Sample records for system scada ids

  1. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less

  2. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  3. Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection

    DTIC Science & Technology

    2014-03-27

    prevent intrusions in smart grids [PK12]. Parthasarathy proposed an anomaly detection based IDS that takes into account system state. In his implementation...Security, 25(7):498–506, 10 2006. [LMV12] O. Linda, M. Manic, and T. Vollmer. Improving cyber-security of smart grid systems via anomaly detection and...6 2012. 114 [PK12] S. Parthasarathy and D. Kundur. Bloom filter based intrusion detection for smart grid SCADA. In Electrical & Computer Engineering

  4. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less

  5. Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm

    DTIC Science & Technology

    2016-08-01

    inspection rules using an intrusion-detection system (IDS) sensor, a simulated Programmable Logic Controller (PLC), and a Modbus client operating...operating system PLC Programmable Logic Controller SCADA supervisory control and data acquisition SIGHUP signal hangup SPAN Switched Port Analyzer

  6. An Encryption Scheme for Communication Internet SCADA Components

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  7. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  8. Wind Power Plant SCADA and Controls

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badrzadeh, Babak; Castillo, Nestor; Bradt, M.

    2011-01-01

    Modern Wind Power Plants (WPPs) contain a variety of intelligent electronic devices (IEDs), Supervisory Control and Data Acquisition (SCADA) and communication systems. This paper discusses the issues related to a typical WPP's SCADA and Control. Presentation topics are: (1) Wind Turbine Controls; (2) Wind Plant SCADA, OEM SCADA Solutions, Third-Party SCADA Solutions; (3) Wind Plant Control; and (4) Security and Reliability Compliance.

  9. Towards a Standard for Highly Secure SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlson, R.

    1998-09-25

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less

  10. Supervisory Control and Data Acquisition (SCADA) Security Awareness In a Resource Constrained Learning Environment

    DTIC Science & Technology

    2014-06-16

    SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their

  11. Study on the Future Internet System through Analysis of SCADA Systems

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Jung, Sungmo; Kim, Seoksoo

    Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.

  12. An Architecture for SCADA Network Forensics

    NASA Astrophysics Data System (ADS)

    Kilpatrick, Tim; Gonzalez, Jesus; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet

    Supervisory control and data acquisition (SCADA) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.

  13. Development of a novel SCADA system for laboratory testing.

    PubMed

    Patel, M; Cole, G R; Pryor, T L; Wilmot, N A

    2004-07-01

    This document summarizes the supervisory control and data acquisition (SCADA) system that allows communication with, and controlling the output of, various I/O devices in the renewable energy systems and components test facility RESLab. This SCADA system differs from traditional SCADA systems in that it supports a continuously changing operating environment depending on the test to be performed. The SCADA System is based on the concept of having one Master I/O Server and multiple client computer systems. This paper describes the main features and advantages of this dynamic SCADA system, the connections of various field devices to the master I/O server, the device servers, and numerous software features used in the system. The system is based on the graphical programming language "LabVIEW" and its "Datalogging and Supervisory Control" (DSC) module. The DSC module supports a real-time database called the "tag engine," which performs the I/O operations with all field devices attached to the master I/O server and communications with the other tag engines running on the client computers connected via a local area network. Generic and detailed communication block diagrams illustrating the hierarchical structure of this SCADA system are presented. The flow diagram outlining a complete test performed using this system in one of its standard configurations is described.

  14. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  15. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  16. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  17. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies tomore » SCADA systems; our metric is a specialization of the generic measure of mean failure cost.« less

  18. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  19. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    ERIC Educational Resources Information Center

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  20. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  1. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  2. Mobile phone based SCADA for industrial automation.

    PubMed

    Ozdemir, Engin; Karacor, Mevlut

    2006-01-01

    SCADA is the acronym for "Supervisory Control And Data Acquisition." SCADA systems are widely used in industry for supervisory control and data acquisition of industrial processes. Conventional SCADA systems use PC, notebook, thin client, and PDA as a client. In this paper, a Java-enabled mobile phone has been used as a client in a sample SCADA application in order to display and supervise the position of a sample prototype crane. The paper presents an actual implementation of the on-line controlling of the prototype crane via mobile phone. The wireless communication between the mobile phone and the SCADA server is performed by means of a base station via general packet radio service (GPRS) and wireless application protocol (WAP). Test results have indicated that the mobile phone based SCADA integration using the GPRS or WAP transfer scheme could enhance the performance of the crane in a day without causing an increase in the response times of SCADA functions. The operator can visualize and modify the plant parameters using his mobile phone, without reaching the site. In this way maintenance costs are reduced and productivity is increased.

  3. Detecting Peer-to-Peer Botnets in SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    Supervisory Control and Data Acquisition (SCADA) systems monitor and control critical infrastructure such as the smart grid. As SCADA systems become increasingly interconnected and adopt more and more cyber-enabled components, the risks of cyber attacks become a major concern. Due to their decentralized organization, peer-to-peer (P2P) botnets are resilient to many existing takedown measures and can be exploited as an effective way to launch cyber attacks on SCADA systems. However, little work has been done to detect P2P botnets in SCADA systems, which carry traffic flows with characteristics significantly different from the Internet. In this paper, we design a P2P-botnetmore » detection method for SCADA systems, leveraging built-in traffic monitoring capabilities of SCADA networking devices. The proposed method consists of two stages. In the first stage, we design a simple feature test to filter out non-P2P hosts, which significantly reduces the data volume for P2P-botnet identification. In the second stage, we jointly consider flow-based and connectivity-based features that effectively set apart bots from benign hosts. We propose to use unsupervised learning for P2P-botnet identification, which not only identifies known P2P botnets but also captures newly emerged ones. Our simulation results show that the proposed system achieves high detection rates with very few false positives. Furthermore, our evaluation shows that the proposed method can detect hosts running P2P SCADA applications that are infected by P2P bots.« less

  4. Review of Supervisory Control and Data Acquisition (SCADA) Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reva Nickelson; Briam Johnson; Ken Barnes

    2004-01-01

    A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

  5. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on howmore » to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.« less

  6. Drainpipe network management information system design based on GIS and SCADA technique

    NASA Astrophysics Data System (ADS)

    Gu, Ze-Yu; Zhao, De-An

    2011-02-01

    Achieving urban drainpipe network integration of geographical information system (GIS) and supervisory control and data acquisition (SCADA) technology is described in this paper. The system design's plans are put forward, which have realized GIS and SCADA system supplementary in the technology and strengthened the model visible analysis ability. It is verified by practical cases that the system has more practical values and a good prospect.

  7. Cybersecurity of Critical Control Networks

    DTIC Science & Technology

    2015-07-14

    project are included below. The tasks include work in link encryption for existing legacy SCADA equipment, where we continue to develop lightweight...language for authoring and monitoring compliance of SCADA systems, including technologies for a “policy monitor” which reports out on any observance issues...Acquisition ( SCADA ). Details of each project are included below. The tasks include work in link encryption for existing legacy SCADA equipment

  8. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  9. Using State Estimation Residuals to Detect Abnormal SCADA Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Jian; Chen, Yousu; Huang, Zhenyu

    2010-04-30

    Detection of abnormal supervisory control and data acquisition (SCADA) data is critically important for safe and secure operation of modern power systems. In this paper, a methodology of abnormal SCADA data detection based on state estimation residuals is presented. Preceded with a brief overview of outlier detection methods and bad SCADA data detection for state estimation, the framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection algorithm. The BACON algorithm ismore » applied to the outlier detection task. The IEEE 118-bus system is used as a test base to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less

  10. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-criticalmore » monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).« less

  11. Susceptibility of SCADA systems and the energy sector

    NASA Astrophysics Data System (ADS)

    Goike, Lindsay

    The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.

  12. Applying New Network Security Technologies to SCADA Systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators.more » 4This page intentionally left blank.« less

  13. Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System

    DTIC Science & Technology

    2011-03-01

    Byres, E. J., Lowe, J. (2004). The Myths and facts behind cyber security risks for industrial control systems . Berlin, Germany: VDE 2004 Congress...ACQUISITION (SCADA) SYSTEM THESIS Jason R. Nielsen, Major, USAF AFIT/GCO/ENG/11-10 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...DATA ACQUISITION (SCADA) SYSTEM THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of

  14. Internet SCADA Utilizing API's as Data Source

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Haeng-Kon; Kim, Tai-Hoon

    An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in Control Systems. SCADA is an example of a control system and it is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. In this paper, we designed a scheme for Weather Condition in Internet SCADA Environment utilizing data from external API services. The scheme was designed to double check the weather information in SCADA.

  15. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    NASA Astrophysics Data System (ADS)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  16. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  17. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  18. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  19. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  20. Design of virtual SCADA simulation system for pressurized water reactor

    NASA Astrophysics Data System (ADS)

    Wijaksono, Umar; Abdullah, Ade Gafar; Hakim, Dadang Lukman

    2016-02-01

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles of energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.

  1. Using Physical Models for Anomaly Detection in Control Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  2. SCADA OPERATOR TRAINING TOOL APPLIED TO THE CENTRAL ARIZONA IRRIGATION AND DRAINAGE DISTRICT

    USDA-ARS?s Scientific Manuscript database

    Many irrigation districts use Supervisory Control and Data Acquisition (SCADA) software to manage their canal systems. Whether homegrown or commercial, these programs require a significant amount of training for new operators. While some SCADA operators are hired with extensive field experience, o...

  3. Design of virtual SCADA simulation system for pressurized water reactor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wijaksono, Umar, E-mail: umar.wijaksono@student.upi.edu; Abdullah, Ade Gafar; Hakim, Dadang Lukman

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles ofmore » energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.« less

  4. Using State Estimation Residuals to Detect Abnormal SCADA Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Jian; Chen, Yousu; Huang, Zhenyu

    2010-06-14

    Detection of manipulated supervisory control and data acquisition (SCADA) data is critically important for the safe and secure operation of modern power systems. In this paper, a methodology of detecting manipulated SCADA data based on state estimation residuals is presented. A framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection process. The BACON algorithm is applied to detect outliers in the state estimation residuals. The IEEE 118-bus system is used asmore » a test case to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less

  5. Real-Time SCADA Cyber Protection Using Compression Techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welchmore » (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.« less

  6. Designing a SCADA system simulator for fast breeder reactor

    NASA Astrophysics Data System (ADS)

    Nugraha, E.; Abdullah, A. G.; Hakim, D. L.

    2016-04-01

    SCADA (Supervisory Control and Data Acquisition) system simulator is a Human Machine Interface-based software that is able to visualize the process of a plant. This study describes the results of the process of designing a SCADA system simulator that aims to facilitate the operator in monitoring, controlling, handling the alarm, accessing historical data and historical trend in Nuclear Power Plant (NPP) type Fast Breeder Reactor (FBR). This research used simulation to simulate NPP type FBR Kalpakkam in India. This simulator was developed using Wonderware Intouch software 10 and is equipped with main menu, plant overview, area graphics, control display, set point display, alarm system, real-time trending, historical trending and security system. This simulator can properly simulate the principle of energy flow and energy conversion process on NPP type FBR. This SCADA system simulator can be used as training media for NPP type FBR prospective operators.

  7. Supervisory Control and Data Acquisition System | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Supervisory Control and Data Acquisition System Supervisory Control supervisory control and data acquisition (SCADA) system monitors and controls safety systems and gathers real Energy Systems Integration Facility control room. The Energy Systems Integration Facility's SCADA system

  8. Production Facility SCADA Design Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  9. Sandia SCADA Program -- High Surety SCADA LDRD Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    CARLSON, ROLF E.

    2002-04-01

    Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteriamore » Protection Profile. This report provides the status of work completed and discusses several challenges ahead.« less

  10. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    DTIC Science & Technology

    2013-06-01

    standard for cryptographic protection of SCADA communications. The United Kingdom’s National Infrastructure Security Co-ordination Centre (NISCC...has released a good practice guide on firewall deployment for SCADA systems and process control networks [17]. Meanwhile, National Institute for ...report. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 18 The SCADA gateway collects the data gathered by sensors, translates them from

  11. Pipeline scada upgrade uses satellite terminal system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conrad, W.; Skovrinski, J.R.

    In the recent automation of its supervisory control and data acquisition (scada) system, Transwestern Pipeline Co. has become the first to use very small aperture satellite terminals (VSAT's) for scada. A subsidiary of Enron Interstate Pipeline, Houston, Transwestern moves natural gas through a 4,400-mile system from West Texas, New Mexico, and Oklahoma to southern California markets. Transwestern's modernization, begun in November 1985, addressed problems associated with its aging control equipment which had been installed when the compressor stations were built in 1960. Over the years a combination of three different systems had been added. All were cumbersome to maintain andmore » utilized outdated technology. Problems with reliability, high maintenance time, and difficulty in getting new parts were determining factors in Transwestern's decision to modernize its scada system. In addition, the pipeline was anticipating moving its control center from Roswell, N.M., to Houston and believed it would be impossible to marry the old system with the new computer equipment in Houston.« less

  12. Industrial Control Systems/SCADA systems risk assessment in the energy sector

    NASA Astrophysics Data System (ADS)

    Falodun, Babatunde

    The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.

  13. Fundamentals of SCADA and automated meter reading

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kwok, A.

    1992-02-01

    This paper discusses SCADA systems allow users to control and acquire data from remote facilities such as compressors, pressure-regulating stations, control valves and measurement stations. In general, a SCADA system performs functions in sequential control, continuous control, supervisory setpoint control and data acquisitions. AMR systems allow users to obtain up-to-date information on their gas demand. When AMR was in its infancy, equipment was designed only to read and record gas consumption values. The basic function of an early AMR system was to read gas volume at a fixed interval and record the data in its memory until it communicated withmore » a central receiving facility.« less

  14. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  15. Real-Time Monitoring of Scada Based Control System for Filling Process

    NASA Astrophysics Data System (ADS)

    Soe, Aung Kyaw; Myint, Aung Naing; Latt, Maung Maung; Theingi

    2008-10-01

    This paper is a design of real-time monitoring for filling system using Supervisory Control and Data Acquisition (SCADA). The monitoring of production process is described in real-time using Visual Basic.Net programming under Visual Studio 2005 software without SCADA software. The software integrators are programmed to get the required information for the configuration screens. Simulation of components is expressed on the computer screen using parallel port between computers and filling devices. The programs of real-time simulation for the filling process from the pure drinking water industry are provided.

  16. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  17. Modeling of a data exchange process in the Automatic Process Control System on the base of the universal SCADA-system

    NASA Astrophysics Data System (ADS)

    Topolskiy, D.; Topolskiy, N.; Solomin, E.; Topolskaya, I.

    2016-04-01

    In the present paper the authors discuss some ways of solving energy saving problems in mechanical engineering. In authors' opinion one of the ways of solving this problem is integrated modernization of power engineering objects of mechanical engineering companies, which should be intended for the energy supply control efficiency increase and electric energy commercial accounting improvement. The author have proposed the usage of digital current and voltage transformers for these purposes. To check the compliance of this equipment with the IEC 61850 International Standard, we have built a mathematic model of the data exchange process between measuring transformers and a universal SCADA-system. The results of modeling show that the discussed equipment corresponds to the mentioned Standard requirements and the usage of the universal SCADA-system for these purposes is preferable and economically reasonable. In modeling the authors have used the following software: MasterScada, Master OPC_DI_61850, OPNET.

  18. Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy

    DTIC Science & Technology

    2014-03-27

    20 Intrusion Detection...alarms ( Rem ). ............................................................................................................. 86 Figure 25. TP% for...literature concerning the focus areas of this research. The focus areas include SCADA vulnerabilities, information theory, and intrusion detection

  19. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pollet, J.

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less

  20. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.

    PubMed

    Wang, Hao; Lau, Nathan; Gerdes, Ryan M

    2018-04-01

    The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.

  1. Application of an automation system and a supervisory control and data acquisition (SCADA) system for the optimal operation of a membrane adsorption hybrid system.

    PubMed

    Smith, P J; Vigneswaran, S; Ngo, H H; Nguyen, H T; Ben-Aim, R

    2006-01-01

    The application of automation and supervisory control and data acquisition (SCADA) systems to municipal water and wastewater treatment plants is rapidly increasing. However, the application of these systems is less frequent in the research and development phases of emerging treatment technologies used in these industries. This study involved the implementation of automation and a SCADA system to the submerged membrane adsorption hybrid system for use in a semi-pilot scale research project. An incremental approach was used in the development of the automation and SCADA systems, leading to the development of two new control systems. The first system developed involved closed loop control of the backwash initiation, based upon a pressure increase, leading to productivity improvements as the backwash is only activated when required, not at a fixed time. This system resulted in a 40% reduction in the number of backwashes required and also enabled optimised operations under unsteady concentrations of wastewater. The second system developed involved closed loop control of the backwash duration, whereby the backwash was terminated when the pressure reached a steady state. This system resulted in a reduction of the duration of the backwash of up to 25% and enabled optimised operations as the foulant build-up within the reactor increased.

  2. Automatically Identifying and Predicting Unplanned Wind Turbine Stoppages Using SCADA and Alarms System Data: Case Study and Results

    NASA Astrophysics Data System (ADS)

    Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.

    2017-11-01

    Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.

  3. Architecture and Methods for Substation SCADA Cybersecurity: Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy

    There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less

  4. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  5. SCADA Application for ACTS Technology

    NASA Technical Reports Server (NTRS)

    Fairbanks, Barry

    1992-01-01

    The results of a system level study done by Hughes Network Systems for NASA are presented. For the supervisory control and data acquisition (SCADA) application, use of Ka-band spot beam satellite technology associated with NASA's Advanced Communication Technology Satellite (ACTS) offers a reduction in Earth station antenna size and transmitter power that may translate into lower system costs. The approaches taken to determine commercial potential of the system are described.

  6. Automated turn pike using PLC and SCADA

    NASA Astrophysics Data System (ADS)

    Silpa Sreedhar, P.; Aiswarya, P.; Kathirvelan, J.

    2017-11-01

    We propose a smart turnpike based on Programmable Logic Controller (PLC) and Supervisory Control and Data Acquisition Systems (SCADA) in this paper. In this work, the basic idea is to measure the weight of the vehicles and classify them according to its weight to the respective lanes. It is difficult for the turnpike people to monitor the whole process all the time. So, this PLC based diversion system can be implemented in turnpikes to reduce the difficulties. This method will work based on weight sensors (piezo-resistive) whose output will be fed to a PLC, which will control the vehicle diversion. Using SCADA software, the whole process can be monitored from a remote area. The algorithm developed in this successfully installed in real time system.

  7. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relaymore » is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.« less

  8. Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2010-03-01

    CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF DEFENSE (DOD) SUPERVISORY CONTROL AND DATA...Force, Department of Defense, or the U.S. Government. AFIT/GCO/ENG/10-13 CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF...DEFENSE (DOD) SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS THESIS Presented to the Faculty Department of Electrical and Computer

  9. Expanding Combat Power Through Military Cyberpower Theory

    DTIC Science & Technology

    2015-04-02

    systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to

  10. The Commanding Officer’s Perspective on Protecting Shipboard IT Networks

    DTIC Science & Technology

    2014-09-01

    potential checklist for protecting Supervisory Control and Data Acquisition ( SCADA ) systems. “A SCADA system is the software that controls networks such as...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE COMMANDING... for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data

  11. Resilient Control and Intrusion Detection for SCADA Systems

    DTIC Science & Technology

    2014-05-01

    Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human

  12. Renewable Energy SCADA/Training Using NASA's Advanced Technology Communication Satellite

    NASA Technical Reports Server (NTRS)

    Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)

    2000-01-01

    The lack of electrical energy in the rural communities of developing countries is well known, as is the economic unfeasibility of providing much needed energy to these regions via electric grids. Renewable energy (RE) can provide an economic advantage over conventional forms in meeting some of these energy needs. The use of a Supervisory Control and Data Acquisition (SCADA) arrangement via satellite could enable experts at remote locations to provide technical assistance to local trainees while they acquire a measure of proficiency with a newly installed RE system through hands-on training programs using the same communications link. Upon full mastery of the technologies, indigenous personnel could also employ similar SCADA arrangements to remotely monitor and control their constellation of RE systems. Two separate ACTS technology verification experiments (TVEs) have demonstrated that the portability of the Ultra Small Aperture Terminal (USAT) and the versatility of NASA's Advanced Communications Technology Satellite (ACTS), as well as the advantages of Ka band satellites, can be invaluable in providing energy training via distance education (DE), and for implementing renewable energy system SCADA. What has not been tested is the capabilities of these technologies for a simultaneous implementation of renewable energy DE and SCADA. Such concurrent implementations will be useful for preparing trainees in developing countries for their eventual SCADA operations. The project described in this correspondence is the first effort, to our knowledge, in this specific TVE. The setup for this experiment consists of a one-Watt USAT located at Florida Solar Energy Center (FSEC) connected to two satellite modems tuned to different frequencies to establish two duplex ACTS Ka-band communication channels. A short training program on operation and maintenance of the system will be delivered while simultaneously monitoring and controlling the hybrid using the same satellite communications link. The trainees will include faculty and students from Savannah State University, and staff from FSEC. An interactive internet link will be used to allow faculty from the University of West Indies to participate in the training session.

  13. A Survey of Research in Supervisory Control and Data Acquisition (SCADA)

    DTIC Science & Technology

    2014-09-01

    distance learning .2 The data acquired may be operationally oriented and used to better run the system, or it could be strategic in nature and used to...Technically the SCADA system is composed of the information technology (IT) that provides the human- machine interface (HMI) and stores and analyzes the data...systems work by learning what normal or benign traffic is and reporting on any abnormal traffic. These systems have the potential to detect zero-day

  14. Application of the SCADA system in wastewater treatment plants.

    PubMed

    Dieu, B

    2001-01-01

    The implementation of the SCADA system has a positive impact on the operations, maintenance, process improvement and savings for the City of Houston's Wastewater Operations branch. This paper will discuss the system's evolvement, the external/internal architecture, and the human-machine-interface graphical design. Finally, it will demonstrate the system's successes in monitoring the City's sewage and sludge collection/distribution systems, wet-weather facilities and wastewater treatment plants, complying with the USEPA requirements on the discharge, and effectively reducing the operations and maintenance costs.

  15. Programmable Logic Controller Modification Attacks for use in Detection Analysis

    DTIC Science & Technology

    2014-03-27

    and J. Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems ,” in Proceedings of the VDE Kongress, vol. 116, 2004. [13...Feb 2014 Date 20 Feb 2014 Date 20 Feb 2014 Date AFIT-ENG-14-M-66 Abstract Unprotected Supervisory Control and Data Acquisition (SCADA) systems offer...control and monitor physical industrial processes. Although attacks targeting SCADA systems have increased, there has been little work exploring the

  16. Quantifying the Impact of Unavailability in Cyber-Physical Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.

    2014-01-01

    The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability.more » This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.« less

  17. Cyber security risk assessment for SCADA and DCS networks.

    PubMed

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  18. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a newmore » Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.« less

  19. A Robust State Estimation Framework Considering Measurement Correlations and Imperfect Synchronization

    DOE PAGES

    Zhao, Junbo; Wang, Shaobu; Mili, Lamine; ...

    2018-01-08

    Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less

  20. A Robust State Estimation Framework Considering Measurement Correlations and Imperfect Synchronization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhao, Junbo; Wang, Shaobu; Mili, Lamine

    Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less

  1. Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System

    NASA Technical Reports Server (NTRS)

    Kalu, Alex; Acosta, R.; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.

    1999-01-01

    Savannah State University (SSU) and the Florida Solar Energy Center (FSEC) have been participating in the NASA Advanced Communications Technology Satellite (ACTS) program for the last five years. This program was designed by NASA to help maintain U.S. leadership in commercial space communications by funding high-risk research, and to flight-test next-generation digital satellite components. Launched in 1993, ACTS is an U.S. government funded technology test-bed that incorporates high power Ka-band transponders, small spot beams, and on-board digital storage and switching technology. Associated with the spacecraft, is a prototype satellite control center that supports various application experiments. The SSU/FSEC application experiment is to developing a Photovoltaic-Diesel Hybrid Power system complete with satellite Supervisory Control and Data Acquisition (SCADA). The hybrid system was design to demonstrate the feasibility of using SCADA to maintain and operate remote village power systems. This configuration would enable experts at a central location to provide technical assistance to local technicians while they acquire a measure of proficiency with the hybrid system operation and maintenance. Upon full mastery of the technology, similar SCADA arrangement are planned to remotely monitor and control constellation of hybrid systems scattered overlarge rural areas. Two Orion Energy APEX-1000 hybrid systems were delivered in 1998, one was installed at SSU in eastern Georgia and the other was installed at FSEC in Central Florida. The project was designed to: (1) evaluate the performance of ACTS in a SCADA arrangement, (2) monitor the health and performance of all major hybrid subsystems, (3) investigate load control and battery charging strategies to maximize battery capacity and lifetime, and (4) develop satellite communication protocol. Preliminary results indicate that the hybrid design is suitable for satellite Supervisory Control and Data Acquisition. A modification to the controller software has produced a robust communication link capable of real time control and long term data collection.

  2. Providing Situational Awareness for Pipeline Control Operations

    NASA Astrophysics Data System (ADS)

    Butts, Jonathan; Kleinhans, Hugo; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet

    A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment. Because of the vital tasks performed by these sensors and actuators, pipeline operators need accurate and timely information about their status and integrity. This paper describes a realtime scanner that provides situational awareness about SCADA devices and control operations. The scanner, with the assistance of lightweight, distributed sensors, analyzes SCADA network traffic, verifies the operational status and integrity of field devices, and identifies anomalous activity. Experimental results obtained using real pipeline control traffic demonstrate the utility of the scanner in industrial settings.

  3. Mitigation of the consequence of seismically induced damage on a utility water network by means of next generation SCADA

    NASA Astrophysics Data System (ADS)

    Robertson, Jamie; Shinozuka, Masanobu; Wu, Felix

    2011-04-01

    When a lifeline system such as a water delivery network is damaged due to a severe earthquake, it is critical to identify its location and extent of the damage in real time in order to minimize the potentially disastrous consequence such damage could otherwise entail. This paper demonstrates how the degree of such minimization can be estimated qualitatively by using the water delivery system of Irvine Water Ranch District (IRWD) as testbed, when it is subjected to magnitude 6.6 San Joaquin Hills Earthquake. In this demonstration, we consider two cases when the IRWD system is equipped or not equipped with a next generation SCADA which consists of a network of MEMS acceleration sensors densely populated and optimally located. These sensors are capable of identifying the location and extent of the damage as well as transmitting the data to the SCADA center for monitoring and control.

  4. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.

    PubMed

    Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier

    2009-01-01

    The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.

  5. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

    PubMed Central

    Moya, José M.; Araujo, Álvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier

    2009-01-01

    The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals. PMID:22291569

  6. Pre-commercial Demonstration of Direct Non-iterative State Estimator for Operational Use of Synchrophasor Management Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lelic, Muhidin; Avramovic, Bozidar; Jiang, Tony

    The objective of this project was to demonstrate functionality and performance of a Direct Non-iterative State Estimator (DNSE) integrated with NYPA’s Energy Management System (EMS) and with enhanced Real Time Dynamics Monitoring System (RTDMS) synchrophasor platform from Electric Power Group (EPG). DNSE is designed to overcome a major obstacle to operational use of Synchro-Phasor Management Systems (SPMS) by providing to synchrophasor management systems (SPMS) applications a consistent and a complete synchrophasor data foundation in the same way that a traditional EMS State Estimator (SE) provides to EMS applications. Specifically, DNSE is designed to use synchrophasor measurements collected by a centralmore » PDC, Supervisory Control and Data Acquisition (SCADA) measurements, and Energy Management System (EMS) network model, to obtain the complete state of the utility’s operating model at rates that are close to the synchrophasor data rates. In this way, the system is comprehensive in that it does not only cover the part of the network that is “visible” via synchrophasors, but also the part that is only “visible” through the SCADA measurements. Visualization needs associated with the use of DNSE results are fulfilled through suitably enhanced Real Time Dynamics Monitoring System (RTDMS), with the enhancements implemented by EPG. This project had the following goals in mind: To advance the deployment of commercial grade DNSE software application that relies on synchrophasor and SCADA data ; Apply DNSE at other utilities, to address a generic and fundamental need for “clean” operational data for synchrophasor applications; Provide means for “live” estimated data access by control system operators; Enhance potential for situational awareness through full system operational model coverage; Sub-second execution rate of the Direct Non-iterative State Estimator, eventually at a near-phasor data rate execution speed, i.e. < 0.1 sec. Anticipated benefits from this projects are: Enhanced reliability and improvements in the economic efficiency of bulk power system planning and operations; Providing “clean” data to other synchrophasor applications; Enhancement of situational awareness by providing the full operational model updated at near synchrophasor rate; A production-grade software tool that incorporate synchrophasor and SCADA data; Provides a basis for development of next generation monitoring and control applications, based on both SCADA and PMU data. Quanta Technology (QT) team worked in collaboration with Electric Power Group (EPG) whose team has enhanced its commercial Real Time Dynamics Monitoring System (RTDMS) to accommodate the requirements posed by DNSE application. EPG also provided its ePDC and Model-less Data Conditioning (PDVC) software for integration with DNSE+. QT developed the system requirements for DNSE; developed system architecture and defined interfaces between internal DNSE components. The core DNSE algorithm with all surrounding interfaces was named DNSE+. Since the DNSE development was done in a simulated system environment, QT used its PMU simulator that was enhanced during this project for development and factory acceptance testing (FAT). SCADA data in this stage was simulated by commercial PSS/e software. The output of DNSE are estimates of System states in C37.118-2 format, sent to RTDMS for further processing and display. As the number of these states is large, it was necessary to expand the C37.111-2 standard to accommodate large data sets. This enhancement was implemented in RTDMS. The demonstration of pre-production DNSE technology was done at NYPA using streaming field data from NYPA PMUs and from its RTUs through their SCADA system. NYPA provided ICCP interface as well as Common Information Model (CIM). The relevance of the DNSE+ application is that it provides state estimation of the power system based on hybrid set of data, consisting of both available PMU data and SCADA measurements. As this is a direct, non-iterative method of calculation of the system states, if does not suffer from convergence issues which is potential problem for conventional state estimators. Also, it can take any available PMU measurements, so it does not need to have a high percentage of PMU coverage needed in the case of Linear State Estimator. As the DNSE calculates synchrophasors of the system states (both phase and absolute value) as sub-second rate, this application can provide a basis for development of next generation of applications based both on SCADA and PMU data.« less

  7. SCADA data and the quantification of hazardous events for QMRA.

    PubMed

    Nilsson, P; Roser, D; Thorwaldsdotter, R; Petterson, S; Davies, C; Signor, R; Bergstedt, O; Ashbolt, N

    2007-01-01

    The objective of this study was to assess the use of on-line monitoring to support the QMRA at water treatment plants studied in the EU MicroRisk project. SCADA data were obtained from three Catchment-to-Tap Systems (CTS) along with system descriptions, diary records, grab sample data and deviation reports. Particular attention was paid to estimating hazardous event frequency, duration and magnitude. Using Shewart and CUSUM we identified 'change-points' corresponding to events of between 10 min and >1 month duration in timeseries data. Our analysis confirmed it is possible to quantify hazardous event durations from turbidity, chlorine residual and pH records and distinguish them from non-hazardous variability in the timeseries dataset. The durations of most 'events' were short-term (0.5-2.3 h). These data were combined with QMRA to estimate pathogen infection risk arising from such events as chlorination failure. While analysis of SCADA data alone could identify events provisionally, its interpretation was severely constrained in the absence of diary records and other system information. SCADA data analysis should only complement traditional water sampling, rather than replace it. More work on on-line data management, quality control and interpretation is needed before it can be used routinely for event characterization.

  8. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  9. Modeling And Detecting Anomalies In Scada Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.

  10. SCADA alarms processing for wind turbine component failure detection

    NASA Astrophysics Data System (ADS)

    Gonzalez, E.; Reder, M.; Melero, J. J.

    2016-09-01

    Wind turbine failure and downtime can often compromise the profitability of a wind farm due to their high impact on the operation and maintenance (O&M) costs. Early detection of failures can facilitate the changeover from corrective maintenance towards a predictive approach. This paper presents a cost-effective methodology to combine various alarm analysis techniques, using data from the Supervisory Control and Data Acquisition (SCADA) system, in order to detect component failures. The approach categorises the alarms according to a reviewed taxonomy, turning overwhelming data into valuable information to assess component status. Then, different alarms analysis techniques are applied for two purposes: the evaluation of the SCADA alarm system capability to detect failures, and the investigation of the relation between components faults being followed by failure occurrences in others. Various case studies are presented and discussed. The study highlights the relationship between faulty behaviour in different components and between failures and adverse environmental conditions.

  11. Automatic Generation of Supervisory Control System Software Using Graph Composition

    NASA Astrophysics Data System (ADS)

    Nakata, Hideo; Sano, Tatsuro; Kojima, Taizo; Seo, Kazuo; Uchida, Tomoyuki; Nakamura, Yasuaki

    This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. At first, this method makes directed graphs, which represent connections between the equipment, from equipment definitions. System descriptions are generated using the conversion rules, by analyzing these directed graphs, and finding the groups of equipment that involve similar operations. This method can make the conversion rules multi levels by using the composition of graphs, and can reduce the number of rules. The developer can define and manage these rules efficiently.

  12. Critical Infrastructure: Control Systems and the Terrorist Threat

    DTIC Science & Technology

    2004-01-20

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...http://www.pnl.gov/main/sectors/homeland.html]. 68 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ,” Sandia Report SAND2002...and Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to

  13. Critical Infrastructure: Control Systems and the Terrorist Threat

    DTIC Science & Technology

    2003-07-14

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...available online at [http://www.pnl.gov/main/sectors/homeland.html]. 56 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ...Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to

  14. Development and Demonstration of a Security Core Component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turke, Andy

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less

  15. Behavioral Profiling of Scada Network Traffic Using Machine Learning Algorithms

    DTIC Science & Technology

    2014-03-27

    BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS THESIS Jessica R. Werling, Captain, USAF AFIT-ENG-14-M-81 DEPARTMENT...subject to copyright protection in the United States. AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ...AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS Jessica R. Werling, B.S.C.S. Captain, USAF Approved

  16. Control of Smart Building Using Advanced SCADA

    NASA Astrophysics Data System (ADS)

    Samuel, Vivin Thomas

    For complete control of the building, a proper SCADA implementation and the optimization strategy has to be build. For better communication and efficiency a proper channel between the Communication protocol and SCADA has to be designed. This paper concentrate mainly between the communication protocol, and the SCADA implementation, for a better optimization and energy savings is derived to large scale industrial buildings. The communication channel used in order to completely control the building remotely from a distant place. For an efficient result we consider the temperature values and the power ratings of the equipment so that while controlling the equipment, we are setting a threshold values for FDD technique implementation. Building management system became a vital source for any building to maintain it and for safety purpose. Smart buildings, refers to various distinct features, where the complete automation system, office building controls, data center controls. ELC's are used to communicate the load values of the building to the remote server from a far location with the help of an Ethernet communication channel. Based on the demand fluctuation and the peak voltage, the loads operate differently increasing the consumption rate thus results in the increase in the annual consumption bill. In modern days, saving energy and reducing the consumption bill is most essential for any building for a better and long operation. The equipment - monitored regularly and optimization strategy is implemented for cost reduction automation system. Thus results in the reduction of annual cost reduction and load lifetime increase.

  17. Design and development of an IoT-based web application for an intelligent remote SCADA system

    NASA Astrophysics Data System (ADS)

    Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long

    2018-03-01

    This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.

  18. Analysis of data throughput in communication between PLCs and HMI/SCADA systems

    NASA Astrophysics Data System (ADS)

    Mikolajek, Martin; Koziorek, Jiri

    2016-09-01

    This paper is focused on Analysis of data throughout in communication between PLCs and HMI/SCADA systems. The first part of paper discusses basic problematic communication between PLC and HMI systems. Next part is about specific types of communications PLC - HMI requests. For those cases paper is talking about response and data throughput1-3 . Subsequent section of this article contains practical parts with various data exchanges between PLC Siemens and HMI. The possibilities of communication that are described in this article are focused on using OPC server for visualization software, custom HMI system and own application created by using .NET with Technology. The last part of this article contains some communication solutions.

  19. SCADA-based Operator Support System for Power Plant Equipment Fault Forecasting

    NASA Astrophysics Data System (ADS)

    Mayadevi, N.; Ushakumari, S. S.; Vinodchandra, S. S.

    2014-12-01

    Power plant equipment must be monitored closely to prevent failures from disrupting plant availability. Online monitoring technology integrated with hybrid forecasting techniques can be used to prevent plant equipment faults. A self learning rule-based expert system is proposed in this paper for fault forecasting in power plants controlled by supervisory control and data acquisition (SCADA) system. Self-learning utilizes associative data mining algorithms on the SCADA history database to form new rules that can dynamically update the knowledge base of the rule-based expert system. In this study, a number of popular associative learning algorithms are considered for rule formation. Data mining results show that the Tertius algorithm is best suited for developing a learning engine for power plants. For real-time monitoring of the plant condition, graphical models are constructed by K-means clustering. To build a time-series forecasting model, a multi layer preceptron (MLP) is used. Once created, the models are updated in the model library to provide an adaptive environment for the proposed system. Graphical user interface (GUI) illustrates the variation of all sensor values affecting a particular alarm/fault, as well as the step-by-step procedure for avoiding critical situations and consequent plant shutdown. The forecasting performance is evaluated by computing the mean absolute error and root mean square error of the predictions.

  20. Remote Supervision and Control of Air Conditioning Systems in Different Modes

    NASA Astrophysics Data System (ADS)

    Rafeeq, Mohammed; Afzal, Asif; Rajendra, Sree

    2018-01-01

    In the era of automation, most of the application of engineering and science are interrelated with system for optimal operation. To get the efficient result of an operation and desired response, interconnected systems should be controlled by directing, regulating and commanding. Here, air conditioning (AC) system is considered for experimentation, to supervise and control its functioning in both, automated and manual mode. This paper reports the work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system. The Programmable Logical Controller (PLC) and Supervisory Control and Data Acquisition (SCADA) system were used for remote supervision and monitoring of AC systems using series ninety protocol and remote terminal unit modbus protocol as communication module to operate in remote mode. PLC was used as remote terminal for continuous supervision and control of AC system. SCADA software was used as a tool for designing user friendly graphical user interface. The proposed SCADA AC system successfully monitors and controls in accordance within the parameter limits like temperature, pressure, humidity and voltage. With all the features, this designed system is capable of efficient handling of the resources like the compressor, humidifier etc., with all the levels of safety and durability. This system also maintains the temperature and controls the humidity of the remote location and also looks after the health of the compressor.

  1. Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System

    NASA Technical Reports Server (NTRS)

    Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)

    2000-01-01

    Satellite Supervisory Control and Data Acquisition (SCADA) of a Photovoltaic (PV)/diesel hybrid system was tested using NASA's Advanced Communication Technology Satellite (ACTS) and Ultra Small Aperture Terminal (USAT) ground stations. The setup consisted of a custom-designed PV/diesel hybrid system, located at the Florida Solar Energy Center (FSEC), which was controlled and monitored at a "remote" hub via Ka-band satellite link connecting two 1/4 Watt USATs in a SCADA arrangement. The robustness of the communications link was tested for remote monitoring of the health and performance of a PV/diesel hybrid system, and for investigating load control and battery charging strategies to maximize battery capacity and lifetime, and minimize loss of critical load probability. Baseline hardware performance test results demonstrated that continuous two-second data transfers can be accomplished under clear sky conditions with an error rate of less than 1%. The delay introduced by the satellite (1/4 sec) was transparent to synchronization of satellite modem as well as to the PV/diesel-hybrid computer. End-to-end communications link recovery times were less than 36 seconds for loss of power and less than one second for loss of link. The system recovered by resuming operation without any manual intervention, which is important since the 4 dB margin is not sufficient to prevent loss of the satellite link during moderate to heavy rain. Hybrid operations during loss of communications link continued seamlessly but real-time monitoring was interrupted. For this sub-tropical region, the estimated amount of time that the signal fade will exceed the 4 dB margin is about 10%. These results suggest that data rates of 4800 bps and a link margin of 4 dB with a 1/4 Watt transmitter are sufficient for end-to-end operation in this SCADA application.

  2. FDI and Accommodation Using NN Based Techniques

    NASA Astrophysics Data System (ADS)

    Garcia, Ramon Ferreiro; de Miguel Catoira, Alberto; Sanz, Beatriz Ferreiro

    Massive application of dynamic backpropagation neural networks is used on closed loop control FDI (fault detection and isolation) tasks. The process dynamics is mapped by means of a trained backpropagation NN to be applied on residual generation. Process supervision is then applied to discriminate faults on process sensors, and process plant parameters. A rule based expert system is used to implement the decision making task and the corresponding solution in terms of faults accommodation and/or reconfiguration. Results show an efficient and robust FDI system which could be used as the core of an SCADA or alternatively as a complement supervision tool operating in parallel with the SCADA when applied on a heat exchanger.

  3. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  4. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  5. Kerman Photovoltaic Power Plant R&D data collection computer system operations and maintenance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rosen, P.B.

    1994-06-01

    The Supervisory Control and Data Acquisition (SCADA) system at the Kerman PV Plant monitors 52 analog, 44 status, 13 control, and 4 accumulator data points in real-time. A Remote Terminal Unit (RTU) polls 7 peripheral data acquisition units that are distributed throughout the plant once every second, and stores all analog, status, and accumulator points that have changed since the last scan. The R&D Computer, which is connected to the SCADA RTU via a RS-232 serial link, polls the RTU once every 5-7 seconds and records any values that have changed since the last scan. A SCADA software package calledmore » RealFlex runs on the R&D computer and stores all updated data values taken from the RTU, along with a time-stamp for each, in a historical real-time database. From this database, averages of all analog data points and snapshots of all status points are generated every 10 minutes and appended to a daily file. These files are downloaded via modem by PVUSA/Davis staff every day, and the data is placed into the PVUSA database.« less

  6. LIDAR wind speed measurements at a Taiwan onshore wind park

    NASA Astrophysics Data System (ADS)

    Wu, Yu-Ting; Lin, Ta-Hui; Hsuan, Chung-Yao; Li, Yu-Cheng; Yang, Ya-Fei; Tai, Tzy-Hwan; Huang, Chien-Cheng

    2016-04-01

    Measurements of wind speed and wind direction were carried out using a Leosphere Windcube LIDAR system at a Taiwan onshore wind park. The Lidar shot a total of five laser beams to the atmosphere to collect the light-of-sight (LOS) velocity. Four beams were sent successively in four cardinal directions along a 28° scanning cone angle, followed by a fifth, vertical beam. An unchangeable sampling rate of approximately 1.2 Hz was set in the LIDAR system to collect the LOS velocity. The supervisory control and data acquisition (SCADA) data from two GE 1.5 MW wind turbines near the LIDAR deployment site were acquired for the whole measuring period from February 4 to February 16 of 2015. The SCADA data include the blade angular velocity, the wind velocity measured at hub height from an anemometer mounted on the nacelle, the wind turbine yaw angle, and power production; each parameter was recorded as averages over 1-min periods. The data analysis involving the LIDAR measurements and the SCADA data were performed to obtain the turbulent flow statistics. The results show that the turbine power production has significant dependence to the wind speed, wind direction, turbulence intensity and wind shear.

  7. Metrics for the National SCADA Test Bed Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  8. Evaluation of Traditional Security Solutions in the SCADA Environment

    DTIC Science & Technology

    2012-03-01

    Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of

  9. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  10. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  11. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  12. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  13. RivGen, Igiugig Deployment, Control System Specifications and Models

    DOE Data Explorer

    Forbush, Dominic; Cavagnaro, Robert J.; Guerra, Maricarmen; Donegan, James; McEntee, Jarlath; Thomson, Jim; Polagye, Brian; Fabien, Brian; Kilcher, Levi

    2016-03-21

    Control System simulation models, case studies, and processing codes for analyzing field data. Raw data files included from VFD and SCADA. MatLab and Simulink are required to open some data files and all model files.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less

  15. Object-Oriented Technology-Based Software Library for Operations of Water Reclamation Centers

    NASA Astrophysics Data System (ADS)

    Otani, Tetsuo; Shimada, Takehiro; Yoshida, Norio; Abe, Wataru

    SCADA systems in water reclamation centers have been constructed based on hardware and software that each manufacturer produced according to their design. Even though this approach used to be effective to realize real-time and reliable execution, it is an obstacle to cost reduction about system construction and maintenance. A promising solution to address the problem is to set specifications that can be used commonly. In terms of software, information model approach has been adopted in SCADA systems in other field, such as telecommunications and power systems. An information model is a piece of software specification that describes a physical or logical object to be monitored. In this paper, we propose information models for operations of water reclamation centers, which have not ever existed. In addition, we show the feasibility of the information model in terms of common use and processing performance.

  16. Using SCADA Data, Field Studies, and Real-Time Modeling to ...

    EPA Pesticide Factsheets

    EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns and water quality as well as to evaluate changes being made to the system operation to enhance corrosion control and improve chlorine residuals. EPA partnered with the City of Flint and the Michigan Department of Environmental Quality to update and calibrate an existing hydraulic model. The City provided SCADA data, GIS data, customer billing data, valve status data, design diagrams, and information on operations. Team members visited all facilities and updated pump and valve types, sizes, settings, elevations, and pump discharge curves. Several technologies were used to support this work including the EPANET-RTX based Polaris real-time modeling software, WaterGEMS, ArcGIS, EPANET, and RTX:LINK. Field studies were conducted to collect pressure and flow data from more than 25 locations throughout the distribution system. An assessment of the model performance compared model predictions for flow, pressure, and tank levels to SCADA and field data, resulting in error measurements for each data stream over the time period analyzed. Now, the calibrated model can be used with a known confidence in its performance to evaluate hydraulic and water quality problems, and the model can be easily

  17. DSOM - Decision Support for Operations and Maintenance - Application to a USMC Base Centralized Energy System.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meador, Richard J.; Hatley, Darrel D.

    2004-06-01

    PNNL DSOM technology coordinates efficient steam plant operation with EMCS and SCADA systems, providing generation support and automated load shedding to meet peak demand limits saving over $1M in two years.

  18. On the use of high-frequency SCADA data for improved wind turbine performance monitoring

    NASA Astrophysics Data System (ADS)

    Gonzalez, E.; Stephen, B.; Infield, D.; Melero, J. J.

    2017-11-01

    SCADA-based condition monitoring of wind turbines facilitates the move from costly corrective repairs towards more proactive maintenance strategies. In this work, we advocate the use of high-frequency SCADA data and quantile regression to build a cost effective performance monitoring tool. The benefits of the approach are demonstrated through the comparison between state-of-the-art deterministic power curve modelling techniques and the suggested probabilistic model. Detection capabilities are compared for low and high-frequency SCADA data, providing evidence for monitoring at higher resolutions. Operational data from healthy and faulty turbines are used to provide a practical example of usage with the proposed tool, effectively achieving the detection of an incipient gearbox malfunction at a time horizon of more than one month prior to the actual occurrence of the failure.

  19. Power System Information Delivering System Based on Distributed Object

    NASA Astrophysics Data System (ADS)

    Tanaka, Tatsuji; Tsuchiya, Takehiko; Tamura, Setsuo; Seki, Tomomichi; Kubota, Kenji

    In recent years, improvement in computer performance and development of computer network technology or the distributed information processing technology has a remarkable thing. Moreover, the deregulation is starting and will be spreading in the electric power industry in Japan. Consequently, power suppliers are required to supply low cost power with high quality services to customers. Corresponding to these movements the authors have been proposed SCOPE (System Configuration Of PowEr control system) architecture for distributed EMS/SCADA (Energy Management Systems / Supervisory Control and Data Acquisition) system based on distributed object technology, which offers the flexibility and expandability adapting those movements. In this paper, the authors introduce a prototype of the power system information delivering system, which was developed based on SCOPE architecture. This paper describes the architecture and the evaluation results of this prototype system. The power system information delivering system supplies useful power systems information such as electric power failures to the customers using Internet and distributed object technology. This system is new type of SCADA system which monitors failure of power transmission system and power distribution system with geographic information integrated way.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thaule, S.B.; Postvoll, W.

    Installation by den norske stats oljeselskap A.S. (Statoil) of a powerful pipeline-modeling system on Zeepipe has allowed this major North Sea gas pipeline to meet the growing demands and seasonal variations of the European gas market. The Troll gas-sales agreement (TGSA) in 1986 called for large volumes of Norwegian gas to begin arriving from the North Sea Sleipner East field in october 1993. It is important to Statoil to maintain regular gas delivers from its integrated transport network. In addition, high utilization of transport capacity maximizes profits. In advance of operations, Statoil realized that state-of-the-art supervisory control and data acquisitionmore » (scada) and pipeline-modeling systems (PMS) would be necessary to meet its goals and to remain the most efficient North Sea operator. The paper describes the linking of Troll and Zeebrugge, contractual issues, the supervisory system, the scada module, pipeline modeling, real-time model, look-ahead model, predictive model, and model performance.« less

  1. Operations and maintenance manual for the LDUA supervisory control and data acquisition system (LDUA System 4200) and control network (LDUA System 4400)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, G.A.

    1998-03-11

    This document defines the requirements applicable to the operation, maintenance and storage of the Supervisory Control and Data Acquisition System (SCADAS) and Control Network in support of the Light Duty Utility Arm (LDUA) operations.

  2. Anomaly Detection in Power Quality at Data Centers

    NASA Technical Reports Server (NTRS)

    Grichine, Art; Solano, Wanda M.

    2015-01-01

    The goal during my internship at the National Center for Critical Information Processing and Storage (NCCIPS) is to implement an anomaly detection method through the StruxureWare SCADA Power Monitoring system. The benefit of the anomaly detection mechanism is to provide the capability to detect and anticipate equipment degradation by monitoring power quality prior to equipment failure. First, a study is conducted that examines the existing techniques of power quality management. Based on these findings, and the capabilities of the existing SCADA resources, recommendations are presented for implementing effective anomaly detection. Since voltage, current, and total harmonic distortion demonstrate Gaussian distributions, effective set-points are computed using this model, while maintaining a low false positive count.

  3. Development of Solar Powered Irrigation System

    NASA Astrophysics Data System (ADS)

    Abdelkerim, A. I.; Sami Eusuf, M. M. R.; Salami, M. J. E.; Aibinu, A.; Eusuf, M. A.

    2013-12-01

    Development of a solar powered irrigation system has been discussed in this paper. This system would be SCADA-based and quite useful in areas where there is plenty of sunshine but insufficient water to carry out farming activities, such as rubber plantation, strawberry plantation, or any plantation, that requires frequent watering. The system is powered by solar system as a renewable energy which uses solar panel module to convert Sunlight into electricity. The development and implementation of an automated SCADA controlled system that uses PLC as a controller is significant to agricultural, oil and gas monitoring and control purpose purposes. In addition, the system is powered by an intelligent solar system in which solar panel targets the radiation from the Sun. Other than that, the solar system has reduced energy cost as well as pollution. The system is equipped with four input sensors; two soil moisture sensors, two level detection sensors. Soil moisture sensor measures the humidity of the soil, whereas the level detection sensors detect the level of water in the tank. The output sides consist of two solenoid valves, which are controlled respectively by two moistures sensors.

  4. Recent Experience with a Hybrid SCADA/PMU On-Line State Estimator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rizy, D Tom

    2009-01-01

    PMU devices are expected to grow in number from a few to several hundreds in the next five years. Some relays are already global positioning system-capable and could provide the same type of data as any PMU. This introduces a new paradigm of very fast accurate synchrophasor measurements from across the grid in real-time that augment and parallel existing slower SCADA measurements. Control center applications will benefit from this PMU data; for example, use of PMU data in state estimation is expected to improve accuracy and robustness, which in turn will result in more timely and accurate N-1 security analysis,more » resulting in an overall improvement of grid system reliability and security. This paper describes results from a recent implementation of this technology, the benefits and future work.« less

  5. Energy Systems Integration Laboratory | Energy Systems Integration Facility

    Science.gov Websites

    systems test hub includes a Class 1, Division 2 space for performing tests of high-pressure hydrogen Laboratory offers the following capabilities. High-Pressure Hydrogen Systems The high-pressure hydrogen infrastructure. Key Infrastructure Robotic arm; high-pressure hydrogen; natural gas supply; standalone SCADA

  6. Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Kariptas, Cagatay; Biyikoglu, Hikmet; Ozarpa, Cevat

    2017-04-01

    Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network Istanbul Natural Gas Distribution Corporation (IGDAS) is one of the end users of the Istanbul Earthquake Early Warning (EEW) signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867km of gas lines with 750 district regulators and 474,000 service boxes. The natural gas comes to Istanbul city borders with 70bar in 30inch diameter steel pipeline. The gas pressure is reduced to 20bar in RMS stations and distributed to district regulators inside the city. 110 of 750 district regulators are instrumented with strong motion accelerometers in order to cut gas flow during an earthquake event in the case of ground motion parameters exceeds the certain threshold levels. Also, state of-the-art protection systems automatically cut natural gas flow when breaks in the gas pipelines are detected. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 750 district regulator sites. IGDAS Real-time Earthquake Risk Reduction algorithm follows 4 stages as below: 1) Real-time ground motion data transmitted from 110 IGDAS and 110 KOERI (Kandilli Observatory and Earthquake Research Institute) acceleration stations to the IGDAS Scada Center and KOERI data center. 2) During an earthquake event EEW information is sent from IGDAS Scada Center to the IGDAS stations. 3) Automatic Shut-Off is applied at IGDAS district regulators, and calculated parameters are sent from stations to the IGDAS Scada Center and KOERI. 4) Integrated building and gas pipeline damage maps are prepared immediately after the earthquake event. The today's technology allows to rapidly estimate the expected level of shaking when an earthquake starts to occur. However, in Istanbul case for a potential Marmara Sea Earthquake, the time is very limited even to estimate the level of shaking. The robust threshold based EEW system is only algorithm for such a near source event to activate automatic shut-off mechanism in the critical infrastructures before the damaging waves arrive. This safety measure even with a few seconds of early warning time will help to mitigate potential damages and secondary hazards.

  7. Upgrade of U.S. EPA's Experimental Stream Facility Supervisory Control and Data Acquisition System

    EPA Science Inventory

    The Supervisory control and data acquisition (SCADA) system for the U.S. EPA’s Experimental Stream Facility (ESF) was upgraded using Camile hardware and software in 2015. The upgrade added additional hardwired connections, new wireless capabilities, and included a complete rewrit...

  8. Application of Canal Automation at the Central Arizona Irrigation and Drainage District

    USDA-ARS?s Scientific Manuscript database

    The Central Arizona Irrigation and Drainage District (CAIDD) began delivering water to users in 1987. Although designed for automatic control, the system was run manually until a homemade SCADA (Supervisory Control and Data Acquisition) system was developed by a district employee. In 2002, problem...

  9. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  10. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  11. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  12. Water Wells Monitoring Using SCADA System for Water Supply Network, Case Study: Water Treatment Plant Urseni, Timis County, Romania

    NASA Astrophysics Data System (ADS)

    Adrian-Lucian, Cococeanu; Ioana-Alina, Cretan; Ivona, Cojocinescu Mihaela; Teodor Eugen, Man; Narcis, Pelea George

    2017-10-01

    The water supply system in Timisoara Municipality is insured with about 25-30 % of the water demand from wells. The underground water headed to the water treatment plant in order to ensure equal distribution and pressure to consumers. The treatment plants used are Urseni and Ronaţ, near Timisoara, in Timis County. In Timisoara groundwater represents an alternative source for water supply and complementary to the surface water source. The present paper presents a case study with proposal and solutions for rehabilitation /equipment /modernization/ automation of water drilling in order to ensure that the entire system can be monitored and controlled remotely through SCADA (Supervisory control and data acquisition) system. The data collected from the field are designed for online efficiency monitoring regarding the energy consumption and water flow intake, performance indicators such as specific energy consumption KW/m3 and also in order to create a hydraulically system of the operating area to track the behavior of aquifers in time regarding the quality and quantity aspects.

  13. A storage scheme for the real-time database supporting the on-line commitment

    NASA Astrophysics Data System (ADS)

    Dai, Hong-bin; Jing, Yu-jian; Wang, Hui

    2013-07-01

    The modern SCADA (Supervisory Control and Data acquisition) systems have been applied to various aspects of everyday life. As the time goes on, the requirements of the applications of the systems vary. Thus the data structure of the real-time database, which is the core of a SCADA system, often needs modification. As a result, the commitment consisting of a sequence of configuration operations modifying the data structure of the real-time database is performed from time to time. Though it is simple to perform the off-line commitment by first stopping and then restarting the system, during which all the data in the real-time database are reconstructed. It is much more preferred or in some cases even necessary to perform the on-line commitment, during which the real-time database can still provide real-time service and the system continues working normally. In this paper, a storage scheme of the data in the real-time database is proposed. It helps the real-time database support its on-line commitment, during which real-time service is still available.

  14. Refurbishment and Automation of the Thermal/Vacuum Facilities at the Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Johnson, Chris; Ogden, Rick; Sushon, Janet

    1998-01-01

    The thermal/vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the 11 facilities, currently 10 of the systems are scheduled for refurbishment and/or replacement as part of a 5-year implementation. Expected return on investment includes the reduction in test schedules, improvements in the safety of facility operations, reduction in the complexity of a test and the reduction in personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering and for the automation of thermal/vacuum facilities and thermal/vacuum tests. Automation of the thermal/vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs) and the use of Supervisory Control and Data Acquisition (SCADA) systems. These components allow the computer control and automation of mechanical components such as valves and pumps. In some cases, the chamber and chamber shroud require complete replacement while others require only mechanical component retrofit or replacement. The project of refurbishment and automation began in 1996 and has resulted in the computer control of one Facility (Facility #225) and the integration of electronically controlled devices and PLCs within several other facilities. Facility 225 has been successfully controlled by PLC and SCADA for over one year. Insignificant anomalies have occurred and were resolved with minimal impact to testing and operations. The amount of work remaining to be performed will occur over the next four to five years. Fiscal year 1998 includes the complete refurbishment of one facility, computer control of the thermal systems in two facilities, implementation of SCADA and PLC systems to support multiple facilities and the implementation of a Database server to allow efficient test management and data analysis.

  15. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    NASA Astrophysics Data System (ADS)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.

  16. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  17. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  18. Cell-phone based assistance for waterworks/sewage plant maintenance.

    PubMed

    Kawada, T; Nakamichi, K; Hisano, N; Kitamura, M; Miyahara, K

    2006-01-01

    Cell-phones are now incorporating the functions necessary for them to be used as mobile IT devices. In this paper, we present our results of the evaluation of cell-phones as the mobile IT device to assist workers in industrial plants. We use waterworks and sewage plants as examples. By employing techniques to squeeze the SCADA screen on CRT into a small cell-phone LCD, we have made it easier for a plant's field workers to access the information needed for effective maintenance, regardless of location. An idea to link SCADA information and the plant facility information on the cell-phone is also presented. Should an accident or emergency situation arise, these cell-phone-based IT systems can efficiently deliver the latest plant information, thus the worker out in the field can respond to and resolve the emergency.

  19. A Case Study of Modern PLC and LabVIEW Controls: Power Supply Controls for the ORNL ITER ECH Test Stand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barker, Alan M; Killough, Stephen M; Bigelow, Tim S

    2011-01-01

    Power Supply Controls are being developed at Oak Ridge National Laboratory (ORNL) to test transmission line components of the Electron Cyclotron Heating (ECH) system, with a focus on gyrotrons and waveguides, in support of the International Thermonuclear Experimental Reactor (ITER). The control is performed by several Programmable Logic Controllers (PLC s) located near the different equipment. A technique of Supervisory Control and Data Acquisition (SCADA) is presented to monitor, control, and log actions of the PLC s on a PC through use of Allen Bradley s Remote I/O communication interface coupled with an Open Process Control/Object Linking and Embedding [OLE]more » for Process Control (OPC) Server/Client architecture. The OPC data is then linked to a National Instruments (NI) LabVIEW system for monitoring and control. Details of the architecture and insight into applicability to other systems are presented in the rest of this paper. Future integration with an EPICS (Experimental Physics Industrial Control System) based mini-CODAC (Control, Data Access and Communication) SCADA system is under consideration, and integration considerations will be briefly introduced.« less

  20. A Measurement and Power Line Communication System Design for Renewable Smart Grids

    NASA Astrophysics Data System (ADS)

    Kabalci, E.; Kabalci, Y.

    2013-10-01

    The data communication over the electric power lines can be managed easily and economically since the grid connections are already spread around all over the world. This paper investigates the applicability of Power Line Communication (PLC) in an energy generation system that is based on photovoltaic (PV) panels with the modeling study in Matlab/Simulink. The Simulink model covers the designed PV panels, boost converter with Perturb and Observe (P&O) control algorithm, full bridge inverter, and the binary phase shift keying (BPSK) modem that is utilized to transfer the measured data over the power lines. This study proposes a novel method to use the electrical power lines not only for carrying the line voltage but also to transmit the measurements of the renewable energy generation plants. Hence, it is aimed at minimizing the additional monitoring costs such as SCADA, Ethernet-based or GSM based systems by using the proposed technique. Although this study is performed with solar power plants, the proposed model can be applied to other renewable generation systems. Consequently, the usage of the proposed technique instead of SCADA or Ethernet-based systems eliminates additional monitoring costs.

  1. Algorithmic network monitoring for a modern water utility: a case study in Jerusalem.

    PubMed

    Armon, A; Gutner, S; Rosenberg, A; Scolnicov, H

    2011-01-01

    We report on the design, deployment, and use of TaKaDu, a real-time algorithmic Water Infrastructure Monitoring solution, with a strong focus on water loss reduction and control. TaKaDu is provided as a commercial service to several customers worldwide. It has been in use at HaGihon, the Jerusalem utility, since mid 2009. Water utilities collect considerable real-time data from their networks, e.g. by means of a SCADA system and sensors measuring flow, pressure, and other data. We discuss how an algorithmic statistical solution analyses this wealth of raw data, flexibly using many types of input and picking out and reporting significant events and failures in the network. Of particular interest to most water utilities is the early detection capability for invisible leaks, also a means for preventing large visible bursts. The system also detects sensor and SCADA failures, various water quality issues, DMA boundary breaches, unrecorded or unintended network changes (like a valve or pump state change), and other events, including types unforeseen during system design. We discuss results from use at HaGihon, showing clear operational value.

  2. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  3. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  4. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  5. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  6. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  7. Changing the Lines in the Coloring Book

    DTIC Science & Technology

    2004-05-18

    multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The

  8. An ethernet/IP security review with intrusion detection applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less

  9. Using SCADA Data, Field Studies, and Real-Time Modeling to Calibrate Flint's Hydraulic Model

    EPA Science Inventory

    EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns an...

  10. Applying Water-Level Difference Control to Central Arizona Project

    USDA-ARS?s Scientific Manuscript database

    The Central Arizona Project (CAP) has been supplying Colorado River water to Central Arizona for roughly 25 years. The CAP canal is operated remotely with a Supervisory Control and Data Acquisition (SCADA) System. Gate position changes are made either manually or through the use of automatic control...

  11. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  13. Improvement of the linear polarization resistance method for testing steel corrosion inhibitors

    NASA Astrophysics Data System (ADS)

    Faritov, A. T.; Rozhdestvenskii, Yu. G.; Yamshchikova, S. A.; Minnikhanova, E. R.; Tyusenkov, A. S.

    2016-11-01

    The linear polarization resistance method is used to improve the technique of corrosion control in liquid conducting according to GOST 9.514-99 (General Corrosion and Aging Protection System. Corrosion Inhibitors for Metals in Water Systems. Electrochemical Method of Determining the Protective Ability). Corrosion monitoring is shown to be performed by electronic devices with real-time data transfer to industrial controllers and SCADA systems.

  14. Risk assessment for Industrial Control Systems quantifying availability using mean failure cost (MFC)

    DOE PAGES

    Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.

    2015-09-23

    Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less

  15. Modeling DNP3 Traffic Characteristics of Field Devices in SCADA Systems of the Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less

  16. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    NASA Astrophysics Data System (ADS)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.

  17. Application of Synchrophasor Measurements for Improving Situational Awareness of the Power System

    NASA Astrophysics Data System (ADS)

    Obushevs, A.; Mutule, A.

    2018-04-01

    The paper focuses on the application of synchrophasor measurements that present unprecedented benefits compared to SCADA systems in order to facilitate the successful transformation of the Nordic-Baltic-and-European electric power system to operate with large amounts of renewable energy sources and improve situational awareness of the power system. The article describes new functionalities of visualisation tools to estimate a grid inertia level in real time with monitoring results between Nordic and Baltic power systems.

  18. A Proposal for a Taxonomy for Vulnerabilities in Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2014-09-01

    executable that is setuid root.4 fingerd The Morris worm exploited a buffer overflow in the fingerd program to gain unauthorized access to computer...in other taxonomies. There are still holes ; in fact, none of the vulnerabilities that Bishop discussed have a clear place in this taxonomy until a

  19. A Feasibility Study on the Application of the ScriptGenE Framework as an Anomaly Detection System in Industrial Control Systems

    DTIC Science & Technology

    2015-09-17

    network intrusion detection systems NIST National Institute of Standards and Technology p-tree protocol tree PI protocol informatics PLC programmable logic...electrical, water, oil , natural gas, manufacturing, and pharmaceutical industries, to name a few. The differences between SCADA and DCS systems are often... Oil Company, also known as Saudi Aramco, suffered huge data loss that resulted in the disruption of daily operations for nearly two weeks [BTR13]. As it

  20. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  1. Simulation of wake effects between two wind farms

    NASA Astrophysics Data System (ADS)

    Hansen, K. S.; Réthoré, P.-E.; Palma, J.; Hevia, B. G.; Prospathopoulos, J.; Peña, A.; Ott, S.; Schepers, G.; Palomares, A.; van der Laan, M. P.; Volker, P.

    2015-06-01

    SCADA data, recorded on the downstream wind farm, has been used to identify flow cases with visible clustering effects. The inflow condition is derived from a partly undisturbed wind turbine, due to lack of mast measurements. The SCADA data analysis concludes that centre of the deficit for the downstream wind farm with disturbed inflow has a distinct visible maximum deficit zone located only 5-10D downstream from the entrance. This zone, representing 20-30% speed reduction, increases and moves downstream for increasing cluster effect and is not visible outside a flow sector of 20-30°. The eight flow models represented in this benchmark include both RANS models, mesoscale models and engineering models. The flow cases, identified according to the wind speed level and inflow sector, have been simulated and validated with the SCADA results. The model validation concludes that all models more or less are able to predict the location and size of the deficit zone inside the downwind wind farm.

  2. Rotary Kiln Gasification of Solid Waste for Base Camps

    DTIC Science & Technology

    2017-10-02

    cup after full day run 3.3 Feedstock Handling System Garbage bags containing waste feedstock are placed into feed bin FB-101. Ram feeder RF-102...Environmental Science and Technology using the Factory Talk SCADA software running on a laptop computer. A wireless Ethernet router that is located within the...pyrolysis oil produced required consistent draining from the system during operation and became a liquid waste disposal problem. A 5-hour test run could

  3. Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network via Remote Reconnaissance

    DTIC Science & Technology

    2006-09-01

    and other forms of Internet research were used to confirm the relevance of the OUI to control system reconnaissance. I assigned a subjective level...equipment 4 = Confirmed with Internet research 5 = Suspected with Internet research OUI Organization Confidence Notes 00:00:0A Omron Tateisi...IP Vendor List 2 = Cross Referenced with IANA port list 3 = Confirmed with lab equipment 4 = Confirmed with Internet research 5 = Suspected with

  4. Simulation of a microgrid

    NASA Astrophysics Data System (ADS)

    Dulǎu, Lucian Ioan

    2015-12-01

    This paper describes the simulation of a microgrid system with storage technologies. The microgrid comprises 6 distributed generators (DGs), 3 loads and a 150 kW storage unit. The installed capacity of the generators is 1100 kW, while the total load demand is 900 kW. The simulation is performed by using a SCADA software, considering the power generation costs, the loads demand and the system's power losses. The generators access the system in order of their power generation cost. The simulation is performed for the entire day.

  5. Norwegian Cyber Defense

    DTIC Science & Technology

    2013-12-01

    21   a.   Siberian Pipeline Explosion (1982) ............................21   b.   Chevron Emergency Alert...the fifth domain: Are the mouse and keyboard the new weapons of conflict?,” The Economist, July 1, 2010, http://www.economist.com/node/16478792. 15...a. Siberian Pipeline Explosion (1982) In 1982, intruders planted a Trojan horse in the SCADA system that controls the Siberian Pipeline. This is the

  6. Demonstration of Supervisory Control and Data Acquisition (SCADA) Virtualization Capability in the US Army Research Laboratory (ARL)/Sustaining Base Network Assurance Branch (SBNAB) US Army Cyber Analytics Laboratory (ACAL) SCADA Hardware Testbed

    DTIC Science & Technology

    2015-05-01

    application ,1 while the simulated PLC software is the open source ModbusPal Java application . When queried using the Modbus TCP protocol, ModbusPal reports...and programmable logic controller ( PLC ) components. The HMI and PLC components were instantiated with software and installed in multiple virtual...creating and capturing HMI– PLC network traffic over a 24-h period in the virtualized network and inspect the packets for errors.  Test the

  7. An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2004-09-01

    having one of two possible values, described as 0 or 1. Boundary A logical segregation of related components in a system. The segregation may be based ...Depending on the sophistication of the microcontroller in the RTU, it can be configured to act as a relay station for other RTUs which cannot...communicate directly with a master station, or the microcontroller can communicate on a peer-to-peer basis with other RTUs. RTUs are generally remotely

  8. Testbeds for Assessing Critical Scenarios in Power Control Systems

    NASA Astrophysics Data System (ADS)

    Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem

    The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.

  9. Automated system for the on-line monitoring of powder blending processes using near-infrared spectroscopy. Part I. System development and control.

    PubMed

    Hailey, P A; Doherty, P; Tapsell, P; Oliver, T; Aldridge, P K

    1996-03-01

    An automated system for the on-line monitoring of powder blending processes is described. The system employs near-infrared (NIR) spectroscopy using fibre-optics and a graphical user interface (GUI) developed in the LabVIEW environment. The complete supervisory control and data analysis (SCADA) software controls blender and spectrophotometer operation and performs statistical spectral data analysis in real time. A data analysis routine using standard deviation is described to demonstrate an approach to the real-time determination of blend homogeneity.

  10. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  11. Terra Defender Cyber-Physical Wargame

    DTIC Science & Technology

    2017-04-01

    Army position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official...person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control ...helped to achieve a better understanding of how Army supervisory control and data acquisition (SCADA) system and device security can be modeled and

  12. Awaiting Cyber 9/11

    DTIC Science & Technology

    2013-01-01

    tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the

  13. Analysis of synchronous and induction generators used at hydroelectric power plant

    NASA Astrophysics Data System (ADS)

    Diniş, C. M.; Popa, G. N.; lagăr, A.

    2017-01-01

    In this paper is presented an analysis of the operating electric generators (synchronous and induction) within a small capacity hydroelectric power plant. Such is treated the problem of monitoring and control hydropower plant using SCADA systems. Have been carried an experimental measurements in small hydropower plant for different levels of water in the lake and various settings of the operating parameters.

  14. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  15. Long-term monitoring of a cable stayed bridge using a SCADA system

    NASA Astrophysics Data System (ADS)

    Torbol, Marco; Kim, Sehwan; Shinozuka, Masanobu

    2012-04-01

    DuraMote is a MEMS-based remote sensing system, which is developed for the NIST TIP project, Next Generation SCADA for Prevention and Mitigation of Water System Infrastructure Disaster. It is designed for supervisory control and data acquisition (SCADA) of pipe ruptures in water distribution systems. In this project, a method is developed to detect the pipe ruptures by analyzing the acceleration data gathered by DuraMote which consists of two primary components; the first, "Gopher" contains the accelerometers and are attached to the water pipe surface noninvasively, and the second, "Roocas" is placed above ground supplying the power to, and retrieving the data from the multiple Gophers, and then transmit the data through Wi-Fi to a base station. The relays support the Wi-Fi network to facilitate the transmission. A large scale bridge provides an ideal test-bet to validate the performance of such a complex monitoring system as DuraMote for its accuracy, reliability, robustness, and user friendliness. This is because a large bridge is most of the time subjected to susceptible level of ambient vibration due to passing loads, wind, etc. DuraMote can record the acceleration time history arising from the vibration making it possible to estimate the frequency values of various bridge vibration modes. These estimated frequency values are then compared with the values computed from analytical model of the bridge for the verification of the accuracy of DuraMote. It is noted that such a verification method cannot be used practically by deploying DuraMote on a water distribution network since the dynamic behavior of a pipe network, either above or underground, is too complex to model analytically for this purpose, and in addition, the network generally lacks conveniently recordable ambient vibration. In this experiment, the performance of DuraMote system was tested being installed on the Hwamyung Bridge, a 500 m long RC cable stayed bridge in Korea for long term monitoring. In total, the system consisted of 24 accelerometers, 13 Gophers, 10 Roocas, 5 relays, and 1 base station. As it happened, the bridge was subjected to heavy rain, winds, and a typhoon during the experiment allowing the DuraMote to demonstrate extra ordinary robustness and durability. Indeed, in spite of the rough weather, acceleration data was continuously recorded from which natural frequencies, mode shapes, and other structural parameters were calculated. This opportunity would not have happened if the experiment was planned for a shorter duration.

  16. Cyber: A Flexible Deterrent Option

    DTIC Science & Technology

    2013-02-14

    to come on when they throw a switch and other electrical appliances throughout the house to work without any commercial power interruption. For...power plants this means maintaining the electrical grid and the supervisory control and data acquisition (SCADA) systems at a reliable rate of “99.99999...on the grid.”36 The researchers “simply instructed it to make rapid changes in the electricity cycles that powered the equipment: fast, slow, fast

  17. External Verification of SCADA System Embedded Controller Firmware

    DTIC Science & Technology

    2012-03-01

    microprocessor and read-only memory (ROM) or flash memory for storing firmware and control logic [5],[8]. A PLC typically has three software levels as shown in...implementing different firmware. Because PLCs are in effect a microprocessor device, an analysis of the current research on embedded devices is important...Electronics Engineers (IEEE) published a 15 best practices guide for firmware control on microprocessors [44]. IEEE suggests that microprocessors

  18. Risk Scan: A Review of Risk Assessment Capability and Maturity within the Canadian Safety and Security Program

    DTIC Science & Technology

    2014-06-01

    SCADA / ICS Cyber Test Lab initiated in 2013 Psychosocial – academic research exists,; opportunity for sharing and developing impact assessment...ecosystems and species at risk), accidents / system failure (rail; pipelines ; ferries CSSP strategy for the North Focus on regional l(and local) problem...Guidance; business planning; environmental scan; proposal evaluation; and performance measurement Program Risk Management – Guidelines for project

  19. Cable Overheating Risk Warning Method Based on Impedance Parameter Estimation in Distribution Network

    NASA Astrophysics Data System (ADS)

    Yu, Zhang; Xiaohui, Song; Jianfang, Li; Fei, Gao

    2017-05-01

    Cable overheating will lead to the cable insulation level reducing, speed up the cable insulation aging, even easy to cause short circuit faults. Cable overheating risk identification and warning is nessesary for distribution network operators. Cable overheating risk warning method based on impedance parameter estimation is proposed in the paper to improve the safty and reliability operation of distribution network. Firstly, cable impedance estimation model is established by using least square method based on the data from distribiton SCADA system to improve the impedance parameter estimation accuracy. Secondly, calculate the threshold value of cable impedance based on the historical data and the forecast value of cable impedance based on the forecasting data in future from distribiton SCADA system. Thirdly, establish risks warning rules library of cable overheating, calculate the cable impedance forecast value and analysis the change rate of impedance, and then warn the overheating risk of cable line based on the overheating risk warning rules library according to the variation relationship between impedance and line temperature rise. Overheating risk warning method is simulated in the paper. The simulation results shows that the method can identify the imedance and forecast the temperature rise of cable line in distribution network accurately. The result of overheating risk warning can provide decision basis for operation maintenance and repair.

  20. Real-Time Earthquake Risk Mitigation Of Infrastructures Using Istanbul Earthquake Early Warning and Rapid Response Network

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Pinar, Ali; Tunc, Suleyman; Erdik, Mustafa

    2014-05-01

    The Istanbul EEW network consisting of 10 inland and 5 OBS strong motion stations located close to the Main Marmara Fault zone is operated by KOERI. Data transmission between the remote stations and the base station at KOERI is provided both with satellite and fiber optic cable systems. The continuous on-line data from these stations is used to provide real time warning for emerging potentially disastrous earthquakes. The data transmission time from the remote stations to the KOERI data center is a few milliseconds through fiber optic lines and less than a second via satellites. The early warning signal (consisting three alarm levels) is communicated to the appropriate servo shut-down systems of the receipent facilities, that automatically decide proper action based on the alarm level. Istanbul Gas Distribution Corporation (IGDAS) is one of the end users of the EEW signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867 km of gas lines with 550 district regulators and 474,000 service boxes. State of-the-art protection systems automatically cut natural gas flow when breaks in the pipelines are detected. Since 2005, buildings in Istanbul using natural gas are required to install seismometers that automatically cut natural gas flow when certain thresholds are exceeded. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 581 district regulator sites. The SCADA system of IGDAŞ receives the EEW signal from KOERI and decide the proper actions according to the previously specified ground acceleration levels. Presently, KOERI sends EEW signal to the SCADA system of IGDAS Natural Gas Network of Istanbul. The EEW signal of KOERI is also transmitted to the serve shut down system of the Marmaray Rail Tube Tunnel and Commuter Rail Mass Transit System in Istanbul. The Marmaray system includes an undersea railway tunnel under the Bosphorus Strait. Several strong motion instruments are installed within the tunnel for taking measurements against strong ground shaking and early warning purposes. This system is integrated with the KOERI EEW System. KOERI sends the EEW signal to the command center of Marmaray. Having received the signal, the command center put into action the previously defined measurements. For example, the trains within the tunnel will be stopped at the nearest station, no access to the tunnel will be allowed to the trains approaching the tunnel, water protective caps will be closed to protect flood closing the connection between the onshore and offshore tunnels.

  1. Evaluation of power control concepts using the PMAD systems test bed. [Power Management and Distribution

    NASA Technical Reports Server (NTRS)

    Beach, R. F.; Kimnach, G. L.; Jett, T. A.; Trash, L. M.

    1989-01-01

    The Lewis Research Center's Power Management and Distribution (PMAD) System testbed and its use in the evaluation of control concepts applicable to the NASA Space Station Freedom electric power system (EPS) are described. The facility was constructed to allow testing of control hardware and software in an environment functionally similar to the space station electric power system. Control hardware and software have been developed to allow operation of the testbed power system in a manner similar to a supervisory control and data acquisition (SCADA) system employed by utility power systems for control. The system hardware and software are described.

  2. ADMS State of the Industry and Gap Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agalgaonkar, Yashodhan P.; Marinovici, Maria C.; Vadari, Subramanian V.

    2016-03-31

    An Advanced distribution management system (ADMS) is a platform for optimized distribution system operational management. This platform comprises of distribution management system (DMS) applications, supervisory control and data acquisition (SCADA), outage management system (OMS), and distributed energy resource management system (DERMS). One of the primary objectives of this work is to study and analyze several ADMS component and auxiliary systems. All the important component and auxiliary systems, SCADA, GISs, DMSs, AMRs/AMIs, OMSs, and DERMS, are discussed in this report. Their current generation technologies are analyzed, and their integration (or evolution) with an ADMS technology is discussed. An ADMS technology statemore » of the art and gap analysis is also presented. There are two technical gaps observed. The integration challenge between the component operational systems is the single largest challenge for ADMS design and deployment. Another significant challenge noted is concerning essential ADMS applications, for instance, fault location, isolation, and service restoration (FLISR), volt-var optimization (VVO), etc. There are a relatively small number of ADMS application developers as ADMS software platform is not open source. There is another critical gap and while not being technical in nature (when compared the two above) is still important to consider. The data models currently residing in utility GIS systems are either incomplete or inaccurate or both. This data is essential for planning and operations because it is typically one of the primary sources from which power system model are created. To achieve the full potential of ADMS, the ability to execute acute Power Flow solution is an important pre-requisite. These critical gaps are hindering wider Utility adoption of an ADMS technology. The development of an open architecture platform can eliminate many of these barriers and also aid seamless integration of distribution Utility legacy systems with an ADMS.« less

  3. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  4. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  5. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  6. Application of PMU-Based Information in the Indian Power System

    NASA Astrophysics Data System (ADS)

    Agarwal, P. K.; Agarwal, V. K.; Rathour, Harish

    2013-05-01

    SCADA/EMS system has been the most commonly used tool for real-time power system operation and control throughout the world. This system has been found to be very useful in steady-state analysis of the power system. The ever-increasing dependence of human society and every country's economy on electrical energy calls for reliable power delivery. In order to meet these expectations, engineers across the globe have been exploring such new technologies that can improve upon the limitations of SCADA and provide dynamic visibility of the power system. A breakthrough has now been achieved in the form of synchrophasor technology. Synchrophasor measurements using phasor measurement units (PMUs) deployed over a wide area, facilitate dynamic state measurement and visualization of a power system, which are useful in monitoring safety and security of the grid. The Power System Operation Corporation (POSOCO) has taken initiative and implemented a pilot project wherein nine phasor measurement units (PMUs) along with one phasor data concentrator (PDC) were commissioned in the Northern Region (NR) of India. The primary objective of this pilot project was to comprehend the synchrophasor technology and its applications in power system operation. The data received and information derived from the pilot project have been found to be very useful and helped in improving the performance of the grid operation in several ways. The pilot project is operational for the last two years; in the meanwhile, many other initiatives have also been taken in other regions by POSOCO. This article details the utilization of the data collected from the pilot projects and the application of the data in the improvement of Indian power grid.

  7. A computer network with scada and case tools for on-line process control in greenhouses

    NASA Astrophysics Data System (ADS)

    Gieling, Th. H.; van Meurs, W. Th. M.; Janssen, H. J. J.

    Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra opportunities to climate control in greenhouses.

  8. A computer network with SCADA and case tools for on-line process control in greenhouses.

    PubMed

    Gieling ThH; van Meurs WTh; Janssen, H J

    1996-01-01

    Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra oppurtunities to climate contol in greenhouses.

  9. America’s Achilles Heel: Defense Against High-altitude Electromagnetic Pulse-policy vs. Practice

    DTIC Science & Technology

    2014-12-12

    Directives SCADA Supervisory Control and Data Acquisition Systems SHIELD Act Secure High-voltage Infrastructure for Electricity from Lethal Damage Act...take place, it is important to understand the effects of the components of EMP from a high-altitude nuclear detonation. The requirements for shielding ...Mass Ejection (CME). A massive, bubble-shaped burst of plasma expanding outward from the Sun’s corona, in which large amounts of superheated

  10. PV-Diesel Hybrid SCADA Experiment Network Design

    NASA Technical Reports Server (NTRS)

    Kalu, Alex; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.; Acosta, R.

    1999-01-01

    The essential features of an experimental network for renewable power system satellite based supervisory, control and data acquisition (SCADA) are communication links, controllers, diagnostic equipment and a hybrid power system. Required components for implementing the network consist of two satellite ground stations, to satellite modems, two 486 PCs, two telephone receivers, two telephone modems, two analog telephone lines, one digital telephone line, a hybrid-power system equipped with controller and a satellite spacecraft. In the technology verification experiment (TVE) conducted by Savannah State University and Florida Solar Energy Center, the renewable energy hybrid system is the Apex-1000 Mini-Hybrid which is equipped with NGC3188 for user interface and remote control and the NGC2010 for monitoring and basic control tasks. This power system is connected to a satellite modem via a smart interface, RS232. Commands are sent to the power system control unit through a control PC designed as PC1. PC1 is thus connected to a satellite model through RS232. A second PC, designated PC2, the diagnostic PC is connected to both satellite modems via separate analog telephone lines for checking modems'health. PC2 is also connected to PC1 via a telephone line. Due to the unavailability of a second ground station for the ACTS, one ground station is used to serve both the sending and receiving functions in this experiment. Signal is sent from the control PC to the Hybrid system at a frequency f(sub 1), different from f(sub 2), the signal from the hybrid system to the control PC. f(sub l) and f(sub 2) are sufficiently separated to avoid interference.

  11. Methods and tools for profiling and control of distributed systems

    NASA Astrophysics Data System (ADS)

    Sukharev, R.; Lukyanchikov, O.; Nikulchev, E.; Biryukov, D.; Ryadchikov, I.

    2018-02-01

    This article is devoted to the topic of profiling and control of distributed systems. Distributed systems have a complex architecture, applications are distributed among various computing nodes, and many network operations are performed. Therefore, today it is important to develop methods and tools for profiling distributed systems. The article analyzes and standardizes methods for profiling distributed systems that focus on simulation to conduct experiments and build a graph model of the system. The theory of queueing networks is used for simulation modeling of distributed systems, receiving and processing user requests. To automate the above method of profiling distributed systems the software application was developed with a modular structure and similar to a SCADA-system.

  12. Analysis of the use of industrial control systems in simulators: state of the art and basic guidelines.

    PubMed

    Carrasco, Juan A; Dormido, Sebastián

    2006-04-01

    The use of industrial control systems in simulators facilitates the execution of engineering activities related with the installation and the optimization of the control systems in real plants. "Industrial control system" intends to be a valid term that would represent all the control systems which can be installed in an industrial plant, ranging from complex distributed control systems and SCADA packages to small single control devices. This paper summarizes the current alternatives for the development of simulators of industrial plants and presents an analysis of the process of integrating an industrial control system into a simulator, with the aim of helping in the installation of real control systems in simulators.

  13. Full load estimation of an offshore wind turbine based on SCADA and accelerometer data

    NASA Astrophysics Data System (ADS)

    Noppe, N.; Iliopoulos, A.; Weijtjens, W.; Devriendt, C.

    2016-09-01

    As offshore wind farms (OWFs) grow older, the optimal use of the actual fatigue lifetime of an offshore wind turbine (OWT) and predominantly its foundation will get more important. In case of OWTs, both quasi-static wind/thrust loads and dynamic loads, as induced by turbulence, waves and the turbine's dynamics, contribute to its fatigue life progression. To estimate the remaining useful life of an OWT, the stresses acting on the fatigue critical locations within the structure should be monitored continuously. Unfortunately, in case of the most common monopile foundations these locations are often situated below sea-level and near the mud line and thus difficult or even impossible to access for existing OWTs. Actual strain measurements taken at accessible locations above the sea level show a correlation between thrust load and several SCADA parameters. Therefore a model is created to estimate the thrust load using SCADA data and strain measurements. Afterwards the thrust load acting on the OWT is estimated using the created model and SCADA data only. From this model the quasi static loads on the foundation can be estimated over the lifetime of the OWT. To estimate the contribution of the dynamic loads a modal decomposition and expansion based virtual sensing technique is applied. This method only uses acceleration measurements recorded at accessible locations on the tower. Superimposing both contributions leads to a so-called multi-band virtual sensing. The result is a method that allows to estimate the strain history at any location on the foundation and thus the full load, being a combination of both quasi-static and dynamic loads, acting on the entire structure. This approach is validated using data from an operating Belgian OWF. An initial good match between measured and predicted strains for a short period of time proofs the concept.

  14. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  15. Prediction of contaminant fate and transport in potable water systems using H2OFate

    NASA Astrophysics Data System (ADS)

    Devarakonda, Venkat; Manickavasagam, Sivakumar; VanBlaricum, Vicki; Ginsberg, Mark

    2009-05-01

    BlazeTech has recently developed a software called H2OFate to predict the fate and transport of chemical and biological contaminants in water distribution systems. This software includes models for the reactions of these contaminants with residual disinfectant in bulk water and at the pipe wall, and their adhesion/reactions with the pipe walls. This software can be interfaced with sensors through SCADA systems to monitor water distribution networks for contamination events and activate countermeasures, as needed. This paper presents results from parametric calculations carried out using H2OFate for a simulated contaminant release into a sample water distribution network.

  16. Adopting Industry Standards for Control Systems Within Advanced Life Support

    NASA Technical Reports Server (NTRS)

    Young, James Scott; Boulanger, Richard

    2002-01-01

    This paper gives a description of OPC (Object Linking and Embedding for Process Control) standards for process control and outlines the experiences at JSC with using these standards to interface with I/O hardware from three independent vendors. The I/O hardware was integrated with a commercially available SCADA/HMI software package to make up the control and monitoring system for the Environmental Systems Test Stand (ESTS). OPC standards were utilized for communicating with I/O hardware and the software was used for implementing monitoring, PC-based distributed control, and redundant data storage over an Ethernet physical layer using an embedded din-rail mounted PC.

  17. Dynamic online sewer modelling in Helsingborg.

    PubMed

    Hernebring, C; Jönsson, L E; Thorén, U B; Møller, A

    2002-01-01

    Within the last decade, the sewer system in Helsingborg, Sweden has been rehabilitated in many ways along with the reconstruction of the WWTP Oresundsverket in order to obtain a high degree of nitrogen and phosphorus removal. In that context a holistic view has been applied in order to optimise the corrective measures as seen from the effects in the receiving waters. A sewer catchment model has been used to evaluate several operation strategies and the effect of introducing RTC. Recently, a MOUSE ONLINE system was installed. In this phase the objective is to establish a stable communication with the SCADA system and to generate short-term flow forecasts.

  18. Descriptive Model of Generic WAMS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauer, John F.; DeSteese, John G.

    The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.

  19. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  20. Proactive monitoring of an onshore wind farm through lidar measurements, SCADA data and a data-driven RANS solver

    NASA Astrophysics Data System (ADS)

    Iungo, Giacomo Valerio; Camarri, Simone; Ciri, Umberto; El-Asha, Said; Leonardi, Stefano; Rotea, Mario A.; Santhanagopalan, Vignesh; Viola, Francesco; Zhan, Lu

    2016-11-01

    Site conditions, such as topography and local climate, as well as wind farm layout strongly affect performance of a wind power plant. Therefore, predictions of wake interactions and their effects on power production still remain a great challenge in wind energy. For this study, an onshore wind turbine array was monitored through lidar measurements, SCADA and met-tower data. Power losses due to wake interactions were estimated to be approximately 4% and 2% of the total power production under stable and convective conditions, respectively. This dataset was then leveraged for the calibration of a data driven RANS (DDRANS) solver, which is a compelling tool for prediction of wind turbine wakes and power production. DDRANS is characterized by a computational cost as low as that for engineering wake models, and adequate accuracy achieved through data-driven tuning of the turbulence closure model. DDRANS is based on a parabolic formulation, axisymmetry and boundary layer approximations, which allow achieving low computational costs. The turbulence closure model consists in a mixing length model, which is optimally calibrated with the experimental dataset. Assessment of DDRANS is then performed through lidar and SCADA data for different atmospheric conditions. This material is based upon work supported by the National Science Foundation under the I/UCRC WindSTAR, NSF Award IIP 1362033.

  1. Influence of rotational energy barriers to the conformational search of protein loops in molecular dynamics and ranking the conformations.

    PubMed

    Tappura, K

    2001-08-15

    An adjustable-barrier dihedral angle potential was added as an extension to a novel, previously presented soft-core potential to study its contribution to the efficacy of the search of the conformational space in molecular dynamics. As opposed to the conventional soft-core potential functions, the leading principle in the design of the new soft-core potential, as well as of its extension, the soft-core and adjustable-barrier dihedral angle (SCADA) potential (referred as the SCADA potential), was to maintain the main equilibrium properties of the original force field. This qualifies the methods for a variety of a priori modeling problems without need for additional restraints typically required with the conventional soft-core potentials. In the present study, the different potential energy functions are applied to the problem of predicting loop conformations in proteins. Comparison of the performance of the soft-core and SCADA potential showed that the main hurdles for the efficient sampling of the conformational space of (loops in) proteins are related to the high-energy barriers caused by the Lennard-Jones and Coulombic energy terms, and not to the rotational barriers, although the conformational search can be further enhanced by lowering the rotational barriers of the dihedral angles. Finally, different evaluation methods were studied and a few promising criteria found to distinguish the near-native loop conformations from the wrong ones.

  2. Physical and Technical Energy Problems: Testing of the Prototype for State Estimation of Large-Scale Power Systems / Lielo Energosistēmu Stāvokļa Novērtēšanas Prototipa Testēšana

    NASA Astrophysics Data System (ADS)

    Kochukov, O.; Briņķis, K.; Mutule, A.

    2013-08-01

    The paper describes the algorithm for distributed state estimation (SE) and is focused on its testing and validation. For this purpose, different events in the modeled power system of the 330-750 kV electrical ring Latvia - Lithuania - Belarus - Smolensk - Moscow - St. Petersburg - Estonia - Latvia were considered. The methods for testing the Inter-TSO SE prototype and dynamic network monitoring & modeling are based on comparison of the available SCADA data about real events with those of SE calculation. In total, four operational states were studied, including initial, accident and two post-accident operational states Rakstā tiek aprakstīti, testēti un novērtēti izkliedēta stāvokļa novērtēšanas algoritmi. Testēšanas nolūkos tika izmantoti dažādi 330-750 kV elektriskā loka Latvija - Lietuva - Baltkrievija - Smoļenska - Maskava - Pēterburga - Igaunija - Latvija modelēti scenāriji. Prototipa testēšanas metodoloģija balstīta uz pieejamo SCADA datu salīdzināšanu ar stāvokļa novērtēšanas prototipa aprēķina rezultātiem. Kopumā apskatīti sākotnējais, avārijas un divi pēcavārijas režīmi

  3. Providing security for automated process control systems at hydropower engineering facilities

    NASA Astrophysics Data System (ADS)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  4. Sophia Daemon Version 12

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-08-09

    Sophia Daemon Version 12 contains the code that is exclusively used by the ‘sophiad’ application. It runs as a service on a Linux host and analyzes network traffic obtained from libpcap and produces a network fingerprint based on hosts and channels. Sophia Daemon Version 12 can, if desired by the user, produce alerts when its fingerprint changes. Sophia Daemon Version 12 can receive data from another Sophia Daemon or raw packet data. It can output data to another Sophia Daemon Version 12, OglNet Version 12 or MySQL. Sophia Daemon Version 12 runs in a passive real-time manner that allows itmore » to be used on a SCADA network. Its network fingerprint is designed to be applicable to SCADA networks rather than general IT networks.« less

  5. Study on Cyber Security and Threat Evaluation in SCADA Systems

    DTIC Science & Technology

    2012-03-01

    la sécurité de l’infrastructure essentielle du Canada. DRDC CSS CR 2012-06 vii • Les cadres de gestion des cybermenaces et des ...Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2012 DRDC CSS CR 2012-06 i Abstract …….. This...ii DRDC CSS CR 2012-06 Résumé …..... Le présent rapport fait la synthèse des résultats du projet PTSP 02-0347eSec

  6. Wind turbine wake measurement in complex terrain

    NASA Astrophysics Data System (ADS)

    Hansen, KS; Larsen, GC; Menke, R.; Vasiljevic, N.; Angelou, N.; Feng, J.; Zhu, WJ; Vignaroli, A.; W, W. Liu; Xu, C.; Shen, WZ

    2016-09-01

    SCADA data from a wind farm and high frequency time series measurements obtained with remote scanning systems have been analysed with focus on identification of wind turbine wake properties in complex terrain. The analysis indicates that within the flow regime characterized by medium to large downstream distances (more than 5 diameters) from the wake generating turbine, the wake changes according to local atmospheric conditions e.g. vertical wind speed. In very complex terrain the wake effects are often “overruled” by distortion effects due to the terrain complexity or topology.

  7. 78 FR 25406 - Proposed Modification of Class E Airspace; Twin Falls, ID

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ...) Global Positioning System (GPS) and the Instrument Landing System (ILS) or Localizer (LOC) standard... the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls Joslin Field-Magic Valley Regional...

  8. Use of Persistent Identifiers to link Heterogeneous Data Systems in the Integrated Earth Data Applications (IEDA) Facility

    NASA Astrophysics Data System (ADS)

    Hsu, L.; Lehnert, K. A.; Carbotte, S. M.; Arko, R. A.; Ferrini, V.; O'hara, S. H.; Walker, J. D.

    2012-12-01

    The Integrated Earth Data Applications (IEDA) facility maintains multiple data systems with a wide range of solid earth data types from the marine, terrestrial, and polar environments. Examples of the different data types include syntheses of ultra-high resolution seafloor bathymetry collected on large collaborative cruises and analytical geochemistry measurements collected by single investigators in small, unique projects. These different data types have historically been channeled into separate, discipline-specific databases with search and retrieval tailored for the specific data type. However, a current major goal is to integrate data from different systems to allow interdisciplinary data discovery and scientific analysis. To increase discovery and access across these heterogeneous systems, IEDA employs several unique IDs, including sample IDs (International Geo Sample Number, IGSN), person IDs (GeoPass ID), funding award IDs (NSF Award Number), cruise IDs (from the Marine Geoscience Data System Expedition Metadata Catalog), dataset IDs (DOIs), and publication IDs (DOIs). These IDs allow linking of a sample registry (System for Earth SAmple Registration), data libraries and repositories (e.g. Geochemical Research Library, Marine Geoscience Data System), integrated synthesis databases (e.g. EarthChem Portal, PetDB), and investigator services (IEDA Data Compliance Tool). The linked systems allow efficient discovery of related data across different levels of granularity. In addition, IEDA data systems maintain links with several external data systems, including digital journal publishers. Links have been established between the EarthChem Portal and ScienceDirect through publication DOIs, returning sample-level objects and geochemical analyses for a particular publication. Linking IEDA-hosted data to digital publications with IGSNs at the sample level and with IEDA-allocated dataset DOIs are under development. As an example, an individual investigator could sign up for a GeoPass account ID, write a proposal to NSF and create a data plan using the IEDA Data Management Plan Tool. Having received the grant, the investigator then collects rock samples on a scientific cruise from dredges and registers the samples with IGSNs. The investigator then performs analytical geochemistry on the samples, and submits the full dataset to the Geochemical Resource Library for a dataset DOI. Finally, the investigator writes an article that is published in Science Direct. Knowing any of the following IDs: Investigator GeoPass ID, NSF Award Number, Cruise ID, Sample IGSNs, dataset DOI, or publication DOI, a user would be able to navigate to all samples, datasets, and publications in IEDA and external systems. Use of persistent identifiers to link heterogeneous data systems in IEDA thus increases access, discovery, and proper citation of hard-earned investigator datasets.

  9. New metrics for evaluating channel networks extracted in grid digital elevation models

    NASA Astrophysics Data System (ADS)

    Orlandini, S.; Moretti, G.

    2017-12-01

    Channel networks are critical components of drainage basins and delta regions. Despite the important role played by these systems in hydrology and geomorphology, there are at present no well-defined methods to evaluate numerically how two complex channel networks are geometrically far apart. The present study introduces new metrics for evaluating numerically channel networks extracted in grid digital elevation models with respect to a reference channel network (see the figure below). Streams of the evaluated network (EN) are delineated as in the Horton ordering system and examined through a priority climbing algorithm based on the triple index (ID1,ID2,ID3), where ID1 is a stream identifier that increases as the elevation of lower end of the stream increases, ID2 indicates the ID1 of the draining stream, and ID3 is the ID1 of the corresponding stream in the reference network (RN). Streams of the RN are identified by the double index (ID1,ID2). Streams of the EN are processed in the order of increasing ID1 (plots a-l in the figure below). For each processed stream of the EN, the closest stream of the RN is sought by considering all the streams of the RN sharing the same ID2. This ID2 in the RN is equal in the EN to the ID3 of the stream draining the processed stream, the one having ID1 equal to the ID2 of the processed stream. The mean stream planar distance (MSPD) and the mean stream elevation drop (MSED) are computed as the mean distance and drop, respectively, between corresponding streams. The MSPD is shown to be useful for evaluating slope direction methods and thresholds for channel initiation, whereas the MSED is shown to indicate the ability of grid coarsening strategies to retain the profiles of observed channels. The developed metrics fill a gap in the existing literature by allowing hydrologists and geomorphologists to compare descriptions of a fixed physical system obtained by using different terrain analysis methods, or different physical systems described by using the same methods.

  10. A high-vacuum wound drainage system reduces pain and length of treatment for pediatric soft tissue abscesses.

    PubMed

    Yang, Chao; Wang, Shan; Li, Chang-Chun; Kong, Xiang-Ru; Zhao, Zhenzhen; Deng, Xiao-Bin; Peng, Liang; Zhang, Jun

    2017-02-01

    Open incision and drainage (I&D) and wound packing is accepted as the standard treatment for soft tissue abscesses. However, conventional I&D has a number of problems in practice which prompt us to improve the I&D methods that would minimize the pain associated with packing during dressing changes. In order to compare the pain associated with dressing changes in the conventional I&D group to the vacuum system group and the treatment time of both groups, we performed a randomized trial in pediatric patients between 0 and 18 years of age who are undergoing abscess drainage in the operating room from April 2011 to April 2015. Patients treated with open I&D (n = 648) were compared to those treated with placement of high-vacuum wound drainage system (n = 776) through the abscess cavities. Both groups received equivalent antibiotic treatment, and all patients were followed up in the outpatient clinics until the infection has been resolved. The mean FACES scale pain scores were significantly higher in the open I&D group than in the vacuum system group. The vacuum system group had a shorter length of stay and less need for community doctor or outpatient dressing changes than the open I&D group (p < 0.001). No recurrent abscesses were observed in the vacuum system group, and 10 patients in the open I&D group required another drainage at the exact same location. High-vacuum wound drainage system was an efficient and safe alternative to the traditional I&D for community-acquired soft tissue abscesses with few complications in short term. What is Known: • Open incision and drainage (I&D) followed by irrigation and wound packing is the standard treatment for soft tissue abscesses. • The painful daily packing may cause emotional trauma to the child and lead to an unwelcoming challenge to the caretakers and health care providers. What is New: • We modified the method of I&D by adding primary suturing of the wound and placement of a high-vacuum wound drainage system. • This technique was proved to be an efficient and safe alternative to the traditional I&D method for soft tissue abscesses with small complications in short term.

  11. Hardware-software and algorithmic provision of multipoint systems for long-term monitoring of dynamic processes

    NASA Astrophysics Data System (ADS)

    Yakunin, A. G.; Hussein, H. M.

    2017-08-01

    An example of information-measuring systems for climate monitoring and operational control of energy resources consumption of the university campus that is functioning in the Altai State Technical University since 2009. The advantages of using such systems for studying various physical processes are discussed. General principles of construction of similar systems, their software, hardware and algorithmic support are considered. It is shown that their fundamental difference from traditional SCADA - systems is the use of databases for storing the results of the observation with a specialized data structure, and by preprocessing of the input signal for its compression. Another difference is the absence of clear criteria for detecting the anomalies in the time series of the observed process. The examples of algorithms that solve this problem are given.

  12. An automated LS(β)- NaI(Tl)(γ) coincidence system as absolute standard for radioactivity measurements.

    PubMed

    Joseph, Leena; Das, A P; Ravindra, Anuradha; Kulkarni, D B; Kulkarni, M S

    2018-07-01

    4πβ-γ coincidence method is a powerful and widely used method to determine the absolute activity concentration of radioactive solutions. A new automated liquid scintillator based coincidence system has been designed, developed, tested and established as absolute standard for radioactivity measurements. The automation is achieved using PLC (programmable logic controller) and SCADA (supervisory control and data acquisition). Radioactive solution of 60 Co was standardized to compare the performance of the automated system with proportional counter based absolute standard maintained in the laboratory. The activity concentrations determined using these two systems were in very good agreement; the new automated system can be used for absolute measurement of activity concentration of radioactive solutions. Copyright © 2018. Published by Elsevier Ltd.

  13. RGSS-ID: an approach to new radiologic reporting system.

    PubMed

    Ikeda, M; Sakuma, S; Maruyama, K

    1990-01-01

    RGSS-ID is a developmental computer system that applies artificial intelligence (AI) methods to a reporting system. The representation scheme called Generalized Finding Representation (GFR) is proposed to bridge the gap between natural language expressions in the radiology report and AI methods. The entry process of RGSS-ID is made mainly by selecting items; our system allows a radiologist to compose a sentence which can be completely parsed by the computer. Further RGSS-ID encodes findings into the expression corresponding to GFR, and stores this expression into the knowledge data base. The final printed report is made in the natural language.

  14. Implementing electronic identification for performance recording in sheep: II. Cost-benefit analysis in meat and dairy farms.

    PubMed

    Ait-Saidi, A; Caja, G; Salama, A A K; Milán, M J

    2014-12-01

    Costs and secondary benefits of implementing electronic identification (e-ID) for performance recording (i.e., lambing, body weight, inventory, and milk yield) in dairy and meat ewes were assessed by using the results from a previous study in which manual (M), semiautomatic (SA), and automatic (AU) data collection systems were compared. Ewes were identified with visual ear tags and electronic rumen boluses. The M system used visual identification, on-paper data recording, and manual data uploading to a computer. The SA system used e-ID with a handheld reader in which performances were typed and automatic uploaded to a computer. The use of a personal digital assistant (PDA) for recording and automatic data uploading, which transformed M in a SA system, was also considered. The AU system was only used for BW recording and consisted of e-ID, automatic data recording in an electronic scale, and uploading to a computer. The cost-benefit study was applied to 2 reference sheep farms of 700 meat ewes, under extensive or intensive production systems, and of 400 dairy ewes, practicing once- or twice-a-day machine milkings. Sensitivity analyses under voluntary and mandatory e-ID scenarios were also included. Benefits of using e-ID for SA or AU performance recording mainly depended on sheep farm purpose, number of test days per year, handheld reader and PDA prices, and flock size. Implementing e-ID for SA and AU performance recording saved approximately 50% of the time required by the M system, and increased the reliability of the data collected. Use of e-ID increased the cost of performance recording in a voluntary e-ID scenario, paying only partially the investment made (15 to 70%). For the mandatory e-ID scenario, in which the cost of e-ID devices was not included, savings paid 100% of the extra costs needed for using e-ID in all farm types and conditions. In both scenarios, the reader price was the most important extra cost (40 to 90%) for implementing e-ID in sheep farms. Calculated extra costs of using the PDA covered more than 100% of the implementation costs in all type of sheep farms, indicating that this device was cost-effective for sheep-performance recording. Copyright © 2014 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  15. Scada Malware, a Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.

  16. Application of the Reference Method Isotope Dilution Gas Chromatography Mass Spectrometry (ID/GC/MS) to Establish Metrological Traceability for Calibration and Control of Blood Glucose Test Systems

    PubMed Central

    Andreis, Elisabeth; Küllmer, Kai

    2014-01-01

    Self-monitoring of blood glucose (BG) by means of handheld BG systems is a cornerstone in diabetes therapy. The aim of this article is to describe a procedure with proven traceability for calibration and evaluation of BG systems to guarantee reliable BG measurements. Isotope dilution gas chromatography mass spectrometry (ID/GC/MS) is a method that fulfills all requirements to be used in a higher-order reference measurement procedure. However, this method is not applicable for routine measurements because of the time-consuming sample preparation. A hexokinase method with perchloric acid (PCA) sample pretreatment is used in a measurement procedure for such purposes. This method is directly linked to the ID/GC/MS method by calibration with a glucose solution that has an ID/GC/MS-determined target value. BG systems are calibrated with whole blood samples. The glucose levels in such samples are analyzed by this ID/GC/MS-linked hexokinase method to establish traceability to higher-order reference material. For method comparison, the glucose concentrations in 577 whole blood samples were measured using the PCA-hexokinase method and the ID/GC/MS method; this resulted in a mean deviation of 0.1%. The mean deviation between BG levels measured in >500 valid whole blood samples with BG systems and the ID/GC/MS was 1.1%. BG systems allow a reliable glucose measurement if a true reference measurement procedure, with a noninterrupted traceability chain using ID/GC/MS linked hexokinase method for calibration of BG systems, is implemented. Systems should be calibrated by means of a traceable and defined measurement procedure to avoid bias. PMID:24876614

  17. Improving investigational drug service operations through development of an innovative computer system.

    PubMed

    Sweet, Burgunda V; Tamer, Helen R; Siden, Rivka; McCreadie, Scott R; McGregory, Michael E; Benner, Todd; Tankanow, Roberta M

    2008-05-15

    The development of a computerized system for protocol management, dispensing, inventory accountability, and billing by the investigational drug service (IDS) of a university health system is described. After an unsuccessful search for a commercial system that would accommodate the variation among investigational protocols and meet regulatory requirements, the IDS worked with the health-system pharmacy's information technology staff and informatics pharmacists to develop its own system. The informatics pharmacists observed work-flow and information capture in the IDS and identified opportunities for improved efficiency with an automated system. An iterative build-test-design process was used to provide the flexibility needed for individual protocols. The intent was to design a system that would support most IDS processes, using components that would allow automated backup and redundancies. A browser-based system was chosen to allow remote access. Servers, bar-code scanners, and printers were integrated into the final system design. Initial implementation involved 10 investigational protocols chosen on the basis of dispensing volume and complexity of study design. Other protocols were added over a two-year period; all studies whose drugs were dispensed from the IDS were added, followed by those for which the drugs were dispensed from decentralized pharmacy areas. The IDS briefly used temporary staff to free pharmacist and technician time for system implementation. Decentralized pharmacy areas that rarely dispense investigational drugs continue to use manual processes, with subsequent data transcription into the system. Through the university's technology transfer division, the system was licensed by an external company for sale to other IDSs. The WebIDS system has improved daily operations, enhanced safety and efficiency, and helped meet regulatory requirements for investigational drugs.

  18. How Accurate Is A Hydraulic Model? | Science Inventory | US ...

    EPA Pesticide Factsheets

    Symposium paper Network hydraulic models are widely used, but their overall accuracy is often unknown. Models are developed to give utilities better insight into system hydraulic behavior, and increasingly the ability to predict the fate and transport of chemicals. Without an accessible and consistent means of validating a given model against the system it is meant to represent, the value of those supposed benefits should be questioned. Supervisory Control And Data Acquisition (SCADA) databases, though ubiquitous, are underused data sources for this type of task. Integrating a network model with a measurement database would offer professionals the ability to assess the model’s assumptions in an automated fashion by leveraging enormous amounts of data.

  19. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    PubMed Central

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058

  20. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    PubMed

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  1. Visually enhanced CCTV digital surveillance utilizing Intranet and Internet.

    PubMed

    Ozaki, Nobuyuki

    2002-07-01

    This paper describes a solution for integrated plant supervision utilizing closed circuit television (CCTV) digital surveillance. Three basic requirements are first addressed as the platform of the system, with discussion on the suitable video compression. The system configuration is described in blocks. The system provides surveillance functionality: real-time monitoring, and process analysis functionality: a troubleshooting tool. This paper describes the formulation of practical performance design for determining various encoder parameters. It also introduces image processing techniques for enhancing the original CCTV digital image to lessen the burden on operators. Some screenshots are listed for the surveillance functionality. For the process analysis, an image searching filter supported by image processing techniques is explained with screenshots. Multimedia surveillance, which is the merger with process data surveillance, or the SCADA system, is also explained.

  2. Development of an automatic subsea blowout preventer stack control system using PLC based SCADA.

    PubMed

    Cai, Baoping; Liu, Yonghong; Liu, Zengkai; Wang, Fei; Tian, Xiaojie; Zhang, Yanzhen

    2012-01-01

    An extremely reliable remote control system for subsea blowout preventer stack is developed based on the off-the-shelf triple modular redundancy system. To meet a high reliability requirement, various redundancy techniques such as controller redundancy, bus redundancy and network redundancy are used to design the system hardware architecture. The control logic, human-machine interface graphical design and redundant databases are developed by using the off-the-shelf software. A series of experiments were performed in laboratory to test the subsea blowout preventer stack control system. The results showed that the tested subsea blowout preventer functions could be executed successfully. For the faults of programmable logic controllers, discrete input groups and analog input groups, the control system could give correct alarms in the human-machine interface. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  3. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  4. An Intention-Driven Semi-autonomous Intelligent Robotic System for Drinking.

    PubMed

    Zhang, Zhijun; Huang, Yongqian; Chen, Siyuan; Qu, Jun; Pan, Xin; Yu, Tianyou; Li, Yuanqing

    2017-01-01

    In this study, an intention-driven semi-autonomous intelligent robotic (ID-SIR) system is designed and developed to assist the severely disabled patients to live independently. The system mainly consists of a non-invasive brain-machine interface (BMI) subsystem, a robot manipulator and a visual detection and localization subsystem. Different from most of the existing systems remotely controlled by joystick, head- or eye tracking, the proposed ID-SIR system directly acquires the intention from users' brain. Compared with the state-of-art system only working for a specific object in a fixed place, the designed ID-SIR system can grasp any desired object in a random place chosen by a user and deliver it to his/her mouth automatically. As one of the main advantages of the ID-SIR system, the patient is only required to send one intention command for one drinking task and the autonomous robot would finish the rest of specific controlling tasks, which greatly eases the burden on patients. Eight healthy subjects attended our experiment, which contained 10 tasks for each subject. In each task, the proposed ID-SIR system delivered the desired beverage container to the mouth of the subject and then put it back to the original position. The mean accuracy of the eight subjects was 97.5%, which demonstrated the effectiveness of the ID-SIR system.

  5. An online ID identification system for liquefied-gas cylinder plant

    NASA Astrophysics Data System (ADS)

    He, Jin; Ding, Zhenwen; Han, Lei; Zhang, Hao

    2017-11-01

    An automatic ID identification system for gas cylinders' online production was developed based on the production conditions and requirements of the Technical Committee for Standardization of Gas Cylinders. A cylinder ID image acquisition system was designed to improve the image contrast of ID regions on gas cylinders against the background. Then the ID digits region was located by the CNN template matching algorithm. Following that, an adaptive threshold method based on the analysis of local average grey value and standard deviation was proposed to overcome defects of non-uniform background in the segmentation results. To improve the single digit identification accuracy, two BP neural networks were trained respectively for the identification of all digits and the easily confusable digits. If the single digit was classified as one of confusable digits by the former BP neural network, it was further tested by the later one, and the later result was taken as the final identification result of this single digit. At last, the majority voting was adopted to decide the final identification result for the 6-digit cylinder ID. The developed system was installed on a production line of a liquefied-petroleum-gas cylinder plant and worked in parallel with the existing weighing step on the line. Through the field test, the correct identification rate for single ID digit was 94.73%, and none of the tested 2000 cylinder ID was misclassified through the majority voting.

  6. Secure VM for Monitoring Industrial Process Controllers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicatedmore » host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.« less

  7. Use of Fuzzy Logic Systems for Assessment of Primary Faults

    NASA Astrophysics Data System (ADS)

    Petrović, Ivica; Jozsa, Lajos; Baus, Zoran

    2015-09-01

    In electric power systems, grid elements are often subjected to very complex and demanding disturbances or dangerous operating conditions. Determining initial fault or cause of those states is a difficult task. When fault occurs, often it is an imperative to disconnect affected grid element from the grid. This paper contains an overview of possibilities for using fuzzy logic in an assessment of primary faults in the transmission grid. The tool for this task is SCADA system, which is based on information of currents, voltages, events of protection devices and status of circuit breakers in the grid. The function model described with the membership function and fuzzy logic systems will be presented in the paper. For input data, diagnostics system uses information of protection devices tripping, states of circuit breakers and measurements of currents and voltages before and after faults.

  8. A survey of artificial immune system based intrusion detection.

    PubMed

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  9. Integrated Design System (IDS) Tools for the Spacecraft Aeroassist/Entry Vehicle Design Process

    NASA Technical Reports Server (NTRS)

    Olynick, David; Braun, Robert; Langhoff, Steven R. (Technical Monitor)

    1997-01-01

    The definition of the Integrated Design System technology focus area as presented in the NASA Information Technology center of excellence strategic plan is described. The need for IDS tools in the aeroassist/entry vehicle design process is illustrated. Initial and future plans for spacecraft IDS tool development are discussed.

  10. Efficient coding and detection of ultra-long IDs for visible light positioning systems.

    PubMed

    Zhang, Hualong; Yang, Chuanchuan

    2018-05-14

    Visible light positioning (VLP) is a promising technique to complement Global Navigation Satellite System (GNSS) such as Global positioning system (GPS) and BeiDou Navigation Satellite System (BDS) which features the advantage of low-cost and high accuracy. The situation becomes even more crucial for indoor environments, where satellite signals are weak or even unavailable. For large-scale application of VLP, there would be a considerable number of Light emitting diode (LED) IDs, which bring forward the demand of long LED ID detection. In particular, to provision indoor localization globally, a convenient way is to program a unique ID into each LED during manufacture. This poses a big challenge for image sensors, such as the CMOS camera in everybody's hands since the long ID covers the span of multiple frames. In this paper, we investigate the detection of ultra-long ID using rolling shutter cameras. By analyzing the pattern of data loss in each frame, we proposed a novel coding technique to improve the efficiency of LED ID detection. We studied the performance of Reed-Solomon (RS) code in this system and designed a new coding method which considered the trade-off between performance and decoding complexity. Coding technique decreases the number of frames needed in data processing, significantly reduces the detection time, and improves the accuracy of detection. Numerical and experimental results show that the detected LED ID can be much longer with the coding technique. Besides, our proposed coding method is proved to achieve a performance close to that of RS code while the decoding complexity is much lower.

  11. The Value That Infectious Diseases Physicians Bring to the Healthcare System.

    PubMed

    McQuillen, Daniel P; MacIntyre, Ann T

    2017-09-15

    While a career in infectious diseases (ID) has always been challenging and exciting, recognition of the value that ID physicians provide to the healthcare system as a whole, over and above the value they provide to individual patients, has been poor in this system. In response to this disparity, the Infectious Diseases Society of America Clinical Affairs Committee has long endeavored to quantify the value of ID physicians to the system, which is challenging in part because of the many avenues through which they influence healthcare. We discuss data showing that ID physicians improve clinical outcomes, positively impact transitions of care, and direct system-level improvements through infection prevention and antimicrobial stewardship. We identify areas where value-based care provides additional future opportunities for ID physicians. A Clinical Affairs Committee-sponsored study of ID physicians' positive impact on patient outcomes shows that few medical specialties are better positioned to positively impact the Triple Aim approach-better health, better care, and lower per capita cost-that is the principle tenet of healthcare system reform. Published by Oxford University Press for the Infectious Diseases Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  12. A qualitative study of infectious diseases fellowships in Japan.

    PubMed

    Iwata, Kentaro; Doi, Asako

    2016-02-21

    The purpose of this research is to elucidate the actual status of Infectious Diseases (ID) Fellowship programs in Japan to improve them further. We conducted qualitative interviews with infectious diseases fellows and his/her faculty consultants from 10 institutions providing ID Fellowships in Japan. We qualitatively analysed the data to delineate the actual status of each program and the fellowship program policies overall, and to identify measures for further improvement. The interviews revealed that there are largely two kinds of ID fellowships; ID programs entirely devoting full time to infectious diseases, and programs that are subordinate concepts of other subspecialties, where only a portion of hours were devoted to ID. Some institutions did not even have an ID department. Time spent by the faculty consultants on fellows also varied among programs. The desire for improvement also varied among interviewees; some being happy with the current system while others demanded radical reform. Even though there are many ID fellowship programs in Japan, the content, quality, and concepts apparently vary among programs. The perceptions by interviewees on the educational system differed, depending on the standpoints they have on ID physicians. There probably needs to be a coherency in the provision of ID fellowship programs so that fellows acquire competency in the subspecialty with sufficient expertise to act as independent ID specialists. Further studies are necessary for the improvement of ID subspecialty training in Japan.

  13. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less

  15. A Survey of Artificial Immune System Based Intrusion Detection

    PubMed Central

    Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  16. Validation of a rapid DNA process with the RapidHIT® ID system using GlobalFiler® Express chemistry, a platform optimized for decentralized testing environments.

    PubMed

    Salceda, Susana; Barican, Arnaldo; Buscaino, Jacklyn; Goldman, Bruce; Klevenberg, Jim; Kuhn, Melissa; Lehto, Dennis; Lin, Frank; Nguyen, Phong; Park, Charles; Pearson, Francesca; Pittaro, Rick; Salodkar, Sayali; Schueren, Robert; Smith, Corey; Troup, Charles; Tsou, Dean; Vangbo, Mattias; Wunderle, Justus; King, David

    2017-05-01

    The RapidHIT ® ID is a fully automated sample-to-answer system for short tandem repeat (STR)-based human identification. The RapidHIT ID has been optimized for use in decentralized environments and processes presumed single source DNA samples, generating Combined DNA Index System (CODIS)-compatible DNA profiles in less than 90min. The system is easy to use, requiring less than one minute of hands-on time. Profiles are reviewed using centralized linking software, RapidLINK™ (IntegenX, Pleasanton, CA), a software tool designed to collate DNA profiles from single or multiple RapidHIT ID systems at different geographic locations. The RapidHIT ID has been designed to employ GlobalFiler ® Express and AmpFLSTR ® NGMSElect™, Thermo Fisher Scientific (Waltham, MA) STR chemistries. The Developmental Validation studies were performed using GlobalFiler ® Express with single source reference samples according to Scientific Working Group for DNA Analysis Methods guidelines. These results show that multiple RapidHIT ID systems networked with RapidLINK software form a highly reliable system for wide-scale deployment in locations such as police booking stations and border crossings enabling real-time testing of arrestees, potential human trafficking victims, and other instances where rapid turnaround is essential. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  17. Brazil upgrades microwave system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Newman, H.S.; Gomes, H.P.

    1979-02-01

    To provide communications facilities necessary during major construction projects, and for the operation and control of the expanding electric-power network, in 1967 Furnas-Centrais Eletricas SA, Brazil, started installing the first 22 links of its microwave system, from the Botafogo plant in Rio de Janeiro to the Furnas hydro station, and from the Furnas hydro station, southwest, to the Guarulhos plant in Sao Paulo and northwest to the Estreito hydro plant. To accommodate the construction of additional hydroelectric facilities, the second and third microwave-system expansions added nine links from Estreito hydro, northwest, to Marimbondo hydro and 7 links to Itumbiara. Themore » fourth expansion included two links to connect with the Angra dos Reis nuclear generating plant. A modern SCADA system replaced an earlier fault-reporting method, and a means of monitoring performance communications was established.« less

  18. Model-based approach for cyber-physical attack detection in water distribution systems.

    PubMed

    Housh, Mashor; Ohar, Ziv

    2018-08-01

    Modern Water Distribution Systems (WDSs) are often controlled by Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs) which manage their operation and maintain a reliable water supply. As such, and with the cyber layer becoming a central component of WDS operations, these systems are at a greater risk of being subjected to cyberattacks. This paper offers a model-based methodology based on a detailed hydraulic understanding of WDSs combined with an anomaly detection algorithm for the identification of complex cyberattacks that cannot be fully identified by hydraulically based rules alone. The results show that the proposed algorithm is capable of achieving the best-known performance when tested on the data published in the BATtle of the Attack Detection ALgorithms (BATADAL) competition (http://www.batadal.net). Copyright © 2018. Published by Elsevier Ltd.

  19. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  20. Hospital admissions for respiratory system diseases in adults with intellectual disabilities in Southeast London: a register-based cohort study.

    PubMed

    Chang, Chin-Kuo; Chen, Chih-Yin; Broadbent, Mathew; Stewart, Robert; O'Hara, Jean

    2017-03-29

    Intellectual disability (ID) carries a high impact on need for care, health status and premature mortality. Respiratory system diseases contribute a major part of mortality among people with ID, but remain underinvestigated as consequent morbidities. Anonymised electronic mental health records from the South London and Maudsley Trust (SLaM) were linked to national acute medical care data. Using retrospective cohort and matched case-control study designs, adults with ID receiving SLaM care between 1 January 2008 and 31 March 2013 were identified and compared with local catchment residents for respiratory system disease admissions. Standardised admission ratios (SARs) were first calculated, followed by a comparison of duration of hospitalisation with respiratory system disease between people with ID and age-matched and gender-matched random counterparts modelled using linear regression. Finally, the risk of readmission for respiratory system disease was analysed using the Cox models. For the 3138 adults with ID identified in SLaM, the SAR for respiratory system disease admissions was 4.02 (95% CI 3.79 to 4.26). Compared with adults without ID, duration of hospitalisation was significantly longer by 2.34 days (95% CI 0.03 to 4.64) and respiratory system disease readmission was significantly elevated (HR=1.35; 95% CI 1.17 to 1.56) after confounding adjustment. Respiratory system disease admissions in adults with ID are more frequent, of longer duration and have a higher likelihood of recurring. Development and evaluation of potential interventions to the preventable causes of respiratory diseases should be prioritised. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  1. Online location of a break in water distribution systems

    NASA Astrophysics Data System (ADS)

    Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei

    2003-08-01

    Breaks often occur to urban water distribution systems under severely cold weather, or due to corrosion of pipes, deformation of ground, etc., and the breaks cannot easily be located, especially immediately after the events. This paper develops a methodology to locate a break in a water distribution system by monitoring water pressure online at some nodes in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the break based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides a quick, effective, and practical way in which a break in a water distribution system can be located.

  2. Cryogenic Control System Migration and Developments towards the UNICOS CERN Standard at INFN

    NASA Astrophysics Data System (ADS)

    Modanese, Paolo; Calore, Andrea; Contran, Tiziano; Friso, Alessandro; Pengo, Marco; Canella, Stefania; Burioli, Sergio; Gallese, Benedetto; Inglese, Vitaliano; Pezzetti, Marco; Pengo, Ruggero

    The cryogenic control systems at Laboratori Nazionali di Legnaro (LNL) are undergoing an important and radical modernization, allowing all the plants controls and supervision systems to be renewed in a homogeneous way towards the CERN-UNICOS standard. Before the UNICOS migration project started there were as many as 7 different types of PLC and 7 different types of SCADA, each one requiring its own particular programming language. In these conditions, even a simple modification and/or integration on the program or on the supervision, required the intervention of a system integrator company, specialized in its specific control system. Furthermore it implied that the operators have to be trained to learn the different types of control systems. The CERN-UNICOS invented for LHC [1] has been chosen due to its reliability and planned to run and be maintained for decades on. The complete migration is part of an agreement between CERN and INFN.

  3. Infrastructure Vulnerability Assessment Model (I-VAM).

    PubMed

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  4. Evaluation of red blood cell and platelet antigen genotyping platforms (ID CORE XT/ID HPA XT) in routine clinical practice.

    PubMed

    Finning, Kirstin; Bhandari, Radhika; Sellers, Fiona; Revelli, Nicoletta; Villa, Maria Antonietta; Muñiz-Díaz, Eduardo; Nogués, Núria

    2016-03-01

    High-throughput genotyping platforms enable simultaneous analysis of multiple polymorphisms for blood group typing. BLOODchip® ID is a genotyping platform based on Luminex® xMAP technology for simultaneous determination of 37 red blood cell (RBC) antigens (ID CORE XT) and 18 human platelet antigens (HPA) (ID HPA XT) using the BIDS XT software. In this international multicentre study, the performance of ID CORE XT and ID HPA XT, using the centres' current genotyping methods as the reference for comparison, and the usability and practicality of these systems, were evaluated under working laboratory conditions. DNA was extracted from whole blood in EDTA with Qiagen methodologies. Ninety-six previously phenotyped/genotyped samples were processed per assay: 87 testing samples plus five positive controls and four negative controls. Results were available for 519 samples: 258 with ID CORE XT and 261 with ID HPA XT. There were three "no calls" that were either caused by human error or resolved after repeating the test. Agreement between the tests and reference methods was 99.94% for ID CORE XT (9,540/9,546 antigens determined) and 100% for ID HPA XT (all 4,698 alleles determined). There were six discrepancies in antigen results in five RBC samples, four of which (in VS, N, S and Do(a)) could not be investigated due to lack of sufficient sample to perform additional tests and two of which (in S and C) were resolved in favour of ID CORE XT (100% accuracy). The total hands-on time was 28-41 minutes for a batch of 16 samples. Compared with the reference platforms, ID CORE XT and ID HPA XT were considered simpler to use and had shorter processing times. ID CORE XT and ID HPA XT genotyping platforms for RBC and platelet systems were accurate and user-friendly in working laboratory settings.

  5. Operational uses of ACTS technology

    NASA Astrophysics Data System (ADS)

    Gedney, Richard T.; Wright, David L.; Balombin, Joseph L.; Sohn, Philip Y.; Cashman, William F.; Stern, Alan L.; Golding, Len; Palmer, Larry

    1992-03-01

    The NASA Advanced Communications Technology Satellite (ACTS) provides the technologies for very high gain hopping spot beam antennas, on-board baseband routing and processing, and wideband (1 GHz) Ka-band transponders. A number of studies have recently been completed using the experience gained in developing the actual ACTS system hardware to quantify how well the ACTS technology can be used in future operational systems. This paper provides a summary of these study results including the spacecraft (S/C) weight per unit circuit for providing services by ACTS technologies as compared to present-day satellites. The uses of the ACTS technology discussed are for providing T1 VSAT mesh networks, aeronautical mobile communications, supervisory control and data acquisition (SCADA) services, and high data rate networks for supercomputer and other applications.

  6. Coding Accuracy of the Ambulatory Data System: A Study of Coding Accuracy Within the General Internal Medicine Clinic, Walter Reed Army Medical Center

    DTIC Science & Technology

    1998-04-17

    concerns center around its ultimate goal to maximize appropriate care and minimize or eliminate inappropriate care (DoD UM Policy , 1996). While the...uasp cncd . GCK Tobacco taw disorder tr’O: Anemia ID: Acute bronchial ID: A«Jtt]ihiir<rtiK*i» 10: Acute refft iafection ID: Acute xinucm ID...181-187. Department of Defense (DoD) Ultilization Management Policy for the Direct Care System (Draft) (1996). Duncan, D.G. & Servais, C.S., (1996

  7. Analysis of Free-floating Bike Sharing and Insights on System Operations : or Analyzing Mobility Patterns and Imbalance of Free Floating Bike Sharing Systems

    DOT National Transportation Integrated Search

    2018-01-31

    Aritra Pal (ORCID ID 0000-0002-2256-2464) Yu Zhang (ORCID ID 0000-0003-1202-626X) Changhyun Kwon (ORCID ID 0000-0001-8455-6396) Bike Sharing is a sustainable mode of urban mobility, not only for regular commuters but also for casual users and tourist...

  8. An ID Network System to Prepare for Global Environmental/Health Concerns

    NASA Astrophysics Data System (ADS)

    Asano, Shoichiro; Yoneda, Susumu

    Climate change and/or pandemics are global life threatening concerns. For verifying and utilizing monitored data for solving to the Climate Change concerns, a network system based on device ID would be proposed. In this paper, we review the recent standardization initiatives in ITU-T, and propose an ID network that can be used to verify the solutions.

  9. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  10. Make measurable what is not so: national monitoring of the status of persons with intellectual disability.

    PubMed

    Fujiura, Glenn T; Rutkowski-Kmitta, Violet; Owen, Randall

    2010-12-01

    Statistics are critical in holding governments accountable for the well-being of citizens with disability. International initiatives are underway to improve the quality of disability statistics, but meaningful ID data is exceptionally rare. The status of ID data was evaluated in a review of 12 national statistical systems. Recurring data collection by national ministries was identified and the availability of measures of poverty, exclusion, and disadvantage was assessed. A total of 131 recurring systems coordinated by 50 different ministries were identified. The majority included general disability but less than 25% of the systems screened ID. Of these, few provided policy-relevant data. The scope of ID data was dismal at best, though a significant statistical infrastructure exists for the integration of ID data. Advocacy will be necessary. There is no optimal form of data monitoring, and decisions regarding priorities in purpose, targeted audiences, and the goals for surveillance must be resolved.

  11. Usefulness of DARPA dataset for intrusion detection system evaluation

    NASA Astrophysics Data System (ADS)

    Thomas, Ciza; Sharma, Vishwas; Balakrishnan, N.

    2008-03-01

    The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress in that field. The DARPA IDS evaluation dataset has been criticized and considered by many as a very outdated dataset, unable to accommodate the latest trend in attacks. Then naturally the question arises as to whether the detection systems have improved beyond detecting these old level of attacks. If not, is it worth thinking of this dataset as obsolete? The paper presented here tries to provide supporting facts for the use of the DARPA IDS evaluation dataset. The two commonly used signature-based IDSs, Snort and Cisco IDS, and two anomaly detectors, the PHAD and the ALAD, are made use of for this evaluation purpose and the results support the usefulness of DARPA dataset for IDS evaluation.

  12. 77 FR 68065 - Amendment of Class D and Class E Airspace; Lewiston, ID

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-15

    ... Measuring Equipment (VOR/ DME), and the Lewiston-Nez Perce Instrument Landing System (ILS) Localizer... feet or more above the surface of the earth. * * * * * ANM ID E5 Lewiston, ID [Modified] Lewiston-Nez...

  13. Coherent operation of detector systems and their readout electronics in a complex experiment control environment

    NASA Astrophysics Data System (ADS)

    Koestner, Stefan

    2009-09-01

    With the increasing size and degree of complexity of today's experiments in high energy physics the required amount of work and complexity to integrate a complete subdetector into an experiment control system is often underestimated. We report here on the layered software structure and protocols used by the LHCb experiment to control its detectors and readout boards. The experiment control system of LHCb is based on the commercial SCADA system PVSS II. Readout boards which are outside the radiation area are accessed via embedded credit card sized PCs which are connected to a large local area network. The SPECS protocol is used for control of the front end electronics. Finite state machines are introduced to facilitate the control of a large number of electronic devices and to model the whole experiment at the level of an expert system.

  14. Fuzzy Kernel k-Medoids algorithm for anomaly detection problems

    NASA Astrophysics Data System (ADS)

    Rustam, Z.; Talita, A. S.

    2017-07-01

    Intrusion Detection System (IDS) is an essential part of security systems to strengthen the security of information systems. IDS can be used to detect the abuse by intruders who try to get into the network system in order to access and utilize the available data sources in the system. There are two approaches of IDS, Misuse Detection and Anomaly Detection (behavior-based intrusion detection). Fuzzy clustering-based methods have been widely used to solve Anomaly Detection problems. Other than using fuzzy membership concept to determine the object to a cluster, other approaches as in combining fuzzy and possibilistic membership or feature-weighted based methods are also used. We propose Fuzzy Kernel k-Medoids that combining fuzzy and possibilistic membership as a powerful method to solve anomaly detection problem since on numerical experiment it is able to classify IDS benchmark data into five different classes simultaneously. We classify IDS benchmark data KDDCup'99 data set into five different classes simultaneously with the best performance was achieved by using 30 % of training data with clustering accuracy reached 90.28 percent.

  15. A study on the impact of high penetration distributed generation inverters on grid operation and stability

    NASA Astrophysics Data System (ADS)

    Gu, Fei; Brouwer, Jack; Samuelsen, Scott

    2013-09-01

    Recent advances in inverter technology have enabled ancillary services such as volt/VAR regulation, SCADA communications, and active power filtering. Smart inverters can not only provide real power, but can be controlled to use excess capacity to provide reactive power compensation, power flow control, and active power filtering without supplementary inverter hardware. A transient level inverter model based on the Solectria 7700 inverter is developed and used to assess these control strategies using field data from an existing branch circuit containing two Amonix 68kW CPV-7700 systems installed at the University of California, Irvine.

  16. Designing and Implementation a Lab Testing Method for Power Cables Insulation Resistance According with STAS 10411-89, SR EN ISO/CEI/17025/2005

    NASA Astrophysics Data System (ADS)

    Dobra, R.; Pasculescu, D.; Marc, G.; Risteiu, M.; Antonov, A.

    2017-06-01

    Insulation resistance measurement is one of the most important tests required by standards and regulations in terms of electrical safety. Why these tests are is to prevent possible accidents caused by electric shock, damage to equipment or outbreak of fire in normal operating conditions of electrical cables. The insulation resistance experiment refers to the testing of electrical cable insulation, which has a measured resistance that must be below the imposed regulations. Using a microcontroller system data regarding the insulation resistance of the power cables is acquired and with SCADA software the test results are displayed.

  17. An analysis of offshore wind farm SCADA measurements to identify key parameters influencing the magnitude of wake effects

    NASA Astrophysics Data System (ADS)

    Mittelmeier, N.; Blodau, T.; Steinfeld, G.; Rott, A.; Kühn, M.

    2016-09-01

    Atmospheric conditions have a clear influence on wake effects. Stability classification is usually based on wind speed, turbulence intensity, shear and temperature gradients measured partly at met masts, buoys or LiDARs. The objective of this paper is to find a classification for stability based on wind turbine Supervisory Control and Data Acquisition (SCADA) measurements in order to fit engineering wake models better to the current ambient conditions. Two offshore wind farms with met masts have been used to establish a correlation between met mast stability classification and new aggregated statistical signals based on multiple measurement devices. The significance of these new signals on power production is demonstrated for two wind farms with met masts and validated against data from one further wind farm without a met mast. We found a good correlation between the standard deviation of active power divided by the average power of wind turbines in free flow with the ambient turbulence intensity when the wind turbines were operating in partial load.

  18. MALDI-TOF MS is more accurate than VITEK II ANC card and API Rapid ID 32 A system for the identification of Clostridium species.

    PubMed

    Kim, Young Jin; Kim, Si Hyun; Park, Hyun-Jung; Park, Hae-Geun; Park, Dongchul; Song, Sae Am; Lee, Hee Joo; Yong, Dongeun; Choi, Jun Yong; Kook, Joong-Ki; Kim, Hye Ran; Shin, Jeong Hwan

    2016-08-01

    All 50 Clostridium difficile strains were definitely identified by Vitek2 system, Rapid ID 32A system, and MALDI-TOF. For 18 non-difficile Clostridium strains, the identification results were correct in 0, 2, and 17 strains by Vitek2, Rapid ID 32A, and MALDI-TOF, respectively. MALDI-TOF could be used as the primary tool for identification of Clostridium species. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Use of the BioMerieux ID 32C yeast identification system for identification of aerobic actinomycetes of medical importance.

    PubMed Central

    Muir, D B; Pritchard, R C

    1997-01-01

    The BioMerieux ID 32C Yeast Identification System was examined to determine its usefulness as a rapid method for the identification of medically important aerobic actinomycetes. More than 290 strains were tested by this method and the results were compared to those obtained by conventional methods. It was found that aerobic actinomycetes could be differentiated to species level in 7 days by the ID 32C system. PMID:9399526

  20. Application of a support vector machine algorithm to the safety precaution technique of medium-low pressure gas regulators

    NASA Astrophysics Data System (ADS)

    Hao, Xuejun; An, Xaioran; Wu, Bo; He, Shaoping

    2018-02-01

    In the gas pipeline system, safe operation of a gas regulator determines the stability of the fuel gas supply, and the medium-low pressure gas regulator of the safety precaution system is not perfect at the present stage in the Beijing Gas Group; therefore, safety precaution technique optimization has important social and economic significance. In this paper, according to the running status of the medium-low pressure gas regulator in the SCADA system, a new method for gas regulator safety precaution based on the support vector machine (SVM) is presented. This method takes the gas regulator outlet pressure data as input variables of the SVM model, the fault categories and degree as output variables, which will effectively enhance the precaution accuracy as well as save significant manpower and material resources.

  1. Radio Frequency Based Programmable Logic Controller Anomaly Detection

    DTIC Science & Technology

    2013-09-01

    include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques

  2. Managing RFID sensors networks with a general purpose RFID middleware.

    PubMed

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  3. 76 FR 49755 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... aircraft. Categories of records in the system: Name, last four of Social Security Number (SSN), squadron ID... of SSN'' for older records but the Social Security Number (SSN) will no longer be collected/solicited... storage media. Retrievability: Unique system ID. Safeguards: System access will be restricted by the use...

  4. Microcontroller-Based Experimental Setup and Experiments for SCADA Education

    ERIC Educational Resources Information Center

    Sahin, S.; Olmez, M.; Isler, Y.

    2010-01-01

    In the field of automation technology, research and development for industrial applications has increased rapidly in recent years. Therefore, industrial automation and control education is a very important element of the industrialization process in developing countries, such as Turkey, which needs to keep abreast for the latest developments in…

  5. Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits

    DTIC Science & Technology

    2012-03-22

    may improve the SCADA system’s resilience against DoS and man-in-the-middle ( MITM ) attacks. DoS attacks may be mitigated by using the redundant...paths available on the network links. MITM attacks may be mitigated by the data integrity checks associated with the middleware. Figure 4 illustrates

  6. Lost Hills Field Trial - incorporating new technology for resevoir management

    NASA Technical Reports Server (NTRS)

    Fielding, E. J.; Brink, J. L.; Patzek, T. W.; Silin, D. B.

    2002-01-01

    This paper will discuss how Chevron U.S.A. Production Company is implementing a field trial that will use Supervisory Control and Data Acquisition (SCADA)on injection wells, in conjunction with satellite images to measure ground elevation changes, to perform real-time resevoir management in the Lost Hills Field.

  7. Online monitoring of seismic damage in water distribution systems

    NASA Astrophysics Data System (ADS)

    Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei

    2004-07-01

    It is shown that water distribution systems can be damaged by earthquakes, and the seismic damages cannot easily be located, especially immediately after the events. Earthquake experiences show that accurate and quick location of seismic damage is critical to emergency response of water distribution systems. This paper develops a methodology to locate seismic damage -- multiple breaks in a water distribution system by monitoring water pressure online at limited positions in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the seismic damage based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides an effective and practical way in which seismic damage in a water distribution system can be accurately and quickly located.

  8. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  9. A Contextual Model for Identity Management (IdM) Interfaces

    ERIC Educational Resources Information Center

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  10. Identity and Access Management and Security in Higher Education.

    ERIC Educational Resources Information Center

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  11. Modeling Belief in Dynamic Systems. Part 1: Foundations

    DTIC Science & Technology

    2000-10-24

    GB[J(STLJ_H{HDnC`YHJ_BEt HjXkHj\\]HA(J`�OQA%­äSILE`%L[XQHLE`Jy^IdId?HjDs~?BE^ IATF �OQA%­*¶Gw-¿�BED%LW`G^I~I`YHJn¨ÍBEt0ðe8UWH¢NLEArJ(STHjA...FIH¡IAIH¢Â/Xåä,µJ¨|¶ « J(B*~HrJSIHiXkHjLE`>J]^IdId?HjD[~?BE^ IATF �BEtD?̱ Á ®V7Ç:T¨CE wsÐTOQAINH6­ OQ`WNjXkBE`GHFC^TAIFIHjDWXQHLE`JP^IdTdHD

  12. Cause of death and potentially avoidable deaths in Australian adults with intellectual disability using retrospective linked data

    PubMed Central

    Srasuebkul, Preeyaporn; Xu, Han; Howlett, Sophie

    2017-01-01

    Objectives To investigate mortality and its causes in adults over the age of 20 years with intellectual disability (ID). Design, setting and participants Retrospective population-based standardised mortality of the ID and Comparison cohorts. The ID cohort comprised 42 204 individuals who registered for disability services with ID as a primary or secondary diagnosis from 2005 to 2011 in New South Wales (NSW). The Comparison cohort was obtained from published deaths in NSW from the Australian Bureau of Statistics (ABS) from 2005 to 2011. Main outcome measures We measured and compared Age Standardised Mortality Rate (ASMR), Comparative Mortality Figure (CMF), years of productive life lost (YPLL) and proportion of deaths with potentially avoidable causes in an ID cohort with an NSW general population cohort. Results There were 19 362 adults in the ID cohort which experienced 732 (4%) deaths at a median age of 54 years. Age Standardised Mortality Rates increased with age for both cohorts. Overall comparative mortality figure was 1.3, but was substantially higher for the 20–44 (4.0) and 45–64 (2.3) age groups. YPLL was 137/1000 people in the ID cohort and 49 in the comparison cohort. Cause of death in ID cohort was dominated by respiratory, circulatory, neoplasm and nervous system. After recoding deaths previously attributed to the aetiology of the disability, 38% of deaths in the ID cohort and 17% in the comparison cohort were potentially avoidable. Conclusions Adults with ID experience premature mortality and over-representation of potentially avoidable deaths. A national system of reporting of deaths in adults with ID is required. Inclusion in health policy and services development and in health promotion programmes is urgently required to address premature deaths and health inequalities for adults with ID. PMID:28179413

  13. Cause of death and potentially avoidable deaths in Australian adults with intellectual disability using retrospective linked data.

    PubMed

    Trollor, Julian; Srasuebkul, Preeyaporn; Xu, Han; Howlett, Sophie

    2017-02-07

    To investigate mortality and its causes in adults over the age of 20 years with intellectual disability (ID). Retrospective population-based standardised mortality of the ID and Comparison cohorts. The ID cohort comprised 42 204 individuals who registered for disability services with ID as a primary or secondary diagnosis from 2005 to 2011 in New South Wales (NSW). The Comparison cohort was obtained from published deaths in NSW from the Australian Bureau of Statistics (ABS) from 2005 to 2011. We measured and compared Age Standardised Mortality Rate (ASMR), Comparative Mortality Figure (CMF), years of productive life lost (YPLL) and proportion of deaths with potentially avoidable causes in an ID cohort with an NSW general population cohort. There were 19 362 adults in the ID cohort which experienced 732 (4%) deaths at a median age of 54 years. Age Standardised Mortality Rates increased with age for both cohorts. Overall comparative mortality figure was 1.3, but was substantially higher for the 20-44 (4.0) and 45-64 (2.3) age groups. YPLL was 137/1000 people in the ID cohort and 49 in the comparison cohort. Cause of death in ID cohort was dominated by respiratory, circulatory, neoplasm and nervous system. After recoding deaths previously attributed to the aetiology of the disability, 38% of deaths in the ID cohort and 17% in the comparison cohort were potentially avoidable. Adults with ID experience premature mortality and over-representation of potentially avoidable deaths. A national system of reporting of deaths in adults with ID is required. Inclusion in health policy and services development and in health promotion programmes is urgently required to address premature deaths and health inequalities for adults with ID. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  14. Drivers of Emerging Infectious Disease Events as a Framework for Digital Detection.

    PubMed

    Olson, Sarah H; Benedum, Corey M; Mekaru, Sumiko R; Preston, Nicholas D; Mazet, Jonna A K; Joly, Damien O; Brownstein, John S

    2015-08-01

    The growing field of digital disease detection, or epidemic intelligence, attempts to improve timely detection and awareness of infectious disease (ID) events. Early detection remains an important priority; thus, the next frontier for ID surveillance is to improve the recognition and monitoring of drivers (antecedent conditions) of ID emergence for signals that precede disease events. These data could help alert public health officials to indicators of elevated ID risk, thereby triggering targeted active surveillance and interventions. We believe that ID emergence risks can be anticipated through surveillance of their drivers, just as successful warning systems of climate-based, meteorologically sensitive diseases are supported by improved temperature and precipitation data. We present approaches to driver surveillance, gaps in the current literature, and a scientific framework for the creation of a digital warning system. Fulfilling the promise of driver surveillance will require concerted action to expand the collection of appropriate digital driver data.

  15. Reflecting on the efficacy of cognitive mapping for decision-making in intellectual disability care: a case study.

    PubMed

    Duryan, Meri; Nikolik, Dragan; van Merode, Godefridus; Curfs, Leopold M G

    2015-01-01

    The central aspect of this study is a set of reflections on the efficacy of soft operational research techniques in understanding the dynamics of a complex system such as intellectual disability (ID) care providers. Organizations providing services to ID patients are complex and have many interacting stakeholders with often different and competing interests. Understanding the causes for failures in complex systems is crucial for appreciating the multiple perspectives of the key stakeholders of the system. Knowing the factors that adversely affect delivery of a patient-centred care by ID provider organizations offers the potential for identifying more effective resource-allocation solutions. The authors suggest cognitive mapping as a starting point for system dynamics modelling of optimal resource-allocation projects in ID care. The application of the method is illustrated via a case study in one of the ID care providers in the Netherlands. The paper discusses some of the practical implications of applying problem-structuring methods that support gathering feedback from vulnerable service users and front-line workers. The authors concluded that cognitive mapping technique can assist the management of healthcare organizations in strategic decision-making. Copyright © 2013 John Wiley & Sons, Ltd.

  16. OpenID Connect as a security service in cloud-based medical imaging systems.

    PubMed

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  17. Broad-Range Direct Detection and Identification of Fungi by Use of the PLEX-ID PCR-Electrospray Ionization Mass Spectrometry (ESI-MS) System

    PubMed Central

    Simner, Patricia J.; Uhl, James R.; Hall, Leslie; Weber, Michelle M.; Walchak, Robert C.; Buckwalter, Seanne

    2013-01-01

    The PLEX-ID system is a novel technology that couples PCR amplification and electrospray ionization-mass spectrometry to identify pathogens directly in clinical specimens. The analytical performance of the PLEX-ID Broad Fungal assay was compared with that of traditional culture identification by using 91 characterized fungal culture isolates (64 manufacturer-claimed and 27 nonclaimed organisms) and directly by using 395 respiratory specimens. Discordant results were resolved by D2 large-subunit ribosomal DNA fungal sequencing. Environmental studies were performed to monitor for potential contamination. The PLEX-ID Broad Fungal assay correctly identified 95.6% (87/91) and 81.3% (74/91) of the culture isolates to the genus and species levels, respectively. Of the manufacturer-claimed organisms, 100% (64/64) and 92.2% (59/64) were correctly identified to the genus and species levels, respectively. Direct analysis of respiratory specimens resulted in 67.6% (267/395) and 66.6% (263/395) agreement with culture results to the genus and species levels, respectively, with 16.2% (64/395) of the results discordant with culture and 16.2% (64/395) not detected by the system. The majority (>95%) of the isolates not detected directly by the PLEX-ID system ultimately grew in low quantities in culture (≤20 colonies). In 20.3% (35/172) of the respiratory specimens where no growth was observed in culture, the PLEX-ID system identified a fungus, suggesting a potential increase in sensitivity over culture in some instances. The PLEX-ID system provides a rapid method for the detection of a broad array of fungi directly in respiratory specimens and has the potential of impacting turnaround times and patient care by reducing the need to wait for the growth of an organism in culture. PMID:23515540

  18. Comparison of Three Commercial Systems for Identification of Yeasts Commonly Isolated in the Clinical Microbiology Laboratory

    PubMed Central

    Wadlin, Jill K.; Hanko, Gayle; Stewart, Rebecca; Pape, John; Nachamkin, Irving

    1999-01-01

    We evaluated three commercial systems (RapID Yeast Plus System; Innovative Diagnostic Systems, Norcross, Ga.; API 20C Aux; bioMerieux-Vitek, Hazelwood, Mo.; and Vitek Yeast Biochemical Card, bioMerieux-Vitek) against an auxinographic and microscopic morphologic reference method for the ability to identify yeasts commonly isolated in our clinical microbiology laboratory. Two-hundred one yeast isolates were compared in the study. The RapID Yeast Plus System was significantly better than either API 20C Aux (193 versus 167 correct identifications; P < 0.0001) or the Vitek Yeast Biochemical Card (193 versus 173 correct identifications; P = 0.003) for obtaining correct identifications to the species level without additional testing. There was no significant difference between results obtained with API 20C Aux and the Vitek Yeast Biochemical Card system (P = 0.39). The API 20C Aux system did not correctly identify any of the Candida krusei isolates (n = 23) without supplemental testing and accounted for the major differences between the API 20C Aux and RapID Yeast Plus systems. Overall, the RapID Yeast Plus System was easy to use and is a good system for the routine identification of clinically relevant yeasts. PMID:10325356

  19. Human Intellectual Disability Genes Form Conserved Functional Modules in Drosophila

    PubMed Central

    Oortveld, Merel A. W.; Keerthikumar, Shivakumar; Oti, Martin; Nijhof, Bonnie; Fernandes, Ana Clara; Kochinke, Korinna; Castells-Nobau, Anna; van Engelen, Eva; Ellenkamp, Thijs; Eshuis, Lilian; Galy, Anne; van Bokhoven, Hans; Habermann, Bianca; Brunner, Han G.; Zweier, Christiane; Verstreken, Patrik; Huynen, Martijn A.; Schenck, Annette

    2013-01-01

    Intellectual Disability (ID) disorders, defined by an IQ below 70, are genetically and phenotypically highly heterogeneous. Identification of common molecular pathways underlying these disorders is crucial for understanding the molecular basis of cognition and for the development of therapeutic intervention strategies. To systematically establish their functional connectivity, we used transgenic RNAi to target 270 ID gene orthologs in the Drosophila eye. Assessment of neuronal function in behavioral and electrophysiological assays and multiparametric morphological analysis identified phenotypes associated with knockdown of 180 ID gene orthologs. Most of these genotype-phenotype associations were novel. For example, we uncovered 16 genes that are required for basal neurotransmission and have not previously been implicated in this process in any system or organism. ID gene orthologs with morphological eye phenotypes, in contrast to genes without phenotypes, are relatively highly expressed in the human nervous system and are enriched for neuronal functions, suggesting that eye phenotyping can distinguish different classes of ID genes. Indeed, grouping genes by Drosophila phenotype uncovered 26 connected functional modules. Novel links between ID genes successfully predicted that MYCN, PIGV and UPF3B regulate synapse development. Drosophila phenotype groups show, in addition to ID, significant phenotypic similarity also in humans, indicating that functional modules are conserved. The combined data indicate that ID disorders, despite their extreme genetic diversity, are caused by disruption of a limited number of highly connected functional modules. PMID:24204314

  20. Human intellectual disability genes form conserved functional modules in Drosophila.

    PubMed

    Oortveld, Merel A W; Keerthikumar, Shivakumar; Oti, Martin; Nijhof, Bonnie; Fernandes, Ana Clara; Kochinke, Korinna; Castells-Nobau, Anna; van Engelen, Eva; Ellenkamp, Thijs; Eshuis, Lilian; Galy, Anne; van Bokhoven, Hans; Habermann, Bianca; Brunner, Han G; Zweier, Christiane; Verstreken, Patrik; Huynen, Martijn A; Schenck, Annette

    2013-10-01

    Intellectual Disability (ID) disorders, defined by an IQ below 70, are genetically and phenotypically highly heterogeneous. Identification of common molecular pathways underlying these disorders is crucial for understanding the molecular basis of cognition and for the development of therapeutic intervention strategies. To systematically establish their functional connectivity, we used transgenic RNAi to target 270 ID gene orthologs in the Drosophila eye. Assessment of neuronal function in behavioral and electrophysiological assays and multiparametric morphological analysis identified phenotypes associated with knockdown of 180 ID gene orthologs. Most of these genotype-phenotype associations were novel. For example, we uncovered 16 genes that are required for basal neurotransmission and have not previously been implicated in this process in any system or organism. ID gene orthologs with morphological eye phenotypes, in contrast to genes without phenotypes, are relatively highly expressed in the human nervous system and are enriched for neuronal functions, suggesting that eye phenotyping can distinguish different classes of ID genes. Indeed, grouping genes by Drosophila phenotype uncovered 26 connected functional modules. Novel links between ID genes successfully predicted that MYCN, PIGV and UPF3B regulate synapse development. Drosophila phenotype groups show, in addition to ID, significant phenotypic similarity also in humans, indicating that functional modules are conserved. The combined data indicate that ID disorders, despite their extreme genetic diversity, are caused by disruption of a limited number of highly connected functional modules.

  1. Creating a Network Model for the Integration of a Dynamic and Static Supervisory Control and Data Acquisition (SCADA) Test Environment

    DTIC Science & Technology

    2011-03-01

    they can continue to leverage these capabilities (building Smart Grid infrastructure and providing Internet connectivity to every home ) while ensuring...21  Figure 9. Smart Grid Interoperability .............................................................................. 22  Figure 10. Smart ...Grid Integration .................................................................................... 24  Figure 11. National Smart Grid Initiatives

  2. Power Plant Model Validation Tool

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The PPMV is used to validate generator model using disturbance recordings. The PPMV tool contains a collection of power plant models and model validation studies, as well as disturbance recordings from a number of historic grid events. The user can import data from a new disturbance into the database, which converts PMU and SCADA data into GE PSLF format, and then run the tool to validate (or invalidate) the model for a specific power plant against its actual performance. The PNNL PPMV tool enables the automation of the process of power plant model validation using disturbance recordings. The tool usesmore » PMU and SCADA measurements as input information. The tool automatically adjusts all required EPCL scripts and interacts with GE PSLF in the batch mode. The main tool features includes: The tool interacts with GE PSLF; The tool uses GE PSLF Play-In Function for generator model validation; Database of projects (model validation studies); Database of the historic events; Database of the power plant; The tool has advanced visualization capabilities; and The tool automatically generates reports« less

  3. IMBLMS phase B4, additional tasks 5.0. Microbial identification system

    NASA Technical Reports Server (NTRS)

    1971-01-01

    A laboratory study was undertaken to provide simplified procedures leading to the presumptive identification (I/D) of defined microorganisms on-board an orbiting spacecraft. Identifications were to be initiated by nonprofessional bacteriologists, (crew members) on a contingency basis only. Key objectives/constraints for this investigation were as follows:(1) I/D procedures based on limited, defined diagnostic tests, (2) testing oriented about ten selected microorganisms, (3) provide for definitive I/D key and procedures per selected organism, (4) define possible occurrences of false positives for the resulting I/D key by search of the appropriate literature, and (5) evaluation of the I/D key and procedure through a limited field trial on randomly selected subjects using the I/D key.

  4. Emergency Psychiatric Services for Individuals with Intellectual Disabilities: Caregivers' Perspectives

    ERIC Educational Resources Information Center

    Weiss, Jonathan A.; Lunsky, Yona; Gracey, Carolyn; Canrinus, Maaike; Morris, Susan

    2009-01-01

    Background: Strains on the mental health system and inaccessible services for individuals with intellectual disabilities (ID) often force caregivers to bring individuals with ID to the emergency department (ED) when in psychiatric crisis. The purpose of this study was to understand the experience of caregivers and adults with ID and mental health…

  5. Autosomal dominant anhidrotic ectodermal dysplasia with immunodeficiency caused by a novel NFKBIA mutation, p.Ser36Tyr, presents with mild ectodermal dysplasia and non-infectious systemic inflammation.

    PubMed

    Yoshioka, Takakazu; Nishikomori, Ryuta; Hara, Junichi; Okada, Keiko; Hashii, Yoshiko; Okafuji, Ikuo; Nodomi, Seishiro; Kawai, Tomoki; Izawa, Kazushi; Ohnishi, Hidenori; Yasumi, Takahiro; Nakahata, Tatsutoshi; Heike, Toshio

    2013-10-01

    Anhidrotic ectodermal dysplasia with immunodeficiency (EDA-ID) is characterized by hypohidrosis, dental abnormalities, sparse hair, and immunodeficiency. Autosomal dominant (AD)-EDA-ID, caused by a heterozygous mutation within NFKBIA, is very rare and its clinical features remain largely unknown. This study describes a patient with AD-EDA-ID harboring a novel NFKBIA mutation who presented with mild EDA and non-infectious systemic inflammation. The clinical presentation of an AD-EDA-ID patient was described and immunological, genetic, and biochemical analyses were performed, with a focus on nuclear factor kappa B (NF-κB) activation. The patient presented with symptoms of mild EDA-ID, namely sparse hair and hypohidrosis, although a skin biopsy confirmed the presence of sweat glands. There were no dental abnormalities. The patient also suffered from non-infectious inflammation, which responded to systemic corticosteroid therapy; however, the patient remained ill. Immunological analyses revealed reduced Toll-like receptor/IL-1 (TLR/IL-1) and tumor necrosis factor (TNF) receptor family responses to various stimuli. Genetic analysis identified a de novo heterozygous missense mutation, p.Ser36Tyr, in NFKBIA, resulting in defective NFKBIA degradation and impaired NF-κB activation. The patient was diagnosed with AD-EDA-ID and underwent hematopoietic stem cell transplantation. Engraftment was successful, with few signs of acute graft versus host disease. However, the patient suffered hemolytic anemia and thrombocytopenia, and died from a brain hemorrhage due to intractable thrombocytopenia. AD-EDA-ID patients can present with mild ectodermal dysplasia and non-infectious inflammation, rather than with recurrent infections. Also, hematopoietic stem cell transplantation for AD-EDA-ID is still a clinical challenge.

  6. Isotopic discrimination of stable isotopes of nitrogen (δ15N) and carbon (δ13C) in a host-specific holocephalan tapeworm.

    PubMed

    Navarro, J; Albo-Puigserver, M; Coll, M; Saez, R; Forero, M G; Kutcha, R

    2014-09-01

    During the past decade, parasites have been considered important components of their ecosystems since they can modify food-web structures and functioning. One constraint to the inclusion of parasites in food-web models is the scarcity of available information on their feeding habits and host-parasite relationships. The stable isotope approach is suggested as a useful methodology to determine the trophic position and feeding habits of parasites. However, the isotopic approach is limited by the lack of information on the isotopic discrimination (ID) values of parasites, which is pivotal to avoiding the biased interpretation of isotopic results. In the present study we aimed to provide the first ID values of δ(15)N and δ(13)C between the gyrocotylidean tapeworm Gyrocotyle urna and its definitive host, the holocephalan Chimaera monstrosa. We also test the effect of host body size (body length and body mass) and sex of the host on the ID values. Finally, we illustrate how the trophic relationships of the fish host C. monstrosa and the tapeworm G. urna could vary relative to ID values. Similar to other studies with parasites, the ID values of the parasite-host system were negative for both isotopic values of N (Δδ(15)N = - 3.33 ± 0.63‰) and C (Δδ(13)C = - 1.32 ± 0.65‰), independent of the sex and size of the host. By comparing the specific ID obtained here with ID from other studies, we illustrate the importance of using specific ID in parasite-host systems to avoid potential errors in the interpretation of the results when surrogate values from similar systems or organisms are used.

  7. Identification of clinical yeasts by Vitek MS system compared with API ID 32 C.

    PubMed

    Durán-Valle, M Teresa; Sanz-Rodríguez, Nuria; Muñoz-Paraíso, Carmen; Almagro-Moltó, María; Gómez-Garcés, José Luis

    2014-05-01

    We performed a clinical evaluation of the Vitek MS matrix-assisted laser desorption ionization-time-of-flight mass spectrometry (MALDI-TOF MS) system with the commercial database version 2.0 for rapid identification of medically important yeasts as compared with the conventional phenotypic method API ID 32 C. We tested 161 clinical isolates, nine isolates from culture collections and five reference strains. In case of discrepant results or no identification with one or both methods, molecular identification techniques were employed. Concordance between both methods was observed with 160/175 isolates (91.42%) and misidentifications by both systems occurred only when taxa were not included in the respective databases, i.e., one isolate of Candida etchellsii was identified as C. globosa by Vitek MS and two isolates of C. orthopsilosis were identified as C. parapsilosis by API ID 32 C. Vitek MS could not identify nine strains (5.14%) and API ID 32 C did not identify 13 (7.42%). Vitek MS was more reliable than API ID 32 C and reduced the time required for the identification of clinical isolates to only a few minutes.

  8. Proactive monitoring of a wind turbine array with lidar measurements, SCADA data and a data-driven RANS solver

    NASA Astrophysics Data System (ADS)

    Iungo, G.; Said, E. A.; Santhanagopalan, V.; Zhan, L.

    2016-12-01

    Power production of a wind farm and durability of wind turbines are strongly dependent on non-linear wake interactions occurring within a turbine array. Wake dynamics are highly affected by the specific site conditions, such as topography and local atmospheric conditions. Furthermore, contingencies through the life of a wind farm, such as turbine ageing and off-design operations, make prediction of wake interactions and power performance a great challenge in wind energy. In this work, operations of an onshore wind turbine array were monitored through lidar measurements, SCADA and met-tower data. The atmospheric wind field investing the wind farm was estimated by using synergistically the available data through five different methods, which are characterized by different confidence levels. By combining SCADA data and the lidar measurements, it was possible to estimate power losses connected with wake interactions. For this specific array, power losses were estimated to be 4% and 2% of the total power production for stable and convective atmospheric regimes, respectively. The entire dataset was then leveraged for the calibration of a data-driven RANS (DDRANS) solver for prediction of wind turbine wakes and power production. The DDRANS is based on a parabolic formulation of the Navier-Stokes equations with axisymmetry and boundary layer approximations, which allow achieving very low computational costs. Accuracy in prediction of wind turbine wakes and power production is achieved through an optimal tuning of the turbulence closure model. The latter is based on a mixing length model, which was developed based on previous wind turbine wake studies carried out through large eddy simulations and wind tunnel experiments. Several operative conditions of the wind farm under examination were reproduced through DDRANS for different stability regimes, wind directions and wind velocity. The results show that DDRANS is capable of achieving a good level of accuracy in prediction of power production and wake velocity field associated with the turbine array.

  9. Lifetime inbreeding depression, purging, and mating system evolution in a simultaneous hermaphrodite tapeworm.

    PubMed

    Benesh, Daniel P; Weinreich, Friederike; Kalbe, Martin; Milinski, Manfred

    2014-06-01

    Classical theory on mating system evolution suggests that simultaneous hermaphrodites should either outcross if they have high inbreeding depression (ID) or self-fertilize if they have low ID. However, a mixture of selfing and outcrossing persists in many species. Previous studies with the tapeworm Schistocephalus solidus have found worms to self-fertilize some of their eggs despite ID. The probability for selfing to spread depends on the relative fitness of selfers, as well as the genetic basis for ID and whether it can be effectively purged. We bred S. solidus through two consecutive generations of selfing and recorded several fitness correlates over the whole life cycle. After one round of selfing, ID was pronounced, particularly in early-life traits, and the conservatively estimated lifetime fitness of selfed progeny was only 9% that of the outcrossed controls. After a second generation of selfing, ID remained high but was significantly reduced in several traits, which is consistent with the purging of deleterious recessive alleles (the estimated load of lethal equivalents dropped by 48%). Severe ID, even if it can be rapidly purged, likely prevents transitions toward pure selfing in this parasite, although we also cannot exclude the possibility that low-level selfing has undetected benefits. © 2014 The Author(s). Evolution © 2014 The Society for the Study of Evolution.

  10. Internal validation of the RapidHIT® ID system.

    PubMed

    Wiley, Rachel; Sage, Kelly; LaRue, Bobby; Budowle, Bruce

    2017-11-01

    Traditionally, forensic DNA analysis has required highly skilled forensic geneticists in a dedicated laboratory to generate short tandem repeat (STR) profiles. STR profiles are routinely used either to associate or exclude potential donors of forensic biological evidence. The typing of forensic reference samples has become more demanding, especially with the requirement in some jurisdictions to DNA profile arrestees. The Rapid DNA (RDNA) platform, the RapidHIT ® ID (IntegenX ® , Pleasanton, CA), is a fully automated system capable of processing reference samples in approximately 90min with minimal human intervention. Thus, the RapidHIT ID instrument can be deployed to non-laboratory environments (e.g., booking stations) and run by trained atypical personnel such as law enforcement. In order to implement the RapidHIT ID platform, validation studies are needed to define the performance and limitations of the system. Internal validation studies were undertaken with four early-production RapidHIT ID units. Reliable and concordant STR profiles were obtained from reference buccal swabs. Throughout the study, no contamination was observed. The overall first-pass success rate with an "expert-like system" was 72%, which is comparable to another current RDNA platform commercially available. The system's second-pass success rate (involving manual interpretation on first-pass inconclusive results) increased to 90%. Inhibitors (i.e., coffee, smoking tobacco, and chewing tobacco) did not appear to affect typing by the instrument system; however, substrate (i.e., swab type) did impact typing success. Additionally, one desirable feature not available with other Rapid systems is that in the event of a system failed run, a swab can be recovered and subsequently re-analyzed in a new sample cartridge. Therefore, rarely should additional sampling or swab consumption be necessary. The RapidHIT ID system is a robust and reliable tool capable of generating complete STR profiles within the forensic DNA typing laboratory or with proper training in decentralized environments by non-laboratory personnel. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. A software-based sensor for combined sewer overflows.

    PubMed

    Leonhardt, G; Fach, S; Engelhard, C; Kinzel, H; Rauch, W

    2012-01-01

    A new methodology for online estimation of excess flow from combined sewer overflow (CSO) structures based on simulation models is presented. If sufficient flow and water level data from the sewer system is available, no rainfall data are needed to run the model. An inverse rainfall-runoff model was developed to simulate net rainfall based on flow and water level data. Excess flow at all CSO structures in a catchment can then be simulated with a rainfall-runoff model. The method is applied to a case study and results show that the inverse rainfall-runoff model can be used instead of missing rain gauges. Online operation is ensured by software providing an interface to the SCADA-system of the operator and controlling the model. A water quality model could be included to simulate also pollutant concentrations in the excess flow.

  12. The ALICE-HMPID Detector Control System: Its evolution towards an expert and adaptive system

    NASA Astrophysics Data System (ADS)

    De Cataldo, G.; Franco, A.; Pastore, C.; Sgura, I.; Volpe, G.

    2011-05-01

    The High Momentum Particle IDentification (HMPID) detector is a proximity focusing Ring Imaging Cherenkov (RICH) for charged hadron identification. The HMPID is based on liquid C 6F 14 as the radiator medium and on a 10 m 2 CsI coated, pad segmented photocathode of MWPCs for UV Cherenkov photon detection. To ensure full remote control, the HMPID is equipped with a detector control system (DCS) responding to industrial standards for robustness and reliability. It has been implemented using PVSS as Slow Control And Data Acquisition (SCADA) environment, Programmable Logic Controller as control devices and Finite State Machines for modular and automatic command execution. In the perspective of reducing human presence at the experiment site, this paper focuses on DCS evolution towards an expert and adaptive control system, providing, respectively, automatic error recovery and stable detector performance. HAL9000, the first prototype of the HMPID expert system, is then presented. Finally an analysis of the possible application of the adaptive features is provided.

  13. Results of DATAS Investigation of Illegal Mode S ID's at JFK Airport

    DOT National Transportation Integrated Search

    1992-12-01

    This report documents the second deployment of the Data Link Test and Analysis : System (DATAS) as a Traffic Alert and Collision System (TCAS) monitor. The : purpose was to identify aircraft which were reporting Illegal Mode Select : (Mode S) ID's. T...

  14. A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Sainani, Varsha

    The increasing number of network security related incidents have made it necessary for the organizations to actively protect their sensitive data with network intrusion detection systems (IDSs). IDSs are expected to analyze a large volume of data while not placing a significantly added load on the monitoring systems and networks. This requires good data mining strategies which take less time and give accurate results. In this study, a novel data mining assisted multiagent-based intrusion detection system (DMAS-IDS) is proposed, particularly with the support of multiclass supervised classification. These agents can detect and take predefined actions against malicious activities, and data mining techniques can help detect them. Our proposed DMAS-IDS shows superior performance compared to central sniffing IDS techniques, and saves network resources compared to other distributed IDS with mobile agents that activate too many sniffers causing bottlenecks in the network. This is one of the major motivations to use a distributed model based on multiagent platform along with a supervised classification technique.

  15. 78 FR 72676 - Draft National Pollutant Discharge Elimination System (NPDES) General Permit for Stormwater...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-03

    .... Email: [email protected] , Attention Docket ID No. EPA- HQ-OW-2012-0803. Fax: (202) 566-9744 Mail: Water Docket, Environmental Protection Agency, Mailcode: 28221T, Attention Docket ID No. EPA-HQ-OW-2012..., Room 3334, 1301 Constitution Avenue NW., Washington, DC, Attention Docket ID No. EPA-HQ-OW-2012-0803...

  16. Safety and immunogenicity of a quadrivalent intradermal influenza vaccine in adults.

    PubMed

    Gorse, Geoffrey J; Falsey, Ann R; Ozol-Godfrey, Ayca; Landolfi, Victoria; Tsang, Peter H

    2015-02-25

    An intradermal (ID) trivalent split-virion influenza vaccine (IIV3-ID) (Fluzone(®) Intradermal, Sanofi Pasteur, Swiftwater, PA) has been available in the US since the 2011/2012 influenza season for adults aged 18-64 years. This study examined whether adding a second B-lineage strain affects immunogenicity and safety. This randomized, double-blind, multicentre trial evaluated the immunogenicity and safety of an intradermal quadrivalent split-virion influenza vaccine (IIV4-ID) in adults 18-64 years of age in the US during the 2012-2013 influenza season. Participants were randomized 2:1:1 to receive a single injection of IIV4-ID, licensed IIV3-ID, or an investigational IIV3-ID containing the alternate B-lineage strain. Haemagglutination inhibition antibody titres were assessed in two-thirds of participants before vaccination and 28 days after vaccination. 1672 participants were vaccinated with IIV4-ID, 837 with licensed IIV3-ID, and 846 with an investigational IIV3-ID. For all four vaccine strains, antibody responses to IIV4-ID were statistically non-inferior to the response to the IIV3-ID vaccines containing the matched strains. For both B strains, post-vaccination antibody responses to IIV4-ID were statistically superior to the responses to IIV3-ID lacking the corresponding B strain. Adverse events were similar for IIV4-ID and IIV3-ID. The most commonly reported solicited reactions were pain, pruritus, myalgia, headache, and malaise; and most were grade 1 or 2 and appeared and resolved within 3 days of vaccination. IIV4-ID was statistically non-inferior to the two pooled IIV3-ID vaccines for the proportions of participants with at least one grade 2 or 3 systemic reaction. Antibody responses to the IIV4-ID were non-inferior to IIV3-ID for the A and matched B strains and superior for the unmatched B strains. IIV4-ID was well tolerated without any safety concerns. IIV4-ID may help address an unmet need due to mismatched B strains in previous influenza vaccines. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Combined Cycle Engine Large-Scale Inlet for Mode Transition Experiments: System Identification Rack Hardware Design

    NASA Technical Reports Server (NTRS)

    Thomas, Randy; Stueber, Thomas J.

    2013-01-01

    The System Identification (SysID) Rack is a real-time hardware-in-the-loop data acquisition (DAQ) and control instrument rack that was designed and built to support inlet testing in the NASA Glenn Research Center 10- by 10-Foot Supersonic Wind Tunnel. This instrument rack is used to support experiments on the Combined-Cycle Engine Large-Scale Inlet for Mode Transition Experiment (CCE? LIMX). The CCE?LIMX is a testbed for an integrated dual flow-path inlet configuration with the two flow paths in an over-and-under arrangement such that the high-speed flow path is located below the lowspeed flow path. The CCE?LIMX includes multiple actuators that are designed to redirect airflow from one flow path to the other; this action is referred to as "inlet mode transition." Multiple phases of experiments have been planned to support research that investigates inlet mode transition: inlet characterization (Phase-1) and system identification (Phase-2). The SysID Rack hardware design met the following requirements to support Phase-1 and Phase-2 experiments: safely and effectively move multiple actuators individually or synchronously; sample and save effector control and position sensor feedback signals; automate control of actuator positioning based on a mode transition schedule; sample and save pressure sensor signals; and perform DAQ and control processes operating at 2.5 KHz. This document describes the hardware components used to build the SysID Rack including their function, specifications, and system interface. Furthermore, provided in this document are a SysID Rack effectors signal list (signal flow); system identification experiment setup; illustrations indicating a typical SysID Rack experiment; and a SysID Rack performance overview for Phase-1 and Phase-2 experiments. The SysID Rack described in this document was a useful tool to meet the project objectives.

  18. Training on intellectual disability in health sciences: the European perspective.

    PubMed

    Salvador-Carulla, Luis; Martínez-Leal, Rafael; Heyler, Carla; Alvarez-Galvez, Javier; Veenstra, Marja Y; García-Ibáñez, Jose; Carpenter, Sylvia; Bertelli, Marco; Munir, Kerim; Torr, Jennifer; Van Schrojenstein Lantman-de Valk, Henny M J

    2015-01-01

    Intellectual disability (ID) has consequences at all stages of life, requires high service provision and leads to high health and societal costs. However, ID is largely disregarded as a health issue by national and international organisations, as are training in ID and in the health aspects of ID at every level of the education system. This paper aims to (1) update the current information about availability of training and education in ID and related health issues in Europe with a particular focus in mental health; and (2) to identify opportunities arising from the initial process of educational harmonization in Europe to include ID contents in health sciences curricula and professional training. We carried out a systematic search of scientific databases and websites, as well as policy and research reports from the European Commission, European Council and WHO. Furthermore, we contacted key international organisations related to health education and/or ID in Europe, as well as other regional institutions. ID modules and contents are minimal in the revised health sciences curricula and publications on ID training in Europe are equally scarce. European countries report few undergraduate and graduate training modules in ID, even in key specialties such as paediatrics. Within the health sector, ID programmes focus mainly on psychiatry and psychology. The poor availability of ID training in health sciences is a matter of concern. However, the current European policy on training provides an opportunity to promote ID in the curricula of programmes at all levels. This strategy should address all professionals working in ID and it should increase the focus on ID relative to other developmental disorders at all stages of life.

  19. Training on intellectual disability in health sciences: the European perspective

    PubMed Central

    Salvador-Carulla, Luis; Martínez-Leal, Rafael; Heyler, Carla; Alvarez-Galvez, Javier; Veenstra, Marja Y.; García-Ibáñez, Jose; Carpenter, Sylvia; Bertelli, Marco; Munir, Kerim; Torr, Jennifer; Van Schrojenstein Lantman-de Valk, Henny M. J.

    2015-01-01

    Background Intellectual disability (ID) has consequences at all stages of life, requires high service provision and leads to high health and societal costs. However, ID is largely disregarded as a health issue by national and international organisations, as are training in ID and in the health aspects of ID at every level of the education system. Specific aim This paper aims to (1) update the current information about availability of training and education in ID and related health issues in Europe with a particular focus in mental health; and (2) to identify opportunities arising from the initial process of educational harmonization in Europe to include ID contents in health sciences curricula and professional training. Method We carried out a systematic search of scientific databases and websites, as well as policy and research reports from the European Commission, European Council and WHO. Furthermore, we contacted key international organisations related to health education and/or ID in Europe, as well as other regional institutions. Results ID modules and contents are minimal in the revised health sciences curricula and publications on ID training in Europe are equally scarce. European countries report few undergraduate and graduate training modules in ID, even in key specialties such as paediatrics. Within the health sector, ID programmes focus mainly on psychiatry and psychology. Conclusion The poor availability of ID training in health sciences is a matter of concern. However, the current European policy on training provides an opportunity to promote ID in the curricula of programmes at all levels. This strategy should address all professionals working in ID and it should increase the focus on ID relative to other developmental disorders at all stages of life. PMID:25705375

  20. Multiprocessor system with multiple concurrent modes of execution

    DOEpatents

    Ahn, Daniel; Ceze, Luis H; Chen, Dong; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin

    2013-12-31

    A multiprocessor system supports multiple concurrent modes of speculative execution. Speculation identification numbers (IDs) are allocated to speculative threads from a pool of available numbers. The pool is divided into domains, with each domain being assigned to a mode of speculation. Modes of speculation include TM, TLS, and rollback. Allocation of the IDs is carried out with respect to a central state table and using hardware pointers. The IDs are used for writing different versions of speculative results in different ways of a set in a cache memory.

  1. Multiprocessor system with multiple concurrent modes of execution

    DOEpatents

    Ahn, Daniel; Ceze, Luis H.; Chen, Dong Chen; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin

    2016-11-22

    A multiprocessor system supports multiple concurrent modes of speculative execution. Speculation identification numbers (IDs) are allocated to speculative threads from a pool of available numbers. The pool is divided into domains, with each domain being assigned to a mode of speculation. Modes of speculation include TM, TLS, and rollback. Allocation of the IDs is carried out with respect to a central state table and using hardware pointers. The IDs are used for writing different versions of speculative results in different ways of a set in a cache memory.

  2. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems

    PubMed Central

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy. PMID:26161437

  3. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems.

    PubMed

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy.

  4. OpenID Connect as a security service in cloud-based medical imaging systems

    PubMed Central

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-01-01

    Abstract. The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as “Kerberos of cloud.” We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model. PMID:27340682

  5. Collegiate Cyber Defense Competition Effort

    DTIC Science & Technology

    2018-03-01

    Energy – an electrical utility company. • 2016 : ODIN Security – a small aerospace and defense contracting firm Approved for Public Release...to secure supervisory control and data acquisition (SCADA) networks. Approved for Public Release; Distribution Unlimited 7 During the 2016 NCCDC...COLLEGIATE CYBER DEFENSE COMPETITION EFFORT UNIVERSITY OF TEXAS AT SAN ANTONIO MARCH 2018 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  6. DD genotype of ACE gene I/D polymorphism is associated with Behcet disease in a Turkish population.

    PubMed

    Yigit, Serbülent; Tural, Sengül; Rüstemoglu, Aydin; Inanir, Ahmet; Gul, Ulker; Kalkan, Goknur; Akkanet, Songul; Karakuş, Nevin; Ateş, Omer

    2013-01-01

    Behcet's disease (BD) is a chronic, multi-systemic and inflammatory disorder. The local renin-angiotensin system (RAS) in the vessel wall plays a role in the endothelial control and contributes to inflammatory processes. Angiotensin-converting enzyme (ACE) is the regulatory component of the RAS. This study was conducted in Turkish patients with BD to determine the frequency of I/D polymorphism genotypes of ACE gene. Genomic DNA obtained from 566 persons (266 patients with BD and 300 healthy controls). ACE gene I/D polymorphism genotypes were determined using polymerase chain reaction using I and D allele-specific primers. There was statistically significant difference between the groups with respect to genotype distribution (p < 0.001). This study is the largest study in Turkish population that ACE gene I/D polymorphism investigated in BD. As a result of this study, ACE gene I/D polymorphism DD genotype could be a genetic marker in BD in Turkish study population.

  7. Earth observing system. Output data products and input requirements, version 2.0. Volume 2: Analysis of IDS input requirements

    NASA Technical Reports Server (NTRS)

    Lu, Yun-Chi; Chang, Hyo Duck; Krupp, Brian; Kumar, Ravindra; Swaroop, Anand

    1992-01-01

    On 18 Jan. 1991, NASA confirmed 29 Inter-Disciplinary Science (IDS) teams, each involving a group of investigators, to conduct interdisciplinary research using data products from Earth Observing System (EOS) instruments. These studies are multi-disciplinary and require output data products from multiple EOS instruments, including both FI and PI instruments. The purpose of this volume is to provide information on output products expected from IDS investigators, required input data, and retrieval algorithms. Also included in this volume is the revised analysis of the 'best' and 'alternative' match data products for IDS input requirements. The original analysis presented in the August 1991 release of the SPSO Report was revised to incorporate the restructuring of the EOS platform. As a result of the reduced EOS payload, some of EOS instruments were deselected and their data products would not be available for IDS research. Information on these data products is also presented.

  8. Innovation on Energy Power Technology (22)Challenge to Development of Expert System stored Knowledge of Expert Power Network Operators

    NASA Astrophysics Data System (ADS)

    Sakaguchi, Hideharu

    Do you remember an expert system? I think there are various impressions about the system. For example, some might say “It reminds me of old days”. On the other hand, some might say “It was really troublesome”. About 25 years ago, from late 1980s to the middle of 1990s, when the Showa era was about to change into the Heisei Era, artificial intelligence boomed. Research and development for an expert system which was equipped with expertise and worked as smart as expert, was advanced in various fields. Our company also picked up the system as the new system which covered weak point of conventional computer technology. We started research and development in 1984, and installed an expert system in a SCADA system, which started operating in March 1990 in the Fukuoka Integrated Control Center. In this essay, as an electric power engineer who involved in development at that time, I introduce the situation and travail story about developing an expert system which support restorative actions from the outage and overload condition of power networks.

  9. 17 CFR 239.63 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... for access codes to file on EDGAR. 239.63 Section 239.63 Commodity and Securities Exchanges SECURITIES... Statements § 239.63 Form ID, uniform application for access codes to file on EDGAR. Form ID must be filed by... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification...

  10. 17 CFR 239.63 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... for access codes to file on EDGAR. 239.63 Section 239.63 Commodity and Securities Exchanges SECURITIES... Statements § 239.63 Form ID, uniform application for access codes to file on EDGAR. Form ID must be filed by... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification...

  11. Anonymous or identity-registered sperm donors? A study of Dutch recipients' choices.

    PubMed

    Brewaeys, A; de Bruyn, J K; Louwe, L A; Helmerhorst, F M

    2005-03-01

    The aim of the present study was to gain insight into parents' own donor preferences within a system offering the choice between an anonymous and identity-registered donor. A comparison was made between recipients choosing for an anonymous donor (AD choosers) and those choosing for an identifiable donor (ID choosers) with regard to their sexual orientation, demographic characteristics, disclosure issues and infertility distress. Data from 105 couples (61% heterosexual, 39% lesbian) were registered on a standardized form during implication counselling sessions previous to treatment. Sixty-three per cent of the heterosexual couples and 98% of the lesbian couples had chosen an ID donor. Major differences between ID and AD choosers were identified. Among the ID choosers secrecy towards the child was no option, whereas 83% of the AD choosers did not intend to inform their child. Compared with heterosexual ID choosers, AD choosers were more distressed about their infertility and had a lower educational level. Legislation imposing ID donors appears to be acceptable for the majority of this study population. For a vulnerable group of heterosexual couples, who remained secretive about the use of a donor, adaptation to the new system is not self-evident.

  12. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    NASA Astrophysics Data System (ADS)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  13. Instructional Design and the Authoring of Multimedia and Hypermedia Systems: Does a Marriage Make Sense?

    ERIC Educational Resources Information Center

    Gros, Begona; And Others

    1997-01-01

    Examines the relationship between instructional design (ID) and courseware development, especially for multimedia and hypermedia systems. Discusses ID models; external and internal reasons for the neglect of models; characteristics of models suitable for multimedia and hypermedia development; and models integrating those characteristics: Guided…

  14. 78 FR 35609 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-13

    ... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2013-0018] Privacy Act of 1974; System... 10, 2013. Aaron Siegel, Alternate OSD Federal Register Liaison Officer, Department of Defense. N06110... of Social Security Number (SSN), Department of Defense Identification Number (DoD ID Number), Unit...

  15. A New Module in Neural Differentiation Control: Two MicroRNAs Upregulated by Retinoic Acid, miR-9 and -103, Target the Differentiation Inhibitor ID2

    PubMed Central

    Savino, Mauro; Laneve, Pietro; Caffarelli, Elisa; Nasi, Sergio

    2012-01-01

    The transcription factor ID2 is an important repressor of neural differentiation strongly implicated in nervous system cancers. MicroRNAs (miRNAs) are increasingly involved in differentiation control and cancer development. Here we show that two miRNAs upregulated on differentiation of neuroblastoma cells – miR-9 and miR-103 – restrain ID2 expression by directly targeting the coding sequence and 3′ untranslated region of the ID2 encoding messenger RNA, respectively. Notably, the two miRNAs show an inverse correlation with ID2 during neuroblastoma cell differentiation induced by retinoic acid. Overexpression of miR-9 and miR-103 in neuroblastoma cells reduces proliferation and promotes differentiation, as it was shown to occur upon ID2 inhibition. Conversely, an ID2 mutant that cannot be targeted by either miRNA prevents retinoic acid-induced differentiation more efficient than wild-type ID2. These findings reveal a new regulatory module involving two microRNAs upregulated during neural differentiation that directly target expression of the key differentiation inhibitor ID2, suggesting that its alteration may be involved in neural cancer development. PMID:22848373

  16. A new module in neural differentiation control: two microRNAs upregulated by retinoic acid, miR-9 and -103, target the differentiation inhibitor ID2.

    PubMed

    Annibali, Daniela; Gioia, Ubaldo; Savino, Mauro; Laneve, Pietro; Caffarelli, Elisa; Nasi, Sergio

    2012-01-01

    The transcription factor ID2 is an important repressor of neural differentiation strongly implicated in nervous system cancers. MicroRNAs (miRNAs) are increasingly involved in differentiation control and cancer development. Here we show that two miRNAs upregulated on differentiation of neuroblastoma cells--miR-9 and miR-103--restrain ID2 expression by directly targeting the coding sequence and 3' untranslated region of the ID2 encoding messenger RNA, respectively. Notably, the two miRNAs show an inverse correlation with ID2 during neuroblastoma cell differentiation induced by retinoic acid. Overexpression of miR-9 and miR-103 in neuroblastoma cells reduces proliferation and promotes differentiation, as it was shown to occur upon ID2 inhibition. Conversely, an ID2 mutant that cannot be targeted by either miRNA prevents retinoic acid-induced differentiation more efficient than wild-type ID2. These findings reveal a new regulatory module involving two microRNAs upregulated during neural differentiation that directly target expression of the key differentiation inhibitor ID2, suggesting that its alteration may be involved in neural cancer development.

  17. Design and Implementation of a Prototype Microcomputer Database Management System for the Standardization of Data Elements for the Department of Defense

    DTIC Science & Technology

    1990-09-01

    Justification Cat: Left Timeliness Identifier: Qwe (FI] Domain I Def Text: -Press [F3 to nove in/out of the fields below. Use ARROW keys to scroll- Rec: Host...Delete a record Elemont Creator ID: Justification Cat: Left Timeliness Identifier: Qwe [FI) Domain Def Text: - Press (F3) to move in/out of the...Number: 1 Alias Name: Accounting Code Data Value Type ID: QL Max Length Characters: 34 Timeliness ID: Qwe Justification Category: Left Creator ID: Domain

  18. Emerging Microtechnologies and Automated Systems for Rapid Bacterial Identification and Antibiotic Susceptibility Testing

    PubMed Central

    Li, Yiyan; Yang, Xing; Zhao, Weian

    2018-01-01

    Rapid bacterial identification (ID) and antibiotic susceptibility testing (AST) are in great demand due to the rise of drug-resistant bacteria. Conventional culture-based AST methods suffer from a long turnaround time. By necessity, physicians often have to treat patients empirically with antibiotics, which has led to an inappropriate use of antibiotics, an elevated mortality rate and healthcare costs, and antibiotic resistance. Recent advances in miniaturization and automation provide promising solutions for rapid bacterial ID/AST profiling, which will potentially make a significant impact in the clinical management of infectious diseases and antibiotic stewardship in the coming years. In this review, we summarize and analyze representative emerging micro- and nanotechnologies, as well as automated systems for bacterial ID/AST, including both phenotypic (e.g., microfluidic-based bacterial culture, and digital imaging of single cells) and molecular (e.g., multiplex PCR, hybridization probes, nanoparticles, synthetic biology tools, mass spectrometry, and sequencing technologies) methods. We also discuss representative point-of-care (POC) systems that integrate sample processing, fluid handling, and detection for rapid bacterial ID/AST. Finally, we highlight major remaining challenges and discuss potential future endeavors toward improving clinical outcomes with rapid bacterial ID/AST technologies. PMID:28850804

  19. Emerging Microtechnologies and Automated Systems for Rapid Bacterial Identification and Antibiotic Susceptibility Testing.

    PubMed

    Li, Yiyan; Yang, Xing; Zhao, Weian

    2017-12-01

    Rapid bacterial identification (ID) and antibiotic susceptibility testing (AST) are in great demand due to the rise of drug-resistant bacteria. Conventional culture-based AST methods suffer from a long turnaround time. By necessity, physicians often have to treat patients empirically with antibiotics, which has led to an inappropriate use of antibiotics, an elevated mortality rate and healthcare costs, and antibiotic resistance. Recent advances in miniaturization and automation provide promising solutions for rapid bacterial ID/AST profiling, which will potentially make a significant impact in the clinical management of infectious diseases and antibiotic stewardship in the coming years. In this review, we summarize and analyze representative emerging micro- and nanotechnologies, as well as automated systems for bacterial ID/AST, including both phenotypic (e.g., microfluidic-based bacterial culture, and digital imaging of single cells) and molecular (e.g., multiplex PCR, hybridization probes, nanoparticles, synthetic biology tools, mass spectrometry, and sequencing technologies) methods. We also discuss representative point-of-care (POC) systems that integrate sample processing, fluid handling, and detection for rapid bacterial ID/AST. Finally, we highlight major remaining challenges and discuss potential future endeavors toward improving clinical outcomes with rapid bacterial ID/AST technologies.

  20. Characterizing and Improving Distributed Intrusion Detection Systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizingmore » and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.« less

  1. Regulation of Id2 expression in EL4 T lymphoma cells overexpressing growth hormone.

    PubMed

    Weigent, Douglas A

    2009-01-01

    In previous studies, we have shown that overexpression of growth hormone (GH) in cells of the immune system upregulates proteins involved in cell growth and protects from apoptosis. Here, we report that overexpression of GH in EL4 T lymphoma cells (GHo) also significantly increased levels of the inhibitor of differentiation-2 (Id2). The increase in Id2 was suggested in both Id2 promoter luciferase assays and by Western analysis for Id2 protein. To identify the regulatory elements that mediate transcriptional activation by GH in the Id2 promoter, promoter deletion analysis was performed. Deletion analysis revealed that transactivation involved a 301-132bp region upstream to the Id2 transcriptional start site. The pattern in the human GHo Jurkat T lymphoma cell line paralleled that found in the mouse GHo EL4 T lymphoma cell line. Significantly less Id2 was detected in the nucleus of GHo EL4 T lymphoma cells compared to vector alone controls. Although serum increased the levels of Id2 in control vector alone cells, no difference was found in the total levels of Id2 in GHo EL4 T lymphoma cells treated with or without serum. The increase in Id2 expression in GHo EL4 T lymphoma cells measured by Id2 promoter luciferase expression and Western blot analysis was blocked by the overexpression of a dominant-negative mutant of STAT5. The results suggest that in EL4 T lymphoma cells overexpressing GH, there is an upregulation of Id2 protein that appears to involve STAT protein activity.

  2. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  3. Managing operational documentation in the ALICE Detector Control System

    NASA Astrophysics Data System (ADS)

    Lechman, M.; Augustinus, A.; Bond, P.; Chochula, P.; Kurepin, A.; Pinazza, O.; Rosinsky, P.

    2012-12-01

    ALICE (A Large Ion Collider Experiment) is one of the big LHC (Large Hadron Collider) experiments at CERN in Geneve, Switzerland. The experiment is composed of 18 sub-detectors controlled by an integrated Detector Control System (DCS) that is implemented using the commercial SCADA package PVSSII. The DCS includes over 1200 network devices, over 1,000,000 monitored parameters and numerous custom made software components that are prepared by over 100 developers from all around the world. This complex system is controlled by a single operator via a central user interface. One of his/her main tasks is the recovery of anomalies and errors that may occur during operation. Therefore, clear, complete and easily accessible documentation is essential to guide the shifter through the expert interfaces of different subsystems. This paper describes the idea of the management of the operational documentation in ALICE using a generic repository that is built on a relational database and is integrated with the control system. The experience gained and the conclusions drawn from the project are also presented.

  4. A Novel Degradation Identification Method for Wind Turbine Pitch System

    NASA Astrophysics Data System (ADS)

    Guo, Hui-Dong

    2018-04-01

    It’s difficult for traditional threshold value method to identify degradation of operating equipment accurately. An novel degradation evaluation method suitable for wind turbine condition maintenance strategy implementation was proposed in this paper. Based on the analysis of typical variable-speed pitch-to-feather control principle and monitoring parameters for pitch system, a multi input multi output (MIMO) regression model was applied to pitch system, where wind speed, power generation regarding as input parameters, wheel rotation speed, pitch angle and motor driving currency for three blades as output parameters. Then, the difference between the on-line measurement and the calculated value from the MIMO regression model applying least square support vector machines (LSSVM) method was defined as the Observed Vector of the system. The Gaussian mixture model (GMM) was applied to fitting the distribution of the multi dimension Observed Vectors. Applying the model established, the Degradation Index was calculated using the SCADA data of a wind turbine damaged its pitch bearing retainer and rolling body, which illustrated the feasibility of the provided method.

  5. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    PubMed Central

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  6. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  7. Modeling of wastewater treatment system of car parks from petroleum products

    NASA Astrophysics Data System (ADS)

    Savdur, S. N.; Stepanova, Yu V.; Kodolova, I. A.; Fesina, E. L.

    2018-05-01

    The paper discusses the technological complex of wastewater treatment of car parks from petroleum products. Based on the review of the main modeling methods of discrete-continuous chemical and engineering processes, it substantiates expediency of using the theory of Petri nets (PN) for modeling the process of wastewater treatment of car parks from petroleum products. It is proposed to use a modification of Petri nets which is focused on modeling and analysis of discrete-continuous chemical and engineering processes by prioritizing transitions, timing marks in positions and transitions. A model in the form of modified Petri nets (MPN) is designed. A software package to control the process for wastewater treatment is designed by means of SCADA TRACE MODE.

  8. Integrated health systems.

    PubMed

    Shortell, Stephen M; McCurdy, Rodney K

    2010-01-01

    Before meaningful gains in improving the value of health care in the US can be achieved, the fragmented nature in which health care is financed and delivered must be addressed. One type of healthcare organization, the Integrated Delivery System (IDS), is poised to play a pivotal role in reform efforts. What are these systems? What is the current evidence regarding their performance? What are the current barriers to their establishment and how can these barriers be removed? This chapter addresses these important questions. Although there are many types of IDS' in the US healthcare landscape, the chapter begins by identifying the necessary healthcare components that encompass an IDS and discusses the levels of integration that are important to improving health care quality and value. Next, it explores the recent evidence regarding IDS performance which, while generally positive, is less than what it could be if there were greater focus on clinical integration. To highlight, the chapter discusses the efficacy of system engineering initiatives in two examples of large, fully integrated systems: Kaiser-Permanente and the Veterans Health Administration. The evidence here is strong that the impact of system engineering methods is enhanced through the integration of processes, goals and outcomes. Reforms necessary to encourage the development of IDS' include: 1) the development of payment mechanisms designed to increase greater inter-dependency of hospitals and physicians; 2) the modification or removal of several regulatory barriers to greater clinical integration; and 3) the establishment of a more robust data collection and reporting system to increase transparency and accountability. The chapter concludes with a framework for considering these reforms across strategic, structural, cultural, and technical dimensions.

  9. Id1 suppresses anti-tumour immune responses and promotes tumour progression by impairing myeloid cell maturation.

    PubMed

    Papaspyridonos, Marianna; Matei, Irina; Huang, Yujie; do Rosario Andre, Maria; Brazier-Mitouart, Helene; Waite, Janelle C; Chan, April S; Kalter, Julie; Ramos, Ilyssa; Wu, Qi; Williams, Caitlin; Wolchok, Jedd D; Chapman, Paul B; Peinado, Hector; Anandasabapathy, Niroshana; Ocean, Allyson J; Kaplan, Rosandra N; Greenfield, Jeffrey P; Bromberg, Jacqueline; Skokos, Dimitris; Lyden, David

    2015-04-29

    A central mechanism of tumour progression and metastasis involves the generation of an immunosuppressive 'macroenvironment' mediated in part through tumour-secreted factors. Here we demonstrate that upregulation of the Inhibitor of Differentiation 1 (Id1), in response to tumour-derived factors, such as TGFβ, is responsible for the switch from dendritic cell (DC) differentiation to myeloid-derived suppressor cell expansion during tumour progression. Genetic inactivation of Id1 largely corrects the myeloid imbalance, whereas Id1 overexpression in the absence of tumour-derived factors re-creates it. Id1 overexpression leads to systemic immunosuppression by downregulation of key molecules involved in DC differentiation and suppression of CD8 T-cell proliferation, thus promoting primary tumour growth and metastatic progression. Furthermore, advanced melanoma patients have increased plasma TGFβ levels and express higher levels of ID1 in myeloid peripheral blood cells. This study reveals a critical role for Id1 in suppressing the anti-tumour immune response during tumour progression and metastasis.

  10. 77 FR 23767 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... Proposed Rule Change 1. Purpose The Exchange proposes to waive the CMI and FIX Login ID fees through September 30, 2012 for CMI and FIX Login IDs used to access the Exchange's FLEX Hybrid Trading System (the... each CMI or FIX Login ID that a TPH uses to access CBOEdirect (and $1000 per month for each CMI or FLEX...

  11. Development and implementation of an expert system to improve the control of nitrification and denitrification in the Vic wastewater treatment plant.

    PubMed

    Ribas, F; Rodríguez-Roda, I; Serrat, J; Clara, P; Comas, J

    2008-05-01

    Wastewater treatment plants employ various physical, chemical and biological processes to reduce pollutants from raw wastewater. One of the most important is the biological nitrogen removal process through nitrification and denitrification steps taking place in various sections of the biological reactor. One of the most extensively used configurations to achieve the biological nitrogen removal is an activated sludge system using oxidation ditch or extended aeration. To improve nitrogen removal in the wastewater treatment plant (WWTP) of Vic (Catalonia, NE Spain), the automatic aeration control system was complemented with an Expert System to always provide the most appropriate aeration or anoxia sequence based on the values of ammonium and nitrates given by an automatic analyzer. This article illustrates the development and implementation of this knowledge-based system within the framework of a Decision Support System, which performs SCADA functions. The paper also shows that the application of the decision support system in the Vic WWTP resulted in significant improvements to the biological nitrogen removal.

  12. 78 FR 76657 - Notice of Action

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-18

    ... and PPI Handbook of Methods. DATES: The transition to the FD-ID system will occur with the release of... regular PPI release. That Web page also contains detailed methodological information for the FD-ID...

  13. Education creates comfort and challenges stigma towards children with intellectual disabilities.

    PubMed

    Breau, Lynn M; Aston, Megan; MacLeod, Emily

    2018-03-01

    Children with intellectual disabilities (IDs) are frequent users of the healthcare system, yet nurses report they receive little education regarding specialized medical, social and relational needs of this population. Therefore, parents take on a greater burden of care while their child is in hospital than do parents of typically developing children. This article reports findings from a qualitative study that used feminist poststructuralism to examine the hospital experiences of eight children with IDs, 17 mothers and 12 nurses. Nurses and mothers reported a lack of knowledge and education regarding the healthcare of children with ID and identified a need for more education. Participants noted that physical care of children with ID was prioritized as more important than communication and relationships. This unintentional prioritization was socially and institutionally constructed through stigma and stereotypes about people with IDs. Nurses and parents offered suggestions to access and increase ID education for healthcare professionals.

  14. Neural Detection of Malicious Network Activities Using a New Direct Parsing and Feature Extraction Technique

    DTIC Science & Technology

    2015-09-01

    intrusion detection systems , neural networks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF... detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of...BACKGROUND The growing threat of malicious network activities and intrusion attempts makes intrusion detection systems (IDS) a

  15. A Data Quality Filter for PMU Measurements: Description, Experience, and Examples

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Follum, James D.; Amidan, Brett G.

    Networks of phasor measurement units (PMUs) continue to grow, and along with them, the amount of data available for analysis. With so much data, it is impractical to identify and remove poor quality data manually. The data quality filter described in this paper was developed for use with the Data Integrity and Situation Awareness Tool (DISAT), which analyzes PMU data to identify anomalous system behavior. The filter operates based only on the information included in the data files, without supervisory control and data acquisition (SCADA) data, state estimator values, or system topology information. Measurements are compared to preselected thresholds tomore » determine if they are reliable. Along with the filter's description, examples of data quality issues from application of the filter to nine months of archived PMU data are provided. The paper is intended to aid the reader in recognizing and properly addressing data quality issues in PMU data.« less

  16. Reducing SCADA System Nuisance Alarms in the Water Industry in Northern Ireland.

    PubMed

    O'Donoghue, Nigel; Phillips, Debra H; Nicell, Ciaran

    2015-08-01

    The advancement of telemetry control for the water industry has increased the difficulty of managing large volumes of nuisance alarms (i.e., alarms that do not require a response). The aim of this study was to identify and reduce the number of nuisance alarms that occur for Northern Ireland (NI) Water by carrying out alarm duration analysis to determine the appropriate length of persistence (an advanced alarm management tool) that could be applied. All data were extracted from TelemWeb (NI Water's telemetry monitoring system) and analyzed in Excel. Over a 6-week period, an average of 40 000 alarms occurred per week. The alarm duration analysis, which has never been implemented before by NI Water, found that an average of 57% of NI Water alarms had a duration of <5 minutes. Applying 5-minute persistence, therefore, could prevent an average 26 816 nuisance alarms per week. Most of these alarms were from wastewater assets.

  17. Computer assisted operations in Petroleum Development Oman (PDO)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Hinai, S.H.; Mutimer, K.

    1995-10-01

    Petroleum Development Oman (PDO) currently produces some 750,000 bopd and 900,000 bwpd from some 74 fields in a large geographical area and diverse operating conditions. A key corporate objective is to reduce operating costs by exploiting productivity gains from proven technology. Automation is seen as a means of managing the rapid growth of well population and production facilities. the overall objective is to improve field management through continuous monitoring of wells and facilities and dissemination of data throughout the whole organization. A major upgrade of PDO`s field Supervisory Control and Data Acquisition (SCADA) system is complete providing a platform tomore » exploit new initiatives particularly for production optimization of artificial lift systems and automatic well testing using multi selector valves, coriolis flow meter measurements and multi component (oil, gas, water) flowmeter. The paper describes PDO`s experience including benefits and challenges which have to be managed when developing Computer Assisted Operations (CAO).« less

  18. Wake losses from averaged and time-resolved power measurements at full scale wind turbines

    NASA Astrophysics Data System (ADS)

    Castellani, Francesco; Astolfi, Davide; Mana, Matteo; Becchetti, Matteo; Segalini, Antonio

    2017-05-01

    This work deals with the experimental analysis of wake losses fluctuations at full-scale wind turbines. The test case is a wind farm sited on a moderately complex terrain: 4 turbines are installed, having 2 MW of rated power each. The sources of information are the time-resolved data, as collected from the OPC server, and the 10-minutes averaged SCADA data. The objective is to compare the statistical distributions of wake losses for far and middle wakes, as can be observed through the “fast” lens of time-resolved data, for certain selected test-case time series, and through the “slow” lens of SCADA data, on a much longer time basis that allow to set the standards of the mean wake losses along the wind farm. Further, time-resolved data are used for an insight into the spectral properties of wake fluctuations, highlighting the role of the wind turbine as low-pass filter. Summarizing, the wind rose, the layout of the site and the structure of the data sets at disposal allow to study middle and far wake behavior, with a “slow” and “fast” perspective.

  19. Electronic p-Chip-Based System for Identification of Glass Slides and Tissue Cassettes in Histopathology Laboratories.

    PubMed

    Mandecki, Wlodek; Qian, Jay; Gedzberg, Katie; Gruda, Maryanne; Rodriguez, Efrain Frank; Nesbitt, Leslie; Riben, Michael

    2018-01-01

    The tagging system is based on a small, electronic, wireless, laser-light-activated microtransponder named "p-Chip." The p-Chip is a silicon integrated circuit, the size of which is 600 μm × 600 μm × 100 μm. Each p-Chip contains a unique identification code stored within its electronic memory that can be retrieved with a custom reader. These features allow the p-Chip to be used as an unobtrusive and scarcely noticeable ID tag on glass slides and tissue cassettes. The system is comprised of p-Chip-tagged sample carriers, a dedicated benchtop p-Chip ID reader that can accommodate both objects, and an additional reader (the Wand), with an adapter for reading IDs of glass slides stored vertically in drawers. On slides, p-Chips are attached with adhesive to the center of the short edge, and on cassettes - embedded directly into the plastic. ID readout is performed by bringing the reader to the proximity of the chip. Standard histopathology laboratory protocols were used for testing. Very good ID reading efficiency was observed for both glass slides and cassettes. When processed slides are stored in vertical filing drawers, p-Chips remain readable without the need to remove them from the storage location, thereby improving the speed of searches in collections. On the cassettes, the ID continues to be readable through a thin layer of paraffin. Both slides and tissue cassettes can be read with the same reader, reducing the need for redundant equipment. The p-Chip is stable to all chemical challenges commonly used in the histopathology laboratory, tolerates temperature extremes, and remains durable in long-term storage. The technology is compatible with laboratory information management systems software systems. The p-Chip system is very well suited for identification of glass slides and cassettes in the histopathology laboratory.

  20. Electronic p-Chip-Based System for Identification of Glass Slides and Tissue Cassettes in Histopathology Laboratories

    PubMed Central

    Mandecki, Wlodek; Qian, Jay; Gedzberg, Katie; Gruda, Maryanne; Rodriguez, Efrain “Frank”; Nesbitt, Leslie; Riben, Michael

    2018-01-01

    Background: The tagging system is based on a small, electronic, wireless, laser-light-activated microtransponder named “p-Chip.” The p-Chip is a silicon integrated circuit, the size of which is 600 μm × 600 μm × 100 μm. Each p-Chip contains a unique identification code stored within its electronic memory that can be retrieved with a custom reader. These features allow the p-Chip to be used as an unobtrusive and scarcely noticeable ID tag on glass slides and tissue cassettes. Methods: The system is comprised of p-Chip-tagged sample carriers, a dedicated benchtop p-Chip ID reader that can accommodate both objects, and an additional reader (the Wand), with an adapter for reading IDs of glass slides stored vertically in drawers. On slides, p-Chips are attached with adhesive to the center of the short edge, and on cassettes – embedded directly into the plastic. ID readout is performed by bringing the reader to the proximity of the chip. Standard histopathology laboratory protocols were used for testing. Results: Very good ID reading efficiency was observed for both glass slides and cassettes. When processed slides are stored in vertical filing drawers, p-Chips remain readable without the need to remove them from the storage location, thereby improving the speed of searches in collections. On the cassettes, the ID continues to be readable through a thin layer of paraffin. Both slides and tissue cassettes can be read with the same reader, reducing the need for redundant equipment. Conclusions: The p-Chip is stable to all chemical challenges commonly used in the histopathology laboratory, tolerates temperature extremes, and remains durable in long-term storage. The technology is compatible with laboratory information management systems software systems. The p-Chip system is very well suited for identification of glass slides and cassettes in the histopathology laboratory. PMID:29692946

  1. Biolog(TM) ID as compared to 16S ribosomal RNA ID for environmental isolates from the deep subsurface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McKinsey, P.C.

    2000-05-05

    The U.S. Dept of Energy (DOE) Subsurface Microbial Culture Collection (SMCC) contains nearly 10,000 strains of microorganisms isolated from terrestrial subsurface environments. Many of the aerobic, gram-negative, chemoheterotrophs isolated from the DOE Savannah River Site (SRS) have previously been identified by phylogenetic analysis of 16S ribosomal RNA (rRNA) gene nucleotide sequences. These SMCC isolates are currently being examined using Biolog GN Microplates and the Biolog Microstation System in order to gain knowledge of their metabolic capabilities and to compare Biolog IDs with 16S IDs. To accommodate the particular needs of these subsurface isolates, which are often incapable of growing undermore » high-nutrient conditions, Biolog's recommendations for inoculating isolates into Biolog GN Microplates have been altered. The isolates are grown on low nutrient media, sodium thioglycolate (3mM) is added to the culture media to inhibit capsule formation, and a low density of bacteria is inoculated into the microplate. Using these altered inoculation criteria, 60 percent of these SMCC isolates have a Biolog genus ID that matches the 16S rRNA ID. These results indicate that the Biolog System can be a good means of identifying unusual environmental isolates, even when recommended inoculation procedures are altered to accommodate particular isolate needs.« less

  2. Evaluation of 1.0 mm i.d. column performances on ultra high pressure liquid chromatography instrumentation.

    PubMed

    Lestremau, François; Wu, Di; Szücs, Roman

    2010-07-23

    The present study focuses on the evaluation of 1.0 mm i.d. (internal diameter) columns on a commercial Ultra-High Pressure system. These systems have been developed specifically to operate columns with small volumes, typically 2.1 mm i.d., by reducing extra-column volume dispersion. The use of columns with smaller i.d. results in a reduced solvent consumption and required sample volume. The evaluation of the columns was carried out with samples containing neutral and pharmaceutical compounds. In isocratic mode, the extra-column volume produced additional band broadening leading to poor performances compared to equivalent 2.1 mm i.d. columns. By increasing the length of the column, the influence of the extra-column bandspreading could be reduced and 75,000 plates were obtained when four columns were coupled. In gradient mode, the effect of the extra-column contribution on efficiency was limited and about 80% of the performance of the 2.1 mm i.d. columns was obtained. Optimum conditions in gradient mode were further investigated by changing flow rate, gradient time and column length. A different approach of the calculation of peak capacity was also considered for the comparison of the influence of these different parameters. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  3. Same-Day Identification and Antimicrobial Susceptibility Testing of Bacteria in Positive Blood Culture Broths Using Short-Term Incubation on Solid Medium with the MicroFlex LT, Vitek-MS, and Vitek2 Systems

    PubMed Central

    Ha, Jihye; Han, Geum Hee; Kim, Myungsook; Lee, Kyungwon

    2018-01-01

    Background Early and appropriate antibiotic treatment improves the clinical outcome of patients with septicemia; therefore, reducing the turn-around time for identification (ID) and antimicrobial susceptibility test (AST) results is essential. We established a method for rapid ID and AST using short-term incubation of positive blood culture broth samples on solid media, and evaluated its performance relative to that of the conventional method using two rapid ID systems and a rapid AST method. Methods A total of 254 mono-microbial samples were included. Positive blood culture samples were incubated on blood agar plates for six hours and identified by the MicroFlex LT (Bruker Daltonics) and Vitek-MS (bioMeriéux) systems, followed by AST using the Vitek2 System (bioMeriéux). Results The correct species-level ID rates were 82.3% (209/254) and 78.3% (199/254) for the MicroFlex LT and Vitek-MS platforms, respectively. For the 1,174 microorganism/antimicrobial agent combinations tested, the rapid AST method showed total concordance of 97.8% (1,148/1,174) with the conventional method, with a very major error rate of 0.5%, major error rate of 0.7%, and minor error rate of 1.0%. Conclusions Routine implementation of this short-term incubation method could provide ID results on the day of blood culture-positivity detection and one day earlier than the conventional AST method. This simple method will be very useful for rapid ID and AST of bacteria from positive blood culture bottles in routine clinical practice. PMID:29401558

  4. Same-Day Identification and Antimicrobial Susceptibility Testing of Bacteria in Positive Blood Culture Broths Using Short-Term Incubation on Solid Medium with the MicroFlex LT, Vitek-MS, and Vitek2 Systems.

    PubMed

    Ha, Jihye; Hong, Sung Kuk; Han, Geum Hee; Kim, Myungsook; Yong, Dongeun; Lee, Kyungwon

    2018-05-01

    Early and appropriate antibiotic treatment improves the clinical outcome of patients with septicemia; therefore, reducing the turn-around time for identification (ID) and antimicrobial susceptibility test (AST) results is essential. We established a method for rapid ID and AST using short-term incubation of positive blood culture broth samples on solid media, and evaluated its performance relative to that of the conventional method using two rapid ID systems and a rapid AST method. A total of 254 mono-microbial samples were included. Positive blood culture samples were incubated on blood agar plates for six hours and identified by the MicroFlex LT (Bruker Daltonics) and Vitek-MS (bioMeriéux) systems, followed by AST using the Vitek2 System (bioMeriéux). The correct species-level ID rates were 82.3% (209/254) and 78.3% (199/254) for the MicroFlex LT and Vitek-MS platforms, respectively. For the 1,174 microorganism/antimicrobial agent combinations tested, the rapid AST method showed total concordance of 97.8% (1,148/1,174) with the conventional method, with a very major error rate of 0.5%, major error rate of 0.7%, and minor error rate of 1.0%. Routine implementation of this short-term incubation method could provide ID results on the day of blood culture-positivity detection and one day earlier than the conventional AST method. This simple method will be very useful for rapid ID and AST of bacteria from positive blood culture bottles in routine clinical practice. © The Korean Society for Laboratory Medicine

  5. Genetic modification of human B-cell development: B-cell development is inhibited by the dominant negative helix loop helix factor Id3.

    PubMed

    Jaleco, A C; Stegmann, A P; Heemskerk, M H; Couwenberg, F; Bakker, A Q; Weijer, K; Spits, H

    1999-10-15

    Transgenic and gene targeted mice have contributed greatly to our understanding of the mechanisms underlying B-cell development. We describe here a model system that allows us to apply molecular genetic techniques to the analysis of human B-cell development. We constructed a retroviral vector with a multiple cloning site connected to a gene encoding green fluorescent protein by an internal ribosomal entry site. Human CD34(+)CD38(-) fetal liver cells, cultured overnight in a combination of stem cell factor and interleukin-7 (IL-7), could be transduced with 30% efficiency. We ligated the gene encoding the dominant negative helix loop helix (HLH) factor Id3 that inhibits many enhancing basic HLH transcription factors into this vector. CD34(+)CD38(-) FL cells were transduced with Id3-IRES-GFP and cultured with the murine stromal cell line S17. In addition, we cultured the transduced cells in a reaggregate culture system with an SV-transformed human fibroblast cell line (SV19). It was observed that overexpression of Id3 inhibited development of B cells in both culture systems. B-cell development was arrested at a stage before expression of the IL-7Ralpha. The development of CD34(+)CD38(-) cells into CD14(+) myeloid cells in the S17 system was not inhibited by overexpression of Id3. Moreover, Id3(+) cells, although inhibited in their B-cell development, were still able to develop into natural killer (NK) cells when cultured in a combination of Flt-3L, IL-7, and IL-15. These findings confirm the essential role of bHLH factors in B-cell development and demonstrate the feasibility of retrovirus-mediated gene transfer as a tool to genetically modify human B-cell development.

  6. Pharmacokinetic properties of new antitumor radiopharmaceutical on the basis of diamond nanoporous composites labeled with rhenium-188

    NASA Astrophysics Data System (ADS)

    Petriev, V. M.; Tishchenko, V. K.; Kuril'chik, A. A.; Skvortsov, V. G.

    2017-01-01

    Today the development of address therapeutic radionuclide delivery systems directly to tumor tissue is of current interest. It can be achieved by the design of drug containers of specific sizes and shapes from carbon-based composite materials. It will be allowed to enhance the efficacy of anticancer therapy and avoid serious side effects. In this work we studied the pharmacokinetic properties of nanodiamond nanoporous composite labeled with rhenium-188 in rats with hepatocholangioma PC-1 after intratumoral injection. It was established that substantial part of injected radioactivity remained in tumor tissue. Within three hours after 188Re-nanoporous composites injection activity in tumor constituted 79.1-91.3% of injected dose (ID). Then activity level declined to 45.9% ID at 120 hours. No more than 1.34% ID entered the bloodstream. In soft organs and tissues, except thyroid gland, the content of compound didn’t exceed 0.3% ID/g. The highest activity in thyroid gland was 6.95% ID/g. In conclusion, received results suggest 188Re-nanoporous composites can be promising radionuclide delivery systems for cancer treatment.

  7. Experiments on Adaptive Techniques for Host-Based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DRAELOS, TIMOTHY J.; COLLINS, MICHAEL J.; DUGGAN, DAVID P.

    2001-09-01

    This research explores four experiments of adaptive host-based intrusion detection (ID) techniques in an attempt to develop systems that can detect novel exploits. The technique considered to have the most potential is adaptive critic designs (ACDs) because of their utilization of reinforcement learning, which allows learning exploits that are difficult to pinpoint in sensor data. Preliminary results of ID using an ACD, an Elman recurrent neural network, and a statistical anomaly detection technique demonstrate an ability to learn to distinguish between clean and exploit data. We used the Solaris Basic Security Module (BSM) as a data source and performed considerablemore » preprocessing on the raw data. A detection approach called generalized signature-based ID is recommended as a middle ground between signature-based ID, which has an inability to detect novel exploits, and anomaly detection, which detects too many events including events that are not exploits. The primary results of the ID experiments demonstrate the use of custom data for generalized signature-based intrusion detection and the ability of neural network-based systems to learn in this application environment.« less

  8. ACE insertion/deletion polymorphism (rs1799752) modifies the renoprotective effect of renin-angiotensin system blockade in patients with IgA nephropathy.

    PubMed

    Teranishi, Junya; Yamamoto, Ryohei; Nagasawa, Yasuyuki; Shoji, Tatsuya; Iwatani, Hirotsugu; Okada, Noriyuki; Moriyama, Toshiki; Yamauchi, Atsushi; Tsubakihara, Yoshiharu; Imai, Enyu; Rakugi, Hiromi; Isaka, Yoshitaka

    2015-09-01

    Little is known about genetic predictors that modify the renoprotective effect of renin-angiotensin system (RAS) blockade in IgA nephropathy (IgAN). The present multicenter retrospective observational study examined effect modification between RAS blockade and three RAS-related gene polymorphisms in 237 IgAN patients, including ACE I/D (rs1799752), AT1R A1166C (rs5186) and AGT T704C (rs699). During 9.9 ± 4.2 years of observation, 63 patients progressed to a 50% increase in serum creatinine level. Only ACE I/D predicted the outcome (ACE DD vs ID/II, hazard ratio 1.86 (95% confidence interval 1.03, 3.33)) and modified the renoprotective effect of RAS blockade (p for interaction between ACE DD and RAS blockade = 0.087). RAS blockade suppressed progression in ACE DD patients but not in ID/II patients (ACE ID/II with RAS blockade as a reference; ID/II without RAS blockade 1.45 (0.72, 2.92); DD without RAS blockade 3.06 (1.39, 6.73); DD with RAS blockade 1.51 (0.54, 4.19)), which was ascertained in a model with the outcome of slope of estimated glomerular filtration rate (p = 0.045 for interaction). ACE I/D predicted the IgAN progression and the renoprotective effect of RAS blockade in IgAN patients whereas neither AT1R A1166C nor AGT T704C did. © The Author(s) 2014.

  9. Chronic arsenic intoxication diagnostic score (CAsIDS).

    PubMed

    Dani, Sergio Ulhoa; Walter, Gerhard Franz

    2018-01-01

    Arsenic and its compounds are well-established, potent, environmentally widespread and persistent toxicants with metabolic, genotoxic, mutagenic, teratogenic, epigenetic and carcinogenic effects. Arsenic occurs naturally in the Earth's crust, but anthropogenic arsenic emissions have surmounted the emissions from important natural sources such as volcanism. Inorganic arsenicals exhibit acute and chronic toxicities in virtually all cell types and tissues, and hence arsenic intoxication affects multiple systems. Whereas acute arsenic intoxication is rare and relatively easy to diagnose, chronic arsenic intoxication (CAsI) is common but goes often misdiagnosed. Based on a review of the literature as well as our own clinical experience, we propose a chronic arsenic intoxication diagnostic score (CAsIDS). A distinctive feature of CAsIDS is the use of bone arsenic load as an essential criterion for the individual risk assessment of chronic arsenic intoxication, combined with a systemic clinical assessment. We present clinical examples where CAsIDS is applied for the diagnosis of CAsI, review the main topics of the toxicity of arsenic in different cell and organ systems and discuss the therapy and prevention of disease caused or aggravated by chronic arsenic intoxication. CAsIDS can help physicians establish the diagnosis of CAsI and associated conditions. Copyright © 2017 John Wiley & Sons, Ltd.

  10. Compressor airfoil tip clearance optimization system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Little, David A.; Pu, Zhengxiang

    2015-08-18

    A compressor airfoil tip clearance optimization system for reducing a gap between a tip of a compressor airfoil and a radially adjacent component of a turbine engine is disclosed. The turbine engine may include ID and OD flowpath boundaries configured to minimize compressor airfoil tip clearances during turbine engine operation in cooperation with one or more clearance reduction systems that are configured to move the rotor assembly axially to reduce tip clearance. The configurations of the ID and OD flowpath boundaries enhance the effectiveness of the axial movement of the rotor assembly, which includes movement of the ID flowpath boundary.more » During operation of the turbine engine, the rotor assembly may be moved axially to increase the efficiency of the turbine engine.« less

  11. Development of methods of producing large areas of silicon sheet by the slicing of silicon ingots using Inside Diameter (I.D.) saws

    NASA Technical Reports Server (NTRS)

    Aharonyan, P.

    1980-01-01

    Modifications to a 16 inch STC automated saw included: a programmable feed system; a crystal rotating system; and a STC dynatrack blade boring and control system. By controlling the plating operation and by grinding the cutting edge, 16 inch I.D. blades were produced with a cutting edge thickness of .22 mm. Crystal rotation mechanism was used to slice 100 mm diameter crystals with a 16 inch blade down to a thickness of .20 mm. Cutting rates with crystal rotation were generally slower than with standard plunge I.D. slicing techniques. Using programmed feeds and programmed rotation, maximum cutting rates were from 0.3 to 1.0 inches per minute.

  12. A demonstrator for an integrated subway protection system

    NASA Astrophysics Data System (ADS)

    Detoma, E.; Capetti, P.; Casati, G.; Billington, S.

    2008-04-01

    In 2006 SEPA has carried on the installation and tests of a demonstrator for an integrated subway protection system at a new subway station in the Naples, Italy) metropolitan area. Protection of a subway system is a difficult task given the amount of passengers transported every day. The demonstrator has been limited to non-intrusive detection techniques not to impair the passenger flow into the station. The demonstrator integrates several technologies and products that have been developed by SEPA or are already available on the market (MKS Instruments,...). The main purpose is to provide detection capabilities for attempts to introduce radioactive substances in the subway station, in order to foil possible attempts to place a dirty bomb, and threat detection and identification following release of chemical agents. The system integrates additional sensors such as video surveillance cameras and air flow sensing to complement the basic sensors suite. The need to protect sensitive installations such as subway stations has been highlighted by the series of terroristics actions carried out in recent years in the subway in London. However, given the number of passengers of a metro system, it is impossible to propose security techniques operating in ways similar to the screening of passengers in airports. Passengers screening and threat detection and identification must be quick, non-intrusive and capable of screening a large number of passengers to be applicable to mass transit systems. In 2005 SEPA, a small company operating in the field of trains video-surveillance systems and radiation detectors, started developing an integrated system to provide a comprehensive protection to subway stations, based on ready available or off-the-shelf components in order to quickly develop a reliable system with available technology. We ruled out at the beginning any new development in order to speed up the fielding of the system in less than one year. The system was developed with commercial sensors and deployed in a new station of the Naples metropolitan transit system in Mugnano. The station was particularly suitable for the demonstration since it is a new station that includes air venting control, water barriers (for fire and smoke containment) and a complete SCADA system to integrate technical and video surveillance operations. In order to protect the subway, we tackled four basic technologies, all readily available in-house or on the market: - radiation detection, to detect the introduction in the station of radionuclides, that may be dispersed by conventional explosive (a "dirty" bomb); - chemical agents detection and identification (after release), complemented with air speed and velocity sensors to estimate, track and predict the contamination plume; - video surveillance, integrated with the SCADA system and already available in the station.

  13. Implementation method of multi-terminal DC control system

    NASA Astrophysics Data System (ADS)

    Yi, Liu; Hao-Ran, Huang; Jun-Wen, Zhou; Hong-Guang, Guo; Yu-Yong, Zhou

    2018-04-01

    Currently the multi-terminal DC system (MTDC) has more stations. Each station needs operators to monitor and control the device. It needs much more operation and maintenance, low efficiency and small reliability; for the most important reason, multi-terminal DC system has complex control mode. If one of the stations has some problem, the control of the whole system should have problems. According to research of the characteristics of multi-terminal DC (VSC-MTDC) systems, this paper presents a strong implementation of the multi-terminal DC Supervisory Control and Data Acquisition (SCADA) system. This system is intelligent, can be networking, integration and intelligent. A master control system is added in each station to communication with the other stations to send current and DC voltage value to pole control system for each station. Based on the practical application and information feedback in the China South Power Grid research center VSC-MTDC project, this system is higher efficiency and save the cost on the maintenance of convertor station to improve the intelligent level and comprehensive effect. And because of the master control system, a multi-terminal system hierarchy coordination control strategy is formed, this make the control and protection system more efficiency and reliability.

  14. A framework for analyzing the impact of data integrity/quality on electricity market operations

    NASA Astrophysics Data System (ADS)

    Choi, Dae Hyun

    This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.

  15. RadNet Air Data From Boise, ID

    EPA Pesticide Factsheets

    This page presents radiation air monitoring and air filter analysis data for Boise, ID from EPA's RadNet system. RadNet is a nationwide network of monitoring stations that measure radiation in air, drinking water and precipitation.

  16. Akt1-Inhibitor of DNA binding2 is essential for growth cone formation and axon growth and promotes central nervous system axon regeneration

    PubMed Central

    Ko, Hyo Rim; Kwon, Il-Sun; Hwang, Inwoo; Jin, Eun-Ju; Shin, Joo-Ho; Brennan-Minnella, Angela M; Swanson, Raymond; Cho, Sung-Woo; Lee, Kyung-Hoon; Ahn, Jee-Yin

    2016-01-01

    Mechanistic studies of axon growth during development are beneficial to the search for neuron-intrinsic regulators of axon regeneration. Here, we discovered that, in the developing neuron from rat, Akt signaling regulates axon growth and growth cone formation through phosphorylation of serine 14 (S14) on Inhibitor of DNA binding 2 (Id2). This enhances Id2 protein stability by means of escape from proteasomal degradation, and steers its localization to the growth cone, where Id2 interacts with radixin that is critical for growth cone formation. Knockdown of Id2, or abrogation of Id2 phosphorylation at S14, greatly impairs axon growth and the architecture of growth cone. Intriguingly, reinstatement of Akt/Id2 signaling after injury in mouse hippocampal slices redeemed growth promoting ability, leading to obvious axon regeneration. Our results suggest that Akt/Id2 signaling is a key module for growth cone formation and axon growth, and its augmentation plays a potential role in CNS axonal regeneration. DOI: http://dx.doi.org/10.7554/eLife.20799.001 PMID:27938661

  17. Comparison of different modelling approaches of drive train temperature for the purposes of wind turbine failure detection

    NASA Astrophysics Data System (ADS)

    Tautz-Weinert, J.; Watson, S. J.

    2016-09-01

    Effective condition monitoring techniques for wind turbines are needed to improve maintenance processes and reduce operational costs. Normal behaviour modelling of temperatures with information from other sensors can help to detect wear processes in drive trains. In a case study, modelling of bearing and generator temperatures is investigated with operational data from the SCADA systems of more than 100 turbines. The focus is here on automated training and testing on a farm level to enable an on-line system, which will detect failures without human interpretation. Modelling based on linear combinations, artificial neural networks, adaptive neuro-fuzzy inference systems, support vector machines and Gaussian process regression is compared. The selection of suitable modelling inputs is discussed with cross-correlation analyses and a sensitivity study, which reveals that the investigated modelling techniques react in different ways to an increased number of inputs. The case study highlights advantages of modelling with linear combinations and artificial neural networks in a feedforward configuration.

  18. The sexuality of young women with intellectual and developmental disabilities: A neglected focus in the American foster care system.

    PubMed

    Ballan, Michelle S; Freyer, Molly Burke

    2017-07-01

    Youths with intellectual and developmental disabilities (ID/DD) are overrepresented in the American foster care system and experience heightened rates of pregnancy compared to their nondisabled peers. Yet limited information is known about sexually active or pregnant young women with ID/DD in foster care. Consequently, important healthcare needs of this population are not adequately addressed. This article explores sexuality education and sexual healthcare for female adolescents in foster care with ID/DD and recommends practice guidelines to support and prepare their emergent sexual development. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. ID-Viewer: a visual analytics architecture for infectious diseases surveillance and response management in Pakistan.

    PubMed

    Ali, M A; Ahsan, Z; Amin, M; Latif, S; Ayyaz, A; Ayyaz, M N

    2016-05-01

    Globally, disease surveillance systems are playing a significant role in outbreak detection and response management of Infectious Diseases (IDs). However, in developing countries like Pakistan, epidemic outbreaks are difficult to detect due to scarcity of public health data and absence of automated surveillance systems. Our research is intended to formulate an integrated service-oriented visual analytics architecture for ID surveillance, identify key constituents and set up a baseline for easy reproducibility of such systems in the future. This research focuses on development of ID-Viewer, which is a visual analytics decision support system for ID surveillance. It is a blend of intelligent approaches to make use of real-time streaming data from Emergency Departments (EDs) for early outbreak detection, health care resource allocation and epidemic response management. We have developed a robust service-oriented visual analytics architecture for ID surveillance, which provides automated mechanisms for ID data acquisition, outbreak detection and epidemic response management. Classification of chief-complaints is accomplished using dynamic classification module, which employs neural networks and fuzzy-logic to categorize syndromes. Standard routines by Center for Disease Control (CDC), i.e. c1-c3 (c1-mild, c2-medium and c3-ultra), and spatial scan statistics are employed for detection of temporal and spatio-temporal disease outbreaks respectively. Prediction of imminent disease threats is accomplished using support vector regression for early warnings and response planning. Geographical visual analytics displays are developed that allow interactive visualization of syndromic clusters, monitoring disease spread patterns, and identification of spatio-temporal risk zones. We analysed performance of surveillance framework using ID data for year 2011-2015. Dynamic syndromic classifier is able to classify chief-complaints to appropriate syndromes with high classification accuracy. Outbreak detection methods are able to detect the ID outbreaks in start of epidemic time zones. Prediction model is able to forecast dengue trend for 20 weeks ahead with nominal normalized root mean square error of 0.29. Interactive geo-spatiotemporal displays, i.e. heat-maps, and choropleth are shown in respective sections. The proposed framework will set a standard and provide necessary details for future implementation of such a system for resource-constrained regions. It will improve early outbreak detection attributable to natural and man-made biological threats, monitor spatio-temporal epidemic trends and provide assurance that an outbreak has, or has not occurred. Advanced analytics features will be beneficial in timely organization/formulation of health management policies, disease control activities and efficient health care resource allocation. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  20. Deception Based Intrusion Detection & Prevention for SCADA Environments -

    Science.gov Websites

    the case of the Ukraine incident, the substations. So here's the idea. Number one, understand from idea is that one of the quotes that he made in that book, it's actually a famous quote, is that all security products. Case in point, I'll be at RSA in February. There's over 2,600 vendors at RSA all solving

  1. Level-2 Milestone 3504: Scalable Applications Preparations and Outreach for the Sequoia ID (Dawn)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Futral, W. Scott; Gyllenhaal, John C.; Hedges, Richard M.

    2010-07-02

    This report documents LLNL SAP project activities in anticipation of the ASC Sequoia system, ASC L2 milestone 3504: Scalable Applications Preparations and Outreach for the Sequoia ID (Dawn), due June 30, 2010.

  2. RadNet Air Data From Idaho Falls, ID

    EPA Pesticide Factsheets

    This page presents radiation air monitoring and air filter analysis data for Idaho Falls, ID from EPA's RadNet system. RadNet is a nationwide network of monitoring stations that measure radiation in air, drinking water and precipitation.

  3. Significant publications on infectious diseases pharmacotherapy in 2014.

    PubMed

    Phe, Kady; Cadle, Richard M; Guervil, David J; Guzman, Oscar E; Lockwood, Ashley M; Perez, Katherine K; Vuong, Nancy N; Aitken, Samuel L

    2015-08-15

    The most important articles on infectious diseases (ID) pharmacotherapy published in the peer-reviewed literature in 2014, as nominated and selected by panels of pharmacists and others with ID expertise, are summarized. Members of the Houston Infectious Diseases Network were asked to nominate articles published in 2014 from prominent peer-reviewed journals that were felt to have a major impact in the field of ID pharmacotherapy. A list of 19 nominated articles on general ID-related topics and 9 articles specifically related to human immunodeficiency virus (HIV) infection or acquired immunodeficiency syndrome (AIDS) was compiled. In a national online survey, members of the Society of Infectious Diseases Pharmacists (SIDP) were asked to select from the list 10 general ID articles believed to have made a significant contribution to the field of ID pharmacotherapy and 1 article contributing to HIV/AIDS pharmacotherapy. Of the 291 SIDP members surveyed, 134 (46%) and 56 (19%) participated in the selection of general ID-related articles and HIV/AIDS-related articles, respectively. The 11 highest-ranked papers (10 general ID-related articles, 1 HIV/AIDS-related article) are summarized here. With the vast number of articles published each year, it is difficult to remain up-to-date on current, significant ID pharmacotherapy publications. This review of significant publications in 2014 may be helpful by lessening this burden. Copyright © 2015 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  4. The CMS tracker control system

    NASA Astrophysics Data System (ADS)

    Dierlamm, A.; Dirkes, G. H.; Fahrer, M.; Frey, M.; Hartmann, F.; Masetti, L.; Militaru, O.; Shah, S. Y.; Stringer, R.; Tsirou, A.

    2008-07-01

    The Tracker Control System (TCS) is a distributed control software to operate about 2000 power supplies for the silicon modules of the CMS Tracker and monitor its environmental sensors. TCS must thus be able to handle about 104 power supply parameters, about 103 environmental probes from the Programmable Logic Controllers of the Tracker Safety System (TSS), about 105 parameters read via DAQ from the DCUs in all front end hybrids and from CCUs in all control groups. TCS is built on top of an industrial SCADA program (PVSS) extended with a framework developed at CERN (JCOP) and used by all LHC experiments. The logical partitioning of the detector is reflected in the hierarchical structure of the TCS, where commands move down to the individual hardware devices, while states are reported up to the root which is interfaced to the broader CMS control system. The system computes and continuously monitors the mean and maximum values of critical parameters and updates the percentage of currently operating hardware. Automatic procedures switch off selected parts of the detector using detailed granularity and avoiding widespread TSS intervention.

  5. Controlling front-end electronics boards using commercial solutions

    NASA Astrophysics Data System (ADS)

    Beneyton, R.; Gaspar, C.; Jost, B.; Schmeling, S.

    2002-04-01

    LHCb is a dedicated B-physics experiment under construction at CERN's large hadron collider (LHC) accelerator. This paper will describe the novel approach LHCb is taking toward controlling and monitoring of electronics boards. Instead of using the bus in a crate to exercise control over the boards, we use credit-card sized personal computers (CCPCs) connected via Ethernet to cheap control PCs. The CCPCs will provide a simple parallel, I2C, and JTAG buses toward the electronics board. Each board will be equipped with a CCPC and, hence, will be completely independently controlled. The advantages of this scheme versus the traditional bus-based scheme will be described. Also, the integration of the controls of the electronics boards into a commercial supervisory control and data acquisition (SCADA) system will be shown.

  6. Synchronization software for automation in anesthesia.

    PubMed

    Bressan, Nadja; Castro, Ana; Brás, Susana; Oliveira, Hélder P; Ribeiro, Lénio; Ferreira, David A; Antunes, Luís; Amorim, Pedro; Nunes, Catarina S

    2007-01-01

    This work presents the development of a software for data acquisition and control (ASYS) on a clinical setup. Similar to the industrial Supervisory Control And Data Acquisition (SCADA) the software assembles a Target Controlled Infusion (TCI) monitoring and supervisory control data in real time from devices in a surgical room. The software is not a full controller since the TCI systems comprehend permanent interaction from the anesthesiologist. Based on pharmacokinetic models, the effect-site and plasma concentrations can be related with the drug dose infused and vice versa. The software determines the infusion rates of the drug which are given as commands to the infusion pumps. This software provides the anesthesiologist with a trustworthy tool for managing a safe and balanced anesthesia. Since it also incorporates the acquisition and display of patients brain signals.

  7. Quantitative assessment of the association between the angiotensin-converting enzyme gene insertion/deletion polymorphism and digestive system cancer risk.

    PubMed

    Wang, J; Yang, S; Guo, F H; Mao, X; Zhou, H; Dong, Y Q; Wang, Z M; Luo, F

    2015-11-13

    The angiotensin-converting enzyme (ACE) gene insertion/deletion (I/D) polymorphism has been reported to be associated with digestive system cancer; however, the results from previous studies have been conflicting. The present study aimed to investigate the association between the ACE I/D polymorphism and the risk of digestive system cancer using a meta-analysis of previously published studies. Databases were systematically searched to identify relevant studies published prior to December 2014. We estimated the pooled OR with its 95%CI to assess the association. The meta-analysis consisted of thirteen case-control studies that included 2557 patients and 4356 healthy controls. Meta-analysis results based on all the studies showed no significant association between the ACE I/D polymorphism and the risk of digestive system cancer (DD vs II: OR = 0.85, 95%CI = 0.59-1.24; DI vs II: OR = 0.94, 95%CI = 0.78-1.15; dominant model: OR = 0.96, 95%CI = 0.81- 1.15; recessive model: OR = 1.06, 95%CI = 0.76-1.48). Subgroup analyses by race and cancer type did not detect an association between the ACE I/D polymorphism and digestive system cancer risk. However, when the analyses were restricted to smaller studies (N < 500 patients), the summary OR of DI vs II was 0.80 (95%CI = 0.66-0.97). Our analyses detected a possibility of publication bias with a misestimate of the true association by smaller studies. Overall, meta-analysis results suggest the ACE I/D polymorphism might not be associated with susceptibility to digestive system cancer. Further large and well-designed studies are needed to confirm these conclusions.

  8. POWERS forID: Personalized Online Weight and Exercise Response System for Individuals with Intellectual Disability: study protocol for a randomized controlled trial.

    PubMed

    Neumeier, William H; Guerra, Nichole; Thirumalai, Mohanraj; Geer, Betty; Ervin, David; Rimmer, James H

    2017-10-23

    Intellectual disability (ID) is characterized by limitations in intellectual functioning and adaptive behavior. Adults with ID exhibit higher rates of obesity and poorer health status compared to the general population. Continuity of care and barriers to health-related activities may contribute to the poorer health status observed in this population. To address this problem, a tailored weight management online health information and communication technology platform, known as POWERS forID , was developed and is being tested to determine if this delivery mechanism can improve weight maintenance/weight loss in adults with ID. Obese adults with mild-to-moderate ID (n = 70) are randomized to the POWERS forID intervention or control group for a 24-week trial. Each group undergoes an assessment that includes body weight, waist circumference, and percent body fat at baseline and at weeks 6, 12, and 24. Physical activity barriers, healthy eating barriers, food frequency, and psychosocial wellbeing are measured at baseline and at weeks 12 and 24. Blood lipids are assessed at baseline and 24 weeks. Participants randomized to POWERS forID receive access to the POWERS forID website and calls from a health coach (weekly during weeks 1-12, biweekly during weeks 13-24). The health coach employs motivational interviewing techniques adapted for individuals with ID to promote behavior change. Participants randomized to the control group receive standard clinical weight-loss care. Differences in weight, waist circumference, blood lipids, percent body fat, and psychosocial self-report will be assessed. Barriers and facilitators of implementation as well as perception of study outcomes will be conducted via qualitative analysis. POWERS forID is a novel information and communication technology platform designed to address health needs for adults with ID. This article describes the development and components of POWERS forID . The overall aim is to assess usability and feasibility of POWERS forID for promoting weight loss for obese adults with ID over the course of a 24-week randomized control trial. Clinicaltrials.gov, NCT03139760 . Registered on XXX.

  9. Reliability Programs for Nonelectronic Designs. Volume 1

    DTIC Science & Technology

    1983-04-01

    to the system or component levels or to both and then Its degree of effectiveness. DOCUMENT ID TITLE/SUBJECT APPLICATION EFFECTIVENESS Sys ./Comp/Both...ID TITLE/SUBJECT APPLICATION EFFECTIVENESS ’ Sys ./Comp/Both Exc./Good/Poor MIL-STD-781B Reliability Tests Exponen- 1 1 1 1 Ii II tial Distribution MIL...DOCUMENT ID TITLE/SUBJECT APPLICATION EFFECTIVENESS Sys ./Comp/Both Exc./Good/Poor MIL-STD-1535A Supplier Quality Assurance I 1 I1 I 1 1 I Program

  10. Comparison of the Immunogenicity and Safety of a Split-virion, Inactivated, Trivalent Influenza Vaccine (Fluzone®) Administered by Intradermal or Intramuscular Route in Healthy Adults

    PubMed Central

    Frenck, Robert W.; Belshe, Robert; Brady, Rebecca C; Winokur, Patricia L.; Campbell, James D.; Treanor, John; Hay, Christine M.; Dekker, Cornelia L.; Walter, Emmanuel B.; Cate, Thomas R.; Edwards, Kathryn M.; Hill, Heather; Wolff, Mark; LeDuc, Tom; Tornieporth, Nadia

    2011-01-01

    The aim of the study was to determine whether reduced doses of trivalent inactivated influenza vaccine (TIV) administered by the intradermal (ID) route generated similar immune responses to standard TIV given intramuscularly (IM) with comparable safety profiles. Recent changes in immunization recommendations have increased the number of people for whom influenza vaccination is recommended. Thus, given this increased need and intermittent vaccine shortages, means to rapidly expand the vaccine supply are needed. Previously healthy subjects 18-64 years of age were randomly assigned to one of four TIV vaccine groups: standard 15 μg HA/strain TIV IM, either 9 μg or 6 μg HA/strain of TIV ID given using a new microinjection system, (BD Soluvia™ Microinjection Systema), or 3 μg HA/strain of TIV ID given by Mantoux technique. All vaccines contained A/New Caledonia (H1N1), A/Wyoming (H3N2) and B/Jiangsu strains of influenza. Sera were obtained 21 days after vaccination and hemagglutination inhibition (HAI) assays were performed and geometric mean titers (GMT) were compared among the groups. Participants were queried immediately following vaccination regarding injection pain and quality of the experience. Local and systemic reactions were collected for 7 days following vaccination and compared. Ten study sites enrolled 1592 subjects stratified by age; 18-49 years, [N=814] and 50-64 years, [N=778]. Among all subjects, for each of the three vaccine strains, the GMTs at 21 days post-vaccination for both the 9 μg and the 6 μg doses of each strain given ID were non inferior to GMTs generated after standard 15 μg doses/strain IM. However, for the 3 μg ID dose, only the A/Wyoming antigen produced a GMT that was non-inferior to the standard IM dose. Additionally, in the subgroup of subjects 50-64 years of age, the 6 μg dose given ID induced GMTs that were inferior to the standard IM TIV for the A/H1N1 and B strains. No ID dose produced a GMT superior to that seen after standard IM TIV. Local erythema and swelling were significantly more common in the ID groups but the reactions were mild to moderate and short-lived. No significant safety issues related to intradermal administration were identified. Participants given TIV ID provided favorable responses to questions about their experiences with ID administration. In conclusion, for the aggregated cohorts of adults 18 to 64 years of age, reduced doses (6 μg and 9 μg) of TIV delivered ID using a novel microinjection system stimulated comparable HAI antibody responses to standard TIV given IM. The reduced 3 μg dose administered ID by needle and syringe, as well as the 6 μg ID for subjects aged 50-64 years of age generated poorer immune responses as compared to the 15 μg IM dose. PMID:21699951

  11. Defining the safe current limit for opening ID photon shutter

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seletskiy, S.

    The NSLS-II storage ring is protected from possible damage from insertion devices (IDs) synchrotron radiation by a dedicated active interlock system (AIS). It monitors electron beam position and angle and triggers beam drop if beam orbit exceeds the boundaries of pre-calculated active interlock envelope (AIE). The beamlines (BL) and beamline frontends (FE) are designed under assumption that the electron beam is interlocked within the AIE. For historic reasons the AIS engages the ID active interlock (AI-ID) at any non-zero beam current whenever the ID photon shutter (IDPS) is getting opened. Such arrangement creates major inconveniences for BLs commissioning. Apparently theremore » is some IDPS safe current limit (SCL) under which the IDPS can be opened without interlocking the e-beam. The goal of this paper is to find such limit.« less

  12. Population-Based Prevalence of Intellectual Disability and Autism Spectrum Disorders in Western Australia

    PubMed Central

    Bourke, Jenny; de Klerk, Nick; Smith, Timothy; Leonard, Helen

    2016-01-01

    Abstract To investigate the prevalence of intellectual disability (ID) and/or autism spectrum disorders (ASDs) in Western Australia (WA). A cohort of children born from 1983 to 2010 in WA with an ID and/or ASD were identified using the population-based IDEA (Intellectual Disability Exploring Answers) database, which ascertains cases through the Disability Services Commission (DSC) as well as education sources. Information on race, gender, mother's residence at birth and deaths was obtained through linkage to the Midwives Notification System and the Mortality Register. Diagnostic information on the cause of ID was obtained through review of medical records where available and children were classified as biomedical cause, ASD, or unknown cause. An overall prevalence of ID of 17.0/1000 livebirths (95% CI: 16.7, 17.4) showed an increase from the 10-year previous prevalence of 14.3/1000. The prevalence for mild or moderate ID was 15.0 (95% CI: 14.6, 15.3), severe ID was 1.2 (95% CI: 1.1, 1.3), and unknown level of ID was 0.9 (95% CI: 0.8, 1.0)/1000 livebirths. The prevalence for Aboriginal children was 39.0/1000 compared with 15.7/1000 for non-Aboriginal children, giving a prevalence ratio of 2.5 (95% CI: 2.4, 2.6). Prevalence of all ASD was 5.1/1000 of which 3.8/1000 had ASD and ID. The prevalence of ID has risen in WA over the last 10 years with most of this increase due to mild or moderate ID. Whilst the prevalence of ASD has also increased over this time this does not fully explain the observed increase. Aboriginal children are at a 2.5-fold risk of ID but are less likely to be accessing disability services. PMID:27227936

  13. Preweaning iron deficiency increases non-contingent responding during cocaine self-administration in rats.

    PubMed

    Jenney, Christopher B; Alexander, Danielle N; Jones, Byron C; Unger, Erica L; Grigson, Patricia S

    2016-12-01

    Iron deficiency (ID) is the most prevalent single-nutrient deficiency worldwide. There is evidence that ID early in development (preweaning in rat) causes irreversible neurologic, behavioral, and motor development deficits. Many of these effects have been attributed to damage to dopamine systems, including ID-induced changes in transporter and receptor numbers in the striatum and nucleus accumbens. These mesolimbic dopaminergic neurons are, in part, responsible for mediating reward and thus play a key role in addiction. However, there has been relatively little investigation into the behavioral effects of ID on drug addiction. In 2002, we found that rats made ID from weaning (postnatal day 21) and throughout the experiment acquired cocaine self-administration significantly more slowly than controls and failed to increase responding when the dose of the drug was decreased. In the present study, we assessed addiction for self-administered cocaine in rats with a history of preweaning ID only during postnatal days 4 through 21, and iron replete thereafter. The results showed that while ID did not affect the number of cocaine infusions or the overall addiction-like behavior score, ID rats scored higher on a measure of continued responding for drug than did iron replete controls. This increase in responding, however, was less goal-directed as ID rats also responded more quickly to the non-rewarded manipulandum than did control rats. Thus, while ID early in infancy did not significantly increase addiction-like behaviors for cocaine in this small study, the pattern of data suggests a possible underlying learning or performance impairment. Future studies will be needed to elucidate the exact neuro-behavioral deficits that lead to the increase in indiscriminate responding for drug in rats with a history of perinatal ID. Copyright © 2016. Published by Elsevier Inc.

  14. IDGenerator: unique identifier generator for epidemiologic or clinical studies.

    PubMed

    Olden, Matthias; Holle, Rolf; Heid, Iris M; Stark, Klaus

    2016-09-15

    Creating study identifiers and assigning them to study participants is an important feature in epidemiologic studies, ensuring the consistency and privacy of the study data. The numbering system for identifiers needs to be random within certain number constraints, to carry extensions coding for organizational information, or to contain multiple layers of numbers per participant to diversify data access. Available software can generate globally-unique identifiers, but identifier-creating tools meeting the special needs of epidemiological studies are lacking. We have thus set out to develop a software program to generate IDs for epidemiological or clinical studies. Our software IDGenerator creates unique identifiers that not only carry a random identifier for a study participant, but also support the creation of structured IDs, where organizational information is coded into the ID directly. This may include study center (for multicenter-studies), study track (for studies with diversified study programs), or study visit (baseline, follow-up, regularly repeated visits). Our software can be used to add a check digit to the ID to minimize data entry errors. It facilitates the generation of IDs in batches and the creation of layered IDs (personal data ID, study data ID, temporary ID, external data ID) to ensure a high standard of data privacy. The software is supported by a user-friendly graphic interface that enables the generation of IDs in both standard text and barcode 128B format. Our software IDGenerator can create identifiers meeting the specific needs for epidemiologic or clinical studies to facilitate study organization and data privacy. IDGenerator is freeware under the GNU General Public License version 3; a Windows port and the source code can be downloaded at the Open Science Framework website: https://osf.io/urs2g/ .

  15. SOBP Is Mutated in Syndromic and Nonsyndromic Intellectual Disability and Is Highly Expressed in the Brain Limbic System

    PubMed Central

    Birk, Efrat; Har-Zahav, Adi; Manzini, Chiara M.; Pasmanik-Chor, Metsada; Kornreich, Liora; Walsh, Christopher A.; Noben-Trauth, Konrad; Albin, Adi; Simon, Amos J.; Colleaux, Laurence; Morad, Yair; Rainshtein, Limor; Tischfield, David J.; Wang, Peter; Magal, Nurit; Maya, Idit; Shoshani, Noa; Rechavi, Gideon; Gothelf, Doron; Maydan, Gal; Shohat, Mordechai; Basel-Vanagaite, Lina

    2010-01-01

    Intellectual disability (ID) affects 1%–3% of the general population. We recently reported on a family with autosomal-recessive mental retardation with anterior maxillary protrusion and strabismus (MRAMS) syndrome. One of the reported patients with ID did not have dysmorphic features but did have temporal lobe epilepsy and psychosis. We report on the identification of a truncating mutation in the SOBP that is responsible for causing both syndromic and nonsyndromic ID in the same family. The protein encoded by the SOBP, sine oculis binding protein ortholog, is a nuclear zinc finger protein. In mice, Sobp (also known as Jxc1) is critical for patterning of the organ of Corti; one of our patients has a subclinical cochlear hearing loss but no gross cochlear abnormalities. In situ RNA expression studies in postnatal mouse brain showed strong expression in the limbic system at the time interval of active synaptogenesis. The limbic system regulates learning, memory, and affective behavior, but limbic circuitry expression of other genes mutated in ID is unusual. By comparing the protein content of the +/jc to jc/jc mice brains with the use of proteomics, we detected 24 proteins with greater than 1.5-fold differences in expression, including two interacting proteins, dynamin and pacsin1. This study shows mutated SOBP involvement in syndromic and nonsyndromic ID with psychosis in humans. PMID:21035105

  16. Protracted ethanol withdrawal in rats: Tolerance to the anxiolytic effects of diazepam and pentobarbital but not phenobarbital

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lai, H.; Prather, P.L.

    1990-02-26

    Anxiety is a common symptom during ethanol withdrawal contributing to its continuous abuse and alcoholism. Ethanol withdrawal in rats produces an interoceptive discriminative stimulus (IDS) similar to that produced by the anxiogenic drug pentylenetetrazol (PTZ). This stimulus peaks at 12 hours after last dose of ethanol and thereafter the IDS is detected for several days (protracted withdrawal) by sensitization to a probe drug. previously, the authors have shown that during the protracted withdrawal, the IDS is enhanced by GABA receptor antagonists suggesting alteration of brain GABA systems. This report provides further evidence that chronic ethanol alters GABAergic systems. Rats weremore » trained to discriminate PTZ (20 mg/kg, ip) from saline. Diazepam, pentobarbital and phenobarbital blocked the PTZ-IDS dose dependently. Ethanol, 4.5% w/v, was then given in a nutritionally complete diet for a week. On termination of the ethanol diet, rats exhibited signs and symptoms of withdrawal which returned to baseline within 3 days. During the protracted withdrawal period, the authors then redetermined the blockade of the PTZ-IDS. Significant tolerance was observed to the effectiveness of diazepam and pentobarbital, but not to phenobarbital. Since diazepam and pentobarbital produce significantly more enhancement of GABAergic activity than does phenobarbital, these data further suggest alteration of brain GABAergic systems during protracted withdrawal from ethanol.« less

  17. Optical fiber strain sensor for application in intelligent intruder detection systems

    NASA Astrophysics Data System (ADS)

    Stańczyk, Tomasz; Tenderenda, Tadeusz; Szostkiewicz, Lukasz; Bienkowska, Beata; Kunicki, Daniel; Murawski, Michal; Mergo, Pawel; Nasilowski, Tomasz

    2017-10-01

    Nowadays technology allows to create highly effective Intruder Detection Systems (IDS), that are able to detect the presence of an intruder within a defined area. In such systems the best performance can be achieved by combining different detection techniques in one system. One group of devices that can be applied in an IDS, are devices based on Fiber Optic Sensors (FOS). The FOS benefits from numerous advantages of optical fibers like: small size, light weight or high sensitivity. In this work we present a novel Microstructured Optical Fiber (MOF) characterized by increased strain sensitivity dedicated to distributed acoustic sensing for intelligent intruder detection systems. By designing the MOF with large air holes in close proximity to a fiber core, we increased the effective refractive index sensitivity to longitudinal strain. The presented fiber can be easily integrated in a floor system in order to detect any movement in the investigated area. We believe that sensors, based on the presented MOF, due to its numerous advantages, can find application in intelligent IDS.

  18. TERENA eScience PKI

    NASA Astrophysics Data System (ADS)

    Sova, Milan

    Several National Research and Education Networks associated in TERENA have joined their efforts to build a shared PKI able to serve potentially millions of users from their constituency. The TCS eScience Personal CA takes advantage of national identity federations to facilitate user identity vetting and enrollment procedures. The system uses identity management systems (IdMS) at participating institutions to perform the functions of registration authorities. The certificate enrollment application acts as a SAML Service Provider relying on information provided by IdMS performing as SAML Identity Providers (IdP). When applying for a personal certificate, users authenticate at their home IdP using credentials they normally use to access local services. The IdP controls the certificate issuance process by releasing SAML attributes specifying the user's eligibility for the service and the information to be included in the certificate such as the user's name and email address. The TCS eScience Personal CA is part of the TERENA Certificate Service that uses a commercial PKI provider. Outsourcing the actual CA machinery to a specialized company results in professional-level services such as CRL and OCSP management. The paper describes the legal, organizational and technical aspects of the TCS eScience PKI.

  19. Evaluation of the RapID-ANA system for identification of anaerobic bacteria of veterinary origin.

    PubMed

    Adney, W S; Jones, R L

    1985-12-01

    This study evaluated the ability of the RapID-ANA system (Innovative Diagnostic Systems, Inc., Atlanta, Ga.) to accurately identify a spectrum of freshly isolated veterinary anaerobes. A total of 183 isolates were tested and included 7 Actinomyces spp., 53 Bacteroides spp., 32 Clostridium spp., 2 Eubacterium spp., 65 Fusobacterium spp., 1 Peptococcus spp., 22 Peptostreptococcus spp., and 1 Propionibacterium spp. All isolates were initially identified by conventional biochemical testing and gas-liquid chromatography of short-chain fatty acid metabolites. Additional tests were performed as required by the RapID-ANA system. Of these isolates, 81.4% were correctly identified to the genus level, including 59.6% to the species level, 14.2% were incorrectly identified at the genus level, and 4.4% were not identified. Initially, 20.2% of the strains were not identified because the microcodes were not in the code book. The majority of the incorrect identifications were caused by the misidentification of Fusobacterium spp. as Bacteroides spp. Errors also occurred when veterinary anaerobes not included in the data base were assigned an identification from the existing data base. The RapID-ANA system appears to be a promising new method for rapid identification of veterinary anaerobes; however, further evaluation with an extended data base is needed before the system can accurately identify all clinically significant anaerobes.

  20. Distributed Password Cracking

    DTIC Science & Technology

    2009-12-01

    other services for early UNIX systems at Bell labs. In many UNIX based systems, the field added to ‘etc/ passwd ’ file to carry GCOS ID information was...charset, and external. struct options_main { /* Option flags */ opt_flags flags; /* Password files */ struct list_main * passwd ; /* Password file...object PASSWD . It is part of several other data structures. struct PASSWD { int id; char *login; char *passwd_hash; int UID

  1. 78 FR 36625 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-18

    ... but may not display the user firm ID for all Exchange processes.'' This concept, which can be found in... may be entered into and rest on the Exchange System and will only display the user firm ID through the... market and a national market system and, in general, to protect investors and the public interest. \\9\\ 15...

  2. Report: Identification Proofing, Incident Handling, and Badge Disposal Procedures Needed for EPA’s Smartcard Program

    EPA Pesticide Factsheets

    Report #08-P-0267, September 16, 2008. An employee error in using the new ID card system resulted in an EPA employee having ID documents and other identifying information incorrectly associated with another EPA employee.

  3. Rapid, autonomous analysis of He spectra I: Overview of the RadID program, user experience, and structure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gosnell, Thomas B.; Chavez, Joseph R.; Rowland, Mark S.

    2014-02-26

    RadID is a new gamma-ray spectrum analysis program for rapid screening of HPGe gamma-ray data to reveal the presence of radionuclide signatures. It is an autonomous, rule-based heuristic system that can identify well over 200 radioactive sources with particular interest in uranium and plutonium characteristics. It executes in about one second. RadID does not require knowledge of the detector efficiency, the source-to-detector distance, or the geometry of the inspected radiation source—including any shielding. In this first of a three-document series we sketch the RadID program’s origin, its minimal requirements, the user experience, and the program operation.

  4. Military Payloads Hosted on Commercial Satellites: How Can the Space and Missile Systems Center Increase the Number of Commercially Hosted Military Payload Contract Awards

    DTIC Science & Technology

    2015-12-01

    commercial owner-operator’s opportunity to review the preliminary satellite design, raise concerns, and discuss needed modifications—is typically...concerns and raised those concerns through the chain of command. The division chief decided that the executive director of SMC (a two-star general...Indefinite Quantity (ID/ IQ ) contract for CHMPs, referred to as the HoPs (Hosted Payloads) ID/ IQ . The Federal Acquisition Regulation describes an ID

  5. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.

  6. Integrated defense system overlaps as a disease model: with examples for multiple chemical sensitivity.

    PubMed Central

    Rowat, S C

    1998-01-01

    The central nervous, immune, and endocrine systems communicate through multiple common messengers. Over evolutionary time, what may be termed integrated defense system(s) (IDS) have developed to coordinate these communications for specific contexts; these include the stress response, acute-phase response, nonspecific immune response, immune response to antigen, kindling, tolerance, time-dependent sensitization, neurogenic switching, and traumatic dissociation (TD). These IDSs are described and their overlap is examined. Three models of disease production are generated: damage, in which IDSs function incorrectly; inadequate/inappropriate, in which IDS response is outstripped by a changing context; and evolving/learning, in which the IDS learned response to a context is deemed pathologic. Mechanisms of multiple chemical sensitivity (MCS) are developed from several IDS disease models. Model 1A is pesticide damage to the central nervous system, overlapping with body chemical burdens, TD, and chronic zinc deficiency; model 1B is benzene disruption of interleukin-1, overlapping with childhood developmental windows and hapten-antigenic spreading; and model 1C is autoimmunity to immunoglobulin-G (IgG), overlapping with spreading to other IgG-inducers, sudden spreading of inciters, and food-contaminating chemicals. Model 2A is chemical and stress overload, including comparison with the susceptibility/sensitization/triggering/spreading model; model 2B is genetic mercury allergy, overlapping with: heavy metals/zinc displacement and childhood/gestational mercury exposures; and model 3 is MCS as evolution and learning. Remarks are offered on current MCS research. Problems with clinical measurement are suggested on the basis of IDS models. Large-sample patient self-report epidemiology is described as an alternative or addition to clinical biomarker and animal testing. Images Figure 1 Figure 2 Figure 3 Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 PMID:9539008

  7. Design and Analysis of a Model Reconfigurable Cyber-Exercise Laboratory (RCEL) for Information Assurance Education

    DTIC Science & Technology

    2004-03-01

    with MySQL . This choice was made because MySQL is open source. Any significant database engine such as Oracle or MS- SQL or even MS Access can be used...10 Figure 6. The DoD vs . Commercial Life Cycle...necessarily be interested in SCADA network security 13. MySQL (Database server) – This station represents a typical data server for a web page

  8. Experimental Verification of Application of Looped System and Centralized Voltage Control in a Distribution System with Renewable Energy Sources

    NASA Astrophysics Data System (ADS)

    Hanai, Yuji; Hayashi, Yasuhiro; Matsuki, Junya

    The line voltage control in a distribution network is one of the most important issues for a penetration of Renewable Energy Sources (RES). A loop distribution network configuration is an effective solution to resolve voltage and distribution loss issues concerned about a penetration of RES. In this paper, for a loop distribution network, the authors propose a voltage control method based on tap change control of LRT and active/reactive power control of RES. The tap change control of LRT takes a major role of the proposed voltage control. Additionally the active/reactive power control of RES supports the voltage control when voltage deviation from the upper or lower voltage limit is unavoidable. The proposed method adopts SCADA system based on measured data from IT switches, which are sectionalizing switch with sensor installed in distribution feeder. In order to check the validity of the proposed voltage control method, experimental simulations using a distribution system analog simulator “ANSWER” are carried out. In the simulations, the voltage maintenance capability in the normal and the emergency is evaluated.

  9. A Fault Recognition System for Gearboxes of Wind Turbines

    NASA Astrophysics Data System (ADS)

    Yang, Zhiling; Huang, Haiyue; Yin, Zidong

    2017-12-01

    Costs of maintenance and loss of power generation caused by the faults of wind turbines gearboxes are the main components of operation costs for a wind farm. Therefore, the technology of condition monitoring and fault recognition for wind turbines gearboxes is becoming a hot topic. A condition monitoring and fault recognition system (CMFRS) is presented for CBM of wind turbines gearboxes in this paper. The vibration signals from acceleration sensors at different locations of gearbox and the data from supervisory control and data acquisition (SCADA) system are collected to CMFRS. Then the feature extraction and optimization algorithm is applied to these operational data. Furthermore, to recognize the fault of gearboxes, the GSO-LSSVR algorithm is proposed, combining the least squares support vector regression machine (LSSVR) with the Glowworm Swarm Optimization (GSO) algorithm. Finally, the results show that the fault recognition system used in this paper has a high rate for identifying three states of wind turbines’ gears; besides, the combination of date features can affect the identifying rate and the selection optimization algorithm presented in this paper can get a pretty good date feature subset for the fault recognition.

  10. Experimental study of mini SCADA renewable energy management system on microgrid using Raspberry Pi

    NASA Astrophysics Data System (ADS)

    Tridianto, E.; Permatasari, P. D.; Ali, I. R.

    2018-03-01

    Renewable Energy Management System (REMS) is a device that can be able to monitor power through a microgrid. The purpose of this system is to optimize power usage that produced from renewable energy with the result that reduces power demand from the grid. To reach the goal this device manage the load power needs fully supplied by renewable energy when the power produced from renewable energy is higher than load demand, besides power surplus will be stored in battery in this way energy stored in battery can be used when it needed. When the power produced from renewable energy can not satisfy the power demand, power will supply by renewable energy and grid. This device uses power meters for record any power flow through microgrid. In order to manage power flow in microgrid this system use relay module. The user can find out energy consumption (consumed by the load) and production (produced by renewable energy) in a period of time so that the user can switch on the load in right time.

  11. Design and installation of a next generation pilot scale fermentation system.

    PubMed

    Junker, B; Brix, T; Lester, M; Kardos, P; Adamca, J; Lynch, J; Schmitt, J; Salmon, P

    2003-01-01

    Four new fermenters were designed and constructed for use in secondary metabolite cultivations, bioconversions, and enzyme production. A new PC/PLC-based control system also was implemented using GE Fanuc PLCs, Genius I/O blocks, and Fix Dynamics SCADA software. These systems were incorporated into an industrial research fermentation pilot plant, designed and constructed in the early 1980s. Details of the design of these new fermenters and the new control system are described and compared with the existing installation for expected effectiveness. In addition, the reasoning behind selection of some of these features has been included. Key to the design was the goal of preserving similarity between the new and previously existing and successfully utilized fermenter hardware and software installations where feasible but implementing improvements where warranted and beneficial. Examples of enhancements include strategic use of Inconel as a material of construction to reduce corrosion, piping layout design for simplified hazardous energy isolation, on-line calculation and control of nutrient feed rates, and the use of field I/O modules located near the vessel to permit low-cost addition of new instrumentation.

  12. RANS simulations of wind turbine wakes: optimal tuning of turbulence closure and aerodynamic loads from LiDAR and SCADA data

    NASA Astrophysics Data System (ADS)

    Letizia, Stefano; Puccioni, Matteo; Zhan, Lu; Viola, Francesco; Camarri, Simone; Iungo, Giacomo Valerio

    2017-11-01

    Numerical simulations of wakes produced by utility-scale wind turbines still present challenges related to the variability of the atmospheric conditions and, in the most of the cases, the lack of information about the geometry and aerodynamic performance of the wind turbine blades. In order to overcome the mentioned difficulties, we propose a RANS solver for which turbine aerodynamic forcing and turbulence closure are calibrated through LiDAR and SCADA data acquired for an onshore wind farm. The wind farm under examination is located in North Texas over a relatively flat terrain. The experimental data are leveraged to maximize accuracy of the RANS predictions in terms of wake velocity field and power capture for different atmospheric stability conditions and settings of the wind turbines. The optimization of the RANS parameters is performed through an adjoint-RANS formulation and a gradient-based procedure. The optimally-tuned aerodynamic forcing and turbulence closure are then analyzed in order to investigate effects of the atmospheric stability on the evolution of wind turbine wakes and power performance. The proposed RANS solver has low computational costs comparable to those of wake engineering models, which make it a compelling tool for wind farm control and optimization. Acknowledgments: NSF I/UCRC WindSTAR IIP 1362033 and TACC.

  13. The prevalence and nature of intellectual disability in Norwegian prisons.

    PubMed

    Søndenaa, E; Rasmussen, K; Palmstierna, T; Nøttestad, J

    2008-12-01

    The objective of the study was to calculate the prevalence of inmates with intellectual disabilities (ID), and identify historical, medical and criminological characteristics of a certain impact. A random sample of 143 inmates from a Norwegian prison cross sectional sample was studied. The Hayes Ability Screening Index (HASI) was validated with the Wechsler Abbreviated Scale of Intelligence (WASI). The prevalence of inmates with ID, IQ < 70, was 10.8%. Some essential characteristics of inmates with ID were more frequent medication for mental disorders, a higher number of imprisonments, less drug abuse and less education than the other inmates. The results indicated that the HASI is a valid tool for screening of ID for the Norwegian inmates. The prevalence of ID in Norwegian inmates is significant, measured by WASI and HASI. Identification, rehabilitation and care, concerning an intellectual handicap, are mostly absent in the Norwegian criminal justice system.

  14. Security analysis for biometric data in ID documents

    NASA Astrophysics Data System (ADS)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  15. ID card number detection algorithm based on convolutional neural network

    NASA Astrophysics Data System (ADS)

    Zhu, Jian; Ma, Hanjie; Feng, Jie; Dai, Leiyan

    2018-04-01

    In this paper, a new detection algorithm based on Convolutional Neural Network is presented in order to realize the fast and convenient ID information extraction in multiple scenarios. The algorithm uses the mobile device equipped with Android operating system to locate and extract the ID number; Use the special color distribution of the ID card, select the appropriate channel component; Use the image threshold segmentation, noise processing and morphological processing to take the binary processing for image; At the same time, the image rotation and projection method are used for horizontal correction when image was tilting; Finally, the single character is extracted by the projection method, and recognized by using Convolutional Neural Network. Through test shows that, A single ID number image from the extraction to the identification time is about 80ms, the accuracy rate is about 99%, It can be applied to the actual production and living environment.

  16. A data set for evaluating the performance of multi-class multi-object video tracking

    NASA Astrophysics Data System (ADS)

    Chakraborty, Avishek; Stamatescu, Victor; Wong, Sebastien C.; Wigley, Grant; Kearney, David

    2017-05-01

    One of the challenges in evaluating multi-object video detection, tracking and classification systems is having publically available data sets with which to compare different systems. However, the measures of performance for tracking and classification are different. Data sets that are suitable for evaluating tracking systems may not be appropriate for classification. Tracking video data sets typically only have ground truth track IDs, while classification video data sets only have ground truth class-label IDs. The former identifies the same object over multiple frames, while the latter identifies the type of object in individual frames. This paper describes an advancement of the ground truth meta-data for the DARPA Neovision2 Tower data set to allow both the evaluation of tracking and classification. The ground truth data sets presented in this paper contain unique object IDs across 5 different classes of object (Car, Bus, Truck, Person, Cyclist) for 24 videos of 871 image frames each. In addition to the object IDs and class labels, the ground truth data also contains the original bounding box coordinates together with new bounding boxes in instances where un-annotated objects were present. The unique IDs are maintained during occlusions between multiple objects or when objects re-enter the field of view. This will provide: a solid foundation for evaluating the performance of multi-object tracking of different types of objects, a straightforward comparison of tracking system performance using the standard Multi Object Tracking (MOT) framework, and classification performance using the Neovision2 metrics. These data have been hosted publically.

  17. Knowledge Management in Instructional Design. ERIC Digest.

    ERIC Educational Resources Information Center

    Spector, J. Michael; Edmonds, Gerald S.

    This digest reviews what instructional designers do, describes knowledge management, and indicates how knowledge management is influencing instructional design. The first section defines instructional design (ID) and briefly describes the ID process. The second section covers knowledge management (KM), including definitions of KM and systems,…

  18. Wind Advisory System

    NASA Technical Reports Server (NTRS)

    Curto, Paul A. (Inventor); Brown, Gerald E. (Inventor); Zysko, Jan A. (Inventor)

    2001-01-01

    The present invention is a two-part wind advisory system comprising a ground station at an airfield and an airborne unit placed inside an aircraft. The ground station monitors wind conditions (wind speed, wind direction, and wind gust) at the airfield and transmits the wind conditions and an airfield ID to the airborne unit. The airborne unit identifies the airfield by comparing the received airfield ID with airfield IDs stored in a database. The airborne unit also calculates the headwind and crosswind for each runway in both directions at the airfield using the received wind conditions and runway information stored in the database. The airborne unit then determines a recommended runway for takeoff and landing operations of the aircraft based on th runway having the greatest headwind value and displays the airfield ID, wind conditions, and recommended runway to the pilot. Another embodiment of the present invention includes a wireless internet based airborne unit in which the airborne unit can receive the wind conditions from the ground station over the internet.

  19. ACE insertion/deletion (I/D) polymorphism and diabetic nephropathy.

    PubMed

    Rahimi, Zohreh

    2012-10-01

    Angiotensin converting enzyme (ACE) gene encodes ACE, a key component of renin angiotensin system (RAS), plays an important role in blood pressure homeostasis by generating the vasoconstrictor peptide angiotensin II. Directory of Open Access Journals (DOAJ), Google Scholar, Pubmed (NLM), LISTA (EBSCO) and Web of Science have been searched. The presence of ACE insertion/deletion (I/D) polymorphism affects the plasma level of ACE. ACE DD genotype is associated with the highest systemic and renal ACE levels compared with the lowest ACE activity in carriers of II genotype. In this review focus has been performed on the study of ACE I/D polymorphism in various populations and its influence on the risk of onset and progression of diabetic nephropathy. Also, association between ACE I/D polymorphism and response to ACE inhibitor and angiotensin II receptor antagonists will be reviewed. Further, synergistic effect of this polymorphism and variants of some genes on the risk of development of diabetic nephropathy will be discussed.

  20. A large survey among European trainees in clinical microbiology and infectious disease on training systems and training adequacy: identifying the gaps and suggesting improvements.

    PubMed

    Yusuf, E; Ong, D S Y; Martin-Quiros, A; Skevaki, C; Cortez, J; Dedić, K; Maraolo, A E; Dušek, D; Maver, P J; Sanguinetti, M; Tacconelli, E

    2017-02-01

    The purpose of this investigation was to perform a survey among European clinical microbiology (CM) and infectious disease (ID) trainees on training satisfaction, training tools, and competency assessment. An online, anonymous survey in the English language was carried out between April and July 2015. There were 25 questions: seven in a 5-point Likert scale (1: worst scenario, 5: best scenario) and the remainder as closed multiple-choice questions in five areas (satisfaction, adequacy, system, mentorship, and evaluation of training). Included were 419 respondents (215 CM, 159 ID, and 45 combined CM/ID) from 31 European countries [mean age (standard deviation) 32.4 (5.3) years, 65.9 % women]. Regarding satisfaction on the training scheme, CM and ID scored 3.6 (0.9) and 3.2 (1.0), respectively. These scores varied between countries, ranging from 2.5 (1.0) for Italian ID to 4.3 (0.8) for Danish CM trainees. The majority of respondents considered training in management and health economics inadequate and e-learning and continuing medical education programs insufficient. Many trainees (65.3 % of CM and 62.9 % of ID) would like to have more opportunities to spend a part of their training abroad and expected their mentor to be more involved in helping with future career plans (63.5 % of CM and 53.4 % of ID) and practical skills (53.0 % of CM and 61.2 % of ID). Two-thirds of the respondents across the specialties agreed that a European exam should be developed, but half of them thought it should not be made mandatory. This survey shows high heterogeneity in training conditions in European countries, identifies perceived gaps in training, and suggests areas for improvements.

  1. Relationships between coordination, active drag and propelling efficiency in crawl.

    PubMed

    Seifert, Ludovic; Schnitzler, Christophe; Bideault, Gautier; Alberty, Morgan; Chollet, Didier; Toussaint, Huub Martin

    2015-02-01

    This study examines the relationships between the index of coordination (IdC) and active drag (D) assuming that at constant average speed, average drag equals average propulsion. The relationship between IdC and propulsive efficiency (ep) was also investigated at maximal speed. Twenty national swimmers completed two incremental speed tests swimming front crawl with arms only in free condition and using a measurement of active drag system. Each test was composed of eight 25-m bouts from 60% to 100% of maximal intensity whereby each lap was swum at constant speed. Different regression models were tested to analyse IdC-D relationship. Correlation between IdC and ep was calculated. IdC was linked to D by linear regression (IdC=0.246·D-27.06; R(2)=0.88, P<.05); swimmers switched from catch-up to superposition coordination mode at a speed of ∼1.55ms(-1) where average D is ∼110N. No correlation between IdC and ep at maximal speed was found. The intra-individual analysis revealed that coordination plays an important role in scaling propulsive forces with higher speed levels such that these are adapted to aquatic resistance. Inter-individual analysis showed that high IdC did not relate to a high ep suggesting an individual optimization of force and power generation is at play to reach high speeds. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. Comparison of two matrix-assisted laser desorption ionization-time of flight mass spectrometry systems for the identification of clinical filamentous fungi.

    PubMed

    Huang, Yanfei; Zhang, Mingxin; Zhu, Min; Wang, Mei; Sun, Yufeng; Gu, Haitong; Cao, Jingjing; Li, Xue; Zhang, Shaoya; Wang, Jinglin; Lu, Xinxin

    2017-07-01

    Infections caused by filamentous fungi have become a health concern, and require rapid and accurate identification in order for effective treatment of the pathogens. To compare the performance of two MALDI-TOF MS systems (Bruker Microflex LT and Xiamen Microtyper) in the identification of filamentous fungal species. A total of 374 clinical filamentous fungal isolates sequentially collected in the Clinical Laboratory at the Beijing Tongren Hospital between January 2014 and December 2015 were identified by traditional phenotypic methods, Bruker Microflex LT and Xiamen Microtyper MALDI-TOF MS, respectively. The discrepancy between these methods was resolved by sequencing for definitive identification. Bruker Microflex LT and Xiamen Microtyper had similar correct species ID (98.9 vs. 99.2%), genus ID (99.7 vs. 100%), mis-ID (0.3 vs. 0%) and no ID (0 vs. 0). The rate of correct species identification by both MALDI-TOF MS (98.9 and 99.2%, respectively) was much higher compared with phenotypic approach (91.9%). Both MALDI-TOF MS systems provide accurate identification of clinical filamentous fungi compared with conventional phenotypic method, and have the potential to replace identification for routine identification of these fungi in clinical mycology laboratories. Both systems have similar performance in the identification of clinical filamentous fungi.

  3. Ion flow measurements during the rotating kink behavior of the central column in the HIST device

    NASA Astrophysics Data System (ADS)

    Yamada, S.; Yoshikawa, T.; Hashimoto, S.; Nishioka, T.; Kikuchi, Y.; Fukumoto, N.; Nagata, M.

    2007-11-01

    Plasma flow is essentially driven in self-organization and magnetic reconnection process of compact spherical torus (ST) and spheromak in the helicity-driven systems. For example, when reversing the external toroidal field of ST, the direction not only of the plasma current but also of the toroidal ion flow is self-reversed during the formation of the flipped ST relaxed states. Mach probe measurement shows that the velocity of the ion flow reversed after the flip increases to about 20 km/s. We have been newly developing an ion Doppler spectrometer (IDS) system using a compact 16 or 64 channel photomultiplier tube (PMT) in order to measure the spatial profile of ion temperature and rotation velocity in the HIST device. The IDS system consists of a light collection system including optical fibers, 1 m-spectrometer and the PMT detector. The optical fibers covered with glass tubes are inserted into the plasma. The glass tubes can be rotated in the poloidal and the toroidal directions. The new IDS system will be applied to observations of ion temperature and plasma rotation in the flipped ST formation and in the MHD control of kinking behaviors of the central column by using the rotating magnetic field (RMF). Preliminary IDS results will be compared to those from Mach probe measurements in space.

  4. 75 FR 12974 - Establishment of Class E Airspace; Hailey, ID

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... airspace at Hailey, ID, to accommodate aircraft using the Area Navigation (RNAV) Global Positioning System (GPS) Standard Instrument Approach Procedure (SIAP) at Friedman Memorial Airport. This will improve the safety of Instrument Flight Rules (IFR) operations at the airport. DATES: Effective Date: 0901 UTC, June...

  5. Motion-Based System Identification and Fault Detection and Isolation Technologies for Thruster Controlled Spacecraft

    NASA Technical Reports Server (NTRS)

    Wilson, Edward; Sutter, David W.; Berkovitz, Dustin; Betts, Bradley J.; Kong, Edmund; delMundo, Rommel; Lages, Christopher R.; Mah, Robert W.; Papasin, Richard

    2003-01-01

    By analyzing the motions of a thruster-controlled spacecraft, it is possible to provide on-line (1) thruster fault detection and isolation (FDI), and (2) vehicle mass- and thruster-property identification (ID). Technologies developed recently at NASA Ames have significantly improved the speed and accuracy of these ID and FDI capabilities, making them feasible for application to a broad class of spacecraft. Since these technologies use existing sensors, the improved system robustness and performance that comes with the thruster fault tolerance and system ID can be achieved through a software-only implementation. This contrasts with the added cost, mass, and hardware complexity commonly required by FDI. Originally developed in partnership with NASA - Johnson Space Center to provide thruster FDI capability for the X-38 during re-entry, these technologies are most recently being applied to the MIT SPHERES experimental spacecraft to fly on the International Space Station in 2004. The model-based FDI uses a maximum-likelihood calculation at its core, while the ID is based upon recursive least squares estimation. Flight test results from the SPHERES implementation, as flown aboard the NASA KC-1 35A 0-g simulator aircraft in November 2003 are presented.

  6. idRHa+ProMod - Rail Hardening Control System

    NASA Astrophysics Data System (ADS)

    Ferro, L.

    2016-03-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl

  7. Annual audits of IDS risk contract settlements improve payment accuracy.

    PubMed

    Pearce, J W

    1999-12-01

    Integrated delivery systems (IDSs) should conduct annual audits of payers' settlements under risk contracts to verify that the payer attributed the appropriate amounts of revenue and charged the appropriate claims expenses to the IDS. In particular, IDSs should verify that payers calculated revenues and expenses based on consistent member counts and that the determined commercial revenue was based on the actual premiums paid. IDSs also should determine whether payers have used appropriate demographic factors and countywide rates as a basis for determining Medicare revenue, charged the IDS for claims only for valid members, paid capitated providers the correct capitation amounts, and used appropriate historical data to estimate the amounts of incurred-but-not-reported claims attributed to the IDS.

  8. Centralized Monitoring of the Microsoft Windows-based computers of the LHC Experiment Control Systems

    NASA Astrophysics Data System (ADS)

    Varela Rodriguez, F.

    2011-12-01

    The control system of each of the four major Experiments at the CERN Large Hadron Collider (LHC) is distributed over up to 160 computers running either Linux or Microsoft Windows. A quick response to abnormal situations of the computer infrastructure is crucial to maximize the physics usage. For this reason, a tool was developed to supervise, identify errors and troubleshoot such a large system. Although the monitoring of the performance of the Linux computers and their processes was available since the first versions of the tool, it is only recently that the software package has been extended to provide similar functionality for the nodes running Microsoft Windows as this platform is the most commonly used in the LHC detector control systems. In this paper, the architecture and the functionality of the Windows Management Instrumentation (WMI) client developed to provide centralized monitoring of the nodes running different flavour of the Microsoft platform, as well as the interface to the SCADA software of the control systems are presented. The tool is currently being commissioned by the Experiments and it has already proven to be very efficient optimize the running systems and to detect misbehaving processes or nodes.

  9. Sensor-enabled chem/bio contamination detection system dedicated to situational awareness of water distribution security status

    NASA Astrophysics Data System (ADS)

    Ginsberg, Mark D.; Smith, Eddy D.; VanBlaricum, Vicki; Hock, Vincent F.; Kroll, Dan; Russell, Kevin J.

    2010-04-01

    Both real events and models have proven that drinking water systems are vulnerable to deliberate and/or accidental contamination. Additionally, homeland security initiatives and modeling efforts have determined that it is relatively easy to orchestrate the contamination of potable water supplies. Such contamination can be accomplished with classic and non-traditional chemical agents, toxic industrial chemicals (TICs), and/or toxic industrial materials (TIMs). Subsequent research and testing has developed a proven network for detection and response to these threats. The method uses offthe- shelf, broad-spectrum analytical instruments coupled with advanced interpretive algorithms. The system detects and characterizes any backflow events involving toxic contaminants by employing unique chemical signature (fingerprint) response data. This instrumentation has been certified by the Office of Homeland Security for detecting deliberate and/or accidental contamination of critical water infrastructure. The system involves integration of several mature technologies (sensors, SCADA, dynamic models, and the HACH HST Guardian Blue instrumentation) into a complete, real-time, management system that also can be used to address other water distribution concerns, such as corrosion. This paper summarizes the reasons and results for installing such a distribution-based detection and protection system.

  10. Verbal Working Memory in Children with Mild Intellectual Disabilities

    ERIC Educational Resources Information Center

    Van der Molen, M. J.; Van Luit, J. E. H.; Jongmans, M. J.; Van der Molen, M. W.

    2007-01-01

    Background: Previous research into working memory of individuals with intellectual disabilities (ID) has established clear deficits. The current study examined working memory in children with mild ID (IQ 55-85) within the framework of the Baddeley model, fractionating working memory into a central executive and two slave systems, the phonological…

  11. Hospitalizations of Adults with Intellectual Disability in Academic Medical Centers

    ERIC Educational Resources Information Center

    Ailey, Sarah H.; Johnson, Tricia; Fogg, Louis; Friese, Tanya R.

    2014-01-01

    Individuals with intellectual disability (ID) represent a small but important group of hospitalized patients who often have complex health care needs. Individuals with ID experience high rates of hospitalization for ambulatory-sensitive conditions and high rates of hospitalizations in general, even when in formal community care systems; however,…

  12. National Plant Diagnostic Network, Taxonomic training videos: Introduction to AphID

    USDA-ARS?s Scientific Manuscript database

    Training is a critical part of aphid (Hemiptera: Aphididae) identification. This video provides visual instruction on the use of the expert system, AphID, for aphid examination and identification. The video demonstrates the use of different training modules that allow the user to gain familiarity wi...

  13. Effect of Refrigeration on Inoculated Micro-ID Strips

    PubMed Central

    Burdash, Nicholas M.; West, Marcia E.

    1981-01-01

    Since reading results after 4 h with the Micro-ID system is not always convenient, a study of 500 isolates indicated that identification at the species level is essentially unchanged when inoculated strips are refrigerated overnight and then incubated or incubated and then refrigerated overnight before reading. PMID:7026604

  14. Experimental Analysis of Diffraction Effects from a Segmented MEMS Deformable Mirror for a Closed Loop Adaptive Optics System

    DTIC Science & Technology

    2010-06-01

    different approaches were used to model MEMS OM as a grating in Zemax software. First, a 2D grating was directly modeled as a combination of two ID...method of modeling ~IEMS DM in Zemax was implemented by combining two ID gratings. Due to the fact that ZEl\\’IAX allows to easily use ID physical...optics shows thc far field diffractioll pattcrn, which in Zemax geometrical model shows up as distinct spots. each one corresponding to a specific

  15. Particular Biochemical Profiles for Enterohemorrhagic Escherichia coli O157:H7 Isolates on the ID 32E System

    PubMed Central

    Leclercq, Alexandre; Lambert, Bernard; Pierard, Denis; Mahillon, Jacques

    2001-01-01

    The ability of the ID 32E system to identify and discriminate 74 Escherichia coli O157 isolates among 106 E. coli non-O157 isolates was evaluated. The results showed atypical biochemical reactions but accurate identification at the species level and no unique biochemical profile numbers for E. coli O157, although these numbers were distinct from those of other serotypes. PMID:11230449

  16. Population-Based Prevalence of Intellectual Disability and Autism Spectrum Disorders in Western Australia: A Comparison With Previous Estimates.

    PubMed

    Bourke, Jenny; de Klerk, Nick; Smith, Timothy; Leonard, Helen

    2016-05-01

    To investigate the prevalence of intellectual disability (ID) and/or autism spectrum disorders (ASDs) in Western Australia (WA).A cohort of children born from 1983 to 2010 in WA with an ID and/or ASD were identified using the population-based IDEA (Intellectual Disability Exploring Answers) database, which ascertains cases through the Disability Services Commission (DSC) as well as education sources. Information on race, gender, mother's residence at birth and deaths was obtained through linkage to the Midwives Notification System and the Mortality Register. Diagnostic information on the cause of ID was obtained through review of medical records where available and children were classified as biomedical cause, ASD, or unknown cause.An overall prevalence of ID of 17.0/1000 livebirths (95% CI: 16.7, 17.4) showed an increase from the 10-year previous prevalence of 14.3/1000. The prevalence for mild or moderate ID was 15.0 (95% CI: 14.6, 15.3), severe ID was 1.2 (95% CI: 1.1, 1.3), and unknown level of ID was 0.9 (95% CI: 0.8, 1.0)/1000 livebirths. The prevalence for Aboriginal children was 39.0/1000 compared with 15.7/1000 for non-Aboriginal children, giving a prevalence ratio of 2.5 (95% CI: 2.4, 2.6). Prevalence of all ASD was 5.1/1000 of which 3.8/1000 had ASD and ID.The prevalence of ID has risen in WA over the last 10 years with most of this increase due to mild or moderate ID. Whilst the prevalence of ASD has also increased over this time this does not fully explain the observed increase. Aboriginal children are at a 2.5-fold risk of ID but are less likely to be accessing disability services.

  17. Defense system shortcuts and limits of scope.

    PubMed

    Rewald, E; Francischetti, M M

    2000-10-01

    Defense, as a key factor of life, shares the biological tendencies of simplicity and energy saving. We propose that, like the mind, defense tends to rely on shortcuts via immune memes. Also, response repetition may induce the formation of virtual 'modules' [toolkits] to simplify and perfect performance. Engaged modules may expand by proliferating or by capturing immune components from the 'dormant' and even perhaps from active ones. With regard to recovery and/or survival, complexity of the integrated defense system (IDS) (1) requires to be inside of what we call the 'functional window'. In contrast to the physiological and common disease repair, energy is squandered when IDS perceives real danger. Our concern is the uncertain transition to conditions that do not fit into the IDS routine and, even worse, that are outside the functional window where the system is lacking. Copyright 2000 Harcourt Publishers Ltd.

  18. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  19. The association between autism spectrum disorders and congenital anomalies by organ systems in a Finnish national birth cohort.

    PubMed

    Timonen-Soivio, Laura; Sourander, Andre; Malm, Heli; Hinkka-Yli-Salomäki, Susanna; Gissler, Mika; Brown, Alan; Vanhala, Raija

    2015-10-01

    The aim of this study was to evaluate the association between autism spectrum disorders (ASD) with and without intellectual disability (ID) and congenital anomalies (CAs) by organ system. The sample included all children diagnosed with ASD (n = 4441) from the Finnish Hospital Discharge Register during 1987-2000 and a total of four controls per case (n = 17,695). CAs of the eye, central nervous system, and specific craniofacial anomalies were most strongly associated with ASD. Children with ASD and co-occurring ID were more likely to have CAs compared to ASD children without ID. The results suggest that some cases of ASD may originate during organogenesis, in the early first trimester of pregnancy. The results of this study may be useful for identifying prenatal etiological factors and elucidating the molecular pathogenesis of ASD.

  20. Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN

    NASA Astrophysics Data System (ADS)

    Lee, Kijeong; Park, Byungjoo; Park, Gil-Cheol

    Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. However, there are security threats in the RFID system related to its technical components. For example, illegal RFID tag readers can read tag ID and recognize most RFID Readers, a security threat that needs in-depth attention. Previous studies show some ideas on how to minimize these security threats like studying the security protocols between tag, reader and Back-end DB. In this research, the team proposes an RFID Tag ID Subdivision Scheme to authenticate the permitted tag only in USN (Ubiquitous Sensor Network). Using the proposed scheme, the Back-end DB authenticates selected tags only to minimize security threats like eavesdropping and decreasing traffic in Back-end DB.

  1. Detector Control System for the AFP detector in ATLAS experiment at CERN

    NASA Astrophysics Data System (ADS)

    Banaś, E.; Caforio, D.; Czekierda, S.; Hajduk, Z.; Olszowska, J.; Seabra, L.; Šícho, P.

    2017-10-01

    The ATLAS Forward Proton (AFP) detector consists of two forward detectors located at 205 m and 217 m on either side of the ATLAS experiment. The aim is to measure the momenta and angles of diffractively scattered protons. In 2016, two detector stations on one side of the ATLAS interaction point were installed and commissioned. The detector infrastructure and necessary services were installed and are supervised by the Detector Control System (DCS), which is responsible for the coherent and safe operation of the detector. A large variety of used equipment represents a considerable challenge for the AFP DCS design. Industrial Supervisory Control and Data Acquisition (SCADA) product Siemens WinCCOA, together with the CERN Joint Control Project (JCOP) framework and standard industrial and custom developed server applications and protocols are used for reading, processing, monitoring and archiving of the detector parameters. Graphical user interfaces allow for overall detector operation and visualization of the detector status. Parameters, important for the detector safety, are used for alert generation and interlock mechanisms.

  2. Comparison of visual and electronic devices for individual identification of dromedary camels under different farming conditions.

    PubMed

    Caja, G; Díaz-Medina, E; Salama, A A K; Salama, O A E; El-Shafie, M H; El-Metwaly, H A; Ayadi, M; Aljumaah, R S; Alshaikh, M A; Yahyahoui, M H; Seddik, M M; Hammadi, M; Khorchani, T; Amann, O; Cabrera, S

    2016-08-01

    The camel industry uses traditional (i.e., iron brands and ear tags) and modern (i.e., microchips) identification (ID) systems without having performance results of reference. Previously iron-branded ( = 45; 1 yr) and microchipped ( = 59; 7 yr) camels showed problems of healing (8.6% of brands) and reading (only 42.9% of brands and 69.5% of microchips were readable), which made their use inadvisable. With the aim of proposing suitable ID systems for different farming conditions, an on-field study was performed using a total of 528 dromedaries at 4 different locations (Egypt, = 83; Spain, = 304; Saudi Arabia, = 90; and Tunisia, = 51). The ID devices tested were visual (button ear tags, 28.5 mm diameter, = 178; double flag ear tags, 50 by 15 mm, = 83; both made of polyurethane) and electronic (ear tags, = 90, and rumen boluses, = 555). Electronic ear tags were polyurethane-loop type (75 by 9 mm) with a container in which a 22-mm transponder of full-duplex technology was lodged. Electronic boluses of 7 types, varying in dimensions (50 to 76 mm length, 11 to 21 mm width, and 12.7 to 82.1 g weight) and specific gravity (SG; 1.49 to 3.86) and each of them containing a 31-mm transponder of half-duplex technology, were all administered to the dromedaries at the beginning of the study. When a low-SG bolus was lost, a high-SG bolus was readministered. Readability rates of each ID system were evaluated during 1 to 3 yr, according to device and location, and yearly values were estimated for comparison. On a yearly basis, visual ear tag readability was not fully satisfactory; it was lower for rectangular ear tags (66.3%) than for button ear tags (80.9%). Yearly readability of electronic ear tags was 93.7%. Bolus readability dramatically varied according to their SG; the SG < 2.0 boluses were fully lost after 8 mo. In contrast, the SG > 3.0 boluses were efficiently retained (99.6 to 100%) at all locations. In conclusion, according to the expected long lifespan of camels, low ID performances were observed for iron brands, injectable microchips, and ear tags (visual and electronic), making their use inadvisable as unique ID systems in camels. The high readability of dense electronic boluses recommended their use as a permanent ID device of reference in camels.

  3. Wearable Sensor Localization Considering Mixed Distributed Sources in Health Monitoring Systems

    PubMed Central

    Wan, Liangtian; Han, Guangjie; Wang, Hao; Shu, Lei; Feng, Nanxing; Peng, Bao

    2016-01-01

    In health monitoring systems, the base station (BS) and the wearable sensors communicate with each other to construct a virtual multiple input and multiple output (VMIMO) system. In real applications, the signal that the BS received is a distributed source because of the scattering, reflection, diffraction and refraction in the propagation path. In this paper, a 2D direction-of-arrival (DOA) estimation algorithm for incoherently-distributed (ID) and coherently-distributed (CD) sources is proposed based on multiple VMIMO systems. ID and CD sources are separated through the second-order blind identification (SOBI) algorithm. The traditional estimating signal parameters via the rotational invariance technique (ESPRIT)-based algorithm is valid only for one-dimensional (1D) DOA estimation for the ID source. By constructing the signal subspace, two rotational invariant relationships are constructed. Then, we extend the ESPRIT to estimate 2D DOAs for ID sources. For DOA estimation of CD sources, two rational invariance relationships are constructed based on the application of generalized steering vectors (GSVs). Then, the ESPRIT-based algorithm is used for estimating the eigenvalues of two rational invariance matrices, which contain the angular parameters. The expressions of azimuth and elevation for ID and CD sources have closed forms, which means that the spectrum peak searching is avoided. Therefore, compared to the traditional 2D DOA estimation algorithms, the proposed algorithm imposes significantly low computational complexity. The intersecting point of two rays, which come from two different directions measured by two uniform rectangle arrays (URA), can be regarded as the location of the biosensor (wearable sensor). Three BSs adopting the smart antenna (SA) technique cooperate with each other to locate the wearable sensors using the angulation positioning method. Simulation results demonstrate the effectiveness of the proposed algorithm. PMID:26985896

  4. Wearable Sensor Localization Considering Mixed Distributed Sources in Health Monitoring Systems.

    PubMed

    Wan, Liangtian; Han, Guangjie; Wang, Hao; Shu, Lei; Feng, Nanxing; Peng, Bao

    2016-03-12

    In health monitoring systems, the base station (BS) and the wearable sensors communicate with each other to construct a virtual multiple input and multiple output (VMIMO) system. In real applications, the signal that the BS received is a distributed source because of the scattering, reflection, diffraction and refraction in the propagation path. In this paper, a 2D direction-of-arrival (DOA) estimation algorithm for incoherently-distributed (ID) and coherently-distributed (CD) sources is proposed based on multiple VMIMO systems. ID and CD sources are separated through the second-order blind identification (SOBI) algorithm. The traditional estimating signal parameters via the rotational invariance technique (ESPRIT)-based algorithm is valid only for one-dimensional (1D) DOA estimation for the ID source. By constructing the signal subspace, two rotational invariant relationships are constructed. Then, we extend the ESPRIT to estimate 2D DOAs for ID sources. For DOA estimation of CD sources, two rational invariance relationships are constructed based on the application of generalized steering vectors (GSVs). Then, the ESPRIT-based algorithm is used for estimating the eigenvalues of two rational invariance matrices, which contain the angular parameters. The expressions of azimuth and elevation for ID and CD sources have closed forms, which means that the spectrum peak searching is avoided. Therefore, compared to the traditional 2D DOA estimation algorithms, the proposed algorithm imposes significantly low computational complexity. The intersecting point of two rays, which come from two different directions measured by two uniform rectangle arrays (URA), can be regarded as the location of the biosensor (wearable sensor). Three BSs adopting the smart antenna (SA) technique cooperate with each other to locate the wearable sensors using the angulation positioning method. Simulation results demonstrate the effectiveness of the proposed algorithm.

  5. Commissioning of the synchrotron radiation protection system and beamlines frontends at NSLS-II

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seletskiy, S., E-mail: seletskiy@bnl.gov; Amundsen, C.; Choi, J.

    2016-07-27

    The first eight insertion devices (IDs) at the NSLS-II were commissioned during the fall run of 2014. In this paper we discuss commissioning of the synchrotron radiation protection (SRP) system and beamline frontends (FE) for the respective IDs. We describe the diagnostics utilized if FE commissioning and a procedure that was used for the alignment of the photon beam from insertion devices in the beamline frontends. Then we discuss the current status of the SRP system and operation of the commissioned frontends.

  6. `Membership Has Its Privileges': Status Incentives and Categorical Inequality in Education

    PubMed Central

    Domina, Thurston; Penner, Andrew M.; Penner, Emily K.

    2015-01-01

    Prizes – formal systems that publicly allocate rewards for exemplary behavior – play an increasingly important role in a wide array of social settings, including education. In this paper, we evaluate a prize system designed to boost achievement at two high schools by assigning students color-coded ID cards based on a previously low stakes test. Average student achievement on this test increased in the ID card schools beyond what one would expect from contemporaneous changes in neighboring schools. However, regression discontinuity analyses indicate that the program created new inequalities between students who received low-status and high-status ID cards. These findings indicate that status-based incentives create categorical inequalities between prize winners and others even as they reorient behavior toward the goals they reward. PMID:27213170

  7. Making public mental-health services accessible to deaf consumers: Illinois Deaf Services 2000.

    PubMed

    Munro-Ludders, Bruce; Simpatico, Thomas; Zvetina, Daria

    2004-01-01

    Illinois Deaf Services 2000 (IDS2000), a public/private partnership, promotes the creation and implementation of strategies to develop and increase access to mental health services for deaf, hard of hearing, late-deafened, and deaf-blind consumers. IDS2000 has resulted in the establishment of service accessibility standards, a technical support and adherence monitoring system, and the beginnings of a statewide telepsychiatry service. These system modifications have resulted in increase by 60% from baseline survey data in the number of deaf, hard of hearing, late-deafened, and deaf-blind consumers identified in community mental-health agencies in Illinois. Depending on the situation of deaf services staff and infrastructure, much of IDS2000 could be replicated in other states in a mostly budget-neutral manner.

  8. Programmable logic controller optical fibre sensor interface module

    NASA Astrophysics Data System (ADS)

    Allwood, Gary; Wild, Graham; Hinckley, Steven

    2011-12-01

    Most automated industrial processes use Distributed Control Systems (DCSs) or Programmable Logic Controllers (PLCs) for automated control. PLCs tend to be more common as they have much of the functionality of DCSs, although they are generally cheaper to install and maintain. PLCs in conjunction with a human machine interface form the basis of Supervisory Control And Data Acquisition (SCADA) systems, combined with communication infrastructure and Remote Terminal Units (RTUs). RTU's basically convert different sensor measurands in to digital data that is sent back to the PLC or supervisory system. Optical fibre sensors are becoming more common in industrial processes because of their many advantageous properties. Being small, lightweight, highly sensitive, and immune to electromagnetic interference, means they are an ideal solution for a variety of diverse sensing applications. Here, we have developed a PLC Optical Fibre Sensor Interface Module (OFSIM), in which an optical fibre is connected directly to the OFSIM located next to the PLC. The embedded fibre Bragg grating sensors, are highly sensitive and can detect a number of different measurands such as temperature, pressure and strain without the need for a power supply.

  9. Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC

    NASA Technical Reports Server (NTRS)

    Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet

    1999-01-01

    The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.

  10. Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC

    NASA Technical Reports Server (NTRS)

    Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet

    1998-01-01

    The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.

  11. Culture Representation in Human Reliability Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David Gertman; Julie Marble; Steven Novack

    Understanding human-system response is critical to being able to plan and predict mission success in the modern battlespace. Commonly, human reliability analysis has been used to predict failures of human performance in complex, critical systems. However, most human reliability methods fail to take culture into account. This paper takes an easily understood state of the art human reliability analysis method and extends that method to account for the influence of culture, including acceptance of new technology, upon performance. The cultural parameters used to modify the human reliability analysis were determined from two standard industry approaches to cultural assessment: Hofstede’s (1991)more » cultural factors and Davis’ (1989) technology acceptance model (TAM). The result is called the Culture Adjustment Method (CAM). An example is presented that (1) reviews human reliability assessment with and without cultural attributes for a Supervisory Control and Data Acquisition (SCADA) system attack, (2) demonstrates how country specific information can be used to increase the realism of HRA modeling, and (3) discusses the differences in human error probability estimates arising from cultural differences.« less

  12. Diagnoses, Labels and Stereotypes: Supporting Children with Intellectual Disabilities in the Hospital

    ERIC Educational Resources Information Center

    Aston, Megan; Breau, Lynn; MacLeod, Emily

    2014-01-01

    Children with intellectual disabilities (IDs) and their parents continue to experience stigma within health-care systems. Whilst some research studies have examined the stigma associated with children who have IDs, there continues to be a gap in understanding how the experiences of these children, their parents and nurses have been constructed…

  13. Intellectual Disability and Developmental Risk: Promoting Intervention to Improve Child and Family Well-Being

    ERIC Educational Resources Information Center

    Crnic, Keith A.; Neece, Cameron L.; McIntyre, Laura Lee; Blacher, Jan; Baker, Bruce L.

    2017-01-01

    Initial intervention processes for children with intellectual disabilities (IDs) largely focused on direct efforts to impact core cognitive and academic deficits associated with the diagnosis. Recent research on risk processes in families of children with ID, however, has influenced new developmental system approaches to early intervention. Recent…

  14. Commissioning and Operational Experience with 1 kW Class Helium Refrigerator/Liquefier for SST-1

    NASA Astrophysics Data System (ADS)

    Dhard, C. P.; Sarkar, B.; Misra, Ruchi; Sahu, A. K.; Tanna, V. L.; Tank, J.; Panchal, P.; Patel, J. C.; Phadke, G. D.; Saxena, Y. C.

    2004-06-01

    The helium refrigerator/liquefier (R/L) for the Steady State Super conducting Tokamak (SST-1) has been developed with very stringent specifications for the different operational modes. The total refrigeration capacity is 650 W at 4.5 K and liquefaction capacity of 200 l/h. A cold circulation pump is used for the forced flow cooling of 300 g/s supercritical helium (SHe) for the magnet system (SCMS). The R/L has been designed also to absorb a 200 W transient heat load of the SCMS. The plant consists of a compressor station, oil removal system, on-line purifier, Main Control Dewar (MCD) with associated heat exchangers, cold circulation pump and warm gas management system. An Integrated Flow Control and Distribution System (IFDCS) has been designed, fabricated and installed for distribution of SHe in the toroidal and poloidal field coils as well as liquid helium for cooling of 10 pairs of current leads. A SCADA based control system has been designed using PLC for R/L as well as IFDCS. The R/L has been commissioned and required parameters were achieved confirming to the process. All the test results and commissioning experiences are discussed in this paper.

  15. RNA-ID, a Powerful Tool for Identifying and Characterizing Regulatory Sequences.

    PubMed

    Brule, C E; Dean, K M; Grayhack, E J

    2016-01-01

    The identification and analysis of sequences that regulate gene expression is critical because regulated gene expression underlies biology. RNA-ID is an efficient and sensitive method to discover and investigate regulatory sequences in the yeast Saccharomyces cerevisiae, using fluorescence-based assays to detect green fluorescent protein (GFP) relative to a red fluorescent protein (RFP) control in individual cells. Putative regulatory sequences can be inserted either in-frame or upstream of a superfolder GFP fusion protein whose expression, like that of RFP, is driven by the bidirectional GAL1,10 promoter. In this chapter, we describe the methodology to identify and study cis-regulatory sequences in the RNA-ID system, explaining features and variations of the RNA-ID reporter, as well as some applications of this system. We describe in detail the methods to analyze a single regulatory sequence, from construction of a single GFP variant to assay of variants by flow cytometry, as well as modifications required to screen libraries of different strains simultaneously. We also describe subsequent analyses of regulatory sequences. © 2016 Elsevier Inc. All rights reserved.

  16. Effects of extending the one-more-than technique with the support of a mobile purchasing assistance system.

    PubMed

    Hsu, Guo-Liang; Tang, Jung-Chang; Hwang, Wu-Yuin

    2014-08-01

    The one-more-than technique is an effective strategy for individuals with intellectual disabilities (ID) to use when making purchases. However, the heavy cognitive demands of money counting skills potentially limit how individuals with ID shop. This study employed a multiple-probe design across participants and settings, via the assistance of a mobile purchasing assistance system (MPAS), to assess the effectiveness of the one-more-than technique on independent purchases for items with prices beyond the participants' money counting skills. Results indicated that the techniques with the MPAS could effectively convert participants' initial money counting problems into useful advantages for successfully promoting the independent purchasing skills of three secondary school students with ID. Also noteworthy is the fact that mobile technologies could be a permanent prompt for those with ID to make purchases in their daily lives. The treatment effects could be maintained for eight weeks and generalized across three community settings. Implications for practice and future studies are provided. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Machine Learning Techniques for Prediction of Early Childhood Obesity.

    PubMed

    Dugan, T M; Mukhopadhyay, S; Carroll, A; Downs, S

    2015-01-01

    This paper aims to predict childhood obesity after age two, using only data collected prior to the second birthday by a clinical decision support system called CHICA. Analyses of six different machine learning methods: RandomTree, RandomForest, J48, ID3, Naïve Bayes, and Bayes trained on CHICA data show that an accurate, sensitive model can be created. Of the methods analyzed, the ID3 model trained on the CHICA dataset proved the best overall performance with accuracy of 85% and sensitivity of 89%. Additionally, the ID3 model had a positive predictive value of 84% and a negative predictive value of 88%. The structure of the tree also gives insight into the strongest predictors of future obesity in children. Many of the strongest predictors seen in the ID3 modeling of the CHICA dataset have been independently validated in the literature as correlated with obesity, thereby supporting the validity of the model. This study demonstrated that data from a production clinical decision support system can be used to build an accurate machine learning model to predict obesity in children after age two.

  18. Biodistribution and Pharmacokinetics of EGFR-Targeted Thiolated Gelatin Nanoparticles Following Systemic Administration in Pancreatic Tumor-Bearing Mice

    PubMed Central

    Xu, Jing; Gattacceca, Florence; Amiji, Mansoor

    2013-01-01

    The objective of this study was to evaluate qualitative and quantitative biodistribution of epidermal growth factor receptor (EGFR)-targeted thiolated type B gelatin nanoparticles in vivo in a subcutaneous human pancreatic adenocarcinoma (Panc-1) bearing female SCID Beige mice. EGFR-targeted nanoparticles showed preferential and sustained accumulation in the tumor mass, especially at early time points. Higher blood concentrations and higher tumor accumulations were observed with PEG-modified and EGFR-targeted nanoparticles during the study (AUClast: 17.38 and 19.56 %ID/mL*h in blood, 187 and 322 %ID/g*h in tumor for PEG-modified and EGFR-targeted nanoparticles, respectively), as compared to control, unmodified particles (AUClast: 10.71 %ID/mL*h in blood and 138 %ID/g*h in tumor). EGFR-targeted nanoparticles displayed almost twice tumor targeting efficiency than either PEG-modified or the unmodified nanoparticles, highlighting the efficacy of the active targeting strategy. In conclusion, this study shows that EGFR-targeted and PEG-modified nanoparticles were suitable vehicles for specific systemic delivery in subcutaneous Panc-1 tumor xenograft models. PMID:23544877

  19. Biodistribution and pharmacokinetics of EGFR-targeted thiolated gelatin nanoparticles following systemic administration in pancreatic tumor-bearing mice.

    PubMed

    Xu, Jing; Gattacceca, Florence; Amiji, Mansoor

    2013-05-06

    The objective of this study was to evaluate qualitative and quantitative biodistribution of epidermal growth factor receptor (EGFR)-targeted thiolated type B gelatin nanoparticles in vivo in subcutaneous human pancreatic adenocarcinoma (Panc-1) bearing female SCID Beige mice. EGFR-targeted nanoparticles showed preferential and sustained accumulation in the tumor mass, especially at early time points. Higher blood concentrations and higher tumor accumulations were observed with PEG-modified and EGFR-targeted nanoparticles during the study (AUClast: 17.38 and 19.56%ID/mL·h in blood, 187 and 322%ID/g·h in tumor for PEG-modified and EGFR-targeted nanoparticles, respectively), as compared to control, unmodified particles (AUClast: 10.71%ID/mL·h in blood and 138%ID/g·h in tumor). EGFR-targeted nanoparticles displayed almost twice tumor targeting efficiency than either PEG-modified or the unmodified nanoparticles, highlighting the efficacy of the active targeting strategy. In conclusion, this study shows that EGFR-targeted and PEG-modified nanoparticles were suitable vehicles for specific systemic delivery in subcutaneous Panc-1 tumor xenograft models.

  20. Bioinformatic Analysis of the Human Recombinant Iduronate 2-Sulfate Sulfatase

    PubMed Central

    Morales-Álvarez, Edwin D.; Rivera-Hoyos, Claudia M.; Landázuri, Patricia; Poutou-Piñales, Raúl A.; Pedroza-Rodríguez, Aura M.

    2016-01-01

    Mucopolysaccharidosis type II is a human recessive disease linked to the X chromosome caused by deficiency of lysosomal enzyme Iduronate 2-Sulfate Sulfatase (IDS), which leads to accumulation of glycosaminoglycans in tissues and organs. The human enzyme has been expressed in Escherichia coli and Pichia pastoris in attempt to develop more successful expression systems that allow the production of recombinant IDS for Enzyme Replacement Therapy (ERT). However, the preservation of native signal peptide in the sequence has caused conflicts in processing and recognition in the past, which led to problems in expression and enzyme activity. With the main object being the improvement of the expression system, we eliminate the native signal peptide of human recombinant IDS. The resulting sequence showed two modified codons, thus, our study aimed to analyze computationally the nucleotide sequence of the IDSnh without signal peptide in order to determine the 3D structure and other biochemical properties to compare them with the native human IDS (IDSnh). Results showed that there are no significant differences between both molecules in spite of the two-codon modifications detected in the recombinant DNA sequence. PMID:27335624

  1. Infectious Disease Hospitalizations Among American Indian/Alaska Native and Non–American Indian/Alaska Native Persons in Alaska, 2010-2011

    PubMed Central

    Holman, Robert C.; Seeman, Sara M.; Rarig, Alice J.; McEwen, Mary; Steiner, Claudia A.; Bartholomew, Michael L.; Hennessy, Thomas W.

    2016-01-01

    Objective: Reports about infectious disease (ID) hospitalization rates among American Indian/Alaska Native (AI/AN) persons have been constrained by data limited to the tribal health care system and by comparisons with the general US population. We used a merged state database to determine ID hospitalization rates in Alaska. Methods: We combined 2010 and 2011 hospital discharge data from the Indian Health Service and the Alaska State Inpatient Database. We used the merged data set to calculate average annual age-adjusted and age-specific ID hospitalization rates for AI/AN and non-AI/AN persons in Alaska. We stratified the ID hospitalization rates by sex, age, and ID diagnosis. Results: ID diagnoses accounted for 19% (6501 of 34 160) of AI/AN hospitalizations, compared with 12% (7397 of 62 059) of non-AI/AN hospitalizations. The average annual age-adjusted hospitalization rate was >3 times higher for AI/AN persons (2697 per 100 000 population) than for non-AI/AN persons (730 per 100 000 population; rate ratio = 3.7, P < .001). Lower respiratory tract infection (LRTI), which occurred in 38% (2486 of 6501) of AI/AN persons, was the most common reason for ID hospitalization. AI/AN persons were significantly more likely than non-AI/AN persons to be hospitalized for LRTI (rate ratio = 5.2, P < .001). Conclusions: A substantial disparity in ID hospitalization rates exists between AI/AN and non-AI/AN persons, and the most common reason for ID hospitalization among AI/AN persons was LRTI. Public health programs and policies that address the risk factors for LRTI are likely to benefit AI/AN persons. PMID:28005485

  2. God, the Devil, and Darwin - A Critique of Intelligent Design Theory

    NASA Astrophysics Data System (ADS)

    Shanks, Niall

    2007-03-01

    In the last fifteen years a controversial new theory of the origins of biological complexity and the nature of the universe has been fomenting bitter debates in education and science policy across North America, Europe, and Australia. Backed by intellectuals at respectable universities, Intelligent Design theory (ID) proposes an alternative to accepted accounts of evolutionary theory: that life is so complex, and that the universe is so fine-tuned for the appearance of life, that the only plausible explanation is the existence of an intelligent designer. For many ID theorists, the designer is taken to be the god of Christianity. Niall Shanks has written the first accessible introduction to, and critique of, this controversial new intellectual movement. Shanks locates the growth of ID in the last two decades of the twentieth century in the growing influence of the American religious right. But as he shows, its roots go back beyond Aquinas to Ancient Greece. After looking at the historical roots of ID, Shanks takes a hard look at its intellectual underpinnings, discussing modern understandings of thermodynamics, and how self-organizing processes lead to complex physical, chemical, and biological systems. He considers cosmological arguments for ID rooted in so-called "anthropic coincidences" and also tackles new biochemical arguments for ID based on "irreducible biological complexity." Throughout he shows how arguments for ID lack cohesion, rest on errors and unfounded suppositions, and generally are grossly inferior to evolutionary explanations. While ID has been proposed as a scientific alternative to evolutionary biology, Shanks argues that ID is in fact "old creationist wine in new designer label bottles" and moreover is a serious threat to the scientific and democratic values that are our cultural and intellectual inheritance from the Enlightenment.

  3. Technology Catalogue. First edition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-02-01

    The Department of Energy`s Office of Environmental Restoration and Waste Management (EM) is responsible for remediating its contaminated sites and managing its waste inventory in a safe and efficient manner. EM`s Office of Technology Development (OTD) supports applied research and demonstration efforts to develop and transfer innovative, cost-effective technologies to its site clean-up and waste management programs within EM`s Office of Environmental Restoration and Office of Waste Management. The purpose of the Technology Catalogue is to provide performance data on OTD-developed technologies to scientists and engineers assessing and recommending technical solutions within the Department`s clean-up and waste management programs, asmore » well as to industry, other federal and state agencies, and the academic community. OTD`s applied research and demonstration activities are conducted in programs referred to as Integrated Demonstrations (IDs) and Integrated Programs (IPs). The IDs test and evaluate.systems, consisting of coupled technologies, at specific sites to address generic problems, such as the sensing, treatment, and disposal of buried waste containers. The IPs support applied research activities in specific applications areas, such as in situ remediation, efficient separations processes, and site characterization. The Technology Catalogue is a means for communicating the status. of the development of these innovative technologies. The FY93 Technology Catalogue features technologies successfully demonstrated in the field through IDs and sufficiently mature to be used in the near-term. Technologies from the following IDs are featured in the FY93 Technology Catalogue: Buried Waste ID (Idaho National Engineering Laboratory, Idaho); Mixed Waste Landfill ID (Sandia National Laboratories, New Mexico); Underground Storage Tank ID (Hanford, Washington); Volatile organic compound (VOC) Arid ID (Richland, Washington); and VOC Non-Arid ID (Savannah River Site, South Carolina).« less

  4. Novel ID-based anti-collision approach for RFID

    NASA Astrophysics Data System (ADS)

    Zhang, De-Gan; Li, Wen-Bin

    2016-09-01

    Novel correlation ID-based (CID) anti-collision approach for RFID under the banner of the Internet of Things (IOT) has been presented in this paper. The key insights are as follows: according to the deterministic algorithms which are based on the binary search tree, we propose a method to increase the association between tags so that tags can initiatively send their own ID under certain trigger conditions, at the same time, we present a multi-tree search method for querying. When the number of tags is small, by replacing the actual ID with the temporary ID, it can greatly reduce the number of times that the reader reads and writes to tag's ID. Active tags send data to the reader by the way of modulation binary pulses. When applying this method to the uncertain ALOHA algorithms, the reader can determine the locations of the empty slots according to the position of the binary pulse, so it can avoid the decrease in efficiency which is caused by reading empty slots when reading slots. Theory and experiment show that this method can greatly improve the recognition efficiency of the system when applied to either the search tree or the ALOHA anti-collision algorithms.

  5. Spatio-temporal dynamics of security investments in an interdependent risk environment

    NASA Astrophysics Data System (ADS)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  6. A case control association study of ACE gene polymorphism (I/D) with hypertension in Punjabi population from Faisalabad, Pakistan.

    PubMed

    Hussain, Misbah; Awan, Fazli Rabbi; Gujjar, Amna; Hafeez, Shakir; Islam, Mehboob

    2018-01-01

    Angiotensin converting enzyme (ACE) is a key component of renin angiotensin aldosterone system. It converts angiotensin I to angiotensin II. Insertion/deletion (I/D) polymorphism of ACE gene is found associated with several complications. However, its association with hypertension and related metabolic diseases is still controversial. So, the aim of the present study was to check this association for Punjabi population from Faisalabad, Pakistan. For this purpose, blood samples (patients = 100, controls = 48) were collected and several biochemical parameters were measured. Genotyping for ACE (I/D) polymorphism was performed by polymerase chain reaction (PCR) assay. ID genotype is found prevalent in the studied population as 41% in control subjects and 61% in patients. Furthermore, chi-square analysis showed significant (p = 0.005) difference for genotypic frequencies between both groups. One-way ANOVA for association of II, ID, and DD genotypes with anthropometric, clinical, and biochemical parameters showed that in patient group, DD genotype is significantly (p = 0.041) associated with systolic blood pressure (SBP). Moreover, ID genotype is found associated with the presence of cardiovascular diseases. This study concludes that DD genotype is strongly associated with higher SBP in hypertensive patients.

  7. Removal of heavy metal species from industrial sludge with the aid of biodegradable iminodisuccinic acid as the chelating ligand.

    PubMed

    Wu, Qing; Duan, Gaoqi; Cui, Yanrui; Sun, Jianhui

    2015-01-01

    High level of heavy metals in industrial sludge was the obstacle of sludge disposal and resource recycling. In this study, iminodisuccinic acid (IDS), a biodegradable chelating ligand, was used to remove heavy metals from industrial sludge generated from battery industry. The extraction of cadmium, copper, nickel, and zinc from battery sludge with aqueous solution of IDS was studied under various conditions. It was found that removal efficiency greatly depends on pH, chelating agent's concentration, as well as species distribution of metals. The results showed that mildly acidic and neutral systems were not beneficial to remove cadmium. About 68 % of cadmium in the sample was extracted at the molar ratio of IDS to heavy metals 7:1 without pH adjustment (pH 11.5). Copper of 91.3 % and nickel of 90.7 % could be removed by IDS (molar ratio, IDS: metals = 1:1) with 1.2 % phosphoric acid effectively. Removal efficiency of zinc was very low throughout the experiment. Based on the experimental results, IDS could be a potentially useful chelant for heavy metal removal from battery industry sludge.

  8. One vs two primary LOX feedline configuration study for the National Launch System

    NASA Technical Reports Server (NTRS)

    Dill, K.; Davis, D.; Bates, R.; Tarwater, R.

    1992-01-01

    Six single LOX feedline designs were evaluated for use on the National Launch Vehicle. A single feedline design, designated the 'Spider', was chosen and compared to the baseline system. The baseline configuration employs two 20-inch I.D. lines, each supplying LOX to three 650,000 lbf thrust Space Transportation Main Engines. Five single feedline diameters were examined for the spider configuration; 22, 24, 26, 28, and 30-inch I.D. System dry weights and LOX residuals were estimated. These parameters, along with calculated staged mass for the different single line and baseline configurations, were used to calculate the payload mass to orbit. For the cases where LOX is drained to minimum NPSP conditions, none of the single lines performed as well as the dual line system, although the 22-inch diameter single line compared well. However, for the cases where LOX is drained to operating levels (LOX level at the booster and spider manifolds for the dual and single line configurations, respectively), the 22 - 26-inch I.D. single line systems show a greater payload capability.

  9. Development of a Robust star identification technique for use in attitude determination of the ACE spacecraft

    NASA Technical Reports Server (NTRS)

    Woodard, Mark; Rohrbaugh, Dave

    1995-01-01

    The Advanced Composition Explorer (ACE) spacecraft is designed to fly in a spin-stabilized attitude. The spacecraft will carry two attitude sensors - a digital fine Sun sensor and a charge coupled device (CCD) star tracker - to allow ground-based determination of the spacecraft attitude and spin rate. Part of the processing that must be performed on the CCD star tracker data is the star identification. Star data received from the spacecraft must be matched with star information in the SKYMAP catalog to determine exactly which stars the sensor is tracking. This information, along with the Sun vector measured by the Sun sensor, is used to determine the spacecraft attitude. Several existing star identification (star ID) systems were examined to determine whether they could be modified for use on the ACE mission. Star ID systems which exist for three-axis stabilized spacecraft tend to be complex in nature and many require fairly good knowledge of the spacecraft attitude, making their use for ACE excessive. Star ID systems used for spinners carrying traditional slit star sensors would have to be modified to model the CCD star tracker. The ACE star ID algorithm must also be robust, in that it will be able to correctly identify stars even though the attitude is not known to a high degree of accuracy, and must be very efficient to allow real-time star identification. The paper presents the star ID algorithm that was developed for ACE. Results from prototype testing are also presented to demonstrate the efficiency, accuracy, and robustness of the algorithm.

  10. Intradermally-administered influenza virus vaccine is safe and immunogenic in healthy adults 18-64 years of age.

    PubMed

    Gorse, Geoffrey J; Falsey, Ann R; Fling, John A; Poling, Terry L; Strout, Cynthia B; Tsang, Peter H

    2013-05-01

    To increase vaccine acceptance, intradermal (ID) influenza vaccine (Fluzone(®) Intradermal, Sanofi Pasteur Inc.) may be an attractive alternative to intramuscular (IM) vaccination due to smaller needle and volume injected. A multicenter, randomized (2:1 ID vs IM vaccines) study, blinded for ID vaccine lots, was conducted among 4292 adults 18-64 years of age enrolled in October 2008. Three lots of investigational trivalent influenza vaccine containing 9μg hemagglutinin (HA) per strain in 0.1mL administered ID with a 30 gauge, 1.5mm long needle were compared to standard dose vaccine (0.5mL containing 15μg HA/strain) given IM. The post-vaccination antibody geometric mean titers (GMT) for the ID vaccine were similar to the IM vaccine (H1N1: 193.2 vs. 178.3, H3N2: 246.7 vs. 230.7, and B: 102.5 vs. 126.9). Non-inferiority was met for the ID vaccine compared to IM vaccine as assessed by antibody GMT ratios (IM/ID) for all three virus strains (H1N1: 0.92, H3N2: 0.94, and B: 1.24). Seroconversion rates were non-inferior for H1N1 and H3N2, but not for B (ID vs. IM: H1N1: 61.2% vs. 60.5%, H3N2: 75.3% vs. 74.8%, and B: 46.2% vs. 54.2%). Seroprotection (HAI titer ≥1:40) rates were similar between groups (ID vs. IM, H1N1: 91.1% vs. 91.7%, H3N2: 90.7% vs. 91.4%, and B: 87.4% vs. 89.3%). Local injection site reactions overall were more common with ID than IM vaccine (ID vs. IM: 89.2% vs. 60.2%), but were usually grade 1 or 2 and transient. The frequencies of local injection site pain and systemic reactions were similar between vaccine groups, except more myalgia with IM vaccine. The ID vaccine elicited immune responses comparable to IM vaccine except for the seroconversion rate to B virus. With the exception of pain, local injection site reactions were more common with the ID vaccine, but well-tolerated and of short duration. ClinicalTrials.gov identifier: NCT00772109. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Field monitoring versus individual miner dosimetry of radon daughter products in mines.

    PubMed

    Domański, T; Kluszczyński, D; Olszewski, J; Chruscielewski, W

    1989-01-01

    The paper presents the results realised simultaneously by two different and independent systems of measurement of an assessment of miners' exposure to radon daughter products which naturally occur in the air of mines. The first one, called the Air Sampling System (ASS), was based on the field monitoring of radon progeny in air, the second one, called the Individual Dosimetry System (IDS), was based on the individual dosimeters worn by miners. Experimental comparison of these two systems has been conducted for six years in eleven Polish underground metal-ore mines. This study reveals that no correlation exists between the concentration and annual miners' exposures evaluated by the ASS and IDS. The ratio ASS/IDS for mine population varies from 11.0 to 0.14 in respect of annual concentration means, and in respect to annual exposures, this ratio varies from 4.5 to 0.14. The conclusion to be drawn from six years' observation and comparison of both systems is that correct and true evaluation of miners' exposure to radon progeny can be made only by the use of the Individual Dosimetry System, since the Air Sampling System is too sensitive and too dependent on the Strategy of sampling and its radiation.

  12. The International DORIS Service (IDS) - Recent Developments in Preparation for ITRF2013

    NASA Technical Reports Server (NTRS)

    Willis, Pascal; Lemoine, Frank G.; Moreaux, Guilhem; Soudarin, Laurent; Ferrage, Pascale; Ries, John; Otten, Michiel; Saunier, Jerome; Noll, Carey E.; Biancale, Richard; hide

    2014-01-01

    The International DORIS Service (IDS) was created in 2003 under the umbrella of the International Association of Geodesy (IAG) to foster scientific research related to the French DORIS tracking system and to deliver scientific products, mostly related to the International Earth rotation and Reference systems Service (IERS). We first present some general background related to the DORIS system (current and planned satellites, current tracking network and expected evolution) and to the general IDS organization (from Data Centers, Analysis Centers and Combination Center). Then, we discuss some of the steps recently taken to prepare the IDS submission to ITRF2013 (combined weekly time series based on individual solutions from several Analysis Centers). In particular, recent results obtained from the Analysis Centers and the Combination Center show that improvements can still be made when updating physical models of some DORIS satellites, such as Envisat, Cryosat-2 or Jason-2. The DORIS contribution to ITRF2013 should also benefit from the larger number of ground observations collected by the last generation of DGXX receivers (first instrument being onboard Jason-2 satellite). In particular for polar motion, sub-millarcsecond accuracy seems now to be achievable. Weekly station positioning internal consistency also seems to be improved with a larger DORIS constellation.

  13. Differenced Range Versus Integrated Doppler (DRVID) ionospheric analysis of metric tracking in the Tracking and Data Relay Satellite System (TDRSS)

    NASA Technical Reports Server (NTRS)

    Radomski, M. S.; Doll, C. E.

    1995-01-01

    The Differenced Range (DR) Versus Integrated Doppler (ID) (DRVID) method exploits the opposition of high-frequency signal versus phase retardation by plasma media to obtain information about the plasma's corruption of simultaneous range and Doppler spacecraft tracking measurements. Thus, DR Plus ID (DRPID) is an observable independent of plasma refraction, while actual DRVID (DR minus ID) measures the time variation of the path electron content independently of spacecraft motion. The DRVID principle has been known since 1961. It has been used to observe interplanetary plasmas, is implemented in Deep Space Network tracking hardware, and has recently been applied to single-frequency Global Positioning System user navigation This paper discusses exploration at the Goddard Space Flight Center (GSFC) Flight Dynamics Division (FDD) of DRVID synthesized from simultaneous two-way range and Doppler tracking for low Earth-orbiting missions supported by the Tracking and Data Relay Satellite System (TDRSS) The paper presents comparisons of actual DR and ID residuals and relates those comparisons to predictions of the Bent model. The complications due to the pilot tone influence on relayed Doppler measurements are considered. Further use of DRVID to evaluate ionospheric models is discussed, as is use of DRPID in reducing dependence on ionospheric modeling in orbit determination.

  14. Reticulocyte hemoglobin equivalent as a potential marker for diagnosis of iron deficiency.

    PubMed

    Toki, Yasumichi; Ikuta, Katsuya; Kawahara, Yoshie; Niizeki, Noriyasu; Kon, Masayuki; Enomoto, Motoki; Tada, Yuko; Hatayama, Mayumi; Yamamoto, Masayo; Ito, Satoshi; Shindo, Motohiro; Kikuchi, Yoko; Inoue, Mitsutaka; Sato, Kazuya; Fujiya, Mikihiro; Okumura, Toshikatsu

    2017-07-01

    Evaluation of parameters relating to serum ferritin and iron is critically important in the diagnosis of iron deficiency anemia (IDA). The recent development of automated systems for hematology analysis has made it possible to measure reticulocyte hemoglobin equivalent (RET-He), which is thought to reflect iron content in reticulocytes, in the same sample used for complete blood count tests. If RET-He is, indeed, capable of evaluating iron deficiency (ID), it would be useful for immediate diagnosis of IDA. In the present study, we examined the usefulness of RET-He for diagnosis of ID. Blood samples were obtained from 211 patients. Anemia was defined as hemoglobin (Hb) level of <12 g/dL. Iron deficiency was defined as serum ferritin level of <12 ng/mL. Patients were classified into four groups: IDA, ID, control, and non-ID with anemia. Patients in the IDA group had significantly lower RET-He levels than those in the control group. RET-He correlated with serum ferritin in the IDA and ID groups. The area under the curve for RET-He was 0.902, indicating that RET-He facilitates the diagnosis of ID with high accuracy. RET-He changed in parallel with changes in Hb during iron administration for 21 IDA patients. Our results indicate that RET-He may be a clinically useful marker for determining ID in the general population.

  15. Preventing a Cyber Dresden: How the Evolution of Air Power can Guide the Evolution of Cyber

    DTIC Science & Technology

    2011-06-01

    24 Paul Cornish, On Cyber Warfare, (London: RUSI, 2010), 1. 25 CNN‟s footage of Project Aurora, the staged demonstration of SCADA vulnerabilities... Paul McHugh, “Striving for Coherence: Psychiatry‟s Efforts Over Classification”, The Journal of American Medical Association, no.293 (2005):2526-2528...Randall Wakelam, The Science of Bombing: Operational Research in RAF Bomber Command (Toronto: University of Toronto Press, 2009), 157-182 and Dana

  16. The effectiveness of ID readers and remote age verification in enhancing compliance with the legal age limit for alcohol.

    PubMed

    Van Hoof, Joris J

    2017-04-01

    Currently, two different age verification systems (AVS) are implemented to enhance compliance with legal age limits for the sale of alcohol in the Netherlands. In this study, we tested the operational procedures and effectiveness of ID readers and remote age verification technology in supermarkets during the sale of alcohol. Following a trained alcohol purchase protocol, eight mystery shoppers (both underage and in the branch's reference age) conducted 132 alcohol purchase attempts in stores that were equipped with ID readers or remote age verification or were part of a control group. In stores equipped with an ID reader, 34% of the purchases were conducted without any mistakes (full compliance). In stores with remote age verification, full compliance was achieved in 87% of the cases. The control group reached 57% compliance, which is in line with the national average. Stores with ID readers perform worse than stores with remote age verification, and also worse than stores without any AVS. For both systems, in addition to effectiveness, public support and user friendliness need to be investigated. This study shows that remote age verification technology is a promising intervention that increases vendor compliance during the sales of age restricted products. © The Author 2016. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  17. On the applied implications of the "verbal overshadowing effect".

    PubMed

    Mickes, Laura; Wixted, John T

    2015-05-01

    Schooler and Engstler-Schooler (1990) found that participants who wrote out a description of the perpetrator's face after watching a simulated crime video were subsequently less likely to identify that perpetrator from a photo lineup compared to participants in a control condition (i.e., the correct ID rate was reduced). The first registered replication report in Perspectives on Psychological Science confirmed this verbal overshadowing effect (Alogna et al., 2014). Does this result indicate a reduced ability to recognize the person who was verbally described, or does it instead reflect more conservative responding? The answer depends on the still unknown likelihood of identifying an innocent suspect from a lineup (the false ID rate). Assuming the reduced correct ID rate does reflect memory impairment, should the legal system be advised to give less weight to a suspect identification if the witness previously provided a verbal description of the perpetrator? Intuitively, the answer is "yes," but without knowing the false ID rate, it is unclear if a suspect identification following a verbal description should be given less weight or more weight. This is true even if the correct and false ID rates show that verbal descriptions impair memory. In our view, psychologists should withhold giving advice to the legal system about the effect of verbal descriptions on suspect identifications until the issue is investigated by including lineups that contain an innocent suspect. © The Author(s) 2015.

  18. Multimodal biometrics for identity documents (MBioID).

    PubMed

    Dessimoz, Damien; Richiardi, Jonas; Champod, Christophe; Drygajlo, Andrzej

    2007-04-11

    The MBioID initiative has been set up to address the following germane question: What and how biometric technologies could be deployed in identity documents in the foreseeable future? This research effort proposes to look at current and future practices and systems of establishing and using biometric identity documents (IDs) and evaluate their effectiveness in large-scale developments. The first objective of the MBioID project is to present a review document establishing the current state-of-the-art related to the use of multimodal biometrics in an IDs application. This research report gives the main definitions, properties and the framework of use related to biometrics, an overview of the main standards developed in the biometric industry and standardisation organisations to ensure interoperability, as well as some of the legal framework and the issues associated to biometrics such as privacy and personal data protection. The state-of-the-art in terms of technological development is also summarised for a range of single biometric modalities (2D and 3D face, fingerprint, iris, on-line signature and speech), chosen according to ICAO recommendations and availabilities, and for various multimodal approaches. This paper gives a summary of the main elements of that report. The second objective of the MBioID project is to propose relevant acquisition and evaluation protocols for a large-scale deployment of biometric IDs. Combined with the protocols, a multimodal database will be acquired in a realistic way, in order to be as close as possible to a real biometric IDs deployment. In this paper, the issues and solutions related to the acquisition setup are briefly presented.

  19. 40 CFR 86.310-79 - Sampling and analytical system; component specifications.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... temperature specification applies. (b) Sample probe. (1) The sample probe shall be a straight, closed end, stainless steel, multi-hole probe. The Inside Diameter (I.D.) shall not be greater than the I.D. of the sample line (=.010 in.). The wall thickness of the probe shall not be greater than .040 inch. The fitting...

  20. 40 CFR 86.310-79 - Sampling and analytical system; component specifications.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... temperature specification applies. (b) Sample probe. (1) The sample probe shall be a straight, closed end, stainless steel, multi-hole probe. The Inside Diameter (I.D.) shall not be greater than the I.D. of the sample line (=.010 in.). The wall thickness of the probe shall not be greater than .040 inch. The fitting...

  1. 40 CFR 86.310-79 - Sampling and analytical system; component specifications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... temperature specification applies. (b) Sample probe. (1) The sample probe shall be a straight, closed end, stainless steel, multi-hole probe. The Inside Diameter (I.D.) shall not be greater than the I.D. of the sample line (=.010 in.). The wall thickness of the probe shall not be greater than .040 inch. The fitting...

  2. 40 CFR 86.310-79 - Sampling and analytical system; component specifications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... temperature specification applies. (b) Sample probe. (1) The sample probe shall be a straight, closed end, stainless steel, multi-hole probe. The Inside Diameter (I.D.) shall not be greater than the I.D. of the sample line (=.010 in.). The wall thickness of the probe shall not be greater than .040 inch. The fitting...

  3. Careers of Offenders with an Intellectual Disability: The Probabilities of Rearrest

    ERIC Educational Resources Information Center

    Cockram, J.

    2005-01-01

    This paper reports results from a total population of persons with intellectual disabilities (ID) in Western Australia arrested for the first time since 1 April 1984. It is part of a longitudinal study that "tracked" offenders with ID through the criminal justice system over an 11-year period to compare their experiences at each stage of…

  4. 75 FR 65509 - In the Matter of Collaborative System Products and Components Thereof (II); Notice of Commission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... presiding administrative law judge (``ALJ'') granting complainant's motion to amend the complaint and notice... Determination Granting Complainant's Motion To Amend the Complaint and Notice of Investigation AGENCY: U.S... ID, Order No. 13, granting the motion to amend. The Commission has determined not to review the ID...

  5. Health Self-Advocacy Training for Persons with Intellectual Disabilities

    ERIC Educational Resources Information Center

    Feldman, M. A.; Owen, F.; Andrews, A.; Hamelin, J.; Barber, R.; Griffiths, D.

    2012-01-01

    Background: People with intellectual disabilities (ID) have unequal access to health care. While systemic efforts are addressing health inequalities, there remains a need to demonstrate that persons with ID can increase their health self-advocacy skills. Method: A randomised control design with up to 6-month follow-up was used to evaluate the 3Rs…

  6. 77 FR 39858 - Revisions to Electric Reliability Organization Definition of Bulk Electric System and Rules of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-05

    ...'' as used in the NERC Glossary. \\25\\ Id. at 15. \\26\\ Id. at 16. 16. NERC also explains that, while the...: Through http://www.ferc.gov . Documents created electronically using word processing software should be...'s Glossary of Terms Used in Reliability Standards (NERC Glossary) developed by the North American...

  7. Poland’s Role in European and World System of States 1979-2007

    DTIC Science & Technology

    2008-06-01

    idCategory=34&idsub=180&id=10887&t=US+anti- missile+defense%3A+The+view+from+Poland [Accessed October 29, 2007]. 174 Tabassum Zakaria and Chris Borowski...files/bueros/china/04642.pdf [Accessed April 14, 2008]. Zakaria, Tabassum and Borowski, Chris. “Poland says U.S. shield a ‘foregone conclusion

  8. A model for anomaly classification in intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.

    2015-09-01

    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  9. Implementation of Multipattern String Matching Accelerated with GPU for Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Nehemia, Rangga; Lim, Charles; Galinium, Maulahikmah; Rinaldi Widianto, Ahmad

    2017-04-01

    As Internet-related security threats continue to increase in terms of volume and sophistication, existing Intrusion Detection System is also being challenged to cope with the current Internet development. Multi Pattern String Matching algorithm accelerated with Graphical Processing Unit is being utilized to improve the packet scanning performance of the IDS. This paper implements a Multi Pattern String Matching algorithm, also called Parallel Failureless Aho Corasick accelerated with GPU to improve the performance of IDS. OpenCL library is used to allow the IDS to support various GPU, including popular GPU such as NVIDIA and AMD, used in our research. The experiment result shows that the application of Multi Pattern String Matching using GPU accelerated platform provides a speed up, by up to 141% in term of throughput compared to the previous research.

  10. Evaluation of the pathotec Rapid I-D system for identification of Enterobacteriaceae.

    PubMed Central

    Smith, P B; Rhoden, D L; Tomfohrde, K M

    1975-01-01

    The PathoTec Rapid I-D System for identifying Enterobacteriaceae was evaluated with 471 cultures. In 4,910 individual test comparisons, 95.5% of the results agreed, with results of only two test strips, those for esculin hydrolysis and urease production, agreeing with conventional tests in less than 94% of the trials. The PathoTec system exhibited 94.3% accuracy in identifying these cultures in a double-blind study with conventional media and procedures as the alternate system. Two newly developed test strips, for 0-nitrophenyl-beta-D-galactopyranoside and ornithine decarboxylase, were found to be highly reliable. PMID:1041590

  11. An overview of the Progenika ID CORE XT: an automated genotyping platform based on a fluidic microarray system.

    PubMed

    Goldman, Mindy; Núria, Núria; Castilho, Lilian M

    2015-01-01

    Automated testing platforms facilitate the introduction of red cell genotyping of patients and blood donors. Fluidic microarray systems, such as Luminex XMAP (Austin, TX), are used in many clinical applications, including HLA and HPA typing. The Progenika ID CORE XT (Progenika Biopharma-Grifols, Bizkaia, Spain) uses this platform to analyze 29 polymorphisms determining 37 antigens in 10 blood group systems. Once DNA has been extracted, processing time is approximately 4 hours. The system is highly automated and includes integrated analysis software that produces a file and a report with genotype and predicted phenotype results.

  12. [Comparison of Phoenix™ Yeast ID Panel and API® ID 32C commercial systems for the identification of Candida species isolated from clinical samples].

    PubMed

    Gayibova, Ülkü; Dalyan Cılo, Burcu; Ağca, Harun; Ener, Beyza

    2014-07-01

    Opportunistic fungal pathogens are one of the important causes of nosocomial infections, and several different types of yeasts, especially Candida species are increasingly recovered from immunocompromised patients. Since many of the yeasts are resistant to the commonly used antifungal agents, the introduction of appropriate therapy depends on rapid and accurate identification. The aims of this study were to compare the commercial identification systems namely API® ID 32C (bioMerieux, France) and Phoenix™ Yeast ID Panel (Becton Dickinson Diagnostics, USA) for the identification of Candida species and to evaluate the effect of morphological findings in the identification process. A total of 211 yeast strains isolated from different clinical samples (111 urine, 34 blood/vascular catheter, 27 upper/lower respiratory tract, 16 abscess/pus, 13 throat/vagina swabs and 10 sterile body fluids) of 137 patients hospitalized in Uludag University Health and Research Center between October 2013 to January 2014, were included in the study. Samples were cultured on blood agar, chromogenic agar (CHROMagar Candida, BD, USA) and Saboraud's dextrose agar (SDA), and isolated yeast colonies were evaluated with germ tube test and morphological examination by microscopy on cornmeal/Tween-80 agar. The isolates were identified as well by two commercial systems according to the manufacturers' recommendations. Discrepant results between the systems were tried to be resolved by using morphological characteristics of the yeasts. Of the isolates 159 were identified identical by both of the systems, and the concordance between those systems were estimated as 75.4%. According to the concordant identification, the most frequently isolated species was C.albicans (44.1%) followed by C.tropicalis (9.9%), C.glabrata (9.5%), C.parapsilosis (8.5%) and C.kefyr (8.1%). The concordance rate was 81.7% in identification of frequently isolated species (C.albicans, C.tropicalis, C.parapsilosis, C.glabrata, C.kefyr), however it was 38.7% for the rarely isolated ones (C.krusei, C.lusitaniae, C.inconspicua/C.norvagensis, C.catenulata), representing statistical significance (p= 0.034; x2 test). Although not significant (p= 0.31; x2 test), the rate of concordance was increased (88.1%), when adding the morphological findings to the identification process. Of 211 isolates 37 (17.5%), 50 (23.7%) and 124 (58.8%) were identified according to their growth characteristics on chromogenic agar, blood agar and SDA, respectively, indicating no statistically significant difference between the media (p> 0.05). Although genotypic identification is essential, phenotypic methods are more commonly used in routine laboratories for the identification of yeast species. However, since genotypic identification could not be performed in this study, none of the systems were accepted as the standard method and therefore the sensitivity and specificity of the systems were not calculated. On the other hand, our data indicated that the two identification systems were comparable and careful observation of yeast morphology could add confidence to the identification. In conclusion, since the Phoenix™ Yeast ID system was found more practical with easier interpretation, and the results were obtained earlier than those of the API® ID 32C system (16 hours versus 48 hours), it was thought that Phoenix™ Yeast ID system may be used reliably in the routine laboratories. However, as none of the methods evaluated was completely reliable as a stand-alone, careful evaluation is necessary for species identification.

  13. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  14. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  15. Anti-Idiotypic Antibodies in Patients with Different Clinical Forms of Paracoccidioidomycosis

    PubMed Central

    Souza, A. R.; Gesztesi, J.-L.; del Negro, G. M. B.; Benard, G.; Sato, J.; Santos, M. V. B.; Abrahão, T. B.; Lopes, J. D.

    2000-01-01

    Paracoccidioidomycosis (PCM) is the most prevalent systemic mycosis in Latin America. Patients with PCM show a wide spectrum of clinical and pathological manifestations depending on both host and pathogen factors. Two clinical forms of the disease are recognized: the acute or juvenile form and the chronic or adult form. The major antigenic component of the parasite is a glycoprotein of 43 kDa (gp43). All patient sera present antibodies against gp43 (anti-gp43) and, as demonstrated before by our group, spontaneous anti-idiotypic (anti-Id) antibodies (Ab2) can be detected in patient sera with high titers of anti-gp43. Since it has been postulated that anti-Id antibodies may have a modulating function, we decided to purify and characterize anti-Id antibodies in this system. The possible correlation of Ab2 titers with different clinical forms of disease was also verified. Results showed that purified human anti-Id antibodies (human Ab2) recognized specifically the idiotype of some murine monoclonal anti-gp43 (17c and 3e) but not others (40.d7, 27a, and 8a). Spontaneous anti-Id antibodies were found in all clinical forms of disease. The majority of patients (88%, n = 8) with the acute form of PCM had high titers of Ab2. However, among patients with the multifocal chronic form of the disease, only 29% (n = 14) had high titers of Ab2; 70% (n = 10) of patients with the unifocal chronic form had low titers of Ab2. A correlation between Ab2 titers and anti-gp43 titers was observed before and during antimycotic treatment. Our results suggest that titers of anti-Id antibodies correlate with the severity of PCM in humans. PMID:10702489

  16. Alcohol and Tobacco Sales to Underage Buyers in Dutch Supermarkets: Can the Use of Age Verification Systems Increase Seller's Compliance?

    PubMed

    Roodbeen, Ruud T J; Schelleman-Offermans, Karen; Lemmens, Paul H H M

    2016-06-01

    Age limits are effective in reducing alcohol- and tobacco-related harm, however, their effectiveness depends on the extent to which they are complied with. This study aimed to investigate the effectiveness of different age verification systems (AVSs) implemented by 400 Dutch supermarkets on requesting a valid age verification (ID) and on sellers' compliance. A mixed method design was used. Compliance was measured by 800 alcohol and tobacco purchase attempts by 17-year-old mystery shoppers. To analyze the effectiveness of AVSs, logistic regression analyses were performed. Insight into facilitating and hindering factors in the purchase process was obtained by 13 interviews with supermarket managers. Only a tendency toward a positive effect of the presence of the keying-on-date-of-birth AVS or ID swiper/checker was found on ID request for both alcohol and tobacco purchase attempts. The use of the keying-on-date-of-birth AVS or ID swiper/checker significantly increased the odds for compliance after an ID was requested, for both alcohol and tobacco purchase attempts. Managers indicated that ID requests and compliance could be facilitated by providing cashiers with sufficient managerial support, technical support, and regular training about the purchase process and use of the AVS. The usage of AVSs calculating and confirming whether the customer reached the legal purchase age for cashiers significantly increases the odds for cashiers to comply with age limits of alcohol and tobacco. Future research should gain insight into how usage of effective AVSs can be improved and explore the feasibility of implementation and effectiveness in other outlets. Copyright © 2016 The Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. SPring-8 beamline control system.

    PubMed

    Ohata, T; Konishi, H; Kimura, H; Furukawa, Y; Tamasaku, K; Nakatani, T; Tanabe, T; Matsumoto, N; Ishii, M; Ishikawa, T

    1998-05-01

    The SPring-8 beamline control system is now taking part in the control of the insertion device (ID), front end, beam transportation channel and all interlock systems of the beamline: it will supply a highly standardized environment of apparatus control for collaborative researchers. In particular, ID operation is very important in a third-generation synchrotron light source facility. It is also very important to consider the security system because the ID is part of the storage ring and is therefore governed by the synchrotron ring control system. The progress of computer networking systems and the technology of security control require the development of a highly flexible control system. An interlock system that is independent of the control system has increased the reliability. For the beamline control system the so-called standard model concept has been adopted. VME-bus (VME) is used as the front-end control system and a UNIX workstation as the operator console. CPU boards of the VME-bus are RISC processor-based board computers operated by a LynxOS-based HP-RT real-time operating system. The workstation and the VME are linked to each other by a network, and form the distributed system. The HP 9000/700 series with HP-UX and the HP 9000/743rt series with HP-RT are used. All the controllable apparatus may be operated from any workstation.

  18. Experimental and analytical study of water pipe's rupture for damage identification purposes

    NASA Astrophysics Data System (ADS)

    Papakonstantinou, Konstantinos G.; Shinozuka, Masanobu; Beikae, Mohsen

    2011-04-01

    A malfunction, local damage or sudden pipe break of a pipeline system can trigger significant flow variations. As shown in the paper, pressure variations and pipe vibrations are two strongly correlated parameters. A sudden change in the flow velocity and pressure of a pipeline system can induce pipe vibrations. Thus, based on acceleration data, a rapid detection and localization of a possible damage may be carried out by inexpensive, nonintrusive monitoring techniques. To illustrate this approach, an experiment on a single pipe was conducted in the laboratory. Pressure gauges and accelerometers were installed and their correlation was checked during an artificially created transient flow. The experimental findings validated the correlation between the parameters. The interaction between pressure variations and pipe vibrations was also theoretically justified. The developed analytical model explains the connection among flow pressure, velocity, pressure wave propagation and pipe vibration. The proposed method provides a rapid, efficient and practical way to identify and locate sudden failures of a pipeline system and sets firm foundations for the development and implementation of an advanced, new generation Supervisory Control and Data Acquisition (SCADA) system for continuous health monitoring of pipe networks.

  19. DSC: software tool for simulation-based design of control strategies applied to wastewater treatment plants.

    PubMed

    Ruano, M V; Ribes, J; Seco, A; Ferrer, J

    2011-01-01

    This paper presents a computer tool called DSC (Simulation based Controllers Design) that enables an easy design of control systems and strategies applied to wastewater treatment plants. Although the control systems are developed and evaluated by simulation, this tool aims to facilitate the direct implementation of the designed control system to the PC of the full-scale WWTP (wastewater treatment plants). The designed control system can be programmed in a dedicated control application and can be connected to either the simulation software or the SCADA of the plant. To this end, the developed DSC incorporates an OPC server (OLE for process control) which facilitates an open-standard communication protocol for different industrial process applications. The potential capabilities of the DSC tool are illustrated through the example of a full-scale application. An aeration control system applied to a nutrient removing WWTP was designed, tuned and evaluated with the DSC tool before its implementation in the full scale plant. The control parameters obtained by simulation were suitable for the full scale plant with only few modifications to improve the control performance. With the DSC tool, the control systems performance can be easily evaluated by simulation. Once developed and tuned by simulation, the control systems can be directly applied to the full-scale WWTP.

  20. The impact of provider consolidation on physician prices.

    PubMed

    Carlin, Caroline S; Feldman, Roger; Dowd, Bryan

    2017-12-01

    When a clinic system is acquired by an integrated delivery system (IDS), the ownership change includes both vertical integration with the hospital(s), and horizontal integration with the IDS's previously owned or "legacy" clinics, causing increased market concentration in physician services. Although there is a robust literature on the impact of hospital market concentration, the literature on physician market concentration is sparse. The objective of this study is to determine the impact on physician prices when two IDSs acquired three multispecialty clinic systems in Minneapolis-St Paul, Minnesota at the end of 2007, using commercial claims data from a large health plan (2006-2011). Using a difference-in-differences model and nonacquired clinics as controls, we found that four years after the acquisitions (2011), average physician price indices in the acquired clinic systems were 32-47% higher than expected in absence of the acquisitions. Average physician prices in the IDS legacy clinics were 14-20% higher in 2011 than expected. Procedure-specific prices for common office visit and inpatient procedures also increased following the acquisitions. Copyright © 2017 John Wiley & Sons, Ltd.

  1. The research on the status, rehabilitation, education, vocational development, social integration and support services related to intellectual disability in China.

    PubMed

    Wu, Lihui; Qiu, Zhuoying; Wong, Daniel; Hernandez, Lucy Wong; Zhao, Qianlei

    2010-01-01

    Intellectual disability (ID) is a prevalent form of non-progressive cognitive impairment. The objectives of this articles are: to analyze the changes of ID in China, including its definition, prevalence, rehabilitation, education, vocational development, social life and support services; to review and to compare the issues of intellectual disability in China with the international literatures and research studies and to provide useful updated information and reference data for scholars and researchers who study intellectual disability. Analyzed the data obtained from two national sample surveys on disability with respect to intellectual disability in China. The estimated prevalence of individuals with intellectual disabilities in China was 7.5‰ in 2006 nationally which was lower than the previous results obtained in the 1987 national survey. The fourth level of ID showed a downward trend, while the proportion among the population aged 60 and over with ID tended to increase. The 2006 national survey indicated that the prevalence of ID in rural areas was higher than that in urban areas. This finding was consistent with the national survey conducted in 1987. As indicated by the 2006 national survey, 29.4% cases had no known causes for the ID, the proportion tended to decrease as compared with the first survey. However, when compared to the 1987 report, the proportion of senile dementia among older people as indicated by the 2006 report was higher than before. During the past years, the prevention of ID and the quality of life of individuals with ID have improved due to the enactment and implementation of a series of national laws and regulations, however, there is more that needs to be done in the areas of education, vocational development, social integration and support services for individuals with ID in order to improve the quality of life of individuals with ID in China. The findings of this study are consistent with the research findings presented in the international literatures. ID is the conditions that deserve further study and deserve the attention of policy makers and rehabilitation professionals in China. Furthermore, with the ageing of population in China and its impact to the social security system, the in-depth study of ID and its implications has become more pertinent in China in the future. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. Magnitude and characteristics of acute paraquat- and diquat-related illnesses in the US: 1998-2013.

    PubMed

    Fortenberry, Gamola Z; Beckman, John; Schwartz, Abby; Prado, Joanne Bonnar; Graham, Lucia S; Higgins, Sheila; Lackovic, Michelle; Mulay, Prakash; Bojes, Heidi; Waltz, Justin; Mitchell, Yvette; Leinenkugel, Kathy; Oriel, Michel S; Evans, Elizabeth; Calvert, Geoffrey M

    2016-04-01

    Paraquat and diquat are among the most commonly used herbicides in the world. Determine the magnitude, characteristics, and root causes for acute paraquat- and diquat-related illnesses in the US METHODS: Illnesses associated with paraquat or diquat exposure occurring from 1998 through 2011 were identified from the Sentinel Event Notification System for Occupational Risks (SENSOR)-Pesticides Program, the California Department of Pesticide Regulation (CDPR) Pesticide Illness Surveillance Program (PISP), and the Incident Data System (IDS). Cases identified by the National Poison Data System (NPDS) were reviewed for the years 1998-2003 and 2006-2013. A total of 300 paraquat- and 144 diquat-related acute illnesses were identified by SENSOR, PISP, and IDS. NPDS identified 693 paraquat- and 2128 diquat-related acute illnesses. In SENSOR/PISP/IDS, illnesses were commonly low severity (paraquat=41%; diquat=81%); however, SENSOR/PISP/IDS identified 24 deaths caused by paraquat and 5 deaths associated with diquat. Nineteen paraquat-related deaths were due to ingestion, seven of which were unintentional, often due to improper storage in beverage bottles. In SENSOR/PISP/IDS, paraquat and diquat-related acute illnesses were work-related in 68% (n=203) and 29% (n=42) of cases, respectively. When herbicide application site was known, the vast majority of acute paraquat-related illnesses (81%) arose from agricultural applications. Common root causes of illness were failure to use adequate personal protective equipment (PPE), application equipment failure, and spill/splash of herbicide. Although the magnitude of acute paraquat/diquat-related illnesses was relatively low, several fatalities were identified. Many illnesses could be prevented through stricter compliance with label requirements (e.g. ensuring proper herbicide storage and PPE use), and through enhanced training of certified applicators. Published by Elsevier Inc.

  3. Magnitude and characteristics of acute paraquat- and diquat-related illnesses in the US: 1998–2013

    PubMed Central

    Fortenberry, Gamola Z.; Beckman, John; Schwartz, Abby; Prado, Joanne Bonnar; Graham, Lucia S.; Higgins, Sheila; Lackovic, Michelle; Mulay, Prakash; Bojes, Heidi; Waltz, Justin; Mitchell, Yvette; Leinenkugel, Kathy; Oriel, Michel S.; Evans, Elizabeth; Calvert, Geoffrey M.

    2016-01-01

    Background Paraquat and diquat are among the most commonly used herbicides in the world. Objectives Determine the magnitude, characteristics, and root causes for acute paraquat- and diquat-related illnesses in the US Methods Illnesses associated with paraquat or diquat exposure occurring from 1998 through 2011 were identified from the Sentinel Event Notification System for Occupational Risks (SENSOR)-Pesticides Program, the California Department of Pesticide Regulation (CDPR) Pesticide Illness Surveillance Program (PISP), and the Incident Data System (IDS). Cases identified by the National Poison Data System (NPDS) were reviewed for the years 1998–2003 and 2006–2013. Results A total of 300 paraquat- and 144 diquat-related acute illnesses were identified by SENSOR, PISP, and IDS. NPDS identified 693 paraquat- and 2128 diquat-related acute illnesses. In SENSOR/PISP/IDS, illnesses were commonly low severity (paraquat=41%; diquat=81%); however, SENSOR/PISP/IDS identified 24 deaths caused by paraquat and 5 deaths associated with diquat. Nineteen paraquat-related deaths were due to ingestion, seven of which were unintentional, often due to improper storage in beverage bottles. In SENSOR/PISP/IDS, paraquat and diquat-related acute illnesses were work-related in 68% (n=203) and 29% (n=42) of cases, respectively. When herbicide application site was known, the vast majority of acute paraquat-related illnesses (81%) arose from agricultural applications. Common root causes of illness were failure to use adequate personal protective equipment (PPE), application equipment failure, and spill/splash of herbicide. Conclusions Although the magnitude of acute paraquat/diquat-related illnesses was relatively low, several fatalities were identified. Many illnesses could be prevented through stricter compliance with label requirements (e.g. ensuring proper herbicide storage and PPE use), and through enhanced training of certified applicators. PMID:26775000

  4. A model system for the evaluation of radioimmunoimaging of tumors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koizumi, M.; Endo, K.; Sakahara, H.

    1985-05-01

    The authors have developed a simple model system that can be used to evaluate methods of radioimmunoimaging of tumors, using human chorionic gonadropin (hCG) as a model antigen, and a monoclonal antibody against hCG ..beta..-subunit as a model antibody. HCG was coated on a polystylene spherical bead with a quarter inch in diameter, and coated beads were washed extensively with phosphate buffered saline, and glycine acid buffer to remove the easily dissociable antigen. HCG-coated beads were put into the subcutaneous tissue on the back of mice. At 24 hr after the transplantation, when serum hCG was not detectable by themore » conventional RIA, radiolabeled antibodies were injected and its bio-distribution monitored. The %ID/g for the hCG coated beads increased to a maximum of 48 hr after the injection of radioiodinad antibody, whereas the %ID/g for most organs decreased with time. As a nonspecific antigen, beads coated with bovine serum albumin were transplanted and its uptake was as low as about one 50th of hCG-coated ones. The %ID/g of radioiodinated monoclonal antibody against human thyroglobulin (a nonspecific antibody) for hCG-coated beads was also negligible. Thus, the localization index (%ID of specific antibody / %ID of nonspecific antibody) reached to 15.0 at 24 hr, 35.5 at 48 hr and 57.8 at 96 hr after the injection. The biodistribution of In-111 labeled specific monoclonal antibody, prepared through the chelation with DTPA, demonstrated similar results with radioiodinated ones. This mouse model system that did not involve the use of tumors, yielded high localization index and reproducibilities and could be used to evaluate different methods for radiolabelng monoclonal antibodies.« less

  5. Id4 functions downstream of Bmp signaling to restrict TCF function in endocardial cells during atrioventricular valve development.

    PubMed

    Ahuja, Suchit; Dogra, Deepika; Stainier, Didier Y R; Reischauer, Sven

    2016-04-01

    The atrioventricular canal (AVC) connects the atrial and ventricular chambers of the heart and its formation is critical for the development of the cardiac valves, chamber septation and formation of the cardiac conduction system. Consequently, problems in AVC formation can lead to congenital defects ranging from cardiac arrhythmia to incomplete cardiac septation. While our knowledge about early heart tube formation is relatively comprehensive, much remains to be investigated about the genes that regulate AVC formation. Here we identify a new role for the basic helix-loop-helix factor Id4 in zebrafish AVC valve development and function. id4 is first expressed in the AVC endocardium and later becomes more highly expressed in the atrial chamber. TALEN induced inactivation of id4 causes retrograde blood flow at the AV canal under heat induced stress conditions, indicating defects in AV valve function. At the molecular level, we found that id4 inactivation causes misexpression of several genes important for AVC and AV valve formation including bmp4 and spp1. We further show that id4 appears to control the number of endocardial cells that contribute to the AV valves by regulating Wnt signaling in the developing AVC endocardium. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. IDF Diabetes Atlas estimates of 2014 global health expenditures on diabetes.

    PubMed

    da Rocha Fernandes, Joao; Ogurtsova, Katherine; Linnenkamp, Ute; Guariguata, Leonor; Seuring, Till; Zhang, Ping; Cavan, David; Makaroff, Lydia E

    2016-07-01

    To estimate health expenditures due to diabetes in 2014 for the world and its regions. Diabetes-attributable health expenditures were estimated using an attributable fraction method. Data were sourced from International Diabetes Federation (IDF) estimates of diabetes prevalence, UN population projections, WHO annual health expenditure reports, and estimates of the cost ratio of people with and without diabetes. Health expenditures were calculated in both US dollars (USD) and international dollars (ID). The average health expenditure per person with diabetes worldwide in 2014 was estimated to range from USD 1583 (ID 1742) to USD 2842 (ID 3110). The estimated annual global health expenditure attributable to diabetes ranged from USD 612 billion (ID 673 billion) to USD 1099 billion (ID 1202 billion). Together, the North America and Caribbean Region and the Europe Region were responsible for over 69% of the costs, and less than 10% of the costs were from the Africa Region, South East Asia Region, and Middle East and North Africa Region combined. The North America and Caribbean Region had the highest annual spending per person with diabetes (USD 7984 [ID 8040.39]), while the South East Asia Region had the lowest annual spending per person with diabetes (USD 92 [ID 234]). Diabetes imposes a large economic burden on health care systems across the world, yet varies across world regions. Diabetes prevention and effective management of diabetes should be a public health priority to reduce the financial burden. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. Community management of intellectual disabilities in Pakistan: a mixed methods study.

    PubMed

    Mirza, I; Tareen, A; Davidson, L L; Rahman, A

    2009-06-01

    Pakistan has one of the highest reported rates of childhood intellectual disabilities (ID) in the world. Prevalence estimates vary from 19.1/1000 for serious ID to 65/1000 for mild ID. We surveyed carers of persons with ID (n = 100) using quantitative and qualitative instruments. We conducted in-depth interviews of carers (n = 16) and key primary health providers (n = 10). We also carried out focus groups (n = 7). Data were triangulated and interpreted in light of peer reviewed literature. There was a delay of 2.92 (95% CI 1.9 to 3.94) to 4.17 (95% CI 2.34 to 6.01) years between detection and seeking of care. Parental stress associated with caring for these children was high (mean Self-Reporting Questionnaire score 8.4; 95% CI 6.80 to 9.91). Home management consisted mainly of physical containment. Stigma associated with ID contributed to decreased opportunity for these children and families to participate in community activities. There was a lack of knowledge about causation and effective interventions for ID. Our findings suggest that there is significant delay in detection of ID especially in rural setting where more than 70% of population of Pakistan resides. This missed opportunity for rehabilitation in early formative years is a cause of significant distress for the caregivers who rarely receive valid information about course, prognosis and what remedial action to take. There is a need to develop feasible, cost-effective, community level interventions, which can be integrated into existing healthcare systems.

  8. Head Rotation Movement Times.

    PubMed

    Hoffmann, Errol R; Chan, Alan H S; Heung, P T

    2017-09-01

    The aim of this study was to measure head rotation movement times in a Fitts' paradigm and to investigate the transition region from ballistic movements to visually controlled movements as the task index of difficulty (ID) increases. For head rotation, there are gaps in the knowledge of the effects of movement amplitude and task difficulty around the critical transition region from ballistic movements to visually controlled movements. Under the conditions of 11 ID values (from 1.0 to 6.0) and five movement amplitudes (20° to 60°), participants performed a head rotation task, and movement times were measured. Both the movement amplitude and task difficulty have effects on movement times at low IDs, but movement times are dependent only on ID at higher ID values. Movement times of participants are higher than for arm/hand movements, for both ballistic and visually controlled movements. The information-processing rate of head rotational movements, at high ID values, is about half that of arm movements. As an input mode, head rotations are not as efficient as the arm system either in ability to use rapid ballistic movements or in the rate at which information may be processed. The data of this study add to those in the review of Hoffmann for the critical IDs of different body motions. The data also allow design for the best arrangement of display that is under the design constraints of limited display area and difficulty of head-controlled movements in a data-inputting task.

  9. FastID: Extremely Fast Forensic DNA Comparisons

    DTIC Science & Technology

    2017-05-19

    FastID: Extremely Fast Forensic DNA Comparisons Darrell O. Ricke, PhD Bioengineering Systems & Technologies Massachusetts Institute of...Technology Lincoln Laboratory Lexington, MA USA Darrell.Ricke@ll.mit.edu Abstract—Rapid analysis of DNA forensic samples can have a critical impact on...time sensitive investigations. Analysis of forensic DNA samples by massively parallel sequencing is creating the next gold standard for DNA

  10. 17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...

  11. 17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...

  12. Differences between Juvenile Offenders with and without Intellectual Disabilities in the Importance of Static and Dynamic Risk Factors for Recidivism

    ERIC Educational Resources Information Center

    van der Put, C. E.; Asscher, J. J.; Stams, G. J. J. M.; Moonen, X. M. H.

    2014-01-01

    Background: Juvenile offenders with intellectual disability (ID) have been largely ignored in the literature of risk assessment, while they are overrepresented in the criminal justice system, and ID is a risk factor for juvenile delinquency and recidivism. The aim of this study was to examine whether there are differences between juvenile…

  13. 40 CFR 75.64 - Quarterly reports.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... facility system ID; (C) State facility ID; (D) Source category/type; (E) Primary SIC code; (F) State postal... information required by § 75.53 and hardcopy test data and results required by § 75.59; (viii) Records of flow... § 75.59(a)(7)(ii)(A) through (T) and under § 75.59(a)(7)(iii)(A) through (M) shall be reported for flow...

  14. Evaluating Machine Learning Classifiers for Hybrid Network Intrusion Detection Systems

    DTIC Science & Technology

    2015-03-26

    7 VRT Vulnerability Research Team...and the Talos (formerly the Vulnerability Research Team ( VRT )) [7] 7 ruleset libraries are the two leading rulesets in use. Both libraries offer paid...rule sets to load for the signature-based IDS. Snort is selected as the IDS engine using the “ VRT and ET No/GPL” rule set. The total rule count in the

  15. Vitek 2 ANC card versus BBL Crystal Anaerobe and RapID ANA II for identification of clinical anaerobic bacteria.

    PubMed

    Blairon, Laurent; Maza, Mengi L; Wybo, Ingrid; Piérard, Denis; Dediste, Anne; Vandenberg, Olivier

    2010-08-01

    The Vitek 2 Anaerobe and Corynebacterium Identification Card (ANC) was recently evaluated in a multicentre study. In the present work, this system was compared with the BBL Crystal Anaerobe and RapID ANA II panels. These kits were tested using 196 strains of anaerobes that had been previously identified by gas-liquid chromatography. Identification to the species or to the genus level was 75.0%, 81.1% and 70.9% for Crystal, RapID and Vitek, respectively. Vitek ANC failed to provide any identification in 20.4% of the strains, but it had fewer misidentifications than RapID. The confidence factors provided on the results report of each kit were not always correlated with a lower risk of major errors, with the exception of Vitek 2 in which a confidence factor higher than 0.86 excluded the risk of misidentification in more than 87% of isolates. The lower rate of identification by the Vitek and Crystal panels is mostly due the lower ability of these systems to identify the Clostridia. Overall, the three panels are comparable but need improvement to a better accuracy. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  16. ID'ing innate and innate-like lymphoid cells.

    PubMed

    Verykokakis, Mihalis; Zook, Erin C; Kee, Barbara L

    2014-09-01

    The immune system can be divided into innate and adaptive components that differ in their rate and mode of cellular activation, with innate immune cells being the first responders to invading pathogens. Recent advances in the identification and characterization of innate lymphoid cells have revealed reiterative developmental programs that result in cells with effector fates that parallel those of adaptive lymphoid cells and are tailored to effectively eliminate a broad spectrum of pathogenic challenges. However, activation of these cells can also be associated with pathologies such as autoimmune disease. One major distinction between innate and adaptive immune system cells is the constitutive expression of ID proteins in the former and inducible expression in the latter. ID proteins function as antagonists of the E protein transcription factors that play critical roles in lymphoid specification as well as B- and T-lymphocyte development. In this review, we examine the transcriptional mechanisms controlling the development of innate lymphocytes, including natural killer cells and the recently identified innate lymphoid cells (ILC1, ILC2, and ILC3), and innate-like lymphocytes, including natural killer T cells, with an emphasis on the known requirements for the ID proteins. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  17. Inductive learning of thyroid functional states using the ID3 algorithm. The effect of poor examples on the learning result.

    PubMed

    Forsström, J

    1992-01-01

    The ID3 algorithm for inductive learning was tested using preclassified material for patients suspected to have a thyroid illness. Classification followed a rule-based expert system for the diagnosis of thyroid function. Thus, the knowledge to be learned was limited to the rules existing in the knowledge base of that expert system. The learning capability of the ID3 algorithm was tested with an unselected learning material (with some inherent missing data) and with a selected learning material (no missing data). The selected learning material was a subgroup which formed a part of the unselected learning material. When the number of learning cases was increased, the accuracy of the program improved. When the learning material was large enough, an increase in the learning material did not improve the results further. A better learning result was achieved with the selected learning material not including missing data as compared to unselected learning material. With this material we demonstrate a weakness in the ID3 algorithm: it can not find available information from good example cases if we add poor examples to the data.

  18. Modernization of Defense Logistics Standard Systems. Establishing the Functional Baseline. Volume 2. Appendix H

    DTIC Science & Technology

    1991-09-01

    and "DD" is the numeric value of the day (01-31). [61 Time ( TM ). The time type is symbolized by the representation " TM ." Format for this type is...VERSION ID M DT 06/06 M TM 04/04 M ID 01/01 M ID 05/05 ISA13 112 ISA14 113 ISA15 114 ISA16 115INTERCHANGE *ACKNOWLEDG. * S1TEST 14 * SUBELEMENT N CTRL...Max - 6 Date of the interchange. DLMS Usage: As above. 109 Interchange Time Type - TM Min - 4 Max - 4 Time of the interchange. DLMS Usage: As above

  19. Reducing patient identification errors related to glucose point-of-care testing.

    PubMed

    Alreja, Gaurav; Setia, Namrata; Nichols, James; Pantanowitz, Liron

    2011-01-01

    Patient identification (ID) errors in point-of-care testing (POCT) can cause test results to be transferred to the wrong patient's chart or prevent results from being transmitted and reported. Despite the implementation of patient barcoding and ongoing operator training at our institution, patient ID errors still occur with glucose POCT. The aim of this study was to develop a solution to reduce identification errors with POCT. Glucose POCT was performed by approximately 2,400 clinical operators throughout our health system. Patients are identified by scanning in wristband barcodes or by manual data entry using portable glucose meters. Meters are docked to upload data to a database server which then transmits data to any medical record matching the financial number of the test result. With a new model, meters connect to an interface manager where the patient ID (a nine-digit account number) is checked against patient registration data from admission, discharge, and transfer (ADT) feeds and only matched results are transferred to the patient's electronic medical record. With the new process, the patient ID is checked prior to testing, and testing is prevented until ID errors are resolved. When averaged over a period of a month, ID errors were reduced to 3 errors/month (0.015%) in comparison with 61.5 errors/month (0.319%) before implementing the new meters. Patient ID errors may occur with glucose POCT despite patient barcoding. The verification of patient identification should ideally take place at the bedside before testing occurs so that the errors can be addressed in real time. The introduction of an ADT feed directly to glucose meters reduced patient ID errors in POCT.

  20. Reducing patient identification errors related to glucose point-of-care testing

    PubMed Central

    Alreja, Gaurav; Setia, Namrata; Nichols, James; Pantanowitz, Liron

    2011-01-01

    Background: Patient identification (ID) errors in point-of-care testing (POCT) can cause test results to be transferred to the wrong patient's chart or prevent results from being transmitted and reported. Despite the implementation of patient barcoding and ongoing operator training at our institution, patient ID errors still occur with glucose POCT. The aim of this study was to develop a solution to reduce identification errors with POCT. Materials and Methods: Glucose POCT was performed by approximately 2,400 clinical operators throughout our health system. Patients are identified by scanning in wristband barcodes or by manual data entry using portable glucose meters. Meters are docked to upload data to a database server which then transmits data to any medical record matching the financial number of the test result. With a new model, meters connect to an interface manager where the patient ID (a nine-digit account number) is checked against patient registration data from admission, discharge, and transfer (ADT) feeds and only matched results are transferred to the patient's electronic medical record. With the new process, the patient ID is checked prior to testing, and testing is prevented until ID errors are resolved. Results: When averaged over a period of a month, ID errors were reduced to 3 errors/month (0.015%) in comparison with 61.5 errors/month (0.319%) before implementing the new meters. Conclusion: Patient ID errors may occur with glucose POCT despite patient barcoding. The verification of patient identification should ideally take place at the bedside before testing occurs so that the errors can be addressed in real time. The introduction of an ADT feed directly to glucose meters reduced patient ID errors in POCT. PMID:21633490

Top