR 238.203 - Static end strength.
Code of Federal Regulations, 2013 CFR
2013-10-01
... inches by 24 inches. The alternative specified in this paragraph is not applicable to a cab car or an MU... use of the equipment; and (v) A quantitative risk assessment, incorporating the design information... Equipment § 238.203 Static end strength. (a)(1) Except as further specified in this paragraph or in...
49 CFR 238.203 - Static end strength.
Code of Federal Regulations, 2012 CFR
2012-10-01
... inches by 24 inches. The alternative specified in this paragraph is not applicable to a cab car or an MU... use of the equipment; and (v) A quantitative risk assessment, incorporating the design information... Equipment § 238.203 Static end strength. (a)(1) Except as further specified in this paragraph or in...
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-12-17
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-01-01
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409
Strategy to Enhance International Supply Chain Security
2007-07-01
airports as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a... travel security issue. The assessment of a container ship’s crew or of a driver moving a truck into the secure area of a port are also supply chain...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Collection Activity Under OMB Review: Highway Baseline Assessment for Security Enhancement (BASE) Program... Assessment for Security Enhancement (BASE) Program. Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Highway Baseline Assessment for Security Enhancement (BASE). Affected Public...
Water security for productive economies: Applying an assessment framework in southern Africa
NASA Astrophysics Data System (ADS)
Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian
2017-08-01
Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.
NASA Astrophysics Data System (ADS)
Bartoletti, Massimo
Usage automata are an extension of finite stata automata, with some additional features (e.g. parameters and guards) that improve their expressivity. Usage automata are expressive enough to model security requirements of real-world applications; at the same time, they are simple enough to be statically amenable, e.g. they can be model-checked against abstractions of program usages. We study here some foundational aspects of usage automata. In particular, we discuss about their expressive power, and about their effective use in run-time mechanisms for enforcing usage policies.
Validating Network Security Policies via Static Analysis of Router ACL Configuration
2006-12-01
this research effort. A. SOFTWARE IMPLEMENTATION The system software was created with Java, using NetBeans IDE 5.0 [12]. NetBeans is a free, open...11. P. Gupta, and N. McKeown (2001), Algorithms for Packet Classification, IEEE Network, vol. 15, issue 2, pp. 24-32. 12, NetBeans (2006), Welcome to... NetBeans , http://www.netbeans.org, last accessed on 25 November 2006. 13. IANA.org (2006), Port Numbers, http://www.iana.org/assignments/port
Transmission of whole body vibration to the lower body in static and dynamic half-squat exercises.
Munera, Marcela; Bertucci, William; Duc, Sebastien; Chiementin, Xavier
2016-11-01
Whole body vibration (WBV) is used as a training method but its physical risk is not yet clear. Hence, the aim of this study is to assess the exposure to WBV by a measure of acceleration at the lower limb under dynamic and static postural conditions. The hypothesis of this paper is that this assessment is influenced by the frequency, position, and movement of the body. Fifteen healthy males are exposed to vertical sinusoidal vibration at different frequencies (20-60 Hz), while adopting three different static postures (knee extension angle: 180°, 120° and 90°) or performing a dynamic half-squat exercise. Accelerations at input source and at three joints of the lower limb (ankle, knee, and hip) are measured using skin-mounted accelerometers. Acceleration values (g) in static conditions show a decrease in the vibrational dose when it is measured at a more proximal location in the lower extremity. The results of the performed statistical test show statistically significant differences (p < 0.05) in the transmissibility values caused by the frequency, the position, and to the presence of the movement and its direction at the different conditions. The results confirm the initial hypothesis and justify the importance of a vibration assessment in dynamic conditions.
Arifin, Nooranida; Abu Osman, Noor Azuan; Wan Abas, Wan Abu Bakar
2014-04-01
The measurements of postural balance often involve measurement error, which affects the analysis and interpretation of the outcomes. In most of the existing clinical rehabilitation research, the ability to produce reliable measures is a prerequisite for an accurate assessment of an intervention after a period of time. Although clinical balance assessment has been performed in previous study, none has determined the intrarater test-retest reliability of static and dynamic stability indexes during dominant single stance. In this study, one rater examined 20 healthy university students (female=12, male=8) in two sessions separated by 7 day intervals. Three stability indexes--the overall stability index (OSI), anterior/posterior stability index (APSI), and medial/ lateral stability index (MLSI) in static and dynamic conditions--were measured during single dominant stance. Intraclass correlation coefficient (ICC), standard error measurement (SEM) and 95% confidence interval (95% CI) were calculated. Test-retest ICCs for OSI, APSI, and MLSI were 0.85, 0.78, and 0.84 during static condition and were 0.77, 0.77, and 0.65 during dynamic condition, respectively. We concluded that the postural stability assessment using Biodex stability system demonstrates good-to-excellent test-retest reliability over a 1 week time interval.
Bokov, P; Delclaux, C
2016-02-01
Resting pulmonary function tests (PFT) include the assessment of ventilatory capacity: spirometry (forced expiratory flows and mobilisable volumes) and static volume assessment, notably using body plethysmography. Spirometry allows the potential definition of obstructive defect, while static volume assessment allows the potential definition of restrictive defect (decrease in total lung capacity) and thoracic hyperinflation (increase in static volumes). It must be kept in mind that this evaluation is incomplete and that an assessment of ventilatory demand is often warranted, especially when facing dyspnoea: evaluation of arterial blood gas (searching for respiratory insufficiency) and measurement of the transfer coefficient of the lung, allowing with the measurement of alveolar volume to calculate the diffusing capacity of the lung for CO (DLCO: assessment of alveolar-capillary wall and capillary blood volume). All these pulmonary function tests have been the subject of an Americano-European Task force (standardisation of lung function testing) published in 2005, and translated in French in 2007. Interpretative strategies for lung function tests have been recommended, which define abnormal lung function tests using the 5th and 95th percentiles of predicted values (lower and upper limits of normal values). Thus, these recommendations need to be implemented in all pulmonary function test units. A methacholine challenge test will only be performed in the presence of an intermediate pre-test probability for asthma (diagnostic uncertainty), which is an infrequent setting. The most convenient exertional test is the 6-minute walk test that allows the assessment of walking performance, the search for arterial desaturation and the quantification of dyspnoea complaint. Copyright © 2015 Société nationale française de médecine interne (SNFMI). Published by Elsevier SAS. All rights reserved.
Network Security Risk Assessment System Based on Attack Graph and Markov Chain
NASA Astrophysics Data System (ADS)
Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian
2017-10-01
Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.
Security Risks: Management and Mitigation in the Software Life Cycle
NASA Technical Reports Server (NTRS)
Gilliam, David P.
2004-01-01
A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.
Dynamic Risk Assessment of Sexual Offenders: Validity and Dimensional Structure of the Stable-2007.
Etzler, Sonja; Eher, Reinhard; Rettenberger, Martin
2018-02-01
In this study, the predictive and incremental validity of the Stable-2007 beyond the Static-99 was evaluated in an updated sample of N = 638 adult male sexual offenders followed-up for an average of M = 8.2 years. Data were collected at the Federal Evaluation Center for Violent and Sexual Offenders (FECVSO) in Austria within a prospective-longitudinal research design. Scores and risk categories of the Static-99 (AUC = .721; p < .001) and of the Stable-2007 (AUC = .623, p = .005) were found to be significantly related to sexual recidivism. The Stable-2007 risk categories contributed incrementally to the prediction of sexual recidivism beyond the Static-99. Analyzing the dimensional structure of the Stable-2007 yielded three factors, named Antisociality, Sexual Deviance, and Hypersexuality. Antisociality and Sexual Deviance were significant predictors for sexual recidivism. Sexual Deviance was negatively associated with non-sexual violent recidivism. Comparisons with latent dimensions of other risk assessment instruments are made and implications for applied risk assessment are discussed.
Development and Applications of Benchmark Examples for Static Delamination Propagation Predictions
NASA Technical Reports Server (NTRS)
Krueger, Ronald
2013-01-01
The development and application of benchmark examples for the assessment of quasistatic delamination propagation capabilities was demonstrated for ANSYS (TradeMark) and Abaqus/Standard (TradeMark). The examples selected were based on finite element models of Double Cantilever Beam (DCB) and Mixed-Mode Bending (MMB) specimens. First, quasi-static benchmark results were created based on an approach developed previously. Second, the delamination was allowed to propagate under quasi-static loading from its initial location using the automated procedure implemented in ANSYS (TradeMark) and Abaqus/Standard (TradeMark). Input control parameters were varied to study the effect on the computed delamination propagation. Overall, the benchmarking procedure proved valuable by highlighting the issues associated with choosing the appropriate input parameters for the VCCT implementations in ANSYS® and Abaqus/Standard®. However, further assessment for mixed-mode delamination fatigue onset and growth is required. Additionally studies should include the assessment of the propagation capabilities in more complex specimens and on a structural level.
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC.
This report to Congress examines the Social Security Administration's approach to assessing children's impairments through the individualized functional assessment (IFA) process mandated by the Supreme Court in Sullivan v. Zebley. Specifically, the report assesses the IFA's impact on number of Supplemental Security Income recipients, IFA's…
Code of Federal Regulations, 2010 CFR
2010-10-01
... threat assessments for cargo personnel in the United States. 1544.228 Section 1544.228 Transportation... COMMERCIAL OPERATORS Operations § 1544.228 Access to cargo and cargo screening: Security threat assessments... paragraph (b) of this section— (1) Each individual must successfully complete a security threat assessment...
Dickinson, R A; Morton, J M; Beggs, D S; Anderson, G A; Pyman, M F; Mansell, P D; Blackwood, C B
2013-07-01
Automated walk-over weighing systems can be used to monitor liveweights of cattle. Minimal literature exists to describe agreement between automated and static scales, and no known studies describe repeatability when used for daily measurements of dairy cows. This study establishes the repeatability of an automated walk-over cattle-weighing system, and agreement with static electronic scales, when used in a commercial dairy herd to weigh lactating cows. Forty-six lactating dairy cows from a seasonal calving, pasture-based dairy herd in southwest Victoria, Australia, were weighed once using a set of static scales and repeatedly using an automated walk-over weighing system at the exit of a rotary dairy. Substantial agreement was observed between the automated and static scales when assessed using Lin's concordance correlation coefficient. Weights measured by the automated walkover scales were within 5% of those measured by the static scales in 96% of weighings. Bland and Altman's 95% limits of agreement were -23.3 to 43.6 kg, a range of 66.9 kg. The 95% repeatability coefficient for automated weighings was 46.3 kg. Removal of a single outlier from the data set increased Lin's concordance coefficient, narrowed Bland and Altman's 95% limits of agreement to a range of 32.5 kg, and reduced the 95% repeatability coefficient to 18.7 kg. Cow misbehavior during walk-over weighing accounted for many of the larger weight discrepancies. The automated walk-over weighing system showed substantial agreement with the static scales when assessed using Lin's concordance correlation coefficient. This contrasted with limited agreement when assessed using Bland and Altman's method, largely due to poor repeatability. This suggests the automated weighing system is inadequate for detecting small liveweight differences in individual cows based on comparisons of single weights. Misbehaviors and other factors can result in the recording of spurious values on walk-over scales. Excluding outlier weights and comparing means of 7 consecutive daily weights may improve agreement sufficiently to allow meaningful assessment of small short-term changes in automated weights in individuals and groups of cows. Copyright © 2013 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.
Riis, Robert G C; Gudbergsen, Henrik; Henriksen, Marius; Ballegaard, Christine; Bandak, Elisabeth; Röttger, Diana; Bliddal, Henning; Hansen, Bjarke Brandt; Hangaard, Stine; Boesen, Mikael
2016-06-01
To investigate the association between pain and peripatellar-synovitis on static and dynamic contrast-enhanced MRI in knee osteoarthritis. In a cross-sectional setting, knee synovitis was assessed using 3-Tesla MRI and correlated with pain using the knee injury and osteoarthritis outcome score (KOOS). Synovitis was assessed in the peripatellar recesses with: (i) dynamic contrast-enhanced (DCE)-MRI, using both pharmacokinetic and heuristic models, (ii) contrast-enhanced (CE)-MRI, and (iii) non-CE-MRI. The DCE-MRI variable IRExNvoxel was chosen as the primary variable in the analyses. Valid data were available in 94 persons with a mean age of 65 years, a BMI of 32.3kg/m(2) and a mean Kellgren-Lawrence grade of 2.5. IRExNvoxel showed a statically significant correlation with KOOS-Pain (r=-0.34; p=0.001), as was the case with all DCE-variables but one. Correlations between static MRI-variables and KOOS-Pain ranged between -0.21
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... meet the following standards: (1) Address each vulnerability identified in the facility's Security Vulnerability Assessment, and identify and describe the security measures to address each such vulnerability; (2... updates, revises or otherwise alters its Security Vulnerability Assessment pursuant to § 27.215(d), the...
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
Assessing the Security of Connected Diabetes Devices.
Out, Dirk-Jan; Tettero, Olaf
2017-03-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.
Static Analysis of Programming Exercises: Fairness, Usefulness and a Method for Application
ERIC Educational Resources Information Center
Nutbrown, Stephen; Higgins, Colin
2016-01-01
This article explores the suitability of static analysis techniques based on the abstract syntax tree (AST) for the automated assessment of early/mid degree level programming. Focus is on fairness, timeliness and consistency of grades and feedback. Following investigation into manual marking practises, including a survey of markers, the assessment…
Changes of lumbar posture and tissue loading during static trunk bending.
Alessa, Faisal; Ning, Xiaopeng
2018-02-01
Static trunk bending is an occupational risk factor for lower back pain (LBP). When assessing relative short duration trunk bending tasks, existing studies mostly assumed unchanged spine biomechanical responses during task performance. The purpose of the current study was to assess the biomechanical changes of lumbar spine during the performance of relatively short duration, sustained trunk bending tasks. Fifteen participants performed 40-s static trunk bending tasks in two different trunk angles (30° or 60°) with two different hand load levels (0 or 6.8 kg). Results of the current study revealed significantly increased lumbar flexion and lumbar passive moment during the 40 s of trunk bending. Significantly reduced lumbar and abdominal muscle activities were also observed in most conditions. These findings suggest that, during the performance of short duration, static trunk bending tasks, a shift of loading from lumbar active tissues to passive tissues occurs naturally. This mechanism is beneficial in reducing the accumulation of lumbar muscle fatigue; however, lumbar passive tissue creep could be introduced due to prolonged or repetitive exposure. Copyright © 2017 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Krueger, Ronald
2012-01-01
The development of benchmark examples for quasi-static delamination propagation prediction is presented. The example is based on a finite element model of the Mixed-Mode Bending (MMB) specimen for 50% mode II. The benchmarking is demonstrated for Abaqus/Standard, however, the example is independent of the analysis software used and allows the assessment of the automated delamination propagation prediction capability in commercial finite element codes based on the virtual crack closure technique (VCCT). First, a quasi-static benchmark example was created for the specimen. Second, starting from an initially straight front, the delamination was allowed to propagate under quasi-static loading. Third, the load-displacement as well as delamination length versus applied load/displacement relationships from a propagation analysis and the benchmark results were compared, and good agreement could be achieved by selecting the appropriate input parameters. The benchmarking procedure proved valuable by highlighting the issues associated with choosing the input parameters of the particular implementation. Overall, the results are encouraging, but further assessment for mixed-mode delamination fatigue onset and growth is required.
Zahl, D A; Schrader, S M; Edwards, P C
2018-05-01
This exploratory study evaluated student perceptions of their ability to self- and peer assess (i) interpersonal communication skills and (ii) clinical procedures (a head and neck examination) during standardised patient (SP) interactions recorded by Google Glass compared to a static camera. Students compared the Google Glass and static camera recordings using an instrument consisting of 20 Likert-type items and four open- and closed-text items. The Likert-type items asked students to rate how effectively they could assess specific aspects of interpersonal communication and a head and neck examination in these two different types of recordings. The interpersonal communication items included verbal, paraverbal and non-verbal subscales. The open- and closed-text items asked students to report on more globally the differences between the two types of recordings. Descriptive and inferential statistical analyses were conducted for all survey items. An inductive thematic analysis was conducted to determine qualitative emergent themes from the open-text questions. Students found the Glass videos more effective for assessing verbal (t 22 = 2.091, P = 0.048) and paraverbal communication skills (t 22 = 3.304, P = 0.003), whilst they reported that the static camera video was more effective for assessing non-verbal communication skills (t 22 = -2.132, P = 0.044). Four principle themes emerged from the students' open-text responses comparing Glass to static camera recordings for self- and peer assessment: (1) first-person perspective, (2) assessment of non-verbal communication, (3) audiovisual experience and (4) student operation of Glass. Our findings suggest that students perceive that Google Glass is a valuable tool for facilitating self- and peer assessment of SP examinations because of students' perceived ability to emphasise and illustrate communicative and clinical activities from a first-person perspective. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
NASA Technical Reports Server (NTRS)
Minute, Stephen A.
2013-01-01
Mr. Christopher Miller with the Kennedy Space Center (KSC) NASA Safety & Mission Assurance (S&MA) office requested the NASA Engineering and Safety Center's (NESC) technical support on March 15, 2012, to review and make recommendations on the structural analysis being performed for the Orbiter Atlantis static display at the KSC Visitor Center. The principal focus of the assessment was to review the engineering firm's structural analysis for lifting and aligning the orbiter and its static display configuration
Construction and Validation of SRA-FV Need Assessment.
Thornton, David; Knight, Raymond A
2015-08-01
This article describes the construction and testing of a newly designed instrument to assess psychological factors associated with increased rates of sexual recidivism. The new instrument (Structured Risk Assessment-Forensic Version or SRA-FV) was based on previous research using the SRA framework. This article describes the results of testing SRA-FV with a large sample (N = 566) of sexual offenders being evaluated for an early civil commitment program. SRA-FV was found to significantly predict sexual recidivism for both child molesters and rapists and to have incremental predictive value relative to two widely used static actuarial instruments (Static-99R; Risk Matrix 2000/S). © The Author(s) 2013.
33 CFR 101.510 - Assessment tools.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Assessment tools. 101.510 Section 101.510 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Other Provisions § 101.510 Assessment tools. Ports, vessels, and facilities...
Assessing the Security of Connected Diabetes Devices
Out, Dirk-Jan; Tettero, Olaf
2017-01-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices. PMID:28264190
Assessing Security of Supply: Three Methods Used in Finland
NASA Astrophysics Data System (ADS)
Sivonen, Hannu
Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.
NASA Astrophysics Data System (ADS)
Xue, Jie; Gui, Dongwei; Lei, Jiaqiang; Sun, Huaiwei; Zeng, Fanjiang; Feng, Xinlong
2017-12-01
Agriculture and the eco-environment are increasingly competing for water. The extension of intensive farmland for ensuring food security has resulted in excessive water exploitation by agriculture. Consequently, this has led to a lack of water supply in natural ecosystems. This paper proposes a trade-off framework to coordinate the water-use conflict between agriculture and the eco-environment, based on economic compensation for irrigation stakeholders. A hybrid Bayesian network (HBN) is developed to implement the framework, including: (a) agricultural water shortage assessments after meeting environmental flows; (b) water-use tradeoff analysis between agricultural irrigation and environmental flows using the HBN; and (c) quantification of the agricultural economic compensation for different irrigation stakeholders. The constructed HBN is computed by dynamic discretization, which is a more robust and accurate propagation algorithm than general static discretization. A case study of the Qira oasis area in Northwest China demonstrates that the water trade-off based on economic compensation depends on the available water supply and environmental flows at different levels. Agricultural irrigation water extracted for grain crops should be preferentially guaranteed to ensure food security, in spite of higher economic compensation in other cash crops' irrigation for water coordination. Updating water-saving engineering and adopting drip irrigation technology in agricultural facilities after satisfying environmental flows would greatly relieve agricultural water shortage and save the economic compensation for different irrigation stakeholders. The approach in this study can be easily applied in water-stressed areas worldwide for dealing with water competition.
Pavone, Vincenzo; Esposti, Sara Degli
2012-07-01
As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.
A nonlinear auxetic structural vibration damper with metal rubber particles
NASA Astrophysics Data System (ADS)
Ma, Yanhong; Scarpa, Fabrizio; Zhang, Dayi; Zhu, Bin; Chen, Lulu; Hong, Jie
2013-08-01
The work describes the mechanical performance of a metal rubber particles (MRP) damper design based on an auxetic (negative Poisson’s ratio) cellular configuration. The auxetic damper configuration is constituted by an anti-tetrachiral honeycomb, where the cylinders are filled with the MRP material. The MRP samples have been subjected to quasi-static loading to measure the stiffness and loss factor from the static hysteresis curve. A parametric experimental analysis has been carried out to investigate the effect of relative density and filling percentage on the static performance of the MRP, and to identify design guidelines for best use of MRP devices. An experimental assessment of the integrated auxetic-MRP damper concept has been provided through static and dynamic force response techniques.
Technical Evaluation Motor No. 7 (TEM-07)
NASA Technical Reports Server (NTRS)
Hugh, Phil
1991-01-01
Technical Evaluation Motor Number 7 (TEM-7) was a full scale, full-duration static test firing of a high performance motor (HPM) configuration solid rocket motor (SRM) with nozzle vectoring. The static test fire occurred on 11 December 1990 at the Thiokol Corporation Static Test Bay T-97. Documented here are the procedures, performance, and results available through 22 January 1991. Critical post test hardware activities and assessment of the test data are not complete. A completed test report will be submitted 60 days after the test date. Included here is a presentation and discussion of the TEM-7 performance, anomalies, and test result concurrence with the objectives outlined in CTP-0107 Revision A, Space Shuttle Technical Evaluation Motor number 7 (TEM-07) Static Fire Test Plan.
6 CFR 27.255 - Recordkeeping requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... audit required under § 27.225(e)) or Security Vulnerability Assessment, a record of the audit, including... retain records of submitted Top-Screens, Security Vulnerability Assessments, Site Security Plans, and all...
Solution-Processed Carbon Nanotube True Random Number Generator.
Gaviria Rojas, William A; McMorrow, Julian J; Geier, Michael L; Tang, Qianying; Kim, Chris H; Marks, Tobin J; Hersam, Mark C
2017-08-09
With the growing adoption of interconnected electronic devices in consumer and industrial applications, there is an increasing demand for robust security protocols when transmitting and receiving sensitive data. Toward this end, hardware true random number generators (TRNGs), commonly used to create encryption keys, offer significant advantages over software pseudorandom number generators. However, the vast network of devices and sensors envisioned for the "Internet of Things" will require small, low-cost, and mechanically flexible TRNGs with low computational complexity. These rigorous constraints position solution-processed semiconducting single-walled carbon nanotubes (SWCNTs) as leading candidates for next-generation security devices. Here, we demonstrate the first TRNG using static random access memory (SRAM) cells based on solution-processed SWCNTs that digitize thermal noise to generate random bits. This bit generation strategy can be readily implemented in hardware with minimal transistor and computational overhead, resulting in an output stream that passes standardized statistical tests for randomness. By using solution-processed semiconducting SWCNTs in a low-power, complementary architecture to achieve TRNG, we demonstrate a promising approach for improving the security of printable and flexible electronics.
Constructing a resilience index for the Enhanced Critical Infrastructure Protection Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fisher, R. E.; Bassett, G. W.; Buehring, W. A.
2010-10-14
Following recommendations made in Homeland Security Presidential Directive 7, which established a national policy for the identification and increased protection of critical infrastructure and key resources (CIKR) by Federal departments and agencies, the U.S. Department of Homeland Security (DHS) in 2006 developed the Enhanced Critical Infrastructure Protection (ECIP) program. The ECIP program aimed to provide a closer partnership with state, regional, territorial, local, and tribal authorities in fulfilling the national objective to improve CIKR protection. The program was specifically designed to identify protective measures currently in place in CIKR and to inform facility owners/operators of the benefits of new protectivemore » measures. The ECIP program also sought to enhance existing relationships between DHS and owners/operators of CIKR and to build relationships where none existed (DHS 2008; DHS 2009). In 2009, DHS and its protective security advisors (PSAs) began assessing CIKR assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities at their 'weakest link,' allowing for a detailed analysis of the most vulnerable aspects of the facilities (Schneier 2003), while maintaining the ability to produce an overall protective measures picture. The PMI has six main components (physical security, security management, security force, information sharing, protective measures assessments, and dependencies) and focuses on actions taken by a facility to prevent or deter the occurrence of an incident (Argonne National Laboratory 2009). As CIKR continue to be assessed using the PMI/VI and owners/operators better understand how they can prevent or deter incidents, academic research, practitioner emphasis, and public policy formation have increasingly focused on resilience as a necessary component of the risk management framework and infrastructure protection. This shift in focus toward resilience complements the analysis of protective measures by taking into account the three other phases of risk management: mitigation, response, and recovery (Figure 1). Thus, the addition of a robust resilience index (RI) to the established PMI/VI provides vital information to owners/operators throughout the risk management process. Combining a pre-incident focus with a better understanding of resilience, as well as potential consequences from damaged CIKR, allows owners/operators to better understand different ways to decrease risk by (1) increasing physical security measures to prevent an incident, (2) supplementing redundancy to mitigate the effects of an incident, and (3) enhancing emergency action and business continuity planning to increase the effectiveness of recovery procedures. Information provided by the RI methodology is also used by facility owners/operators to better understand how their facilities compare to similar sector/subsector sites and to help them make risk-based decisions. This report provides an overview of the RI methodology developed to estimate resilience and provide resilience comparisons for sectors and subsectors. The information will be used to (1) assist DHS in analyzing existing response and recovery methods and programs at facilities and (2) identify potential ways to increase resilience. The RI methodology is based on principles of Appreciative Inquiry, which is 'the coevolutionary search for the best in people, their organizations, and the relevant world around them' (Cooperrider et al. 2005). Appreciative Inquiry identifies the best of 'what is' and helps to envision 'what might be.' The ECIP program and the RI represent a new model (using Appreciative Inquiry principles) for information sharing between government and industry (Fisher and Petit 2010). A 'dashboard' display, which provides an interactive tool - rather than a static report, presents the results of the RI in a convenient format. Additional resilience measures can be modeled to illustrate how such actions would impact the asset's RI value.« less
School Security Assessment Programme in Australia
ERIC Educational Resources Information Center
Marrapodi, John
2007-01-01
This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... to Facility Vulnerability Assessments and the Integration of Security Systems AGENCY: Coast Guard...-sharing measures. Security System Integration Alternatives Require each MTSA-regulated facility owner or... other forms of security system integration. Information Requested 1. We request comments on the...
6 CFR 13.43 - Collection of civil penalties and assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Collection of civil penalties and assessments. 13.43 Section 13.43 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.43 Collection of civil penalties and assessments. Sections 3806 and 3808...
Regulatory Guide on Conducting a Security Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ek, David R.
This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.
ERIC Educational Resources Information Center
Fisher, Janet M.
Selected electromyographic parameters underlying static postural control in 4, 6, and 8 year old normally and slowly developing children during performance of selected arm movements were studied. Developmental delays in balance control were assessed by the Cashin Test of Motor Development (1974) and/or the Williams Gross Motor Coordination Test…
A unique facility for V/STOL aircraft hover testing. [Langley Impact Dynamics Research Facility
NASA Technical Reports Server (NTRS)
Culpepper, R. G.; Murphy, R. D.; Gillespie, E. A.; Lane, A. G.
1979-01-01
The Langley Impact Dynamics Research Facility (IDRF) was modified to obtain static force and moment data and to allow assessment of aircraft handling qualities during dynamic tethered hover flight. Test probe procedures were also established. Static lift and control measurements obtained are presented along with results of limited dynamic tethered hover flight.
ERIC Educational Resources Information Center
Lamb, Richard; Cavagnetto, Andy; Akmal, Tariq
2016-01-01
A critical problem with the examination of learning in education is that there is an underlying assumption that the dynamic systems associated with student information processing can be measured using static linear assessments. This static linear approach does not provide sufficient ability to characterize learning. Much of the modern research…
The Role of Strategy Knowledge for the Application of Strategies in Complex Problem Solving Tasks
ERIC Educational Resources Information Center
Wüstenberg, Sascha; Stadler, Matthias; Hautamäki, Jarkko; Greiff, Samuel
2014-01-01
Education in the twenty-first century must prepare students to meet the challenges of a dynamic and interconnected world. However, assessment of students' skills tends to focus primarily on static tasks. Therefore, it is not known whether knowledge about successful strategies displayed on static tasks can be transferred to interactive and dynamic…
1985-07-01
mg/l)* Scud (Gammarus fasciatus) 1100 mg/l (840-1300 mg/l)* Algae - FC-203 concentrations mg/I did not prevent the growth of Chlorella ...gairdneri) 1800 mg/l Static Test Marine Organisms 96-Hr. LC 5 0 Mummichog (Fundulus heteroclitus) 1820 mg/l Static Test Grass shrimp (Palaemonetes vulgaris
Effects of Antiparasitic Treatment on Dynamically and Statically Tested Cognitive Skills over Time
ERIC Educational Resources Information Center
Grigorenko, Elena L.; Sternberg, Robert J.; Jukes, Mathew; Alcock, Katie; Lambo, Jane; Ngorosho, Damaris; Nokes, Catherine; Bundy, Donald A.
2006-01-01
The main objective of this work was to investigate two testing procedures, repeated static tests and dynamic testing, that can more clearly demonstrate the impact of treatment for parasites in children. Rural Tanzanian children were assessed for the presence/absence and burden of helminth parasites and assigned to one of three…
New perspectives in ecosystem services science as instruments to understand environmental securities
Villa, Ferdinando; Voigt, Brian; Erickson, Jon D.
2014-01-01
As societal demand for food, water and other life-sustaining resources grows, the science of ecosystem services (ES) is seen as a promising tool to improve our understanding, and ultimately the management, of increasingly uncertain supplies of critical goods provided or supported by natural ecosystems. This promise, however, is tempered by a relatively primitive understanding of the complex systems supporting ES, which as a result are often quantified as static resources rather than as the dynamic expression of human–natural systems. This article attempts to pinpoint the minimum level of detail that ES science needs to achieve in order to usefully inform the debate on environmental securities, and discusses both the state of the art and recent methodological developments in ES in this light. We briefly review the field of ES accounting methods and list some desiderata that we deem necessary, reachable and relevant to address environmental securities through an improved science of ES. We then discuss a methodological innovation that, while only addressing these needs partially, can improve our understanding of ES dynamics in data-scarce situations. The methodology is illustrated and discussed through an application related to water security in the semi-arid landscape of the Great Ruaha river of Tanzania. PMID:24535393
Okamura, Naomi; Kobayashi, Yo; Sugano, Shigeki; Fujie, Masakatsu G
2017-07-01
Static stretching is widely performed to decrease muscle tone as a part of rehabilitation protocols. Finding out the optimal duration of static stretching is important to minimize the time required for rehabilitation therapy and it would be helpful for maintaining the patient's motivation towards daily rehabilitation tasks. Several studies have been conducted for the evaluation of static stretching; however, the recommended duration of static stretching varies widely between 15-30 s in general, because the traditional methods for the assessment of muscle tone do not monitor the continuous change in the target muscle's state. We have developed a method to monitor the viscoelasticity of one muscle continuously during static stretching, using a wearable indentation tester. In this study, we investigated a suitable signal processing method to detect the time required to change the muscle tone, utilizing the data collected using a wearable indentation tester. By calculating a viscoelastic index with a certain time window, we confirmed that the stretching duration required to bring about a decrease in muscle tone could be obtained with an accuracy in the order of 1 s.
Merritt, Eric D; Brown, Cathleen N; Queen, Robin M; Simpson, Kathy J; Schmidt, Julianne D
2017-11-01
Dynamic balance deficits exist following a concussion, sometimes years after injury. However, clinicians lack practical tools for assessing dynamic balance. To determine if there are significant differences in static and dynamic balance performance between individuals with and without a history of concussion. Cross sectional. Clinical research laboratory. 45 collegiate student-athletes with a history of concussion (23 males, 22 females; age = 20.0 ± 1.4 y; height = 175.8 ± 11.6 cm; mass = 76.4 ± 19.2 kg) and 45 matched controls with no history of concussion (23 males, 22 females; age = 20.0 ± 1.3 y; height = 178.8 ± 13.2 cm; mass = 75.7 ± 18.2 kg). Participants completed a static (Balance Error Scoring System) and dynamic (Y Balance Test-Lower Quarter) balance assessment. A composite score was calculated from the mean normalized Y Balance Test-Lower Quarter reach distances. Firm, foam, and overall errors were counted during the Balance Error Scoring System by a single reliable rater. One-way ANOVAs were used to compare balance performance between groups. Pearson's correlations were performed to determine the relationship between the time since the most recent concussion and balance performance. A Bonferonni adjusted a priori α < 0.025 was used for all analyses. Static and dynamic balance performance did not significantly differ between groups. No significant correlation was found between the time since the most recent concussion and balance performance. Collegiate athletes with a history of concussion do not present with static or dynamic balance deficits when measured using clinical assessments. More research is needed to determine whether the Y Balance Test-Lower Quarter is sensitive to acute balance deficits following concussion.
ERIC Educational Resources Information Center
Davies, Patrick T.; Forman, Evan M.; Rasi, Jennifer A.; Stevens, Kristopher I.
2002-01-01
Evaluated new self-report measure assessing children's strategies for preserving emotional security in context of interparental conflict. Factor analyses of the Security in the Interparental Subsystem (SIS) Scale supported a 7-factor solution. The SIS demonstrated satisfactory internal consistency and test-retest reliability. Support for test…
9 CFR 121.7 - Registration and related security risk assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Registration and related security risk..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.7 Registration and related security risk... Administrator or the HHS Secretary based on a security risk assessment by the Attorney General: (i) The...
NASA Astrophysics Data System (ADS)
Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena
2017-10-01
The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.
Reliability and validity of the Microsoft Kinect for evaluating static foot posture
2013-01-01
Background The evaluation of foot posture in a clinical setting is useful to screen for potential injury, however disagreement remains as to which method has the greatest clinical utility. An inexpensive and widely available imaging system, the Microsoft Kinect™, may possess the characteristics to objectively evaluate static foot posture in a clinical setting with high accuracy. The aim of this study was to assess the intra-rater reliability and validity of this system for assessing static foot posture. Methods Three measures were used to assess static foot posture; traditional visual observation using the Foot Posture Index (FPI), a 3D motion analysis (3DMA) system and software designed to collect and analyse image and depth data from the Kinect. Spearman’s rho was used to assess intra-rater reliability and concurrent validity of the Kinect to evaluate foot posture, and a linear regression was used to examine the ability of the Kinect to predict total visual FPI score. Results The Kinect demonstrated moderate to good intra-rater reliability for four FPI items of foot posture (ρ = 0.62 to 0.78) and moderate to good correlations with the 3DMA system for four items of foot posture (ρ = 0.51 to 0.85). In contrast, intra-rater reliability of visual FPI items was poor to moderate (ρ = 0.17 to 0.63), and correlations with the Kinect and 3DMA systems were poor (absolute ρ = 0.01 to 0.44). Kinect FPI items with moderate to good reliability predicted 61% of the variance in total visual FPI score. Conclusions The majority of the foot posture items derived using the Kinect were more reliable than the traditional visual assessment of FPI, and were valid when compared to a 3DMA system. Individual foot posture items recorded using the Kinect were also shown to predict a moderate degree of variance in the total visual FPI score. Combined, these results support the future potential of the Kinect to accurately evaluate static foot posture in a clinical setting. PMID:23566934
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Risk assessment reporting requirements for registered government securities brokers and dealers. 405.5 Section 405.5 Commodity and... OF 1934 REPORTS AND AUDIT § 405.5 Risk assessment reporting requirements for registered government...
6 CFR 13.31 - Determining the amount of penalties and assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determining the amount of penalties and assessments. 13.31 Section 13.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.31 Determining the amount of penalties and assessments. (a) In...
6 CFR 13.3 - Basis for civil penalties and assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Basis for civil penalties and assessments. 13.3 Section 13.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.3 Basis for civil penalties and assessments. (a) Claims. (1) Except as provided in...
Bible, J; Emery, R J; Williams, T; Wang, S
2006-11-01
Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
CFD Assessment of Aerodynamic Degradation of a Subsonic Transport Due to Airframe Damage
NASA Technical Reports Server (NTRS)
Frink, Neal T.; Pirzadeh, Shahyar Z.; Atkins, Harold L.; Viken, Sally A.; Morrison, Joseph H.
2010-01-01
A computational study is presented to assess the utility of two NASA unstructured Navier-Stokes flow solvers for capturing the degradation in static stability and aerodynamic performance of a NASA General Transport Model (GTM) due to airframe damage. The approach is to correlate computational results with a substantial subset of experimental data for the GTM undergoing progressive losses to the wing, vertical tail, and horizontal tail components. The ultimate goal is to advance the probability of inserting computational data into the creation of advanced flight simulation models of damaged subsonic aircraft in order to improve pilot training. Results presented in this paper demonstrate good correlations with slope-derived quantities, such as pitch static margin and static directional stability, and incremental rolling moment due to wing damage. This study further demonstrates that high fidelity Navier-Stokes flow solvers could augment flight simulation models with additional aerodynamic data for various airframe damage scenarios.
Advances in the assessment and prediction of interpersonal violence.
Mills, Jeremy F
2005-02-01
This article underscores the weakness of clinical judgment as a mechanism for prediction with examples from other areas in the psychological literature. Clinical judgment has as its Achilles'heel the reliance on a person to incorporate multiple pieces of information while overcoming human judgment errors--a feat insurmountable thus far. The actuarial approach to risk assessment has overcome many of the weaknesses of clinical judgment and has been shown to be a much superior method. Nonetheless, the static/historical nature of the risk factors associated with most actuarial approaches is limiting. Advances in risk prediction will be found in part in the development of dynamic actuarial instruments that will measure both static/historical and changeable risk factors. The dynamic risk factors can be reevaluated on an ongoing basis, and it is proposed that the level of change in dynamic factors necessary to represent a significant change in overall risk will be an interactive function with static risk factors.
NASA Astrophysics Data System (ADS)
Frabboni, S.; Grillo, V.; Gazzadi, G. C.; Balboni, R.; Trotta, R.; Polimeni, A.; Capizzi, M.; Martelli, F.; Rubini, S.; Guzzinati, G.; Glas, F.
2012-09-01
Hydrogen incorporation in diluted nitride semiconductors dramatically modifies the electronic and structural properties of the crystal through the creation of nitrogen-hydrogen complexes. We report a convergent beam electron-diffraction characterization of diluted nitride semiconductor-heterostructures patterned at a sub-micron scale and selectively exposed to hydrogen. We present a method to determine separately perpendicular mismatch and static disorder in pristine and hydrogenated heterostructures. The roles of chemical composition and strain on static disorder have been separately assessed.
Complex networks under dynamic repair model
NASA Astrophysics Data System (ADS)
Chaoqi, Fu; Ying, Wang; Kun, Zhao; Yangjun, Gao
2018-01-01
Invulnerability is not the only factor of importance when considering complex networks' security. It is also critical to have an effective and reasonable repair strategy. Existing research on network repair is confined to the static model. The dynamic model makes better use of the redundant capacity of repaired nodes and repairs the damaged network more efficiently than the static model; however, the dynamic repair model is complex and polytropic. In this paper, we construct a dynamic repair model and systematically describe the energy-transfer relationships between nodes in the repair process of the failure network. Nodes are divided into three types, corresponding to three structures. We find that the strong coupling structure is responsible for secondary failure of the repaired nodes and propose an algorithm that can select the most suitable targets (nodes or links) to repair the failure network with minimal cost. Two types of repair strategies are identified, with different effects under the two energy-transfer rules. The research results enable a more flexible approach to network repair.
Kolehmainen, V; Vauhkonen, M; Karjalainen, P A; Kaipio, J P
1997-11-01
In electrical impedance tomography (EIT), difference imaging is often preferred over static imaging. This is because of the many unknowns in the forward modelling which make it difficult to obtain reliable absolute resistivity estimates. However, static imaging and absolute resistivity values are needed in some potential applications of EIT. In this paper we demonstrate by simulation the effects of different error components that are included in the reconstruction of static EIT images. All simulations are carried out in two dimensions with the so-called complete electrode model. Errors that are considered are the modelling error in the boundary shape of an object, errors in the electrode sizes and localizations and errors in the contact impedances under the electrodes. Results using both adjacent and trigonometric current patterns are given.
The Effect of Obstacle Training in Water on Static Balance of Chronic Stroke Patients
Jung, JaeHyun; Lee, JiYeun; Chung, EunJung; Kim, Kyoung
2014-01-01
[Purpose] This study evaluated the effects of water and land-based obstacle training on static balance of chronic stroke patients. [Subjects] The subjects were randomly allocated to an aqua group (n=15) and a land group (n=15). [Methods] Both groups trained for 40 minutes, 3 times a week for 12 weeks. Static balance was assessed by measuring the mean velocities of mediolateral (ML) and anteroposterior (AP), and sway area with the eyes closed. [Results] Following the intervention, both groups showed significant changes in ML velocity, AP velocity, and sway area. The static balance of the aqua group was significantly better than the land group. [Conclusion] The results of this study suggest the feasibility and suitability of obstacle training in water for stroke patients. PMID:24707102
Bauer, C M; Gröger, I; Rupprecht, R; Marcar, V L; Gaßmann, K G
2016-04-01
The role of instrumented balance and gait assessment when screening for prospective fallers is currently a topic of controversial discussion. This study analyzed the association between variables derived from static posturography, instrumented gait analysis and clinical assessments with the occurrence of prospective falls in a sample of community dwelling older people. In this study 84 older people were analyzed. Based on a prospective occurrence of falls, participants were categorized into fallers and non-fallers. Variables derived from clinical assessments, static posturography and instrumented gait analysis were evaluated with respect to the association with the occurrence of prospective falls using a forward stepwise, binary, logistic regression procedure. Fallers displayed a significantly shorter single support time during walking while counting backwards, increased mediolateral to anteroposterior sway amplitude ratio, increased fast mediolateral oscillations and a larger coefficient (Coeff) of sway direction during various static posturography tests. Previous falls were insignificantly associated with the occurrence of prospective falls. Variables derived from posturography and instrumented gait analysis showed significant associations with the occurrence of prospective falls in a sample of community dwelling older adults.
Web technology for emergency medicine and secure transmission of electronic patient records.
Halamka, J D
1998-01-01
The American Heritage dictionary defines the word "web" as "something intricately contrived, especially something that ensnares or entangles." The wealth of medical resources on the World Wide Web is now so extensive, yet disorganized and unmonitored, that such a definition seems fitting. In emergency medicine, for example, a field in which accurate and complete information, including patients' records, is urgently needed, more than 5000 Web pages are available today, whereas fewer than 50 were available in December 1994. Most sites are static Web pages using the Internet to publish textbook material, but new technology is extending the scope of the Internet to include online medical education and secure exchange of clinical information. This article lists some of the best Web sites for use in emergency medicine and then describes a project in which the Web is used for transmission and protection of electronic medical records.
Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study
ERIC Educational Resources Information Center
Zhao, Jensen; Zhao, Sherry Y.
2015-01-01
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Novel aspects of direct laser acceleration of relativistic electrons
NASA Astrophysics Data System (ADS)
Arefiev, Alexey
2015-11-01
Production of energetic electrons is a keystone aspect of ultraintense laser-plasma interactions that underpins a variety of topics and applications, including fast ignition inertial confinement fusion and compact particle and radiation sources. There is a wide range of electron acceleration regimes that depend on the duration of the laser pulse and the plasma density. This talk focuses on the regime in which the plasma is significantly underdense and the laser pulse duration is longer than the electron response time, so that, in contrast to the wakefield acceleration regime, the pulse creates a quasi-static channel in the electron density. Such a regime is of particular interest, since it can naturally arise in experiments with solid density targets where the pre-pulse of an ultraintense laser produces an extended sub-critical pre-plasma. This talk examines the impact of several key factors on electron acceleration by the laser pulse and the resulting electron energy gain. A detailed consideration is given to the role played by: (1) the static longitudinal electric field, (2) the static transverse electric field, (3) the electron injection into the laser pulse, (4) the electromagnetic dispersion, and (5) the static longitudinal magnetic field. It is shown that all of these factors lead, under conditions outlined in the talk, to a considerable electron energy gain that greatly exceeds the ponderomotive limit. The static fields do not directly transfer substantial energy to electrons. Instead, they alter the longitudinal dephasing between the electrons and the laser pulse, which then allows the electrons to gain extra energy from the pulse. The talk will also outline a time-resolution criterion that must be satisfied in order to correctly reproduce these effects in particle-in-cell simulations. Supported by AFOSR Contract No. FA9550-14-1-0045, National Nuclear Security Administration Contract No. DE-FC52-08NA28512, and US Department of Energy Contract No. DE-FG02-04ER54742.
ERIC Educational Resources Information Center
Giagazoglou, Paraskevi; Arabatzi, Fotini; Dipla, Konstantina; Liga, Maria; Kellis, Eleftherios
2012-01-01
The aim of this study was to assess the effects of a hippotherapy program on static balance and strength in adolescents with intellectual disability (ID). Nineteen adolescents with moderate ID were assigned either an experimental group (n = 10) or a control group (n = 9). The experimental group attended a 10-week hippotherapy program. To assess…
Herrera-Rangel, Aline; Aranda-Moreno, Catalina; Mantilla-Ochoa, Teresa; Zainos-Saucedo, Lylia; Jáuregui-Renaud, Kathrine
2014-01-01
To assess the influence of peripheral neuropathy, gender, and obesity on the postural stability of patients with type 2 diabetes mellitus. 151 patients with no history of otology, neurology, or orthopaedic or balance disorders accepted to participate in the study. After a clinical interview and neuropathy assessment, postural stability was evaluated by static posturography (eyes open/closed on hard/soft surface) and the "Up & Go" test. During static posturography, on hard surface, the length of sway was related to peripheral neuropathy, gender, age, and obesity; on soft surface, the length of sway was related to peripheral neuropathy, gender, and age, the influence of neuropathy was larger in males than in females, and closing the eyes increased further the difference between genders. The mean time to perform the "Up & Go" test was 11.6 ± 2.2 sec, with influence of peripheral neuropathy, gender, and age. In order to preserve the control of static upright posture during conditions with deficient sensory input, male patients with type 2 diabetes mellitus with no history of balance disorders may be more vulnerable than females, and obesity may decrease the static postural control in both males and females.
Effect of Intracranial Stenosis Revascularization on Dynamic and Static Cerebral Autoregulation.
Ortega-Gutierrez, Santiago; Samaniego, Edgar A; Huang, Amy; Masurkar, Arjun; Zheng-Lin, Binbin; Derdeyn, Colin P; Hasan, David; Marshall, Randolph; Petersen, Nils
2018-06-01
Severe intracranial stenosis might lead to acute cerebral ischemia. It is imperative to better assess patients who may benefit from immediate reperfusion and blood pressure management to prevent injury to peri-infarct tissue. We assessed cerebral autoregulation using static and dynamic methods in an 81-year-old woman suffering acute cerebral ischemia from severe intracranial stenosis in the petrous segment of the left internal carotid artery (LICA). Static cerebral autoregulation, which is evaluated by magnetic resonance imaging and magnetic resonance perfusion studies showed a progression of infarcts and a large perfusion-diffusion mismatch in the entire LICA territory between the second and third days after onset despite maximized medical therapy. Dynamic methods, including transfer function analysis and mean velocity index, demonstrated an increasingly impaired dynamic cerebral autoregulation (DCA) on the affected side between these days. Revascularization through acute intracranial stenting resulted in improved perfusion in the LICA territory and normalization of both dynamic and static cerebral autoregulation. Thus, DCA, a noninvasive bedside method, may be useful in helping to identify and select patients with large-vessel flow-failure syndromes that would benefit from immediate revascularization of intracranial atherosclerotic disease.
Aftershocks halted by static stress shadows
Toda, Shinji; Stein, Ross S.; Beroza, Gregory C.; Marsan, David
2012-01-01
Earthquakes impart static and dynamic stress changes to the surrounding crust. Sudden fault slip causes small but permanent—static—stress changes, and passing seismic waves cause large, but brief and oscillatory—dynamic—stress changes. Because both static and dynamic stresses can trigger earthquakes within several rupture dimensions of a mainshock, it has proven difficult to disentangle their contributions to the triggering process1–3. However, only dynamic stress can trigger earthquakes far from the source4,5, and only static stress can create stress shadows, where the stress and thus the seismicity rate in the shadow area drops following an earthquake6–9 . Here we calculate the stress imparted by the magnitude 6.1 Joshua Tree and nearby magnitude 7.3 Landers earthquakes that occurred in California in April and June 1992, respectively, and measure seismicity through time. We show that, where the aftershock zone of the first earthquake was subjected to a static stress increase from the second, the seismicity rate jumped. In contrast, where the aftershock zone of the first earthquake fell under the stress shadow of the second and static stress dropped, seismicity shut down. The arrest of seismicity implies that static stress is a requisite element of spatial clustering of large earthquakes and should be a constituent of hazard assessment.
NASA Astrophysics Data System (ADS)
Milojević, Slavka; Stojanovic, Vojislav
2017-04-01
Due to the continuous development of the seismic acquisition and processing method, the increase of the signal/fault ratio always represents a current target. The correct application of the latest software solutions improves the processing results and justifies their development. A correct computation and application of static corrections represents one of the most important tasks in pre-processing. This phase is of great importance for further processing steps. Static corrections are applied to seismic data in order to compensate the effects of irregular topography, the difference between the levels of source points and receipt in relation to the level of reduction, of close to the low-velocity surface layer (weathering correction), or any reasons that influence the spatial and temporal position of seismic routes. The refraction statics method is the most common method for computation of static corrections. It is successful in resolving of both the long-period statics problems and determining of the difference in the statics caused by abrupt lateral changes in velocity in close to the surface layer. XtremeGeo FlatironsTM is a program whose main purpose is computation of static correction through a refraction statics method and allows the application of the following procedures: picking of first arrivals, checking of geometry, multiple methods for analysis and modelling of statics, analysis of the refractor anisotropy and tomography (Eikonal Tomography). The exploration area is located on the southern edge of the Pannonian Plain, in the plain area with altitudes of 50 to 195 meters. The largest part of the exploration area covers Deliblato Sands, where the geological structure of the terrain and high difference in altitudes significantly affects the calculation of static correction. Software XtremeGeo FlatironsTM has powerful visualization and tools for statistical analysis which contributes to significantly more accurate assessment of geometry close to the surface layers and therefore more accurately computed static corrections.
Vaz, Pedro G; Humeau-Heurtier, Anne; Figueiras, Edite; Correia, Carlos; Cardoso, João
2017-12-29
Laser speckle contrast imaging (LSCI) is a non-invasive microvascular blood flow assessment technique with good temporal and spatial resolution. Most LSCI systems, including commercial devices, can perform only qualitative blood flow evaluation, which is a major limitation of this technique. There are several factors that prevent the utilization of LSCI as a quantitative technique. Among these factors, we can highlight the effect of static scatterers. The goal of this work was to study the influence of differences in static and dynamic scatterer concentration on laser speckle correlation and contrast. In order to achieve this, a laser speckle prototype was developed and tested using an optical phantom with various concentrations of static and dynamic scatterers. It was found that the laser speckle correlation could be used to estimate the relative concentration of static/dynamic scatterers within a sample. Moreover, the speckle correlation proved to be independent of the dynamic scatterer velocity, which is a fundamental characteristic to be used in contrast correction.
NASA Astrophysics Data System (ADS)
Vaz, Pedro G.; Humeau-Heurtier, Anne; Figueiras, Edite; Correia, Carlos; Cardoso, João
2018-01-01
Laser speckle contrast imaging (LSCI) is a non-invasive microvascular blood flow assessment technique with good temporal and spatial resolution. Most LSCI systems, including commercial devices, can perform only qualitative blood flow evaluation, which is a major limitation of this technique. There are several factors that prevent the utilization of LSCI as a quantitative technique. Among these factors, we can highlight the effect of static scatterers. The goal of this work was to study the influence of differences in static and dynamic scatterer concentration on laser speckle correlation and contrast. In order to achieve this, a laser speckle prototype was developed and tested using an optical phantom with various concentrations of static and dynamic scatterers. It was found that the laser speckle correlation could be used to estimate the relative concentration of static/dynamic scatterers within a sample. Moreover, the speckle correlation proved to be independent of the dynamic scatterer velocity, which is a fundamental characteristic to be used in contrast correction.
Learning about static electricity and magnetism in a fourth-grade classroom
NASA Astrophysics Data System (ADS)
Henry, David Roy
Students begin to develop mental models to explain electrostatic and magnetic phenomena throughout childhood, middle childhood and high school, although these mental models are often incoherent and unscientific (Borges, Tenico, & Gilbert, 1998; Maloney, 1985). This is a case study of a classroom of grade four students and the mental models of magnetism and static electricity they used during a six-week science unit. The 22 students studied magnetism and static electricity using inquiry activities structured to create an environment where students would be likely to construct powerful scientific ideas (Goldberg & Bendall, 1995). Multiple data sources, including students' writing, student assessments, teacher interviews, student interviews, teacher journals, and classroom video and audio recordings were used to uncover how fourth grade students made sense of static electricity and magnetism before, during, and after instruction. The data were analyzed using a social constructivist framework to determine if students were able to develop target scientific ideas about static electricity and magnetism. In general, students were found to have three core mental models prior to instruction: (1) Static electricity and magnetism are the same "substance"; (2) This substance exists on the surface of a magnet or a charged object and can be rubbed off, and (3) Opposite substances attract. During the activities, students had many opportunities to observe evidence that contradicted these core mental models. Using evidence from direct observations, the students practiced differentiating between evidence and ideas. Through group and class discussions, they developed evidenced-based (scientific) ideas. Final assessments revealed that students were able to construct target ideas such as: (1) static electricity and magnetism are fundamentally different; (2) there are two kinds of static "charge;" (3) magnet-rubbed wires act like a magnet; and (4) opposite substances move toward each other, like substances push away from each other. Some target ideas, such as "Magnetic materials are made up of magnetic domains that align to give an overall magnetic effect" were found to be difficult for students this age to develop. This case study will augment research about effective science teaching, teacher development and the support necessary for curriculum change.
Jankowska, Marta M; Natarajan, Loki; Godbole, Suneeta; Meseck, Kristin; Sears, Dorothy D; Patterson, Ruth E; Kerr, Jacqueline
2017-07-01
Background: Environmental factors may influence breast cancer; however, most studies have measured environmental exposure in neighborhoods around home residences (static exposure). We hypothesize that tracking environmental exposures over time and space (dynamic exposure) is key to assessing total exposure. This study compares breast cancer survivors' exposure to walkable and recreation-promoting environments using dynamic Global Positioning System (GPS) and static home-based measures of exposure in relation to insulin resistance. Methods: GPS data from 249 breast cancer survivors living in San Diego County were collected for one week along with fasting blood draw. Exposure to recreation spaces and walkability was measured for each woman's home address within an 800 m buffer (static), and using a kernel density weight of GPS tracks (dynamic). Participants' exposure estimates were related to insulin resistance (using the homeostatic model assessment of insulin resistance, HOMA-IR) controlled by age and body mass index (BMI) in linear regression models. Results: The dynamic measurement method resulted in greater variability in built environment exposure values than did the static method. Regression results showed no association between HOMA-IR and home-based, static measures of walkability and recreation area exposure. GPS-based dynamic measures of both walkability and recreation area were significantly associated with lower HOMA-IR ( P < 0.05). Conclusions: Dynamic exposure measurements may provide important evidence for community- and individual-level interventions that can address cancer risk inequities arising from environments wherein breast cancer survivors live and engage. Impact: This is the first study to compare associations of dynamic versus static built environment exposure measures with insulin outcomes in breast cancer survivors. Cancer Epidemiol Biomarkers Prev; 26(7); 1078-84. ©2017 AACR . ©2017 American Association for Cancer Research.
Yıldırım, M S; Ozyurek, S; Tosun, Oç; Uzer, S; Gelecek, N
2016-03-01
The aim of this study was to compare the effects of static stretching, proprioceptive neuromuscular facilitation (PNF) stretching and Mulligan technique on hip flexion range of motion (ROM) in subjects with bilateral hamstring tightness. A total of 40 students (mean age: 21.5±1.3 years, mean body height: 172.8±8.2 cm, mean body mass index: 21.9±3.0 kg · m(-2)) with bilateral hamstring tightness were enrolled in this randomized trial, of whom 26 completed the study. Subjects were divided into 4 groups performing (I) typical static stretching, (II) PNF stretching, (III) Mulligan traction straight leg raise (TSLR) technique, (IV) no intervention. Hip flexion ROM was measured using a digital goniometer with the passive straight leg raise test before and after 4 weeks by two physiotherapists blinded to the groups. 52 extremities of 26 subjects were analyzed. Hip flexion ROM increased in all three intervention groups (p<0.05) but not in the no-intervention group after 4 weeks. A statistically significant change in initial-final assessment differences of hip flexion ROM was found between groups (p<0.001) in favour of PNF stretching and Mulligan TSLR technique in comparison to typical static stretching (p=0.016 and p=0.02, respectively). No significant difference was found between Mulligan TSLR technique and PNF stretching (p=0.920). The initial-final assessment difference of hip flexion ROM was similar in typical static stretching and no intervention (p=0.491). A 4-week stretching intervention is beneficial for increasing hip flexion ROM in bilateral hamstring tightness. However, PNF stretching and Mulligan TSLR technique are superior to typical static stretching. These two interventions can be alternatively used for stretching in hamstring tightness.
Ozyurek, S; Tosun, OÇ; Uzer, S; Gelecek, N
2016-01-01
The aim of this study was to compare the effects of static stretching, proprioceptive neuromuscular facilitation (PNF) stretching and Mulligan technique on hip flexion range of motion (ROM) in subjects with bilateral hamstring tightness. A total of 40 students (mean age: 21.5±1.3 years, mean body height: 172.8±8.2 cm, mean body mass index: 21.9±3.0 kg · m-2) with bilateral hamstring tightness were enrolled in this randomized trial, of whom 26 completed the study. Subjects were divided into 4 groups performing (I) typical static stretching, (II) PNF stretching, (III) Mulligan traction straight leg raise (TSLR) technique, (IV) no intervention. Hip flexion ROM was measured using a digital goniometer with the passive straight leg raise test before and after 4 weeks by two physiotherapists blinded to the groups. 52 extremities of 26 subjects were analyzed. Hip flexion ROM increased in all three intervention groups (p<0.05) but not in the no-intervention group after 4 weeks. A statistically significant change in initial–final assessment differences of hip flexion ROM was found between groups (p<0.001) in favour of PNF stretching and Mulligan TSLR technique in comparison to typical static stretching (p=0.016 and p=0.02, respectively). No significant difference was found between Mulligan TSLR technique and PNF stretching (p=0.920). The initial–final assessment difference of hip flexion ROM was similar in typical static stretching and no intervention (p=0.491). A 4-week stretching intervention is beneficial for increasing hip flexion ROM in bilateral hamstring tightness. However, PNF stretching and Mulligan TSLR technique are superior to typical static stretching. These two interventions can be alternatively used for stretching in hamstring tightness. PMID:26929476
Fransz, Duncan P; Huurnink, Arnold; de Boode, Vosse A; Kingma, Idsart; van Dieën, Jaap H
2016-10-01
The single leg drop jump landing test may assess dynamic and static balance abilities in different phases of the landing. However objective definitions of different phases following landing and associated reliability are lacking. Therefore, we determined the existence of possible distinct phases of single leg drop jump landing on a force plate in 82 elite youth soccer players. Three outcome measures were calculated over moving windows of five sizes: center of pressure (COP) speed, COP sway and horizontal ground reaction force (GRF). Per outcome measure, a Factor Analysis was employed with all windows as input variables. It showed that four factors (patterns of variance) largely (>75%) explained the variance across subjects/trials along the 12s time series. Each factor was highly associated with a distinct phase of the time series signal: dynamic (0.4-2.7s), late dynamic (2.5-5.0s), static 1 (5.0-8.3s) and static 2 (8.1-11.7s). Intra-class correlations (ICC) between trials were lower for the dynamic phases (0.45-0.68) than for the static phases (0.60-0.86). The COP speed showed higher ICC's (0.63-0.86) than COP sway (0.45-0.61) and GRF (0.57-0.71) for all four phases. In conclusion, following a drop jump landing unique information is available in four distinct phases. The COP speed is most reliable, with higher reliability in the static phases compared to the dynamic phases. Future studies should assess the sensitivity of information from dynamic, late dynamic and static phases. Copyright © 2016 Elsevier B.V. All rights reserved.
Relative net vertical impulse determines jumping performance.
Kirby, Tyler J; McBride, Jeffrey M; Haines, Tracie L; Dayne, Andrea M
2011-08-01
The purpose of this investigation was to determine the relationship between relative net vertical impulse and jump height in a countermovement jump and static jump performed to varying squat depths. Ten college-aged males with 2 years of jumping experience participated in this investigation (age: 23.3 ± 1.5 years; height: 176.7 ± 4.5 cm; body mass: 84.4 ± 10.1 kg). Subjects performed a series of static jumps and countermovement jumps in a randomized fashion to a depth of 0.15, 0.30, 0.45, 0.60, and 0.75 m and a self-selected depth (static jump depth = 0.38 ± 0.08 m, countermovement jump depth = 0.49 ± 0.06 m). During the concentric phase of each jump, peak force, peak velocity, peak power, jump height, and net vertical impulse were recorded and analyzed. Net vertical impulse was divided by body mass to produce relative net vertical impulse. Increasing squat depth corresponded to a decrease in peak force and an increase in jump height and relative net vertical impulse for both static jump and countermovement jump. Across all depths, relative net vertical impulse was statistically significantly correlated to jump height in the static jump (r = .9337, p < .0001, power = 1.000) and countermovement jump (r = .925, p < .0001, power = 1.000). Across all depths, peak force was negatively correlated to jump height in the static jump (r = -0.3947, p = .0018, power = 0.8831) and countermovement jump (r = -0.4080, p = .0012, power = 0.9050). These results indicate that relative net vertical impulse can be used to assess vertical jump performance, regardless of initial squat depth, and that peak force may not be the best measure to assess vertical jump performance.
Evaluation of Relationship between Trunk Muscle Endurance and Static Balance in Male Students
Barati, Amirhossein; SafarCherati, Afsaneh; Aghayari, Azar; Azizi, Faeze; Abbasi, Hamed
2013-01-01
Purpose Fatigue of trunk muscle contributes to spinal instability over strenuous and prolonged physical tasks and therefore may lead to injury, however from a performance perspective, relation between endurance efficient core muscles and optimal balance control has not been well-known. The purpose of this study was to examine the relationship of trunk muscle endurance and static balance. Methods Fifty male students inhabitant of Tehran university dormitory (age 23.9±2.4, height 173.0±4.5 weight 70.7±6.3) took part in the study. Trunk muscle endurance was assessed using Sørensen test of trunk extensor endurance, trunk flexor endurance test, side bridge endurance test and static balance was measured using single-limb stance test. A multiple linear regression analysis was applied to test if the trunk muscle endurance measures significantly predicted the static balance. Results There were positive correlations between static balance level and trunk flexor, extensor and lateral endurance measures (Pearson correlation test, r=0.80 and P<0.001; r=0.71 and P<0.001; r=0.84 and P<0.001, respectively). According to multiple regression analysis for variables predicting static balance, the linear combination of trunk muscle endurance measures was significantly related to the static balance (F (3,46) = 66.60, P<0.001). Endurance of trunk flexor, extensor and lateral muscles were significantly associated with the static balance level. The regression model which included these factors had the sample multiple correlation coefficient of 0.902, indicating that approximately 81% of the variance of the static balance is explained by the model. Conclusion There is a significant relationship between trunk muscle endurance and static balance. PMID:24800004
Kaliningrad and Baltic Security
2001-06-01
Kennedy-Minott, Thesis Co-Advisor ___________________________________________ James Wirtz , Chairman Department of National Security Affairs iv...39 Jochen Prantl, �Security and Stability in Northern Europe � A Threat Assessment,� Program on the Northern Dimension of the CFSP, 29...www.usis.usemb.se/ wireless/500/eur508.htm Prantl, Jochen . �Security and Stability in Northern Europe � A Threat Assessment.� Program on the Northern Dimension
ERIC Educational Resources Information Center
Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan
2007-01-01
The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…
Code of Federal Regulations, 2012 CFR
2012-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2014 CFR
2014-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2013 CFR
2013-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2011 CFR
2011-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo: Security threat assessments for...
NASA Astrophysics Data System (ADS)
Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji
2018-02-01
Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.
Mehrparvar, Amir Houshang; Mirmohammadi, Seyyed Jalil; Hafezi, Rahmatollah; Mostaghaci, Mehrdad; Davari, Mohammad Hossein
2015-05-01
Anthropometric dimensions of the end users should be measured in order to create a basis for manufacturing of different products. This study was designed to measure some static anthropometric dimensions in Iranian high school students, considering ethnic differences. Nineteen static anthropometric dimensions of high school students were measured and compared among different Iranian ethnicities (Fars, Turk, Kurd, Lor, Baluch, and Arab) and different genders. In this study, 9,476 subjects (4,703 boys and 4,773 girls) ages 15 to 18 years in six ethnicities were assessed. The difference among ethnicities was statistically significant for all dimensions (p values < .001 for each dimension). This study showed statistically significant differences in 19 static anthropometric dimensions among high school students regarding gender, age, and ethnicity. © 2014, Human Factors and Ergonomics Society.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Maurer, M M; Badir, S; Pensalfini, M; Bajka, M; Abitabile, P; Zimmermann, R; Mazza, E
2015-06-25
Measuring the stiffness of the uterine cervix might be useful in the prediction of preterm delivery, a still unsolved health issue of global dimensions. Recently, a number of clinical studies have addressed this topic, proposing quantitative methods for the assessment of the mechanical properties of the cervix. Quasi-static elastography, maximum compressibility using ultrasound and aspiration tests have been applied for this purpose. The results obtained with the different methods seem to provide contradictory information about the physiologic development of cervical stiffness during pregnancy. Simulations and experiments were performed in order to rationalize the findings obtained with ultrasound based, quasi-static procedures. The experimental and computational results clearly illustrate that standardization of quasi-static elastography leads to repeatable strain values, but for different loading forces. Since force cannot be controlled, this current approach does not allow the distinction between a globally soft and stiff cervix. It is further shown that introducing a reference elastomer into the elastography measurement might overcome the problem of force standardization, but a careful mechanical analysis is required to obtain reliable stiffness values for cervical tissue. In contrast, the maximum compressibility procedure leads to a repeatable, semi-quantitative assessment of cervical consistency, due to the nonlinear nature of the mechanical behavior of cervical tissue. The evolution of cervical stiffness in pregnancy obtained with this procedure is in line with data from aspiration tests. Copyright © 2015 Elsevier Ltd. All rights reserved.
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-05-21
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management.
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-01-01
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management. PMID:23698700
Pore-scale modeling of moving contact line problems in immiscible two-phase flow.
NASA Astrophysics Data System (ADS)
Kucala, A.; Noble, D.; Martinez, M. J.
2016-12-01
Two immiscible fluids in static equilibrium form a common interface along a solid surface, characterized as the static contact (wetting) angle and is a function of surface geometry, intermolecular forces, and interfacial surface energies manifested as interfacial tension. This static configuration may become perturbed due to external force imbalances (mass injection, pressure gradients, buoyancy, etc.) and the contact line location and interface curvature becomes dynamic. Accurate modeling of moving contact line (MCL) problems is imperative in predicting capillary pressure vs. saturation curves, permeability, and preferential flow paths for a variety of applications, including geological carbon storage (GCS) and enhanced oil recovery (EOR). Here, we present a model for the moving contact line using pore-scale computational fluid dynamics (CFD) which solves the full, time-dependent Navier-Stokes equations using the Galerkin finite-element method. The MCL is modeled as a surface traction force proportional to the surface tension, dependent on the static properties of the immiscible fluid/solid system. The moving two-phase interface is tracked using the level set method and discretized with the conformal decomposition finite element method (CDFEM), allowing for surface tension effects to be computed at the exact interface location. We present a variety of verification test cases for simple two- and three-dimensional geometries to validate the current model, including threshold pressure predictions in flows through pore-throats for a variety of wetting angles. Simulations involving more complex geometries are also presented to be used in future simulations for GCS and EOR problems. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000
Food Security in India, China, and the World
2016-06-01
undernourishment and projections of food security are made by the United Nations Food and Agricultural Organization (FAO). The FAO has been collecting... agricultural data from individual nations for decades and makes yearly assessments of the current state of food insecurity and periodic projections of...future global food security. The FAO assessment of food security in 2050 presents a likely future based on projections of current agricultural
33 CFR 103.520 - Recordkeeping.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 103.520 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.520 Recordkeeping. (a) All records pertaining to the Area Maritime Security (AMS) Assessment and AMS Plan will be retained by...
Cyber / Physical Security Vulnerability Assessment Integration
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Simpkins, Bret E.
Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less
49 CFR 1554.103 - Security Directives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...
Boosting investor yields through bond insurance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mosbacher, M.L.; Burkhardt, D.A.
The market for utility securities generally tends to be fairly static. Innovative financing techniques are rarely used because of the marketability of utility securities stemming from the companies' generally strong financial credit and the monopoly markets most utilities serve. To many people, utility securities are considered the pillars of the financial world, and innovation is not needed. Further, plain vanilla utility issues are easily understood by investors, as well as by regulators and customers. Over the past several years, however, a new utility bond product has crept into the world of utility securities - insured secondary utility bonds. These insuredmore » bonds may possibly be used as an alternative financing technique for newly issued debt. Individual investors often tend to rely on insurance as a tool for reducing credit risk and are willing to take the lower yields as a tradeoff. Insured utility bonds are created by brokerage firms through the acqusition of a portion of an outstanding utility bond issue and subsequent solicitation of the insurance companies for bids. The insurance company then agrees to insure that portion of the issue until maturity for a fee, and the brokerage firm sells those bonds to their customers as a AAA-insured bond. Issuers are encouraged to explore the retail market as a financing alternative. They may find a most cost-effective means of raising capital.« less
Pressure ulcer risk assessment and prevention: a systematic comparative effectiveness review.
Chou, Roger; Dana, Tracy; Bougatsos, Christina; Blazina, Ian; Starmer, Amy J; Reitel, Katie; Buckley, David I
2013-07-02
Pressure ulcers are associated with substantial health burdens but may be preventable. To review the clinical utility of pressure ulcer risk assessment instruments and the comparative effectiveness of preventive interventions in persons at higher risk. MEDLINE (1946 through November 2012), CINAHL, the Cochrane Library, grant databases, clinical trial registries, and reference lists. Randomized trials and observational studies on effects of using risk assessment on clinical outcomes and randomized trials of preventive interventions on clinical outcomes. Multiple investigators abstracted and checked study details and quality using predefined criteria. One good-quality trial found no evidence that use of a pressure ulcer risk assessment instrument, with or without a protocolized intervention strategy based on assessed risk, reduces risk for incident pressure ulcers compared with less standardized risk assessment based on nurses' clinical judgment. In higher-risk populations, 1 good-quality and 4 fair-quality randomized trials found that more advanced static support surfaces were associated with lower risk for pressure ulcers compared with standard mattresses (relative risk range, 0.20 to 0.60). Evidence on the effectiveness of low-air-loss and alternating-air mattresses was limited, with some trials showing no clear differences from advanced static support surfaces. Evidence on the effectiveness of nutritional supplementation, repositioning, and skin care interventions versus usual care was limited and had methodological shortcomings, precluding strong conclusions. Only English-language articles were included, publication bias could not be formally assessed, and most studies had methodological shortcomings. More advanced static support surfaces are more effective than standard mattresses for preventing ulcers in higher-risk populations. The effectiveness of formal risk assessment instruments and associated intervention protocols compared with less standardized assessment methods and the effectiveness of other preventive interventions compared with usual care have not been clearly established.
Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding
2015-12-01
ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA ASSISTANCE FUNDING by Craig Mohar December 2015 Thesis Co-Advisors: Kathleen...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ASSESSING GRANT ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA...the Department of Homeland Security (DHS) is critical for building and sustaining preparedness in urban areas. According to the 9/11 Commission Report
ERIC Educational Resources Information Center
Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat
2011-01-01
4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…
Formal assessment instrument for ensuring the security of NASA's networks, systems and software
NASA Technical Reports Server (NTRS)
Gilliam, D. P.; Powell, J. D.; Sherif, J.
2002-01-01
To address the problem of security for NASA's networks, systems and software, NASA has funded the Jet Propulsion Lab in conjunction with UC Davis to begin work on developing a software security assessment instrument for use in the software development and maintenance life cycle.
A Comparative Study of Two Groups of Sex Offenders Identified as High and Low Risk on the Static-99
ERIC Educational Resources Information Center
Coxe, Ray; Holmes, William
2009-01-01
The purpose of this study was to identify possible differences between high- and low-risk sex offenders. The subjects included 285 sex offenders on probation. They were evaluated with the Static-99, Abel Assessment, Raven's, and MMPI-2. A criminal history review identified the number of prior offenses and the age/sex category in the index offense.…
Dynamic 68Ga-DOTATOC PET/CT and static image in NET patients. Correlation of parameters during PRRT.
Van Binnebeek, Sofie; Koole, Michel; Terwinghe, Christelle; Baete, Kristof; Vanbilloen, Bert; Haustermans, Karine; Clement, Paul M; Bogaerts, Kris; Verbruggen, Alfons; Nackaerts, Kris; Van Cutsem, Eric; Verslype, Chris; Mottaghy, Felix M; Deroose, Christophe M
2016-06-28
To investigate the relationship between the dynamic parameters (Ki) and static image-derived parameters of 68Ga-DOTATOC-PET, to determine which static parameter best reflects underlying somatostatin-receptor-expression (SSR) levels on neuroendocrine tumours (NETs). 20 patients with metastasized NETs underwent a dynamic and static 68Ga-DOTATOC-PET before PRRT and at 7 and 40 weeks after the first administration of 90Y-DOTATOC (in total 4 cycles were planned); 175 lesions were defined and analyzed on the dynamic as well as static scans. Quantitative analysis was performed using the software PMOD. One to five target lesions per patient were chosen and delineated manually on the baseline dynamic scan and further, on the corresponding static 68Ga-DOTATOC-PET and the dynamic and static 68Ga-DOTATOC-PET at the other time-points; SUVmax and SUVmean of the lesions was assessed on the other six scans. The input function was retrieved from the abdominal aorta on the images. Further on, Ki was calculated using the Patlak-Plot. At last, 5 reference regions for normalization of SUVtumour were delineated on the static scans resulting in 5 ratios (SUVratio). SUVmax and SUVmean of the tumoural lesions on the dynamic 68Ga-DOTATOC-PET had a very strong correlation with the corresponding parameters in the static scan (R²: 0.94 and 0.95 respectively). SUVmax, SUVmean and Ki of the lesions showed a good linear correlation; the SUVratios correlated poorly with Ki. A significantly better correlation was noticed between Ki and SUVtumour(max and mean) (p < 0.0001). As the dynamic parameter Ki correlates best with the absolute SUVtumour, SUVtumour best reflects underlying SSR-levels in NETs.
Carlson, Victor R; Sheehan, Frances T; Shen, Aricia; Yao, Lawrence; Jackson, Jennifer N; Boden, Barry P
2017-07-01
The tibial tubercle to trochlear groove (TT-TG) distance is used for screening patients with a variety of patellofemoral joint disorders to determine who may benefit from patellar medialization using a tibial tubercle osteotomy. Clinically, the TT-TG distance is predominately based on static imaging with the knee in full extension; however, the predictive ability of this measure for dynamic patellar tracking patterns is unknown. To determine whether the static TT-TG distance can predict dynamic lateral displacement of the patella. Cohort study (Diagnosis); Level of evidence, 2. The static TT-TG distance was measured at full extension for 70 skeletally mature subjects with (n = 32) and without (n = 38) patellofemoral pain. The dynamic patellar tracking patterns were assessed from approximately 45° to 0° of knee flexion by use of dynamic cine-phase contrast magnetic resonance imaging. For each subject, the value of dynamic lateral tracking corresponding to the exact knee angle measured in the static images for that subject was identified. Linear regression analysis determined the predictive ability of static TT-TG distance for dynamic patellar lateral displacement for each cohort. The static TT-TG distance measured with the knee in full extension cannot accurately predict dynamic lateral displacement of the patella. There was weak predictive ability among subjects with patellofemoral pain ( r 2 = 0.18, P = .02) and no predictive capability among controls. Among subjects with patellofemoral pain and static TT-TG distances 15 mm or more, 8 of 13 subjects (62%) demonstrated neutral or medial patellar tracking patterns. The static TT-TG distance cannot accurately predict dynamic lateral displacement of the patella. A large percentage of patients with patellofemoral pain and pathologically large TT-TG distances may have neutral to medial maltracking patterns.
Mogk, Jeremy P M; Rogers, Lynn M; Murray, Wendy M; Perreault, Eric J; Stinear, James W
2014-10-01
We investigated how multi-joint changes in static upper limb posture impact the corticomotor excitability of the posterior deltoid (PD) and biceps brachii (BIC), and evaluated whether postural variations in excitability related directly to changes in target muscle length. The amplitude of individual motor evoked potentials (MEPs) was evaluated in each of thirteen different static postures. Four functional postures were investigated that varied in shoulder and elbow angle, while the forearm was positioned in each of three orientations. Posture-related changes in muscle lengths were assessed using a biomechanical arm model. Additionally, M-waves were evoked in the BIC in each of three forearm orientations to assess the impact of posture on recorded signal characteristics. BIC-MEP amplitudes were altered by shoulder and elbow posture, and demonstrated robust changes according to forearm orientation. Observed changes in BIC-MEP amplitudes exceeded those of the M-waves. PD-MEP amplitudes changed predominantly with shoulder posture, but were not completely independent of influence from forearm orientation. Results provide evidence that overall corticomotor excitability can be modulated according to multi-joint upper limb posture. The ability to alter motor pathway excitability using static limb posture suggests the importance of posture selection during rehabilitation aimed at retraining individual muscle recruitment and/or overall coordination patterns. Published by Elsevier Ireland Ltd.
Static balance according to hip joint angle of unsupported leg during one-leg standing.
Cha, Ju-Hyung; Kim, Jang-Joon; Ye, Jae-Gwan; Lee, Seul-Ji; Hong, Jeong-Mi; Choi, Hyun-Kyu; Choi, Ho-Suk; Shin, Won-Seob
2017-05-01
[Purpose] This study aimed to determine static balance according to hip joint angle of the unsupported leg during one-leg standing. [Subjects and Methods] Subjects included 45 healthy adult males and females in their 20s. During one-leg standing on the non-dominant leg, the position of the unsupported leg was classified according to hip joint angles of point angle was class. Static balance was then measured using a force plate with eyes open and closed. The total length, sway velocity, maximum deviation, and velocity on the mediolateral and anteroposterior axes of center of pressure were measured. [Results] In balance assessment with eyes open, there were significant differences between groups according to hip joint angle, except for maximum deviation on the anteroposterior axis. In balance assessment with eyes closed, there were significant differences between total length measurements at 0° and 30°, 60° and between 30° and 90°. There were significant differences between sway velocity measurements at 0° and 30° and between 30° and 90°. [Conclusion] Thus, there were differences in static balance according to hip joint angle. It is necessary to clearly identify the hip joint angle during one-leg standing testing.
Effect of armor and carrying load on body balance and leg muscle function.
Park, Huiju; Branson, Donna; Kim, Seonyoung; Warren, Aric; Jacobson, Bert; Petrova, Adriana; Peksoz, Semra; Kamenidis, Panagiotis
2014-01-01
This study investigated the impact of weight and weight distribution of body armor and load carriage on static body balance and leg muscle function. A series of human performance tests were conducted with seven male, healthy, right-handed military students in seven garment conditions with varying weight and weight distributions. Static body balance was assessed by analyzing the trajectory of center of plantar pressure and symmetry of weight bearing in the feet. Leg muscle functions were assessed by analyzing the peak electromyography amplitude of four selected leg muscles during walking. Results of this study showed that uneven weight distribution of garment and load beyond an additional 9 kg impaired static body balance as evidenced by increased sway of center of plantar pressure and asymmetry of weight bearing in the feet. Added weight on non-dominant side of the body created greater impediment to static balance. Increased garment weight also elevated peak EMG amplitude in the rectus femoris to maintain body balance and in the medial gastrocnemius to increase propulsive force. Negative impacts on balance and leg muscle function with increased carrying loads, particularly with an uneven weight distribution, should be stressed to soldiers, designers, and sports enthusiasts. Copyright © 2013 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Krueger, Ronald
2012-01-01
The development of benchmark examples for quasi-static delamination propagation prediction is presented and demonstrated for a commercial code. The examples are based on finite element models of the Mixed-Mode Bending (MMB) specimen. The examples are independent of the analysis software used and allow the assessment of the automated delamination propagation prediction capability in commercial finite element codes based on the virtual crack closure technique (VCCT). First, quasi-static benchmark examples were created for the specimen. Second, starting from an initially straight front, the delamination was allowed to propagate under quasi-static loading. Third, the load-displacement relationship from a propagation analysis and the benchmark results were compared, and good agreement could be achieved by selecting the appropriate input parameters. Good agreement between the results obtained from the automated propagation analysis and the benchmark results could be achieved by selecting input parameters that had previously been determined during analyses of mode I Double Cantilever Beam and mode II End Notched Flexure specimens. The benchmarking procedure proved valuable by highlighting the issues associated with choosing the input parameters of the particular implementation. Overall the results are encouraging, but further assessment for mixed-mode delamination fatigue onset and growth is required.
Effect of musical training on static and dynamic measures of spectral-pattern discrimination.
Sheft, Stanley; Smayda, Kirsten; Shafiro, Valeriy; Maddox, W Todd; Chandrasekaran, Bharath
2013-06-01
Both behavioral and physiological studies have demonstrated enhanced processing of speech in challenging listening environments attributable to musical training. The relationship, however, of this benefit to auditory abilities as assessed by psychoacoustic measures remains unclear. Using tasks previously shown to relate to speech-in-noise perception, the present study evaluated discrimination ability for static and dynamic spectral patterns by 49 listeners grouped as either musicians or nonmusicians. The two static conditions measured the ability to detect a change in the phase of a logarithmic sinusoidal spectral ripple of wideband noise with ripple densities of 1.5 and 3.0 cycles per octave chosen to emphasize either timbre or pitch distinctions, respectively. The dynamic conditions assessed temporal-pattern discrimination of 1-kHz pure tones frequency modulated by different lowpass noise samples with thresholds estimated in terms of either stimulus duration or signal-to-noise ratio. Musicians performed significantly better than nonmusicians on all four tasks. Discriminant analysis showed that group membership was correctly predicted for 88% of the listeners with the structure coefficient of each measure greater than 0.51. Results suggest that enhanced processing of static and dynamic spectral patterns defined by low-rate modulation may contribute to the relationship between musical training and speech-in-noise perception. [Supported by NIH.].
A solution to the static frame validation challenge problem using Bayesian model selection
Grigoriu, M. D.; Field, R. V.
2007-12-23
Within this paper, we provide a solution to the static frame validation challenge problem (see this issue) in a manner that is consistent with the guidelines provided by the Validation Challenge Workshop tasking document. The static frame problem is constructed such that variability in material properties is known to be the only source of uncertainty in the system description, but there is ignorance on the type of model that best describes this variability. Hence both types of uncertainty, aleatoric and epistemic, are present and must be addressed. Our approach is to consider a collection of competing probabilistic models for themore » material properties, and calibrate these models to the information provided; models of different levels of complexity and numerical efficiency are included in the analysis. A Bayesian formulation is used to select the optimal model from the collection, which is then used for the regulatory assessment. Lastly, bayesian credible intervals are used to provide a measure of confidence to our regulatory assessment.« less
Propfan test assessment propfan propulsion system static test report
NASA Technical Reports Server (NTRS)
Orourke, D. M.
1987-01-01
The propfan test assessment (PTA) propulsion system successfully completed over 50 hours of extensive static ground tests, including a 36 hour endurance test. All major systems performed as expected, verifying that the large-scale 2.74 m diameter propfan, engine, gearbox, controls, subsystems, and flight instrumentation will be satisfactory with minor modifications for the upcoming PTA flight tests on the GII aircraft in early 1987. A test envelope was established for static ground operation to maintain propfan blade stresses within limits for propfan rotational speeds up to 105 percent and power levels up to 3880 kW. Transient tests verified stable, predictable response of engine power and propfan speed controls. Installed engine TSFC was better than expected, probably due to the excellent inlet performance coupled with the supercharging effect of the propfan. Near- and far-field noise spectra contained three dominant components, which were dependent on power, tip speed, and direction. The components were propfan blade tones, propfan random noise, and compressor/propfan interaction noise. No significant turbine noise or combustion noise was evident.
[Assessment on ecological security spatial differences of west areas of Liaohe River based on GIS].
Wang, Geng; Wu, Wei
2005-09-01
Ecological security assessment and early warning research have spatiality; non-linearity; randomicity, it is needed to deal with much spatial information. Spatial analysis and data management are advantages of GIS, it can define distribution trend and spatial relations of environmental factors, and show ecological security pattern graphically. The paper discusses the method of ecological security spatial differences of west areas of Liaohe River based on GIS and ecosystem non-health. First, studying on pressure-state-response (P-S-R) assessment indicators system, investigating in person and gathering information; Second, digitizing the river, applying fuzzy AHP to put weight, quantizing and calculating by fuzzy comparing; Last, establishing grid data-base; expounding spatial differences of ecological security by GIS Interpolate and Assembly.
Common Operating Picture: UAV Security Study
NASA Technical Reports Server (NTRS)
2004-01-01
This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.
Uncovering the Dynamic in Static Assessment Interaction
ERIC Educational Resources Information Center
Muskett, Tom; Body, Richard; Perkins, Mick
2012-01-01
Traditional approaches to standardized assessment are underpinned by the assumption that between-assessor variation in delivery can effectively be eliminated. However, fine-grained analyses of the administration of such assessments (e.g. Maynard and Marlaire, 1992) have established that significant subtle interactional variations occur even in…
Krahmann, Elke
2017-12-01
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity - that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors.
Feeney, Brooke C.; Collins, Nancy L.; Van Vleet, Meredith; Tomlinson, Jennifer
2015-01-01
This investigation examined the importance of underlying motivations in predicting secure base support behavior, as well as the extent to which support motivations are predicted by individual differences in attachment orientation. Participants were 189 married couples who participated in two laboratory sessions: During a questionnaire session, couples completed assessments of their underlying motivations for providing, and for not providing, support for their partner's exploration (i.e., goal-strivings), as well as assessments of their typical secure base support behavior. In an observational session, couples engaged in a discussion of one member's personal goals, during which the partner's secure base support was assessed. Results revealed a variety of distinct motivations for providing, and for not providing, secure base support to one's partner, as well as theoretically expected links between these motivations and both secure base behavior and attachment orientation. This work establishes motivations as important mechanisms that underlie the effective or ineffective provision of relational support. PMID:23581972
Krahmann, Elke
2017-01-01
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity – that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors. PMID:29276346
33 CFR 101.405 - Maritime Security (MARSEC) Directives.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...
Oyarzo, Claudio A; Villagrán, Claudio R; Silvestre, Rony E; Carpintero, Pedro; Berral, Francisco J
2014-01-01
Although current research findings suggest that postural control or static balance is impaired in subjects with low back pain, few studies have specifically addressed the effect of low back pain on static balance in elite athletes. Forty-four athletes belonging to Chilean national teams took part in this study; 20 had low back pain and the remaining 24 were healthy controls. Displacement of the centre of pressure was analyzed by computerized platform posturography, using a standardized protocol; subjects were required to stand upright on both feet, with eyes first open then closed. The results showed that, athletes with low back pain used significantly more energy (p< 0.0182) and had a greater displacement of the centre of pressure (p< 0.005) with open eyes to control posture than healthy athletes. It may be concluded that static balance is impaired in elite athletes with low back pain and that analysis of two-footed stance provides a sensitive assessment of static balance in athletes.
Static postural control among school-aged youth with Down syndrome: A systematic review.
Maïano, Christophe; Hue, Olivier; Tracey, Danielle; Lepage, Geneviève; Morin, Alexandre J S; Moullec, Grégory
2018-05-01
Youth with Down syndrome are characterized by motor delays when compared to typically developing (TD) youth, which may be explained by a lower postural control or reduced postural tone. In the present article, we summarize research comparing the static postural control, assessed by posturography, between youth with Down syndrome and TD youth. A systematic literature search was performed in 10 databases and seven studies, published between 2001 and 2017, met our inclusion criteria. Based on the present reviewed findings, it is impossible to conclude that children with Down syndrome present significantly lower static postural control compared to TD children. In contrast, findings showed that adolescents with Down syndrome tended to present significantly lower static postural control compared to TD adolescents when visual and plantar cutaneous inputs were disturbed separately or simultaneously. The present findings should be interpreted with caution given the limitations of the small number of reviewed studies. Therefore, the static postural control among youth with Down syndrome should be further investigated in future rigorous studies examining the contribution of a range of sensory information. Copyright © 2018 Elsevier B.V. All rights reserved.
Microbial communities acclimate to recurring changes in soil redox potential status
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeAngelis, Kristen M.; Silver, Whendee; Thompson, Andrew
Rapidly fluctuating environmental conditions can significantly stress organisms, particularly when fluctuations cross thresholds of normal physiological tolerance. Redox potential fluctuations are common in humid tropical soils, and microbial community acclimation or avoidance strategies for survival will in turn shape microbial community diversity and biogeochemistry. To assess the extent to which indigenous bacterial and archaeal communities are adapted to changing in redox potential, soils were incubated under static anoxic, static oxic or fluctuating redox potential conditions, and the standing (DNA-based) and active (RNA-based) communities and biogeochemistry were determined. Fluctuating redox potential conditions permitted simultaneous CO{sub 2} respiration, methanogenesis, N{sub 2}O productionmore » and iron reduction. Exposure to static anaerobic conditions significantly changed community composition, while 4-day redox potential fluctuations did not. Using RNA: DNA ratios as a measure of activity, 285 taxa were more active under fluctuating than static conditions, compared with three taxa that were more active under static compared with fluctuating conditions. These data suggest an indigenous microbialcommunity adapted to fluctuating redox potential.« less
Fast algorithm for radio propagation modeling in realistic 3-D urban environment
NASA Astrophysics Data System (ADS)
Rauch, A.; Lianghai, J.; Klein, A.; Schotten, H. D.
2015-11-01
Next generation wireless communication systems will consist of a large number of mobile or static terminals and should be able to fulfill multiple requirements depending on the current situation. Low latency and high packet success transmission rates should be mentioned in this context and can be summarized as ultra-reliable communications (URC). Especially for domains like mobile gaming, mobile video services but also for security relevant scenarios like traffic safety, traffic control systems and emergency management URC will be more and more required to guarantee a working communication between the terminals all the time.
Method for packing chromatographic beds
Freeman, David H.; Angeles, Rosalie M.; Keller, Suzanne
1991-01-01
Column chromatography beds are packed through the application of static force. A slurry of the chromatography bed material and a non-viscous liquid is filled into the column plugged at one end, and allowed to settle. The column is transferred to a centrifuge, and centrifuged for a brief period of time to achieve a predetermined packing level, at a range generally of 100-5,000 gravities. Thereafter, the plug is removed, other fixtures may be secured, and the liquid is allowed to flow out through the bed. This results in an evenly packed bed, with no channeling or preferential flow characteristics.
Formal Verification of Large Software Systems
NASA Technical Reports Server (NTRS)
Yin, Xiang; Knight, John
2010-01-01
We introduce a scalable proof structure to facilitate formal verification of large software systems. In our approach, we mechanically synthesize an abstract specification from the software implementation, match its static operational structure to that of the original specification, and organize the proof as the conjunction of a series of lemmas about the specification structure. By setting up a different lemma for each distinct element and proving each lemma independently, we obtain the important benefit that the proof scales easily for large systems. We present details of the approach and an illustration of its application on a challenge problem from the security domain
Dynamic Assessment of Incidental Vocabularies: A Case of Iranian ESP Learners
ERIC Educational Resources Information Center
Hanifi, Sepideh; Nasiri, Mahdi; Aliasin, Hesamuddin
2016-01-01
Dynamic assessment (DA), stemmed from both Vygotsky's (1978) learning theory and Feuerstein's (1979) theory of mediated learning experiences, is an alternative to static assessment. It focuses on both instruction and assessment aiming at promoting learning through mediation. DA has been widely researched in different linguistic areas, but there is…
Su, Hsuan; Chang, Nai-Jen; Wu, Wen-Lan; Guo, Lan-Yuen; Chu, I-Hua
2017-11-01
Foam rolling has been proposed to improve muscle function, performance, and joint range of motion (ROM). However, whether a foam rolling protocol can be adopted as a warm-up to improve flexibility and muscle strength is unclear. To examine and compare the acute effects of foam rolling, static stretching, and dynamic stretching used as part of a warm-up on flexibility and muscle strength of knee flexion and extension. Crossover study. University research laboratory. 15 male and 15 female college students (age 21.43 ± 1.48 y, weight 65.13 ± 12.29 kg, height 166.90 ± 6.99 cm). Isokinetic peak torque was measured during knee extension and flexion at an angular velocity of 60°/second. Flexibility of the quadriceps was assessed by the modified Thomas test, while flexibility of the hamstrings was assessed using the sit-and-reach test. The 3 interventions were performed by all participants in random order on 3 days separated by 48-72 hours. The flexibility test scores improved significantly more after foam rolling as compared with static and dynamic stretching. With regard to muscle strength, only knee extension peak torque (pre vs. postintervention) improved significantly after the dynamic stretching and foam rolling, but not after static stretching. Knee flexion peak torque remained unchanged. Foam rolling is more effective than static and dynamic stretching in acutely increasing flexibility of the quadriceps and hamstrings without hampering muscle strength, and may be recommended as part of a warm-up in healthy young adults.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 17-H, Risk assessment report for brokers and dealers pursuant to section 17(h) of the Securities Exchange Act of 1934 and rules... Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.328T Form 17-H, Risk assessment...
Reduction of the Earth's magnetic field inhibits growth rates of model cancer cell lines.
Martino, Carlos F; Portelli, Lucas; McCabe, Kevin; Hernandez, Mark; Barnes, Frank
2010-12-01
Small alterations in static magnetic fields have been shown to affect certain chemical reaction rates ex vivo. In this manuscript, we present data demonstrating that similar small changes in static magnetic fields between individual cell culture incubators results in significantly altered cell cycle rates for multiple cancer-derived cell lines. This change as assessed by cell number is not a result of apoptosis, necrosis, or cell cycle alterations. While the underlying mechanism is unclear, the implications for all cell culture experiments are clear; static magnetic field conditions within incubators must be considered and/or controlled just as one does for temperature, humidity, and carbon dioxide concentration. Copyright © 2010 Wiley-Liss, Inc.
Malware Mimics for Network Security Assessment
2011-03-01
Master’s Thesis 4 . TITLE AND SUBTITLE Malware Mimics for Network Security Assessment 6. AUTHOR(S) Taff, William R and Salevski, Paul M. 5...Communication Protocol .......................41 viii 4 . Graphical User Interface for MM-Server .......43 C. BUILDING THE TEST PLATFORM...Extension ...............71 2. More Advanced Modules ........................72 3. Increase Scale of Test Bed ...................73 4 . Security
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.10 Restricting access to select agents and toxins; security risk...
SMART Security Cooperation Objectives: Improving DoD Planning and Guidance
2016-01-01
integrate them into a system for assessing, monitoring, and evaluating security cooperation programs and activities. This report evaluates DoD’s...effectiveness in developing SMART security coopera- tion objectives that facilitate assessment, monitoring, and evaluation . It also proposes a systematic...Cooperation Ends, Ways, and Means . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 RAND Evaluation and Revision of Selected
20 CFR 498.102 - Basis for civil monetary penalties and assessments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... assessments. 498.102 Section 498.102 Employees' Benefits SOCIAL SECURITY ADMINISTRATION CIVIL MONETARY... amount of: (i) Monthly insurance benefits under title II of the Social Security Act; or (ii) Benefits or payments under title VIII or title XVI of the Social Security Act; and (2)(i) Knew, or should have known...
76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...
Security risk assessment: applying the concepts of fuzzy logic.
Bajpai, Shailendra; Sachdeva, Anish; Gupta, J P
2010-01-15
Chemical process industries (CPI) handling hazardous chemicals in bulk can be attractive targets for deliberate adversarial actions by terrorists, criminals and disgruntled employees. It is therefore imperative to have comprehensive security risk management programme including effective security risk assessment techniques. In an earlier work, it has been shown that security risk assessment can be done by conducting threat and vulnerability analysis or by developing Security Risk Factor Table (SRFT). HAZOP type vulnerability assessment sheets can be developed that are scenario based. In SRFT model, important security risk bearing factors such as location, ownership, visibility, inventory, etc., have been used. In this paper, the earlier developed SRFT model has been modified using the concepts of fuzzy logic. In the modified SRFT model, two linguistic fuzzy scales (three-point and four-point) are devised based on trapezoidal fuzzy numbers. Human subjectivity of different experts associated with previous SRFT model is tackled by mapping their scores to the newly devised fuzzy scale. Finally, the fuzzy score thus obtained is defuzzyfied to get the results. A test case of a refinery is used to explain the method and compared with the earlier work.
Assessment of reliability of CAD-CAM tooth-colored implant custom abutments.
Guilherme, Nuno Marques; Chung, Kwok-Hung; Flinn, Brian D; Zheng, Cheng; Raigrodski, Ariel J
2016-08-01
Information is lacking about the fatigue resistance of computer-aided design and computer-aided manufacturing (CAD-CAM) tooth-colored implant custom abutment materials. The purpose of this in vitro study was to investigate the reliability of different types of CAD-CAM tooth-colored implant custom abutments. Zirconia (Lava Plus), lithium disilicate (IPS e.max CAD), and resin-based composite (Lava Ultimate) abutments were fabricated using CAD-CAM technology and bonded to machined titanium-6 aluminum-4 vanadium (Ti-6Al-4V) alloy inserts for conical connection implants (NobelReplace Conical Connection RP 4.3×10 mm; Nobel Biocare). Three groups (n=19) were assessed: group ZR, CAD-CAM zirconia/Ti-6Al-4V bonded abutments; group RC, CAD-CAM resin-based composite/Ti-6Al-4V bonded abutments; and group LD, CAD-CAM lithium disilicate/Ti-6Al-4V bonded abutments. Fifty-seven implant abutments were secured to implants and embedded in autopolymerizing acrylic resin according to ISO standard 14801. Static failure load (n=5) and fatigue failure load (n=14) were tested. Weibull cumulative damage analysis was used to calculate step-stress reliability at 150-N and 200-N loads with 2-sided 90% confidence limits. Representative fractured specimens were examined using stereomicroscopy and scanning electron microscopy to observe fracture patterns. Weibull plots revealed β values of 2.59 for group ZR, 0.30 for group RC, and 0.58 for group LD, indicating a wear-out or cumulative fatigue pattern for group ZR and load as the failure accelerating factor for groups RC and LD. Fractographic observation disclosed that failures initiated in the interproximal area where the lingual tensile stresses meet the compressive facial stresses for the early failure specimens. Plastic deformation of titanium inserts with fracture was observed for zirconia abutments in fatigue resistance testing. Significantly higher reliability was found in group ZR, and no significant differences in reliability were determined between groups RC and LD. Differences were found in the failure characteristics of group ZR between static and fatigue loading. Copyright © 2016 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.
Schmiedchen, Kristina; Petri, Anne-Kathrin; Driessen, Sarah; Bailey, William H
2018-01-01
The construction of high-voltage direct current (HVDC) lines for the long-distance transport of energy is becoming increasingly popular. This has raised public concern about potential environmental impacts of the static electric fields (EF) produced under and near HVDC power lines. As the second part of a comprehensive literature analysis, the aim of this systematic review was to assess the effects of static EF exposure on biological functions in invertebrates and plants and to provide the basis for an environmental impact assessment of such exposures. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) was used to guide the methodological conduct and reporting. Thirty-three studies - 14 invertebrate and 19 plant studies - met the eligibility criteria and were included in this review. The reported behavioral responses of insects and planarians upon exposure strongly suggest that invertebrates are able to perceive the presence of a static EF. Many other studies reported effects on physiological functions that were expressed as, for example, altered metabolic activity or delayed reproductive and developmental stages in invertebrates. In plants, leaf damage, alterations in germination rates, growth and yield, or variations in the concentration of essential elements, for example, have been reported. However, these physiological responses and changes in plant morphology appear to be secondary to surface stimulation by the static EF or caused by concomitant parameters of the electrostatic environment. Furthermore, all of the included studies suffered from methodological flaws, which lowered credibility in the results. At field levels encountered from natural sources or HVDC lines (< 35kV/m), the available data provide reliable evidence that static EF can trigger behavioral responses in invertebrates, but they do not provide evidence for adverse effects of static EF on other biological functions in invertebrates and plants. At far higher field levels (> 35kV/m), adverse effects on physiology and morphology, presumably caused by corona-action, appear to be more likely. Higher quality studies are needed to unravel the role of air ions, ozone, nitric oxide and corona current on alterations in physiological functions and morphology. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.
6 CFR 13.31 - Determining the amount of penalties and assessments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... assessments. 13.31 Section 13.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.31 Determining the amount of penalties and assessments. (a) In determining an appropriate amount of civil penalties and assessments, the ALJ and the Authority Head, upon...
6 CFR 13.31 - Determining the amount of penalties and assessments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... assessments. 13.31 Section 13.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.31 Determining the amount of penalties and assessments. (a) In determining an appropriate amount of civil penalties and assessments, the ALJ and the Authority Head, upon...
6 CFR 13.31 - Determining the amount of penalties and assessments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... assessments. 13.31 Section 13.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.31 Determining the amount of penalties and assessments. (a) In determining an appropriate amount of civil penalties and assessments, the ALJ and the Authority Head, upon...
6 CFR 13.31 - Determining the amount of penalties and assessments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... assessments. 13.31 Section 13.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.31 Determining the amount of penalties and assessments. (a) In determining an appropriate amount of civil penalties and assessments, the ALJ and the Authority Head, upon...
Dynamic and static fatigue of a machinable glass ceramic
NASA Technical Reports Server (NTRS)
Magida, M. B.; Forrest, K. A.; Heslin, T. M.
1984-01-01
The dynamic and static fatigue behavior of a machinable glass ceramic was investigated to assess its susceptibility to stress corrosion-induced delayed failure. Fracture mechanics techniques were used to analyze the results so that lifetime predictions for components of this material could be made. The resistance to subcritical crack growth of this material was concluded to be only moderate and was found to be dependent on the size of its microstructure.
Federal Funding for Health Security in FY2017.
Boddie, Crystal; Watson, Matthew; Sell, Tara Kirk
2016-01-01
This latest article in the Federal Funding for Health Security series assesses FY2017 US government funding in 5 domains critical to strengthening health security: biosecurity, radiological and nuclear security, chemical security, pandemic influenza and emerging infectious disease, and multiple-hazard and general preparedness.
A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship
Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman
2017-01-01
This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451
Dynamically corrected gates for singlet-triplet spin qubits with control-dependent errors
NASA Astrophysics Data System (ADS)
Jacobson, N. Tobias; Witzel, Wayne M.; Nielsen, Erik; Carroll, Malcolm S.
2013-03-01
Magnetic field inhomogeneity due to random polarization of quasi-static local magnetic impurities is a major source of environmentally induced error for singlet-triplet double quantum dot (DQD) spin qubits. Moreover, for singlet-triplet qubits this error may depend on the applied controls. This effect is significant when a static magnetic field gradient is applied to enable full qubit control. Through a configuration interaction analysis, we observe that the dependence of the field inhomogeneity-induced error on the DQD bias voltage can vary systematically as a function of the controls for certain experimentally relevant operating regimes. To account for this effect, we have developed a straightforward prescription for adapting dynamically corrected gate sequences that assume control-independent errors into sequences that compensate for systematic control-dependent errors. We show that accounting for such errors may lead to a substantial increase in gate fidelities. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. DOE's National Nuclear Security Administration under contract DE-AC04-94AL85000.
The effect of spinal curvature on the photogrammetric assessment on static balance in elderly women.
Drzał-Grabiec, Justyna; Rachwał, Maciej; Podgórska-Bednarz, Justyna; Rykała, Justyna; Snela, Sławomir; Truszczyńska, Aleksandra; Trzaskoma, Zbigniew
2014-05-29
Involutional changes to the body in elderly patients affect the shape of the spine and the activity of postural muscles. The purpose of this study was to assess the influence of age-related changes in spinal curvature on postural balance in elderly women. The study population consisted of 90 women, with a mean age of 70 ± 8.01 years. Static balance assessments were conducted on a tensometric platform, and posturographic assessments of body posture were performed using a photogrammetric method based on the Projection Moiré method. The results obtained were analysed using the Spearman's rank correlation coefficient test. We found a statistically significant correlation between body posture and the quality of the balance system response based on the corrective function of the visual system. The shape of the spinal curvature influenced postural stability, as measured by static posturography. Improvement in the quality of the balance system response depended on corrective information from the visual system and proprioceptive information from the paraspinal muscles. The sensitivity of the balance system to the change of centre of pressure location was influenced by the direction of the change in rotation of the shoulder girdle and spine. Development of spinal curvature in the sagittal plane and maintenance of symmetry in the coronal and transverse planes are essential for correct balance control, which in turn is essential for the development of a properly proportioned locomotor system.
Sustainable Food Security Measurement: A Systemic Methodology
NASA Astrophysics Data System (ADS)
Findiastuti, W.; Singgih, M. L.; Anityasari, M.
2017-04-01
Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.
Nelson-Wong, Erika; Appell, Ryan; McKay, Mike; Nawaz, Hannah; Roth, Joanna; Sigler, Robert; Third, Jacqueline; Walker, Mark
2012-04-01
Falls are a leading contributor to disability in older adults. Increased muscle co-contraction in the lower extremities during static and dynamic balance challenges has been associated with aging, and also with a history of falling. Co-contraction during static balance challenges has not been previously linked with performance on clinical tests designed to ascertain fall risk. The purpose of this study was to investigate the relationship between co-contraction about the ankle during static balance challenges with fall risk on a commonly used dynamic balance assessment, the Four Square Step Test (FSST). Twenty-three volunteers (mean age 73 years) performed a series of five static balance challenges (Romberg eyes open/closed, Sharpened Romberg eyes open/closed, and Single Leg Standing) with continuous electromyography (EMG) of bilateral tibialis anterior and gastrocnemius muscles. Participants then completed the FSST and were categorized as 'at-risk' or 'not-at-risk' to fall based on a cutoff time of 12 s. Co-contraction was quantified with co-contraction index (CCI). CCI during narrow base conditions was positively correlated with time to complete FSST. High CCIs during all static balance challenges with the exception of Romberg stance with eyes closed were predictive of being at-risk to fall based on FSST time, odds ratio 19.3. The authors conclude that co-contraction about the ankle during static balance challenges can be predictive of performance on a dynamic balance test.
Brzonkalik, Katrin; Herrling, Tanja; Syldatk, Christoph; Neumann, Anke
2011-05-27
The aim of this study was to determine the influence of different carbon and nitrogen sources on the production of the mycotoxins alternariol (AOH), alternariol monomethyl ether (AME) and tenuazonic acid (TA) by Alternaria alternata at 28°C using a semi-synthetic medium (modified Czapek-Dox broth) supplemented with nitrogen and carbon sources. Additionally the effect of shaken and static cultivation on mycotoxin production was tested. Initial experiments showed a clear dependency between nitrogen depletion and mycotoxin production. To assess whether nitrogen limitation in general or the type of nitrogen source triggers the production, various nitrogen sources including several ammonium/nitrate salts and amino acids were tested. In static culture the production of AOH/AME can be enhanced greatly with phenylalanine whereas some nitrogen sources seem to inhibit the AOH/AME production completely. TA was not significantly affected by the choice of nitrogen source. In shaken culture the overall production of all mycotoxins was lower compared to static cultivation. Furthermore tests with a wide variety of carbon sources including monosaccharides, disaccharides, complex saccharides such as starch as well as glycerol and acetate were performed. In shaken culture AOH was produced when glucose, fructose, sucrose, acetate or mixtures of glucose/sucrose and glucose/acetate were used as carbon sources. AME production was not detected. The use of sodium acetate resulted in the highest AOH production. In static culture AOH production was also stimulated by acetate and the amount is comparable to shaken conditions. Under static conditions production of AOH was lower except when cultivated with acetate. In static cultivation 9 of 14 tested carbon sources induced mycotoxin production compared to 4 in shaken culture. This is the first study which analyses the influence of carbon and nitrogen sources in a semi-synthetic medium and assesses the effects of culture conditions on mycotoxin production by A. alternata. Copyright © 2011 Elsevier B.V. All rights reserved.
DOT National Transportation Integrated Search
2007-01-03
This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...
Federal Funding for Health Security in FY2017
Watson, Matthew; Sell, Tara Kirk
2016-01-01
This latest article in the Federal Funding for Health Security series assesses FY2017 US government funding in 5 domains critical to strengthening health security: biosecurity, radiological and nuclear security, chemical security, pandemic influenza and emerging infectious disease, and multiple-hazard and general preparedness. PMID:27575382
School Security and Crisis Preparedness: Make It Your Business.
ERIC Educational Resources Information Center
Trump, Kenneth S.
1999-01-01
The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…
ERIC Educational Resources Information Center
Brown, Geoffrey L.; Schoppe-Sullivan, Sarah J.; Mangelsdorf, Sarah C.; Neff, Cynthia
2010-01-01
This study examined associations between supportive coparenting and infant-mother and infant-father attachment security. Observed and parent-reported coparenting, and observed maternal and paternal sensitivity were assessed in a sample of 68 families with 3.5-month-old infants. Infant-mother and infant-father attachment security were assessed in…
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2010 CFR
2010-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2011 CFR
2011-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
Zhang, Li; Chen, Ying; Wang, Shu-tao; Men, Ming-xin; Xu, Hao
2015-08-01
Assessment and early warning of land ecological security (LES) in rapidly urbanizing coastal area is an important issue to ensure sustainable land use and effective maintenance of land ecological security. In this study, an index system for the land ecological security of Caofeidian new district was established based on the Pressure-State-Response (P-S-R) model. Initial assessment units of 1 km x 1 km created with the remote sensing data and GIS methods were spatially interpolated to a fine pixel size of 30 m x 30 m, which were combined with the early warning method (using classification tree method) to evaluate the land ecological security of Caofeidian in 2005 and 2013. The early warning level was classed into four categories: security with degradation potential, sub-security with slow degradation, sub-security with rapid degradation, and insecurity. Result indicated that, from 2005 to 2013, the average LES of Caofeidian dropped from 0.55 to 0.52, indicating a degradation of land ecological security from medium security level to medium-low security level. The areas at the levels of insecurity with rapid degradation were mainly located in the rapid urbanization areas, illustrating that rapid expansion of urban construction land was the key factor to the deterioration of the regional land ecological security. Industrial District, Shilihai town and Nanpu saltern, in which the lands at the levels of insecurity and sub-security with rapid degradation or slow degradation accounted for 58.3%, 98.9% and 81.2% of their respective districts, were at the stage of high early warning. Thus, land ecological security regulation for these districts should be strengthened in near future. The study could provide a reference for land use planning and ecological protection of Caofeidian new district.
ERIC Educational Resources Information Center
Smith, Gwendolynn T.
2012-01-01
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
IT security evaluation - “hybrid” approach and risk of its implementation
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.
2018-05-01
It is relevant to evolve processes of evaluation of the IT security nowadays. Creating and application of the common evaluation approaches for an IT component, which are processed by the governmental and civil organizations, are still not solving problem. It is suggested to create a more precise and complex assessment tool for an IT security – the “hybrid” method of the IT security evaluation for a particular object, which is based on a range of adequate assessment tools.
Maternal secure-base scripts and children's attachment security in an adopted sample.
Veríssimo, Manuela; Salvaterra, Fernanda
2006-09-01
Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth. These results complement the findings and conceptual arguments offered by Bowlby and Ainsworth concerning the critical influence of maternal representations of attachment to the quality of attachment security in children.
Addressing the vulnerabilities of pass-thoughts
NASA Astrophysics Data System (ADS)
Fernandez, Gabriel C.; Danko, Amanda S.
2016-05-01
As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.
Network Randomization and Dynamic Defense for Critical Infrastructure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason
2015-04-01
Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and developmentmore » to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.« less
Motion effects in multistatic millimeter-wave imaging systems
NASA Astrophysics Data System (ADS)
Schiessl, Andreas; Ahmed, Sherif Sayed; Schmidt, Lorenz-Peter
2013-10-01
At airport security checkpoints, authorities are demanding improved personnel screening devices for increased security. Active mm-wave imaging systems deliver the high quality images needed for reliable automatic detection of hidden threats. As mm-wave imaging systems assume static scenarios, motion effects caused by movement of persons during the screening procedure can degrade image quality, so very short measurement time is required. Multistatic imaging array designs and fully electronic scanning in combination with digital beamforming offer short measurement time together with high resolution and high image dynamic range, which are critical parameters for imaging systems used for passenger screening. In this paper, operational principles of such systems are explained, and the performance of the imaging systems with respect to motion within the scenarios is demonstrated using mm-wave images of different test objects and standing as well as moving persons. Electronic microwave imaging systems using multistatic sparse arrays are suitable for next generation screening systems, which will support on the move screening of passengers.
A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method
Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei
2016-01-01
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624
Measuring relational security in forensic mental health services
Chester, Verity; Alexander, Regi T.; Morgan, Wendy
2017-01-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515
Measuring relational security in forensic mental health services.
Chester, Verity; Alexander, Regi T; Morgan, Wendy
2017-12-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.
Development and Evaluation of the Diagnostic Power for a Computer-Based Two-Tier Assessment
ERIC Educational Resources Information Center
Lin, Jing-Wen
2016-01-01
This study adopted a quasi-experimental design with follow-up interview to develop a computer-based two-tier assessment (CBA) regarding the science topic of electric circuits and to evaluate the diagnostic power of the assessment. Three assessment formats (i.e., paper-and-pencil, static computer-based, and dynamic computer-based tests) using…
Nguyen, Anh-Dung; Boling, Michelle C; Slye, Carrie A; Hartley, Emily M; Parisi, Gina L
2013-01-01
Accurate, efficient, and reliable measurement methods are essential to prospectively identify risk factors for knee injuries in large cohorts. To determine tester reliability using digital photographs for the measurement of static lower extremity alignment (LEA) and whether values quantified with an electromagnetic motion-tracking system are in agreement with those quantified with clinical methods and digital photographs. Descriptive laboratory study. Laboratory. Thirty-three individuals participated and included 17 (10 women, 7 men; age = 21.7 ± 2.7 years, height = 163.4 ± 6.4 cm, mass = 59.7 ± 7.8 kg, body mass index = 23.7 ± 2.6 kg/m2) in study 1, in which we examined the reliability between clinical measures and digital photographs in 1 trained and 1 novice investigator, and 16 (11 women, 5 men; age = 22.3 ± 1.6 years, height = 170.3 ± 6.9 cm, mass = 72.9 ± 16.4 kg, body mass index = 25.2 ± 5.4 kg/m2) in study 2, in which we examined the agreement among clinical measures, digital photographs, and an electromagnetic tracking system. We evaluated measures of pelvic angle, quadriceps angle, tibiofemoral angle, genu recurvatum, femur length, and tibia length. Clinical measures were assessed using clinically accepted methods. Frontal- and sagittal-plane digital images were captured and imported into a computer software program. Anatomic landmarks were digitized using an electromagnetic tracking system to calculate static LEA. Intraclass correlation coefficients and standard errors of measurement were calculated to examine tester reliability. We calculated 95% limits of agreement and used Bland-Altman plots to examine agreement among clinical measures, digital photographs, and an electromagnetic tracking system. Using digital photographs, fair to excellent intratester (intraclass correlation coefficient range = 0.70-0.99) and intertester (intraclass correlation coefficient range = 0.75-0.97) reliability were observed for static knee alignment and limb-length measures. An acceptable level of agreement was observed between clinical measures and digital pictures for limb-length measures. When comparing clinical measures and digital photographs with the electromagnetic tracking system, an acceptable level of agreement was observed in measures of static knee angles and limb-length measures. The use of digital photographs and an electromagnetic tracking system appears to be an efficient and reliable method to assess static knee alignment and limb-length measurements.
NASA Astrophysics Data System (ADS)
Humber, M. L.; Becker-Reshef, I.; Nordling, J.; Barker, B.; McGaughey, K.
2014-12-01
The GEOGLAM Crop Monitor's Crop Assessment Tool was released in August 2013 in support of the GEOGLAM Crop Monitor's objective to develop transparent, timely crop condition assessments in primary agricultural production areas, highlighting potential hotspots of stress/bumper crops. The Crop Assessment Tool allows users to view satellite derived products, best available crop masks, and crop calendars (created in collaboration with GEOGLAM Crop Monitor partners), then in turn submit crop assessment entries detailing the crop's condition, drivers, impacts, trends, and other information. Although the Crop Assessment Tool was originally intended to collect data on major crop production at the global scale, the types of data collected are also relevant to the food security and rangelands monitoring communities. In line with the GEOGLAM Countries at Risk philosophy of "foster[ing] the coordination of product delivery and capacity building efforts for national and regional organizations, and the development of harmonized methods and tools", a modified version of the Crop Assessment Tool is being developed for the USAID Famine Early Warning Systems Network (FEWS NET). As a member of the Countries at Risk component of GEOGLAM, FEWS NET provides agricultural monitoring, timely food security assessments, and early warnings of potential significant food shortages focusing specifically on countries at risk of food security emergencies. While the FEWS NET adaptation of the Crop Assessment Tool focuses on crop production in the context of food security rather than large scale production, the data collected is nearly identical to the data collected by the Crop Monitor. If combined, the countries monitored by FEWS NET and GEOGLAM Crop Monitor would encompass over 90 countries representing the most important regions for crop production and food security.
Masionis, Povilas; Šatkauskas, Igoris; Mikelevičius, Vytautas; Ryliškis, Sigitas; Bučinskas, Vytautas; Griškevičius, Julius; Martin Oliva, Xavier; Monzó Planella, Mariano; Porvaneckas, Narūnas; Uvarovas, Valentinas
2017-01-01
Where is over 100 reconstruction techniques described for acromioclavicular (AC) joint reconstruction. Although, it is not clear whether the presence of the sternoclavicular (SC) joint influences the biomechanical properties of native AC ligaments and reconstruction techniques. The purpose of the present study was to investigate the biomechanical properties of native AC joint ligaments and two reconstruction techniques in cadavers with the SC joint still present. We tested eight fresh-frozen cadaver hemithoraces for superior translation (70 N load) and translation increment after 1000 cycles (loading from 20 to 70 N) in a controlled laboratory study. There were three testing groups created: native ligaments, the single coracoclavicular loop (SCL) technique, and the two coracoclavicular loops (TCL) technique. Superior translation was measured after static loading. Translation increment was calculated as the difference between superior translation after cyclic and static loading. Native AC ligaments showed significantly lower translation than the SCL ( p = 0.023) and TCL ( p = 0.046) groups. The SCL had a significantly lower translation increment than native AC ligaments ( p = 0.028). There was no significant difference between reconstruction techniques in terms of translation ( p = 0.865) and translation increment ( p = 0.113). Native AC joint ligaments had better static properties than both reconstruction techniques and worse dynamic biomechanical properties than the SCL technique. The SCL technique appeared to be more secure than the TCL technique. The presence of the SC joint did not have an observable influence on test results.
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
49 CFR 1548.19 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...
Retail E-Commerce Security Status among Fortune 500 Corporations
ERIC Educational Resources Information Center
Zhao, Jensen J.; Zhao, Sherry Y.
2012-01-01
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Sustainability impact assessment to improve food security of smallholders in Tanzania
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schindler, Jana, E-mail: jana.schindler@zalf.de; Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin; Graef, Frieder, E-mail: graef@zalf.de
The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agriculturalmore » production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.« less
Power system security enhancement through direct non-disruptive load control
NASA Astrophysics Data System (ADS)
Ramanathan, Badri Narayanan
The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two different algorithms based on dynamic programming are proposed for air-conditioner loads, while a decision-tree based algorithm is proposed for water-heater loads. An optimization framework has been developed employing the above algorithms. Monte Carlo simulations have been performed using this framework with the objective of studying the impact of different parameters and constraints on the effectiveness as well as the effect of control. The conclusions drawn from this research strongly advocate direct load control for stability enhancement from the perspectives of robustness and coordination, as well as economic viability and the developments towards availability of the institutional framework for load participation in providing system reliability services.
Static Posturography: A New Perspective in the Assessment of Lameness in a Canine Model
Manera, Maria E.; Carrillo, José M.; Batista, Miguel; Rubio, Monica; Sopena, Joaquin; Santana, Angelo
2017-01-01
The aim of this study was to assess the static posturography in dogs as a useful tool for diagnosis of lameness by means of the use of a pressure platform. For this purpose, a series of different parameters (pressure distribution, area of support, mean pressure, maximum pressure and statokinesiograms) were obtained from five lame dogs with unilateral elbow osteoarthritis treated with plasma rich in growth factors. Data were obtained before and 3 months after treatment, and results were compared with a control group of sound dogs of similar conformation. Significant differences were found in the above mentioned parameters between sound and lame limbs. Improvement after 3 months of treatment was also detected, demonstrating that this multi-parametric technique is an effective and reliable method for the assessment of lameness in dogs. PMID:28114312
Static Posturography: A New Perspective in the Assessment of Lameness in a Canine Model.
Manera, Maria E; Carrillo, José M; Batista, Miguel; Rubio, Monica; Sopena, Joaquin; Santana, Angelo; Vilar, José M
2017-01-01
The aim of this study was to assess the static posturography in dogs as a useful tool for diagnosis of lameness by means of the use of a pressure platform. For this purpose, a series of different parameters (pressure distribution, area of support, mean pressure, maximum pressure and statokinesiograms) were obtained from five lame dogs with unilateral elbow osteoarthritis treated with plasma rich in growth factors. Data were obtained before and 3 months after treatment, and results were compared with a control group of sound dogs of similar conformation. Significant differences were found in the above mentioned parameters between sound and lame limbs. Improvement after 3 months of treatment was also detected, demonstrating that this multi-parametric technique is an effective and reliable method for the assessment of lameness in dogs.
Reliability of risk assessment measures used in sexually violent predator proceedings.
Miller, Cailey S; Kimonis, Eva R; Otto, Randy K; Kline, Suzonne M; Wasserman, Adam L
2012-12-01
The field interrater reliability of three assessment tools frequently used by mental health professionals when evaluating sex offenders' risk for reoffending--the Psychopathy Checklist-Revised (PCL-R), the Minnesota Sex Offender Screening Tool-Revised (MnSOST-R) and the Static-99-was examined within the context of sexually violent predator program proceedings. Rater agreement was highest for the Static--99 (intraclass correlation coefficient [ICC₁] = .78) and lowest for the PCL-R (ICC₁ = .60; MnSOST-R ICC₁ = .74), although all instruments demonstrated lower field reliability than that reported in their test manuals. Findings raise concerns about the reliability of risk assessment tools that are used to inform judgments of risk in high-stake sexually violent predator proceedings. Implications for future research and suggestions for improving evaluator training to increase accuracy when informing legal decision making are discussed.
Nowomiejska, Katarzyna; Oleszczuk, Agnieszka; Zubilewicz, Anna; Krukowski, Jacek; Mańkowska, Anna; Rejdak, Robert; Zagórski, Zbigniew
2007-01-01
To compare the visual field results obtained by static perimetry, microperimetry and rabbit perimetry in patients suffering from dry age related macular degeneration (AMD). Fifteen eyes with dry AMD (hard or soft macula drusen and RPE disorders) were enrolled into the study. Static perimetry was performed using M2 macula program included in Octopus 101 instrument. Microperimetry was performed using macula program (14-2 threshold, 10dB) within 10 degrees of the central visual field. The fovea program within 4 degrees was used while performing rarebit perimetry. The mean sensitivity was significantly lower (p<0.001) during microperimetry (13.5 dB) comparing to static perimetry (26.7 dB). The mean deviation was significantly higher (p<0.001) during microperimetry (-6.32 dB) comparing to static perimetry (-3.11 dB). The fixation was unstable in 47% and eccentric in 40% while performing microperimetry. The median of the "mean hit rate" in rarebit perimetry was 90% (range 40-100%). The mean examination duration was 6.5 min. in static perimetry, 10.6 min. in microperimetry and 5,5 min. in rarebit perimetry (p<0.001). Sensitivity was 30%, 53% and 93% respectively. The visual field defects obtained by microperimetry were more pronounced than those obtained by static perimetry. Microperimetry was the most sensitive procedure although the most time-consuming. Microperimetry enables the control of the fixation position and stability, that is not possible using the remaining methods. Rarebit perimetry revealed slight reduction of the integrity of neural architecture of the retina. Microperimetry and rarebit perimetry provide more information in regard to the visual function than static perimetry, thus are the valuable method in the diagnosis of dry AMD.
Youk, Ji Hyun; Jung, Inkyung; Yoon, Jung Hyun; Kim, Sung Hun; Kim, You Me; Lee, Eun Hye; Jeong, Sun Hye; Kim, Min Jung
2016-09-01
Our aim was to compare the inter-observer variability and diagnostic performance of the Breast Imaging Reporting and Data System (BI-RADS) lexicon for breast ultrasound of static and video images. Ninety-nine breast masses visible on ultrasound examination from 95 women 19-81 y of age at five institutions were enrolled in this study. They were scheduled to undergo biopsy or surgery or had been stable for at least 2 y of ultrasound follow-up after benign biopsy results or typically benign findings. For each mass, representative long- and short-axis static ultrasound images were acquired; real-time long- and short-axis B-mode video images through the mass area were separately saved as cine clips. Each image was reviewed independently by five radiologists who were asked to classify ultrasound features according to the fifth edition of the BI-RADS lexicon. Inter-observer variability was assessed using kappa (κ) statistics. Diagnostic performance on static and video images was compared using the area under the receiver operating characteristic curve. No significant difference was found in κ values between static and video images for all descriptors, although κ values of video images were higher than those of static images for shape, orientation, margin and calcifications. After receiver operating characteristic curve analysis, the video images (0.83, range: 0.77-0.87) had higher areas under the curve than the static images (0.80, range: 0.75-0.83; p = 0.08). Inter-observer variability and diagnostic performance of video images was similar to that of static images on breast ultrasonography according to the new edition of BI-RADS. Copyright © 2016 World Federation for Ultrasound in Medicine & Biology. Published by Elsevier Inc. All rights reserved.
Böhm, Harald; Stief, Felix; Sander, Klaus; Hösl, Matthias; Döderlein, Leonhard
2015-09-01
Malaligned knees are predisposed to the development and progression of unicompartmental degenerations because of the excessive load placed on one side of the knee. Therefore, guided growth in skeletally immature patients is recommended. Indication for correction of varus/valgus deformities are based on static weight bearing radiographs. However, the dynamic knee abduction moment during walking showed only a weak correlation to malalignment determined by static radiographs. Therefore, the aim of the study was to measure the effects of guided growth on the normalization of frontal plane knee joint moments during walking. 15 legs of 8 patients (11-15 years) with idiopathic axial varus or valgus malalignment were analyzed. 16 typically developed peers served as controls. Instrumented gait analysis and clinical assessment were performed the day before implantation and explantation of eight-plates. Correlation between static mechanical tibiofemoral axis angle (MAA) and dynamic frontal plane knee joint moments and their change by guided growth were performed. The changes in dynamic knee moment in the frontal plane following guided growth showed high and significant correlation to the changes in static MAA (R=0.97, p<0.001). Contrary to the correlation of the changes, there was no correlation between static and dynamic measures in both sessions. In consequence two patients that had a natural knee moment before treatment showed a more pathological one after treatment. In conclusion, the changes in the dynamic load situation during walking can be predicted from the changes in static alignment. If pre-surgical gait analysis reveals a natural load situation, despite a static varus or valgus deformity, the intervention must be critically discussed. Copyright © 2015 Elsevier B.V. All rights reserved.
Static and elevated pollen traps do not provide an accurate assessment of personal pollen exposure.
Penel, V; Calleja, M; Pichot, C; Charpin, D
2017-03-01
Background. Volumetric pollen traps are commonly used to assess pollen exposure. These traps are well suited for estimating the regional mean airborne pollen concentration but are likely not to provide an accurate index of personal exposure. In this study, we tested the hypothesis that hair sampling may provide different pollen counts from those from pollen traps, especially when the pollen exposure is diverse. Methods. We compared pollen counts in hair washes to counts provided by stationary volumetric and gravimetric pollen traps in 2 different settings: urban with volunteers living in short distance from one another and from the static trap and suburban in which volunteers live in a scattered environment, quite far from the static trap. Results. Pollen counts in hair washes are in full agreement with trap counts for uniform pollen exposure. In contrast, for diverse pollen exposure, .individual pollen counts in hair washes vary strongly in quantity and taxa composition between individuals and dates. These results demonstrate that the pollen counts method (hair washes vs. stationary pollen traps) may lead to different absolute and relative contributions of taxa to the total pollen count. Conclusions. In a geographic area with a high diversity of environmental exposure to pollen, static pollen traps, in contrast to hair washes, do not provide a reliable estimate of this higher diversity.
Dibai-Filho, Almir Vieira; de Oliveira, Alessandra Kelly; Girasol, Carlos Eduardo; Dias, Fabiana Rodrigues Cancio; Guirro, Rinaldo Roberto de Jesus
2017-04-01
To assess the additional effect of static ultrasound and diadynamic currents on myofascial trigger points in a manual therapy program to treat individuals with chronic neck pain. A single-blind randomized trial was conducted. Both men and women, between ages 18 and 45, with chronic neck pain and active myofascial trigger points in the upper trapezius were included in the study. Subjects were assigned to 3 different groups: group 1 (n = 20) was treated with manual therapy; group 2 (n = 20) was treated with manual therapy and static ultrasound; group 3 (n = 20) was treated with manual therapy and diadynamic currents. Individuals were assessed before the first treatment session, 48 hours after the first treatment session, 48 hours after the tenth treatment session, and 4 weeks after the last session. There was no group-versus-time interaction for Numeric Rating Scale, Neck Disability Index, Pain-Related Self-Statement Scale, pressure pain threshold, cervical range of motion, and skin temperature (F-value range, 0.089-1.961; P-value range, 0.106-0.977). Moreover, we found no differences between groups regarding electromyographic activity (P > 0.05). The use of static ultrasound or diadynamic currents on myofascial trigger points in upper trapezius associated with a manual therapy program did not generate greater benefits than manual therapy alone.
Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security
NASA Astrophysics Data System (ADS)
Mahmadi, FN; Zaaba, ZF; Osman, A.
2016-11-01
Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.
Network Vulnerability Assessment of the U.S. Crude Pipeline Infrastructure
2012-09-01
56 Clanton, “Oklahoma Oil Hub Helps Keep Oil Prices from Going Higher.” 57 Donald Furgeson, John Mahoney , and Brett Warfield...Vulnerability Assessment Matrix of the COTH.58 58 Furgeson, Mahoney , and Warfield, Security...Steinhäusler et al., “Security Risks to the Oil and Gas Industry: Terrorist Capabilities.” 71 Furgeson, Mahoney , and Warfield, Security Vulnerability
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
Chen, Ling; Lo, Wai Leung Ambrose; Mao, Yu Rong; Ding, Ming Hui; Lin, Qiang; Li, Hai; Zhao, Jiang Li; Xu, Zhi Qin; Bian, Rui Hao; Huang, Dong Feng
2016-01-01
Objective . To critically evaluate the studies that were conducted over the past 10 years and to assess the impact of virtual reality on static and dynamic balance control in the stroke population. Method . A systematic review of randomized controlled trials published between January 2006 and December 2015 was conducted. Databases searched were PubMed, Scopus, and Web of Science. Studies must have involved adult patients with stroke during acute, subacute, or chronic phase. All included studies must have assessed the impact of virtual reality programme on either static or dynamic balance ability and compared it with a control group. The Physiotherapy Evidence Database (PEDro) scale was used to assess the methodological quality of the included studies. Results . Nine studies were included in this systematic review. The PEDro scores ranged from 4 to 9 points. All studies, except one, showed significant improvement in static or dynamic balance outcomes group. Conclusions . This review provided moderate evidence to support the fact that virtual reality training is an effective adjunct to standard rehabilitation programme to improve balance for patients with chronic stroke. The effect of VR training in balance recovery is less clear in patients with acute or subacute stroke. Further research is required to investigate the optimum training intensity and frequency to achieve the desired outcome.
Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin
2011-01-01
The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. PMID:22163983
Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin
2011-01-01
The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.
Knapik, Joseph; Steelman, Ryan
2016-11-01
To identify and analyze articles in which the authors examined risk factors for soldiers during military static-line airborne operations. We searched for articles in PubMed, the Defense Technical Information Center, reference lists, and other sources using the key words airborne, parachuting, parachutes, paratrooper, injuries, wounds, trauma, and musculoskeletal. The search identified 17 684 potential studies. Studies were included if they were written in English, involved military static-line parachute operations, recorded injuries directly from events on the landing zone or from safety or medical records, and provided data for quantitative assessment of injury risk factors. A total of 23 studies met the review criteria, and 15 were included in the meta-analysis. The summary statistic obtained for each risk factor was the risk ratio, which was the ratio of the injury risk in 1 group to that of another (baseline) group. Where data were sufficient, meta-analyses were performed and heterogeneity and publication bias were assessed. Risk factors for static-line parachuting injuries included night jumps, jumps with extra equipment, higher wind speeds, higher air temperatures, jumps from fixed-wing aircraft rather than balloons or helicopters, jumps onto certain types of terrain, being a female paratrooper, greater body weight, not using the parachute ankle brace, smaller parachute canopies, simultaneous exits from both sides of an aircraft, higher heat index, winds from the rear of the aircraft on exit entanglements, less experience with a particular parachute system, being an enlisted soldier rather than an officer, and jumps involving a greater number of paratroopers. We analyzed and summarized factors that increased the injury risk for soldiers during military static-line parachute operations. Understanding and considering these factors in risk evaluations may reduce the likelihood of injury during parachuting.
Static and dynamic balance of children and adolescents with sensorineural hearing loss.
Melo, Renato de Souza; Marinho, Sônia Elvira Dos Santos; Freire, Maryelly Evelly Araújo; Souza, Robson Arruda; Damasceno, Hélio Anderson Melo; Raposo, Maria Cristina Falcão
2017-01-01
To assess the static and dynamic balance performance of students with normal hearing and with sensorineural hearing loss. A cross-sectional study assessing 96 students, 48 with normal hearing and 48 with sensorineural hearing loss of both sexes, aged 7 and 18 years. To evaluate static balance, Romberg, Romberg-Barré and Fournier tests were used; and for the dynamic balance, we applied the Unterberger test. Hearing loss students showed more changes in static and dynamic balance as compared to normal hearing, in all tests used (p<0.001). The same difference was found when subjects were grouped by sex. For females, Romberg, Romberg-Barré, Fournier and Unterberger test p values were, respectively, p=0.004, p<0.001, p<0.001 and p=0.023; for males, the p values were p=0.009, p<0.001, p<0.001 and p=0.002, respectively. The same difference was observed when students were classified by age. For 7 to 10 years old students, the p values for Romberg, Romberg-Barré and Fournier tests were, respectively, p=0.007, p<0.001 and p=0.001; for those aged 11 and 14 years, the p values for Romberg, Romberg-Barré, Fournier and Unterberger tests were p=0.002, p<0.001, p<0.001 and p=0.015, respectively; and for those aged 15 and 18 years, the p values for Romberg-Barré, Fournier and Unterberger tests were, respectively, p=0.037, p<0.001 and p=0.037. Hearing-loss students showed more changes in static and dynamic balance comparing to normal hearing of same sex and age groups.
Static and Dynamic Measurement of Ocular Surface Temperature in Dry Eyes
Sanjay, Srinivasan; Morgan, Philip B.
2016-01-01
Purpose. To study ocular surface temperature (OST) in dry eyes by static and dynamic measures. Methods. OST was recorded on 62 dry eyes and 63 age- and sex-matched controls. Static measures were study of absolute OST at t = 0, 5, and 10 s after eye opening. Dynamic measures were study of mean change and net change in OST over 10 s of sustained eye opening. Ten OST indices studied were temperatures of the geometric center of the cornea (GCC), extreme temporal (T1) and nasal conjunctiva (T4), midtemporal (CT) and nasal conjunctiva (CN), temporal (LT) and nasal (LN) limbus, and mean (MOST), maximum (Max T), and minimum (Min T) temperatures of the region of interest. Results. For static measures, dry eyes recorded significantly lower GCC, MOST, Min T, Max T, T4, CT, LT, LN, and CN. For dynamic measures, dry eyes had significantly steeper regression line of mean change (corresponding to greater net change) for Max T 5 s onward and T4 at 3 s onward. Conclusions. Both static and dynamic measures of the OST were valuable and can be used as clinical tool to assess dry eye. PMID:27433352
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
.... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
.... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...
Dynamic Assessment of EFL Reading: Revealing Hidden Aspects at Different Proficiency Levels
ERIC Educational Resources Information Center
Ajideh, Parviz; Farrokhi, Farahman; Nourdad, Nava
2012-01-01
Dynamic assessment as a complementary approach to traditional static assessment emphasizes the learning process and accounts for the amount and nature of examiner investment. The present qualitative study analyzed interactions for 270 reading test items which were recorded and tape scripted. The reading ability of 9 EFL participants at three…
Implications of Vygotsky's Sociocultural Theory for Second Language (L2) Assessment
ERIC Educational Resources Information Center
Shabani, Karim
2016-01-01
Dynamic assessment (DA) research, still in its infancy, takes its roots from Vygotsky's concept of zone of proximal development (ZPD) to account for learner's developmental process. Breaking away from a static, incomplete and, thus, unethical assessment of learner's abilities, DA came to the fore to better crystallize learner's levels of abilities…
Ability-Training-Oriented Automated Assessment in Introductory Programming Course
ERIC Educational Resources Information Center
Wang, Tiantian; Su, Xiaohong; Ma, Peijun; Wang, Yuying; Wang, Kuanquan
2011-01-01
Learning to program is a difficult process for novice programmers. AutoLEP, an automated learning and assessment system, was developed by us, to aid novice programmers to obtain programming skills. AutoLEP is ability-training-oriented. It adopts a novel assessment mechanism, which combines static analysis with dynamic testing to analyze student…
17 CFR 230.136 - Definition of certain terms in relation to assessable stock.
Code of Federal Regulations, 2010 CFR
2010-04-01
... relation to assessable stock. 230.136 Section 230.136 Commodity and Securities Exchanges SECURITIES AND... certain terms in relation to assessable stock. (a) An offer, offer to sell, or offer for sale of... shall not be deemed to include the offering or sale of assessable stock, at public auction or otherwise...
THE RELATIONSHIP BETWEEN VARIOUS MODES OF SINGLE LEG POSTURAL CONTROL ASSESSMENT
Schmitz, Randy
2012-01-01
Purpose/Background: While various techniques have been developed to assess the postural control system, little is known about the relationship between single leg static and functional balance. The purpose of the current study was to determine the relationship between the performance measures of several single leg postural stability tests. Methods: Forty six recreationally active college students (17 males, 29 females, 21±3 yrs, 173±10 cm) performed six single leg tests in a counterbalanced order: 1) Firm Surface-Eyes Open, 2) Firm Surface-Eyes Closed, 3) Multiaxial Surface-Eyes Open, 4) Multiaxial Surface-Eyes Closed, 5) Star Excursion Balance Test (posterior medial reach), 6) Single leg Hop-Stabilization Test. Bivariate correlations were conducted between the six outcome variables. Results: Mild to moderate correlations existed between the static tests. No significant correlations existed involving either of the functional tests. Conclusions: The results indicate that while performance of static balance tasks are mildly to moderately related, they appear to be unrelated to functional reaching or hopping movements, supporting the utilization of a battery of tests to determine overall postural control performance. Level of Evidence: 3b PMID:22666640
Varga, Peter; Schwiedrzik, Jakob; Zysset, Philippe K; Fliri-Hofmann, Ladina; Widmer, Daniel; Gueorguiev, Boyko; Blauth, Michael; Windolf, Markus
2016-04-01
Osteoporotic proximal femur fractures are caused by low energy trauma, typically when falling on the hip from standing height. Finite element simulations, widely used to predict the fracture load of femora in fall, usually include neither mass-related inertial effects, nor the viscous part of bone׳s material behavior. The aim of this study was to elucidate if quasi-static non-linear homogenized finite element analyses can predict in vitro mechanical properties of proximal femora assessed in dynamic drop tower experiments. The case-specific numerical models of 13 femora predicted the strength (R(2)=0.84, SEE=540N, 16.2%), stiffness (R(2)=0.82, SEE=233N/mm, 18.0%) and fracture energy (R(2)=0.72, SEE=3.85J, 39.6%); and provided fair qualitative matches with the fracture patterns. The influence of material anisotropy was negligible for all predictions. These results suggest that quasi-static homogenized finite element analysis may be used to predict mechanical properties of proximal femora in the dynamic sideways fall situation. Copyright © 2015 Elsevier Ltd. All rights reserved.
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... prevent completion of the threat assessment). (5) Gender. (6) Country of citizenship. (7) If the applicant... subpart remains valid for five years from the date that TSA issues a Determination of No Security Threat...
2010-12-01
Methodology RMAT Risk Management Assessment Tool SIDA Security Identification Display Area SIGINT Signals Intelligence SO18 Aviation Security...aircraft operate (§ 1542.203); • Provide detection and physical security measures for the “Security Identification Display Area” ( SIDA ), i.e., the area
Code of Federal Regulations, 2010 CFR
2010-10-01
... to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Transportation of... determines is not known or is a threat to security. (e) At the border. (1) Train crew members who are not U.S...
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
The relationship between balance confidence and control in individuals with Parkinson's disease
Lee, Hyo Keun; Altman, Lori J.P.; McFarland, Nikolaus; Hass, Chris J.
2016-01-01
Introduction A broad range of subjective and objective assessments have been used to assess balance confidence and balance control in persons with Parkinson's disease (PD). However, little is known about the relationship between self-perceived balance confidence and actual balance control in PD. The purpose of this investigation was to determine the relationship between self-perceived balance confidence and objectively measured static/dynamic balance control abilities. Methods Forty-four individuals with PD participated in the study. Patients were stratified into 2 groups based on the modified Hoehn and Yahr (H&Y) disability score: early stage, H&Y≤2.0 and moderate stage, H&Y ≥2.5. All participants completed the activities-specific balance confidence (ABC) scale and performed standing balance and gait initiation tasks to assess static and dynamic balance control. The center of pressure (COP) sway (CE95%Sway) during static balance and the peak distance between the projections of the COP and the center of mass (COM) in the transverse plane (COPCOM) during gait initiation were calculated. Pearson correlation analyses were conducted relating the ABC score and CE95%Sway and COPCOM. Results For early stage PD, there was a moderate correlation between ABC score and CE95 %Sway (r=-0.56, R2=0.32, p=0.002), while no significant correlation was found between ABC score and COPCOM (r=-0.24, R2=0.06, p=0.227). For moderate stage PD, there was a moderate correlation between ABC score and COPCOM (r=0.49, R2=0.24, p=0.044), while no correlation was found between ABC score and CE95%Sway (r=-0.19, R2=0.04, p=0.478). Conclusion Individuals with different disease severities showed different relationships between balance confidence and actual static/dynamic balance control. PMID:26949065
Edsgärd, Daniel; Iglesias, Maria Jesus; Reilly, Sarah-Jayne; Hamsten, Anders; Tornvall, Per; Odeberg, Jacob; Emanuelsson, Olof
2016-01-01
Allele-specific expression (ASE) is the imbalance in transcription between maternal and paternal alleles at a locus and can be probed in single individuals using massively parallel DNA sequencing technology. Assessing ASE within a single sample provides a static picture of the ASE, but the magnitude of ASE for a given transcript may vary between different biological conditions in an individual. Such condition-dependent ASE could indicate a genetic variation with a functional role in the phenotypic difference. We investigated ASE through RNA-sequencing of primary white blood cells from eight human individuals before and after the controlled induction of an inflammatory response, and detected condition-dependent and static ASE at 211 and 13021 variants, respectively. We developed a method, GeneiASE, to detect genes exhibiting static or condition-dependent ASE in single individuals. GeneiASE performed consistently over a range of read depths and ASE effect sizes, and did not require phasing of variants to estimate haplotypes. We observed condition-dependent ASE related to the inflammatory response in 19 genes, and static ASE in 1389 genes. Allele-specific expression was confirmed by validation of variants through real-time quantitative RT-PCR, with RNA-seq and RT-PCR ASE effect-size correlations r = 0.67 and r = 0.94 for static and condition-dependent ASE, respectively. PMID:26887787
Jorrakate, Chaiyong; Kongsuk, Jutaluk; Pongduang, Chiraprapa; Sadsee, Boontiwa; Chanthorn, Phatchari
2015-01-01
[Purpose] The aim of the present study was to investigate the effect of yoga training on static and dynamic standing balance in obese individuals with poor standing balance. [Subjects and Methods] Sixteen obese volunteers were randomly assigned into yoga and control groups. The yoga training program was performed for 45 minutes per day, 3 times per week, for 4 weeks. Static and dynamic balance were assessed in volunteers with one leg standing and functional reach tests. Outcome measures were tested before training and after a single week of training. Two-way repeated measure analysis of variance with Tukey’s honestly significant difference post hoc statistics was used to analyze the data. [Results] Obese individuals showed significantly increased static standing balance in the yoga training group, but there was no significant improvement of static or dynamic standing balance in the control group after 4 weeks. In the yoga group, significant increases in static standing balance was found after the 2nd, 3rd, and 4th weeks. Compared with the control group, static standing balance in the yoga group was significantly different after the 2nd week, and dynamic standing balance was significantly different after the 4th week. [Conclusion] Yoga training would be beneficial for improving standing balance in obese individuals with poor standing balance. PMID:25642038
Gatica-Rojas, Valeska; Cartes-Velásquez, Ricardo; Méndez-Rebolledo, Guillermo; Guzman-Muñoz, Eduardo; Lizama, L Eduardo Cofré
2017-08-01
This study sought to evaluate the effects of a Nintendo Wii Balance Board (NWBB) intervention on ankle spasticity and static standing balance in young people with spastic cerebral palsy (SCP). Ten children and adolescents (aged 72-204 months) with SCP participated in an exercise program with NWBB. The intervention lasted 6 weeks, 3 sessions per week, 25 minutes for each session. Ankle spasticity was assessed using the Modified Modified Ashworth Scale (MMAS), and static standing balance was quantified using posturographic measures (center-of-pressure [CoP] measures). Pre- and post-intervention measures were compared. Significant decreases of spasticity in the ankle plantar flexor muscles (p < 0.01). There was also a significant reduction in the CoP sway area (p = 0.04), CoP mediolateral velocity (p =0.03), and CoP anterior-posterior velocity (p = 0.03). A 6-session NWBB program reduces the spasticity at the ankle plantar flexors and improves the static standing balance in young people with SCP.
Srivastava, Kshama; Soin, Seepika; Sapra, B K; Ratna, P; Datta, D
2017-11-01
The occupational exposure incurred by the radiation workers due to the external radiation is estimated using personal dosemeter placed on the human body during the monitoring period. In certain situations, it is required to determine whether the dosemeter alone was exposed accidentally/intentionally in radiation field (static exposure) or was exposed while being worn by a worker moving in his workplace (dynamic exposure). The present thermoluminscent (TL) based personnel monitoring systems are not capable of distinguishing between the above stated (static and dynamic) exposure conditions. The feasibility of a new methodology developed using the charge coupled device based imaging technique for identification of the static/dynamic exposure of CaSO4:Dy based TL detectors for low energy photons has been investigated. The techniques for the qualitative and the quantitative assessments of the exposure conditions are presented in this paper. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Balance, Proprioception, and Gross Motor Development of Chinese Children Aged 3 to 6 Years.
Jiang, Gui-Ping; Jiao, Xi-Bian; Wu, Sheng-Kou; Ji, Zhong-Qiu; Liu, Wei-Tong; Chen, Xi; Wang, Hui-Hui
2018-01-01
The authors' aim was to find the features of balance, proprioception, and gross motor development of Chinese children 3-6 years old and their correlations, provide theoretical support for promoting children's motor development, and enrich the world theoretical system of motor development. This study used a Tekscan foot pressure measurement instrument (Tekscan, Inc., Boston, MA), walking on a balance beam, Xsens 3-dimensional positional measuring system (Xsens Technologies, Enschede, the Netherlands), and Test of Gross Motor Development-2 to assess static balance, dynamic balance, knee proprioception, and levels of gross motor development (GMD) of 3- to 6-year-old children (n = 60) in Beijing. The results are as follows: children had significant age differences in static balance, dynamic balance, proprioception, and levels of GMD; children had significant gender differences in static balance, proprioception, and levels of GMD; children's static balance, dynamic balance, and proprioception had a very significant positive correlation with GMD (p < .01), but no significant correlation with body mass index.
Eslam Pour, Aidin; Bradbury, Thomas L; Horst, Patrick K; Harrast, John J; Erens, Greg A; Roberson, James R
2016-07-01
A certified list of all operative cases performed within a 6-month period is a required prerequisite for surgeons taking the American Board of Orthopaedic Surgery Part II oral examination. Using the American Board of Orthopaedic Surgery secure Internet database database containing these cases, this study (1) assessed changing trends for primary and revision total hip arthroplasty (THA) and (2) compared practices and early postoperative complications between 2 groups of examinees, those with and without adult reconstruction fellowship training. Secure Internet database was searched for all 2003-2013 procedures with a Current Procedural Terminology code for THA, hip resurfacing, hemiarthroplasty, revision hip arthroplasty, conversion to THA, or removal of hip implant (Girdlestone, static, or dynamic spacer). Adult reconstruction fellowship-trained surgeons performed 60% of the more than 33,000 surgeries identified (average 28.1) and nonfellowship-trained surgeons performed 40% (average 5.2) (P < .001). Fellowship-trained surgeons performed significantly more revision surgeries for infection (71% vs 29%)(P < .001). High-volume surgeons had significantly fewer complications in both primary (11.1% vs 19.6%) and revision surgeries (29% vs 35.5%) (P < .001). Those who passed the Part II examination reported higher rates of complications (21.5% vs 19.9%). In early practice, primary and revision hip arthroplasties are often performed by surgeons without adult reconstruction fellowship training. Complications are less frequently reported by surgeons with larger volumes of joint replacement surgery who perform either primary or more complex cases. Primary hip arthroplasty is increasingly performed by surgeons early in practice who have completed an adult reconstructive fellowship after residency training. This trend is even more pronounced for more complex cases such as revision or management of infection. Copyright © 2016 Elsevier Inc. All rights reserved.
Armstrong, Lucas C; Chong, Alexander; Livermore, Ryan W; Prohaska, Daniel J; Doyon, Amanda N; Wooley, Paul H
2015-04-01
We conducted a study to evaluate biomechanical performance during destructive testing of several different suture materials in various arthroscopic knot configurations under both in vitro and in situ conditions. Surgeons of different levels of experience tied the knots. Three different arthroscopic knots (static surgeon's, Weston, Tennessee slider) with 3 reverse half-hitches on alternating posts were tested using Fiberwire, ForceFiber, Orthocord, and Ultrabraid suture materials under both in vitro and in situ (blood plasma at 37°C) conditions. Three surgeons of different experience levels tied the knots on a post 30 mm in circumference. A single load-to-failure test was performed. There were no significant in vitro-in situ differences for Ultrabraid in the different knot configurations or with the different experience levels. Surgeon B (intermediate experience) showed no significant differences between test conditions for any knot configuration or suture material. With Tennessee slider knots, surgeon C (least experience) showed significantly lower clinical failure load under both test conditions and had a higher percentage of complete knot slippage. Surgeon B had no knot slippage with use of Fiberwire. Both the aqueous environment and the surgeon's familiarity with certain knots have an effect on knot security.
Davoren, Mary; Byrne, Orla; O'Connell, Paul; O'Neill, Helen; O'Reilly, Ken; Kennedy, Harry G
2015-11-23
Patients admitted to a secure forensic hospital are at risk of a long hospital stay. Forensic hospital beds are a scarce and expensive resource and ability to identify the factors predicting length of stay at time of admission would be beneficial. The DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale are designed to assess need for therapeutic security and urgency of that need while the HCR-20 predicts risk of violence. We hypothesized that items on the DUNDRUM-1 and DUNDRUM-2 scales, rated at the time of pre-admission assessment, would predict length of stay in a medium secure forensic hospital setting. This is a prospective study. All admissions to a medium secure forensic hospital setting were collated over a 54 month period (n = 279) and followed up for a total of 66 months. Each patient was rated using the DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale as part of a pre-admission assessment (n = 279) and HCR-20 within 2 weeks of admission (n = 187). Episodes of harm to self, harm to others and episodes of seclusion whilst an in-patient were collated. Date of discharge was noted for each individual. Diagnosis at the time of pre-admission assessment (adjustment disorder v other diagnosis), predicted legal status (sentenced v mental health order) and items on the DUNDRUM-1 triage security scale and the DUNDRUM-2 triage urgency scale, also rated at the time of pre-admission assessment, predicted length of stay in the forensic hospital setting. Need for seclusion following admission also predicted length of stay. These findings may form the basis for a structured professional judgment instrument, rated prior to or at time of admission, to assist in estimating length of stay for forensic patients. Such a tool would be useful to clinicians, service planners and commissioners given the high cost of secure psychiatric care.
Assessing the security vulnerabilities of correctional facilities
NASA Astrophysics Data System (ADS)
Spencer, Debra D.; Morrison, G. Steve
1998-12-01
The National Institute of Justice has tasked their satellite facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps identify the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion from outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees. In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.
A review of video security training and assessment-systems and their applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cellucci, J.; Hall, R.J.
1991-01-01
This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, usermore » training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.« less
17 CFR 5.10 - Risk assessment recordkeeping requirements for retail foreign exchange dealers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Risk assessment recordkeeping requirements for retail foreign exchange dealers. 5.10 Section 5.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.10 Risk assessment...
17 CFR 5.11 - Risk assessment reporting requirements for retail foreign exchange dealers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Risk assessment reporting requirements for retail foreign exchange dealers. 5.11 Section 5.11 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.11 Risk assessment...
76 FR 43286 - National Assessment Governing Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... levels for each grade and subject tested, developing standards and procedures for interstate and national... in closed session to review secure test items for the 2012 Economics assessment at grade 12 and the... meeting the ADC will complete their review of secure NAEP test items for the 2012 Economics assessment at...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
A Cyber Security Self-Assessment Method for Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less
Terrorism: Its Evolving Nature
1989-01-01
the adequacy of the Foreign Airport Security Act, an overall evaluation of the required foreign airport security assessments, and several others can...procedures envisioned by the Foreign Airport Security Act of 1985, which your committee helped initiate, played a useful role in this security...case of a threat to an airline, we get that information into the hands of airport security officials responsible for aviation security. This is the
NASA Astrophysics Data System (ADS)
Brown, M. R. M.; Ge, S.
2017-12-01
Increased pore pressure decreasing the effective stress on a critically stressed fault has been the accepted mechanism for injection-induced seismicity. This, however, is an over simplified approach that does not take into account the coupled hydro-mechanical effects. In addition, this approach leaves out a possible key stressor in the system, the earthquakes. Earthquakes are known to interact with each other by Coulomb static stress transfer, the process of permanent stress change caused by movement on a fault. In areas of induced seismicity, many small to moderate earthquakes can occur adding to the stress in the system via Coulomb static stress transfer. Here we ask: Is the Coulomb static stress transfer from the earthquakes as important as the pore pressure increase or stress changes caused by coupled hydro-mechanical processes? Is there a point where the Coulomb static stress transfer from the earthquakes becomes the controlling process for inducing future earthquakes? How does the effect of many small earthquakes compare to a few larger events in terms of Coulomb static stress transfer? In this study, we use hydrologic and coupled hydro-mechanical models and USGS Coulomb 3 to assess the importance of induced earthquakes in terms of the stress change in the system. Realistic scenarios of wastewater injection and earthquake magnitude-frequency distributions are used to develop generic models. Model variables and data are varied to evaluate the range of possible outcomes. Preliminary results show that the stress change associated with injection is of the same order of magnitude as the cumulative Coulomb static stress change of a series of small (1
Clark, Ross A; Pua, Yong-Hao; Oliveira, Cristino C; Bower, Kelly J; Thilarajah, Shamala; McGaw, Rebekah; Hasanki, Ksaniel; Mentiplay, Benjamin F
2015-07-01
The Microsoft Kinect V2 for Windows, also known as the Xbox One Kinect, includes new and potentially far improved depth and image sensors which may increase its accuracy for assessing postural control and balance. The aim of this study was to assess the concurrent validity and reliability of kinematic data recorded using a marker-based three dimensional motion analysis (3DMA) system and the Kinect V2 during a variety of static and dynamic balance assessments. Thirty healthy adults performed two sessions, separated by one week, consisting of static standing balance tests under different visual (eyes open vs. closed) and supportive (single limb vs. double limb) conditions, and dynamic balance tests consisting of forward and lateral reach and an assessment of limits of stability. Marker coordinate and joint angle data were concurrently recorded using the Kinect V2 skeletal tracking algorithm and the 3DMA system. Task-specific outcome measures from each system on Day 1 and 2 were compared. Concurrent validity of trunk angle data during the dynamic tasks and anterior-posterior range and path length in the static balance tasks was excellent (Pearson's r>0.75). In contrast, concurrent validity for medial-lateral range and path length was poor to modest for all trials except single leg eyes closed balance. Within device test-retest reliability was variable; however, the results were generally comparable between devices. In conclusion, the Kinect V2 has the potential to be used as a reliable and valid tool for the assessment of some aspects of balance performance. Copyright © 2015 Elsevier B.V. All rights reserved.
A Study of the Use of Contact Loading to Simulate Low Velocity Impact
NASA Technical Reports Server (NTRS)
Highsmith, Alton L.
1997-01-01
Although numerous studies on the impact response of laminated composites have been conducted, there is as yet no agreement within the composites community on what parameter or parameters are adequate for quantifying the severity of an impact event. One of the more interesting approaches that has been proposed uses the maximum contact force during impact to "quantify" the severity of the impact event, provided that the impact velocity is sufficiently low. A significant advantage of this approach, should it prove to be reliable, is that quasi-static contact loading could be used to simulate low velocity impact. In principle, a single specimen, loaded quasi-statically to successively increasing contact loads could be used to map the entire spectrum of damage as a function of maximum contact force. The present study had as its objective assessing whether or not the maximum contact force during impact is a suitable parameter for characterizing an impact. The response of [+/-60/0(sub 4)/+/-60/0(sub 2)](sub s) laminates fabricated from Fiberite T300/934 graphite epoxy and subjected to quasi-static contact loading and to low velocity impact was studied. Three quasi-static contact load levels - 525 lb., 600 lb., and 675 lb. - were selected. Three impact energy levels - 1.14 ft.-lb., 2.0 ft.-lb., and 2.60 ft.-lb. - were chosen in an effort to produce impact events in which the maximum contact forces during the impact events were 525 lb., 600 lb., and 625 lb., respectively. Damage development was documented using dye-penetrant enhanced x-ray radiography. A digital image processing technique was used to obtain quantitative information about the damage zone. Although it was intended that the impact load levels produce maximum contact forces equal to those used in the quasi-static contact experiments, larger contact forces were developed during impact loading. In spite of this, the damage zones developed in impacted specimens were smaller than the damage zones developed in specimens subjected to the corresponding quasi-static contact loading. The impacted specimens may have a greater tendency to develop fiber fracture, but, at present, a quantitative assessment of fiber fracture is not available. In addressing whether or not contact force is an adequate metric for describing the severity of an impact event, the results of this study suggest that it is not. In cases where the quasi-static load level and the maximum contact force during impact were comparable, the quasi-statically loaded specimens consistently developed larger damage zones. It should be noted, however, that using quasi-static damage data to forecast the behavior of impacted material may give conservative estimates of the residual strength of impacted composites.
Raby, K. Lee; Cicchetti, Dante; Carlson, Elizabeth A.; Egeland, Byron; Collins, W. Andrew
2013-01-01
Background Longitudinal research has demonstrated that individual differences in attachment security show only modest continuity from infancy to adulthood. Recent findings based on retrospective reports suggest that individuals’ genetic variation may moderate the developmental associations between early attachment-relevant relationship experiences and adult attachment security. The purpose of this study was to use a prospective, longitudinal design to investigate genetic contributions to continuity and changes in attachment security from infancy to young adulthood in a higher risk sample. Methods Infant attachment security was assessed using the Strange Situation Procedure at 12 and 18 months. Adults’ general attachment representations were assessed using the Adult Attachment Interview at age 19 and age 26. Romantic attachment representations were assessed with the Current Relationship Interview at ages 20–21 and ages 26–28. Individuals were genotyped for variants within the oxytocin receptor (OXTR), dopamine D4 receptor (DRD4), and serotonin transporter linked polymorphic region (5-HTTLPR). Results The continuity of attachment security from infancy into young adulthood was consistently moderated by OXTR genetic variation. Infant attachment security predicted the security of adults’ general and romantic attachment representations only for individuals with the OXTR G/G genotype. This interaction was significant when predicting adult attachment security as measured by the Adult Attachment Interview at age 19 and 26 and the Current Relationship Interview at ages 26–28. DRD4 and 5-HTTLPR genetic variation did not consistently moderate the longitudinal associations between attachment security during infancy and adulthood. Conclusions This study provides initial longitudinal evidence for genetic contributions to continuity and change in attachment security from infancy to young adulthood. Genetic variation related to the oxytocin system may moderate the stability of attachment security across development. PMID:23731038
Guide for the Assessment of the Vapor Intrusion Pathway
2006-02-01
variability. There are two basic types of flux chambers: the static chamber and the dynamic chamber. The static chamber does not use "sweep" gas to maintain...DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED I February 2006 FINAL 4. TITLE AND SUBTITLE 5. FUNDING...sites, the problem is typically limited to a handful of chemicals. This guidance will be most useful for two groups of Air Force environmental managers
Static and dynamic high power, space nuclear electric generating systems
NASA Technical Reports Server (NTRS)
Wetch, J. R.; Begg, L. L.; Koester, J. K.
1985-01-01
Space nuclear electric generating systems concepts have been assessed for their potential in satisfying future spacecraft high power (several megawatt) requirements. Conceptual designs have been prepared for reactor power systems using the most promising static (thermionic) and the most promising dynamic conversion processes. Component and system layouts, along with system mass and envelope requirements have been made. Key development problems have been identified and the impact of the conversion process selection upon thermal management and upon system and vehicle configuration is addressed.
Pressurised fluid extraction of bupirimate and ethirimol from aged soils.
Fitzpatrick, L J; Dean, J R
2001-05-25
This paper assesses the effect of pressurised fluid extraction (PFE) on the recovery of bupirimate and its degradation product, ethirimol from a range of soil types. The analytes were extracted under standard conditions (pressure, 2000 p.s.i.; temperature, 100 degrees C; and, three static flush cycles of 5 min static extraction time each) using a variety of individual and combined solvents. It was found that the recovery of bupirimate was dependent upon the organic matter content of soil.
Nebbitt, Von E; Lombe, Margaret; Chu, Yoosun; Sinha, Aakanksha; Tirmazi, Tagi
2016-01-01
This paper assesses how and/or whether household and community factors are associated with self-reported food security among young people living in public housing (N=151). Results suggest that food security was negatively related to age, particularly to older youth. Also, household size-have many people in the household, household hardships, and household conflict were negatively related to food security. On the contrary, food security was positively related to community cohesion and the presence of the extended family within the public housing neighborhood. Findings seem to suggest that non-specialty food previsions (e.g., community cohesion and family networks) may be important in understanding food security among families living in public housing. A number of program and policy implications are presented.
1984-12-01
Security Classification) * C3 1 TERADATA STUDY 2 PERSONAL AUTHOR(S) , John Deckera 1 3a TYPE OF REPORT 12Tb TME COVEPED 4 T)A7C ’)E R- I) C ,,- vear Month...the paper. .Pi Tipaper was not available for incorporation into this book. 19-1 YSb . * THE RISK FACTOR IN AIRCRAFT LIGHTNING PROTECTION John C . Corbin...34Elect. World, Transmission Systems. Second edition, Vol.116, pp.1720-1721, 1766-1767, Nov John Wiley & Sons, Inc., New York, 1951. 1941. 5. Bruce, C . E. R
Wenski, Edward G [Lenexa, KS
2007-08-21
A micro-tensile testing system providing a stand-alone test platform for testing and reporting physical or engineering properties of test samples of materials having thicknesses of approximately between 0.002 inch and 0.030 inch, including, for example, LiGA engineered materials. The testing system is able to perform a variety of static, dynamic, and cyclic tests. The testing system includes a rigid frame and adjustable gripping supports to minimize measurement errors due to deflection or bending under load; serrated grips for securing the extremely small test sample; high-speed laser scan micrometers for obtaining accurate results; and test software for controlling the testing procedure and reporting results.
Wenski, Edward G.
2006-01-10
A micro-tensile testing system providing a stand-alone test platform for testing and reporting physical or engineering properties of test samples of materials having thicknesses of approximately between 0.002 inch and 0.030 inch, including, for example, LiGA engineered materials. The testing system is able to perform a variety of static, dynamic, and cyclic tests. The testing system includes a rigid frame and adjustable gripping supports to minimize measurement errors due to deflection or bending under load; serrated grips for securing the extremely small test sample; high-speed laser scan micrometers for obtaining accurate results; and test software for controlling the testing procedure and reporting results.
Wenski, Edward G [Lenexa, KS
2007-07-17
A micro-tensile testing system providing a stand-alone test platform for testing and reporting physical or engineering properties of test samples of materials having thicknesses of approximately between 0.002 inch and 0.030 inch, including, for example, LiGA engineered materials. The testing system is able to perform a variety of static, dynamic, and cyclic tests. The testing system includes a rigid frame and adjustable gripping supports to minimize measurement errors due to deflection or bending under load; serrated grips for securing the extremely small test sample; high-speed laser scan micrometers for obtaining accurate results; and test software for controlling the testing procedure and reporting results.
Geiger, Ben Baumberg; Garthwaite, Kayleigh; Warren, Jon; Bambra, Clare
2017-08-25
It has been argued that social security disability assessments should directly assess claimants' work capacity, rather than relying on proxies such as on functioning. However, there is little academic discussion of how such assessments could be conducted. The article presents an account of different models of direct disability assessments based on case studies of the Netherlands, Germany, Denmark, Norway, the United States of America, Canada, Australia, and New Zealand, utilising over 150 documents and 40 expert interviews. Three models of direct work disability assessments can be observed: (i) structured assessment, which measures the functional demands of jobs across the national economy and compares these to claimants' functional capacities; (ii) demonstrated assessment, which looks at claimants' actual experiences in the labour market and infers a lack of work capacity from the failure of a concerned rehabilitation attempt; and (iii) expert assessment, based on the judgement of skilled professionals. Direct disability assessment within social security is not just theoretically desirable, but can be implemented in practice. We have shown that there are three distinct ways that this can be done, each with different strengths and weaknesses. Further research is needed to clarify the costs, validity/legitimacy, and consequences of these different models. Implications for rehabilitation It has recently been argued that social security disability assessments should directly assess work capacity rather than simply assessing functioning - but we have no understanding about how this can be done in practice. Based on case studies of nine countries, we show that direct disability assessment can be implemented, and argue that there are three different ways of doing it. These are "demonstrated assessment" (using claimants' experiences in the labour market), "structured assessment" (matching functional requirements to workplace demands), and "expert assessment" (the judgement of skilled professionals). While it is possible to implement a direct assessment of work capacity for social security benefits, further research is necessary to understand how best to maximise validity, legitimacy, and cost-effectiveness.
Video calls from lay bystanders to dispatch centers - risk assessment of information security.
Bolle, Stein R; Hasvold, Per; Henriksen, Eva
2011-09-30
Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Risk assessment of climate systems for national security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean
2012-10-01
Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.
Ranking of physiotherapeutic evaluation methods as outcome measures of stifle functionality in dogs.
Hyytiäinen, Heli K; Mölsä, Sari H; Junnila, Jouni T; Laitinen-Vapaavuori, Outi M; Hielm-Björkman, Anna K
2013-04-08
Various physiotherapeutic evaluation methods are used to assess the functionality of dogs with stifle problems. Neither validity nor sensitivity of these methods has been investigated. This study aimed to determine the most valid and sensitive physiotherapeutic evaluation methods for assessing functional capacity in hind limbs of dogs with stifle problems and to serve as a basis for developing an indexed test for these dogs. A group of 43 dogs with unilateral surgically treated cranial cruciate ligament deficiency and osteoarthritic findings was used to test different physiotherapeutic evaluation methods. Twenty-one healthy dogs served as the control group and were used to determine normal variation in static weight bearing and range of motion.The protocol consisted of 14 different evaluation methods: visual evaluation of lameness, visual evaluation of diagonal movement, visual evaluation of functional active range of motion and difference in thrust of hind limbs via functional tests (sit-to-move and lie-to-move), movement in stairs, evaluation of hind limb muscle atrophy, manual evaluation of hind limb static weight bearing, quantitative measurement of static weight bearing of hind limbs with bathroom scales, and passive range of motion of hind limb stifle (flexion and extension) and tarsal (flexion and extension) joints using a universal goniometer. The results were compared with those from an orthopaedic examination, force plate analysis, radiographic evaluation, and a conclusive assessment. Congruity of the methods was assessed with a combination of three statistical approaches (Fisher's exact test and two differently calculated proportions of agreeing observations), and the components were ranked from best to worst. Sensitivities of all of the physiotherapeutic evaluation methods against each standard were calculated. Evaluation of asymmetry in a sitting and lying position, assessment of muscle atrophy, manual and measured static weight bearing, and measurement of stifle passive range of motion were the most valid and sensitive physiotherapeutic evaluation methods. Ranking of the various physiotherapeutic evaluation methods was accomplished. Several of these methods can be considered valid and sensitive when examining the functionality of dogs with stifle problems.
Ranking of physiotherapeutic evaluation methods as outcome measures of stifle functionality in dogs
2013-01-01
Background Various physiotherapeutic evaluation methods are used to assess the functionality of dogs with stifle problems. Neither validity nor sensitivity of these methods has been investigated. This study aimed to determine the most valid and sensitive physiotherapeutic evaluation methods for assessing functional capacity in hind limbs of dogs with stifle problems and to serve as a basis for developing an indexed test for these dogs. A group of 43 dogs with unilateral surgically treated cranial cruciate ligament deficiency and osteoarthritic findings was used to test different physiotherapeutic evaluation methods. Twenty-one healthy dogs served as the control group and were used to determine normal variation in static weight bearing and range of motion. The protocol consisted of 14 different evaluation methods: visual evaluation of lameness, visual evaluation of diagonal movement, visual evaluation of functional active range of motion and difference in thrust of hind limbs via functional tests (sit-to-move and lie-to-move), movement in stairs, evaluation of hind limb muscle atrophy, manual evaluation of hind limb static weight bearing, quantitative measurement of static weight bearing of hind limbs with bathroom scales, and passive range of motion of hind limb stifle (flexion and extension) and tarsal (flexion and extension) joints using a universal goniometer. The results were compared with those from an orthopaedic examination, force plate analysis, radiographic evaluation, and a conclusive assessment. Congruity of the methods was assessed with a combination of three statistical approaches (Fisher’s exact test and two differently calculated proportions of agreeing observations), and the components were ranked from best to worst. Sensitivities of all of the physiotherapeutic evaluation methods against each standard were calculated. Results Evaluation of asymmetry in a sitting and lying position, assessment of muscle atrophy, manual and measured static weight bearing, and measurement of stifle passive range of motion were the most valid and sensitive physiotherapeutic evaluation methods. Conclusions Ranking of the various physiotherapeutic evaluation methods was accomplished. Several of these methods can be considered valid and sensitive when examining the functionality of dogs with stifle problems. PMID:23566355
Büttner, Kathrin; Salau, Jennifer; Krieter, Joachim
2016-07-01
Recent analyses of animal movement networks focused on the static aggregation of trade contacts over different time windows, which neglects the system's temporal variation. In terms of disease spread, ignoring the temporal dynamics can lead to an over- or underestimation of an outbreak's speed and extent. This becomes particularly evident, if the static aggregation allows for the existence of more paths compared to the number of time-respecting paths (i.e. paths in the right chronological order). Therefore, the aim of this study was to reveal differences between static and temporal representations of an animal trade network and to assess the quality of the static aggregation in comparison to the temporal counterpart. Contact data from a pig trade network (2006-2009) of a producer community in Northern Germany were analysed. The results show that a median value of 8.7 % (4.6-14.1%) of the nodes and 3.1% (1.6-5.5%) of the edges were active on a weekly resolution. No fluctuations in the activity patterns were obvious. Furthermore, 50% of the nodes already had one trade contact after approximately six months. For an accumulation window with increasing size (one day each), the accumulation rate, i.e. the relative increase in the number of nodes or edges, stayed relatively constant below 0.07% for the nodes and 0.12 % for the edges. The temporal distances had a much wider distribution than the topological distances. 84% of the temporal distances were smaller than 90 days. The maximum temporal distance was 1000 days, which corresponds to the temporal diameter of the present network. The median temporal correlation coefficient, which measures the probability for an edge to persist across two consecutive time steps, was 0.47, with a maximum value of 0.63 at the accumulation window of 88 days. The causal fidelity measures the fraction of the number of static paths which can also be taken in the temporal network. For the whole observation period relatively high values indicate that 67% of the time-respecting paths existed in both network representations. An increase to 0.87 (0.82-0.88) and 0.92 (0.80-0.98), respectively, could be observed for yearly and monthly aggregation windows. The results show that the investigated pig trade network in its static aggregation represents the temporal dynamics of the system sufficiently well. Therefore, the methodology for analysing static instead of dynamic networks can be used without losing too much information. Copyright © 2016 Elsevier B.V. All rights reserved.
Hood entry coefficients of compound exhaust hoods.
Figueroa, Crescente E
2011-12-01
A traditional method for assessing the flow rate in ventilation systems is based on multiple readings of velocity or velocity pressure (VP) (usually 10 or 20 points) taken in ductwork sections located away from fittings (> seven × diameters of straight duct). This study seeks to eliminate the need for a multiple-point evaluation and replace it with a simplified method that requires only a single measurement of hood static pressure (SP(h)) taken at a more accessible location (< three × diameters of straight duct from the hood entry). The SP(h) method is widely used for the assessment of flow rate in simple hoods. However, industrial applications quite often use compound hoods that are regularly of the slot/plenum type. For these hoods, a "compound coefficient of entry" has not been published, which makes the use of the hood static pressure method unfeasible. This study proposes a model for the computation of a "compound coefficient of entry" and validates the use of this model to assess flow rate in two systems of well-defined geometry (multi-slotted/plenum and single-slotted/tapered or "fish-tail" types). When using a conservative value of the slot loss factor (1.78), the proposed model yielded an estimate of the volumetric flow rate within 10% of that provided by a more comprehensive method of assessment. The simplicity of the hood static pressure method makes it very desirable, even in the upper range of experimental error found in this study.
Sadra, Saba; Fleischer, Adam; Klein, Erin; Grewal, Gurtej S; Knight, Jessica; Weil, Lowell Scott; Weil, Lowell; Najafi, Bijan
2013-01-01
Hallux valgus (HV) is associated with poorer performance during gait and balance tasks and is an independent risk factor for falls in older adults. We sought to assess whether corrective HV surgery improves gait and balance. Using a cross-sectional study design, gait and static balance data were obtained from 40 adults: 19 patients with HV only (preoperative group), 10 patients who recently underwent successful HV surgery (postoperative group), and 11 control participants. Assessments were made in the clinic using body-worn sensors. Patients in the preoperative group generally demonstrated poorer static balance control compared with the other two groups. Despite similar age and body mass index, postoperative patients exhibited 29% and 63% less center of mass sway than preoperative patients during double-and single-support balance assessments, respectively (analysis of variance P =.17 and P =.14, respectively [both eyes open condition]). Overall, gait performance was similar among the groups, except for speed during gait initiation, where lower speeds were encountered in the postoperative group compared with the preoperative group (Scheffe P = .049). This study provides supportive evidence regarding the benefits of corrective lower-extremity surgery on certain aspects of balance control. Patients seem to demonstrate early improvements in static balance after corrective HV surgery, whereas gait improvements may require a longer recovery time. Further research using a longitudinal study design and a larger sample size capable of assessing the long-term effects of HV surgical correction on balance and gait is probably warranted.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... standards. The collection also requires airport operators to comply with a security directive by maintaining... airport operators maintain records of criminal history records checks and security threat assessments in... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...
Security breaches: tips for assessing and limiting your risks.
Coons, Leeanne R
2011-01-01
As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.
Vortex Flap Technology: a Stability and Control Assessment
NASA Technical Reports Server (NTRS)
Carey, K. M.; Erickson, G. E.
1984-01-01
A comprehensive low-speed wind tunnel investigation was performed of leading edge vortex flaps applied to representative aircraft configurations. A determination was made of the effects of analytically- and empirically-designed vortex flaps on the static longitudinal and lateral-directional aerodynamics, stability, and control characteristics of fighter wings having leading-edge sweep angles of 45 to 76.5 degrees. The sensitivity to several configuration modifications was assessed, which included the effects of flap planform, leading- and trailing-edge flap deflection angles, wing location on the fuselage, forebody strakes, canards, and centerline and outboard vertical tails. Six-component forces and moments, wing surface static pressure distributions, and surface flow patterns were obtained using the Northrop 21- by 30-inch low-speed wind tunnel.
Yu, Zhenpeng; Wang, Jiandong
2016-09-01
This paper assesses the performance of feedforward controllers for disturbance rejection in univariate feedback plus feedforward control loops. The structures of feedback and feedforward controllers are confined to proportional-integral-derivative and static-lead-lag forms, respectively, and the effects of feedback controllers are not considered. The integral squared error (ISE) and total squared variation (TSV) are used as performance metrics. A performance index is formulated by comparing the current ISE and TSV metrics to their own lower bounds as performance benchmarks. A controller performance assessment (CPA) method is proposed to calculate the performance index from measurements. The proposed CPA method resolves two critical limitations in the existing CPA methods, in order to be consistent with industrial scenarios. Numerical and experimental examples illustrate the effectiveness of the obtained results. Copyright © 2016 ISA. Published by Elsevier Ltd. All rights reserved.
33 CFR 127.007 - Letter of intent and waterway suitability assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... facility and LNG or LHG tanker route; (iii) Risk assessment for maritime safety and security; (iv) Risk management strategies; and (v) Resource needs for maritime safety, security, and response. (g) The Follow-on...
Mukhopadhyay, Dipta Kanti; Mukhopadhyay, Sujishnu; Biswas, Akhil Bandhu
2010-01-01
Strengthening food security enhancement intervention should be based on the assessment of household food security and its correlates. The objective was to find out the prevalence and factors contributing to household food security in a tribal population in Bankura. A cross-sectional study was conducted among 267 tribal households in Bankura-I CD Block selected through cluster random sampling. Household food security was assessed using a validated Bengali version of Household Food Security Scale-Short Form along with the collection of information regarding the monthly per capita expenditure (MPCE), total to earning member ratio, BPL card holding, utilization of the public distribution system (PDS) and receipt of any social assistance through a house-to-house survey. Overall, 47.2% of study households were food secure whereas 29.6% and 23.2% were low and very low food secure, respectively. MPCE ≥ Rs. 356, total to earning member ratio ≤ 4:1, regular utilization of PDS, and nonholding of the BPL card were significantly related with household food security.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Koyama, Tadashi
2005-04-01
We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.
Van Ryzin, Mark J; Leve, Leslie D
2012-04-01
In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Biological Variation and Diagnostic Accuracy of Dehydration Assessment Markers
2010-07-01
range of values as good general starting points, II data negate their relevance for static dehydration assessment (31, 32, 48, 50) in high- risk ...treatment situations. However, a practical use in cir- cumstances of lower- risk assessment may still be warranted (4, 5, 23). Dynamic dehydration assessment...usefulness, al- though it may still be of practical use for low- risk population assessment (15, 23). Importantly, any urine concentration mea- sure
Upper-surface-blowing flow-turning performance
NASA Technical Reports Server (NTRS)
Sleeman, W. C., Jr.; Phelps, A. E., III
1976-01-01
Jet exhaust flow-turning characteristics were determined for systematic variations in upper-surface blowing exhaust nozzles and trailing-edge flap configuration variables from experimental wind-off (static) flow studies. For conditions with parallel flow exhausting from the nozzle, jet height (as indicated by nozzle exit height) and flap radius were found to be the most important parameters relating to flow turning. Nonparallel flow from the nozzle, as obtained from an internal roof angle and/or side spread angle, had a large favorable effect on flow turning. Comparisons made between static turning results and wind tunnel aerodynamic studies of identical configurations indicated that static flow-turning results can be indicative of wind-on powered lift performance for both good and poor nozzle-flap combinations but, for marginal designs, can lead to overly optimistic assessment of powered lift potential.
Static magnetotherapy for the treatment of insomnia.
Shieh, Yao Y; Tsai, Fong Y
2008-01-01
Magnets have been used for centuries to treat a number of physical disorders. The vast majority of research, however, on static magnet therapy for insomnia has been confined to the auricular type of therapy, with publications limited to Chinese journals. Most of these studies have depended on the subjective self-assessment of participants rather than objective scientific measurements. In this study, the authors report the positive preliminary results of insomnia treatment using pillows with embedded magnets, magnetic insoles and TriPhase bracelets. The analysis is based on objective actigraphic and polysomnographic data. A theory of accelerated transition from wakefulness to sleep is proposed to explain the process of insomnia relief through low-strength static magnetic fields. Analysis by functional Magnetic Resonance Imaging (fMRI) is used to further investigate the theory.
Rep. Titus, Dina [D-NV-3
2010-06-21
House - 06/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-15
... Information Collection Activity Under OMB Review: Sensitive Security Information Threat Assessments AGENCY... Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of... of a party seeking access to sensitive security information (SSI) in a civil proceeding in Federal...
ERIC Educational Resources Information Center
Matthews, Michael S.; Farmer, Jennie
2017-01-01
Dynamic assessment methods, initially developed by Feuerstein in the 1970s, have been recommended as being more equitable for identifying the academic abilities of students who may not perform well on traditional assessments due to these learners' cultural, linguistic, or economic differences from the population for whom the traditional measures…
NASA Astrophysics Data System (ADS)
Alif, S. M.; Nugroho, A. P.; Leksono, B. E.
2018-03-01
Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.
78 FR 16694 - Chemical Security Assessment Tool (CSAT)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... information provided. Comments that include trade secrets, confidential commercial or financial information... secrets, confidential commercial or financial information, CVI, SSI, or PCII should be appropriately... Department make the instruments (e.g., Top-Screen, Security Vulnerability Assessment [SVA]/ Alternative...
DOT National Transportation Integrated Search
2003-05-01
The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...
NASA Technical Reports Server (NTRS)
Krueger, Ronald
2012-01-01
The development of benchmark examples for quasi-static delamination propagation and cyclic delamination onset and growth prediction is presented and demonstrated for Abaqus/Standard. The example is based on a finite element model of a Double-Cantilever Beam specimen. The example is independent of the analysis software used and allows the assessment of the automated delamination propagation, onset and growth prediction capabilities in commercial finite element codes based on the virtual crack closure technique (VCCT). First, a quasi-static benchmark example was created for the specimen. Second, based on the static results, benchmark examples for cyclic delamination growth were created. Third, the load-displacement relationship from a propagation analysis and the benchmark results were compared, and good agreement could be achieved by selecting the appropriate input parameters. Fourth, starting from an initially straight front, the delamination was allowed to grow under cyclic loading. The number of cycles to delamination onset and the number of cycles during delamination growth for each growth increment were obtained from the automated analysis and compared to the benchmark examples. Again, good agreement between the results obtained from the growth analysis and the benchmark results could be achieved by selecting the appropriate input parameters. The benchmarking procedure proved valuable by highlighting the issues associated with choosing the input parameters of the particular implementation. Selecting the appropriate input parameters, however, was not straightforward and often required an iterative procedure. Overall the results are encouraging, but further assessment for mixed-mode delamination is required.
Development of Benchmark Examples for Static Delamination Propagation and Fatigue Growth Predictions
NASA Technical Reports Server (NTRS)
Kruger, Ronald
2011-01-01
The development of benchmark examples for static delamination propagation and cyclic delamination onset and growth prediction is presented and demonstrated for a commercial code. The example is based on a finite element model of an End-Notched Flexure (ENF) specimen. The example is independent of the analysis software used and allows the assessment of the automated delamination propagation, onset and growth prediction capabilities in commercial finite element codes based on the virtual crack closure technique (VCCT). First, static benchmark examples were created for the specimen. Second, based on the static results, benchmark examples for cyclic delamination growth were created. Third, the load-displacement relationship from a propagation analysis and the benchmark results were compared, and good agreement could be achieved by selecting the appropriate input parameters. Fourth, starting from an initially straight front, the delamination was allowed to grow under cyclic loading. The number of cycles to delamination onset and the number of cycles during stable delamination growth for each growth increment were obtained from the automated analysis and compared to the benchmark examples. Again, good agreement between the results obtained from the growth analysis and the benchmark results could be achieved by selecting the appropriate input parameters. The benchmarking procedure proved valuable by highlighting the issues associated with the input parameters of the particular implementation. Selecting the appropriate input parameters, however, was not straightforward and often required an iterative procedure. Overall, the results are encouraging but further assessment for mixed-mode delamination is required.
NASA Technical Reports Server (NTRS)
Krueger, Ronald
2011-01-01
The development of benchmark examples for static delamination propagation and cyclic delamination onset and growth prediction is presented and demonstrated for a commercial code. The example is based on a finite element model of an End-Notched Flexure (ENF) specimen. The example is independent of the analysis software used and allows the assessment of the automated delamination propagation, onset and growth prediction capabilities in commercial finite element codes based on the virtual crack closure technique (VCCT). First, static benchmark examples were created for the specimen. Second, based on the static results, benchmark examples for cyclic delamination growth were created. Third, the load-displacement relationship from a propagation analysis and the benchmark results were compared, and good agreement could be achieved by selecting the appropriate input parameters. Fourth, starting from an initially straight front, the delamination was allowed to grow under cyclic loading. The number of cycles to delamination onset and the number of cycles during delamination growth for each growth increment were obtained from the automated analysis and compared to the benchmark examples. Again, good agreement between the results obtained from the growth analysis and the benchmark results could be achieved by selecting the appropriate input parameters. The benchmarking procedure proved valuable by highlighting the issues associated with choosing the input parameters of the particular implementation. Selecting the appropriate input parameters, however, was not straightforward and often required an iterative procedure. Overall the results are encouraging, but further assessment for mixed-mode delamination is required.
Defense.gov Special Report: Aspen Security Forum 2014
Adventurism-Is Europe Ready? Cooperation in Counterterrorism Bringing into Balance the Military Instrument The Future of Warfare Striking Balance between Security and Liberty Assessing Department of Homeland Security Aspen Security Forum. Story Army Needs Balance, Odierno Says In the debate about how large the Army
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
Damage and fracture in fabric-reinforced composites under quasi-static and dynamic bending
NASA Astrophysics Data System (ADS)
Ullah, H.; Harland, A. R.; Silberschmidt, V. V.
2013-07-01
Fabric-reinforced polymer composites used in sports products can be exposed to different in-service conditions such as large deformations caused by quasi-static and dynamic loading. Composite materials subjected to such bending loads can demonstrate various damage modes - matrix cracking, delamination and, ultimately, fabric fracture. Damage evolution in composites affects both their in-service properties and performance that can deteriorate with time. Such behaviour needs adequate means of analysis and investigation, the main approaches being experimental characterisation and non-destructive examination of internal damage in composite laminates. This research deals with a deformation behaviour and damage in carbon fabric-reinforced polymer (CFRP) laminates caused by quasi-static and dynamic bending. Experimental tests were carried out to characterise the behaviour of a CFRP material under large-deflection bending, first in quasi-static and then in dynamic conditions. Izod-type impact bending tests were performed on un-notched specimens of CFRP using a Resil impactor to assess the transient response and energy absorbing capability of the material. X-ray micro computed tomography (micro-CT) was used to analyse various damage modes in the tested specimens. X-ray tomographs revealed that through-thickness matrix cracking, inter-ply and intra-ply delamination such as tow debonding, and fabric fracture were the prominent damage modes both in quasi-static and dynamic test specimens. However, the inter-ply damage was localised at impact location in dynamically tested specimens, whereas in the quasi-static specimens, it spread almost over the entire interface.
Motion facilitates face perception across changes in viewpoint and expression in older adults.
Maguinness, Corrina; Newell, Fiona N
2014-12-01
Faces are inherently dynamic stimuli. However, face perception in younger adults appears to be mediated by the ability to extract structural cues from static images and a benefit of motion is inconsistent. In contrast, static face processing is poorer and more image-dependent in older adults. We therefore compared the role of facial motion in younger and older adults to assess whether motion can enhance perception when static cues are insufficient. In our studies, older and younger adults learned faces presented in motion or in a sequence of static images, containing rigid (viewpoint) or nonrigid (expression) changes. Immediately following learning, participants matched a static test image to the learned face which varied by viewpoint (Experiment 1) or expression (Experiment 2) and was either learned or novel. First, we found an age effect with better face matching performance in younger than in older adults. However, we observed face matching performance improved in the older adult group, across changes in viewpoint and expression, when faces were learned in motion relative to static presentation. There was no benefit for facial (nonrigid) motion when the task involved matching inverted faces (Experiment 3), suggesting that the ability to use dynamic face information for the purpose of recognition reflects motion encoding which is specific to upright faces. Our results suggest that ageing may offer a unique insight into how dynamic cues support face processing, which may not be readily observed in younger adults' performance. (PsycINFO Database Record (c) 2014 APA, all rights reserved).
Boldt, Lea J.; Kochanska, Grazyna; Yoon, Jeung Eun; Nordling, Jamie Koenig
2014-01-01
We examined children’s attachment security with their mothers and fathers in a community sample (N = 100). At 25 months, mothers, fathers, and trained observers completed Attachment Q-Set (AQS). At 100 months, children completed Kerns Security Scale (KSS) for each parent. Children’s adaptation (behavior problems and competence in broader ecologies of school and peer group, child- and parent-reported) was assessed at 100 months. By and large, the child’s security with the mother and father was modestly to robustly concordant across both relationships, depending on the assessment method. Observers’ AQS security scores predicted children’s self-reported security 6 years later. For children with low AQS security scores with mothers, variations in security with fathers had significant implications for adaptation: Those whose security with fathers was also low reported the most behavior problems and were seen as least competent in broader ecologies, but those whose security with fathers was high reported few problems and were seen as competent. Security with fathers, observer-rated and child-reported, predicted children’s higher competence in broader ecologies. A cumulative index of the history of security from toddler age to middle childhood, integrating measures across both relationships and diverse methodologies, was significantly associated with positive adaptation at 100 months. PMID:24605850
Palmer, Ty B; Agu-Udemba, Chinonye C; Palmer, Bailey M
2018-02-01
This study aimed to examine the acute effects of straight-leg raise (SLR) static stretching on passive stiffness and postural balance in healthy, elderly men. An additional aim of this study was to examine the relationships between stiffness and balance at baseline (prior to stretching) and the relationships between the stretch-induced changes in these variables. Eleven elderly men (age = 69 ± 6 years; height = 177 ± 7 cm; mass = 83 ± 13 kg) underwent postural balance and passive stiffness assessments before and after: 1) a stretching treatment consisting of four, 15-s SLR static stretches performed by the primary investigator and 2) a control treatment consisting of no static stretching. Passive stiffness was calculated from the slopes of the initial (phase 1) and final (phase 2) portions of the angle-torque curve. Unilateral postural balance was assessed on the right leg using a commercially designed balance testing device, which provides a measurement of static stability based on the overall stability index (OSI). The slope coefficients and OSI values decreased from pre- to post-treatment for the stretching intervention (P = 0.015 and 0.018, respectively); however, there were no changes for the control (P = 0.654 and 0.920). For the stretching intervention, a significant positive relationship was observed between OSI and the slope coefficient of phase 1 at baseline (r = 0.619; P = 0.042). A significant positive relationship was also observed between the stretched-induced changes in OSI and the slope coefficient of phase 1 (r = 0.731; P = 0.011). No relationship was observed between OSI and the slope coefficient of phase 2 at baseline (r = 0.262; P = 0.437) nor was there a relationship between the changes in these variables (r = 0.419; P = 0.200). A short, practical bout of SLR static stretching may be an effective intervention for reducing passive stiffness and improving postural balance in healthy, elderly men.